Lucent Technologies 8.2 Security Camera User Manual


  Open as PDF
of 1707
 
DEFINITY ECS Release 8.2
Administrator’s Guide
555-233-506
Issue 1
April 2000
Enhancing system security
334Dealing with security violations
11
Refer to ‘‘Facility restriction levels and traveling class marks’’ on page 1338 and
‘‘
Route Pattern’’ on page 865 for more information on assigning Facility
Restriction Levels.
Refer to ‘‘
Call Detail Recording’’ on page 1221 and ‘‘Station’’ on page 882 for
more information on using Call Detail Recording on station phones.
Refer to ‘‘
Class of Restriction’’ on page 520 and ‘‘Station’’ on page 882 for more
information on using Class of Restriction on station phones.
Refer to ‘‘
Remote Access’’ on page 1466 for more information on allowing
authorized callers to access the system from remote locations.
Refer to‘‘
Barrier codes’’ on page 1172 or ‘‘Remote Access’’ on page 857 for
information on barrier codes.
Dealing with security violations
When a security violation occurs, there are steps that you can take to be sure that
this same attempt is not successful in the future.
Disabling a login ID
There may be occasions when you have to disable a login for one of your users
because of a security violation.
1. Log in to the switch using a login ID with the correct permissions.
2. Type
disable login ge0rg3 and press RETURN.
Enabling a login ID
You may have to enable a login ID that has been disabled by a security violation,
or disabled manually with the disable login command.
1. Log in to the switch using a login ID with the correct permissions.
2. Type
enable login ge0rg3 and press RETURN.
Enabling remote access
You may have to enable Remote Access that has been disabled following a
security violation, or disabled manually.
1. Log in to the switch using a login ID with the correct permissions.
2. Type
enable remote-access and press RETURN.