Operating notes for port security, Identifying the ip address of an intruder, Identifying the ip address of an intruder -20 – HP TopTools for Hubs and Switches User Manual

Page 200

Advertising
background image

14-20

Setting Up Security for a Device
Operating Notes for Port Security

Figure 14-11.Intrusion Log with Intrusions Entered for Ports A1 and A2

How the Intrusion Log Operates

The Intrusion Log gives you a list of the 20 most recent security violation
attempts, and appears in both the web browser interface and the switch
console. The log shows the most recent intrusion at the top of the listing. You
cannot delete Intrusion Log entries. Instead, if the log is filled when the switch
detects a new intrusion, the oldest entry is dropped off the listing and the
newest entry appears at the top of the listing.

Keeping the Intrusion Log Current by Resetting Flags

When a violation occurs on a port, an intrusion flag is set for that port and the
violation is entered in the Intrusion Log. The switch can detect and handle
subsequent intrusions on that port, but will not log another intrusion on the
port until you go to the Intrusion Log and use the Reset Port Intrusion Flags
button to reset the port’s intrusion flag.

Operating Notes for Port Security

Identifying the IP Address of an Intruder

The Intrusion Log lists intruders by MAC address. If you are using HP TopTools
for Hubs & Switches to manage your network, you can use the HP TopTools
inventory reports to link MAC addresses to their corresponding IP addresses.
(Inventory reports are organized by device type; hubs, switches, servers, etc.)

Advertising