Cabletron Systems TRMMIM Power Roller User Manual


 
Ring Security Configuration
6-4 Launching the Security Configuration Window
Figure 6-2. The Security Config Window
The Security Config window is where you actually configure security for the
selected ring; it contains the following information:
Allowed Station List
This list box displays the MAC address of each station in the ring security
Allowed List database — that is, those that have security authorization to enter
the selected ring. This database is maintained in the TRMMIM itself.
Note that the current Active Monitor will be indicated by an asterisk (*) next to its
MAC address. The Active Monitor cannot be removed from the Allowed List.
Allowed Count
This field shows the number of stations currently on the Allowed List. The
allowed range is from 1-250 stations.
Disallowed Station List
This list box displays the station MAC address entries in the Disallowed List
database — all those addresses which have been removed from the Allowed List,
plus any additional addresses which have been added manually. This database is
stored on your network management station.
Disallowed Count
This field shows the number of stations currently on the Disallowed List.