M A G N U M 6 K S W I T C H E S , M N S - 6 K U S E R G U I D E
attempts. This provides a chronological entry of all intrusions attempted on a specific
port.
The event log records events as single-line entries listed in chronological order, and serves
as a tool for isolating problems. Each event log entry is composed of four fields
Severity
– the level of severity (see below)
Date
– date the event occurred on. See Chapter 3 on setting the
date and time
on the
switch
Time
– time the event occurred on. See Chapter 3 on setting the
date and time
on the
switch
Log Description
– description of event as detected by the switch
Severity
is one of 8 severities described at the beginning of this section.
Authorized managers
This feature is available in MNS-6K-SECURE.
Just as port security allows and disallows specific MAC addresses from accessing a
network, the MNS-6K software can allow or block specific IP addresses or a range of IP
addresses to access the switch. The command used for that is
Syntax
access
– access configuration mode
Syntax
allow ip=<ipaddress> mask=<netmask> service=<name|list>
- authorize
managers
Syntax
deny ip=<ipaddress> mask=<netmask> service=<name|list>
- deny access
to a specific IP address(s) or a subnet
Syntax
remove ip=<ipaddress> mask=<netmask>
- remove specific IP address(s) or
subnet
Syntax
removeall
- remove all managers
Syntax
show ip-access
– display list of authorized managers
access
– context are the access commands
allow
– allow specified services for specified IP addresses – IP addresses can be individual
stations, a group of stations or subnets. The range is determined by the IP address and
netmask settings
102