HP 3500yl Series Access Security Manual page 728

Switch software
Hide thumbs Also See for 3500yl Series:
Table of Contents

Advertisement

Configuring and Monitoring Port Security
Reading Intrusion Alerts and Resetting Alert Flags
MAC Address
of Intruding
Device on
Port A3
14-38
Figure 14-20. Example of the Intrusion Log Display
The example in Figure 7-11 shows two intrusions for port A3 and one
intrusion for port A1. In this case, only the most recent intrusion at port
A3 has not been acknowledged (reset). This is indicated by the following:
Because the Port Status screen (figure 14-19 on page 14-37) does
not indicate an intrusion for port A1, the alert flag for the intru-
sion on port A1 has already been reset.
Since the switch can show only one uncleared intrusion per port,
the alert flag for the older intrusion for port A3 in this example
has also been previously reset.
(The intrusion log holds up to 20 intrusion records and deletes an
intrusion record only when the log becomes full and a new intrusion
is subsequently detected.)
Note also that the "prior to" text in the record for the earliest intrusion
means that a switch reset occurred at the indicated time and that the
intrusion occurred prior to the reset.
3.
To acknowledge the most recent intrusion entry on port A3 and enable
the switch to enter a subsequently detected intrusion on this port, type
(for
[R]
Reset alert flags
on two or more ports, this step resets the alert flags for all such ports.)
If you then re-display the port status screen, you will see that the Intrusion
Alert entry for port A3 has changed to "
Intrusion Alert flag has been acknowledged (reset) is that the Intrusion Alert
column in the port status display no longer shows "
the intrusion occurred (port A3 in this example). (Because the Intrusion Log
provides a history of the last 20 intrusions detected by the switch, resetting
the alert flags does not change its content. Thus, displaying the Intrusion Log
again will result in the same display as in figure 14-20, above.)
). (Note that if there are unacknowledged intrusions
No
". That is, your evidence that the
System Time of Intrusion on Port
A3
Indicates this intrusion on port
A3 occurred prior to a reset
(reboot) at the indicated time
" for the port on which
Yes

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents