11
Configuring and Monitoring Port Security
Contents
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-4
Blocking Unauthorized Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-5
Trunk Group Exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-6
Port Security Command Options and Operation . . . . . . . . . . . . . . . . 11-8
Port Security Display Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-8
Retention of Static Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-18
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-23
Differences Between MAC Lockdown and Port Security . . . . . . . . 11-25
MAC Lockdown Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . 11-26
Deploying MAC Lockdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-27
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-31
Port Security and MAC Lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-33
Web: Displaying and Configuring Port Security Features
. . . . . . 11-34
Reading Intrusion Alerts and Resetting Alert Flags
. . . . . . . . . . . 11-34
Notice of Security Violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-34
How the Intrusion Log Operates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-35
Keeping the Intrusion Log Current by Resetting Alert Flags . . . . . . 11-36
Menu: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-37
CLI: Checking for Intrusions, Listing Intrusion Alerts,
and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-38
Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . . . . 11-40
11-1
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......