![Avaya Octel 200 Installation And Maintenance Manual Download Page 347](http://html.mh-extra.com/html/avaya/octel-200/octel-200_installation-and-maintenance-manual_3026450347.webp)
Log Commands 7-37
Octel 200/300
S.4.1
PB60019
−
01
To estimate how many days the CDR records can be stored before the buffer becomes full and the log file
wraps, perform the following steps for each transaction type enabled:
1. Multiply the number of mailbox holders by the average number of times per day that the mailbox
registers activity for the transaction types logged.
2. Using Table 7-5, calculate the number of bytes used per transaction type record logged; include 1
byte for each 2 digits in the mailbox number.
3. Multiply the number of transactions per day (from step 1) by the number of bytes per transaction for
that transaction type (from step 2). This is the number of bytes used in 1 day.
4. Sum the result of step 3 for each transaction type to yield an estimate of the number of bytes used per
day.
5. Divide the disk space allocated for CDR records (2 MB) by the number of bytes used in 1 day to
determine how many days the storage space will last before the information wraps.
This estimate can help establish the schedule for checking the CDR log.
Examples of Various CDR Log Screens
Several examples of various CDR logs follow. CDR logs can be created for billing or maintenance purposes.
Invalid Logons With Subsequent Actions
This example shows a CDR log for entries of invalid security codes and subsequent caller actions. This
type of CDR log could be used to investigate unauthorized access activity. In this example, the entry
BADP
in the STAT column indicates that an invalid security code was entered; the
BADM
entry indicates
that an invalid mailbox number was entered.
@
CDR XA LOGON ST BADP SU
MM/DD/YY HH:MM:SS XACTIN STAT MS ME PRT DURATN MAILBOX
*08/09/00
1
0:
1
9:38 LOGON
BADP 00 00 055 0:00.2 4430
*08/09/00
1
0:
1
9:38 LOGON
BADM 00 00 055 0:00.0 6
Logon Calls to a Specific Mailbox
This shows a CDR log that details four logon calls to mailbox 4585, starting on August 12, 2000.
In the status column, the
OK
entry indicates that the logon was successful, and the
BADP
entry indicates
that an invalid security code was entered when attempting to log on to mailbox 4585. The log shows
subsequent actions, since the initial action in each case was a direct call from the extension (not shown).
@
CDR XA LOGON MA 4585 S 00 08 12 08 00
MM/DD/YY HH:MM:SS XACTIN STAT MS ME PRT DURATN MAILBOX
*08/
1
2/00 08:22:
1
7 LOGON
OK
0
1
0
1
055 0:0
1
.8 4585
*08/
1
2/00 08:23:42 LOGON
OK
00 0
1
05
1
0:00.2 4585
*08/
1
2/00 08:5
1
:03 LOGON
OK
0
1
00 053 0:0
1
.5 4585
*08/
1
2/00 09:46:
1
3 LOGON
BADP 00 00 056 0:00.
1
4585
Summary of Contents for Octel 200
Page 8: ......
Page 14: ......
Page 26: ......
Page 28: ......
Page 106: ......
Page 108: ......
Page 122: ......
Page 126: ......
Page 184: ......
Page 228: ......
Page 242: ......
Page 306: ......
Page 308: ......
Page 310: ......
Page 368: ......
Page 384: ......
Page 386: ......
Page 448: ......
Page 514: ......
Page 534: ......
Page 536: ......
Page 538: ......
Page 552: ......
Page 558: ......
Page 584: ......
Page 586: ......
Page 588: ......