Technical information

Large Business Communications Systems
4-58 Issue 7 June 2001
The SVN time interval selected, in conjunction with the threshold, specifies when
a referral call occurs. For example, if the barrier code threshold is set to 10 with a
time interval of two minutes, a referral call occurs whenever 10 or more invalid
barrier codes are entered within two minutes.
The advantage of the SVN feature is that it notifies the user of the problem as it
occurs so that there is an opportunity to interrupt unauthorized calls before
charges are incurred, as well as a chance to apprehend the violator during the
attempted violation. The
monitor security-violations command displays the
login activity in real-time on either Remote Access or System Management ports.
Information about invalid system management login attempts and remote access
attempts (and, for G3V3 or later, including DEFINITY ECS), invalid authorization
code attempts) is collected at two levels:
On an immediate basis, when an invalid login attempt is made, for systems
earlier than DEFINITY G3V3, the SVN feature can send a priority call to
either an attendant console or a station equipped with a display module.
For DEFINITY G3V3 and later, which includes the DEFINITY ECS, the
SVN feature can send to any station if an announcement has been
administered and recorded. When notified, the security administrator can
request the Security Violations Status Report, which shows details of the
last 16 security violations of each type for DEFINITY ECS and DEFINITY
G3.
On a historical basis, the number of security violations of each type is
collected and reported in the Security Violations Summary Measurement
Report. This report shows summary information since the last time the
counters were reset. (See ‘‘Security Violations Measurement Report’’ on
page 4-60.)
For DEFINITY ECS and DEFINITY G3:
Enter change system-parameters feature to display the Feature-Related
System Parameters screen. (For DEFINITY G3V3 and later, including
DEFINITY ECS, enter
change system-parameters security to display the
System-Parameters Security screen.)
To monitor Remote Access, enter y in the SVN Remote Access Violation
Notification Enabled? field.
To monitor administration ports, on the same screen, enter y in the SVN
Login Violation Notification Enabled field.
To monitor authorization codes (G3V3 and later), enter y in the SVN
Authorization Code Violation Notification Enabled field.
Enter any valid unassigned extension number in the Originating Extension
field(s).