Avaya Definity SI Maintenance Manual page 479

Table of Contents

Advertisement

monitor security-violations
Output
The following example is a display of the monitor security-violations command.
monitor security-violations
SYSTEM MANAGEMENT VIOLATIONS
Date
Time
Login
12/30
09:12 init
12/30
09:12 init
12/30
09:12 init
Field descriptions
Current date and time.
Date
Date of the logged security violation, MM/DD (MM = month, DD = day).
Date
Time of the logged security violation shown as HH:MM
Time
(HH = the hour, MM = minute of the invalid access attempt).
Login ID entered for the login violation attempt.
Login
Type of port used when login violation occurred.
Port
MGR1 represents a connection to a system SAT port. Connections are either
MGR1
hardwired or dialed-up.
Extension assigned to the data module that failed during "logging in" session.
Ext
If a data module is not used, this field is blank.
Date of the logged security violation, MM/DD (MM = month, DD = day).
Date
The time of the logged security violation, HH:MM (HH = hour, MM = minute).
Time
The trunk group number associated with the trunk from the failed remote
TG
No.
access attempt (remote access violations only).
The trunk group member number associated with the trunk from the failed
Mbr
remote access attempt (remote access violations only).
Extension that interfaces with remote access features (remote access
Ext
violations only).
555-233-123
SECURITY VIOLATIONS STATUS
Date:
9:12 MON DEC 30 1991
REMOTE ACCESS VIOLATIONS
Port
Ext
Date
MGR1
12/30
MGR1
MGR1
SPE A
Time
TG No.
Mbr
Ext
12:42
80
1
1111
Issue 4 May 2002
8-229

Advertisement

Table of Contents
loading

Table of Contents