HP 4100GL User Manual
Page 183
7
Configuring and Monitoring Port Security
Contents
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Blocking Unauthorized Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Trunk Group Exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5
Port Security Command Options and Operation
Displaying Current Port Security Settings . . . . . . . . . . . . . . . . . . . . . . . 7-9
Web: Displaying and Configuring Port Security Features
. . . . . . . 7-15
Reading Intrusion Alerts and Resetting Alert Flags
Notice of Security Violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15
How the Intrusion Log Operates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-16
Keeping the Intrusion Log Current by Resetting Alert Flags . . . . . . . 7-17
Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . 7-21
Web: Checking for Intrusions, Listing Intrusion Alerts, and Resetting
Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22
Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22;
7-1