7.The following actions can be performed by the E-SEC card in case of intruder detection:

a.Report intrusions by logging information about the intrusion in the intruder table. To enable intruder reporting, you must issue the following command:

8260A> set security network ethernet_3 intruder_reporting enable

Note: When you enable intruder reporting only, the intruder will still be able to send data on the network, but an entry will be logged in the intruder table to report the intrusion. You can look at the contents of the intruder table using the following command:

8260A> show security intruder_table chronological

An example of the resulting display is shown in Figure 79.

￿

￿

8260A> show security intruder_table Enter sort by:

8260A> show security intruder_table chronological

 

Security Intruder Table

 

 

 

 

 

 

 

 

Port

Mac Address

Network

Attempts

Time Since Intrusion

----

-----------

-------

--------

-------------------

 

02.16

10-00-5a-82-5a-6a ETHERNET_3

19

0d

21h

15m

43s

02.15

10-00-5a-d4-b0-8c ETHERNET_3

2

0d

21h

28m

10s

 

8260A>

 

 

 

 

 

 

 

￿

 

 

 

 

 

 

 

 

￿

Figure

79. Ethernet Security Intruder Table

 

 

 

 

 

Note: The intruder table is stored by DMM but not in non-volatile RAM. Therefore, the contents of the intruder table will be lost after a reset of DMM.

b. Jam intruder packets by issuing the following commands in the intruder table. To enable intruder jamming, you must issue the following command:

8260A> set security network ethernet_3 intruder_jamming enable

Note: This option will jam any packets sent by the intruders. But, the intruder will still be allowed to attempt to send packets on the network.

c.Disable ports on which an intruder is detected using the following example:

8260A> set security network ethernet_3 intruder_port_disabling enable

As a result of this option, any port on which an intruder is detected will be disabled automatically, so the intruder will not be allowed to send any other packets on the network.

To enable transmission of data on the disabled ports, the network administrator must enable the port using DMM commands.

8.You may enable failsafe for individual ports attached to a secure network. This parameter instructs the media modules connected to a secure network to expect a security message from the E-SEC card for each transmitted packet. If a security message is not transmitted to the media module, the media module will automatically jam the ports for which the failsafe feature

Chapter 7. 8260 Ethernet Modules 127

Page 149
Image 149
IBM 8260A set security network ethernet3 intruderjamming enable, An example of the resulting display is shown in Figure

8260 specifications

The IBM 8260 is a significant entry in the realm of enterprise servers, recognized for its performance, scalability, and robust features designed to cater to demanding business environments. It primarily serves as a high-capacity server for large organizations, capable of handling extensive workloads and complex applications without compromising speed or efficiency.

One of the standout features of the IBM 8260 is its powerful processing capabilities. It typically comes equipped with multiple processor units based on the IBM POWER architecture, which is renowned for its high-performance computing. This architecture allows the server to execute numerous simultaneous tasks, making it ideal for environments that require multitasking and high throughput.

Memory capacity is another key characteristic of the IBM 8260. Depending on the specific configuration, it can support substantial amounts of RAM, ensuring that applications can run effectively without the bottlenecks often associated with data-intensive tasks. This is crucial for enterprises that rely on real-time data analytics, large database management, and resource-heavy applications.

In terms of storage, the IBM 8260 offers flexible options. It supports a variety of storage solutions, including solid-state drives (SSDs) and traditional hard drives, catering to different performance and capacity needs. This scalability in storage helps organizations manage their data effectively while ensuring quick access and retrieval times.

Connectivity is also a prominent feature of the IBM 8260. The server includes advanced networking capabilities, supporting various protocols and technologies that facilitate fast data transfer and communication between devices. This enhances overall network performance, essential for businesses that depend on cloud computing and distributed computing environments.

Additionally, the IBM 8260 is designed with a focus on reliability and availability. It incorporates redundant components, such as power supplies and cooling systems, minimizing the risk of downtime. This is critically important for enterprises that require continuous availability of services.

The server’s management features are also noteworthy. IBM provides a suite of management tools that allow IT administrators to monitor performance, configure hardware settings, and troubleshoot issues seamlessly. This ease of management is bolstered by automation capabilities, enabling organizations to enhance operational efficiency.

In conclusion, the IBM 8260 stands out in the competitive server landscape due to its high processing power, extensive memory and storage options, advanced connectivity, reliability features, and robust management tools. Such attributes make it a viable choice for organizations seeking to enhance their IT infrastructure and streamline their operations effectively.