![HP HP ProCurve Series 6600 Access Security Manual Download Page 695](http://html.mh-extra.com/html/hp/hp-procurve-series-6600/hp-procurve-series-6600_access-security-manual_163101695.webp)
14-5
Configuring and Monitoring Port Security
Port Security
Figure 14-1. Example of show port-security Command Displaying Eavesdrop Prevention
MIB Support
The following MIB support is provided for Eavesdrop Prevention.
hpSecPtPreventEavesdrop OBJECT-TYPE
SYNTAX INTEGER {
enable (1),
disable (2)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
“If enabled on a switch, outbound unknown unicast
packets will not be forwarded out this port. If
enabled on a repeater, outbound unknown unicast
packets for this port will be scrambled.
::= { hpSecurePortEntry 5 }
Blocking Unauthorized Traffic
Unless you configure the switch to disable a port on which a security violation
is detected, the switch security measures block unauthorized traffic without
disabling the port. This implementation enables you to apply the security
configuration to ports on which hubs, switches, or other devices are
connected, and to maintain security while also maintaining network access to
authorized users. For example:
HP Switch(config)# show port-security
Port Security
Port Learn Mode | Action Eavesdrop Prevention
------ -------------------- + ------------------------ --------------------
B1 Continuous | None Enabled
B2 Continuous | None Enabled
B3 Continuous | None Enabled
B4 Continuous | None Enabled
B5 Continuous | None Enabled
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......