Does ip source guard has any syslog or message??(on 2960 switch)

hi everyone , I got a problem that I need to config a secure feature "IP SOURECE GUARD" on 2960 switch
Everthing is ok
But, when the IP-MAC mismatch
I can't receive any SYSLOG from "show log"
Only from "show ip verify source"  to know which interface be denied
L2#show ip verify source
Interface  Filter-type  Filter-mode  IP-address       Mac-address        Vlan
Fa0/2      ip-mac       inactive-no-snooping-vlan
Fa0/3      ip-mac       active       deny-all         permit-all         10
Fa0/4      ip-mac       inactive-no-snooping-vlan
Fa0/5      ip-mac       inactive-no-snooping-vlan
Fa0/6      ip-mac       inactive-no-snooping-vlan
Fa0/7      ip-mac       inactive-no-snooping-vlan
Fa0/8      ip-mac       inactive-no-snooping-vlan
Fa0/9      ip-mac       active       192.168.10.1     permit-all         10 
Fa0/10     ip-mac       inactive-no-snooping-vlan
does ip source guard has no Features to create LOG ??
or anyone can tell me what I can do that I can receive some message when the "deny-all" situation be triggered
Regards,
Lin

I have exactly the same question : is it possible to have a syslog message when an Ip source guard event occurs on a switch 2960 ?
Is anyone can help us ?

Similar Messages

  • Does the RFFOEDI1 program has any implication on the ACH direct deposit?

    Hi all,
    Can any one please explain the use of RFFOEDI1 program. Is this
    program used just to generate I-Doc?
    Scenario: For Check payment method(C)
    Once F110 run is successful, then we have to run RFFOUS_C program to
    generate checks. Once this program is complete, checks will be
    generated and the check info will be available in PAYR table.
    Scenario: For ACH-CCD payment method (D)
    Once F110 run is successful with payment method D, The payment details
    will hit BSAK table.
    Now, I don't want to generate the SAP standard I-Doc with RFFOEDI1, do
    I still need to run RFFOEDI1 program???
    For the check payment, RFFOUS_C program triggers the generation of
    checks after which the check info will be available in PAYR table
    Likewise, does the RFFOEDI1 program has any implication on the ACH
    direct deposit?
    To my understanding, If you do a payment using payment method, ACH
    direct deposit in SAP, we don't generate any check numbers ???!!!
    Do we get any reference number or anything when the direct deposit is
    done??? This reference number could be used to trace the invoice
    against which this ACH payment was done!
    If it is the case, where do we get/ when do we generate the reference
    number to trace the invoice????.....any inputs?
    If we are not going to run RFFOEDI1 program, (if we are not interested
    in generating IDoc) then are we DONE with the ACH direct deposit, once
    we are done with payment run(F110)???
    Where do we get the reference number which specifies the ACH payment?
    Sorry, I have poured in lot of question at one place!
    Any inputs/ solutions/ suggestions are greatly appreciated!
    Thanks a lot!

    RFFOEDI1 is typically used when payments to vendors are to be sent by an EDI 820 file to the bank. This program generates the PEXR2002 idoc. The idocs are sent to the EDI translator where these are mapped to an EDI 820 file format and sent to the bank.
    Scenario ACH-CCD payments method (D)
    If you do not want to send EDI 820 payments, you would typically not generate the idoc - in which case - you dont have to use RFFOEDI1. This probably means that (a) you are using the RFFOUS_T program for generating the payment medium or (b) you are using the payment medium workbench to generate the ACH file (NACHA format) for your house bank.
    You do have to send an ACH file to the bank for paying your vendors - which means - you are probably using one of the above methods to generate the file.
    ACH Direct Deposit
    I am assuming that you are probably referring to ACH-PPD type payments here. You would still have to send the payment medium using one of the methods mentioned above.
    In all ACH scenarios, your payment document number, is your reference number that was used to clear the open item.
    Hope this helps.

  • Does E-Sourcing/CLM has standard PI interface with MDM?

