MAC Lockdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-22

Differences Between MAC Lockdown and Port Security . . . . . . . . 13-24

MAC Lockdown Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . 13-25

Deploying MAC Lockdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-26

MAC Lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-30 Port Security and MAC Lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-32

Web: Displaying and Configuring Port Security Features . . . . . . 13-33

Reading Intrusion Alerts and Resetting Alert Flags . . . . . . . . . . . 13-33Notice of Security Violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-33 How the Intrusion Log Operates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-34 Keeping the Intrusion Log Current by Resetting Alert Flags . . . . . . 13-35

Menu: Checking for Intrusions, Listing Intrusion Alerts, and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-36

CLI: Checking for Intrusions, Listing Intrusion Alerts,

and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-37 Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . . . . 13-39

Web: Checking for Intrusions, Listing Intrusion

Alerts, and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-40

Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-41

14 Using Authorized IP Managers

Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-1

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-2

Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-3

Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-3

Defining Authorized Management Stations . . . . . . . . . . . . . . . . . . . . 14-3 Overview of IP Mask Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-4 Menu: Viewing and Configuring IP Authorized Managers . . . . . . . . . 14-5 CLI: Viewing and Configuring Authorized IP Managers . . . . . . . . . . . 14-6 Listing the Switch’s Current Authorized IP Manager(s) . . . . . . . 14-6 Configuring IP Authorized Managers for the Switch . . . . . . . . . . 14-6

Web: Configuring IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . 14-8 Web Proxy Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-8 How to Eliminate the Web Proxy Server . . . . . . . . . . . . . . . . . . . 14-9

xvii