EasyManuals Logo

HP J8697A User Manual

HP J8697A
778 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #24 background imageLoading...
Page #24 background image
xxii
14 Configuring and Monitoring Port Security
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-1
Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-2
Basic Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-2
Eavesdrop Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-3
Disabling Eavesdrop Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . 14-3
Feature Interactions When Eavesdrop Prevention is Disabled . 14-4
MIB Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-5
Blocking Unauthorized Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-5
Trunk Group Exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-6
Planning Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-7
Port Security Command Options and Operation . . . . . . . . . . . . . . . . 14-8
Port Security Display Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-8
Configuring Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-12
Retention of Static Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-17
Clear MAC Address Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-22
Configuring Clearing of Learned MAC Addresses . . . . . . . . . . . . . . 14-23
MAC Lockdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-24
Differences Between MAC Lockdown and Port Security . . . . . . . . 14-26
MAC Lockdown Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . 14-27
Deploying MAC Lockdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-28
MAC Lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-32
Port Security and MAC Lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-34
Reading Intrusion Alerts and Resetting Alert Flags . . . . . . . . . . . 14-35
Notice of Security Violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-35
How the Intrusion Log Operates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-36
Keeping the Intrusion Log Current by Resetting Alert Flags . . . . . . 14-36
Menu: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-37
CLI: Checking for Intrusions, Listing Intrusion Alerts,
and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-39
Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . . . . 14-41
Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-42

Table of Contents

Other manuals for HP J8697A

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HP J8697A and is the answer not in the manual?

HP J8697A Specifications

General IconGeneral
Ports24
Form FactorRack-mountable
Power SupplyInternal
ManagementManaged
VLAN SupportYes
Jumbo Frame SupportYes
Switching Capacity48 Gbps
Forwarding Rate35.7 Mpps
ModelHP J8697A
Port Type10/100/1000BASE-T
LayerLayer 2

Related product manuals