Contents

Configuring and Monitoring Port Security . . . . . . . . . . . . . . . . . . . . . . 7-9

Basic Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9

Blocking Unauthorized Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10

Trunk Group Exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11

Planning Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11

CLI: Port Security Command Options and Operation . . . . . . . . . . . . 7-13 CLI: Displaying Current Port Security Settings . . . . . . . . . . . . . . 7-16 CLI: Configuring Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-17

Web: Displaying and Configuring Port Security Features . . . . . . . . . 7-21

Reading Intrusion Alerts and Resetting Alert Flags . . . . . . . . . . . . . . 7-22 Notice of Security Violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22 How the Intrusion Log Operates . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22 Keeping the Intrusion Log Current by Resetting Alert Flags . . . 7-23 Menu: Checking for Intrusions, Listing Intrusion Alerts, and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-24CLI: Checking for Intrusions, Listing Intrusion Alerts, and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-25 Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . 7-27 Web: Checking for Intrusions, Listing Intrusion Alerts,

and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-28

Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-28

Using IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-30

Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-31

Defining Authorized Management Stations . . . . . . . . . . . . . . . . . . . . . 7-31 Overview of IP Mask Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-32

Menu: Viewing and Configuring IP Authorized Managers . . . . . . . . . 7-33

CLI: Viewing and Configuring Authorized IP Managers . . . . . . . . . . . 7-34 Listing the Switch’s Current Authorized IP Manager(s) . . . . . . . 7-34 Configuring IP Authorized Managers for the Switch . . . . . . . . . . 7-35

Web: Configuring IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . 7-36

Building IP Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-36 Configuring One Station Per Authorized Manager IP Entry . . . . 7-36 Configuring Multiple Stations Per Authorized Manager IP Entry 7-37 Additional Examples for Authorizing Multiple Stations . . . . . . . 7-39

Operating and Troubleshooting Notes . . . . . . . . . . . . . . . . . . . . . . . . . 7-39

8: Configuring for Network Management Applications

Chapter Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2

ix

Page 11
Image 11
HP 2500 manual Web Displaying and Configuring Port Security Features, Menu Viewing and Configuring IP Authorized Managers