xxxiv OmniSwitch 6800/6850/9000 Network Configuration Guide March 2008
Network Security Overview ..........................................................................................39-4
Anomalies ...............................................................................................................39-4
Monitoring Group ..................................................................................................39-5
Configuring Network Security ......................................................................................39-6
Creating monitoring-group and associating port range ..........................................39-6
Disassociating port range from monitoring-group .................................................39-6
Configuring anomaly to be monitored ...................................................................39-6
Verifying Network Security information ...............................................................39-8
Appendix A Software License and Copyright Statements .....................................................A-1
Alcatel-Lucent License Agreement ................................................................................A-1
ALCATEL-LUCENT SOFTWARE LICENSE AGREEMENT ............................A-1
Third Party Licenses and Notices ..................................................................................A-4
A. Booting and Debugging Non-Proprietary Software ..........................................A-4
B. The OpenLDAP Public License: Version 2.4, 8 December 2000 .....................A-4
C. Linux ..................................................................................................................A-5
D. GNU GENERAL PUBLIC LICENSE: Version 2, June 1991 ..........................A-5
E. University of California ...................................................................................A-10
F. Carnegie-Mellon University ............................................................................A-10
G. Random.c .........................................................................................................A-10
H. Apptitude, Inc. .................................................................................................A-11
I. Agranat .............................................................................................................A-11
J. RSA Security Inc. ............................................................................................A-11
K. Sun Microsystems, Inc. ....................................................................................A-11
L. Wind River Systems, Inc. ................................................................................A-12
M. Network Time Protocol Version 4 ...................................................................A-12
Index ....................................................................................................................... Index-1