14-40
Configuring and Monitoring Port Security
Operating Notes for Port Security
Without both of the above configured, the switch detects only the proxy
server’s MAC address, and not your PC or workstation MAC address, and
interprets your connection as unauthorized.
“Prior To” Entries in the Intrusion Log.
If you reset the switch (using the
Reset button, Device Reset, or Reboot Switch), the Intrusion Log will list the
time of all currently logged intrusions as “prior to” the time of the reset.
Alert Flag Status for Entries Forced Off of the Intrusion Log.
If the
Intrusion Log is full of entries for which the alert flags have not been reset, a
new intrusion will cause the oldest entry to drop off the list, but will not change
the alert flag status for the port referenced in the dropped entry. This means
that, even if an entry is forced off of the Intrusion Log, no new intrusions can
be logged on the port referenced in that entry until you reset the alert flags.
LACP Not Available on Ports Configured for Port Security.
To main-
tain security, LACP is not allowed on ports configured for port security. If you
configure port security on a port on which LACP (active or passive) is
configured, the switch removes the LACP configuration, displays a notice that
LACP is disabled on the port(s), and enables port security on that port. For
example:
HP Switch(config)# port-security e 17 learn-mode static
address-limit 2
LACP has been disabled on secured port(s).
HP Switch(config)#
The switch will not allow you to configure LACP on a port on which port
security is enabled. For example:
HP Switch(config)# int e 17 lacp passive
Error configuring port 17: LACP and port security cannot
be run together.
HP Switch(config)#
To restore LACP to the port, you must remove port security and re-enable
LACP active or passive.
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......