Avaya Site Administration Reference Release 3.1 Manual de usuario Pagina 118

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 178
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 117
Avaya Site Administration Reference
108
Using Security Violations Notification to detect problems
You can administer Security Violations Notification so that the system notifies you and
provides reports when users enter invalid information. You want to know about the
following types of violations, which may indicate an attempt to breach your security:
login violations
remote access barrier code violations
authorization code violations
station security code violations
For example, lets have the system notify us at extension 8000 when someone tries to
enter more than 3 invalid authorization codes within a 1-minute time span.
To set up Security Violations Notification for our example:
1 Open a GEDI window for the voice system you want to administer.
2 Type change system-parameters security and press the ENTER key.
The Security-Related System Parameters screen appears.
3 In the SVN Authorization Code Violation Notification Enabled field, type y and press
the ENTER key.
Additional fields now display on the screen.
4 In the Originating Extension field, type the extension you want the system to use to
originate the call.
Use the extension of an unused non-dial station.
5 Enter 8000 in the Referral Destination field.
Use the extension you want the system to notify.
6 If the referral destination is on a different system or is a non-display phone, fill in the
Announcement Extension field.
7 Enter 3 in the Authorization Code Threshold field.
Enter the maximum number of invalid entry attempts you want to allow.
8 Enter 0:01 (1 minute) in the Time Interval field.
Use an hour:minute format for the amount of time you want the system to use for the
monitor interval.
9 Click the Enter button on the GEDI window to save your changes.
10 Click to close the GEDI window.
About system security
Customers are solely responsible for the security of their system, network, and access to
hardware and software.
Avaya strongly recommends that customers use passwords to prohibit access to their
systems and to routinely change those passwords to maintain security.
Customers should always change passwords immediately after external vendors have
completed installation, maintenance, troubleshooting, or other tasks on their system.
Vista de pagina 117
1 2 ... 113 114 115 116 117 118 119 120 121 122 123 ... 177 178

Comentarios a estos manuales

Sin comentarios