Menu: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-37
CLI: Checking for Intrusions, Listing Intrusion Alerts,
and Resetting Alert Flags
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-38
Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . . . . 11-40
Web: Checking for Intrusions, Listing Intrusion
Alerts, and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-41
Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-42
12 Using Authorized IP Managers
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3
Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3
Defining Authorized Management Stations . . . . . . . . . . . . . . . . . . . . 12-4
Overview of IP Mask Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-4
Menu: Viewing and Configuring IP Authorized Managers . . . . . . . . . 12-5
CLI: Viewing and Configuring Authorized IP Managers . . . . . . . . . . . 12-6
Listing the Switch’s Current Authorized IP Manager(s) . . . . . . . 12-6
Configuring IP Authorized Managers for the Switch . . . . . . . . . 12-7
Web: Configuring IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . 12-9
Building IP Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-9
Configuring One Station Per Authorized Manager IP Entry . . . . . . . 12-9
Configuring Multiple Stations Per Authorized Manager IP Entry . . 12-10
Additional Examples for Authorizing Multiple Stations . . . . . . . . . 12-12
Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-12
13 Key Management System
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-2
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-2
xiii