Home > Lucent Technologies > Communications System > Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide

Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							DEFINITY Enterprise Communication Server Release 8.2
    Reports Guide  555-233-505  Issue 1
    April 2000
    Processor Occupancy Reports 
    4-21 Mapping Links to Applications 
    4
    Table 4-5. Procedures for Calculating Processor Occupancy 
    Step Description
    Step 1. 
    Is there availab le suffic ient Proc essor Oc c upanc y to grow the 
    switch? 
    nIf the sum of Call Proc essing  Oc c up anc y p lus Static  
    Oc c up anc y is g reater than 70 p erc ent, there is no room to 
    g row and  no need  to c omp lete Steps 2 throug h 7. 
    nIf the sum of Call Proc essing  Oc c up anc y p lus Static  
    Oc c up anc y is less than 70 p erc ent, c ontinue with the 
    following  step s.
    Step 2. 
    Calc ulate the Usag e Profile.
    Use the four-week averag e d ata (ob tained  from your 
    c omp leted  c op y of Worksheet 5) to solve the following  
    equations. 
    Continued on next page
    %INTCOM=
    Total AtmptInt Atmpt
    _
      __________
    ´100
    %INC=
    Total AtmptInc Atmpt
    _
      __________
    ´100
    %OUT=
    Total AtmptOut Atmpt
    _
      __________
    ´100
    %PNET=
    Total Atmpt Pnet Atmpt-Tandem Calls
    _
      _________________________
    ´100 
    						
    							DEFINITY Enterprise Communication Server Release 8.2
    Reports Guide  555-233-505  Issue 1
    April 2000
    Processor Occupancy Reports 
    4-22 Mapping Links to Applications 
    4
    Step 3. 
    Determine the Traffic  Ap p lic ation.
    Is the traffic  ap p lic ation ICM/CMS, or CallVisor ASAI/OCM.
    You c an make this d etermination b ased  on the typ e of 
    b usiness served by the switc h, the p erc entag es of inc oming  
    and  outg oing  traffic , and  p ersonal knowledg e of whic h 
    features in use. For examp le, a General Business ap p lic ation 
    has a more even (in terms of inc oming, outgoing, and 
    interc om) d istrib ution of traffic . An ICM/CMS ap plic ation has a 
    hig h p erc entag e of inc oming c alls and also provid e those 
    features sp ec ific  to ACD or Call Vec toring . Some of these 
    inc lud e ag ent and  trunk trac king  c ap ab ility (for examp le, CMS 
    or BCMS), rec urring announc ements, and  so on.
    If the switc h sup p orts more than one traffic  ap p lic ation (for 
    examp le, ICM/CMS as the primary and General Business as 
    the sec ond ary), then the p roc essor oc c up anc y req uired  for 
    the p rimary ap p lic ation must b e d etermined first and  then the 
    remaind er is availab le for the sec ond ary ap p lic ation.
    NOTE:
    This d oc ument d esc rib es the method  for c alc ulating  the 
    BHCC for a simp le General Business traffic  ap p lic ation. 
    Those switc hes that p rovid e the DCS, CMS, BCMS, 
    and /or ISDN-PRI feature(s) are termed  c omp lex and the 
    Desig n Center must b e c onsulted  in order to c alc ulate 
    their BHCC. All ICM (ACD and  Call Vec toring ), 
    ASAI/OCM, and  vec toring  and  interflow/traffic  
    ap p lic ations are also termed  c omp lex and  c urrently are 
    only evaluated  b y the Desig n Center. For more 
    information, c ontac t your Ac c ount Team.
    Step 4. 
    Determine the maximum numb er of c alls the switc h should  b e 
    ab le to c omp lete in one hour.
    In ord er to make this d etermination, to the c onfig uration 
    g uid elines for the switc h.
    Table 4-5. Procedures for Calculating Processor Occupancy  — Continued
    Step Description
    Continued on next page 
    						
