xvi
Monitoring Dynamic ARP Protection . . . . . . . . . . . . . . . . . . . . . . . . . 11-22
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-22
Protection Against IP Source Address Spoofing . . . . . . . . . . . . . . . . 11-23
Prerequisite: DHCP Snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-23
Filtering IP and MAC Addresses Per-Port and Per-VLAN . . . . . . . . 11-24
Enabling Dynamic IP Lockdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-25
Adding an IP-to-MAC Binding to the DHCP Binding Database . . . . 11-27
Potential Issues with Bindings . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-27
Adding a Static Binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-28
Verifying the Dynamic IP Lockdown Configuration . . . . . . . . . . . . . 11-28
Displaying the Static Configuration of IP-to-MAC Bindings . . . . . . 11-29
Debugging Dynamic IP Lockdown . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-30
Differences Between Switch Platforms . . . . . . . . . . . . . . . . . . . . . . . 11-31
Using the Instrumentation Monitor
. . . . . . . . . . . . . . . . . . . . . . . . . . 11-33
Configuring Instrumentation Monitor . . . . . . . . . . . . . . . . . . . . . . . . 11-35
Viewing the Current Instrumentation Monitor Configuration . . . . . 11-37
12 Traffic/Security Filters and Monitors
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-1
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2
Using Port Trunks with Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3
Operating Rules for Source-Port Filters . . . . . . . . . . . . . . . . . . . . 12-3
Named Source-Port Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-5
Operating Rules for Named Source-Port Filters . . . . . . . . . . . . . 12-6
Defining and Configuring Named Source-Port Filters . . . . . . . . 12-6
Viewing a Named Source-Port Filter . . . . . . . . . . . . . . . . . . . . . . . 12-8
Using Named Source-Port Filters . . . . . . . . . . . . . . . . . . . . . . . . . 12-8
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......