EasyManua.ls Logo

HP ProCurve series 2500 - Page 11

HP ProCurve series 2500
392 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ix
Contents
Configuring and Monitoring Port Security . . . . . . . . . . . . . . . . . . . . . . 7-9
Basic Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9
Blocking Unauthorized Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10
Trunk Group Exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
Planning Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
CLI: Port Security Command Options and Operation . . . . . . . . . . . . 7-13
CLI: Displaying Current Port Security Settings . . . . . . . . . . . . . . 7-16
CLI: Configuring Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-17
Web: Displaying and Configuring Port Security Features . . . . . . . . . 7-21
Reading Intrusion Alerts and Resetting Alert Flags . . . . . . . . . . . . . . 7-22
Notice of Security Violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22
How the Intrusion Log Operates . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22
Keeping the Intrusion Log Current by Resetting Alert Flags . . . 7-23
Menu: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-24
CLI: Checking for Intrusions, Listing Intrusion Alerts, and Resetting
Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-25
Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . 7-27
Web: Checking for Intrusions, Listing Intrusion Alerts,
and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-28
Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-28
Using IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-30
Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-31
Defining Authorized Management Stations . . . . . . . . . . . . . . . . . . . . . 7-31
Overview of IP Mask Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-32
Menu: Viewing and Configuring IP Authorized Managers . . . . . . . . . 7-33
CLI: Viewing and Configuring Authorized IP Managers . . . . . . . . . . . 7-34
Listing the Switch’s Current Authorized IP Manager(s) . . . . . . . 7-34
Configuring IP Authorized Managers for the Switch . . . . . . . . . . 7-35
Web: Configuring IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . 7-36
Building IP Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-36
Configuring One Station Per Authorized Manager IP Entry . . . . 7-36
Configuring Multiple Stations Per Authorized Manager IP Entry 7-37
Additional Examples for Authorizing Multiple Stations . . . . . . . 7-39
Operating and Troubleshooting Notes . . . . . . . . . . . . . . . . . . . . . . . . . 7-39
8: Configuring for Network Management Applications
Chapter Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2

Table of Contents

Related product manuals