Ring Security Configuration

Figure 6-2. The Security Config Window

The Security Config window is where you actually configure security for the selected ring; it contains the following information:

Allowed Station List

This list box displays the MAC address of each station in the ring security Allowed List database — that is, those that have security authorization to enter the selected ring. This database is maintained in the TRMMIM itself.

Note that the current Active Monitor will be indicated by an asterisk (*) next to its MAC address. The Active Monitor cannot be removed from the Allowed List.

Allowed Count

This field shows the number of stations currently on the Allowed List. The allowed range is from 1-250 stations.

Disallowed Station List

This list box displays the station MAC address entries in the Disallowed List database — all those addresses which have been removed from the Allowed List, plus any additional addresses which have been added manually. This database is stored on your network management station.

Disallowed Count

This field shows the number of stations currently on the Disallowed List.

6-4

Launching the Security Configuration Window

Page 106
Image 106
Cabletron Systems TRMMIM manual Allowed Station List, Allowed Count, Disallowed Station List, Disallowed Count