Technical information
Administering Features of the DEFINITY G3V3 and
Later, Including DEFINITY ECS
12-18 Issue 7 June 2001
Administering the Security Violations
Reports
The Security Violations reports provide current status information for invalid login
or Remote Access (barrier code) or authorization code attempts. The following
Security Violations reports are available:
Login Violations
Remote Access Barrier Code Violations
Authorization Code Violations
Station Security Code (SSC) Violations
NOTE:
Station Security Codes are used with the Personal Station Access
feature and the Extended User Administration of Redirected Calls
feature.
The data displayed in these reports is updated at 30 second intervals. A total of 16
entries are maintained for each type of violation. The oldest information is
overwritten by the new entries at each 30-second update.
To access the Security Violations reports, enter the monitor security-violations
<report name> command, where report name is either
login, remote-access,
or
authorization-code.