12-9
Traffic/Security Filters and Monitors
Filter Types and Operation
Defining and Configuring Example Named Source-Port Filters.
While
named source-port filters may be defined and configured in two steps, this is
not necessary. Here we define and configure each of the named source-port
filters for our example network in a single step.
Figure 12-5. Applying Example Named Source-Port Filters
Once the named source-port filters have been defined and configured we now
apply them to the switch ports.
Figure 12-6. Source Port Filters Applied to Switch Ports
The
show filter
command shows what ports have filters applied.
HP Switch(config)# filter source-port named-filter web-only drop 2-26
HP Switch(config)# filter source-port named-filter accounting drop 1-6,8,9,12-26
HP Switch(config)# filter source-port named-filter no-incoming-web drop 7,10,11
HP Switch(config)# show filter source-port
Traffic/Security Filters
Filter Name | Port List | Action
-------------------- + -------------------- + --------------------------
web-only | NOT USED | drop 2-26
accounting | NOT USED | drop 1-6,8-9,12-26
no-incoming-web | NOT USED | drop 7,10-11
HP Switch Switch 2626(config)#
Ports and port trunks using the
filter. When
NOT USED
is
displayed the named source-port
filter may be deleted.
Lists the ports
and port trunks
dropped by the
filter. Ports and
port trunks not
shown are
forwarded by the
filter.
To remove a port
or port trunk from
the list, update
the named
source-port filter
definition using
the
forward
option.
HP Switch(config)# filter source-port 2-6,8,9,12-26 named-filter web-only
HP Switch(config)# filter source-port 7,10,11 named-filter accounting
HP Switch(config)# filter source-port 1 named-filter no-incoming-web
HP Switch(config)#
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......