CLI Guide

Using the CLI 262
The switch maintains at most the last 1000 system events in the in-
memory log.
Security Logs
The system log records security events including the following:
User login.
User logout.
Denied login attempts.
User attempt to exceed security access level.
Denied attempts by external management system to access the system.
The security log record contains the following information:
The login name, if available, or the protocol being accessed if the event is
related to a remote management system.
The IP address from which the user is connecting or the IP address of the
remote management system.
A description of the security event.
A timestamp of the event
If a SYSLOG server is configured and available, the switch sends security
records to the configured servers.
Management ACL
In addition to user access control, the system also supports filtering of
management protocol packets addressed to the switch over the in-band ports.
This capability allows individual hosts or subnets to access the switch using
specific management protocols.
The administrator defines a management profile, which identifies
management protocols such as the following:
Telnet.
SSH and the keying information to use for SSH.
HTTP.
HTTPS and the security certificate to be used.
SNMPv1/v2c and the read and read/write community strings to be used.