Table 4-1. Quick Reference for Configuring the Security Module (Continued)
Procedure | Command |
|
|
4. Initiate Autolearning to | SET SECURITY AUTOLEARN CAPTURE |
enable the EMM to |
|
automatically learn the |
|
valid MAC addresses |
|
associated with a ports. |
|
|
|
5. Download the learned | SET SECURITY AUTOLEARN |
MAC addresses from the | DOWNLOAD |
Autolearning database to |
|
the port MAC address table. |
|
|
|
TRMM Note: The TRMM does | SET SECURITY PORT MAC_ADDRESS |
not support Autolearning. |
|
Therefore, you if you are using |
|
a TRMM to manage the |
|
Security Module, you must |
|
manually add MAC addresses |
|
to a port MAC address table. |
|
|
|
6. Define the Security type: | SET SECURITY PORT SECURITY_ TYPE |
Eavesdropping_only, |
|
Intrusion_only, or Full. |
|
Note: Security Mode is |
|
automatically enabled |
|
when you issue the SET |
|
SECURITY PORT |
|
SECURITY_TYPE command. |
|
|
|
7. Define the corrective action | SET SECURITY PORT ACTION_ ON_ |
the EMM is to take upon a | INTRUSION (only necessary if Security |
Security Intrusion attempt. | Type is set to Intrusion_Only or Full) |
|
|
8. Save Security configuration | SAVE SECURITY |
values. |
|
|
|
Configuring Security Features 4 - 3