![HP HP ProCurve Series 6600 Access Security Manual Download Page 590](http://html.mh-extra.com/html/hp/hp-procurve-series-6600/hp-procurve-series-6600_access-security-manual_163101590.webp)
12-2
Traffic/Security Filters and Monitors
Introduction
Introduction
You can enhance in-band security and improve control over access to network
resources by configuring static filters to forward (the default action) or drop
unwanted traffic. That is, you can configure a traffic filter to either forward
or drop all network traffic moving to outbound (destination) ports and trunks
(if any) on the switch.
Filter Limits
The switch accepts up to 101 static filters. These limitations apply:
■
Source-port filters: up to 78
■
Multicast filters: up to 16 with 1024 or fewer VLANs configured. Up to 8
with more than 1024 VLANs configured.
■
Protocol filters: up to 7
Using Port Trunks with Filters
The switch manages a port trunk as a single source or destination for source-
port filtering. If you configure a port for filtering before adding it to a port
trunk, the port retains the filter configuration, but suspends the filtering action
while a member of the trunk. If you want a trunk to perform filtering, first
configure the trunk, then configure the trunk for filtering. Refer to “Config-
uring a Filter on a Port Trunk” on page 12-18.
Feature
Default
Menu
CLI
WebAgent
configure source-port filters
none
n/a
n/a
configure protocol filters
none
n/a
n/a
configure multicast filters
none
n/a
n/a
display filter data
n/a
n/a
n/a
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......