Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook Addendum Instructions Manual
Lucent Technologies BCS Products Security Handbook Addendum Instructions Manual
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Addendum Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 11
BCS Products Security Handbook Addendum 585-025-600ADD Issue 1 May 1999 Securing Remote Lucent Technologies Systems 1-5 Securing DEFINITY Systems (Release 7.2 and Later) with Access Security 1 Administering Access Security Gateway Use the following p roc ed ure to administer Ac c ess Sec urity Gateway. 1. On the System Parameters Customer Op tion form, d o the following : NOTE: Only Luc ent Tec hnolog ies tec hnic ians c an ac c ess this form. nSet the G3 Version field to V6 or later...
Page 12
BCS Products Security Handbook Addendum 585-025-600ADD Issue 1 May 1999 Securing Remote Lucent Technologies Systems 1-6 Securing DEFINITY Systems (Release 7.2 and Later) with Access Security 1 1. Connec t to the DEFINITY ECS system ad ministration/maintenanc e p ort. The system resp onds with the log in p romp t. 2. At the promp t, type your valid log in ID and p ress Re t u r n . The system verifies the log in ID and transmits the CHALLENGE in the form of a 7-d ig it numb er, for instanc e,...
Page 13
BCS Products Security Handbook Addendum 585-025-600ADD Issue 1 May 1999 Securing Remote Lucent Technologies Systems 1-7 Securing DEFINITY Systems (Release 7.2 and Later) with Access Security 1 Restarting Temporarily Disabled Access Security Gateway Access for Login 1. At the p rompt, typ e change login xxxx (xxx = alphanumeric log in ID) and p ress Re t u r n to log into the Log in Ad ministration form. 2. On p ag e 2 of the Log in Ad ministration form, set the Blocked field to n . 3. When...
Page 14
BCS Products Security Handbook Addendum 585-025-600ADD Issue 1 May 1999 Securing Remote Lucent Technologies Systems 1-8 Securing DEFINITY Systems (Release 7.2 and Later) with Access Security 1 Interactions of ASG nCustomer Ac cess INADS Port If ac c ess to the INADS port is disab led on a system-wid e b asis, ad ministering ac c ess to the SYSAM-RMT or INADS port, throug h the Ac c ess Sec urity Gateway feature, d oes not overrid e the INADS p ort restric tion. Administration d oes not p rohib...
Page 15
BCS Products Security Handbook Addendum 585-025-600ADD Issue 1 May 1999 Securing Remote Lucent Technologies Systems 1-9 Securing INTUITY AUDIX Ports (Release 5.0 and Later) with ASG 1 Securing INTUITY AUDIX Ports (Release 5.0 and Later) with ASG Ac c ess Sec urity Gateway also p rovid es up -to-d ate authentic ation for the Intuity AUDIX system logins. For Intuity Release 5.0, ASG p rotec tion is availab le for remote dial-up logins only. ASG protects Intuity AUDIX systems by challenging each...
Page 16
BCS Products Security Handbook Addendum 585-025-600ADD Issue 1 May 1999 Securing Remote Lucent Technologies Systems 1-10 Securing INTUITY AUDIX Ports (Release 5.0 and Later) with ASG 1 4. On the ASG Key, typ e the c halleng e number that is d isp layed on the terminal sc reen, and p ress ENTER ( ). The ASG Key d isp lays the uniq ue, 7-d ig it resp onse numb er that c orresp ond s to the c hallenge numb er you entered . The c halleng e and resp onse numbers are valid for this session only. 5....
Page 17
BCS Products Security Handbook Addendum 585-025-600ADD Issue 1 May 1999 Securing Remote Lucent Technologies Systems 1-11 Securing INTUITY AUDIX Ports (Release 5.0 and Later) with ASG 1 nAuthentication Type? (In this field typ e PASSKEY whic h ind ic ates that the user must have the ASG Key to p rod uc e the uniq ue resp onse numb er d uring log in. NOTE: If you typ e PASSWORD (rather than PASSKEY) in the Authentication Type: field , the system will use reg ular Intuity AUDIX password p rotec...
Page 18
BCS Products Security Handbook Addendum 585-025-600ADD Issue 1 May 1999 Securing Remote Lucent Technologies Systems 1-12 Securing INTUITY AUDIX Ports (Release 5.0 and Later) with ASG 1 Changing the Encryption Key Number for an ASG Login The enc ryp tion key numb er is used b y the system and b y the ASG Key hand -held d evic e to c reate c hallenge resp onse p airs of numbers. If an enc ryp tion key numb er is lost or c omp romised , it must b e c hang ed in the system and in all assoc iated...
Page 19
BCS Products Security Handbook Addendum 585-025-600ADD Issue 1 May 1999 Securing Remote Lucent Technologies Systems 1-13 Securing INTUITY AUDIX Ports (Release 5.0 and Later) with ASG 1 Disabling ASG Authentication If you want to d isc ontinue ASG p rotec tion for a p artic ular log in, c hang e the Authentic ation Typ e to password. To d isable ASG authentic ation: 1. At the Luc ent Intuity Main Menu, selec t ASG Security Administration and then selec t ASG Security Login Administration. The...
Page 20
BCS Products Security Handbook Addendum 585-025-600ADD Issue 1 May 1999 Securing Remote Lucent Technologies Systems 1-14 Lucent Technologies Support 1 3. Typ e a new value in the Failed login measurement window: field, if needed. (This number can be from 1 through 60 which indicates the maximum time, in minutes, that may elap se b etween failed log in attemp ts, b ut still have the attemp t c ount as one in a series.) NOTE: A hig her value in this field p rotec ts the system more fully. 4....