6-25
Configuration Reference
Config
uration Refe
ren
c
e
Figure 6-11. The Intrusion Log Window
Viewing the Intruder Information in the Browser Interface
To view unauthorized addresses in the Intruder Log from the Browser Inter-
face, perform the following tasks:
1.
From the Tab Bar, click on the Security Tab. The Browser Interface
displays the Security Button Bar.
2.
From the Security Button Bar, click on the Intruder Log Button. The
Browser Interface displays the Intruder Log Window.
Note that an IP Address
is reported here and
NOT a MAC address.
This indicates that the
violation was a
manager intrusion.
Agent.bk : AGTCH6.FM5 Page 25 Thursday, February 19, 1998 2:13 PM
Содержание J3128A AdvanceStack 10Base-T Hub-8E
Страница 13: ...Agent bk AGTCH1 FM5 Page 4 Thursday February 19 1998 2 13 PM ...
Страница 31: ...Agent bk AGTCH3 FM5 Page 8 Thursday February 19 1998 2 13 PM ...
Страница 57: ...Agent bk AGTCH5 FM5 Page 4 Thursday February 19 1998 2 13 PM ...
Страница 176: ...6 119 Configuration Reference Configuration Reference Agent bk AGTCH6 FM5 Page 119 Thursday February 19 1998 2 13 PM ...
Страница 177: ...Agent bk AGTCH6 FM5 Page 120 Thursday February 19 1998 2 13 PM ...
Страница 183: ...Agent bk AGTCH7 FM5 Page 6 Thursday February 19 1998 2 13 PM ...
Страница 193: ...10 Index Index Agent bk AGENT IX Page 10 Thursday February 19 1998 2 13 PM ...