HP J3188A manual Assigning the Authorized MAC address

Page 79

Security Information

How Eavesdrop Prevention Works

Assigning the Authorized MAC address

You can assign an authorized MAC address by entering it manually at the hub console interface or at the network management station. Assigning a specific address provides the maximum control of the port’s authorized MAC address. The Intruder Prevention and Eavesdrop Prevention security that you have configured for that port is implemented as soon as the address is assigned.Learning the Authorized MAC address

You can set the hub to learn a port’s authorized MAC address automatically by using either a “first heard” or a “learn continuous” method. The method used to learn the authorized MAC address should be chosen based on the level of data security required on a port. In each case, the security configuration for that port is implemented when the port receives a packet from the attached device. It learns the device’s address from the source address field in the packet.

First-Heard Method. The “first heard” method automatically assigns the first address detected on the port as the authorized MAC address. This method is useful to quickly identify and authorize end users whose ports may require both Eavesdrop Prevention and Intruder Prevention. Under this method, the port will be disabled automatically if an intruder is detected on the port.

Learn-Continuous Method. The “learn continuous” method allows the hub to continuously update the authorized MAC address configured for a port. Each new device connected to the port becomes the new authorized device. This security method is useful for dynamic workgroups that experience frequent changes to end-user configuration and but require minimal data security protection. In the “learn continuous” mode, the port may be config- ured to provide the Eavesdrop Prevention data security and the send-alarm security violation notification. Under this method, the port will not be disabled if an intruder is detected.

Security Information

F-3

Image 79
Contents HP J3188A Page HP 10Base-T Hub-16M J3188A Installation and Reference GuidePublication Number Iii HP 10Base-T Hub-16M J3188AFront of the Hub Back of the HubNetwork Connections FeaturesContents Cables and Connectors Vii Security InformationPage Installing the Hub Verify the hub operates correctly Installing and Configuring Your HubVerify included parts Connect the external transceiverTime Cord connected directly to the hub for proper operationPattern LEDRack or Cabinet Mounting Mount the hubTable Mounting Connect the hub to your network Connecting Hubs Together Connecting Devices to the HubTwisted-Pair Cascade Connections ThinLAN Connections InstallingOhm terminator Interpreting LED Status Connecting the Hub-16M to a Fiber-Optic BackboneInterpreting Hub Status LEDs Following table provides LED port information Interpreting Port Status LEDsPage Troubleshooting Approaches TroubleshootingTroubleshooting Using a Checklist to Diagnose the Hub Using a Checklist to Diagnose the HubProblem Solution LED Operation Hub will automatically recover after Troubleshooting LED OperationDiagnostic Tips Power CollTesting the Hub Only Hub Maintenance TasksClearing a Password for the Ascii Console Running Connectivity Tests Troubleshooting Hub Maintenance TasksObtaining Firmware Enhancements Managing the Hub Setting up the Ascii ConsoleRemotely, Using Telnet Directly, Using a Serial Cable and a TerminalManaging the Hub Starting the Console Remotely, Using a Modem and a TerminalSyntax Conventions on Help Screen Console Command ReferenceCommands are described in the rest of the chapter Example HE ST This displays help for the Status commandDefault Description BAckupRange CDpstatusCOunters Counter Name Definition Valid RangeWhen to Use IPconfig IPconfigDIsconnect Following table explains the IP parameters Configuring for Network ManagementUsing Novell NetWare IPX Using IPMAnagers SHow Parameter Default Value DefinitionManager Address IP or IPX Receive Alarms? CommandTo end your editing Table entry with ID 1 would now be a blank line Displays the other devices that are using CDP protocolMEssageinterval NEighborCommunity name PAsswordClear a password PIngPOrt port ON/OFF REsetRObustness SEcure portSHowCLear Security Configuration Parameter DefinitionsManaging the Hub Configuring Security on All Twisted-Pair Ports Configuring Security on a Single PortEavesdrop Prevention, must be set to on Address Selection Authorized Clearing Security Violation Indicators Showing the Security ConfigurationSTatus SPeed new speedStatus Information What It Means To send Network links, see the , TroubleshootingTEstlink 16M will respond with the correct packetPage Recommended Cables Cables and ConnectorsFollowing table shows PC connections to the RS-232 port Following table shows network connections to the hub Cables and ConnectorsCable Function Cable Type HP Product Number Twisted-Pair Cable for Hub-to-Computer Network Connection Twisted-Pair Cable/Connector Pin-OutsPins 1 and 2 must be a twisted pair Pins 3 and 6 must be a twisted pairMinimum pin-out will function correctly RS-232 Connector and Cable Pin-OutsInstaller for assistance with your cabling requirements Cable pin-out described belowMinimum Cable Pinout for Ascii Console Connection SignalRS-232 Modem Cable Twisted-Pair Straight-Through Cable Twisted-Pair Cable Pin AssignmentsHub End MDI-X Environmental SpecificationsPhysical ElectricalSpecifications ConnectorsElectromagnetic US Robotics Courier V.FC/V.34 Modem ConfigurationMegahertz XJ2288 Pcmcia card modem Intel 14.4EX Practical Peripherals PM288MT IISupra FAX Communication Between the Hub Network Management Station Network AddressingGlobally Assigned IP Network Addresses IPX Addressing for Novell NetWareIP Addresses for IP and Non-IP Networks IPX Addressing NotesCountry Device IP ConfigurationCompany Name/Address Bootp Process Using BootpDefinitions of the table entry fields Bootp Table File EntriesPage How Backup Links Work Backup LinksLimitations Backup LinksAdditional Notes Hub to a Server Examples of Backup LinksHow the Backup Function Works Hub to a SwitchHub can monitor only one link T e G g e s t i o nConfiguration/Installation Sequence Configuring a Backup LinkIndications of Backup Link Activation Identifying the Backup LinkReactivating the Primary Link Page Understanding Network Security Security InformationSecurity Information How Intruder Prevention WorksHow Eavesdrop Prevention Works Authorized MAC addressAssigning the Authorized MAC address Setting Inbound Security with Intruder Prevention Send Alarm Auto Port DisableSetting Outbound Security with Eavesdrop Prevention Security Information Page Mounting Precautions Safety and Regulatory StatementsEquipment and should be easily accessible Power PrecautionsTemperature might exceed 45C 113F Settings to configureGrounding Safety InformationTible de causer des dommages à léquipement Informations concernant la sécuritéHinweise zur Sicherheit Considerazioni sulla sicurezza Consideraciones sobre seguridad Safety Information Japanese Canada Regulatory StatementsFCC Class a Statement for U.S.A. Only European CommunityDeclaration of Conformity Index IndexDiagnosing with the LEDs … 2-2 diagnostic tests Late collision … 3-13 mounting the hub … LED description … Verifying hub operation … Page J3188-90001