12-2
Traffic/Security Filters and Monitors
Introduction
Introduction
You can enhance in-band security and improve control over access to network
resources by configuring static filters to forward (the default action) or drop
unwanted traffic. That is, you can configure a traffic filter to either forward
or drop all network traffic moving to outbound (destination) ports and trunks
(if any) on the switch.
Filter Limits
The switch accepts up to 101 static filters. These limitations apply:
■
Source-port filters: up to 78
■
Multicast filters: up to 16 with 1024 or fewer VLANs configured. Up to 8
with more than 1024 VLANs configured.
■
Protocol filters: up to 7
Using Port Trunks with Filters
The switch manages a port trunk as a single source or destination for source-
port filtering. If you configure a port for filtering before adding it to a port
trunk, the port retains the filter configuration, but suspends the filtering action
while a member of the trunk. If you want a trunk to perform filtering, first
configure the trunk, then configure the trunk for filtering. Refer to “Config-
uring a Filter on a Port Trunk” on page 12-18.
Feature
Default
Menu
CLI
WebAgent
configure source-port filters
none
n/a
n/a
configure protocol filters
none
n/a
n/a
configure multicast filters
none
n/a
n/a
display filter data
n/a
n/a
n/a
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......