9-28
Configuring and Monitoring Port Security
Web: Displaying and Configuring Port Security Features
Web: Displaying and Configuring Port
Security Features
1.
Click on the
Security
tab.
2.
Click on
[Port Security]
.
3.
Select the settings you want and, if you are using the Static Learn Mode,
add or edit the Authorized Addresses field.
4.
Implement your new data by clicking on
[Apply Changes]
.
To access the web-based Help provided for the switch, click on
[?]
in the web
browser screen.
Reading Intrusion Alerts and Resetting
Alert Flags
Notice of Security Violations
When the switch detects an intrusion on a port, it sets an “alert flag” for that
port and makes the intrusion information available as described below.
While
the switch can detect additional intrusions for the same port, it does not list
the next chronological intrusion for that port in the Intrusion Log until the
alert flag for that port has been reset
.
When a security violation occurs on a port configured for Port Security, the
switch responds in the following ways to notify you:
■
The switch sets an alert flag for that port. This flag remains set until:
•
You use either the CLI, menu interface, or web browser interface
to reset the flag.
•
The switch is reset to its factory default configuration.
■
The switch enables notification of the intrusion through the following
means:
•
In the CLI:
–
The
show port-security intrusion-log
command displays the
Intrusion Log
–
The
log
command displays the Event Log
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......