Ring Security Configuration
6-2
Launching the Security Configuration Window
manually (by entering the address of a disallowed station), or by moving an entry
from the Allowed List. You can also restore a station from the Disallowed List to
the Allowed List, if desired.
Once Security has been configured and enabled, the TRMMIM acts as the Ring
Security Monitor and provides security for the entire ring.
Launching the Security Configuration Window
To launch the security application
from the icon:
1.
Click on the appropriate TRMMIM icon to display the icon menu.
2.
Drag down to Security and release.
from the Hub View:
1.
Click on
to display the Device menu.
2.
Drag down to Security and release.
from the command line (stand-alone mode):
1.
From the appropriate directory, type:
spmarun e5sec <IP Address> <community name>
!
CAUTION
The Token Ring Security application is intended to be used by a knowledgeable network
administrator. In the hands of an inexperienced user, it could severely impact your
network by creating beaconing conditions on the ring. The Security application posts
confirmation messages to forestall any indiscriminate actions; however, you should still
use care when running the application.
We also recommend that you configure and enable security on only one device per ring, to
reduce the possibility of conflicting security information on the network.
Содержание SPECTRUM TRMMIM
Страница 1: ...Portable Management Application for the TRMMIM User s Guide The Complete Networking Solution ...
Страница 2: ......
Страница 8: ...Contents vi ...
Страница 16: ...Introduction to SPMA for the TRMMIM 1 8 TRMMIM Firmware ...
Страница 90: ...Alarm Configuration 4 10 Setting and Viewing Station Alarms ...
Страница 102: ...Statistics 5 12 Ring and Station Variables ...