Managing Ethernet MicroLAN Switches

A lockStatusChanged trap is generated when the ports in the hub are locked or unlocked using the Lock/Unlock Ports option on the Repeater menus; the interesting information is the new lock status.

PortSecurityViolation and portViolationReset traps are sent in response to changes related to port locking: if ports are locked, the portSecurityViolation trap indicates that a new source address has attempted access on one of the ports, and the ports are being shut down in response; the interesting information is the module and port index, and the violating address. PortViolationReset traps are sent when management intervention has re-enabled a port or ports previously disabled in response to a port security violation; the interesting information is module and port index.

Configuring Traps

The current status (enabled or disabled) for Link State, Segmentation, and Source Address traps will always be displayed in the port-level Trap Selection window. The repeater- and board-level windows will display current settings if they are uniform; where settings are not uniform at the selected level, the corresponding check box will be gray.

When you configure traps, keep in mind the hierarchy of levels at which you are setting traps; for the Ethernet MicroLAN Switch, traps set at the repeater or board level will override current port-level settings for all ports on that repeater channel.

When you are setting repeater- or module-level traps, we recommend that you leave the

TIP gray “No SET” status untouched (especially for Source Addressing Traps) unless you are sure you want to override port-level settings. With no incoming traps to inform you of a port security violation, you may have ports that are disabled on your device for no obvious reason.

To enable or disable the above-described traps:

1.Open the appropriate Trap Selection window.

2.Click on the check box next to the desired trap: Link State, Segmentation, or Source Address.

An empty check box indicates that the corresponding trap is disabled; A checked box indicates that the corresponding trap is enabled;

A check box that remains gray indicates that the associated trap will not be set (to either enabled or disabled), and the current mode of mixed settings at the port level will be maintained.

Trap Selection

5-23

Page 151
Image 151
Enterasys Networks 2000 manual Configuring Traps

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.