HP J3188A manual Showing the Security Configuration, Clearing Security Violation Indicators

Models: J3188A

1 100
Download 100 pages 5.6 Kb
Page 48
Image 48

Managing the Hub

Managing the Hub

Console Command Reference

Send Alarm when intruder detected? and Eavesdrop prevention?:

These parameters are defined earlier in the chapter under “Security Configuration Parameter Definitions”.

The values you select for these parameters will be applied to all the twisted-pair ports for which you have selected (or retained) the address selection method.

Showing the Security Configuration

Enter the command SE SH to display the security configuration for all of the hubs ports. A table like the following is presented:

 

 

ADDRESS

 

 

 

 

 

 

 

 

 

 

 

SELECTION

 

AUTHORIZED

 

EAVESDROP

 

SEND

DISABLE

Port

 

METHOD

 

ADDRESS

 

PREVENTION

 

ALARM

PORT *

 

 

 

 

 

 

 

 

 

 

 

 

1

 

CONTINUOUS

123456-890123

 

YES

 

NO

NO

2

 

CONTINUOUS

 

NONE

 

NO

 

NO

NO

3

 

FIRST HEARD

123456-789012

 

YES

 

YES

YES

 

 

 

 

 

 

 

 

 

 

 

 

The vertical bar between Send Alarm and Disable Port indicates that the value for the Disable Port parameter is not directly configurable. This parameter is automatically set by the Address Selection Method. If the method is either First Heard or Assigned, and if at least one of the other security parameters is set to YES, the Disable Port parameter will be YES. If the method is Continuous, the Disable Port parameter is always automatically set to NO.

Clearing Security Violation Indicators

Enter the command SE CL to clear any security violation indicators and to “rearm” the indicators to be ready for the next intrusion. The indications are slightly different between port security violations and network management security violations, as described next.

For Port Security. The security violations are indicated by the Security LED and the LED for the affected port blinking simultaneously, and the intruder’s MAC address being added to the Status command screen for the affected port. Security violations occur when a non-authorized address is detected on a port and at least one of the intruder prevention parameters (Send Alarm or Disable Port) is set to YES.

3-18

Page 48
Image 48
HP J3188A manual Showing the Security Configuration, Clearing Security Violation Indicators