HP (Hewlett-Packard) 1600M Switch User Manual


 
6-127
Configuring the Switch
Configuring and Monitoring Port Security
Configuring the Switch
Figure 6-83. Example of the Switch Console Event Log with Security Violation
Entries
The Intrusion Alert column in the console’s Port Status screen dis-
plays
Yes for the port on which the violation occurred (figure 6-84,
below).
Figure 6-84. Example of Port Status Screen with Intrusion Alert on Port A5
The console’s Intrusion Log lists the port number, the MAC address
of the intruding device, and the system time and date when the
intrusion occurred (figure 6-85, below).
Examples of Security
Violation entries.
Intrusion alert indicated on Port A5. After you reset the alert flag
(in the Intrusion Log screen, below), this entry changes to
No.