W
EB
C
ONFIGURATION
S
OFTWARE
R
EVISED
2018-09-21
S
ECURITY
D
RAWING
N
O
. LP0991-G
2-93
N-Tron
®
Series NT24K
®
Software Manual
Delete
All
Authorization
List
To delete the complete authorization list associated with the selected port(s), click on
Delete All
button. A
confirmation dialog pop-up will appear, prompting the user to confirm the action.
Make
All
Learned
authorization
entries
Static
To make all learned authorization entries associated with the selected port(s) as Static, click on
Make All Static
button. A confirmation dialog pop-up will appear, prompting the user to confirm the action.
Note:
Ports that are set to Single MAC cannot be included in static entries in the Authorization List.
2.22.2.3
Ports
Security
‐
Intruder
Log
The Intruder Log page displays a list of unauthorized MAC addresses that attempted to access the secured device.
Each intruder entry in the log is based on MAC address and Port. Multicast source MAC addresses will not be
displayed in the Intruder Log table. The log is ordered by most recent first, based on the system up time and time
stamp. The maximum number of entries is 100. If more than 100 intruders are detected, the oldest entries are
deleted. The log is not saved through a power cycle.
To authorize a particular MAC Address from the Intruder Log, click on the Modify button and an "Authorize" field
will be added as a checkbox as shown below: