Home > Lucent Technologies > Communications System > Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide

Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide

Here you can view all the pages of manual Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 271

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Processor Occupancy Reports 
4-21 Mapping Links to Applications 
4
Table 4-5. Procedures for Calculating Processor Occupancy 
Step Description
Step 1. 
Is there availab le suffic ient Proc essor Oc c upanc y to grow the 
switch? 
nIf the sum of Call Proc essing  Oc c up anc y p lus Static  
Oc c up anc y is g reater than 70 p erc ent, there is no room to 
g row and  no need  to c omp lete Steps 2 throug h...

Page 272

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Processor Occupancy Reports 
4-22 Mapping Links to Applications 
4
Step 3. 
Determine the Traffic  Ap p lic ation.
Is the traffic  ap p lic ation ICM/CMS, or CallVisor ASAI/OCM.
You c an make this d etermination b ased  on the typ e of 
b usiness served by the switc h, the p erc entag es of inc oming  
and  outg oing  traffic , and  p ersonal knowledg e of whic h 
features in use. For examp le, a General...

Page 273

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Processor Occupancy Reports 
4-23 Mapping Links to Applications 
4
Step 5. 
Determine the normal c alling  rate for the g iven level of 
occupancy.
a. Calc ulate how many c omp leted  c alls the switc h makes 
for the g iven level of oc c up anc y. This numb er is 
referred  to as Calls p red ic ted . 
NOTE:
1) The d ivisor numb er, 70, is the c onstant 
from Step  1 and refers to the p erc entage of 
the...

Page 274

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Processor Occupancy Reports 
4-24 Mapping Links to Applications 
4
Step 6. 
Determine how many ad d itional c alls the switc h c an 
complete.
The number of add itional c alls c an be c alc ulated  with the 
following  equation. 
Step 7. 
Determine how many ad d itional extensions c an b e ad d ed . 
NOTE:
The Averag e Numb er of Calls p er Extension d ep end s 
on the traffic  ap p lic ation and other c...

Page 275

Security Violations Reports 
5-1 Security Violations Summary Report 
5
DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
5
Security Violations Reports
This c hapter d esc rib es the Sec urity Violations Rep orts. There are six sec urity 
violation rep orts 
— a d etail rep ort, a summary rep ort, and  four status rep orts. 
These rep orts show system management log ins, and  attemp ts to use station 
security codes, authorization codes, and remote access...

Page 276

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Security Violations Reports 
5-2 Security Violations Summary Report 
5
To reset all c ounters of the Sec urity Violations rep orts to zero:
1. Type clear measurements security-violations and press 
RETURN.
NOTE:
The Security Violations Summary Report accumulates data until it is 
cleared. This report 
will overflow; therefore, review and clear it at 
least once a month.
Options: The op tions print
 and...

Page 277

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Security Violations Reports 
5-3 Security Violations Summary Report 
5
Table 5-1. Security Violations Summary Report 
Field Description
Counted Since
The time at whic h the c ounts ab ove were last c leared  and  
started  accumulating  again, or when the system is 
initialized .
Barrier Codes
The total numb er of times a user entered a valid  or invalid  
remote ac c ess b arrier c od e, and  the numb er...

Page 278

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Security Violations Reports 
5-4 Security Violations Summary Report 
5
Authorization
CodesThe numb er of c alls, b y orig ination, that g enerated  valid  
or invalid  authorization cod es, the total numb er of such 
c alls, and  the numb er of resulting  sec urity violations. Calls 
are monitored  b ased  on the following  orig ination typ es:
nSt a t i o n
nTrunk (other than remote ac c ess)
nRemote...

Page 279

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Security Violations Reports 
5-5 Security Violations Summary Report 
5
Port Type 
The typ e of p ort used by the measured  log in p roc ess. If 
break-ins are occ urring at this level, the offender may 
have ac c ess to your system administration. This is an 
extremely d ang erous situation.
On the G3r, p ort types c an b e:
nSYSA M - L C L  ( SYSA M  L o c a l Po r t . ) : This p ort on the 
SYSAM b oard...

Page 280

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Security Violations Reports 
5-6 Security Violations Summary Report 
5
Invalid Login 
AttemptsThe total numb er of log in attemp ts where the attempting  
party submitted an invalid login ID or password while 
ac c essing  the g iven p ort typ e.
NOTE:
 Look for numb ers sig nific antly hig her than normal. 
Invalid attempts do not inc lude cases where a user 
makes several attemp ts to log on and  is suc...
Start reading Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide

Related Manuals for Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide

All Lucent Technologies manuals