1-3
Force Trunk Port
The user may force the port to be a trunk port before locking the port. When this object is set to “Force” it
causes the port to be placed into a Trunk topological state whether the network traffic warrants such a state or
not. When this object is set to “NoForce” it allows the port to assume the topological state it naturally assumes
based on the network activity on that port. When read, this object reports the current setting. When the port is
in the Trunk state, either forced or natural, this does not send a new source address trap or an aged source
address trap.
NOTE
: Prior to having secure state, the topological state of a port (station or trunk) was used for purposes of
determining whether a port was capable of being secure. The topological state of a port no longer has any
bearing on security. In fact, the only thing that the topological state affects, is whether traps are sent out for
new and aged addresses. If the port is a trunk port, traps are not sent out at all. Topological state is determined
by the traffic or it can be forced into a trunk state by selecting the Force Trunk OID. If a port sees more than
three addresses for an aging time, or exactly three addresses for consecutive aging times, then it becomes a
trunk port. This applies to both
LANVIEW
SECURE
products and regular, non-secure products.
Adding/Deleting Secure Addresses
Through the use of the appropriate OIDs, addresses can be added to or deleted from the secure address list.
When adding addresses to a port that has never been locked, it is important to note that any learned addresses
are deleted and replaced with the manually entered addresses. If the port is locked or was once locked, then all
addresses remain in the secure list and the new addresses are added to the list.
1.2.3 New Features of Second Generation Security
Full Security (Eavesdrop Protection)
When the Full Security feature is enabled, the data portions of data packets not intended for this destination,
including broadcast and multicast, are scrambled. When the Full Security feature is disabled, broadcast and
multicast packets are transmitted unchanged, regardless of what is contained in the secure address list. The
default condition is disabled.
Continuous Learn Mode
This allows a port to continuously learn source addresses. Network administrators now have the versatility to
move stations from port to port without manually adding and deleting source addresses. This benefits
customers who are constantly conducting adds, moves, and changes to their physical network environment. To
configure a port, port group, or network for Continuous Learn Mode, use the Learn Mode object. Once
configured, the port, port group, or network has the ability to learn the source address of the last packet to be
transmitted on the port. Scrambling, however, is still done on any packets not destined for this port (Eavesdrop
Protection).
This object can be set whether the port is locked or unlocked. Upon setting to Continuous Learn, all addresses
on the port are deleted, and then the next address seen is put in the security list. If the port is locked, it secures
on the latest address, and performs destination security on that one address (scramble packets not destined for
the port). The drawback to this mode is that there is no intruder protection (source address security) on the port.
Once an intruder sends a packet, it becomes the valid address on the port.
The Learn mode object can be set regardless of whether the port is in the Secure state or Non-Secure state.
However, the port only learns addresses when it is in the Secure state.
A port that is set to Continuous Learn is put into a state of Learn. Ports in Continuous Learn Mode do not
restore any addresses when “Hot-swapped”, reset, etc. In Continuous Learn Mode, the secure addresses are not
stored in NVRAM; however, the configuration of being in Continuous Learn Mode is stored.