Configuring and Monitoring Port Security
Reading Intrusion Alerts and Resetting Alert Flags
The log shows the most recent intrusion at the top of the listing. You cannot
delete Intrusion Log entries (unless you reset the switch to its factory-default
configuration). Instead, if the log is filled when the switch detects a new
intrusion, the oldest entry is dropped off the listing and the newest entry
appears at the top of the listing.
Keeping the Intrusion Log Current by Resetting Alert
Flags
When a violation occurs on a port, an alert flag is set for that port and the
violation is entered in the Intrusion Log. The switch can detect and handle
subsequent intrusions on that port, but will not log another intrusion on the
port until you reset the alert flag for either all ports or for the individual port.
Note on
On a given port, if the intrusion action is to send an SNMP trap and then disable
Send-Disable
the port (
send-disable
), and an intruder is detected on the port, then the switch
Operation
sends an SNMP trap, sets the port’s alert flag, and disables the port. If you re-
enable the port without resetting the port’s alert flag, then the port operates
as follows:
■
The port comes up and will block traffic from unauthorized devices it
detects.
■
If the port detects another intruder, it will send another SNMP trap, but
will not become disabled again unless you first reset the port’s intrusion
flag.
This operation enables the port to continue passing traffic for authorized
devices while you take the time to locate and eliminate the intruder. Other-
wise, the presence of an intruder could cause the switch to repeatedly disable
the port.
11-36
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......