Monitor Security-Violations - Avaya DEFINITY Server CSI Maintenance Manual

Table of Contents

Advertisement

Maintenance Commands

monitor security-violations

Use monitor security-violations to display information about failed attempts to
access the system, including the time of the violation, the login entered, and the
port accessed during the failed login attempt. The system logs trunk group
numbers, members, and extensions for remote access violations. The system
logs remote and local invalid access attempts with a total of 16 entries maintained
for each access type. This online status report automatically updates every 30
seconds until the command is canceled by pressing the CANCEL key.
Action/Object
Qualifier
monitor
print
security-violations
Output
The following example shows the output from monitor security-violations.
monitor security-violations
SYSTEM MANAGEMENT VIOLATIONS
Date
Time
Login
12/30
09:12 init
12/30
09:12 init
12/30
09:12 init
Field descriptions
Current date and time.
Date
Date of the logged security violation shown as MM/DD (where MM = month
Date
and DD = day).
Time of the logged security violation shown as HH:MM (where HH = the
Time
hour and MM = minute of the invalid access attempt).
Login ID entered for the login violation attempt.
Login
Type of port used when login violation occurred. The following is a table of
Port
valid port types:
356
Issue 5 October 2002
Qualifier Description
Reports print to SAT-linked
printers.
SECURITY VIOLATIONS STATUS
Date:
9:12 MON DEC 30 1991
REMOTE ACCESS VIOLATIONS
Port
Ext
Date
MGR1
12/30
MGR1
MGR1
Logins
Defaults
init
none
inads
craft
cust
rcust
bcms
browse
SPE A
Time
TG No.
Mbr
12:42
80
1
Feature Interactions
none
Ext
1111
555-233-119

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents