beautypg.com

Obtaining the threshold monitoring configuration, Security monitoring – Brocade Network OS NETCONF Operations Guide v4.1.1 User Manual

Page 186

background image

154

Network OS NETCONF Operations Guide

53-1003231-02

Security monitoring

12

Obtaining the threshold monitoring configuration

To display the threshold monitoring configuration, issue the RPC with a subtree filter
to restrict the returned configuration information to the
/ node in the
urn:brocade.com:mgmt:brocade-threshold-monitor namespace. To restrict the output to the
memory or CPU monitoring configuration, include the or element under the
node.

The following example returns the CPU threshold monitoring configuration.

xmlns="urn:brocade.com:mgmt:brocade-system-monitor">

xmlns="urn:brocade.com:mgmt:brocade-system-monitor">

30

3

75

all

Security monitoring

System Monitor monitors all attempts to breach your SAN security, helping you fine-tune your
security measures. If a security breach occurs, System Monitor sends a RASlog alert. The following
Security areas are monitored:

Telnet Violation, which occurs when a Telnet connection request reaches a secure switch from
an unauthorized IP address.

Login Violation, which occurs when a secure fabric detects a login failure.