EasyManua.ls Logo

HP ProCurve Switch 2650

HP ProCurve Switch 2650
184 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
6-21
Configuring and Monitoring Port Security
Reading Intrusion Alerts and Resetting Alert Flags
Figure 6-15. Example of Port Status Screen After Alert Flags Reset
For more on clearing intrusions, see Note on Send-Disable Operation on
page 6-17
Using the Event Log To Find Intrusion Alerts
The Event Log lists port security intrusions as:
W MM/DD/YY HH:MM:SS FFI: port A3 — Security Violation
where W is the severity level of the log entry and FFI is the system module
that generated the entry. For further information, display the Intrusion Log,
as shown below.
From the CLI. Type the log command from the Manager or Configuration
level.
Syntax: log < search-text >
For < search-text >, you can use ffi, security, or violation. For example:
Figure 6-16. Example of Log Listing With and Without Detected Security Violations
Intrusion Alert on port A1 is now cleared.
Log Listing with
Security Violation
Detected
Log Listing with No
Security Violation
Detected
Log Command
with security
for Search String
!FishSecurity.book Page 21 Thursday, October 10, 2002 9:19 PM

Table of Contents

Related product manuals