9-14
Configuring and Monitoring Port Security
Port Security Command Options and Operation
mined by the current
address-limit
value). For example, suppose port A1
allows two authorized devices, but has only one device in its Authorized
Address list:
Figure 9-4. Example of Adding an Authorized Device to a Port
With the above configuration for port A1, the following command adds the
0c0090-456456 MAC address as the second authorized address.
ProCurve(config)# port-security a1 mac-address 0c0090-
456456
After executing the above command, the security configuration for port A1
appears as:
Figure 9-5. Example of Adding a Second Authorized Device to a Port
The Address Limit has not
been reached.
Although the Address
Limit is set to 2, only
one device has been
authorized for this port.
In this case you can add
another without having
to also increase the
Address Limit.
The Address Limit has been
reached.
Содержание ProCurve 2510-24
Страница 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Страница 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Страница 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 316: ...8 Index ...
Страница 317: ......