ContentsivChapter 3 Alarm ConfigurationUsing Alarm Configuration ......................................................................................... 3-2Configuring Alarms............................................................................................... 3-3Setting Repeater Alarms............................................................................................... 3-4Setting and Changing Alarms .............................................................................. 3-5Setting Module and Port Alarms ................................................................................ 3-6Setting Module Alarms ......................................................................................... 3-6Setting Port Alarms................................................................................................ 3-8Chapter 4 Link/Seg TrapsWhat is a Segmentation Trap? ..................................................................................... 4-1What is a Link Trap? ..................................................................................................... 4-2Enabling and Disabling Link/Seg Traps ................................................................... 4-2Configuring Link/Seg Traps for the Repeater................................................... 4-4Viewing and Configuring Link/Seg Traps for Hub Modules ......................... 4-4Viewing and Configuring Link/Seg Traps for Ports ........................................ 4-6Chapter 5 Repeater RedundancySetting Network Circuit Redundancy........................................................................ 5-1Configuring a Redundant Circuit........................................................................ 5-2Monitoring Redundancy .............................................................................................. 5-6Chapter 6 Source AddressingDisplaying the Source Address List............................................................................ 6-1Setting the Aging Time.......................................................................................... 6-4Setting the Hash Type................................................................................................... 6-4Locking Source Addresses ........................................................................................... 6-5Source Address Locking on Older Devices ........................................................ 6-6Configuring Source Address Traps............................................................................. 6-7Repeater-level Traps .............................................................................................. 6-8Module- and Port-level Traps............................................................................... 6-9Finding a Source Address .......................................................................................... 6-11Chapter 7 SecurityWhat is LANVIEWsecure?........................................................................................... 7-2The Newest LANVIEWsecure Features.............................................................. 7-4Security on Non-LANVIEWsecure MIMs .......................................................... 7-5Configuring Security..................................................................................................... 7-6Boards with Multiple Caches ............................................................................. 7-10Resetting Learned Addresses ............................................................................. 7-11Tips for Successfully Implementing Eavesdropper Protection ..................... 7-11