SMC Networks SMC6624M Management Manual page 167

Tigerstack ii 10/100 stackable fast ethernet switch
Hide thumbs Also See for SMC6624M:
Table of Contents

Advertisement

Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access
I
Enter your PC or workstation MAC address in the port's Authorized
Addresses list.
I
Enter your PC or workstation's IP address in the switch's IP Authorized
Managers list. See "Using IP Authorized Managers" on page 7-28.)
Without both of the above configured, the switch detects only the proxy
server's MAC address, and not your PC or workstation MAC address, and
interprets your connection as unauthorized.
"Prior To" Entries in the Intrusion Log. If you reset the switch (using
the Reset button, Device Reset, or Reboot Switch), the Intrusion Log will list
the time of all currently logged intrusions as "prior to" the time of the reset.
Alert Flag Status for Entries Forced Off of the Intrusion Log. If the
Intrusion Log is full of entries for which the alert flags have not been reset, a
new intrusion will cause the oldest entry to drop off the list, but will not change
the alert flag status for the port referenced in the dropped entry. This means
that, even if an entry is forced off of the Intrusion Log, no new intrusions can
be logged on the port referenced in that entry until you reset the alert flags.
Configuring and Monitoring Port Security
7-27

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

6624fmst6624glsc6624gssc6624gt6624m6624s

Table of Contents