14-29
Configuring and Monitoring Port Security
MAC Lockdown
Figure 14-15.MAC Lockdown Deployed At the Network Edge Provides Security
Basic MAC Lockdown Deployment.
In the Model Network Topology shown
above, the switches that are connected to the edge of the network each have
one and only one connection to the core network. This means each switch has
only one path by which data can travel to Server A. You can use MAC
Lockdown to specify that all traffic intended for Server A’s MAC Address must
go through the one port on the edge switches. That way, users on the edge can
still use other network resources, but they cannot “spoof” Server A and hijack
data traffic which is intended for that server alone.
3500yl Switch
8212zl Switch
8212zl Switch
3500yl Switch
Internal
Core
Network
Switch 1
Switch 1
Mixed Users
Edge Devices
Lock Server “A” to
these ports.
Server “A”
Network Edge
There is no need to
lock MAC addresses
on switches in the
internal core network.
Содержание HP ProCurve Series 6600
Страница 2: ......
Страница 6: ...iv ...
Страница 26: ...xxiv ...
Страница 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Страница 204: ...4 72 Web and MAC Authentication Client Status ...
Страница 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Страница 756: ...16 8 Key Management System Configuring Key Chain Management ...
Страница 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Страница 777: ......