Setting Up Security for a Device

Switch Intrusion Log

The Alert Log displays a Security Violation entry, with the system date and time, and the port on which the violation occurred

The Intrusion Log lists the port number, the MAC address of the intruding device, and the system time and date when the intrusion occurred.

Figure 14-10.Security Violation Entries in the Alert Log

In the following figure, ports A1 and A2 have detected intrusions for which their intrusion flags have not been reset, as indicated by the Ports with Intrusion Flag entry. You must reset the intrusion flags for these ports before the log can indicate any new intrusions for them. Ports A3 and A5 are not listed, indicating that their intrusion flags have already been reset. These two ports are ready to log any new intrusions.

14-19

Page 199
Image 199
HP Networking TopTool Products manual Security Violation Entries in the Alert Log