![HP J2415A Installation And Reference Manual Download Page 52](http://html.mh-extra.com/html/hp/j2415a/j2415a_installation-and-reference-manual_164104052.webp)
Security Features
The Hub-14 has built-in per-port security. After you have set up security by
clicking on the Security icon, security violations are reported in the Intruder
Log.
You can specify three levels of security on a single port or all ports on the
hub. You can set the hub to learn a port’s authorized MAC address
automatically by either continuous learning or acquiring the first address
heard. Alternatively, you can assign an address directly.
The method used to learn the authorized MAC address should be chosen
based on the level of data security required on a port. For continuous or
first heard methods, the port learns the device’s address from the source
address field in the training packet.
Continuous Method
-
provides minimum port security
. The “continuous”
method allows the hub to continuously update the authorized MAC address
configured for a port. Each new device connected to the port becomes the
new authorized device. This security method is useful for dynamic
workgroups that experience frequent changes to end-user configuration and
require minimal data security protection.
First-Heard Method
-
provides medium port security
. The “first heard”
method automatically assigns the first address detected on the port as the
authorized MAC address. This method is useful to quickly identify and
authorize end users. Under this method, the port will retrain automatically if an
intruder is detected on the port and will not permit an unauthorized end-node to
ever complete training.
Assign an Address
-
provides the highest security
. You can assign an
authorized MAC address by entering it manually at the hub console interface
or at the network management station. Assigning a specific address provides
the maximum control of the port’s authorized MAC address. The security
that you have configured for that port is implemented as soon as the address
is assigned. Again, the port will retrain automatically if an intruder is
detected on the port, and end-nodes other than the authorized one will not
be permitted to complete training.
HP
S
tack Manager
Installing and Using HP Stack Manager
2-12
Summary of Contents for J2415A
Page 1: ...Installation and Reference Guide HP J2415A HP AdvanceStack 100VG Hub 14 ...
Page 2: ......
Page 3: ...HP AdvanceStack 100VG Hub 14 Installation and Reference Guide ...
Page 8: ......
Page 10: ......
Page 14: ...B Specifications Safety and Regulatory Statements Index Contents x ...
Page 40: ......
Page 58: ......
Page 86: ......
Page 95: ...B Specifications ...
Page 98: ......
Page 99: ...Safety and Regulatory Statements ...
Page 105: ...Safety Information Japanese Safety Information Safety Information Japanese 7 ...
Page 108: ......
Page 109: ...Index ...
Page 115: ......