beautypg.com

Security management – Asante Technologies 8000 User Manual

Page 99

background image

Security Management

Page 4-9

event. For information on configuring trap receivers, see “SNMP
Configuration” i
n Chapter 3.

Security Management

The IntraCore 8000’s security management options are summarized in
Table 4-2.

Table 4-2 Security Management Options

Security Option

Description

Action

Duplicated IP Detec-
tion (Monitoring)

Detects the use of a single IP
address by two stations.

Detects and logs MAC
addresses of both stations and
the ports they accessed.

Duplicated IP Trap

Sends trap with MAC
addresses of both stations and
the ports they accessed.

Station Movement Trap

Detects the movement of any
end station from one port to
another.

Sends trap with the station’s
MAC address and IP address
(if available) and the switch’s
port numbers.

Port New Node Trap

Detects the connection of any
new device to the secured
port.

Sends trap with the new
node’s MAC address and IP
address (if available) and the
port to which they are con-
nected.

Port Trusted MAC
Address

Creates a set of port-trusted
MAC addresses for use by
other security measures.

None.

Port Intruder Detection
Trap

Disallows traffic from MAC
addresses not belonging to
the port trusted MAC address
set. Station movement is also
disallowed.

Sends trap with intruder’s
MAC address.

Port Lock

Disallows traffic from MAC
addresses that do not belong
to the port trusted MAC
address set. Station move-
ment is also disallowed.

Disables the port if an
intruder is detected. Sends
trap with the port number, and
the intruder’s MAC address,
VLAN ID, and IP address (if
available).