Source Addressing6-4Setting the Hash TypeSetting the Aging TimeThe source address list Aging Time determines the minimum amount of time aninactive source address will remain in the Source Address Table before it ispurged. The source address timer runs continuously beginning at the time thedevice is turned on; source addresses that are added to the SAT during one timercycle will remain in the table for the rest of the current cycle and at least throughthe next complete cycle. If no packets have been received from that addressduring one complete cycle, the address will be purged.The Aging Time is user-configurable, and can be set using the Aging Time textbox in the Source Address list window.To change the Aging Time:1. In the Source Address List window (Figure 6-2, page 6-3), highlight thedisplayed aging time.2. Enter your desired aging time in minutes; allowable range is 0 to 4320 (threedays).3. Click mouse button 1 on to save your change.The new Aging Time takes effect immediately.Setting the Hash TypeYou can increase the efficiency with which your EMM-E6 handles the SourceAddress Table by selecting the appropriate hashing algorithm. If you areoperating in a DECnet environment, or one which incorporates some DECnetelements, select the DEC hashing algorithm; if your network contains no DECnetelements (or at least none operating on the same network segment as yourEMM-E6), select the non-DEC hashing algorithm. Making the wrong selectionwon’t do any damage, but making the correct selection will optimizeperformance.To set the Hash Type for a repeater interface, or channel:1. In the Repeater Source Address window, click mouse button 1 on the repeaterinterface for which you would like to set the hash type.NOTEThe snapshots of the Source Address List that you can obtain via this feature do not reflectthe current port security status of the SAT — that is, when Source Address Locking isenabled, you can still observe addresses being aged out of the table and new addressesbeing added as you refresh the Source Address List displayed in this window. However,the EMM-E6 remembers the addresses that were in the table when locking was enabled,and will continue to protect locked ports from access by unauthorized sources. For moreinformation, see Locking Source Addresses, page 6-5.