Hp TopTools for Hubs and Switches Manual de usuario Pagina 199

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 234
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 198
Setting Up Security for a Device
Switch Intrusion Log
14-19
The Alert Log displays a Security Violation entry, with the system date
and time, and the port on which the violation occurred
The Intrusion Log lists the port number, the MAC address of the
intruding device, and the system time and date when the intrusion
occurred.
Figure 14-10.Security Violation Entries in the Alert Log
In the following figure, ports A1 and A2 have detected intrusions for which
their intrusion flags have not been reset, as indicated by the Ports with
Intrusion Flag entry. You must reset the intrusion flags for these ports before
the log can indicate any new intrusions for them. Ports A3 and A5 are not
listed, indicating that their intrusion flags have already been reset. These two
ports are ready to log any new intrusions.
Vista de pagina 198
1 2 ... 194 195 196 197 198 199 200 201 202 203 204 ... 233 234

Comentarios a estos manuales

Sin comentarios