Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook Addendum

Lucent Technologies BCS Products Security Handbook Addendum

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Addendum. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 11

BCS Products 
Security Handbook Addendum  585-025-600ADD  Issue 1
May 1999
Securing Remote Lucent Technologies Systems 
1-5 Securing DEFINITY Systems (Release 7.2 and Later) with Access Security 
1
Administering Access Security Gateway
Use the following  p roc ed ure to administer Ac c ess Sec urity Gateway.
1. On the System Parameters Customer Op tion form, d o the following :
NOTE:
Only Luc ent Tec hnolog ies tec hnic ians c an ac c ess this form.
nSet the G3 Version
 field to V6
 or later...

Page 12

BCS Products 
Security Handbook Addendum  585-025-600ADD  Issue 1
May 1999
Securing Remote Lucent Technologies Systems 
1-6 Securing DEFINITY Systems (Release 7.2 and Later) with Access Security 
1
1. Connec t to the DEFINITY ECS system ad ministration/maintenanc e p ort.
The system resp onds with the log in p romp t.
2. At the promp t, type your valid  log in ID and  p ress 
Re t u r n .
The system verifies the log in ID and  transmits the CHALLENGE in the form 
of a 7-d ig it numb er, for instanc e,...

Page 13

BCS Products 
Security Handbook Addendum  585-025-600ADD  Issue 1
May 1999
Securing Remote Lucent Technologies Systems 
1-7 Securing DEFINITY Systems (Release 7.2 and Later) with Access Security 
1
Restarting Temporarily Disabled Access 
Security Gateway Access for Login
1. At the p rompt, typ e change login xxxx 
(xxx =  alphanumeric  log in ID) and  
p ress 
Re t u r n to log  into the Log in Ad ministration form.
2. On p ag e 2 of the Log in Ad ministration form, set the Blocked 
field  to n
.
3. When...

Page 14

BCS Products 
Security Handbook Addendum  585-025-600ADD  Issue 1
May 1999
Securing Remote Lucent Technologies Systems 
1-8 Securing DEFINITY Systems (Release 7.2 and Later) with Access Security 
1
Interactions of ASG
nCustomer Ac cess INADS Port
If ac c ess to the INADS port is disab led on a system-wid e b asis, 
ad ministering  ac c ess to the SYSAM-RMT or INADS port, throug h the 
Ac c ess Sec urity Gateway feature, d oes not overrid e the INADS p ort 
restric tion. Administration d oes not p rohib...

Page 15

BCS Products 
Security Handbook Addendum  585-025-600ADD  Issue 1
May 1999
Securing Remote Lucent Technologies Systems 
1-9 Securing INTUITY AUDIX Ports (Release 5.0 and Later) with ASG 
1
Securing INTUITY AUDIX Ports
(Release 5.0 and Later) with ASG
Ac c ess Sec urity Gateway also p rovid es up -to-d ate authentic ation for the Intuity 
AUDIX system logins. For Intuity Release 5.0, ASG p rotec tion is availab le for 
remote dial-up logins only.
ASG protects Intuity AUDIX systems by challenging each...

Page 16

BCS Products 
Security Handbook Addendum  585-025-600ADD  Issue 1
May 1999
Securing Remote Lucent Technologies Systems 
1-10 Securing INTUITY AUDIX Ports (Release 5.0 and Later) with ASG 
1
4. On the ASG Key, typ e the c halleng e number that is d isp layed  on the 
terminal sc reen, and  p ress ENTER ( ).
The ASG Key d isp lays the uniq ue, 7-d ig it resp onse numb er that 
c orresp ond s to the c hallenge numb er you entered . The c halleng e and  
resp onse numbers are valid  for this session only.
5....

Page 17

BCS Products 
Security Handbook Addendum  585-025-600ADD  Issue 1
May 1999
Securing Remote Lucent Technologies Systems 
1-11 Securing INTUITY AUDIX Ports (Release 5.0 and Later) with ASG 
1
nAuthentication Type?
(In this field typ e PASSKEY whic h ind ic ates that the user must have 
the ASG Key to p rod uc e the uniq ue resp onse numb er d uring  log in.
NOTE:
If you typ e PASSWORD (rather than PASSKEY) in the 
Authentication Type:
 field , the system will use reg ular 
Intuity AUDIX password  p rotec...

Page 18

BCS Products 
Security Handbook Addendum  585-025-600ADD  Issue 1
May 1999
Securing Remote Lucent Technologies Systems 
1-12 Securing INTUITY AUDIX Ports (Release 5.0 and Later) with ASG 
1
Changing the Encryption Key Number for an
ASG Login
The enc ryp tion key numb er is used  b y the system and b y the ASG Key 
hand -held  d evic e to c reate c hallenge resp onse p airs of numbers. If an 
enc ryp tion key numb er is lost or c omp romised , it must b e c hang ed  in the system 
and  in all assoc iated...

Page 19

BCS Products 
Security Handbook Addendum  585-025-600ADD  Issue 1
May 1999
Securing Remote Lucent Technologies Systems 
1-13 Securing INTUITY AUDIX Ports (Release 5.0 and Later) with ASG 
1
Disabling ASG Authentication
If you want to d isc ontinue ASG p rotec tion for a p artic ular log in, c hang e the 
Authentic ation Typ e to 
password. To d isable ASG authentic ation:
1. At the Luc ent Intuity Main Menu, selec t ASG Security 
Administration
 and  then selec t ASG Security Login 
Administration.
The...

Page 20

BCS Products 
Security Handbook Addendum  585-025-600ADD  Issue 1
May 1999
Securing Remote Lucent Technologies Systems 
1-14 Lucent Technologies Support 
1
3. Typ e a new value in the Failed login measurement window:
 field, if 
needed.
(This number can be from 1 through 60 which indicates the maximum 
time, in minutes, that may elap se b etween failed  log in attemp ts, b ut still 
have the attemp t c ount as one in a series.)
NOTE:
A hig her value in this field  p rotec ts the system more fully.
4....
Start reading Lucent Technologies BCS Products Security Handbook Addendum

Related Manuals for Lucent Technologies BCS Products Security Handbook Addendum

All Lucent Technologies manuals