M A G N U M 6 K S W I T C H E S , M N S - 6 K U S E R G U I D Eattempts. This provides a chronological entry of all intrusions attempted on a specificport.The event log records events as single-line entries listed in chronological order, and servesas a tool for isolating problems. Each event log entry is composed of four fieldsSeverity – the level of severity (see below)Date – date the event occurred on. See Chapter 3 on setting the date and time on theswitchTime – time the event occurred on. See Chapter 3 on setting the date and time on theswitchLog Description – description of event as detected by the switchSeverity is one of 8 severities described at the beginning of this section.Authorized managersThis feature is available in MNS-6K-SECURE.Just as port security allows and disallows specific MAC addresses from accessing anetwork, the MNS-6K software can allow or block specific IP addresses or a range of IPaddresses to access the switch. The command used for that isSyntax access – access configuration modeSyntax allow ip= mask= service= - authorizemanagersSyntax deny ip= mask= service= - deny accessto a specific IP address(s) or a subnetSyntax remove ip= mask= - remove specific IP address(s) orsubnetSyntax removeall - remove all managersSyntax show ip-access – display list of authorized managersaccess – context are the access commandsallow – allow specified services for specified IP addresses – IP addresses can be individualstations, a group of stations or subnets. The range is determined by the IP address andnetmask settings102