14-19
Configuring and Monitoring Port Security
Port Security
Adding an Authorized Device to a Port.
To add a device (MAC address)
to a port’s existing Authorized Addresses list, enter the port number with the
mac-address
parameter and the device’s MAC address.
This assumes that
Learn Mode is set to
static
and the Authorized Addresses list is not full
(as
determined by the current Address Limit value). For example, suppose port 1
allows two authorized devices, but has only one device in its Authorized
Address list:
Figure 14-6. Example of Adding an Authorized Device to a Port
With the above configuration for port A1, the following command adds the
0c0090-456456 MAC address as the second authorized address.
HP Switch(config)# port-security a1 mac-address 0c0090-
456456
After executing the above command, the security configuration for port A1
would be:
The Address Limit has not
been reached.
Although the Address
Limit is set to 2, only
one device has been
authorized for this
port. In this case you
can add another
without having to also
increase the Address
Limit.
HP Switch(config)# show port-security 1
Port Security
Port : 1
Learn Mode [Continuous] : StaticAddress Limit [1] : 2
Action [None] : None
Eavesdrop Prevention [Enabled] : Enabled
Authorized Addresses
--------------------
0c0090-123456
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......