Contents
| Viewing and Configuring Link/Seg Traps for Ports | |
Chapter 4 | Repeater Redundancy |
|
| Setting Network Circuit Redundancy | |
| Configuring a Redundant Circuit | |
| Monitoring Redundancy | |
Chapter 5 | Source Addressing |
|
| Displaying the Source Address List | |
| Setting the Ageing Time | |
| Setting the Hash Type | |
| Locking Source Addresses | |
| Source Address Locking on Older Devices | |
| Configuring Source Address Traps | |
| ||
| Module- and | |
| Finding a Source Address | |
Chapter 6 | Security |
|
| What is LANVIEWsecure? | |
| The Newest LANVIEWsecure Features | |
| Security on | |
| Configuring Security | |
| Resetting Learned Addresses | |
| Tips for Successfully Implementing Eavesdropper Protection | |
| Enabling Security and Traps | |
| ||
| ||
| ||
Appendix A SEHI MIB Structure |
| |
| IETF MIB Support | |
| SEHI MIB Structure | |
| A Brief Word About MIB Components and Community Names |
Index
iv