DEFINITY ECS Release 8.2 Maintenance for R8.2csi
555-233-119 Issue 1
April 2000
Maintenance Commands
2-164monitor security-violations
2
monitor security-violations
This command displays in formation about failed attemp ts to access the system,
including the time of the v iolation, the login entered, and the port accessed
during the failed log in attempt. The system logs trunk group num bers, members,
and extensions for remote acces s violations. The system logs remote and loca l
invalid access attemp ts with a total of 16 entries maintained for eac h access
type. This online status report automatic ally updates every 30 sec onds until the
command is canceled by pressing the CANCEL key.
Output
The following example shows the output from the monitor sec urity-violations
command.
Wn Number of Wn associated with the c abinet. An asterisk fills the field
when the number exceeds 99 .
PNC Displays current Port Network Connectivi ty (PNC) status for each port
network within a cabinet. When multiple p ort networks exist within a
cabinet, a slash separates Carriers A, B, and C (listed first) from
Carriers D and E (up/up). Availab ility of the Expansion Archangel Link
(EAL) determines the PNC status of a port network. “Up” denotes EAL
availability. When the EAL is not available, then “dn” (down) displays.
Time of Day Displays current time of d ay acquired from the sy stem.
Action/Object Qualifier Qualifier Description Permissions Defaults
Feature
Interactions
monitor
security-violations
print
Reports print to SAT-linked
printers. init
inads
craft
cust
rcust
bcms
browse
none none
monitor security-violations SPE A
SECURITY VIOLATIONS STATUS
Date: 9:12 MON DEC 30 1991
SYSTEM MANAGEMENT VIOLATIONS REMOTE ACCESS VIOLATIONS
Date Time Login Port Ext Date Time TG No. Mbr Ext
12/30 09:12 init MGR1 12/30 12:42 80 1 1111
12/30 09:12 init MGR1
12/30 09:12 init MGR1