    							DEFINITY Enterprise Communication Server Release 8.2
    Reports Guide  555-233-505  Issue 1
    April 2000
    Processor Occupancy Reports 
    4-23 Mapping Links to Applications 
    4
    Step 5. 
    Determine the normal c alling  rate for the g iven level of 
    occupancy.
    a. Calc ulate how many c omp leted  c alls the switc h makes 
    for the g iven level of oc c up anc y. This numb er is 
    referred  to as Calls p red ic ted . 
    NOTE:
    1) The d ivisor numb er, 70, is the c onstant 
    from Step  1 and refers to the p erc entage of 
    the processor used by c all proc essing.
    2) The numb er for BHCC is the number that is 
    ob tained in Step  4.
    b . Comp are the Calls Pred ic ted  numb er to the four-Week 
    average Total Calls field on Worksheet 5. 
    c . If the Calls Pred ic ted numb er is less than the Total Calls 
    numb er, then either the c ustomer has a low feature 
    usag e rate or is c omp leting  more than 70 p erc ent of 
    c alls. Therefore, if ad d itional c ap ac ity is used in the 
    same way, the following  p red ic tions should  p rovide 
    reliab le results.
    If the Calls Predic ted  numb er is g reater than the Total 
    Calls numb er, then either the c ustomer has a high 
    feature usag e rate or is c omp leting  less than 70 
    p erc ent of c alls. Therefore, c are must b e taken in 
    p red ic ting how many ad ditional c alls c an be 
    supported.
    NOTE:
    If the Calls Pred ic ted  numb er eq uals or ap p roximately 
    eq uals the Total Calls numb er, then the c ustomer is 
    using  the switc h in a typ ic al manner.
    Table 4-5. Procedures for Calculating Processor Occupancy  — Continued
    Step Description
    Continued on next page
    Calls Predicted=
    70 Static Occ+CP Occ
    _
      ____________________
    ´BHCC
    Calls PredictedTotal Calls 
    						
    							DEFINITY Enterprise Communication Server Release 8.2
    Reports Guide  555-233-505  Issue 1
    April 2000
    Processor Occupancy Reports 
    4-24 Mapping Links to Applications 
    4
    Step 6. 
    Determine how many ad d itional c alls the switc h c an 
    complete.
    The number of add itional c alls c an be c alc ulated  with the 
    following  equation. 
    Step 7. 
    Determine how many ad d itional extensions c an b e ad d ed . 
    NOTE:
    The Averag e Numb er of Calls p er Extension d ep end s 
    on the traffic  ap p lic ation and other c ustomer-sp ec ific  
    op erating  tec hniq ues. If this measurement is not known, 
    then you may use 4.05 (a typ ic al fig ure for a General 
    Business traffic  ap p lic ation).
    Table 4-5. Procedures for Calculating Processor Occupancy  — Continued
    Step Description
    Continued on next page
    Number o f  Additional Calls=
    Static Occ+CP Occ Total Calls( 4Week Avg)
    _
      ______________________
    ´(Idle Occ-15 )
    Additional Extensions=
    Average Number o f  Calls per ExtensionNumber o f  Additional Calls
    _
      __________________________________ 
    						
    							Security Violations Reports 
    5-1 Security Violations Summary Report 
    5
    DEFINITY Enterprise Communication Server Release 8.2
    Reports Guide  555-233-505  Issue 1
    April 2000
    5
    Security Violations Reports
    This c hapter d esc rib es the Sec urity Violations Rep orts. There are six sec urity 
    violation rep orts 
    — a d etail rep ort, a summary rep ort, and  four status rep orts. 
    These rep orts show system management log ins, and  attemp ts to use station 
    security codes, authorization codes, and remote access barrier codes. They also 
    p rovid e information ab out attemp ts to ac c ess the system mad e within a g iven 
    time frame. 
    Security Violations Summary Report
    The system g enerates a Sec urity Violations Summary Rep ort that d isp lays valid 
    and  invalid  ac c ess attemp ts, and  sec urity violations in eac h of the c ateg ories 
    measured  (log in, authorization c od e, b arrier c od e, and  station sec urity c od e). 
    Commands
    Commands are availab le to d isp lay or c lear the Sec urity Violations Summary 
    rep ort. 
    To d isp lay the summary rep ort:
    1. Type list measurements security-violations summary [print/schedule] 
    and press 
    RETURN. 
    						
