Viewing secure access violations log, Viewing secure access violations log -10 – Alcatel Carrier Internetworking Solutions Omni Switch/Router User Manual
Page 212
Secure Switch Access
Page 8-10
Viewing Secure Access Violations Log
The
seclog
command displays a log of all secure access violations.
♦ Note ♦
To log access violations on the switch, use the
swlogc
command. For more information on the
swlogc
command, see Chapter 10, “Switch Logging.”
To view the secure access violations log, enter
seclog
The following is a sample display:
Secure Access Violations Log
Slot/
Elapsed Time
Time
Protocol
Source IP
Attempts
Intf
(secs)
------------------------
-------------
--------------
--------------
-------
-------------------
12:49:02
FTP
172.23.8.801
1
5/1
23
03:15:34
Telnet
198.20.2.101
10
2/3
240
Descriptions of the fields are as follows:
Time
. The first time the access violation occurred.
Protocol
. The
IP
protocol for which the violation occurred.
Source IP
. The source
IP
address of the unauthorized user.
Attempts
. The number of access attempts made by this user within the sample period (5
minutes).
Slot/Intf
. The physical port that received the unauthorized user information.
Elapsed Time (secs)
. The duration (in seconds) from the first unauthorized access to the end of
the sampling period. Secure access violations will take 5 minutes to display in the log file.