![HP HP ProCurve Series 6600 Access Security Manual Download Page 727](http://html.mh-extra.com/html/hp/hp-procurve-series-6600/hp-procurve-series-6600_access-security-manual_163101727.webp)
14-37
Configuring and Monitoring Port Security
Reading Intrusion Alerts and Resetting Alert Flags
Note on
Send-Disable
Operation
On a given port, if the intrusion action is to send an SNMP trap and then disable
the port (
send-disable
), and an intruder is detected on the port, then the switch
sends an SNMP trap, sets the port’s alert flag, and disables the port. If you re-
enable the port without resetting the port’s alert flag, then the port operates
as follows:
■
The port comes up and will block traffic from unauthorized devices it
detects.
■
If the port detects another intruder, it will send another SNMP trap, but
will not become disabled again unless you first reset the port’s intrusion
flag.
This operation enables the port to continue passing traffic for authorized
devices while you take the time to locate and eliminate the intruder. Other-
wise, the presence of an intruder could cause the switch to repeatedly disable
the port.
Menu: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags
The menu interface indicates per-port intrusions in the Port Status screen, and
provides details and the reset function in the Intrusion Log screen.
1.
From the Main Menu select:
1. Status and Counters
4. Port Status
Figure 14-19. Example of Port Status Screen with Intrusion Alert on Port A3
2.
Type
[I]
(
Intrusion log
) to display the Intrusion Log.
The Intrusion Alert
column shows
“Yes” for any port
on which a security
violation has been
detected.
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......