SMC Networks SMC6624M Management Manual page 164

Tigerstack ii 10/100 stackable fast ethernet switch
Hide thumbs Also See for SMC6624M:
Table of Contents

Advertisement

Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access
Configuring and Monitoring Port Security
Syntax:
In the following example, executing
which indicates an intrusion alert on port 1.
Figure 7-9. Example of an Unacknowledged Intrusion Alert in a Port Status
If you wanted to see the details of the intrusion, you would then enter the
intrusion-log
MAC Address of latest
Intruder on Port 1
Earlier intrusions on
port 1 that have already
been cleared (that is,
the Alert Flag has been
reset at least twice
before the most recent
intrusion occurred.
Figure 7-10. Example of the Intrusion Log with Multiple Entries for the Same Port
The above example shows three intrusions for port 1. Since the switch can
show only one uncleared intrusion per port, the older two intrusions in this
example have already been cleared by earlier use of the clear intrusion-log or
the port-security 1 clear-intrusion-flag command. (The intrusion log holds up to
20 intrusion records, and deletes intrusion records only when the log becomes
7-24
show interface
show intrusion-log
clear intrusion-log
port-security <port-number>
clear-intrusion-flag
Intrusion Alert on port 1.
Display
command. For example:
List Intrusion Alert status.
List Intrusion Log content.
Clear Intrusion flags on all ports.
Clear Intrusion flag on a specific port.
show interface
lists the switch's port status,
show
Dates and Times of
Intrusions

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

6624fmst6624glsc6624gssc6624gt6624m6624s

Table of Contents