9-2
Configuring and Monitoring Port Security
Overview
Overview
Using Port Security, you can configure each switch port with a unique list of
the MAC addresses of devices that are authorized to access the network
through that port. This enables individual ports to detect, prevent, and log
attempts by unauthorized devices to communicate through the switch.
N o t e
This feature does not prevent intruders from receiving broadcast and multi-
cast traffic.
Basic Operation
Default Port Security Operation.
The default port security setting for
each port is off, or
continuous
. That is, any device can access a port without
causing a security reaction.
Intruder Protection.
A port that detects an “intruder” blocks the intruding
device from transmitting to the network through that port.
Feature
Default
Menu
CLI
Web
Displaying Current Port Security
n/a
—
page 9-10
page 9-28
Configuring Port Security
disabled
—
page 9-12
page 9-28
Intrusion Alerts and Alert Flags
n/a
page 9-34
page 9-32
page 9-35
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......