HP ProCurve Threat Management Solution Design Guide 2009-04
3-5
Products
HP ProCurve Hardware
Response—In responding to detected threats, NIM relies on several features of switches and
wireless devices. Table 3-2 indicates which switches and wireless devices support these
features. The relevant features for threat detection and response are listed below.
■ Port shutdown—NIM can direct most HP ProCurve switches to block traffic on a specified
port (typically the port where an attack originates).
■ MAC lockout—NIM can direct some switches and wireless devices to deny traffic from a
specified MAC address.
■ Rate limiting—On the switches that support rate limiting, NIM can limit the bandwidth
allowed on a specified port (typically the port where an attack originates).
■
VLAN assignment
—NIM can direct most HP ProCurve switches to re-assign a port to a
specified VLAN (typically a quarantine VLAN that isolates the offender and allows remedial
action to be taken).
■
Local mirror reconfiguration
—For many HP ProCurve switches, NIM can direct the switch
to copy traffic from specified ports to a local mirror port on the same switch (typically for
analysis by an IDS).
■ Remote mirror reconfiguration—For select HP ProCurve switches, NIM can direct the
switch to copy traffic from specified ports to a remote mirror port on a different switch
(typically for analysis by an IDS).
■ MAC mirroring reconfiguration—For select HP ProCurve switches, NIM can direct the
switch to copy traffic from a certain source MAC address or to a certain destination MAC
address and send it to either a local mirror port or a remote mirror port.