Configuring and Monitoring Port Security

Basic Operation

Physical Topology

Logical Topology for Access to Switch A

Switch A

Port Security Configured

Switch B

MAC Address Authorized by Switch A

PC 1

MAC Address Authorized by Switch A

PC 2

MAC Address NOT Authorized by Switch A

Switch A

Port Security Configured

Switch B

MAC Address Authorized by Switch A

PC 1

MAC Address Authorized by Switch A

Switch C

MAC Address NOT Authorized by Switch A

PC 3

MAC Address NOT

Authorized by Switch A

• PC1 can access Switch A.

• PCs 2 and 3 can access Switch B and Switch C, but are blocked from accessing switch A by the port security settings in switch A.

• Switch C is not authorized to access Switch A.

Figure 7-1. Example of How Port Security Controls Access

N o t e

Broadcast and Multicast traffic is not “unauthorized” traffic, and can be read

 

by intruders connected to a port on which you have configured port security.

 

Trunk Group Exclusion

 

 

Port security does not operate on either a static or dynamic trunk group. If

 

you configure port security on one or more ports that are later added to a trunk

 

group, the switch will reset the port security parameters for those ports to the

 

factory-default configuration. (Ports configured for either Active or Passive

 

LACP, and which are not members of a trunk, can be configured for port

 

security.)

7-4

Page 186
Image 186
HP 4100gl manual Trunk Group Exclusion, Security