    Dear Experts,
    Does E-sourcing in its latest version support standard PI interface with MDM?
    Thanks and regards,
    Ranjan

    Hi
    E SOurcing 7.0 doesn't have a standard PI interface with MDM.
    Regards
    Mudit Saini

  • Does MBP Retina display has any International Warranty?

    Hi everybody,
    My Sister and his family in the US are thinking of getting me a MBP with Retina display (mainly because it's cheaper in the US than in Asia).
    I am of course very happy, but I also have a huge doubt: I live in India so wanted to know is there any International Warranty for 1 year so that if I face any kind of technical difficulties I can check it out in India?
    Please let me know...Its urgent!
    Thanx..:)

    Yes.
    Quoting from FAQ:
    The AppleCare Protection Plans for Mac and iPod provide global repair coverage. If you take your Apple hardware with you when you travel and happen to need repair service, you can either go to an Apple Retail Store or contact Apple for information on how to obtain service. Service will be limited to the options available in the country where service is requested. Service options, parts availability, and response time vary according to country. Please see the AppleCare Protection Plan Terms and Conditions for complete details.
    http://www.apple.com/support/products/faqs.html

  • Ip source guard feature and dhcp DHCP scope exhaustion (client spoofs other clients)

    Hi everybody.
    A dhcp server assigns ip adress based on mac address carried by client hardware field in dhcp packets.
    One potential attack is when a rogue host mimics different mac addresses and causes dhcp server to assign the ip addresses until no ip address is left for legitimate host.
    For e.g a host h1 with mac1 has assigned ip address by dhcp server as:
    199.199.199.1 mac1
    Dhcp server has the above entry in its database.
    Using hacking tools such as Yersinia or Gobbler one can create a dhcp discover messages each time creating a different mac for client hardware field in dhcp server thereby causing a dhcp server to assign ip addresses because to dhcp server , these are legitimate dhcp discover messages with each carrying a different mac in client hardware addresses.
    You might say use dhcp snooping and it will prevent that (  dhcp scope exhaustion) and configure the switch to check if src mac matches the client hardware address in dhcp message. But still we can creat spoofed discover messages where src mac in ethernet header will match the client hardware address in dhcp discover message. We still did not overcome the problem.
    You might say use IP source guard feature but will it really prevent that problem from happening?
    Let me illustrate it :
    h1---------f1/1SW---------DHCP server
    Let say we have configured dhcp snooping on sw1 and f1/1 is untrusted port.  The switch has following dhcp binding
    199.199.199.1    mac1   vlan1  f1/1
    Next we configure ip source guard to  validate both src mac and src ip against the dhcp bindings  . When  we configures ip source guard first  , it will allow dhcp communication only so a host can request ip address and a dhcp binding can be built. After that ip source guard will validate src ip or src mac or both against the dhcp binding.depending upon how we configure ip source guard.
    In our case we have configured ip source guard to validate both src mac and src ip against the dhcp binding.
    A dhcp binding is already created as:
    199.199.199.1 mac1 vlan 1 f1/1
    Now using the hacking tools Yersinia or Gobbler on h1, we create our first spoofed dhcp discover message  where src mac=mac2 in ethernet header and  client harware address= mac2 in dhcp discover message. Since switch is configured with ip source guard feature and therefore allows dhcp discover message to pass through. Dhcp server upon receiving the dhcp message assigns another ip address from the pool. Now the dhcp server has following entries:
    199.199.199.1 mac1
    199.199.199.2 mac2.
    We can continue to craft spoofed dhcp discover messages as mentioned above and have dhcp server keep assigning ip addresses until the whole pool is exhausted.
    So my question is how does  ip source guard in conjuction with dhcp snooping prevent this particular attack from happening? ( i.e DHCP scope exhaustion)
    I really appreciate your input.
    thanks and have a great week.

