Lucent Technologies R5SI Computer Hardware User Manual


  Open as PDF
of 2643
 
DEFINITY Enterprise Communications Server Release 5
Maintenance and Test for R5vs/si
555-230-123
Issue 1
April 1997
Maintenance Commands and Trouble-Clearing Aids
Page 8-252monitor system
8
The following display was produced by entering "monitor security-violations".
Feature Interactions
None.
monitor system
This command with the view1 or view2 option displays one screen page of output
summarizing the overall condition of the system. With the connection option, the
command displays the real-time status for time slots and buses. Additionally,
there are other miscellaneous parameters displayed that show call rates,
intervals, etc.
Synopsis
monitor system [ view1 | view2 | conn [ pnn
pnn number 1
pnn number 2
pnn
number 3
] ]
Date The date of the logged security violation given as MM/DD where MM is
the month and DD is the day of the invalid access attempt.
Time The time of the logged security violation given as HH:MM where HH is
the hour and MM is the minute of the invalid access attempt.
TG No. The trunk group number associated with the trunk from which the
remote access attempt terminated (remote access violations only).
Mbr The trunk group member number associated with the trunk from which
the remote access attempt terminated (remote access violations only).
Ext The extension used to interface with the remote access feature
(remote access violations only).
monitor security-violations SPE A
SECURITY VIOLATIONS STATUS
Date: 9:12 MON DEC 30 1991
SYSTEM MANAGEMENT VIOLATIONS REMOTE ACCESS VIOLATIONS
Date Time Login Port Ext Date Time TG No. Mbr Ext
12/30 09:12 init MGR1 12/30 12:42 80 1 1111
12/30 09:12 init MGR1
12/30 09:12 init MGR1