User manual
DEFINITY ECS Release 8.2 Maintenance for R8.2csi 
555-233-119  Issue 1
April 2000
Maintenance Commands 
2-164monitor security-violations 
2
monitor security-violations
This command displays information about failed attempts to access the system, 
including the time of the violation, the login entered, and the port accessed 
during the failed login attempt. The system logs trunk group numbers, members, 
and extensions for remote access violations. The system logs remote and local 
invalid access attempts with a total of 16 entries maintained for each access 
type. This online status report automatically updates every 30 seconds until the 
command is canceled by pressing the CANCEL key.
Output
The following example shows the output from the 
monitor security-violations
command.
Wn
Number of Wn associated with the cabinet. An asterisk fills the field 
when the number exceeds 99.
PNC
Displays current Port Network Connectivity (PNC) status for each port 
network within a cabinet. When multiple port networks exist within a 
cabinet, a slash separates Carriers A, B, and C (listed first) from 
Carriers D and E (up/up). Availability of the Expansion Archangel Link 
(EAL) determines the PNC status of a port network. āUpā denotes EAL 
availability. When the EAL is not available, then ādnā (down) displays.
Time of Day
Displays current time of day acquired from the system.
Action/Object Qualifier Qualifier Description Permissions Defaults
Feature
Interactions
monitor 
security-violations
print
Reports print to SAT-linked 
printers.
init
inads
craft
cust
rcust
bcms
browse
none none
monitor security-violations SPE A
 SECURITY VIOLATIONS STATUS
 Date: 9:12 MON DEC 30 1991
 SYSTEM MANAGEMENT VIOLATIONS REMOTE ACCESS VIOLATIONS
 Date Time Login Port Ext Date Time TG No. Mbr Ext
 12/30 09:12 init MGR1 12/30 12:42 80 1 1111
 12/30 09:12 init MGR1
 12/30 09:12 init MGR1