    Thanks Karthikeyan.
    First of all, we gather all the information about the  locations of legitimate dhcp servers in our network. Once we have this information, we will configure the ports used to reach them as trusted. All the ports where end users will connect will be untrusted and therefore subject to dhcp snooping .
    it means if any of user connected in that switch/vlan runs a dhcp  services like vmware for eg. Snooping will prevent the dhcp/bootp  servers connected to that port will not be able to process.
    Yes that is correct. Because dhcp snooping feature will check these ports for the messages usually sent by dhcp server such as dhcp offer, etc. If the end user is running dhcp server using virtual machine, that port should be configured as trusted if it is dertermined  that end user is running a legitimate dhcp server using vm ware.
    When we have the dhcp snooping it prevents the 1st level of hacking  itself. I don't think so it will have any impact on dhcp address  releasing.
    I am sorry. You lost me here. What is 1 level of hacking?
    Dhcp snooping checks for dhcp messages such as dhcp release, dhcp decline.on untrusted port against the dhcp bindings.
    Here is why;
    h1---------SW1-------dhcp server
                   |
                 h2
    Let say we don't have dhcp snooping in above attack and  h2 is a legitimate user has already assigned ip address 199.199.199.2 by dhcp server. Thus the dhcp server has an entry:
    199.199.199.2 mac2
    Next we connect rogue user and it gets ip address 199.199.199.1 now the dhcp server has entries:
    199.199.199. 1  mac1
    199.199.199.2   mac2
    Now using hacking tools, h1 create a fake dhcp release message  with  199.199.199.199.2   mac2
    Dhcp server upon receiving this message, will release the ip address and returns it to the pool.
    By using DHCP snooping, switch will peer inside dhcp release message and checks against the binding. If there is conflict, it will drop the message.
    IFor e.g
    If have dhcp snooping configured , then switch will have adhcp binding as:
    199.199.199.1    mac1    vlan 1   f1/1  lease time
    199.199.199.2     mac2    vlan 2    f1/2 lease time.
    If h1 tries to send fake dhcp release with ip address 199.199.199.2    mac2
    Switch will check ip address 199.199.199.2  and mac2 against the binding related to f1/1 . Sw will find a conflict and therefore drops the dhcp release packet.
    Thanks

  • I have a canon mf5940dn, it is connected via USB to my macbook air, and yet, when i want to print smith, it says the printer is not connected. does anyone has any idea why? is there a guide to do it properly?

    I have a canon printer mf5940dn, it is connected via USB to my macbook air, and yet, when I want to print smth, it says the printer is not connected. does anyone has any idea why? is there a guide to do it properly?

    Hi,
    I am currently replying to this as it shows in the iChat Community.
    I have asked the Hosts to move it to Snow Leopard  (you should not lose contact with it through any email links you get)
    I also don't do Wirelss printing so I can't actaully help either.
    10:01 PM      Friday; July 29, 2011
    Please, if posting Logs, do not post any Log info after the line "Binary Images for iChat"
     G4/1GhzDual MDD (Leopard 10.5.8)
     MacBookPro 2Gb( 10.6.8)
     Mac OS X (10.6.8),
    "Limit the Logs to the Bits above Binary Images."  No, Seriously

  • Does Webcenter Capture which comes with Webcenter Suite 11.1.1.8 has any conflict with SOA server

    Hi,
    I have a weblogic Domain with Weblogic version 10.2.6. It has following managed servers installed:
    SOA Server/ UCM/ IBR/ URM/ IRM/ IPM/ WC_Utilities/ WC_Spaces/ WC_Portlet/ WC_Collaboration.
    All of these Servers have been upgraded to 11.1.1.8.
    I wanted to extend this domain to include Webcenter Capture as well. But the moment after i extend this domain. SOA server fails to start.
    All the SOA applications that i used to see in EM are no more visible.
    Does anybody has any idea about this?
    Thanks,
    Rohan Rajore

    Thanks a lot Jiri,
    But I'm not speaking about Imaging. Imaging (IPM) is already present in my domain. I'm extending the domain with Capture Server.
    And It really looks like there is some sort of conflict between Capture Server and existing SOA Server because:
    1] Before Extending the Domain with capture server,  I start the Admin Server, I log in to the EM Console and I see all the SOA Applications listed there.
    2] After Extending the Domain with capture server, I start the admin server. Then 1st thing I start after this is soa server (as you said). This fails. And in the EM console I no more see SOA Applications.
    What I can conclude from this is, there could possibly a conflict between soa and capture servers when capture server is installed on existing soa server (may not be the case if soa is installed later.)
    Thanks,
    Rohan Rajore

