Alcatel Carrier Internetworking Solutions Switch/Router 用户手册

下载
页码 1100
Secure Switch Access
Page 8-10
Viewing Secure Access Violations Log
The 
seclog
 command displays a log of all secure access violations. 
 Note 
To log access violations on the switch, use the 
swlogc
 
command. For more information on the 
swlogc
 
command, see Chapter 10, “Switch Logging.” 
To view the secure access violations log, enter 
seclog
The following is a sample display:
Secure Access Violations Log
Slot/
Elapsed Time
Time
Protocol
Source IP
Attempts
Intf
(secs)
------------------------
-------------
--------------
--------------
-------
------------------- 
12:49:02
FTP
172.23.8.801
1
5/1
23
03:15:34
Telnet
198.20.2.101
10
2/3
240
Descriptions of the fields are as follows:
Time
. The first time the access violation occurred.
Protocol
. The 
IP
 protocol for which the violation occurred.
Source IP
. The source 
IP
 address of the unauthorized user.
Attempts
. The number of access attempts made by this user within the sample period (5 
minutes).
Slot/Intf
. The physical port that received the unauthorized user information.
Elapsed Time (secs)
. The duration (in seconds) from the first unauthorized access to the end of 
the sampling period. Secure access violations will take 5 minutes to display in the log file.