Traffic/Security Filters and Monitors
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-2
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-2
Using Port Trunks with Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-3
Operating Rules for Source-Port Filters . . . . . . . . . . . . . . . . . . . . 11-4
Named Source-Port Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-6
Operating Rules for Named Source-Port Filters . . . . . . . . . . . . . 11-6
Defining and Configuring Named Source-Port Filters . . . . . . . . 11-7
Viewing a Named Source-Port Filter . . . . . . . . . . . . . . . . . . . . . . . 11-9
Using Named Source-Port Filters . . . . . . . . . . . . . . . . . . . . . . . . . 11-9
Configuring Traffic/Security Filters
. . . . . . . . . . . . . . . . . . . . . . . . . . 11-17
Configuring a Source-Port Traffic Filter . . . . . . . . . . . . . . . . . . . . . . 11-18
Example of Creating a Source-Port Filter . . . . . . . . . . . . . . . . . . 11-19
Configuring a Filter on a Port Trunk . . . . . . . . . . . . . . . . . . . . . . 11-19
Editing a Source-Port Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-20
Configuring a Multicast or Protocol Traffic Filter . . . . . . . . . . . . . . 11-21
Displaying Traffic/Security Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-23
Configuring Port-Based and
User-Based Access Control (802.1X)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-1
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3
Why Use Port-Based or User-Based Access Control? . . . . . . . . . . . . 12-3
User Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-4
802.1X User-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . 12-4
xiv
Содержание PROCURVE 2910AL
Страница 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Страница 2: ......
Страница 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Страница 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Страница 156: ...TACACS Authentication Operating Notes 4 30 ...
Страница 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Страница 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Страница 516: ...Configuring Port Based and User Based Access Control 802 1X Messages Related to 802 1X Operation 12 76 ...
Страница 527: ...Configuring and Monitoring Port Security Port Security Figure 13 4 Examples of Show Mac Address Outputs 13 11 ...
Страница 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Страница 592: ...12 Index ...
Страница 593: ......
Страница 594: ... Copyright 2009 Hewlett Packard Development Company L P February 2009 Manual Part Number 5992 5439 ...