332
Configuring port security
Overview
Port security combines and extends 802.1X and MAC authentication to provide MAC-based network
access control. It applies to networks that require different authentication methods for different users on
a port, such as a WLAN.
Port security prevents unauthorized access to a network by checking the source MAC address of inbound
traffic and prevents access to unauthorized devices by checking the destination MAC address of
outbound traffic.
Port security can control MAC address learning and authentication on a port to make sure the port learns
only source trusted MAC addresses.
A frame is illegal if its source MAC address cannot be learned in a port security mode or if it is from a
client that has failed 802.1X or MAC authentication. The port security feature automatically takes a
pre-defined action on illegal frames. This automatic mechanism enhances network security and reduces
the need for human intervention.
For scenarios that require only 802.1X authentication or MAC authentication, HP recommends that you
configure 802.1X authentication or MAC authentication rather than port security.
For more information about 802.1X and MAC authentication, see "
Configuring 802.1X
" and
"
Configuring MAC authentication
."
Port security features
Outbound restriction
The outbound restriction feature prevents traffic interception by checking the destination MAC addresses
in outbound frames. The feature guarantees that frames are sent only to devices that have passed
authentication or whose MAC addresses have been learned or configured on the access device.
Intrusion protection
The intrusion protection feature checks the source MAC addresses in inbound frames for illegal frames
and takes a pre-defined action on each detected illegal frames. The action can be one of the following:
disabling the port temporarily, disabling the port permanently, or blocking frames from the illegal MAC
address for 3 minutes (not user configurable).
Port security traps
You can configure the port security module to send traps for port security events such as login, logoff, and
MAC authentication. These traps help you monitor user behaviors.
Port security modes
Port security can be implemented using one of the following modes:
•
Basic mode
—A port can learn a specified number of MAC addresses and save those addresses as
secure MAC addresses. It permits only frames whose source MAC addresses are secure MAC
Summary of Contents for HP 830 Series
Page 37: ...25 Figure 18 Configuration complete ...
Page 70: ...58 Figure 49 Displaying the rate settings of ports ...
Page 78: ...66 Figure 56 Configuring the monitor port ...
Page 82: ...70 Figure 59 Switching to the management level ...
Page 87: ...75 Figure 64 Displaying port traffic statistics ...
Page 167: ...155 Figure 154 Displaying the current voice VLAN information ...
Page 304: ...292 Figure 280 Traceroute operation result ...
Page 321: ...309 Request timed out Ping statistics for 10 0 0 1 Packets Sent 4 Received 0 Lost 4 100 loss ...
Page 343: ...331 Figure 330 Ping operation summary ...