![Lucent Technologies 5ESS-2000 Скачать руководство пользователя страница 45](http://html1.mh-extra.com/html/lucent-technologies/5ess-2000/5ess-2000_operations-and-maintenance-procedures_1946423045.webp)
During a software release retrofit, unrestricted access to the MCC and SCC is
automatically
provided. A
REPT:SECURITY
output message reports that command restrictions are disabled to inform operations personnel of
a possible change in the level of security on the MCC and SCC.
Unrestricted MCC and SCC access is permitted during the entire retrofit process. Once the retrofit is complete,
terminal restrictions (if any) are automatically restored. Another
REPT:SECURITY
output message informs
operations personnel that unrestricted access is disabled.
3.8.4.11 Interactions Between Authority Checking and Other Security Features
3.8.4.11.1 Pathname File
The pathname (.pname) file is another mechanism used by the craft shell to limit access to a subset of input
messages. The .pname mechanism is entirely independent from authority checking.
The craft shell assumes that a .pname file exists in its current directory. Each line of the .pname file describes an
environment for the craft shell as follows:
a:b:c:d:e:f$g
Where:
a
= Numeric Label
b
= Craft shell search directory list
c
= Current directory
d
= Alternate shell
e
= User ID
f
= Group ID
g
= Optional strings
The craft shell search directory list ('b') specifies a list of directories searched by the craft shell to locate the
command to execute. A .pname with fewer search directories limits the number of commands the craft shell can
execute. Each craft shell can have a different initial directory, and thus a different .pname file, so it is possible to
control search directories on a per-terminal basis.
With authority checking disabled, an input request is executed only if it is located in the list of craft shell search
directories. With authority checking enabled, an input request is executed only if it passes authority checking
and
if it
is located in the list of craft shell search directories.
3.8.4.11.2 Password Protected Commands
Password protected commands are documented in the Administration section of 235-700-200,
UNIX
®
System
Reference Manual
. Password protected commands prompt for a password before the command is executed. The
Office Database Editor (ODBE) and
UNIX
shell (SH) are examples of commands that can be password protected.
Password protected commands are entirely independent from authority checking. For example, a user may pass
authority checking for a password protected command but may not be able to execute the command because he or
she does not know the password for the command.
3.8.4.11.3 RC/V Security
The recent change and verify (RC/V) system provides access permissions for Office Dependent Database (ODD)
recent change forms. The RC/V form access (RCACCESS) mechanism is documented in 235-118-XXX,
Recent
Change Procedures
.
The RCACCESS mechanism is entirely independent from authority checking. Once a user passes authority
checking for ODD recent change, he or she is subject to RCACCESS permissions (if any) established via the
SET:RCACCESS
input message.
235-105-210
October 1999
Copyright © 1999
Page 34
Содержание 5ESS-2000
Страница 96: ...235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 184: ...235 105 210 October 1999 Copyright 1999 Page 3 ...
Страница 300: ...13 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 55 ...
Страница 339: ...7 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 13 ...
Страница 342: ...235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 359: ...235 105 210 October 1999 Copyright 1999 Page 5 ...
Страница 516: ...Figure 10 24 1 KS 23483 L13 Disk Drive Cable Connection Rear View 235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 517: ...Figure 10 24 2 KS 23483 L21 Disk Drive Cable Connection Rear View 235 105 210 October 1999 Copyright 1999 Page 3 ...
Страница 518: ...Figure 10 24 3 KS 23841 L15 Disk Drive Cable Connection Rear View 235 105 210 October 1999 Copyright 1999 Page 4 ...
Страница 523: ...Figure 10 24 6 Top View of DUP Showing Internal Cabling 235 105 210 October 1999 Copyright 1999 Page 9 ...
Страница 609: ...2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 12 ...
Страница 628: ...a SM inhibited Response OK 2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 8 ...
Страница 653: ...Response OK 2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 16 ...
Страница 676: ...235 105 210 October 1999 Copyright 1999 Page 9 ...
Страница 792: ...3 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 9 ...
Страница 799: ...Figure 11 36 3 1 Cleaning Points 235 105 210 October 1999 Copyright 1999 Page 7 ...
Страница 801: ...235 105 210 October 1999 Copyright 1999 Page 9 ...
Страница 839: ...2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 16 ...
Страница 999: ...2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 13 ...
Страница 1008: ...Figure 11 55 1 CTSNS DIP Switch Settings 235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 1011: ...235 105 210 October 1999 Copyright 1999 Page 5 ...
Страница 1053: ...235 105 210 October 1999 Copyright 1999 Page 15 ...
Страница 1165: ...Procedure 14 14 RESERVED FOR FUTURE USE PROCEDURE 1 Reserved For future use 235 105 210 October 1999 Copyright 1999 Page 1 ...
Страница 1186: ...Procedure 14 17 RESERVED FOR FUTURE USE PROCEDURE 1 Reserved For future use 235 105 210 October 1999 Copyright 1999 Page 1 ...
Страница 1187: ...Procedure 14 18 RESERVED FOR FUTURE USE PROCEDURE 1 Reserved For future use 235 105 210 October 1999 Copyright 1999 Page 1 ...
Страница 1284: ...Figure 15 15 1 PARADYNE Paradyne Corporation 3810 Modem Diagnostic Control Panel 235 105 210 October 1999 Copyright 1999 Page 6 ...
Страница 1287: ...Figure 15 16 1 153A Adapter Connection Figure 15 16 2 AMATPS Block Diagram 235 105 210 October 1999 Copyright 1999 Page 3 ...
Страница 1289: ...Figure 15 17 2 AMATPS Data Link 235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 1290: ...Figure 15 17 3 Single Housing B25A Cable Assembly 235 105 210 October 1999 Copyright 1999 Page 3 ...
Страница 1292: ...235 105 210 October 1999 Copyright 1999 Page 5 ...
Страница 1294: ...Figure 15 17 8 201C to TN82 Data Set Cable Drawing 235 105 210 October 1999 Copyright 1999 Page 7 ...
Страница 1303: ...9 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 1324: ...11 Type and enter q 12 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 1342: ...Figure 15 40 1 SCANS II Dial Up Data Set Installation Diagram 235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 1344: ...Figure 15 40 4 59A1 Mounting Front in Slot J3 Figure 15 40 5 2048A Data Set Front 235 105 210 October 1999 Copyright 1999 Page 4 ...
Страница 1345: ...Figure 15 40 6 Berg Connector Terminations and Layout 235 105 210 October 1999 Copyright 1999 Page 5 ...
Страница 1346: ...Figure 15 40 7 B25A Cable 4 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 6 ...
Страница 1360: ...Figure 15 47 2 Typical SCANS III Link Diagram 235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 1368: ...Response FA or OK appears 17 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 1372: ...235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 1374: ...235 105 210 October 1999 Copyright 1999 Page 4 ...
Страница 1376: ...Figure 15 55 6 201C to TN83 Data Set Cable Drawing 235 105 210 October 1999 Copyright 1999 Page 6 ...
Страница 1418: ...Figure 15 56 1 PARADYNE 3810 Modem Diagnostic Control Panel 235 105 210 October 1999 Copyright 1999 Page 4 ...
Страница 1421: ...Table 1 1 O M Checklist 235 105 210 October 1999 Copyright 1999 Page 3 ...