Modifying the User Database
66
Auto Execute Command
(Optional) Enter a command to automatically execute after
that user has been authenticated by the system. The user
must log on as a Sysop 1 or higher.
For example, if you enter LH - the log history will be
displayed in reverse order after the user authenticates.
Comments
Enter up to 40 alphanumeric characters on each of the three
Comments
lines. After you have entered comments in each
Comments (1) field, press the ENTER key.
Authentication Methods
Each authentication method requires additional information
to be entered into the system. The prompts for this
information appear when you press the ENTER key after the
last Comments Line.
NOTE:
If you do not wish to change this parameter, press the ENTER key to move the cursor to
the next field.
For complete information on each of the authentication methods, refer to the Add User
information in this section.
Summary of Contents for Lucent Technologies Access Security Gateway Guard
Page 12: ...x Page intentionally left blank ...
Page 28: ...ASG Guard Overview 16 Page intentionally left blank ...
Page 36: ...Physical Connections 24 Page intentionally left blank ...
Page 60: ...Modem Port Setup 48 Page intentionally left blank ...
Page 82: ...Modifying the User Database 70 Page intentionally left blank ...
Page 120: ...Action and Event Tables 108 Page intentionally left blank ...
Page 158: ...User Connectivity 146 Page intentionally left blank ...
Page 188: ...Log Functions 176 Page intentionally left blank ...
Page 236: ...Troubleshooting 224 Page intentionally left blank ...
Page 252: ...Internal Battery Replacement 240 Page intentionally left blank ...
Page 258: ...Glossary of Command References 246 Page intentionally left blank ...