Appeal 2007-1276 Application 10/001,446 feature group address" that is reserved for LAN security features. (Col. 2, ll. 60-65.) 3. In a discovery phase, the managed hub of Holloway determines the interconnect devices (such as switches, bridges, and routers) in the network that are capable of supporting the LAN security feature and builds a table of those interconnect devices. (Col. 2, l. 66 to col. 3, l. 4; col. 3, ll. 25-28.) The managed hub maintains a list of authorized Media Access Control (MAC) addresses for each of its ports. (Col. 3, ll. 4-6.) In a detection phase, the managed hub compares the MAC addresses on each port against the list of authorized MAC addresses in order to detect a security breach. (Col. 3, ll. 34-36.) The code to implement the discovery and detection phases runs within the managed hub. (Col. 9, ll. 33-36; col. 11, ll. 30-32.) 4. If the managed hub detects an unauthorized station connecting to the LAN, it disables the port and transmits a "security breach detected frame" to the LAN security feature group address. (Col. 3, ll. 6-9, 36- 40.) When a LAN interconnection device receives the security breach detected frame, it sets up a filter for the intruding MAC address and forwards the security breach detected frame to other LAN segments attached to the interconnection device. (Col. 3, ll. 9-17, 42-49.) 5. Holloway teaches that a network management station can monitor the progress of the security breach detected frame though information that it receives in "trap frames" from the managed hub and the 5Page: Previous 1 2 3 4 5 6 7 8 9 10 11 Next
Last modified: September 9, 2013