xx
CLI: Checking for Intrusions, Listing Intrusion Alerts,
and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-36
Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . . . . 14-38
Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-39
15 Using Authorized IP Managers
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-1
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-3
Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-3
Defining Authorized Management Stations . . . . . . . . . . . . . . . . . . . . 15-4
Overview of IP Mask Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-4
Menu: Viewing and Configuring IP Authorized Managers . . . . . . . . . 15-5
CLI: Viewing and Configuring Authorized IP Managers . . . . . . . . . . . 15-6
Listing the Switch’s Current Authorized IP Manager(s) . . . . . . . 15-6
Configuring IP Authorized Managers for the Switch . . . . . . . . . . 15-7
WebAgent: Configuring IP Authorized Managers . . . . . . . . . . . . . . . 15-9
Web Proxy Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-10
How to Eliminate the Web Proxy Server . . . . . . . . . . . . . . . . . . 15-10
Using a Web Proxy Server to Access the WebAgent . . . . . . . . . 15-10
Building IP Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-11
Configuring One Station Per Authorized Manager IP Entry . . . . . . 15-11
Configuring Multiple Stations Per Authorized Manager IP Entry . . 15-11
Additional Examples for Authorizing Multiple Stations . . . . . . . . . 15-13
Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-14
16 Key Management System
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-1
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-1
Configuring Key Chain Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-2
Creating and Deleting Key Chain Entries . . . . . . . . . . . . . . . . . . . . . . . 16-2
Assigning a Time-Independent Key to a Chain . . . . . . . . . . . . . . . . . . 16-3
Assigning Time-Dependent Keys to a Chain . . . . . . . . . . . . . . . . . . . . 16-5