HP J3188A manual Auto Port Disable, Send Alarm

Page 81

Security Information

Setting Inbound Security with Intruder Prevention

 

Auto Port Disable

 

Any port may be configured to be disabled automatically when an intruder’s

 

MAC address is detected. This feature is automatically controlled by your

 

selection of the Authorized Address Selection Method for the port: If the

 

address used is the “first heard” or an “assigned” address, the port will be

 

disabled automatically when an intruder is detected. If the address is “learned

 

continuously”, the port will not be automatically disabled.

 

 

N o t e

Auto port disable may not be used on cascaded ports, ports connected to a

 

network with multiple end users, or ports configured to learn the authorized

 

MAC address continuously.

 

The auto port disable feature compares the authorized MAC address of the

 

 

port to the source address of the packet inbound to the hub at that port. If the

 

authorized address and the source address do not match, the HP hub will

 

automatically disable the port.

 

Once a port is disabled because of a security violation, to resume operation,

 

the port must be re-enabled either by using the hub console interface’s Port

 

command, or from the network management station.

 

A bit error in the source address field of the packet will not cause the port

 

to be disabled. In this case, the hub detects a CRC error for the packet and

 

does not consider it as a security violation.

 

Send Alarm

 

Any port may be configured to send an alarm (trap notification) to the network

 

management station when an unauthorized MAC address or a new MAC

 

address is detected on a secure port.

 

To use the “send alarm” feature, you must authorize at least one network

 

management station to receive the trap notifications by entering the IP or IPX

 

address of the network management station in the authorized managers list.

 

Use the Managers command from the hub’s console to configure these

 

addresses. See chapter 3, “Managing the Hub” for more information on this

 

command.

Security Information

F-5

Image 81
Contents HP J3188A Page HP 10Base-T Hub-16M J3188A Installation and Reference GuidePublication Number Front of the Hub HP 10Base-T Hub-16M J3188ABack of the Hub IiiNetwork Connections FeaturesContents Cables and Connectors Vii Security InformationPage Installing the Hub Verify included parts Installing and Configuring Your HubConnect the external transceiver Verify the hub operates correctlyTime Cord connected directly to the hub for proper operationPattern LEDRack or Cabinet Mounting Mount the hubTable Mounting Connect the hub to your network Connecting Devices to the Hub Connecting Hubs TogetherTwisted-Pair Cascade Connections ThinLAN Connections InstallingOhm terminator Interpreting LED Status Connecting the Hub-16M to a Fiber-Optic BackboneInterpreting Hub Status LEDs Following table provides LED port information Interpreting Port Status LEDsPage Troubleshooting Approaches TroubleshootingUsing a Checklist to Diagnose the Hub Troubleshooting Using a Checklist to Diagnose the HubProblem Solution LED Operation Diagnostic Tips Troubleshooting LED OperationPower Coll Hub will automatically recover afterHub Maintenance Tasks Testing the Hub OnlyClearing a Password for the Ascii Console Troubleshooting Hub Maintenance Tasks Running Connectivity TestsObtaining Firmware Enhancements Managing the Hub Setting up the Ascii ConsoleDirectly, Using a Serial Cable and a Terminal Remotely, Using TelnetManaging the Hub Starting the Console Remotely, Using a Modem and a TerminalCommands are described in the rest of the chapter Console Command ReferenceExample HE ST This displays help for the Status command Syntax Conventions on Help ScreenDefault Description BAckupCOunters CDpstatusCounter Name Definition Valid Range RangeIPconfig When to Use IPconfigDIsconnect Using Novell NetWare IPX Configuring for Network ManagementUsing IP Following table explains the IP parametersMAnagers SHow Parameter Default Value DefinitionCommand Manager Address IP or IPX Receive Alarms?To end your editing MEssageinterval Displays the other devices that are using CDP protocolNEighbor Table entry with ID 1 would now be a blank lineClear a password PAsswordPIng Community nameREset POrt port ON/OFFRObustness SEcure portSHowCLear Security Configuration Parameter DefinitionsManaging the Hub Configuring Security on a Single Port Configuring Security on All Twisted-Pair PortsEavesdrop Prevention, must be set to on Address Selection Authorized Clearing Security Violation Indicators Showing the Security ConfigurationSTatus SPeed new speedStatus Information What It Means TEstlink Network links, see the , Troubleshooting16M will respond with the correct packet To sendPage Cables and Connectors Recommended CablesFollowing table shows PC connections to the RS-232 port Cables and Connectors Following table shows network connections to the hubCable Function Cable Type HP Product Number Pins 1 and 2 must be a twisted pair Twisted-Pair Cable/Connector Pin-OutsPins 3 and 6 must be a twisted pair Twisted-Pair Cable for Hub-to-Computer Network ConnectionInstaller for assistance with your cabling requirements RS-232 Connector and Cable Pin-OutsCable pin-out described below Minimum pin-out will function correctlySignal Minimum Cable Pinout for Ascii Console ConnectionRS-232 Modem Cable Twisted-Pair Cable Pin Assignments Twisted-Pair Straight-Through CableHub End MDI-X Physical SpecificationsElectrical EnvironmentalConnectors SpecificationsElectromagnetic Modem Configuration US Robotics Courier V.FC/V.34Megahertz XJ2288 Pcmcia card modem Practical Peripherals PM288MT II Intel 14.4EXSupra FAX Communication Between the Hub Network Management Station Network AddressingIP Addresses for IP and Non-IP Networks IPX Addressing for Novell NetWareIPX Addressing Notes Globally Assigned IP Network AddressesDevice IP Configuration CountryCompany Name/Address Bootp Process Using BootpDefinitions of the table entry fields Bootp Table File EntriesPage How Backup Links Work Backup LinksBackup Links LimitationsAdditional Notes How the Backup Function Works Examples of Backup LinksHub to a Switch Hub to a ServerHub can monitor only one link T e G g e s t i o nConfiguration/Installation Sequence Configuring a Backup LinkIndications of Backup Link Activation Identifying the Backup LinkReactivating the Primary Link Page Understanding Network Security Security InformationHow Eavesdrop Prevention Works How Intruder Prevention WorksAuthorized MAC address Security InformationAssigning the Authorized MAC address Setting Inbound Security with Intruder Prevention Send Alarm Auto Port DisableSetting Outbound Security with Eavesdrop Prevention Security Information Page Mounting Precautions Safety and Regulatory StatementsTemperature might exceed 45C 113F Power PrecautionsSettings to configure Equipment and should be easily accessibleGrounding Safety InformationTible de causer des dommages à léquipement Informations concernant la sécuritéHinweise zur Sicherheit Considerazioni sulla sicurezza Consideraciones sobre seguridad Safety Information Japanese FCC Class a Statement for U.S.A. Only Regulatory StatementsEuropean Community CanadaDeclaration of Conformity Index IndexDiagnosing with the LEDs … 2-2 diagnostic tests Late collision … 3-13 mounting the hub … LED description … Verifying hub operation … Page J3188-90001