beautypg.com

Configuring port security—planning, Configuring port security—planning -12, Configuring port security – HP TopTools for Hubs and Switches User Manual

Page 192

background image

14-12

Setting Up Security for a Device
Switch Port Security

Automatically sends notice of an attempted security violation to the
switch's Intrusion Log and to the Alert Log in the switch's web
browser interface.

Sends an SNMP trap notifying of an attempted security violation to a
network management station. For more information on configuring
the switch for SNMP management, see the Management and Config-
uration Guide you received with the switch.

Prevent Eavesdropping: Block outbound traffic with unknown destina-
tion addresses from exiting through the port. This prevents an unautho-
rized device on the port from eavesdropping on the flooded unicast traffic
intended for other devices.

N o t e

The switch security measures block unauthorized traffic without disabling the
port. This implementation enables you to apply the security configuration to
ports on which hubs or other switches are connected, and to maintain security
while also maintaining network access to authorized users.

Configuring Port Security—Planning

Plan your port security configuration and monitoring according to the
following:

On which ports do you want to configure intruder security?

Which devices (MAC addresses) are authorized on each port?

For each port, what security actions do you want:

Block intruders from transmitting to the network?

Prevent intruders from eavesdropping on network traffic?

How do you want to learn of the security violation attempts the switch
detects:

Through network management, that is, do you want an SNMP trap
sent to a network management station when a port detects a security
violation attempt?

Through the switch's web browser interface (Alert Log and Intrusion
Log)?

Through the Event Log and the Intrusion Log in the switch console
interface?

Use the web browser interface and/or the switch console to configure port
security. The following table describes the parameters.

Table 14-3. Port Security Control Parameters

Parameter

Description

Port

Identifies the switch port to view or configure for port security