Configuring and Monitoring Port Security
MAC Lockdown
ProCurve
Switch
ProCurve
Switch
ProCurve
Switch
ProCurve
Switch
Internal
Core
Network
Switch 1
Switch 1
Mixed Users
Edge Devices
Lock Server “A” to
these ports.
Server “A”
Network Edge
There is no need to
lock MAC addresses
on switches in the
internal core network.
Figure 13-10. MAC Lockdown Deployed At the Network Edge Provides Security
Basic MAC Lockdown Deployment.
In the Model Network Topology shown
above, the switches that are connected to the edge of the network each have
one and only one connection to the core network. This means each switch has
only one path by which data can travel to Server A. You can use MAC
Lockdown to specify that all traffic intended for Server A’s MAC Address must
go through the one port on the edge switches. That way, users on the edge can
still use other network resources, but they cannot “spoof” Server A and hijack
data traffic which is intended for that server alone.
13-27
Summary of Contents for PROCURVE 2910AL
Page 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Page 2: ......
Page 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Page 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Page 156: ...TACACS Authentication Operating Notes 4 30 ...
Page 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Page 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Page 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Page 592: ...12 Index ...
Page 593: ......