12-19
Traffic/Security Filters and Monitors
Configuring Traffic/Security Filters
Figure 12-13. Example of Switch Response to Adding a Filtered Source Port to a
Trunk
Editing a Source-Port Filter
The switch includes in one filter the action(s) for all destination ports and/or
trunks configured for a given source port or trunk. Thus, if a source-port filter
already exists and you want to change the currently configured action for
some destination ports or trunks, use the
filter source-port
command to update
the existing filter. For example, suppose you configure a filter to drop traffic
received on port 8 and destined for ports 1 and 2. The resulting filter is shown
on the left in figure 12-14. Later, you update the filter to drop traffic received
on port 8 and destined for ports 3 through 5. Since only one filter exists for a
given source port, the filter on traffic from port 8 appears as shown on the
right in figure 12-14:
HP Switch(config)# filter source-port 5 drop 2
HP Switch(config)# trunk 5-6 trk1
HP Switch(config)# show filter
Traffic/Security Filters
IDX Filter Type | Value
--- ------------ + --------------
1 Source Port | *5*
HP Switch(config)# show filter 1
Traffic/Security Filters
Filter Type : Source Port
Source Port : *5*
Dest Port Type | Action
--------- --------- + -------
1 100/1000T | Forward
2 100/1000T | Forward
3 100/1000T | Forward
4 100/1000T | Forward
. . .
. . .
. . .
The *5* shows that port 5 is
configured for filtering, but the
filtering action has been suspended
while the port is a member of a trunk.
If you want the trunk to which port 5
belongs to filter traffic, then you must
explicitly configure filtering on the
trunk.
Note:
If you configure an existing
trunk for filtering and later add
another port to the trunk, the switch
will apply the filter to all traffic moving
on any link in the trunk. If you remove
a port from the trunk it returns to the
configuration it had before it was
added to the trunk
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......