Network OS Administration Guide

Supporting Network OS 6.0.1a

Part Number: 53-1003768-04

Security monitoring

You can monitor all attempts to breach your SAN security, helping you fine-tune your security measures. If there is a security breach, you can configure an email or RASLog alert to be sent. The following security areas are monitored:

  • Telnet Violation, which occurs when a Telnet connection request reaches a secure switch from an unauthorized IP address.
  • Login Violation, which occurs when a secure fabric detects a login failure.

The following table lists the factory defaults for security area settings.

Table 33 Security area default settings

Area

High threshold

Low threshold

Buffer

Timebase

Telnet Violation

2

1

0

Minute

Login Violation

2

1

0

Minute