12-21
Traffic/Security Filters and Monitors
Configuring Traffic/Security Filters
For example, suppose you wanted to configure the filters in table 12-3 on a
switch. (For more on source-port filters, refer to “Configuring a Source-Port
Traffic Filter” on page 12-17.)
Table 12-3. Filter Example
The following commands configure the filters listed above:
Figure 12-15. Configuring Various Traffic/Security Filters
Filter Indexing
The switch automatically assigns each new filter to the lowest-available index
(IDX) number. The index numbers are included in the
show filter
command
described in the next section and are used with the
show filter <
index
>
command to display detailed information about a specific filter.
If there are no filters currently configured, and you create three filters in
succession, they will have index numbers 1 - 3. However, if you then delete
the filter using index number “2” and then configure two new filters, the first
new filter will receive the index number “2” and the second new filter will
receive the index number "4". This is because the index number “2” was made
vacant by the earlier deletion, and was therefore the lowest index number
available for the next new filter.
Filter Type
Filter Value
Action
Destination Ports
Source-Port
Inbound ports: 1, 2*
Drop
5
Multicast
010000-123456
Drop
10-12
Multicast
010000-224466
Drop
7-8
Protocol
Appletalk
Drop
18, 20-22
Protocol
ARP
Drop
3-4, 6
*Because the switch allows one inbound port in a source-port filter, the
requirement to filter ports 1 and 2 means you will configure two separate
source-port filters.
HP Switch(config)# filter source-port drop 5
HP Switch(config)# filter source-port drop 5
HP Switch(config)# filter multicast 010000-123456 drop e 10-12
HP Switch(config)# filter multicast 010000-224466 drop e 7-8
HP Switch(config)# filter protocol Appletalk drop e 18, 20-22
HP Switch(config)# filter protocol Arp drop e 3-4, 6
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......