Instruction manual

Detecting toll fraud
Issue 9 May 2003
5-61
In the Feature Button Assignment field, enter rsvn-call for the
Remote Access Security Violation Notification button and
lsvn-call for the
Login Security Violation Notification button. The feature activation buttons
do not have to reside on the referral destination station. They can be
administered on any station. However, they must be activated before
referral calls are sent to the referral destination.
NOTE:
For DEFINITY G3V3 and later releases, these buttons are called lsvn-halt
and
rsvn-halt. A new button, asvn-halt, lights the associated status lamp
for the assigned station. The buttons operate the opposite way from
DEFINITY G1 and G3 pre-V3 buttons; if activated, the calls are not placed.
In addition to those SVN features already discussed (SVN Authorization Code
Violation Notification, SVN Referral Call With Announcement, and the
new/renamed Referral Call Buttons), DEFINITY G3V3 and later releases offer the
following SVN features:
SVN Remote Access Violation Notification with Remote Access Kill After
“n” Attempts
This feature disables the Remote Access feature following a remote
access security violation. Any attempt to use the Remote Access feature
once it has been disabled will fail even if a correct barrier code or barrier
code/authorization code combination is supplied until the feature is
re-enabled.
SVN Login Violation Notification with Login Kill After “n” Attempts
This feature “locks” a valid login ID following a login security violation
involving that login ID. Any attempt to use a login ID disabled following a
login security violation will fail even if the correct login ID/password
combination is supplied until the disabled login ID is re-enabled.
DEFINITY G3V4 offers an additional feature:
The status remote-access command provides information on the state of
the Remote Access feature. Valid states are
enabled, disabled,
svn-disabled, or not-administered. Valid barrier code states include
active and expired.
For information on administering these parts of the Security Violation Notification
feature, see Chapter 5
.