Instruction manual

Administering the SVN feature
Issue 9 May 2003
13-7
If the Remote Access feature is to be dormant for a period of time, the feature can
be disabled using the
disable remote-access command. Entry of this command
will disable the Remote Access feature until it is re-enabled using the
enable
remote-access
command.
Administering the Login ID Kill After
N Attempts feature
Following is an example of how to administer this feature.
1. Enter the
change system-parameters features command to assign
Security Violation Notification (SVN) parameters.
When the system-parameters features screen appears, complete the
following fields:
SVN Login Violation Notification Enabled field — Enter
y to enable the login component of the SVN feature.
Originating Extension field — Enter an unassigned extension
that conforms to the switch dial plan.
Referral Destination field — Enter an extension that is
assigned to a station equipped with a display module.
Login Threshold field — Enter the number of times entry of an
invalid login ID, or valid login ID/invalid password combination will
be permitted before a security violation is detected.
Time Interval field — Enter the duration of time that the invalid
login attempts must occur within.
2. Enter the add/change login <login ID> command to access the Login
Administration screen.
Disable Following A Security Violation field — If not
already assigned, enter
y to disable the login ID following a security
violation involving the login ID.
In the event a security violation involving the login ID is detected, a referral call is
generated, alerting the switch administrator of the violation. When a login violation
is detected for a valid login ID, the login ID is disabled, prohibiting any further use
until the security violation is investigated and the login ID is re-enabled.
Consult the monitor security-violation report and security measurements report to
determine the nature and source of the security violation. If the attempts to access
the switch administration originated from a remote source, the local exchange and
long distance carriers may provide assistance in tracing the source of the invalid
access attempts. The affected login ID should not be re-enabled until the source
of the violation is identified and you are confident that the switch administration
maintenance interface is secure.