1-7
Security Overview
Network Security Features
Network Security Features
This section outlines features and defence mechanisms for protecting access
through the switch to the network. For more detailed information, see the
indicated chapters.
Table 1-2.
Network Security—Default Settings and Security Guidelines
Feature
Default
Setting
Security Guidelines
More Information and
Configuration Details
Secure File
Transfers
not
applicable
Secure Copy and SFTP provide a secure alternative to
TFTP and auto-TFTP for transferring sensitive
information such as configuration files and log
information between the switch and other devices.
Management and
Configuration Guide,
Appendix A “File Transfers”
,
refer to the section
“Using
Secure Copy and SFTP”
USB Autorun
enabled
(disabled
once a
password
has been set)
Used in conjunction with HP E-PCM Plus, this feature
allows diagnosis and automated updates to the switch
via the USB flash drive. When enabled in secure mode,
this is done with secure credentials to prevent
tampering. Note that the USB Autorun feature is
disabled automatically, once a password has been set
on the switch.
Management and
Configuration Guide,
Appendix A “File Transfers”
,
refer to the section
“USB
Autorun”
Traffic/Security
Filters
none
These statically configured filters enhance in-band
security (and improve control over access to network
resources) by forwarding or dropping inbound network
traffic according to the configured criteria. Filter options
include:
•
source-port filters
: Inbound traffic from a
designated, physical source-port will be forwarded
or dropped on a per-port (destination) basis.
•
multicast filters
: Inbound traffic having a specified
multicast MAC address will be forwarded to
outbound ports or dropped on a per-port (destination)
basis.
•
protocol filters
: Inbound traffic having the selected
frame (protocol) type will be forwarded or dropped
on a per-port (destination) basis.
Chapter 12, “Traffic/Security
Filters and Monitors”
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......