Viewing secure access violations log, Viewing secure access violations log -10 – Alcatel Carrier Internetworking Solutions Omni Switch/Router User Manual

Page 212

Advertising
background image

Secure Switch Access

Page 8-10

Viewing Secure Access Violations Log

The

seclog

command displays a log of all secure access violations.

Note

To log access violations on the switch, use the

swlogc

command. For more information on the

swlogc

command, see Chapter 10, “Switch Logging.”

To view the secure access violations log, enter

seclog

The following is a sample display:

Secure Access Violations Log

Slot/

Elapsed Time

Time

Protocol

Source IP

Attempts

Intf

(secs)

------------------------

-------------

--------------

--------------

-------

-------------------

12:49:02

FTP

172.23.8.801

1

5/1

23

03:15:34

Telnet

198.20.2.101

10

2/3

240

Descriptions of the fields are as follows:

Time

. The first time the access violation occurred.

Protocol

. The

IP

protocol for which the violation occurred.

Source IP

. The source

IP

address of the unauthorized user.

Attempts

. The number of access attempts made by this user within the sample period (5

minutes).

Slot/Intf

. The physical port that received the unauthorized user information.

Elapsed Time (secs)

. The duration (in seconds) from the first unauthorized access to the end of

the sampling period. Secure access violations will take 5 minutes to display in the log file.

Advertising