14-39
Configuring and Monitoring Port Security
Operating Notes for Port Security
Figure 14-18.Example of Log Listing With and Without Detected Security Violations
From the Menu Interface:
In the Main Menu, click on
4. Event Log
and use
Next page
and
Prev page
to review the Event Log contents.
For More Event Log Information.
See “Using the Event Log To Identify
Problem Sources” in the “Troubleshooting” chapter of the
Management and
Configuration Guide
for your switch.
Operating Notes for Port Security
Identifying the IP Address of an Intruder.
The Intrusion Log lists
detected intruders by MAC address. If you are using HP E-PCM Plus to manage
your network, you can use the device properties page to link MAC addresses
to their corresponding IP addresses.
Proxy Web Servers.
If you are using the WebAgent through a switch port
configured for Static port security, and your browser access is through a proxy
web server, then it is necessary to do the following:
■
Enter your PC or workstation MAC address in the port’s Authorized
Addresses list.
■
Enter your PC or workstation’s IP address in the switch’s IP Authorized
Managers list. See “Using Authorized IP Managers” in the
Management
and Configuration Guide
for your switch.)
Log Listing with
Security Violation
Detected
Log Listing with No
Security Violation
Detected
Log Command
with
“security” for
Search String
HP Switch(config)# log security
Keys: W=Warning I=Information
M=Major D=Debug E=Error
---- Event Log listing: Events Since Boot ----
W 09/07/11 01:18:15 FFI: port 2 - Security Viola-
tion
W 09/07/11 04:28:08 FFI: port 1 - Security Viola-
tion
---- Bottom of Log : Events Listed = 2 ----
HP Switch(config)# log security
Keys: W=Warning I=Information
M=Major D=Debug E=Error
---- Event Log listing: Events Since Boot ----
---- Bottom of Log : Events Listed = 2 ----
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......