IBM manual Configuring the Security Module, 8260A set module 7.2 network ethernet3

Models: 8260

1 354
Download 354 pages 1.89 Kb
Page 146
Image 146

The entire process of eavesdropping protection takes 32 bit-times from the time the E-SEC card receives the destination address field in the packet.

7.11.2 Configuring the Security Module

To be able to use the security module you must perform the following steps:

1.Assign the security module to the backplane segment on which you want to use the security feature. The following command is an example of how to assign the security card, which is mounted on our 10-port 10Base-F module which is installed in slot 7, to Ethernet_3 segment:

8260A> set module 7.2 network ethernet_3

2.Use the following command to display the current security settings for your network:

8260A> show security network ethernet_3

This command is necessary to determine the settings of various security parameters in your network. Figure 77 shows the default security settings when you first install the E-SEC module in your hub and assign it to a segment.

 

￿

 

 

 

 

￿

 

8260A> show security network ethernet_3

 

 

 

 

 

 

 

 

 

 

 

 

 

 

ETHERNET_3 Network Security Configuration

 

 

 

 

-------------------------------------------------------------------------------

 

 

 

 

Securing Module:

Slot 07.02 Version v1.00

 

 

 

 

 

 

E-SEC: Ethernet Private Line Card

 

 

 

 

 

Operational Mode

DISABLED

 

 

 

 

 

 

Administrative Mode

DISABLED

 

 

 

 

 

 

Auto-learning:

ENABLED

 

 

 

 

 

 

Eavesdrop Protection:

DISABLED

 

 

 

 

 

 

Intruder Detection:

 

Intruder Actions:

 

 

 

 

 

Source Address Checking:

DISABLED

Intruder Jamming:

DISABLED

 

 

 

Source Port Checking:

DISABLED

Intruder Reporting:

DISABLED

 

 

 

 

 

Intruder Port Disabling:

DISABLED

 

 

 

8260A>

 

 

 

 

 

 

￿

 

 

 

 

￿

 

 

 

 

 

 

Figure 77. Default Security Settings

3.Build the network security address table so it contains information about all the stations which are authorized to access your network and their corresponding port. The network security address table can be built automatically and/or manually. We recommend the following procedure to build this table:

a.Build the initial table using the auto-learning feature of the E-SEC module. To do so, you must do the following:

Enable auto-learning feature for each port on which you want the

E-SEC card to learn the MAC addresses automatically. You can use the following example for each port:

8260A> set security port 2.15 auto-learning enable

124 8260 Multiprotocol Intelligent Switching Hub

Page 146
Image 146
IBM Configuring the Security Module, 8260A set module 7.2 network ethernet3, 8260A show security network ethernet3

8260 specifications

The IBM 8260 is a significant entry in the realm of enterprise servers, recognized for its performance, scalability, and robust features designed to cater to demanding business environments. It primarily serves as a high-capacity server for large organizations, capable of handling extensive workloads and complex applications without compromising speed or efficiency.

One of the standout features of the IBM 8260 is its powerful processing capabilities. It typically comes equipped with multiple processor units based on the IBM POWER architecture, which is renowned for its high-performance computing. This architecture allows the server to execute numerous simultaneous tasks, making it ideal for environments that require multitasking and high throughput.

Memory capacity is another key characteristic of the IBM 8260. Depending on the specific configuration, it can support substantial amounts of RAM, ensuring that applications can run effectively without the bottlenecks often associated with data-intensive tasks. This is crucial for enterprises that rely on real-time data analytics, large database management, and resource-heavy applications.

In terms of storage, the IBM 8260 offers flexible options. It supports a variety of storage solutions, including solid-state drives (SSDs) and traditional hard drives, catering to different performance and capacity needs. This scalability in storage helps organizations manage their data effectively while ensuring quick access and retrieval times.

Connectivity is also a prominent feature of the IBM 8260. The server includes advanced networking capabilities, supporting various protocols and technologies that facilitate fast data transfer and communication between devices. This enhances overall network performance, essential for businesses that depend on cloud computing and distributed computing environments.

Additionally, the IBM 8260 is designed with a focus on reliability and availability. It incorporates redundant components, such as power supplies and cooling systems, minimizing the risk of downtime. This is critically important for enterprises that require continuous availability of services.

The server’s management features are also noteworthy. IBM provides a suite of management tools that allow IT administrators to monitor performance, configure hardware settings, and troubleshoot issues seamlessly. This ease of management is bolstered by automation capabilities, enabling organizations to enhance operational efficiency.

In conclusion, the IBM 8260 stands out in the competitive server landscape due to its high processing power, extensive memory and storage options, advanced connectivity, reliability features, and robust management tools. Such attributes make it a viable choice for organizations seeking to enhance their IT infrastructure and streamline their operations effectively.