12-18
Traffic/Security Filters and Monitors
Configuring Traffic/Security Filters
Example of Creating a Source-Port Filter
For example, assume that you want to create a source-port filter that drops
all traffic received on port 5 with a destination of port trunk 1 (
Trk1
) and any
port in the range of port 10 to port 15. To create this filter you would execute
this command:
HP Switch(config)# filter source-port 5 drop trk1,10-15
Later, suppose you wanted to shift the destination port range for this filter up
by two ports; that is, to have the filter drop all traffic received on port 5 with
a destination of any port in the range of port 12 to port 17. (The
Trk1
destination
is already configured in the filter and can remain as-is.)With one command
you can restore forwarding to ports 10 and 11 while adding ports 16 and 17 to
the "drop" list:
HP Switch(config)# filter source-port 5 forward 10-11 drop
16-17
Configuring a Filter on a Port Trunk
This operation uses the same command as is used for configuring a filter on
an individual port. However, the configuration process requires two steps:
1.
Configure the port trunk.
2.
Configure a filter on the port trunk by using the trunk name (
trk1
,
trk2
,
...
trk6
) instead of a port name.
For example, to create a filter on port trunk 1 to drop traffic received inbound
for trunk 2 and ports 10-15:
HP Switch(config)# filter source-port trk1 drop trk2,10-
15
Note that if you first configure a filter on a port and then later add the port to
a trunk, the port remains configured for filtering
but the filtering action will
be suspended while the port is a member of the trunk
. That is, the trunk does
not adopt filtering from the port configuration. You must still explicitly
configure the filter on the port trunk. If you use the
show filter <
index
>
command for a filter created before the related source port was added to a
trunk, the port number appears between asterisks (
*
), indicating that the
filter action has been suspended for that filter. For example, if you create a
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......