Network Cables User Manual

Contents
iv
Chapter 3 Alarm Configuration
Using Alarm Configuration.........................................................................................3-2
Configuring Alarms...............................................................................................3-3
Setting Repeater Alarms...............................................................................................3-4
Setting and Changing Alarms..............................................................................3-5
Setting Module and Port Alarms................................................................................3-6
Setting Module Alarms.........................................................................................3-6
Setting Port Alarms................................................................................................3-8
Chapter 4 Link/Seg Traps
What is a Segmentation Trap?.....................................................................................4-1
What is a Link Trap?.....................................................................................................4-2
Enabling and Disabling Link/Seg Traps ...................................................................4-2
Configuring Link/Seg Traps for the Repeater...................................................4-4
Viewing and Configuring Link/Seg Traps for Hub Modules.........................4-4
Viewing and Configuring Link/Seg Traps for Ports ........................................4-6
Chapter 5 Repeater Redundancy
Setting Network Circuit Redundancy........................................................................5-1
Configuring a Redundant Circuit........................................................................5-2
Monitoring Redundancy..............................................................................................5-6
Chapter 6 Source Addressing
Displaying the Source Address List............................................................................6-1
Setting the Aging Time..........................................................................................6-4
Setting the Hash Type...................................................................................................6-4
Locking Source Addresses...........................................................................................6-5
Source Address Locking on Older Devices........................................................6-6
Configuring Source Address Traps.............................................................................6-7
Repeater-level Traps..............................................................................................6-8
Module- and Port-level Traps...............................................................................6-9
Finding a Source Address..........................................................................................6-11
Chapter 7 Security
What is LANVIEWsecure?...........................................................................................7-2
The Newest LANVIEWsecure Features..............................................................7-4
Security on Non-LANVIEWsecure MIMs..........................................................7-5
Configuring Security.....................................................................................................7-6
Boards with Multiple Caches.............................................................................7-10
Resetting Learned Addresses.............................................................................7-11
Tips for Successfully Implementing Eavesdropper Protection.....................7-11