A method in a node for managing authorized attempts to access the node. A
packet is received from a source, wherein the packet includes a first
key. A determination is made as to whether the first key matches a second
key for the node. The packet is dropped without a response to the source
if the first key does not match the second key. Information from the
packet is stored in response to this absence of a match. The information
is sent to a selected recipient in response to a selected event, which
may be, for example, either immediately or in response to polling to see
if the information is present.