Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port Security

Configuring and Monitoring PortSecurity

Feature

Default

Menu

CLI

Web

Displaying Current Port Security

n/a

page 7-16

page 7-21

Configuring Port Security

disabled

page 7-17

page 7-21

Intrusion Alerts and Alert Flags

n/a

page 7-27

page 7-25

page 7-28

 

 

 

 

 

 

Using Port Security, you can configure each switch port with a unique list of

 

the MAC addresses of devices that are authorized to access the network

 

through that port. This enables individual ports to detect, prevent, and log

 

attempts by unauthorized devices to communicate through the switch.

 

 

N o t e

This feature does not prevent intruders from receiving broadcast and multi-

 

cast traffic.

 

 

Basic Operation

Default Port Security Operation. The default port security setting for each port is off, or “continuous”. That is, any device can access a port without causing a security reaction.

Intruder Protection. A port that detects an “intruder” blocks the intruding device from transmitting to the network through that port.

General Operation for Port Security. On a per-port basis, you can configure security measures to block unauthorized devices, and to send notice of security violations. Once you have configured port security, you can then monitor the network for security violations through one or more of the following:

Alert flags that are captured by network management tools such as HP TopTools for Hubs & Switches

Alert Log entries in the switch’s web browser interface

Event Log entries in the console interface

Authorized and Security,

Port Passwords, Using

IP

 

 

 

7-9