  • I want to write a java program that can add a user to a role or sub role to the Profile Database in iPlanet Portal Server 3.0. Does anyone has any idea or a sample program do such thing. Thanks, Tommy

    I want to write a java program that can add a user to a role or sub role to the Profile Database in iPlanet Portal Server 3.0. Does anyone has any idea or a sample program do such thing? Thanks, Tommy

    // create the user profile, get the handle back,
    // and set the membership profile attributes.
    ProfileAdmin newProfile = null;
    try {
    // the users profile name is the domain      
    // he belongs to plus their userName
    // you will request.domain if your doing this from a servlet, domain_name is the domain_name the user belongs too
    String profileName = domain_name + "/" + user;
         if (debug.messageEnabled()) {
    debug.message("creating profile for " + profileName);
    // create the user profile object
    newProfile = ProfileManager.createProfile(
    getSession(), profileName ,Profile.USER);
    UserProfile userProfile = (UserProfile)newProfile;
         // set the role the user is a member of. Default is to set
         // the users to the default role of the domain they surfed to
         StringBuffer roleName = new StringBuffer(64);
    // request.domain instead of domain_name if your doing this from a servlet ..
    Profile dp = getDomainProfile(domain_name);
    roleName.append(dp.getAttributeString("iwtAuth-defaultRole"));
         if (debug.messageEnabled()) {
    debug.message("setting role for " + user + " = " + roleName);
    userProfile.setRole(roleName.toString());
    newProfile.store(false);
    } catch (ProfileException pe) {
         debug.error("profile exception occured: ",pe);
    return;
    } catch (ProfileException pe) {
         debug.error("login exception occured: ",le);
    return;
    HTH ..

  • Does Change to DESADV (ZXTRKTOP,ZXTRKU0) userexit has any impact on SHPCON

    Hi All,
    I need your help on clearing my doubt.
    I recently create a new extended DELVRY03 idoc (ZDELVRY03) with message type DESADV and added new segment under E1EDL24 with contains prodcution date field. Def. logice in user eixt  EXIT_SAPLV56K_002 includes ZXTRKTOP& ZXTRKU0.
    Does changes to this idoc with message type DESADV has any impact on SHPCON message type with idoc DELVRY03(basic idoc)?
    Since after i moved to devp. to QAS SHPCON is haning with status 64 and is never getting process.
    When i force it thru BD87 it gives this short dump message
    Runtime errors   DBIF_RSQL_INVALIDD_RSQL
    EXCEPTN          CX_SY_OPEN_SQL_DB    
    and it is pointing to the user exit EXIT_SAPLV55K_005. But i have not made any change to this user exit.
    Can someone tell me if DESADV changes might has to be anything with SHPCON status 64?
    IS there any way to resolve this.
    Appreciate your help in advance.
    Thank you.
    Mamatha

    hi mamata
    can u please post the answer

  • Does acrobat has any option to read pdf content objects(stamps, layers, images etc) without using pl

    Does acrobat has any option to read pdf content objects(stamps, layers, images etc) without using plug-in in c#.net ?
    My requirement is read a pdf file and extract all the page objects(stampls, layers and images) along with its coordinates. Is it possible to get without using plug-ins in c#.net ?
    Please hlep me.

    These are very different things.
    JavaScript has some access to layers (called OCG). Layers are just names and have no coordinates to retrieve.
    Stamps may be annotations; there is some minimal access to these too I think. It may be hard to identify what is, and is not, a stamp even with a plug-in.
    Images are part of the actual page contents, and are only accessible to plug-ins.

  • Can I convert a proxy for a class that does not has any interfaces?

    Can I convert a proxy for a class that does not has any interfaces?

    Hi.
    I can hardly understand your question: what do you want your proxy (what kind of proxy?) to be converted into?
    All I can tell you is the following: Proxies created using java.lang.reflect.Proxy can only be created using an interface. This interface has to be implemented by the proxied object. So: no interface, no java.lang.reflect.Proxy.
    Bye.

