Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook Instructions Manual

Lucent Technologies BCS Products Security Handbook Instructions Manual

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 141

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-9 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
nEnter the FRL number (0 through 7) in the FRL field. Assign the lowest FRL 
that will meet the outcalling requirements, if the outcalling feature is being 
utilized. The route patterns for restricted calling areas should have a higher 
FRL assigned to the trunk groups.
nUse change route-pattern to display the Route Pattern...

Page 142

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-10 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
NOTE:
If assigning a low FRL to a pattern preference conflicts with requirements for 
other callers (it allows calls that should not be allowed), use ARS partitioning 
to establish separate FNPA/HNPA/RHNPA tables for the voice mail ports.
For DEFINITY G2 and System 85:
nUse PROC311 WORD2 to establish 6-digit translation tables...

Page 143

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-11 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
Detecting Voice Mail Fraud
Table 5-3 shows the reports that help determine if a voice mail system used with 
the DEFINITY ECS, DEFINITY Communications Systems, System 75, or 
System 85 is being used for fraudulent purposes.
See ‘‘Security Tips’’ on page 5-3 for additional ways to detect voice mail fraud.
NOTE:
The System...

Page 144

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-12 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
NOTE:
Most call accounting packages discard this valuable security information. If 
you are using a call accounting package, check to see if this information can 
be stored by making adjustments in the software. If it cannot be stored, be 
sure to check the raw data supplied by the CDR.
Review CDR for the following symptoms of...

Page 145

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-13 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
Call Traffic Report
This report provides hourly port usage data and counts the number of calls 
originated by each port. By tracking normal traffic patterns, you can respond 
quickly if an unusually high volume of calls begins to appear, especially after 
business hours or during weekends, which might indicate hacker activity....

Page 146

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-14 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
ARS Measurement Selection
The ARS Measurement Selection can monitor up to 20 routing patterns 
(25 for G3) for traffic flow and usage.
For DEFINITY ECS, DEFINITY G1, G3, and System 75:
nUse change ars meas-selection to choose the routing patterns you want 
to track.
nUse list measurements route-pattern followed by the timeframe...

Page 147

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-15 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
For DEFINITY G2 and System 85:
nUse PROC285 WORD1 FIELD5 and PROC286 WORD1 FIELD1 to enable 
ACA system-wide.
nUse PROC120 WORD1 to set ACA call limits and number of calls 
thresholds.
nUse PROC286 WORD1 FIELD3 to send the alarms and/or reports to an 
attendant.
Busy Verification 
When toll fraud is suspected, you can interrupt...

Page 148

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-16 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
Administration Passwords
Your INTUITY AUDIX system comes equipped with administrative password 
features and options that you control to assist you in securing your system. These 
include:
nChange default administrator password
nAdministrator password standards
nAdministrator password aging
Changing the Default Administrator...

Page 149

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-17 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
Trusted servers can access and manipulate an AUDIX message just as the 
AUDIX application can do. (See 
Lucent Technologies INTUITY Messaging 
Solutions Release 4 Administration
, 585-310-564 for in-depth discussions and 
definitions of trusted servers, domains, and integration of e-mail and other trusted 
server software with...

Page 150

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-18 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
preventing the transmission of software viruses that you can use when planning 
for e-mail. Furthermore, your administrator has minimum requirements that the 
AUDIX server and e-mail server must meet to be allowed on the company 
network at all.
At a minimum, you should advise your users that file attachments should be 
detached...
Start reading Lucent Technologies BCS Products Security Handbook Instructions Manual

Related Manuals for Lucent Technologies BCS Products Security Handbook Instructions Manual

All Lucent Technologies manuals