Technical information

Administering Features of the DEFINITY G3V3 and
Later, Including DEFINITY ECS
12-6 Issue 7 June 2001
Administering Remote Access Kill After N
Attempts
Following is an example of how to administer this feature.
1. To access the System Parameters Features screen from the command line
interface, enter
change system-parameters features security (G3V3
and later) or change system-parameters features (releases prior to
G3V3). When the system-parameters features screen appears, complete
the following fields:
SVN Remote Access Violation Notification Enabled field Enter y
in this field to enable the Remote Access component of the SVN
feature.
Originating Extension field Enter an unassigned extension that
conforms to the switch dial plan.
Referral Destination field Enter an extension that is assigned to a
station equipped with a display module.
Barrier Code Threshold field Enter the number of times entry of
an invalid barrier code will be permitted before a security violation is
detected.
Time Interval field Enter the duration of time that the invalid
barrier code attempts must occur within.
2. Enter the change remote-access command to access the Remote Access
form.
Disable Following A Security Violation field If not already
assigned, enter
y in this field to disable Remote Access following a
security violation.
NOTE:
The Disable Following A Security Violation field is dynamic. It
will only appear if the remote access component of the SVN
feature is enabled.
In the event of a Remote Access barrier code security violation, a referral call is
generated, alerting the switch administrator of the violation. When the violation is
detected, the Remote Access feature is disabled, prohibiting any further use until
the security violation is investigated.
Consult the monitor security-violations report, trunk group measurements reports,
and security measurements reports to determine the nature and source of the
security violation. Local exchange and long distance carriers may provide
assistance in tracing the source of the violation. The Remote Access feature
should not be re-enabled until the source of the violation is identified, and you are
confident that the feature is secure.
Enter the
enable remote-access command to re-enable the Remote Access
feature.