Instruction manual
Detecting toll fraud
Issue 9 May 2003
5-61
■ In the Feature Button Assignment field, enter rsvn-call for the 
Remote Access Security Violation Notification button and 
lsvn-call for the 
Login Security Violation Notification button. The feature activation buttons 
do not have to reside on the referral destination station. They can be 
administered on any station. However, they must be activated before 
referral calls are sent to the referral destination.
NOTE:
For DEFINITY G3V3 and later releases, these buttons are called lsvn-halt 
and 
rsvn-halt. A new button, asvn-halt, lights the associated status lamp 
for the assigned station. The buttons operate the opposite way from 
DEFINITY G1 and G3 pre-V3 buttons; if activated, the calls are not placed.
In addition to those SVN features already discussed (SVN Authorization Code 
Violation Notification, SVN Referral Call With Announcement, and the 
new/renamed Referral Call Buttons), DEFINITY G3V3 and later releases offer the 
following SVN features: 
■ SVN Remote Access Violation Notification with Remote Access Kill After 
“n” Attempts
This feature disables the Remote Access feature following a remote 
access security violation. Any attempt to use the Remote Access feature 
once it has been disabled will fail even if a correct barrier code or barrier 
code/authorization code combination is supplied until the feature is 
re-enabled.
■ SVN Login Violation Notification with Login Kill After “n” Attempts
This feature “locks” a valid login ID following a login security violation 
involving that login ID. Any attempt to use a login ID disabled following a 
login security violation will fail even if the correct login ID/password 
combination is supplied until the disabled login ID is re-enabled.
DEFINITY G3V4 offers an additional feature: 
■ The status remote-access command provides information on the state of 
the Remote Access feature. Valid states are 
enabled, disabled, 
svn-disabled, or not-administered. Valid barrier code states include 
active and expired.
For information on administering these parts of the Security Violation Notification 
feature, see Chapter 5
.










