DEFINITY Enterprise Communications Server Release 7
Maintenance for R7r
555-230-126 Issue 4
June 1999
Maintenance Object Repair Procedures
9-981LOG-SVN (Login Security Violation)
9
d. The affected login ID will be d isabled as a result of detec tion of the
security violation, unless it is the last enab led INADS type login on the
system. The provision to disable a log in ID following detectio n of a security
violation involving that login ID is ad ministerable on a login ID b asis.
e. The enable login command is used to both enable a log in that has been
disabled, and to retire any login security violation alarms assoc iated with
the login ID.
f. Use of the enable login command to enable a log in and/or retire alarms
must be executed using a login ID with greater service lev el hierarchy
permissions.
g. Access to the enable login comm and is controlled through the Ad minister
Permissions field on the Command Permission Categories fo rm. This field
(Administer Permissions) must be set to "y" to access the enab le login
command.
h. The
Port
alarm report field will set to the p ort where the final invalid login
attempt, involving the alarmed login ID, was detec ted. Valid port values for
G3i products includ e:
MGR1 — Ded icated manager 1 or G3 manag ement terminal
connection
NET-n — Network controller d ial up port
INADS — INADS port
EPN — EPN main tenanc e EIA p ort
—EIA Other EIA port
Valid port value for G3r produc ts include:
SYSAM _LOC — Local administration p ort
SYSAM _RMT — Remote administration port
SYS_PORT — System Po rt
MAINT — Maintenanc e port
i. The
Svc Sta te
alarm report field will b e set to OUT if the login ID is in the
disabled state as a result o f detection of a security viola tion involving the
login ID. Once the login I D has been enabled, the field will be set to IN.
j. The source or reason of the failed login attempts shoul d be identified and
the cause corrected p rior to re-enabling a login ID and /or retiring any
alarms associated with the log in ID. The cause may be something as
innocuous as the failure of Lucent servic es automatic login software, to
something as insidious as a hac ker attempting to gain ac cess to the
switch system management interfac e.
Prior to retiring an SVN alarm and enabling the associated login ID, the monitor
security-violations login command c an be used to acce ss information about
the invalid login attempts th at caused the security violation. This information c an