    							DEFINITY Enterprise Communication Server Release 8.2
    Reports Guide  555-233-505  Issue 1
    April 2000
    Security Violations Reports 
    5-2 Security Violations Summary Report 
    5
    To reset all c ounters of the Sec urity Violations rep orts to zero:
    1. Type clear measurements security-violations and press 
    RETURN.
    NOTE:
    The Security Violations Summary Report accumulates data until it is 
    cleared. This report 
    will overflow; therefore, review and clear it at 
    least once a month.
    Options: The op tions print
     and schedule
     are available for these 
    commands.
    Screen
    Screen 5-1 d isp lays a typ ic al Sec urity Violations Summary Report. The rep ort 
    head er lists the switc h name and  d ate and  time the rep ort is req uested . Table 5-1
     
    d esc rib es the d ata p resented  in the Sec urity Violations Summary Rep ort.
    Screen 5-1. Security Violations Summary Report 
         --------------------------------------------------------------------------
         --------------------------------------------------------------------------
        Switch Name:______________        Date: xx:xx am  DAY MON xx, 19xx
                         SECURITY VIOLATIONS SUMMARY REPORT
                     Counted Since: xx:x am   DAY MON xx,19xx
    Barrier
    Codes Station Security Codes   Authorization Codes
    -------- ---------------------- -----------------------------------
    Origination Remote
    Station Trunk Total Station Trunk Access Attd Total
    Valid 0 1 2 3 0 0 0 0  0
    Invalid 0 4 6 10  0 0 0 0  0
    Sec Viol  0   3      0
    Successful  Invalid  Invalid Forced     Login Security  Trivial
    Port Type  Logins  Attempts IDs     Disconnects  Violations  Attempts
    SYSAM-LCL  0  0 0  0 0 0
    SYSAM-RMT  0 0 0  0 0 0
    MAINT    0 0 0  0 0 0
    SYS-PORT  0 0 0  0 0 0
    Total 0 0 0 0 0 0
         --------------------------------------------------------------------------
         -------------------------------------------------------------------------- 
    						
    							DEFINITY Enterprise Communication Server Release 8.2
    Reports Guide  555-233-505  Issue 1
    April 2000
    Security Violations Reports 
    5-3 Security Violations Summary Report 
    5
    Table 5-1. Security Violations Summary Report 
    Field Description
    Counted Since
    The time at whic h the c ounts ab ove were last c leared  and  
    started  accumulating  again, or when the system is 
    initialized .
    Barrier Codes
    The total numb er of times a user entered a valid  or invalid  
    remote ac c ess b arrier c od e, and  the numb er of resulting  
    sec urity violations. Barrier c od es are used  with remote 
    ac cess trunks.
    An inexp licab le, significant increase in valid b arrier cod e 
    use c ould  ind ic ate the b arrier c od e has b een 
    c omp romised .
    A marked  inc rease in this number of invalid  c od es may 
    ind ic ate someone is 
    attemp ting to b reak into your system. 
    If you have just ad ministered a new b arrier c od e, or a 
    barrier code expired recently, it may indicate people are 
    making  honest mistakes.
    Suggested Action:
     Delete or c hang e the b arrier c od e if 
    you susp ec t it has b een c omp romised .
    Station 
    Security Code 
    Origination/T
    otalThe numb er of c alls orig inating  from either stations or 
    trunks that g enerated valid  or invalid  station sec urity 
    c od es, the total numb er of suc h c alls, and  the numb er of 
    resulting security violations.
    A d ramatic  inc rease in the numb er of either valid  or invalid  
    attemp ts may b e c ause for alarm. Unless rec ord ing  of 
    TTI/PSA events is turned  off, they ap p ear in the history 
    log . If usag e d oes not seem leg itimate, sec urity c od es 
    and /or c lasses of servic e should  b e c hang ed .
    Continued on next page 
    						
    							DEFINITY Enterprise Communication Server Release 8.2
    Reports Guide  555-233-505  Issue 1
    April 2000
    Security Violations Reports 
    5-4 Security Violations Summary Report 
    5
    Authorization
    CodesThe numb er of c alls, b y orig ination, that g enerated  valid  
    or invalid  authorization cod es, the total numb er of such 
    c alls, and  the numb er of resulting  sec urity violations. Calls 
    are monitored  b ased  on the following  orig ination typ es:
    nSt a t i o n
    nTrunk (other than remote ac c ess)
    nRemote Access
    nAttend ant
    If valid authorization c od e usag e inc reases d ramatic ally, 
    you should  investig ate. Someone may have ob tained  
    valid  c od es; on the other hand , it may turn out that a 
    numb er of new, leg itimate users have c ome onto the 
    system.
    If invalid  authorization c od e usag e inc reases d ramatic ally, 
    you should  investig ate. Someone may b e trying  to break 
    into your system. However, a leg itimate exp lanation may 
    b e that authorization c od es have rec ently b een c hanged  
    and  users are making  some honest mistakes.
     If you 
    susp ec t Authorization Cod es have b een c omp romised , 
    change them.
    Table 5-1. Security Violations Summary Report  — Continued
    Field Description
    Continued on next page 
    						
