7-10
Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access
Configuring and Monitoring Port Security
Usi
ng P
a
sswo
rds,
P
o
rt
Se
c
u
rity,
a
n
d
A
u
th
o
riz
e
d
IP
■
Intrusion Log entries in either the menu interface, CLI, or web
browser interface
For any port, you can configure the following:
■
Authorized (MAC) Addresses:
Specify up to eight devices (MAC
addresses) that are allowed to send inbound traffic through the port.
This feature:
•
Closes the port to inbound traffic from any unauthorized devices that
are connected to the port.
•
Provides the option for sending an SNMP trap notifying of an
attempted security violation to a network management station and,
optionally, disables the port. (For more on configuring the switch for
SNMP management, see “Trap Receivers and Authentication Traps”
on page page 8-10.)
Blocking Unauthorized Traffic
Unless you configure the switch to disable a port on which a security violation
is detected, the switch security measures block unauthorized traffic without
disabling the port. This implementation enables you to apply the security
configuration to ports on which hubs, switches, or other devices are
connected, and to maintain security while also maintaining network access to
authorized users. For example:
Содержание HP ProCurve series 2500
Страница 1: ...hp procurve series 2500 switches management and configuration guide www hp com go procurve ...
Страница 2: ......
Страница 3: ...HP ProCurve Switches 2512 and 2524 Management and Configuration Guide Software Release F 01or Greater ...
Страница 6: ......
Страница 18: ...xvi Contents ...
Страница 42: ...2 16 Using the Menu Interface Where To Go From Here Using the Menu Interface ...
Страница 84: ...4 26 Using the HP Web Browser Interface Status Reporting Features Using the HP Web Browser Interface ...
Страница 306: ...9 112 Configuring Advanced Features Spanning Tree Protocol STP Configuring Advanced Features ...
Страница 382: ......