Introduction To Port Security; Port Security Overview; Port Security Features; Port Security Modes - Huawei Quidway S3900 Series Operation Manual

Hide thumbs Also See for Quidway S3900 Series:
Table of Contents

Advertisement

Operation Manual – Port Security & Port Binding
Quidway S3900 Series Ethernet Switches-Release 1510

Chapter 1 Port Security Configuration

1.1 Introduction to Port Security

1.1.1 Port Security Overview

Port security is a security mechanism that controls network access. It is an expansion
to the current 802.1x and MAC address authentication.
Port Security mainly functions to define various security modes that allow devices to
learn legal source MAC addresses for the corresponding network management
purposes. Packets whose source MAC addresses a device cannot learn in a security
mode and packets that fail to pass 802.1x authentication are considered illegal.
Upon detecting an illegal packet, the system enables the corresponding feature and
handles the packet using the predefined method. This reduces your maintenance
workload and greatly enhances system security and manageability.

1.1.2 Port Security Features

The following port security features are provided:
1)
NTK: Need to know. By means of checking the destination MAC addresses in the
outbound packets of a given port, NTK can ensure that only authenticated devices
can receive the data packets, and thus prevent data from being intercepted.
2)
Intrusion Protection: By checking the source MAC addresses or the username and
password for 802.1x authentication in the inbound packets through a given port,
intrusion protection detects illegal packets and events and takes actions
accordingly. These include disconnecting ports temporarily/permanently and
filtering packets with the MAC address, thereby ensuring port security.
3)
Device Tracking: Refers to the feature that when certain types of data packets
(due to illegal intrusion, improper manner of logging on and off) are transmitted,
the switch will send Trap message to help the network administrators monitor and
control such actions.

1.1.3 Port Security Modes

Table 1-1 details the available port security modes:
Huawei Technologies Proprietary
1-1
Chapter 1 Port Security Configuration

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents