Security Features - HP J2415A Installation And Reference Manual

Advancestack 100vg hub-14
Table of Contents

Advertisement

Installing and Using HP Stack Manager

Security Features

The Hub-14 has built-in per-port security. After you have set up security by
clicking on the Security icon, security violations are reported in the Intruder
Log.
You can specify three levels of security on a single port or all ports on the
hub. You can set the hub to learn a port's authorized MAC address
automatically by either continuous learning or acquiring the first address
heard. Alternatively, you can assign an address directly.
The method used to learn the authorized MAC address should be chosen
based on the level of data security required on a port. For continuous or
first heard methods, the port learns the device's address from the source
address field in the training packet.
Continuous Method-provides minimum port security. The "continuous"
method allows the hub to continuously update the authorized MAC address
configured for a port. Each new device connected to the port becomes the
new authorized device. This security method is useful for dynamic
workgroups that experience frequent changes to end-user configuration and
require minimal data security protection.
First-Heard Method-provides medium port security. The "first heard"
method automatically assigns the first address detected on the port as the
authorized MAC address. This method is useful to quickly identify and
authorize end users. Under this method, the port will retrain automatically if an
intruder is detected on the port and will not permit an unauthorized end-node to
ever complete training.
Assign an Address-provides the highest security. You can assign an
authorized MAC address by entering it manually at the hub console interface
or at the network management station. Assigning a specific address provides
the maximum control of the port's authorized MAC address. The security
that you have configured for that port is implemented as soon as the address
is assigned. Again, the port will retrain automatically if an intruder is
detected on the port, and end-nodes other than the authorized one will not
be permitted to complete training.
2-12

Advertisement

Table of Contents
loading

Table of Contents