Specifications
9031012 E6 Device View
2-13
Security Configuration
Port Source Address List
Port Source Address List
The Port Source Address List contains the MAC address and its associated
vendor name for each device communicating through a specific port on the
SEHI or hubstack. You can access this view by highlighting the Logical
Module Port Icon (refer to Figure 2-3), or single-clicking on the Logical Module
Port Icon with the right mouse button, and selecting Port Source Address
from the Icon Subviews menu. For more information on this view, refer to
Chapter 2, Using the SEHI Hub View, of the SPECTRUM Portable
Management Application for the SEHI-22/24 and SEHI-32/34.
Security Configuration
The Security Configuration feature allows you to establish security for a
designated repeater channel and the ports associated with that channel on
LANVIEWSecure (designated by the letter S at the end of the model name,
e.g., SEHI-32S) SEHI models. These Device View security features, accessed
by choosing Security Configuration from the Stack and/or Port Icon menus,
are based on SPECTRUM Portable Management Application (SPMA)
functionality. For more detailed information about how to use the SPMA
security windows, refer to Chapter 6, Security, of the SPECTRUM Portable
Management Application for the SEHI-22/24 and SEHI-32/34.
The security feature prevents any new source address from accessing the
ports connected to the selected repeater channel. When a new source address
attempts to access a port, that source address is compared to the source
addresses in that port’s source address table. For a station port (a port
detecting zero or one source addresses at the time locking was enabled), if the
accessing source address is not found in the table, the port will automatically
shut down.
For a trunk port (a port detecting two or more source addresses at the time
locking was enabled), there is no port shut down security feature. If port
locking is enabled, network traffic will continue to be allowed to pass.
Any unlinked station or trunk port will also shut down once locking is
enabled, since their source address tables are empty.
While locking is enabled, each port’s topology status (station or trunk)
remains fixed and will not change regardless of any changes in the number of
source addresses detected.










