Security Information

How Eavesdrop Prevention Works

Assigning the Authorized MAC address

You can assign an authorized MAC address by entering it manually at the hub console interface or at the network management station. Assigning a specific address provides the maximum control of the port’s authorized MAC address. The Intruder Prevention and Eavesdrop Prevention security that you have configured for that port is implemented as soon as the address is assigned.Learning the Authorized MAC address

You can set the hub to learn a port’s authorized MAC address automatically by using either a “first heard” or a “learn continuous” method. The method used to learn the authorized MAC address should be chosen based on the level of data security required on a port. In each case, the security configuration for that port is implemented when the port receives a packet from the attached device. It learns the device’s address from the source address field in the packet.

First-Heard Method. The “first heard” method automatically assigns the first address detected on the port as the authorized MAC address. This method is useful to quickly identify and authorize end users whose ports may require both Eavesdrop Prevention and Intruder Prevention. Under this method, the port will be disabled automatically if an intruder is detected on the port.

Learn-Continuous Method. The “learn continuous” method allows the hub to continuously update the authorized MAC address configured for a port. Each new device connected to the port becomes the new authorized device. This security method is useful for dynamic workgroups that experience frequent changes to end-user configuration and but require minimal data security protection. In the “learn continuous” mode, the port may be configured to provide the Eavesdrop Prevention data security and the send-alarm security violation notification. Under this method, the port will not be disabled if an intruder is detected.

Information Security

F-3