
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4-15
Netelligent 2008/2016 10Base-T Repeater User Guide
Writer:
Chris Seiter
Project:
Netelligent 2008/2016 10Base-T Repeater User Guide
Comments:
185814-003
File Name:
2000_4.doc
Last Saved On:
8/21/96 10:42 AM
Intrusion Protection
Firmware v1.30 supports intrusion protection, which provides a method of
preventing unauthorized access to the network. Intrusion protection allows any
SNMP manager to configure one MAC address per port and to enable or
disable intrusion protection on a per port basis.
NOTE
: Do not set intrusion protection on an uplink port that receives multiple MAC
addresses. Otherwise, the repeater disables the port.
Follow these steps to enable intrusion protection for a port:
1. Use an SNMP MIB browser to set the authorized MAC address in the
nw2IntrusionPortMACAddress or nw2IntrusionPortMACAddressStr
MIB variable.
2. Set the nw2IntrusionPortStatus MIB variable to enable(2).
Once you configure intrusion for a port, the repeater's firmware monitors the
port for intruders. If the port detects an unauthorized MAC address, the repeater
partitions the port, i.e., sets nw2IntrusionPortStatus to tripped(3)and generates a
Novell Health State trap in the trap table. To restore the port after it detects an
intruder, use an SNMP manager to set the rptrBasPortAdminState MIB variable
(located in the Novell MIB) to enable(2).
Changing the Status of a Port
The SNMP manager lets you change the intrusion status of a port via the
nw2IntrusionPortStatus MIB variable. To do so, verify that the
nw2SecurityStatus MIB variable is set to disable(1). Then set the
nw2IntrusionPortStatus MIB variable to disable(1), enable(2), or tripped(3).
NOTE
: If the SNMP manager tries to change the settings of nw2IntrusionPortStatus
when nw2SecurityStatus is set to enable(2), a PDU error occurs.