xStack
®
DGS-3120 Series Layer 3 Managed Gigabit Ethernet Switch CLI Reference Guide
1120
(Username: <username>, IP:
SNMP request received from
(Instance:<InstanceID> ,Port:<[u
nitID:]portNum>,MAC:<macaddr
>)
[CIST | CIST Regional | MSTI
Regional] New Root bridge
selected( [Instance:
<InstanceID> ]MAC: <macaddr>
Spanning Tree Protocol is
enabled
Spanning Tree Protocol is
enabled
Spanning Tree Protocol is
disabled
Spanning Tree Protocol is
disabled
Spanning Tree port status
Spanning Tree port status
change (Instance:<InstanceID> ,
Port:<[unitID:]portNum>)
<old_status> -> <new_status>
Spanning Tree port role change
(Instance:<InstanceID> ,
Port:<unitID:portNum>)
<old_role> -> <new_role>
Spanning Tree instance created
(Instance:<InstanceID>)
Informational
Spanning Tree instance deleted
Spanning Tree Version
changed
Spanning Tree version change
(new version:<new_version>)
configuration ID name and
revision level changed
configuration ID name and
revision level change
(name:<name> ,revision level
Spanning Tree MST
configuration ID VLAN
mapping table deleted
Spanning Tree MST
configuration ID VLAN mapping
table change (instance:
<InstanceID> delete vlan
<startvlanid> [- <endvlanid>])
configuration ID VLAN
mapping table added
configuration ID VLAN mapping
table change (instance:
<InstanceID> add vlan
<startvlanid> [- <endvlanid>])
DoS
Spoofing attack
1. The soure ip is same as
switch's interface ip but
the source mac is different
2. Source ip is the same
as the switch's IP in ARP
packet
3. Self IP packet detected
Possible spoofing attack from IP:
<ipaddr>, MAC: <macaddr>,
Port: <[unitID:]portNum>
Critical
<dos_name> is blocked from (IP:
Successful login through SSH
(Username: <username>, IP:
(Username: <username>, IP: