Avaya Communication Manager Administrator's Manual page 412

Hide thumbs Also See for Communication Manager:
Table of Contents

Advertisement

Enhancing System Security
Figure 172: Security-Related System Parameters screen
change system-parameters security
SECURITY VIOLATION NOTIFICATION PARAMETERS
SVN Login Violation Notification Enabled? y
SVN Remote Access Violation Notification Enabled? y
SVN Authorization Code Violation Notification Enabled? y
Authorization Code Threshold: 10
2. In the SVN Login Violation Notification Enabled field, type y.
This sets Security Violations Notification login violation notification.
Note:
If you are not using Security Violation Notification for logins, type n in the SVN
Note:
Login Violation Notification Enabled field and go to Step 11.
3. In the Originating Extension field, type 3040.
This becomes the telephone extension for the purpose of originating and identifying SVN
referral calls for login security violations.
4. In the Referral Destination field, type attd to send all calls to the attendant.
This is the telephone extension that receives the referral call when a security violation
occurs.
5. In the Login Threshold field, type 3.
This is the minimum number of login attempts that are permitted before a referral call is
made. More than 3 attempts causes a security violation notification.
6. In the Time Interval field, type 0:03.
This the time interval in which the threshold, or number of violations, must occur.
7. Press Enter to save your changes.
412 Administrator Guide for Avaya Communication Manager
SECURITY-RELATED SYSTEM PARAMETERS
Originating Extension: _____ Referral Destination: _____
Login Threshold: 5_
Announcement Extension: _____
Originating Extension: _____ Referral Destination: _____
Barrier Code Threshold: 10
Announcement Extension: _____
Originating Extension: _____ Referral Destination: _____
Announcement Extension: _____
Time Interval: 0:03
Time Interval: 0:03
Time Interval: 0:03
Page 1 of 2

Hide quick links:

Advertisement

Table of Contents

Troubleshooting

loading

Table of Contents