Setting Up Security for a Device
The Hub Intrusion Log
Figure 14-5. Setting the Security Policy for Selected Ports
The Hub Intrusion Log
The Intrusion Log page lets you view security intrusions (violations) of a device. The information displayed includes:
■
■Intruder
■