12-13
Traffic/Security Filters and Monitors
Filter Types and Operation
The following revisions to the named source-port filter definitions maintain
the desired network traffic management, as shown in the
Action
column of the
show
command.
Figure 12-11. Example Showing Network Traffic Management with Source Port Filters
We next apply the updated named source-port filters to the appropriate switch
ports. As a port can only have one source-port filter (named or not named),
before applying the new named source-port filters we first remove the existing
source-port filters on the port.
The named source-port filters now manage traffic on the switch ports as
shown below, using the
show filter source-port
command.
HP Switch(config)# filter source-port named-filter accounting forward 8,12,13
HP Switch(config)# filter source-port named-filter no-incoming-web drop 8,12,13
HP Switch(config)#
HP Switch(config)# show filter source-port
Traffic/Security Filters
Filter Name | Port List | Action
-------------------- + -------------------- + ----------------------
web-only | 2-6,8-9,12-26 | drop 2-26
accounting | 7,10-11 | drop 1-6,9,14-26
no-incoming-web | 1 | drop 7-8,10-13
HP Switch(config)#
HP Switch(config)# no filter source-port 8,12,13
HP Switch(config)# filter source-port 8,12,13 named-filter accounting
HP Switch(config)#
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......