Configuring Permitted Ouis - HP 1920 Gigabit Ethernet Switch Series User Manual

Hp 1920 gigabit ethernet switch series
Hide thumbs Also See for 1920 Gigabit Ethernet Switch Series:
Table of Contents

Advertisement

Item
Enable Intrusion
Protection
Enable Outbound
Restriction
Ignore
Authorization

Configuring permitted OUIs

1.
From the navigation tree, select Authentication > Port Security.
The Port Security page as shown in
2.
In the Advanced Port Security Configuration area, click Permitted OUIs.
Figure 417 Permitted OUIs
3.
Enter the 48-bit MAC address in the format of H-H-H in the OUI Value field.
4.
Click Add.
The system automatically saves the first 24 bits as an OUI value.
Description
Specifies whether to enable intrusion protection, and selects an action to be taken upon
detection of illegal frames.
Available actions:
Disable Port Temporarily—Disables the port for a period of time. The period can be
configured in the global settings. For more information, see
settings for port
security."
Disable Port Permanently—Disables the port permanently upon detecting an illegal
frame received on the port. The port does not come up unless you bring it up manually.
Block MAC—Adds the source MAC addresses of illegal frames to the blocked MAC
addresses list and discards the frames. All subsequent frames sourced from a blocked
source MAC address will be dropped. A blocked MAC address is restored to normal
state after being blocked for 3 minutes. The interval is fixed and cannot be changed.
Specifies whether to enable the outbound traffic control, and selects a control method.
Available control methods:
Only MAC-Known Unicasts—Allows only unicasts frames with their destination MAC
addresses being authenticated to pass through.
Only Broadcasts and MAC-Known Unicasts—Allows only broadcast and unicasts
packets with their destination MAC addresses being authenticated to pass through.
Only Broadcasts, Multicasts, and MAC-Known Unicasts—Allows only broadcast,
multicast, and unicasts packets with their destination MAC addresses being
authenticated to pass through.
Specifies whether to configure the port to ignore the authorization information from the
authentication server.
The authorization information is delivered by the authentication server to the device after
an 802.1X user or MAC authenticated user passes authentication.
Figure 409
appears.
429
"Configuring global

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Officeconnect 1920 series

Table of Contents