ProCurve Switches 2512 and 2524 Management and Configuration Guide
7-9
Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access
Configuring and Monitoring Port Security
Using Passwords, Port 
Security, and Authorized IP 
Configuring and Monitoring Port 
Security
Using Port Security, you can configure each switch port with a unique list of 
the MAC addresses of devices that are authorized to access the network 
through that port. This enables individual ports to detect, prevent, and log 
attempts by unauthorized devices to communicate through the switch. 
Note This feature does not prevent intruders from receiving broadcast and multi-
cast traffic.
Basic Operation
Default Port Security Operation. The default port security setting for 
each port is off, or “continuous”. That is, any device can access a port without 
causing a security reaction. 
Intruder Protection. A port that detects an “intruder” blocks the intruding 
device from transmitting to the network through that port.
General Operation for Port Security. On a per-port basis, you can 
configure security measures to block unauthorized devices, and to send notice 
of security violations. Once you have configured port security, you can then 
monitor the network for security violations through one or more of the 
following:
■ Alert flags that are captured by network management tools such as 
HP TopTools for Hubs & Switches
■ Alert Log entries in the switch’s web browser interface
■ Event Log entries in the console interface
Feature Default Menu CLI Web
Displaying Current Port Security n/a — page 7-16 page 7-21
Configuring Port Security disabled — page 7-17 page 7-21
Intrusion Alerts and Alert Flags n/a page 7-27 page 7-25 page 7-28










