HP 8000M User Manual
Page 203
Advertising
6-127
Configuring the Switch
Configuring and Monitoring Port Security
C
o
n
fig
u
rin
g
th
e
Sw
itc
h
Figure 6-83. Example of the Switch Console Event Log with Security Violation
Entries
•
The Intrusion Alert column in the console’s Port Status screen dis-
plays
Yes
for the port on which the violation occurred (figure 6-84,
below).
Figure 6-84. Example of Port Status Screen with Intrusion Alert on Port A5
•
The console’s Intrusion Log lists the port number, the MAC address
of the intruding device, and the system time and date when the
intrusion occurred (figure 6-85, below).
Examples of Security
Violation entries.
Intrusion alert indicated on Port A5. After you reset the alert flag
(in the Intrusion Log screen, below), this entry changes to
No
.
Advertising