Managers To Protect Against Unauthorized Access; Chapter Contents; Using Passwords, Port Security, And Authorized Ip Managers To Protect Against Unauthorized Access - HP ProCurve series 2500 Management And Configuration Manual

Procurve 2500 series
Hide thumbs Also See for HP ProCurve series 2500:
Table of Contents

Advertisement

Using Passwords, Port Security, and Authorized IP

Managers To Protect Against Unauthorized Access

Chapter Contents

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Using Password Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4
Configuring and Monitoring Port Security . . . . . . . . . . . . . . . . . . . . . . 7-9
Using IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7- 30
Menu: Setting Manager and Operator passwords . . . . . . . . . . . . . . . . . 7-5
CLI: Setting Manager and Operator Passwords . . . . . . . . . . . . . . . . . . . 7-7
Web: Configuring User Names and Passwords . . . . . . . . . . . . . . . . . . . 7- 8
Basic Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9
Blocking Unauthorized Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10
Trunk Group Exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
Planning Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
CLI: Displaying Current Port Security Settings . . . . . . . . . . . . . . 7-16
CLI: Configuring Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-17
Notice of Security Violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22
How the Intrusion Log Operates . . . . . . . . . . . . . . . . . . . . . . . . . . 7- 22
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7- 24
Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-25
Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . 7-27
Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-28
Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-28
Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-31
7
7-1

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Procurve 2512Procurve 2524

Table of Contents