![HP HP ProCurve Series 6600 Access Security Manual Download Page 732](http://html.mh-extra.com/html/hp/hp-procurve-series-6600/hp-procurve-series-6600_access-security-manual_163101732.webp)
14-42
Configuring and Monitoring Port Security
Operating Notes for Port Security
Figure 14-24.Example of Log Listing With and Without Detected Security Violations
From the Menu Interface:
In the Main Menu, click on
4. Event Log
and use
Next page
and
Prev page
to review the Event Log contents.
For More Event Log Information.
See “Using the Event Log To Identify
Problem Sources” in the “Troubleshooting” chapter of the
Management and
Configuration Guide
for your switch.
Operating Notes for Port Security
Identifying the IP Address of an Intruder.
The Intrusion Log lists
detected intruders by MAC address. If you are using PCM+ to manage your
network, you can use the device properties page to link MAC addresses to
their corresponding IP addresses.
Proxy Web Servers.
If you are using the WebAgent through a switch port
configured for Static port security, and your browser access is through a proxy
web server, then it is necessary to do the following:
■
Enter your PC or workstation MAC address in the port’s Authorized
Addresses list.
■
Enter your PC or workstation’s IP address in the switch’s IP Authorized
Managers list. See “Using Authorized IP Managers” in the
Management
and Configuration Guide
for your switch.)
HP Switch(config)# log security
Keys: W=Warning I=Information
M=Major D=Debug E=Error
---- Event Log listing: Events Since Boot ----
W 08/01/02 01:18:15 FFI: port 2 - Security Violation
W 08/01/02 04:28:08 FFI: port 2 - Security Violation
---- Bottom of Log : Events Listed = 2 ----
HP Switch(config)# log security
Keys: W=Warning I=Information
M=Major D=Debug E=Error
---- Event Log listing: Events Since Boot ----
---- Bottom of Log : Events Listed = 0 ----
Log Listing with
Security Violation
Detected
Log Listing with No
Security Violation
Detected
Log Command
with
“security” for
Search String
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......