  • HT4113 My daughters iPod touch asks for her pass code but when she types it in the cursor does not move or input any characters so,she cannot get into the iPod. This has suddenly happened for no apparent reason

    My daughters iPod touch asks for her pass code but when she types it in the cursor does not move or input any characters so,she cannot get into the iPod. This has suddenly happened for no apparent reason, what can we do? Can anyone help please?

    Try:
    - iOS: Not responding or does not turn on
    - Also try DFU mode after try recovery mode
    How to put iPod touch / iPhone into DFU mode « Karthik's scribblings
    - If not successful and you can't fully turn the iOS device fully off, let the battery fully drain. After charging for an least an hour try the above again.
    - Try on another computer
    - If still not successful that usually indicates a hardware problem and an appointment at the Genius Bar of an Apple store is in order.
    Apple Retail Store - Genius Bar       

  • Does anyone know if Apple has any plans to create an electronic medical records (EMR) program? And if not, who do I email to suggest just that as a new market in desperate need of some new innovation?

    Does anyone know if Apple has any plans to create an electronic medical records (EMR) program? And if not, who do I email to suggest just that as a new market in desperate need of some new innovation?

    There already are some tools in the App Store (eg. My Medical - https://itunes.apple.com/us/app/my-medical/id347860026?mt=8).
    If you mean something that would interact directly with a Hospitals main system or such, I don't know of any.  There are numerous companies now selling and setting up central records systems around the country, but I don't know of any that are working on companion patient tools yet.
    Some charity and non-profit companies, like MedicAlert Foundation are working on such things and may have mobile apps on their radar, as funds allow them to develop such thing.  MedicAlert already offers an EMIR service online, but no standalone mobile app for it yet (you manage it via their web portal).
    Epocrates (owned by Athena Health) might also have something in the works, or at least an interest in such a thing.

  • Does newScale has any built-in tools for "trend" monitoring?

    Does newScale has any built-in tools for "trend" monitoring?
    A couple questions being asked by my peers and I am not sure how to answers on 'trending' like:
    How did a user get here (to the order form - through searching or navigating the service catalog)?
    Is the service catalog in RC helpful or working as it is intended?
    The team is working on putting together the service catalog for the RC, and they would like to know whether there's any tools available in newScale that would have some statistic on how people are using it.
    Any suggestion?

    If your question of "is the service catalog in RC helpful or working as intended?" can be answered by the order volume trends, you might want to explore using the Reporting and Analytics capability in RequestCenter.
    You can design these reports to provide the volume trends (even with charts):
    Order Volume by Service Group over time
    Order Volume by Service over time
    Month over month service completion volume
    etc.

  • Does any iPod model (or has any ever) other than the iPod Touch support iCloud or wifi syncing?

    Does any iPod model (or has any ever) other than the iPod Touch support iCloud or wifi syncing?  Thanks.

    No, the Touch is it.

Maybe you are looking for

  • Error while posting report in inventory transfer from draft

    hi,           we have entered all the details in inventory transfer at the row level.Due to editing purpose we have saved it as draft.but now while posting the document it displayed the error as "No Matching records found". ca anybody tell what is th

  • HT201365 i have problem the server in not reach

    i have iphone 4s and i turned on find my iphone but now show me a message that server is not reach and my iphone is turned lock

  • Scanned documents in KM

    Dear gurus, I encountered a problem. We upload documents in pairs. One file of pair is scanned version of document (TIFF file) and second one is recognized version (MS Word file). We present a document as a pair of two files, tiff and ms word. It's n

  • Instantiating LoginConfiguration0 for JAAS

    Hello I'm trying to distribute an application that needs a logon to an ejb server via webstart. Here is some sample code on how I am setting the system properties to use a file, auth.conf, to tell JAAS about the client's login configuration public Us

  • Cable drivers installed properly?

    I have read the cableconnection problems on this forum, that people including me get the errormessage "unrecognized usb device". We try every method but no success. So I am thinking that the drivers may not be installed properly, and when I look at t