7

Configuring and Monitoring Port Security

Contents

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2

Basic Operation

Blocking Unauthorized Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3

Trunk Group Exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4

Planning Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5

Port Security Command Options and Operation

Retention of Static Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8

Displaying Current Port Security Settings . . . . . . . . . . . . . . . . . . . . . . . 7-9

Configuring Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10

Web: Displaying and Configuring Port Security Features . . . . . . . 7-15

Reading Intrusion Alerts and Resetting Alert Flags

Notice of Security Violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15

How the Intrusion Log Operates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-16

Keeping the Intrusion Log Current by Resetting Alert Flags . . . . . . . 7-17

Menu: Checking for Intrusions, Listing Intrusion Alerts, and

Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-17

CLI: Checking for Intrusions, Listing Intrusion Alerts, and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-19Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . 7-21Web: Checking for Intrusions, Listing Intrusion Alerts, and Resetting 

Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22;

7-1

Page 183
Image 183
HP 4100gl Basic Operation, Blocking Unauthorized Traffic -3 Trunk Group Exclusion -4, Retention of Static Addresses