REPT:CMDLOG
output messages for denied requests appear on PSSWD output message class devices. Valid
values are as follows:
NO - denied requests are
not
reported (default)
CR - denied requests are reported with a CRITICAL alarm level
MJ - denied requests are reported with a MAJOR alarm level
MN - denied requests are reported with a MINOR alarm level
IF - denied requests are reported with an INFORMATIONAL alarm level (
REPT:CMDLOG
appears but does
not trigger an alarm).
Field 5 (log_flag) is the logging (reporting) status for denied input requests. This controls whether CMDLOG entries
for denied requests are generated for this command group. Valid values are as follows:
n - denied requests are
not
logged in CMDLOG (default)
y - denied requests are logged in CMDLOG.
Field 7 (alarm_level) is the alarm level for allowed input requests. This is identical to field 4 except it controls
REPT:CMDLOG
output messages for allowed requests.
Field 8 (log_flag) is the logging (reporting) status for allowed input requests. This is identical to field 5 except it
controls CMDLOG entries for allowed requests.
CMDLOG is engineered to hold approximately 1000 entries so setting log_flag to 'y' should be done judiciously. The
changes are activated immediately upon ending the ECD recent change transaction.
3.8.4.9 Security Monitoring
3.8.4.9.1 Idle User Identities
The system administrator can track inactive user logins using the
VFY:PAUTH
input message with the
DORMANT
keyword. For example,
VFY:PAUTH:DORMANT=5
lists all user identities that
Have not logged in for 5 days (or have never logged in)
Have been logged in for 5 or more days
3.8.4.9.2 Reviewing CMDLOG
The CMDLOG logfile provides an audit trail of user activities. CMDLOG can be accessed and searched using log file
handling procedures documented in the Operations section of this document. CMDLOG files can be stored for later
analysis using file backup procedures documented in the Operations section of this document.
Input requests are logged in CMDLOG according to parameters established in the authdef record for each
command group. Each CMDLOG entry contains the date and time, the logical device identity (e.g.
ttyn
) where the
command was executed, the login identity, and the actual command. The input request acknowledgment (e.g., "NG
- INSUFFICIENT AUTHORITY") is included for rejected input requests.
The logical device identity may not be present, which means the input request was not associated with a terminal.
235-105-210
October 1999
Copyright © 1999
Page 32
Summary of Contents for 5ESS-2000
Page 96: ...235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 184: ...235 105 210 October 1999 Copyright 1999 Page 3 ...
Page 300: ...13 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 55 ...
Page 339: ...7 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 13 ...
Page 342: ...235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 359: ...235 105 210 October 1999 Copyright 1999 Page 5 ...
Page 609: ...2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 12 ...
Page 676: ...235 105 210 October 1999 Copyright 1999 Page 9 ...
Page 792: ...3 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 9 ...
Page 799: ...Figure 11 36 3 1 Cleaning Points 235 105 210 October 1999 Copyright 1999 Page 7 ...
Page 801: ...235 105 210 October 1999 Copyright 1999 Page 9 ...
Page 839: ...2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 16 ...
Page 999: ...2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 13 ...
Page 1008: ...Figure 11 55 1 CTSNS DIP Switch Settings 235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 1011: ...235 105 210 October 1999 Copyright 1999 Page 5 ...
Page 1053: ...235 105 210 October 1999 Copyright 1999 Page 15 ...
Page 1289: ...Figure 15 17 2 AMATPS Data Link 235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 1292: ...235 105 210 October 1999 Copyright 1999 Page 5 ...
Page 1303: ...9 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 1360: ...Figure 15 47 2 Typical SCANS III Link Diagram 235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 1372: ...235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 1374: ...235 105 210 October 1999 Copyright 1999 Page 4 ...
Page 1421: ...Table 1 1 O M Checklist 235 105 210 October 1999 Copyright 1999 Page 3 ...