14-39
Configuring and Monitoring Port Security
Operating Notes for Port Security
Figure 14-18.Example of Log Listing With and Without Detected Security Violations
From the Menu Interface:
In the Main Menu, click on
4. Event Log
and use
Next page
and
Prev page
to review the Event Log contents.
For More Event Log Information.
See “Using the Event Log To Identify
Problem Sources” in the “Troubleshooting” chapter of the
Management and
Configuration Guide
for your switch.
Operating Notes for Port Security
Identifying the IP Address of an Intruder.
The Intrusion Log lists
detected intruders by MAC address. If you are using HP E-PCM Plus to manage
your network, you can use the device properties page to link MAC addresses
to their corresponding IP addresses.
Proxy Web Servers.
If you are using the WebAgent through a switch port
configured for Static port security, and your browser access is through a proxy
web server, then it is necessary to do the following:
■
Enter your PC or workstation MAC address in the port’s Authorized
Addresses list.
■
Enter your PC or workstation’s IP address in the switch’s IP Authorized
Managers list. See “Using Authorized IP Managers” in the
Management
and Configuration Guide
for your switch.)
Log Listing with
Security Violation
Detected
Log Listing with No
Security Violation
Detected
Log Command
with
“security” for
Search String
HP Switch(config)# log security
Keys: W=Warning I=Information
M=Major D=Debug E=Error
---- Event Log listing: Events Since Boot ----
W 09/07/11 01:18:15 FFI: port 2 - Security Viola-
tion
W 09/07/11 04:28:08 FFI: port 1 - Security Viola-
tion
---- Bottom of Log : Events Listed = 2 ----
HP Switch(config)# log security
Keys: W=Warning I=Information
M=Major D=Debug E=Error
---- Event Log listing: Events Since Boot ----
---- Bottom of Log : Events Listed = 2 ----
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......