Operating Notes For Port Security - HP 3500yl Series Access Security Manual

Switch software
Hide thumbs Also See for 3500yl Series:
Table of Contents
Configuring and Monitoring Port Security

Operating Notes for Port Security

Log Listing with
Security Violation
Detected
Log Listing with No
Security Violation
Detected
Figure 14-24.Example of Log Listing With and Without Detected Security Violations
14-42
HP Switch(config)# log security
Keys:
W=Warning
M=Major
----
Event Log listing: Events Since Boot
W 08/01/02 01:18:15 FFI: port 2 - Security Violation
W 08/01/02 04:28:08 FFI: port 2 - Security Violation
----
Bottom of Log : Events Listed = 2
HP Switch(config)# log security
Keys:
W=Warning
M=Major
----
Event Log listing: Events Since Boot
----
Bottom of Log : Events Listed = 0
From the Menu Interface: In the Main Menu, click on
Next page and Prev page to review the Event Log contents.
For More Event Log Information. See "Using the Event Log To Identify
Problem Sources" in the "Troubleshooting" chapter of the Management and
Configuration Guide for your switch.
Operating Notes for Port Security
Identifying the IP Address of an Intruder. The Intrusion Log lists
detected intruders by MAC address. If you are using PCM+ to manage your
network, you can use the device properties page to link MAC addresses to
their corresponding IP addresses.
Proxy Web Servers. If you are using the WebAgent through a switch port
configured for Static port security, and your browser access is through a proxy
web server, then it is necessary to do the following:
Enter your PC or workstation MAC address in the port's Authorized
Addresses list.
Enter your PC or workstation's IP address in the switch's IP Authorized
Managers list. See "Using Authorized IP Managers" in the Management
and Configuration Guide for your switch.)
I=Information
D=Debug E=Error
I=Information
D=Debug E=Error
Log Command
with
"security" for
Search String
----
----
----
----
4. Event Log
and use
Table of Contents
loading

Table of Contents