Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide
Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide
Here you can view all the pages of manual Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 271
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Processor Occupancy Reports 4-21 Mapping Links to Applications 4 Table 4-5. Procedures for Calculating Processor Occupancy Step Description Step 1. Is there availab le suffic ient Proc essor Oc c upanc y to grow the switch? nIf the sum of Call Proc essing Oc c up anc y p lus Static Oc c up anc y is g reater than 70 p erc ent, there is no room to g row and no need to c omp lete Steps 2 throug h...
Page 272
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Processor Occupancy Reports 4-22 Mapping Links to Applications 4 Step 3. Determine the Traffic Ap p lic ation. Is the traffic ap p lic ation ICM/CMS, or CallVisor ASAI/OCM. You c an make this d etermination b ased on the typ e of b usiness served by the switc h, the p erc entag es of inc oming and outg oing traffic , and p ersonal knowledg e of whic h features in use. For examp le, a General...
Page 273
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Processor Occupancy Reports 4-23 Mapping Links to Applications 4 Step 5. Determine the normal c alling rate for the g iven level of occupancy. a. Calc ulate how many c omp leted c alls the switc h makes for the g iven level of oc c up anc y. This numb er is referred to as Calls p red ic ted . NOTE: 1) The d ivisor numb er, 70, is the c onstant from Step 1 and refers to the p erc entage of the...
Page 274
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Processor Occupancy Reports 4-24 Mapping Links to Applications 4 Step 6. Determine how many ad d itional c alls the switc h c an complete. The number of add itional c alls c an be c alc ulated with the following equation. Step 7. Determine how many ad d itional extensions c an b e ad d ed . NOTE: The Averag e Numb er of Calls p er Extension d ep end s on the traffic ap p lic ation and other c...
Page 275
Security Violations Reports 5-1 Security Violations Summary Report 5 DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 5 Security Violations Reports This c hapter d esc rib es the Sec urity Violations Rep orts. There are six sec urity violation rep orts — a d etail rep ort, a summary rep ort, and four status rep orts. These rep orts show system management log ins, and attemp ts to use station security codes, authorization codes, and remote access...
Page 276
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Security Violations Reports 5-2 Security Violations Summary Report 5 To reset all c ounters of the Sec urity Violations rep orts to zero: 1. Type clear measurements security-violations and press RETURN. NOTE: The Security Violations Summary Report accumulates data until it is cleared. This report will overflow; therefore, review and clear it at least once a month. Options: The op tions print and...
Page 277
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Security Violations Reports 5-3 Security Violations Summary Report 5 Table 5-1. Security Violations Summary Report Field Description Counted Since The time at whic h the c ounts ab ove were last c leared and started accumulating again, or when the system is initialized . Barrier Codes The total numb er of times a user entered a valid or invalid remote ac c ess b arrier c od e, and the numb er...
Page 278
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Security Violations Reports 5-4 Security Violations Summary Report 5 Authorization CodesThe numb er of c alls, b y orig ination, that g enerated valid or invalid authorization cod es, the total numb er of such c alls, and the numb er of resulting sec urity violations. Calls are monitored b ased on the following orig ination typ es: nSt a t i o n nTrunk (other than remote ac c ess) nRemote...
Page 279
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Security Violations Reports 5-5 Security Violations Summary Report 5 Port Type The typ e of p ort used by the measured log in p roc ess. If break-ins are occ urring at this level, the offender may have ac c ess to your system administration. This is an extremely d ang erous situation. On the G3r, p ort types c an b e: nSYSA M - L C L ( SYSA M L o c a l Po r t . ) : This p ort on the SYSAM b oard...
Page 280
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Security Violations Reports 5-6 Security Violations Summary Report 5 Invalid Login AttemptsThe total numb er of log in attemp ts where the attempting party submitted an invalid login ID or password while ac c essing the g iven p ort typ e. NOTE: Look for numb ers sig nific antly hig her than normal. Invalid attempts do not inc lude cases where a user makes several attemp ts to log on and is suc...