beautypg.com

HP TopTools for Hubs and Switches User Manual

Page 199

background image

Setting Up Security for a Device

Switch Intrusion Log

14-19

The Alert Log displays a Security Violation entry, with the system date
and time, and the port on which the violation occurred

The Intrusion Log lists the port number, the MAC address of the
intruding device, and the system time and date when the intrusion
occurred.

Figure 14-10.Security Violation Entries in the Alert Log

In the following figure, ports A1 and A2 have detected intrusions for which
their intrusion flags have not been reset, as indicated by the Ports with
Intrusion Flag entry. You must reset the intrusion flags for these ports before
the log can indicate any new intrusions for them. Ports A3 and A5 are not
listed, indicating that their intrusion flags have already been reset. These two
ports are ready to log any new intrusions.