6-25
Configuration Reference
Config
uration Refe
ren
c
e
Figure 6-11. The Intrusion Log Window
Viewing the Intruder Information in the Browser Interface
To view unauthorized addresses in the Intruder Log from the Browser Inter-
face, perform the following tasks:
1.
From the Tab Bar, click on the Security Tab. The Browser Interface
displays the Security Button Bar.
2.
From the Security Button Bar, click on the Intruder Log Button. The
Browser Interface displays the Intruder Log Window.
Note that an IP Address
is reported here and
NOT a MAC address.
This indicates that the
violation was a
manager intrusion.
Agent.bk : AGTCH6.FM5 Page 25 Thursday, February 19, 1998 2:13 PM
Summary of Contents for J3128A AdvanceStack 10Base-T Hub-8E
Page 13: ...Agent bk AGTCH1 FM5 Page 4 Thursday February 19 1998 2 13 PM ...
Page 31: ...Agent bk AGTCH3 FM5 Page 8 Thursday February 19 1998 2 13 PM ...
Page 57: ...Agent bk AGTCH5 FM5 Page 4 Thursday February 19 1998 2 13 PM ...
Page 177: ...Agent bk AGTCH6 FM5 Page 120 Thursday February 19 1998 2 13 PM ...
Page 183: ...Agent bk AGTCH7 FM5 Page 6 Thursday February 19 1998 2 13 PM ...
Page 193: ...10 Index Index Agent bk AGENT IX Page 10 Thursday February 19 1998 2 13 PM ...