9-12
Configuring and Monitoring Port Security
Port Security Command Options and Operation
The following command example shows the option for entering a range of
ports, including a series of non-contiguous ports. Note that no spaces are
allowed in the port number portion of the command string:
ProCurve(config)# show port-security A1-A3,A6,A8
Configuring Port Security
Using the CLI, you can:
■
Configure port security and edit security settings.
■
Add or delete devices from the list of authorized addresses for one or
more ports.
■
Clear the Intrusion flag on specific ports
Syntax
:
port-security [e]
< port-list >
[learn-mode < continuous | static | configured | port-access >]
[address-limit
< integer >
]
[mac-address
< mac-addr >
] [<
mac-addr
> . . . <
mac-addr
>]
[action < none | send-alarm | send-disable >]
[clear-intrusion-flag]
(For the
configured
option, above, refer to the
Note
on page 9-6.
no port-security <
port-list
> mac-address <
mac-addr
> [<
mac-addr
> . . .
<
mac-addr
>]
Specifying Authorized Devices and Intrusion Responses
Learn-Mode Static.
This example configures port A1 to automatically
accept the first device (MAC address) it detects as the only authorized device
for that port. (The default device limit is 1.) It also configures the port to send
an alarm to a network management station and disable itself if an intruder is
detected on the port.
ProCurve(config)# port-security a1 learn-mode static
action send-disable
The next example does the same as the preceding example, except that it
specifies a MAC address of 0c0090-123456 as the authorized device instead of
allowing the port to automatically assign the first device it detects as an
authorized device.
Содержание ProCurve 2510-24
Страница 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Страница 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Страница 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 316: ...8 Index ...
Страница 317: ......