Traffic/Security Filters
Filter Types and Operation
This list shows the filter created
to block (drop) traffic from
source port 5 (workstation "X") to
destination port 7 (server "A").
Notice that the filter allows
traffic to move from source port
5 to all other destination ports.
Figure 9-3. The Filter for the Actions Shown in Figure 9-2
Named Source-Port Filters
You can specify named source-port filters that may be used on multiple ports
and port trunks. A port or port trunk can only have one source-port filter, but
by using this capability you can define a source-port filter once and apply it
to multiple ports and port trunks. This can make it easier to configure and
manage source-port filters on your switch. The commands to define,
configure, apply, and display the status of named source-port filters are
described below.
Operating Rules for Named Source-Port Filters
■
A port or port trunk may only have one source-port filter, named or
not named.
■
A named source-port filter can be applied to multiple ports or port
trunks.
■
Once a named source-port filter is defined, subsequent changes only
modify its action, they don’t replace it.
■
To change the named source-port filter used on a port or port trunk,
the current filter must first be removed, using the
no filter source-port
named-filter <filter-name >
command.
9-6
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......