Access Security Guide K/KA/KB.15.15

Keeping the intrusion log current by resetting alert flags...............................................409
Operating notes for port security...................................................................................410
Identifying the IP address of an intruder.....................................................................410
Proxy Web servers..................................................................................................410
"Prior To" entries in the intrusion log.........................................................................410
Alert flag status for entries forced off of the intrusion log..............................................410
LACP not available on ports configured for port security..............................................410
Log Messages......................................................................................................................411
12 Authorized IP Managers........................................................................413
Configuring.........................................................................................................................413
Viewing and configuring IP Authorized Managers (Menu).....................................................413
To authorize manager access............................................................................................413
To edit an existing manager access entry.......................................................................414
To delete an authorized manager entry..........................................................................414
Configuring IP Authorized Managers for the switch (CLI)........................................................414
To Authorize Manager Access.......................................................................................414
To Edit an Existing Manager Access Entry.......................................................................415
To Delete an Authorized Manager Entry.........................................................................415
WebAgent: Configuring IP Authorized Managers.................................................................415
Web Proxy Servers......................................................................................................416
How to Eliminate the Web Proxy Server.........................................................................416
Using a Web Proxy Server to Access the WebAgent........................................................416
Using..................................................................................................................................416
Editing or deleting an Authorized Manager entry (Menu)......................................................416
Listing the switch current Authorized IP Manager (CLI)...........................................................416
Building IP Masks: Configuring one station per Authorized Manager IP entry...........................417
Building IP Masks: Configuring multiple stations per Authorized Manager IP entry....................417
Overview............................................................................................................................418
Overview........................................................................................................................418
About using authorized IP Managers..................................................................................419
Options.....................................................................................................................420
Access Levels..............................................................................................................420
Defining authorized management stations.......................................................................420
Overview of IP mask operation.................................................................................420
Operating notes..........................................................................................................421
Using a Web Proxy Server to Access the WebAgent...................................................421
Operating Notes.............................................................................................................422
13 Key Management System.......................................................................423
Configuring key chain management........................................................................................423
Creating and deleting key chain entries...................................................................................423
Assigning a time-independent key to a chain...........................................................................423
Assigning time-dependent keys to a chain...........................................................................424
Overview............................................................................................................................426
14 Traffic/Security Features and Monitors.....................................................427
Configuring traffic/security....................................................................................................427
Configuring security settings using the CLI wizard.................................................................427
Defining and configuring named source-port filters...............................................................428
Configuring traffic/security filters........................................................................................431
Configuring a source-port traffic filter.............................................................................431
Configuring a filter on a port trunk................................................................................432
Configuring a multicast or protocol traffic filter.....................................................................433
Viewing...............................................................................................................................434
Viewing a named source-port filer......................................................................................434
16 Contents