Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook Instructions Manual

Lucent Technologies BCS Products Security Handbook Instructions Manual

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 151

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-19 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
Outgoing Voice Call Detail Record 
(AUDIX Voice Mail System Only)
An outgoing call record is also created for every outbound call that is originated by 
the AUDIX Voice Mail System via a voice port. This includes call transfers, 
outcalling, and message waiting activation and/or deactivation via access codes. 
A record is also...

Page 152

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-20 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
the call, the voice mailbox id, the number dialed, and the call type as shown in 
Table 5-5
.
Unsuccessful call transfer attempts can result in multiple records being created for 
a single session. Review these records regularly for the following signs of hacker 
activity:
nFailed login attempts
nMultiple call transfers for a...

Page 153

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-21 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
For the Lucent Technologies INTUITY System, administrator passwords follow 
standard UNIX conventions, but have a 6-character minimum, one of which must 
be non-alpha. Subscriber passwords can be up to 15 digits.
For DEFINITY ECS, administrator passwords are 3 to 10 characters, alpha and 
numeric. Subscriber passwords can be up...

Page 154

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-22 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
Technologies INTUITY System only), the voice mail system also verifies 
that the digits entered match the extension number of an administered 
subscriber.
2. If Step 1 is successful, the voice mail system performs a switch-hook flash, 
putting the caller on hold.
NOTE:
If step 1 is unsuccessful, the voice mail system plays an...

Page 155

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-23 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
2. If Step 1 is successful, the voice mail system sends a transfer control link 
message containing the digits to the switch. If Step 1 is unsuccessful, the 
voice mail system plays an error message to the caller and prompts for 
another try.
3. The switch verifies that the digits entered match a valid station number in 
the dial...

Page 156

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-24 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
nThe voice mail system transfers calls from the automated attendant via a 
menu selection, extension request, or time out.
nThe voice mail system transfers calls from the automated attendant or 
Bulletin Board sessions (some versions) when the caller enters    .
NOTE:
For the DEFINITY AUDIX System Release 2.2, transfers are...

Page 157

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-25 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
Disallow Outside Calls
!CAUTION:
If TAC calls are permitted, they may be accepted as a valid extension 
number. Even with Enhanced Call Transfer activated, toll hackers may be 
able to enter a TAC to get an outside line if 3-digit station numbers and 
3-digit TACs are used.
The Enhanced Call Transfer feature is available on a...

Page 158

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-26 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
NOTE:
For the DEFINITY AUDIX System and the Lucent Technologies 
I
NTUITY System, no audit is required.
3. For DEFINITY ECS, DEFINITY G1, G3, and System 75:
On the switch, use change listed-directory-number to change the Listed 
Directory Number form, and enter a 4-digit extension number that routes 
calls to an attendant.
For...

Page 159

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-27 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
2. Tab to the Start field and enter x.
3. Then press  .
NOTE:
For the DEFINITY AUDIX System and the Lucent Technologies 
I
NTUITY System, no audit is required.
Limit Outcalling
The measures you can take to minimize the security risk of outcalling depend on 
how it is used. When outcalling is used only to alert on-premises...

Page 160

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-28 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
Security Tips
nRequire callers to use passwords.
nHave the application verify that long distance numbers are not being 
requested, or verify that only permitted numbers are requested.
nUse appropriate switch translation restrictions.
nAdminister all appropriate switch restrictions on the voice mail system 
voice ports.
nYou may...
Start reading Lucent Technologies BCS Products Security Handbook Instructions Manual

Related Manuals for Lucent Technologies BCS Products Security Handbook Instructions Manual

All Lucent Technologies manuals