Configuring Security Features

This section describes the security features of the Security Module, including Eavesdropping Security and Intrusion Detection. Included in this section are the features you must configure to enable security on the module:

Define port security type

Define port action on intrusion

Configure Autolearning Mask

Enable ports

Configure autolearning

Download the Autolearning database

Security configurations from the Security Module are automatically uploaded to a newly elected master management module or installation of a new master management module. This automatic uploading feature ensures that the Security Module configurations are always retained and eliminates the need for you to reconfigure the new master.

Note: If you issue security commands (with the exception of MAC address settings) specifying the 'all' option, all Security Module ports in the concentrator are affected by the command. If you are running an Advanced EMM, all other Ethernet modules in the concentrator that support security are also affected.

Eavesdropping Security

Eavesdropping security is a port jamming feature that prevents users from accessing data transmitted to other users on the network. This type of security:

4 - 4 ONline 10BASE-T Security Module Installation and Operation Guide

Page 62
Image 62
3Com 5112M-TPLS installation and operation guide Configuring Security Features, Eavesdropping Security