Configuring Port Security; Port Security Features - HP A6600 Configuration Manual

Hide thumbs Also See for A6600:
Table of Contents

Advertisement

Configuring port security

Port security provides MAC-based network access control. It prevents unauthorized access to the network
by checking the source MAC address of inbound traffic and prevents access to unauthorized devices by
checking the destination MAC address of outbound traffic.
Port security enables you to control MAC address learning and authentication on ports. This enables the
port to learn legal source MAC addresses.
With port security enabled, frames whose source MAC addresses cannot be learned by the device in a
security mode are considered illegal; the events that users do not pass 802.1X authentication or MAC
authentication are considered illegal.
Upon detection of illegal frames or events, the device takes the predefined action automatically. When
enhancing the system security, this reduces your maintenance burden greatly.
NOTE:
The security modes of the port security feature provide extended and combined use of 802.1X
authentication and MAC authentication. They apply to scenarios that require both 802.1X
authentication and MAC authentication. For scenarios that require only 802.1X authentication or MAC
authentication, HP recommends that you configure 802.1X authentication or MAC authentication rather
than port security. For more information about 802.1X and MAC authentication, see
802.1X" and

Port security features

NTK
The NTK feature prevents the interception of network traffic by checking the destination MAC address in
outbound frames. The feature ensures that frames are sent only to devices and hosts that have passed
authentication or that are using MAC addresses on the MAC address list.
Intrusion protection
The intrusion protection feature checks the source MAC address in inbound frames for illegal frames and
takes a predefined action on each detected illegal frame. The action can be disabling the port
temporarily, disabling the port permanently, or blocking frames from the illegal MAC address for 3
minutes (not user configurable).
Port security traps
configure the port security module to send traps for port security events such as login, logoff, and MAC
authentication. These traps help you monitor user behaviors.
"Configuring MAC
authentication."
173
"Configuring

Advertisement

Table of Contents
loading

Table of Contents