/etc/login
.
The processes running on the device must be terminated to activate the changes. This may be done by typing
control-D, restoring the terminal or controller, or on a wide scale by a craft initialization.
3.8.4.6.2 Disable Login
To disable login on a terminal, the ECD changes described above must be reversed. Note that two getty forms are
involved for STLWS terminals and one getty form is involved for RC/V terminals. For recent terminals, change
shlname (field 4) to
/cft/bin/pdshl.app
. For STLWS terminals, change shlname to
/cft/bin/pdshl.app
in the getty
form for the message section of the STLWS screen and change shlname to
/cft/dap/poker
in the getty form for the
C/D region of the screen.
Again, the processes running on the terminal must be terminated to activate the changes.
3.8.4.7 Establishing Authority Checking
Modifying authority checking on a device requires modifying the ECD
getty
form(s) for the terminal and activating the
changes by restoring the terminal.
To change authority checking on a STLWS terminal, ECD changes are required on two getty forms. Two forms are
involved since one form is required for the message section of the STLWS screen and a second form is used by the
control and display (C/D) region of the screen. The two getty form names differ only in that the TTY name in gettyrec
(field 1) is lowercase on one form and uppercase on the other form; for example: gettyl and gettyL for STLWS ttyl.
To change authority checking on a recent change terminal, an ECD change is required on one getty form. The TTY
name in gettyrec (field 1) is lowercase (for example: gettyw for ttyw). Only one form requires updating since recent
change terminals do not have a C/D region.
Whether one or two getty forms require updating, the same change is required. To enable authority checking on the
terminal, the auth_chk field (field 10) can be changed to either 'u' for user-level authority checking or 't' for
terminal-level authority checking. The default auth_chk value is 'n' (none, authority checking disabled).
NOTE:
When authority checking is disabled ('n') the login process should also be disabled.
If this recommendation is not followed, the user identities used by login are those defined via the
admin
command
(not those defined in PAUTH) and the terminal identities in TAUTH are not available. The
admin
command is
documented in Administration section of 235-700-200,
UNIX
®
System Reference Manual
.
The processes running on the device must be terminated to activate the changes. This may be done by typing
control-D, restoring the terminal or controller, or on a wide scale by a craft initialization.
3.8.4.8 Administering Command Logging and Reporting
Administering input message logging and reporting requires modifying the ECD
authdef
(authority definition) form for
a command group. The command group name (field 1, comgr_name) is uppercase. For example
ALARM
is the
comgr_name key for the alarm management command group.
NOTE:
Never modify field 2 (comgr_number) when modifying an authdef form. The comgr_number field is set by
Lucent Technologies and should not be changed.
By modifying authdef fields 4, 5, 7, and 8, the administrator can configure the desired alarm level and logging status
for allowed requests and denied requests for each command group.
Field 4 (alarm_level) is the alarm level for denied input requests. This controls how this command group's
235-105-210
October 1999
Copyright © 1999
Page 31
Summary of Contents for 5ESS-2000
Page 96: ...235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 184: ...235 105 210 October 1999 Copyright 1999 Page 3 ...
Page 300: ...13 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 55 ...
Page 339: ...7 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 13 ...
Page 342: ...235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 359: ...235 105 210 October 1999 Copyright 1999 Page 5 ...
Page 609: ...2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 12 ...
Page 676: ...235 105 210 October 1999 Copyright 1999 Page 9 ...
Page 792: ...3 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 9 ...
Page 799: ...Figure 11 36 3 1 Cleaning Points 235 105 210 October 1999 Copyright 1999 Page 7 ...
Page 801: ...235 105 210 October 1999 Copyright 1999 Page 9 ...
Page 839: ...2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 16 ...
Page 999: ...2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 13 ...
Page 1008: ...Figure 11 55 1 CTSNS DIP Switch Settings 235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 1011: ...235 105 210 October 1999 Copyright 1999 Page 5 ...
Page 1053: ...235 105 210 October 1999 Copyright 1999 Page 15 ...
Page 1289: ...Figure 15 17 2 AMATPS Data Link 235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 1292: ...235 105 210 October 1999 Copyright 1999 Page 5 ...
Page 1303: ...9 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 1360: ...Figure 15 47 2 Typical SCANS III Link Diagram 235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 1372: ...235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 1374: ...235 105 210 October 1999 Copyright 1999 Page 4 ...
Page 1421: ...Table 1 1 O M Checklist 235 105 210 October 1999 Copyright 1999 Page 3 ...