(Revised 2012-05-01
Page 58 of 170
Ports – MAC Security – Intruder Log
The Intruder Log tab displays a list of unauthorized MAC addresses that attempted to access the secured
device. Each intruder entry in the log is unique, and is based on the combination of MAC address, VLAN,
and port. Only the first occurrence of the intruder is listed. The log is ordered by most recent first, based on
the system time. The maximum number of entries is 100. If more than 100 intruders are detected, the
oldest entries are deleted. The log is not saved through a power cycle.
An entry can be individually removed from the log by selecting the associated Delete button. All entries or
entries specific to a port can also be removed from the log by choosing the option in the dropdown list and
then selecting the Clear button.
Summary of Contents for 710FX2 Series
Page 1: ...710FX2 Managed Industrial Ethernet Switch User Manual Installation Guide ...
Page 11: ... Revised 2012 05 01 Page 11 of 170 CLEANING Clean only with a damp cloth ...
Page 33: ... Revised 2012 05 01 Page 33 of 170 Administration SNMP Continued ...
Page 37: ... Revised 2012 05 01 Page 37 of 170 DHCP Server Setup Profiles Continued ...
Page 46: ... Revised 2012 05 01 Page 46 of 170 DHCP Relay Local IP Setup Continued ...
Page 52: ... Revised 2012 05 01 Page 52 of 170 Ports Configuration Continued ...
Page 83: ... Revised 2012 05 01 Page 83 of 170 The user can specify the manual router ports ...
Page 86: ... Revised 2012 05 01 Page 86 of 170 IGMP RFilter Continued Modifying rfilter port settings ...
Page 94: ... Revised 2012 05 01 Page 94 of 170 N Ring Advanced Configuration Continued ...
Page 119: ... Revised 2012 05 01 Page 119 of 170 If a Configuration Device is present that is presented ...