Configuring and Monitoring Port Security
Contents
Menu: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-35
CLI: Checking for Intrusions, Listing Intrusion Alerts,
and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-36
Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . . . . 13-38
Web: Checking for Intrusions, Listing Intrusion
Alerts, and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-39
Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-40
13-2