12-6
Traffic/Security Filters and Monitors
Filter Types and Operation
Operating Rules for Named Source-Port Filters
■
A port or port trunk may only have one source-port filter, named or
not named.
■
A named source-port filter can be applied to multiple ports or port
trunks.
■
Once a named source-port filter is defined, subsequent changes only
modify its action, they don’t replace it.
■
To change the named source-port filter used on a port or port trunk,
the current filter must first be removed, using the
no filter source-port
named-filter <filter-name >
command.
■
A named source-port filter can only be deleted when it is not applied
to any ports.
Defining and Configuring Named Source-Port Filters
The named source-port filter command operates from the global configuration
level.
Syntax:
[no] filter source-port named-filter <
filter-name
>
Defines or deletes a named source-port filter. The <filter-
name> may contain a maximum of 20 alpha-numeric
characters (longer names may be specified, but they are not
displayed.) A filter-name cannot be a valid port or port trunk
name.
The maximum number of named source-port filters that can
be used is equal to the number of ports on a switch.
A named source-port filter can only be removed if it is not in
use (use the
show filter source-port
command to check the
status). Named source-port filters are not automatically
deleted when they are no longer used.
Use the
no
option to delete an unused named source-port filter.
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......