Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide
Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide
Here you can view all the pages of manual Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 281
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Security Violations Reports 5-7 Security Violations Detail Report 5 Security Violations Detail Report The Sec urity Violations Detail Rep ort provid es system manag ement log in data p er log in id entific ation. It relates only to system ad ministration. NOTE: If you rec ently ad d ed log in IDs, these d o not ap p ear in the d etail rep ort (either as suc c essful or not) until the next hourly up d...
Page 282
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Security Violations Reports 5-8 Security Violations Detail Report 5 Screen Screen 5-2 shows typ ic al outp ut for the Sec urity Violations Detail Rep ort for G3r systems. Table 5-2 d esc rib es the d ata fields p resented in the Sec urity Violations Detail Rep ort. Screen 5-2. Security Violations Detail Report list measurements security-violations detail Page 1 SPE A Switch Name:...
Page 283
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Security Violations Reports 5-9 Security Violations Detail Report 5 Table 5-2. Security Violations Detail Report Field Description Login ID The log in id entific ation sub mitted b y the p arty attemp ting to login. Log in IDs inc lud e the valid system log in IDs. NOTE: If you see a larg e numb er of invalid attemp ts where an invalid ID is used, this may indic ate unauthorized use by an ind ivid...
Page 284
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Security Violations Reports 5-10 Security Violations Status Reports 5 Security Violations Status Reports The sec urity violations rep orts p rovid e c urrent status information for Log in, Remote Ac c ess (b arrier c ode), or Authorization Cod e or Station Sec urity Code violation attempts. The data displayed by these reports is updated every 30 sec ond s. A total of 16 entries is maintained for eac...
Page 285
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Security Violations Reports 5-11 Security Violations Status Reports 5 Security Violations Status— Login Violations report Screen 5-3 shows typ ic al outp ut for the Sec urity Violations Status—Log in Violations rep ort. Table 5-2 d esc rib es the data field s presented in the Sec urity Violations Status—Log in Violations rep ort. Screen 5-3. Security Violations Status— Login Violations report...
Page 286
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Security Violations Reports 5-12 Security Violations Status Reports 5 Security Violations Status— Remote Access Barrier Code Violations report Screen 5-4 shows typ ic al outp ut for the Sec urity Violations Status—Remote Ac cess Barrier Code Violations report. Table 5-4 describes the data fields p resented in the Sec urity Violations Status—Remote Ac c ess Barrier Cod e Violations rep ort. Table...
Page 287
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Security Violations Reports 5-13 Security Violations Status Reports 5 Screen 5-4. Remote Access Barrier Code Violations report Table 5-4. Remote Access Barrier Code Violations Field Description Date The date the attempt oc c urred . Time The time the attemp t oc c urred. TG No Trunk Group Numb er. The numb er of the remote ac c ess trunk group over which the barrier c ode is sent. Mbr Trunk Group...
Page 288
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Security Violations Reports 5-14 Security Violations Status Reports 5 Security Violations Status—Authorization Code Violations report Screen 5-5 shows typ ic al outp ut for the Sec urity Violations Status—Authorization Code Violations report. Table 5-5 describes the data fields presented in the Sec urity Violations Status—Authorization Cod e Violations rep ort. Screen 5-5. Authorization Code...
Page 289
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Security Violations Reports 5-15 Security Violations Status Reports 5 Table 5-5. Authorization Code Violations report Field Description Date The date the attempt oc c urred . Time The time the attemp t oc c urred. Originator The typ e of resourc e from whic h the invalid ac c ess attemp t orig inated . Orig inator typ es inc lud e: nSt a t io n nRemote Ac c ess (when the invalid authorization c ode is...
Page 290
DEFINITY Enterprise Communication Server Release 8.2 Reports Guide 555-233-505 Issue 1 April 2000 Security Violations Reports 5-16 Security Violations Status Reports 5 Security Violations Status—Station Security Code Violations report Screen 5-6 shows typ ic al outp ut for the Sec urity Violations Status—Station Sec urity Cod e Violations rep ort. Table 5-6 d esc rib es the d ata field s p resented in the Sec urity Violations Status—Station Sec urity Cod e Violations rep ort. Screen 5-6. Station...