
Maintenance Commands
555-233-119
356
Issue 5 October 2002
monitor security-violations
Use monitor security-violations to display information about failed attempts to
access the system, including the time of the violation, the login entered, and the
port accessed during the failed login attempt. The system logs trunk group
numbers, members, and extensions for remote access violations. The system
logs remote and local invalid access attempts with a total of 16 entries maintained
for each access type. This online status report automatically updates every 30
seconds until the command is canceled by pressing the CANCEL key.
Output
The following example shows the output from monitor security-violations.
Field descriptions
Action/Object
Qualifier
Qualifier Description
Logins
Defaults
Feature Interactions
monitor
security-violations
Reports print to SAT-linked
printers.
init
inads
craft
cust
rcust
bcms
browse
none
none
Date
Current date and time.
Date
Date of the logged security violation shown as MM/DD (where MM = month
and DD = day).
Time
Time of the logged security violation shown as HH:MM (where HH = the
hour and MM = minute of the invalid access attempt).
Login
Login ID entered for the login violation attempt.
Port
Type of port used when login violation occurred. The following is a table of
valid port types:
monitor security-violations SPE A
SECURITY VIOLATIONS STATUS
Date: 9:12 MON DEC 30 1991
SYSTEM MANAGEMENT VIOLATIONS REMOTE ACCESS VIOLATIONS
Date Time Login Port Ext Date Time TG No. Mbr Ext
12/30 09:12 init MGR1 12/30 12:42 80 1 1111
12/30 09:12 init MGR1
12/30 09:12 init MGR1