14-4
Configuring and Monitoring Port Security
Port Security
Feature Interactions When Eavesdrop Prevention is Disabled
The following table explains the various interactions between learning modes
and Eavesdrop Prevention when Eavesdrop Prevention is disabled.
N o t e
When the learning mode is “port-access”, Eavesdrop Prevention will not be
applied to the port. However, it can still be configured or disabled for the port.
.
Learn Mode
Effect
Static
When Eavesdrop Prevention is disabled, the port transmits packets that have
unknown destination addresses. The port is secured and only a limited number
of static MAC addresses are learned. A device
must
generate traffic before the
MAC address is learned and traffic is forwarded to it.
Continuous
The default. The Eavesdrop Prevention option does not apply because port
security is disabled. Ports forward traffic with unknown destination addresses
normally.
Port-access
Disabling Eavesdrop Prevention is not applied to the port. There is no change.
Limited-continuous
When Eavesdrop Prevention is disabled, the port transmits packets that have
unknown destination addresses. The port is secured; MAC addresses age
normally. Eavesdrop Prevention may cause difficulties in learning MAC
addresses (as with static MAC addresses) and cause serious traffic issues
when a MAC ages out.
Configured
When Eavesdrop Prevention is disabled, the port transmits packets that have
unknown destination addresses. The port is secured by a static MAC address.
Eavesdrop Prevention should not cause any issues because all valid MAC
addresses have been configured.
Syntax
[no] port-security <
port-list
> eavesdrop-prevention
When this option is enabled, the port is prevented from
transmitting packets that have unknown destination
addresses. Only devices attached to the port receive packets
intended for them. This option does not apply to a learning
mode of
port-access
or
continuous
.
Default: Enabled
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......