HP J3188A manual Showing the Security Configuration, Clearing Security Violation Indicators

Page 48

Managing the Hub

Managing the Hub

Console Command Reference

Send Alarm when intruder detected? and Eavesdrop prevention?:

These parameters are defined earlier in the chapter under “Security Configuration Parameter Definitions”.

The values you select for these parameters will be applied to all the twisted-pair ports for which you have selected (or retained) the address selection method.

Showing the Security Configuration

Enter the command SE SH to display the security configuration for all of the hubs ports. A table like the following is presented:

 

 

ADDRESS

 

 

 

 

 

 

 

 

 

 

 

SELECTION

 

AUTHORIZED

 

EAVESDROP

 

SEND

DISABLE

Port

 

METHOD

 

ADDRESS

 

PREVENTION

 

ALARM

PORT *

 

 

 

 

 

 

 

 

 

 

 

 

1

 

CONTINUOUS

123456-890123

 

YES

 

NO

NO

2

 

CONTINUOUS

 

NONE

 

NO

 

NO

NO

3

 

FIRST HEARD

123456-789012

 

YES

 

YES

YES

 

 

 

 

 

 

 

 

 

 

 

 

The vertical bar between Send Alarm and Disable Port indicates that the value for the Disable Port parameter is not directly configurable. This parameter is automatically set by the Address Selection Method. If the method is either First Heard or Assigned, and if at least one of the other security parameters is set to YES, the Disable Port parameter will be YES. If the method is Continuous, the Disable Port parameter is always automatically set to NO.

Clearing Security Violation Indicators

Enter the command SE CL to clear any security violation indicators and to “rearm” the indicators to be ready for the next intrusion. The indications are slightly different between port security violations and network management security violations, as described next.

For Port Security. The security violations are indicated by the Security LED and the LED for the affected port blinking simultaneously, and the intruder’s MAC address being added to the Status command screen for the affected port. Security violations occur when a non-authorized address is detected on a port and at least one of the intruder prevention parameters (Send Alarm or Disable Port) is set to YES.

3-18

Image 48
Contents HP J3188A Page Installation and Reference Guide HP 10Base-T Hub-16M J3188APublication Number HP 10Base-T Hub-16M J3188A Front of the HubBack of the Hub IiiFeatures Network ConnectionsContents Cables and Connectors Security Information ViiPage Installing the Hub Installing and Configuring Your Hub Verify included partsConnect the external transceiver Verify the hub operates correctlyCord connected directly to the hub for proper operation TimeLED PatternMount the hub Rack or Cabinet MountingTable Mounting Connect the hub to your network Connecting Devices to the Hub Connecting Hubs TogetherTwisted-Pair Cascade Connections Installing ThinLAN ConnectionsOhm terminator Connecting the Hub-16M to a Fiber-Optic Backbone Interpreting LED StatusInterpreting Hub Status LEDs Interpreting Port Status LEDs Following table provides LED port informationPage Troubleshooting Troubleshooting ApproachesUsing a Checklist to Diagnose the Hub Troubleshooting Using a Checklist to Diagnose the HubProblem Solution LED Operation Troubleshooting LED Operation Diagnostic TipsPower Coll Hub will automatically recover afterHub Maintenance Tasks Testing the Hub OnlyClearing a Password for the Ascii Console Troubleshooting Hub Maintenance Tasks Running Connectivity TestsObtaining Firmware Enhancements Setting up the Ascii Console Managing the HubDirectly, Using a Serial Cable and a Terminal Remotely, Using TelnetManaging the Hub Remotely, Using a Modem and a Terminal Starting the ConsoleConsole Command Reference Commands are described in the rest of the chapterExample HE ST This displays help for the Status command Syntax Conventions on Help ScreenBAckup Default DescriptionCDpstatus COuntersCounter Name Definition Valid Range RangeIPconfig When to Use IPconfigDIsconnect Configuring for Network Management Using Novell NetWare IPXUsing IP Following table explains the IP parametersParameter Default Value Definition MAnagers SHowCommand Manager Address IP or IPX Receive Alarms?To end your editing Displays the other devices that are using CDP protocol MEssageintervalNEighbor Table entry with ID 1 would now be a blank linePAssword Clear a passwordPIng Community nameREset POrt port ON/OFFRObustness Security Configuration Parameter Definitions SEcure portSHowCLearManaging the Hub Configuring Security on a Single Port Configuring Security on All Twisted-Pair PortsEavesdrop Prevention, must be set to on Address Selection Authorized Showing the Security Configuration Clearing Security Violation IndicatorsSPeed new speed STatusStatus Information What It Means Network links, see the , Troubleshooting TEstlink16M will respond with the correct packet To sendPage Cables and Connectors Recommended CablesFollowing table shows PC connections to the RS-232 port Cables and Connectors Following table shows network connections to the hubCable Function Cable Type HP Product Number Twisted-Pair Cable/Connector Pin-Outs Pins 1 and 2 must be a twisted pairPins 3 and 6 must be a twisted pair Twisted-Pair Cable for Hub-to-Computer Network ConnectionRS-232 Connector and Cable Pin-Outs Installer for assistance with your cabling requirementsCable pin-out described below Minimum pin-out will function correctlySignal Minimum Cable Pinout for Ascii Console ConnectionRS-232 Modem Cable Twisted-Pair Cable Pin Assignments Twisted-Pair Straight-Through CableHub End MDI-X Specifications PhysicalElectrical EnvironmentalConnectors SpecificationsElectromagnetic Modem Configuration US Robotics Courier V.FC/V.34Megahertz XJ2288 Pcmcia card modem Practical Peripherals PM288MT II Intel 14.4EXSupra FAX Network Addressing Communication Between the Hub Network Management StationIPX Addressing for Novell NetWare IP Addresses for IP and Non-IP NetworksIPX Addressing Notes Globally Assigned IP Network AddressesDevice IP Configuration CountryCompany Name/Address Using Bootp Bootp ProcessBootp Table File Entries Definitions of the table entry fieldsPage Backup Links How Backup Links WorkBackup Links LimitationsAdditional Notes Examples of Backup Links How the Backup Function WorksHub to a Switch Hub to a ServerT e G g e s t i o n Hub can monitor only one linkConfiguring a Backup Link Configuration/Installation SequenceIdentifying the Backup Link Indications of Backup Link ActivationReactivating the Primary Link Page Security Information Understanding Network SecurityHow Intruder Prevention Works How Eavesdrop Prevention WorksAuthorized MAC address Security InformationAssigning the Authorized MAC address Setting Inbound Security with Intruder Prevention Auto Port Disable Send AlarmSetting Outbound Security with Eavesdrop Prevention Security Information Page Safety and Regulatory Statements Mounting PrecautionsPower Precautions Temperature might exceed 45C 113FSettings to configure Equipment and should be easily accessibleSafety Information GroundingInformations concernant la sécurité Tible de causer des dommages à léquipementHinweise zur Sicherheit Considerazioni sulla sicurezza Consideraciones sobre seguridad Safety Information Japanese Regulatory Statements FCC Class a Statement for U.S.A. OnlyEuropean Community CanadaDeclaration of Conformity Index IndexDiagnosing with the LEDs … 2-2 diagnostic tests Late collision … 3-13 mounting the hub … LED description … Verifying hub operation … Page J3188-90001