EasyManua.ls Logo

Avaya S8700 - Monitor Security Violations

Avaya S8700
2618 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
monitor security violations
Issue 1 May 2002
7-221555-233-143
monitor security violations
monitor security-violations [print]
The monitor security-violations command displays the following information
about failed attempts to access the system: the time of the violation, the login
entered, and the port accessed during the failed login attempt. For remote access
violations, the trunk-group number, member number, and extension are also
shown. A total of 16 entries are maintained for each type of access. The report is
automatically updated every 30 seconds until the command is canceled by
pressing
CANCEL. Unlike some other monitor commands, canceling does not
cause the terminal to be logged off.
Output
System Management Violations
Remote Access Violations
Date
The date of the security violation given as MM/DD.
Time
The time of the logged security violation given as HH:MM.
Login
The login ID that was entered as part of the violation attempt.
Port Type
The type of port through which the login violation was attempted:
SYS-PORT
A dial-in connection to a system port.
MAINT
A physical connection to the G3-MT terminal connector on a PNs Maintenance circuit
pack.
Ext
The extension assigned to the data module that was used to attempt the failed login.
If a data module was not used (as in the case of dedicated EIA connections, for
example) the field is blank.
TG No.
The trunk group that carried the incoming remote access attempt (remote access
violations only).
Mbr
The trunk-group member number associated with the trunk from which the remote
access attempt terminated (remote access violations only).
Ext
The extension used to access the RAP (remote access violations only).

Table of Contents

Other manuals for Avaya S8700

Related product manuals