Additional Notes

E-2

Examples of Backup Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-3 How the Backup Function Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-3

Configuring a Backup Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-5 Configuration/Installation Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . E-5

Identifying the Backup Link

E-6

Indications of Backup Link Activation

E-6

Reactivating the Primary Link

E-7

F Security Information

Understanding Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-1

How Intruder Prevention Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-2

How Eavesdrop Prevention Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-2 Authorized MAC address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-2

Setting Inbound Security with Intruder Prevention . . . . . . . . . . . . . F-4 Auto Port Disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-5 Send Alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-5

Setting Outbound Security with Eavesdrop Prevention . . . . . . . . . . F-6

G Safety and Regulatory Statements

Mounting Precautions

G-1

Power Precautions

G-2

Safety Information

G-3

Informations concernant la sécurité

G-4

Hinweise zur Sicherheit

G-5

Considerazioni sulla sicurezza

G-6

Consideraciones sobre seguridad

G-7

Safety Information (Japanese)

G-8

Regulatory Statements

G-9

vii

Page 9
Image 9
HP J3188A manual Security Information, Vii