Ring Security Configuration

!

CAUTION

manually (by entering the address of a disallowed station), or by moving an entry from the Allowed List. You can also restore a station from the Disallowed List to the Allowed List, if desired.

Once Security has been configured and enabled, the TRMMIM acts as the Ring Security Monitor and provides security for the entire ring.

The Token Ring Security application is intended to be used by a knowledgeable network administrator. In the hands of an inexperienced user, it could severely impact your network by creating beaconing conditions on the ring. The Security application posts confirmation messages to forestall any indiscriminate actions; however, you should still use care when running the application.

We also recommend that you configure and enable security on only one device per ring, to reduce the possibility of conflicting security information on the network.

Launching the Security Configuration Window

To launch the security application

from the icon:

1.Click on the appropriate TRMMIM icon to display the icon menu.

2.Drag down to Security and release.

from the Hub View:

1.Click on to display the Device menu.

2.Drag down to Security and release.

from the command line (stand-alone mode):

1.From the appropriate directory, type:

spmarun e5sec <IP Address> <community name>

6-2

Launching the Security Configuration Window

Page 104
Image 104
Cabletron Systems TRMMIM manual Launching the Security Configuration Window, Ring Security Configuration