Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook Instructions Manual
Lucent Technologies BCS Products Security Handbook Instructions Manual
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 131
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Small Business Communications Systems Page 4-21 System 25 4 However, unauthorized persons could disrupt your business by altering your system programming. In addition, they could activate features (such as Remote Access) that would permit them to make long distance calls through your system. The following security measures assist you in managing the Remote System Administration feature to help prevent unauthorized use. Security...
Page 133
Voice Messaging Systems Page 5-1 5 BCS Products Security Handbook 555-025-600 Issue 6 December 1997 5 5Voice Messaging Systems The information in this chapter helps prevent unauthorized users from finding pathways through the voice messaging system and out of the switch. This chapter presents each communications system, and the voice mail systems it may host. nDEFINITY ECS (page 5-4) nDEFINITY Communications Systems (page 5-4) nMERLIN II Communications System (page 5-33) nMERLIN LEGEND...
Page 134
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-2 Protecting Voice Messaging Systems 5 Protecting Voice Messaging Systems Voice messaging toll fraud has risen dramatically in recent years. Now more than ever, it is imperative that you take steps to secure your communications systems. Callers into the voice messaging/auto attendant system may transfer to an outgoing trunk if adequate security measures are not implemented (see Figure 5-1). In...
Page 135
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-3 Protecting Voice Messaging Systems 5 system is a touch tone telephone. With the advent of cellular phones, hackers have yet another means of accessing voice mailboxes. If a user calls the voice mail system from a cellular phone and inputs his or her password, the voice mailbox becomes vulnerable to toll fraud. Since cellular phones can be monitored, a hacker can obtain the password and access the...
Page 136
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-4 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 nContact your central office to verify that your carrier provides “reliable disconnect” for your host PBX or switch. “Reliable disconnect” is sometimes referred to as a forward disconnect or disconnect supervision. It guarantees that the central office will not return a dial tone after the called party hangs up. If the central...
Page 137
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-5 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 Tools that Prevent Unauthorized Calls You can help prevent unauthorized callers who enter the voice messaging system from obtaining an outgoing facility by using the security tools shown in Table 5-1 . Facility Restriction Levels The switch treats all the PBX ports used by voice mail systems as stations. Therefore, each voice...
Page 138
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-6 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 ensure that the FRLs on the trunk group preferences in the routing patterns are 1or higher. For example, when voice mail ports are assigned to a COR with an FRL of 0, outside calls are disallowed. If this is too restrictive because the outcalling feature is being used, the voice mail ports can be assigned to a COR with an FRL...
Page 139
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-7 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 nMiscellaneous Trunk Restrictions: restricts certain stations from calling certain trunk groups via dial access codes. nOutward Restriction: restricts the user from placing calls over the CO, FX, or WATS trunks using dial access codes to trunks. Outward restriction also restricts the user from placing calls via ARS/WCR. Use...
Page 140
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-8 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 For DEFINITY G2 and System 85: nUse PROC010 WORD3 FIELD19 to assign outward restriction to the voice mail ports’ COS. nMake the voice ports Toll Restricted and ARS Toll Restricted, and assign an FRL of 0. Enter no for all Miscellaneous Trunk Restriction Groups (MTRGs). Restrict the Outside Calling Area When you assign the...