D-Link DFE-2616IX User Guide - Page 79

Per-Port Intrusion Security, Bridge Information

Page 79 highlights

Per-Port Intrusion Security Each port on this hub can have intrusion security enabled. Intrusion security prevents unauthorized individuals from accessing the network. Through the network management software, Ethernet addresses that represent authorized users can be assigned to each hub port. If a packet using a source address other than those used by authorized users is received by a port, the port is disabled and the network manager is notified. Bridge Information The bridge information screen allows the network administrator to view the install and operation status of all bridging modules within a segment. To avoid non-terminating network data loops, only one bridging module at a time can be active. The hub stack management software always enables the module installed in the highest hub in the stack. The management program can only test for the presence or absence of an installed bridge and not whether it is functional. Under the Bridge Present column, /A" indicates no bridging module present in that hub. Master Hub Setup and Management 67

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147

Master Hub Setup and Management
67
Per-Port Intrusion Security
Each port on this hub can have intrusion security enabled.
Intrusion security
prevents unauthorized individuals from accessing the network.
Through the
network management software, Ethernet addresses that represent authorized
users can be assigned to each hub port.
If a packet using a source address
other than those used by authorized users is received by a port, the port is
disabled and the network manager is notified.
Bridge Information
The bridge information screen allows the network administrator to view the
install and operation status of all bridging modules within a segment.
To
avoid non-terminating network data loops, only one bridging module at a
time can be active.
The hub stack management software always enables the
module installed in the highest hub in the stack.
The management program
can only test for the presence or absence of an installed bridge and not
whether it is functional.
Under the Bridge Present column,
/A” indicates
no bridging module present in that hub.