vii
Contents
Reading Intrusion Alerts and Resetting Alert Flags . . . . . . . . . . . . . . 7-20
Notice of Security Violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-20
How the Intrusion Log Operates . . . . . . . . . . . . . . . . . . . . . . . . . . 7-21
Keeping the Intrusion Log Current by Resetting Alert Flags . . . 7-21
Menu: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22
CLI: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-23
Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . 7-25
Web: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-26
Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-26
Using IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-28
Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-29
Defining Authorized Management Stations . . . . . . . . . . . . . . . . . . . . . 7-29
Overview of IP Mask Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-30
Menu: Viewing and Configuring IP Authorized Managers . . . . . . . . . 7-31
CLI: Viewing and Configuring Authorized IP Managers . . . . . . . . . . . 7-32
Listing the Switch’s Current Authorized IP Manager(s) . . . . . . . 7-32
Configuring IP Authorized Managers for the Switch . . . . . . . . . . 7-33
Web: Configuring IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . 7-34
Building IP Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-34
Configuring One Station Per Authorized Manager IP Entry . . . . 7-34
Configuring Multiple Stations Per Authorized Manager
IP Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-35
Additional Examples for Authorizing Multiple Stations . . . . . . . 7-37
Operating and Troubleshooting Notes . . . . . . . . . . . . . . . . . . . . . . . . . 7-37
8 Configuring for Network Management Applications
SNMP Management Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
Configuring for SNMP Access to the Switch . . . . . . . . . . . . . . . . . . . . 8-3
SNMP Communities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-5
Menu: Viewing and Configuring SNMP Communities . . . . . . . . . . . . . 8-5
To View, Edit, or Add SNMP Communities: . . . . . . . . . . . . . . . . . . 8-5
CLI: Viewing and Configuring Community Names . . . . . . . . . . . . . . . . 8-7
Listing Current Community Names and Values . . . . . . . . . . . . . . . 8-7
Configuring Identity Information . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-8
Configuring Community Names and Values . . . . . . . . . . . . . . . . . . 8-8
Trap Receivers and Authentication Traps . . . . . . . . . . . . . . . . . . . . . . 8-9