Alcatel-Lucent 6850-48 ネットワークガイド

ページ / 1162
Configuring Network Security
Configuring Network Security
page 47-6
OmniSwitch AOS Release 6 Network Configuration Guide
September 2009
Configuring Network Security
The following subsections describe how to configure Network Security using CLI commands.
Creating Monitoring-Group and Associating Port Range
 command is used to create a monitoring-group and configure the port associations 
for that group.
To associate a single port with the monitoring-group, enter netsec group followed by the group name and 
port followed by the slot number, a slash(/),and the port number. For example, to associate port 3 on slot 2 
with monitoring-group called “group1”, enter:
-> netsec group group1 port 2/3
To associate a range of ports with a monitoring-group, enter netsec group followed by the group name 
and port followed by the slot number, a slash(/), the first port number, a hyphen(-), and the last port 
number. For example, to associate ports 3 through 5 on slot 2 with monitoring-group “group1”, enter:
-> netsec group group1 port 2/3-5
Disassociating Port Range from Monitoring-Group
To disassociate a single port from the monitoring-group, enter no netsec group followed by the group 
name and port followed by the slot number, a slash(/), and the port number. For example, to disassociate 
port 3 on slot 2 from the monitoring-group “group1”, enter:
-> no netsec group group1 port 2/3
To disassociate a range of ports from the monitoring-group, enter no netsec group followed by the group 
name and port followed by the slot number, a slash(/), the first port number, a hyphen(-), and the last port 
number. For example, to disassociate ports 3 through 5 on slot 2 from the monitoring-group “group1”, 
enter:
-> no netsec group group1 port 2/3-5
Configuring Anomaly to be Monitored 
 command allows you to specify the anomaly to be monitored for the monitor-
ing-group and configure the various anomaly parameters of a monitoring-group. 
The following table lists the netsec group anomaly command options for specifying anomalies:
anomaly name
arp-addr-scan
arp-flood
arp-failure
icmp-addr-scan
icmp-flood
icmp-unreachable