Management and Configuration Guide K/KA/KB.15.15

Table 24 Event Log system modules
Documented in HP Switch
hardware/software guide
DescriptionSystem module
Access Security Guide802.1X authentication: Provides
access control on a per-client or
per-port basis:
802.1x
Client-level security that allows LAN
access to 802.1X clients (up to 32
per port) with valid user credentials
Port-level security that allows LAN
access only on ports on which a
single 802.1X-capable client
(supplicant) has entered valid
RADIUS user credentials
Advanced Traffic Management GuideACLs: Filter layer-3 IP traffic to or from
a host to block unwanted IP traffic and
acl
block or limit other protocol traffic such
as TCP, UDP, IGMP, and ICMP. ACEs
specify the filter criteria and an action
(permit or deny) to take on a packet
if it meets the criteria.
Management and Configuration GuideAddress Table Manager: Manages
MAC addresses that the switch has
addrmgr
learned and are stored in the switch's
address table.
Access Security GuideDynamic ARP Protection: Protects the
network from ARP cache poisoning.
arp-protect
Only valid ARP requests and
responses are relayed or used to
update the local ARP cache. ARP
packets with invalid IP-to-MAC address
bindings advertised in the source
protocol address and source physical
address fields are discarded.
Access Security GuideAuthorization: A connected client must
receive authorization through web,
auth
AMC, RADIUS-based,
TACACS+-based, or 802.1X
authentication before it can send
traffic to the switch.
Management and Configuration GuideCisco Discovery Protocol: Supports
reading CDP packets received from
cdp
neighbor devices, enabling a switch
to learn about adjacent CDP devices.
HP does not support the transmission
of CDP packets to neighbor devices.
Installation Guides Management and
Configuration Guide
Hardware operation, including
modules and ports, power supply,
chassis
fans, transceivers, CPU interrupt
errors, switch temperature, and so on.
Chassis messages include events on
POE operation.
Access Security GuideConnection-rate filtering: Used on the
network edge to protect the network
connfilt
from attack by worm-like malicious
code by detecting hosts that are
generating IP traffic that exhibits this
behavior and (optionally) either
Unusual network activity 383