Home > Lucent Technologies > Communications System > Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide

Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide

Here you can view all the pages of manual Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 281

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Security Violations Reports 
5-7 Security Violations Detail Report 
5
Security Violations Detail Report
The Sec urity Violations Detail Rep ort provid es system manag ement log in data 
p er log in id entific ation. It relates only to system ad ministration.
NOTE:
If you rec ently ad d ed  log in IDs, these d o not ap p ear in the d etail rep ort 
(either as suc c essful or not) until the next hourly up d...

Page 282

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Security Violations Reports 
5-8 Security Violations Detail Report 
5
Screen
Screen 5-2 shows typ ic al outp ut for the Sec urity Violations Detail Rep ort for G3r 
systems. Table 5-2
 d esc rib es the d ata fields p resented  in the Sec urity Violations 
Detail Rep ort.
Screen 5-2. Security Violations Detail Report 
list measurements security-violations detail                   Page 1  SPE A
Switch Name:...

Page 283

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Security Violations Reports 
5-9 Security Violations Detail Report 
5
Table 5-2. Security Violations Detail Report 
Field Description
Login ID
The log in id entific ation sub mitted  b y the p arty attemp ting  to 
login. Log in IDs inc lud e the valid  system log in IDs.
NOTE:
If you see a larg e numb er of invalid attemp ts where an 
invalid ID is used, this may indic ate unauthorized use by an 
ind ivid...

Page 284

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Security Violations Reports 
5-10 Security Violations Status Reports 
5
Security Violations Status Reports
The sec urity violations rep orts p rovid e c urrent status information for Log in, 
Remote Ac c ess (b arrier c ode), or Authorization Cod e or Station Sec urity Code 
violation attempts. The data displayed by these reports is updated every 30 
sec ond s. A total of 16 entries is maintained  for eac...

Page 285

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Security Violations Reports 
5-11 Security Violations Status Reports 
5
Security Violations Status— 
Login Violations report 
Screen 5-3 shows typ ic al outp ut for the Sec urity Violations Status—Log in 
Violations rep ort. Table 5-2
 d esc rib es the data field s presented  in the Sec urity 
Violations Status—Log in Violations rep ort.
Screen 5-3. Security Violations Status— Login Violations report...

Page 286

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Security Violations Reports 
5-12 Security Violations Status Reports 
5
Security Violations Status— Remote Access 
Barrier Code Violations report 
Screen 5-4 shows typ ic al outp ut for the Sec urity Violations Status—Remote 
Ac cess Barrier Code Violations report. Table 5-4
 describes the data fields 
p resented  in the Sec urity Violations Status—Remote Ac c ess Barrier Cod e 
Violations rep ort.
Table...

Page 287

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Security Violations Reports 
5-13 Security Violations Status Reports 
5
Screen 5-4. Remote Access Barrier Code Violations report 
Table 5-4. Remote Access Barrier Code Violations
Field Description
Date
The date the attempt oc c urred .
Time
The time the attemp t oc c urred.
TG No
Trunk Group  Numb er. The numb er of the remote ac c ess 
trunk group over which the barrier c ode is sent.
Mbr
Trunk Group...

Page 288

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Security Violations Reports 
5-14 Security Violations Status Reports 
5
Security Violations Status—Authorization 
Code Violations report 
Screen 5-5 shows typ ic al outp ut for the Sec urity Violations Status—Authorization 
Code Violations report. Table 5-5
 describes the data fields presented in the 
Sec urity Violations Status—Authorization Cod e Violations rep ort.
Screen 5-5. Authorization Code...

Page 289

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Security Violations Reports 
5-15 Security Violations Status Reports 
5
Table 5-5. Authorization Code Violations report
Field Description
Date
The date the attempt oc c urred .
Time
The time the attemp t oc c urred.
Originator
The typ e of resourc e from whic h the invalid  ac c ess attemp t 
orig inated . Orig inator typ es inc lud e:
nSt a t io n
nRemote Ac c ess (when the invalid  authorization c ode is...

Page 290

DEFINITY Enterprise Communication Server Release 8.2
Reports Guide  555-233-505  Issue 1
April 2000
Security Violations Reports 
5-16 Security Violations Status Reports 
5
Security Violations Status—Station Security Code
Violations report
Screen 5-6 shows typ ic al outp ut for the Sec urity Violations Status—Station 
Sec urity Cod e Violations rep ort. Table 5-6
 d esc rib es the d ata field s p resented  in 
the Sec urity Violations Status—Station Sec urity Cod e Violations rep ort.
Screen 5-6. Station...
Start reading Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide

Related Manuals for Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide

All Lucent Technologies manuals