Unauthorized access log query – H3C Technologies H3C Intelligent Management Center User Manual

Page 432

Advertising
background image

418

Unauthorized access log list

Action Status: Contains the status of the action taken for the unauthorized access.

Terminal MAC: Contains the MAC address of the unauthorized access terminal.

Terminal Name: Contains the name of the unauthorized access terminal. If a DNS server is
configured in IMC system settings, IMC resolves the domain name of the terminal by using the DNS

server. For more information about configuring DNS server, see "

System settings

."

Terminal IP: Contains the IP address of the unauthorized access terminal.

Device Label: Contains the IMC name for the device, which, by default, is the name assigned to it
in its device configuration.

Device IP: Contains the IP address of the access device.

Interface: Contains the description of the interface connected to the terminal.

Conflict Type: Contains the conflict type.

Found Time: Contains the time when the unauthorized access was detected.

Details: Contains a link for navigating to the Unauthorized Access Log List Details page.
If the Unauthorized Access Log List contains enough entries, the following navigational aids
appear:

{

Click

to page forward in the Unauthorized Access Log List.

{

Click

to page forward to the end of the Unauthorized Access Log List.

{

Click

to page backward in the Unauthorized Access Log List.

{

Click

to page backward to the front of the Unauthorized Access Log List.

3.

Click 8, 15, 50, 100, or 200 from the right side of the main pane to configure how many items per
page you want to view.

4.

For Unauthorized Access Log List that have more than one page, click on 1, 2, 3, 4, 5, 6, 7, 8,
9,10… from the upper middle or bottom right side of the main pane to jump to a particular page

of the list.
You can sort the Unauthorized Access Log List by most fields. Click the column label to sort the list
by the selected field. The column label is a toggle switch that lets you toggle between the various

sort options specific to each field.

Unauthorized access log query

IMC provides you with the ability to query unauthorized access logs.
To query the Unauthorized Access Log List:

1.

Navigate to Resource > Unauthorized Access > Unauthorized Access Log List.

a.

Click the Resource tab from the tabular navigation system on the top.

b.

Click -the Terminal Access section of the navigation tree on the left.

c.

Click Unauthorized Access under Terminal Access from the navigation tree on the left. The
Unauthorized Access List is displayed in the main portion of the Unauthorized Access page.

2.

Click the All Unauthorized Access Logs.
The Unauthorized Access Log List is displayed in the main portion of the Unauthorized Access Log
List page.

3.

Click Query at the upper right corner of Unauthorized Access Log List, and a search criteria dialog
box appears.

Advertising