12-8
Traffic/Security Filters and Monitors
Filter Types and Operation
Viewing a Named Source-Port Filter
You can list all source-port filters configured in the switch, both named and
unnamed, and their action using the
show
command below.
Using Named Source-Port Filters
A company wants to manage traffic to the Internet and its accounting server
on a 26-port switch. Their network is pictured in Figure 12-4. Switch port 1
connects to a router that provides connectivity to a WAN and the Internet.
Switch port 7 connects to the accounting server. Two workstations in
accounting are connected to switch ports 10 and 11.
Figure 12-4. Network Configuration for Named Source-Port Filters Example
Syntax:
show filter source-port
Displays a listing of configured source-port filters, where
each filter entry includes a Filter Name, Port List, and
Action:
Filter Name
: The filter-name used when a named
source-port filter is defined. Non-named source-port
filters are automatically assigned the port or port trunk
number of the source port.
Port List
: Lists the port and port trunk destinations
using the filter. Named source-port filters that are not in
use display
NOT USED
.
Action
: Lists the ports and port trunks dropped by the
filter. If a named source-port filter has been defined but
not configured, this field is blank.
[
index
]
For the supplied index (IDX) displays the action taken
(Drop or Forward) for each destination port on the switch.
Port 7
Port 1
Router to the
Internet
Port 10
Accounting Workstation 1
Port 11
Accounting Workstation 2
Network Design
1. Accounting Workstations may only send traffic to the Accounting Server.
2. No Internet traffic may be sent to the Accounting Server or Workstations.
3 All other switch ports may only send traffic to Port 1.
Accounting Server 1
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......