9-31
Configuring and Monitoring Port Security
Reading Intrusion Alerts and Resetting Alert Flags
Figure 9-14. Example of Port Status Screen with Intrusion Alert on Port A3
2.
Type
[I]
(
Intrusion log
) to display the Intrusion Log.
Figure 9-15. Example of the Intrusion Log Display
The above example shows two intrusions for port A3 and one intrusion
for port A1. In this case, only the most recent intrusion at port A3 has not
been acknowledged (reset). This is indicated by the following:
•
Because the Port Status screen (figure 9-14 on page 9-31) does
not indicate an intrusion for port A1, the alert flag for the intru-
sion on port A1 has already been reset.
•
Since the switch can show only one uncleared intrusion per port,
the older intrusion for port A3 in this example has also been
previously reset.
The Intrusion Alert
column shows “Yes”
for any port on which
a security violation
has been detected.
System Time of Intrusion on Port A3
MAC Address of
Intruding Device
on Port A3
Indicates this intrusion on port A3
occurred prior to a reset (reboot) at
the indicated time and date.
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......