Configuring and Monitoring Port Security
Web: Displaying and Configuring Port Security Features
Web: Displaying and Configuring Port
Security Features
1. Click on the
Security
tab.
2. Click on
[Port Security]
.
3. Select the settings you want and, if you are using the Static Learn Mode,
add or edit the Authorized Addresses field.
4. Implement your new data by clicking on
[Apply Changes]
.
To access the web-based Help provided for the switch, click on
[?]
in the web
browser screen.
Reading Intrusion Alerts and Resetting
Alert Flags
Notice of Security Violations
When the switch detects an intrusion on a port, it sets an “alert flag” for that
port and makes the intrusion information available as described below.
While
the switch can detect additional intrusions for the same port, it does not list
the next chronological intrusion for that port in the Intrusion Log until the
alert flag for that port has been reset
.
When a security violation occurs on a port configured for Port Security, the
switch responds in the following ways to notify you:
■
The switch sets an alert flag for that port. This flag remains set until:
•
You use either the CLI, menu interface, or web browser interface
to reset the flag.
•
The switch is reset to its factory default configuration.
11-34
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......