Chapter 5: Local Management
PORT LEVEL SECURITY CONFIGURATION
Used to set the security for each port of a connector, individually. For details, refer to Section 5.20.
5.19REPEATER LEVEL SECURITY CONFIGURATION
The Repeater Level Security Configuration screen, Figure
To access the Repeater Level Security Configuration screen, use the arrow keys to highlight the REPEATER LEVEL SECURITY CONFIGURATION menu item on the Repeater Configuration Menu screen and press ENTER. The Repeater Level Security Configuration screen displays.
Module Type: |
| Firmware Revision: | XX.XX.XX | |
|
|
| BOOTPROM Revision: XX.XX.XX | |
Interface | State | Lock/Learn | Action On Intruder |
|
1 | [Secure] | [LockOnNext] | [DisablePort] [SendTrap] | |
2 | [Secure] | [LockOnNext] | [DisablePort] [SendTrap] | |
3 | [Secure] | [LockedOnAddr] | [DisablePort] [SendTrap] | |
4 | [NonSecure] |
|
|
|
SAVE |
| EXIT |
| RETURN |
2251_112
Figure 5-26 Repeater Level Security Configuration Screen
|