HP (Hewlett-Packard) series 2500 Switch User Manual


 
ix
Contents
Configuring and Monitoring Port Security . . . . . . . . . . . . . . . . . . . . . . 7-9
Basic Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9
Blocking Unauthorized Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10
Trunk Group Exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
Planning Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
CLI: Port Security Command Options and Operation . . . . . . . . . . . . 7-13
CLI: Displaying Current Port Security Settings . . . . . . . . . . . . . . 7-16
CLI: Configuring Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-17
Web: Displaying and Configuring Port Security Features . . . . . . . . . 7-21
Reading Intrusion Alerts and Resetting Alert Flags . . . . . . . . . . . . . . 7-22
Notice of Security Violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22
How the Intrusion Log Operates . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22
Keeping the Intrusion Log Current by Resetting Alert Flags . . . 7-23
Menu: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-24
CLI: Checking for Intrusions, Listing Intrusion Alerts, and Resetting
Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-25
Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . 7-27
Web: Checking for Intrusions, Listing Intrusion Alerts,
and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-28
Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-28
Using IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-30
Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-31
Defining Authorized Management Stations . . . . . . . . . . . . . . . . . . . . . 7-31
Overview of IP Mask Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-32
Menu: Viewing and Configuring IP Authorized Managers . . . . . . . . . 7-33
CLI: Viewing and Configuring Authorized IP Managers . . . . . . . . . . . 7-34
Listing the Switch’s Current Authorized IP Manager(s) . . . . . . . 7-34
Configuring IP Authorized Managers for the Switch . . . . . . . . . . 7-35
Web: Configuring IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . 7-36
Building IP Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-36
Configuring One Station Per Authorized Manager IP Entry . . . . 7-36
Configuring Multiple Stations Per Authorized Manager IP Entry 7-37
Additional Examples for Authorizing Multiple Stations . . . . . . . 7-39
Operating and Troubleshooting Notes . . . . . . . . . . . . . . . . . . . . . . . . . 7-39
8: Configuring for Network Management Applications
Chapter Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2