HP 6125G HP 6125G & 6125G/XG Blade Switches Security Configuration Gui - Page 123
Configuring port security, Overview, Port security features, NTK, Intrusion protection
View all HP 6125G manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 123 highlights
Configuring port security Overview Port security combines and extends 802.1X and MAC authentication to provide MAC-based network access control. It applies to a network that requires different authentication methods for different users on a port. Port security prevents unauthorized access to the network by checking the source MAC address of inbound traffic and prevents access to unauthorized devices by checking the destination MAC address of outbound traffic. Port security can control MAC address learning and authentication on a port to make sure that the port learns only trusted MAC addresses. A frame is illegal, if its source MAC address cannot be learned in a port security mode or it is from a client that has failed 802.1X or MAC authentication. The port security feature can automatically take a pre-defined action on illegal frames. This automatic mechanism enhances network security and reduces human intervention. NOTE: For scenarios that require only 802.1X authentication or MAC authentication, HP recommends you configure 802.1X authentication or MAC authentication rather than port security. For more information about 802.1X and MAC authentication, see "Configuring 802.1X" and "Configuring MAC authentication." Port security features NTK The need to know (NTK) feature prevents traffic interception by checking the destination MAC address in the outbound frames. The feature guarantees that frames are sent only to hosts that have passed authentication or whose MAC addresses have been learned or configured on the access device. Intrusion protection The intrusion protection feature checks the source MAC address in inbound frames for illegal frames and takes a pre-defined action on each detected illegal frame. The action can be disabling the port temporarily, disabling the port permanently, or blocking frames from the illegal MAC address for three minutes (not user configurable). Port security traps You can configure the port security module to send traps for port security events such as login, logoff, and MAC authentication. These traps help you monitor user behaviors. Port security modes Port security supports the following categories of security modes: 113