    							DEFINITY Enterprise Communication Server Release 8.2
    Reports Guide  555-233-505  Issue 1
    April 2000
    Security Violations Reports 
    5-5 Security Violations Summary Report 
    5
    Port Type 
    The typ e of p ort used by the measured  log in p roc ess. If 
    break-ins are occ urring at this level, the offender may 
    have ac c ess to your system administration. This is an 
    extremely d ang erous situation.
    On the G3r, p ort types c an b e:
    nSYSA M - L C L  ( SYSA M  L o c a l Po r t . ) : This p ort on the 
    SYSAM b oard  is typ ic ally used  as the loc al c onnec tion 
    to the management terminal. It is loc ated  in the switc h 
    room.
    nSYSA M - RM T (SYSA M  Re m o t e  Po r t . ) : The dial-up port 
    on the SYSAM b oard  is typ ic ally used  b y servic es for 
    remote maintenanc e and  is also used b y the switc h to 
    c all out with alarm information. If system b reak-ins are 
    mad e or attemp ted  using this p ort, the offend er is 
    someone who has the d ial-up  numb er.
    nMAINT: These ports on the Expansion Port Networks 
    maintenanc e b oard s are typ ic ally used  as loc al 
    c onnec tions for on site maintenanc e p erformed  b y 
    servic es. If system b reak-ins are mad e or attemp ted  
    using this p ort, the offend er is someone who works in 
    the building.
    nSYS- PO RT ( Sy st e m  Po r t s) : These ports are ac c essed  
    b y d ial-up  throug h the TDM b us.
    On the G3si, p ort typ es c an b e:
    nMGR1: The d ed ic ated  system ad ministration terminal 
    c onnec tion.
    nNET: The network c ontroller d ial-up  p orts.
    nEPN: The EPN maintenanc e EIA port.
    nINADS: The Initialization and  Administration System 
    port.
    Total
    Measurements totaled  for all the ab ove p ort typ es.
    Successful 
    LoginsThe total numb er of suc c essful logins into SM (that is, the 
    login ID and the password submitted were valid) for the 
    given port type.
    Table 5-1. Security Violations Summary Report  — Continued
    Field Description
    Continued on next page 
    						
    							DEFINITY Enterprise Communication Server Release 8.2
    Reports Guide  555-233-505  Issue 1
    April 2000
    Security Violations Reports 
    5-6 Security Violations Summary Report 
    5
    Invalid Login 
    AttemptsThe total numb er of log in attemp ts where the attempting  
    party submitted an invalid login ID or password while 
    ac c essing  the g iven p ort typ e.
    NOTE:
     Look for numb ers sig nific antly hig her than normal. 
    Invalid attempts do not inc lude cases where a user 
    makes several attemp ts to log on and  is suc c essful 
    on the sec ond  or third  attemp t. (A user is g iven 
    three tries at log g ing  on before d isc onnec ted .)
    Invalid Login 
    IDsThe total numb er of unsuc c essful log in attemp ts where 
    the attemp ting  p arty sub mitted  an invalid  log in while 
    ac c essing  the g iven p ort typ e.
    Login Forced 
    DisconnectsThe total numb er of log in p roc esses d isc onnec ted  
    automatic ally b y the switc h b ec ause the threshold  for 
    c onsec utive invalid  log in attemp ts was exc eed ed  for the 
    g iven p ort typ e. The threshold  is three attemp ts.
    Login 
    Security 
    ViolationsThe total numb er of log in sec urity violations for the given 
    port type.
    As with b arrier c od e attemp ts, the user c an define the 
    meaning  of a sec urity violation b y setting two p arameters 
    ad ministratively:
    1. The numb er of unsuc c essful log ins
    2. The time interval
    A log in sec urity violation notific ation is sent to the 
    attend ant c onsole or a station with a d isp lay when the 
    numb er of unsuc c essful logins is exc eed ed  within the 
    ad ministered  interval of time.
    Login Trivial 
    AttemptsThe total numb er of times a user c onnec ted  to the system 
    and  gave no inp ut to the log in seq uenc e. A larg e numb er 
    of trivial attempts c ould  mean that the d ial-up numbers 
    were accidentally distributed to the wrong personnel.
    Table 5-1. Security Violations Summary Report  — Continued
    Field Description
    Continued on next page 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies DEFINITY® Enterprise Communication Server Release 8.2 Reports Guide