- Community Home
- >
- Networking
- >
- Switching and Routing
- >
- Comware Based
- >
- H3C - Port security
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-21-2011 07:36 AM
10-21-2011 07:36 AM
H3C - Port security
Good morning gentlemans,
I'm currently setting up an H3C S5120 switch running the latest available firmware (2210).
I'm running a port-security configuration using static mac addresses. My setup involved ports with computer and port with computer behind a phone.
Here's my issues:
- When setting up port-security with static mac addresse on a port with a phone, the phone's correctly go to the voice vlan but keeps sending intrusion traps on the data vlan. Is there any way to avoid this behavior?
- From what I tested, it seems that a mac addresses allowed on a given port/vlan association (ie: interface gig 1/0/1 vlan 10) won't trigger any intrusion traps if plugged into another switchport configured in the same vlan (ie: interface gig 1/0/2 vlan 10). That's not the usual behavior in port-security.
Thanks for helping me figure this out.