Deploying MAC Lockdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-26

MAC Lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-26 Port Security and MAC Lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-29

Web: Displaying and Configuring Port Security Features . . . . . . 11-30

Reading Intrusion Alerts and Resetting Alert Flags . . . . . . . . . . . 11-30Notice of Security Violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-30 How the Intrusion Log Operates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-31 Keeping the Intrusion Log Current by Resetting Alert Flags . . . . . . 11-32

Menu: Checking for Intrusions, Listing Intrusion Alerts, and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-33

CLI: Checking for Intrusions, Listing Intrusion Alerts,

and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-34 Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . . . . 11-36

Web: Checking for Intrusions, Listing Intrusion

Alerts, and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-37

Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-38

12 Using Authorized IP Managers

Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-1

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2

Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3

Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3

Defining Authorized Management Stations . . . . . . . . . . . . . . . . . . . .

12-4

Overview of IP Mask Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

12-4

Menu: Viewing and Configuring IP Authorized Managers . . . . . . . . .

12-5

CLI: Viewing and Configuring Authorized IP Managers . . . . . . . . . . .

12-6

Listing the Switch’s Current Authorized IP Manager(s) . . . . . . .

12-6

Configuring IP Authorized Managers for the Switch . . . . . . . . .

12-7

Web: Configuring IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . 12-9 Web Proxy Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-9 How to Eliminate the Web Proxy Server . . . . . . . . . . . . . . . . . . . 12-9

Using a Web Proxy Server to Access the Web Browser Interface . . .

12-10

Web-Based Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-10

xiv