6
-
4
C
H
A
P
T
E
R
6:
I
N
T
R
O
D
U
C
T
I
O
N
T
O
E
T
H
E
R
N
E
T
M
A
N
A
G
E
M
E
N
T
DUA1850-0AAA0
5
CAUTION:
If you are installing the system for the first time and, if you
intend to use the remaining ports on a module with the link set to
‘disable on power-up’, you will need to enable them individually via the
Network Manager.
S
ecurity may be set up at the same time as Resilience, but only using a
network manager.
Port Security
Network security is a prime concern today. There is a need to detect
and block any attempt by an unauthorized party to access your
network, and copy and manipulate your data. Using a Transcend
Network Manager, you may set ports to be secure at critical points in
your network. In this way you create a series of ‘security gates’ to
prevent the invader from accessing the rest of the network.
LAN Security Architecture (LSA) is controlled overall by the
management module, but detail is available only to SNMP
management applications such as the Transcend range. LSA allows only
frames intended for a specified station to be received by that station.
All other stations receive corrupted frames. This is in addition to the
password protection and different access levels which are built into the
management system.
One security element is the provision of ‘Need to Know’ (NTK) filtering.
A repeater examines each frame to check the destination address
against its authorized station database for that port. Any unauthorized
station attached to its ports will receive the frame, but in a deliberately
corrupted form. Only authorized stations will receive the true frame.
You have the option of examining incoming frames. If you enable this
function from your management application, these are checked for
source address. If the source address is not found in the authorized
table, the source port will be disabled (Disconnect Unauthorized Device
— DUD) and a trap will be sent to the network manager.
NTK and DUD are available on secure repeater modules.
Содержание LINKBUILDER 3C18500
Страница 1: ...LINKBUILDER MSH MANAGEMENT MODULE 3C18500 USER GUIDE Part No DUA1850 0AAA05 Published January 1996 ...
Страница 11: ...I GENERAL INFORMATION ...
Страница 12: ......
Страница 20: ...1 8 CHAPTER 1 ABOUT THIS GUIDE DUA1850 0AAA05 ...
Страница 21: ...2 OVERVIEW This chapter tells you The functions of the management module The ways to manage the MSH chassis ...
Страница 47: ...II CHASSIS MANAGEMENT ...
Страница 48: ......
Страница 57: ...Searching the Menus 4 9 DUA1850 0AAA05 Figure 4 8 Chassis Environment Menu ...
Страница 58: ...4 10 CHAPTER 4 MANAGING THE CHASSIS USING THE DISPLAY PANEL DUA1850 0AAA05 ...
Страница 95: ...III ETHERNET MANAGEMENT ...
Страница 96: ......
Страница 130: ...8 20 CHAPTER 8 MANAGING 802 3 REPEATERS USING THE VT100 INTERFACE DUA1850 0AAA05 ...
Страница 131: ...IV TOKEN RING MANAGEMENT ...
Страница 132: ......
Страница 157: ...Introduction 10 3 DUA1850 0AAA05 Figure 10 1 Display Panel Token Ring Service Menu ...
Страница 164: ...10 10 CHAPTER 10 MANAGING TOKEN RINGS USING THE DISPLAY PANEL DUA1850 0AAA05 ...
Страница 187: ...V HIGH SPEED DEVICE MANAGEMENT ...
Страница 188: ......
Страница 193: ...VI APPENDICES ...
Страница 194: ......
Страница 208: ...C 6 APPENDIX C TECHNICAL SUPPORT DUA1850 0AAA05 ...
Страница 232: ...E 12 APPENDIX E INDEX OF MANAGEMENT ACTIONS AND DATA DUA1850 0AAA05 ...