EasyManuals Logo
Home>HP>Switch>ProCurve

HP ProCurve User Manual

HP ProCurve
236 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #200 background imageLoading...
Page #200 background image
14-20
Setting Up Security for a Device
Operating Notes for Port Security
Figure 14-11.Intrusion Log with Intrusions Entered for Ports A1 and A2
How the Intrusion Log Operates
The Intrusion Log gives you a list of the 20 most recent security violation
attempts, and appears in both the web browser interface and the switch
console. The log shows the most recent intrusion at the top of the listing. You
cannot delete Intrusion Log entries. Instead, if the log is filled when the switch
detects a new intrusion, the oldest entry is dropped off the listing and the
newest entry appears at the top of the listing.
Keeping the Intrusion Log Current by Resetting Flags
When a violation occurs on a port, an intrusion flag is set for that port and the
violation is entered in the Intrusion Log. The switch can detect and handle
subsequent intrusions on that port, but will not log another intrusion on the
port until you go to the Intrusion Log and use the Reset Port Intrusion Flags
button to reset the ports intrusion flag.
Operating Notes for Port Security
Identifying the IP Address of an Intruder
The Intrusion Log lists intruders by MAC address. If you are using HP TopTools
for Hubs & Switches to manage your network, you can use the HP TopTools
inventory reports to link MAC addresses to their corresponding IP addresses.
(Inventory reports are organized by device type; hubs, switches, servers, etc.)

Table of Contents

Other manuals for HP ProCurve

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HP ProCurve and is the answer not in the manual?

HP ProCurve Specifications

General IconGeneral
BrandHP
ModelProCurve
CategorySwitch
LanguageEnglish

Related product manuals