9-36
Configuring and Monitoring Port Security
Operating Notes for Port Security
Web: Checking for Intrusions, Listing Intrusion Alerts,
and Resetting Alert Flags
1.
Check the Alert Log by clicking on the
Status
tab and the
[
Overview]
button. If there is a “Security Violation” entry, do the following:
a.
Click on the
Security
tab.
b.
Click on
[Intrusion Log]
. “Ports with Intrusion Flag” indicates any ports
for which the alert flag has not been cleared.
c.
To clear the current alert flags, click on
[Reset Alert Flags]
.
To access the Web-based Help provided for the switch, click on
[?]
in the Web
browser screen.
Operating Notes for Port Security
Identifying the IP Address of an Intruder.
The Intrusion Log lists
detected intruders by MAC address. Proxy Web Servers
If you are using the switch’s Web browser interface through a switch port
configured for Static port security, and your browser access is through a proxy
Web server, then it is necessary to do the following:
■
Enter your PC or workstation MAC address in the port’s Authorized
Addresses list.
■
Enter your PC or workstation’s IP address in the switch’s IP Autho-
rized Managers list. See chapter 10, “Using Authorized IP Managers”.)
Without both of the above configured, the switch detects only the proxy
server’s MAC address, and not your PC or workstation MAC address, and
interprets your connection as unauthorized.
“Prior To” Entries in the Intrusion Log.
If you reset the switch (using the
Reset button, Device Reset, or Reboot Switch), the Intrusion Log will list the
time of all currently logged intrusions as “prior to” the time of the reset.
Alert Flag Status for Entries Forced Off of the Intrusion Log.
If the
Intrusion Log is full of entries for which the alert flags have not been reset, a
new intrusion will cause the oldest entry to drop off the list, but will not change
Содержание ProCurve 2510-24
Страница 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Страница 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Страница 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 316: ...8 Index ...
Страница 317: ......