Port Security Configuration; Port Security Overview; Introduction; Port Security Features - H3C S5100-SI Operation Manual

Ethernet switches
Hide thumbs Also See for H3C S5100-SI:
Table of Contents

Advertisement

1

Port Security Configuration

When configuring port security, go to these sections for information you are interested in:

Port Security Overview

Port Security Configuration Task List
Displaying and Maintaining Port Security Configuration
Port Security Configuration Example
Port Security Overview

Introduction

Port security is a security mechanism for network access control. It is an expansion to the current
802.1x and MAC address authentication.
Port security allows you to define various security modes that enable devices to learn legal source MAC
addresses, so that you can implement different network security management as needed.
With port security enabled, packets whose source MAC addresses cannot be learned by your switch in
a security mode are considered illegal packets, The events that cannot pass 802.1x authentication or
MAC authentication are considered illegal.
With port security enabled, upon detecting an illegal packet or illegal event, the system triggers the
corresponding port security features and takes pre-defined actions automatically. This reduces your
maintenance workload and greatly enhances system security and manageability.

Port Security Features

The following port security features are provided:
NTK (need to know) feature: By checking the destination MAC addresses in outbound data frames
on the port, NTK ensures that the switch sends data frames through the port only to successfully
authenticated devices, thus preventing illegal devices from intercepting network data.
Intrusion protection feature: By checking the source MAC addresses in inbound data frames or the
username and password in 802.1x authentication requests on the port, intrusion protection detects
illegal packets or events and takes a pre-set action accordingly. The actions you can set include:
disconnecting the port temporarily/permanently, and blocking packets with the MAC address
specified as illegal.
Trap feature: When special data packets (generated from illegal intrusion, abnormal login/logout or
other special activities) are passing through the switch port, Trap feature enables the switch to
send Trap messages to help the network administrator monitor special activities.

Port Security Modes

Table 1-1
describes the available port security modes:
1-1

Advertisement

Table of Contents
loading

This manual is also suitable for:

H3c s5100-ei

Table of Contents