9-12
Configuring and Monitoring Port Security
Port Security Command Options and Operation
The following command example shows the option for entering a range of
ports, including a series of non-contiguous ports. Note that no spaces are
allowed in the port number portion of the command string:
ProCurve(config)# show port-security A1-A3,A6,A8
Configuring Port Security
Using the CLI, you can:
■
Configure port security and edit security settings.
■
Add or delete devices from the list of authorized addresses for one or
more ports.
■
Clear the Intrusion flag on specific ports
Syntax
:
port-security [e]
< port-list >
[learn-mode < continuous | static | configured | port-access >]
[address-limit
< integer >
]
[mac-address
< mac-addr >
] [<
mac-addr
> . . . <
mac-addr
>]
[action < none | send-alarm | send-disable >]
[clear-intrusion-flag]
(For the
configured
option, above, refer to the
Note
on page 9-6.
no port-security <
port-list
> mac-address <
mac-addr
> [<
mac-addr
> . . .
<
mac-addr
>]
Specifying Authorized Devices and Intrusion Responses
Learn-Mode Static.
This example configures port A1 to automatically
accept the first device (MAC address) it detects as the only authorized device
for that port. (The default device limit is 1.) It also configures the port to send
an alarm to a network management station and disable itself if an intruder is
detected on the port.
ProCurve(config)# port-security a1 learn-mode static
action send-disable
The next example does the same as the preceding example, except that it
specifies a MAC address of 0c0090-123456 as the authorized device instead of
allowing the port to automatically assign the first device it detects as an
authorized device.
Summary of Contents for ProCurve 2510-24
Page 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Page 2: ......
Page 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Page 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Page 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 316: ...8 Index ...
Page 317: ......