beautypg.com

Proxy web servers, Security violations, Proxy web servers -21 – HP TopTools for Hubs and Switches User Manual

Page 201: Security violations -21

background image

Setting Up Security for a Device

Operating Notes for Port Security

14-21

Proxy Web Servers

If you are using the switch’s web browser interface through a switch port
configured for Static port security, and your browser access is through a proxy
web server, it is necessary to do the following:

Enter your PC or workstation MAC address in the port's

Authorized

Addresses list.

Enter your PC or workstation's IP address in the switch's

IP Authorized

Managers list.

Without both of the above configured, the switch detects only the proxy
server’s MAC address, and not your PC or workstation MAC address, and
interprets your connection as unauthorized.

Security Violations

If you reset the switch (using the

Reset button, Device Reset, or Reboot Switch),

the Intrusion Log will list the time of all currently logged intrusions as “prior
to” the time of the reset.

Intrusion Flag Status for Entries Forced Off of the
Intrusion Log

If the Intrusion Log is full of entries for which the intrusion flags have not been
reset, a new intrusion will cause the oldest entry to drop off the list, but will
not change the intrusion flag status for the port referenced in the dropped
entry. This means that even if an entry is forced off of the Intrusion Log, no
new intrusions can be logged on the port referenced in that entry until you
reset the intrusion flags.