14-35
Configuring and Monitoring Port Security
Reading Intrusion Alerts and Resetting Alert Flags
Reading Intrusion Alerts and Resetting
Alert Flags
Notice of Security Violations
When the switch detects an intrusion on a port, it sets an “alert flag” for that
port and makes the intrusion information available as described below.
While
the switch can detect additional intrusions for the same port, it does not list
the next chronological intrusion for that port in the Intrusion Log until the
alert flag for that port has been reset
.
When a security violation occurs on a port configured for Port Security, the
switch responds in the following ways to notify you:
■
The switch sets an alert flag for that port. This flag remains set until:
•
You use either the CLI, menu interface, or WebAgent to reset the
flag.
•
The switch is reset to its factory default configuration.
■
The switch enables notification of the intrusion through the following
means:
•
In the CLI:
–
The
show port-security intrusion-log
command displays the
Intrusion Log
–
The
log
command displays the Event Log
•
In the menu interface:
–
The Port Status screen includes a per-port intrusion alert
–
The Event Log includes per-port entries for security viola-
tions
•
In the WebAgent:
–
The Alert Log includes entries for per-port security violations
–
The Intrusion Log lists per-port security violation entries
•
In network management applications such as PCM+ via an SNMP
trap sent to a network management station
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......