Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook Instructions Manual

Lucent Technologies BCS Products Security Handbook Instructions Manual

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 171

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-39 MERLIN LEGEND Communications System 
5
nEnter # in the Subscriber Password field to prevent access to the 
corresponding voice mail.
nEnter yes in the Does the subscriber have switch call coverage field. On 
the switch side, do not specify the AUDIX Voice Power System extension 
as a coverage point for any of these added extensions.
NOTE:
Although these restricted voice mailboxes cannot receive Call...

Page 172

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-40 MERLIN LEGEND Communications System 
5
Security Tips
nAt the switch, assign toll restrictions to voice message system and 
automated attendant ports.
nIf you do not use the outcalling features of the voice messaging system, 
restrict the outward calling capability of all voice ports.
nUse a dial plan that does not allow extensions beginning with the same 
digits as ARS, TAC, or verification and test...

Page 173

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-41 MERLIN LEGEND Communications System 
5
2. If Step 1 is successful, the voice mail system performs a switch-hook flash, 
putting the caller on hold.
NOTE:
If Step 1 is unsuccessful, the voice mail system plays an error 
message and prompts the caller for another try.
3. The voice mail system sends the digits to the switch.
4. The voice mail system completes the transfer.
With Basic Call Transfer, a...

Page 174

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-42 MERLIN LEGEND Communications System 
5
Restrict Outcalling
Outcalling uses the voice messaging ports. If mailbox security is broken, 
unauthorized persons can use outcalling to transfer messages at your expense. If 
you need outcalling, restrict it as far as possible to eliminate the possibilities for 
theft of services.
nDo not enable outcalling at all if you do not need it. Do not enable outcalling...

Page 175

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-43 MERLIN LEGEND Communications System 
5
Protecting the MERLIN MAIL, MERLIN
MAIL-ML, MERLIN MAIL R3, and MERLIN
LEGEND Mail Voice Messaging Systems
The MERLIN MAIL, MERLIN MAIL-ML, MERLIN MAIL R3, and MERLIN LEGEND 
Mail Voice Messaging Systems provide automated attendant, call answer, and 
voice mail functionality. The automated attendant feature answers incoming calls 
and routes them to the appropriate...

Page 176

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-44 MERLIN LEGEND Communications System 
5
Take the following preventative measures to limit the risk of unauthorized use of 
the automated attendant feature by hackers:
nDo not use automated attendant selector codes for Automatic Route 
Selection (ARS) codes or Pooled Facility codes.
nAssign all unused automated attendant selector codes to zero, so that 
attempts to dial these will be routed to the system...

Page 177

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-45 MERLIN LEGEND Communications System 
5
Hackers may also use a computer to dial an access code and then publish the 
information for other hackers. Substantial charges can accumulate quickly. It is 
your responsibility to take appropriate steps to implement the features properly, to 
evaluate and administer the various restriction levels, and to protect and carefully 
distribute access codes.
To reduce...

Page 178

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-46 MERLIN LEGEND Communications System 
5
nSet the maximum number of digits in an extension parameter appropriate 
to your dial plan. The voice messaging system will not perform transfers to 
extensions greater than that number.
nWhen possible, restrict the off-network capability of callers by using calling 
restrictions, Facility Restriction Levels, and Disallowed List features.
nOutward restrict all...

Page 179

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-47 MERLIN LEGEND Communications System 
5
Additional MERLIN MAIL R3 and MERLIN 
LEGEND Mail Voice Messaging System Security 
Features
The MERLIN MAIL R3 and MERLIN LEGEND Mail Voice Messaging System 
includes the following additional security features:
nThe Transfer to Registered Subscribers Only setting of the Transfer 
Restrictions feature allows callers to be transferred only to users who have...

Page 180

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-48 PARTNER II Communications System 
5
option otherwise. It is strongly discouraged to administer a system 
without Security Violation Notification. The System Administrator 
should investigate all warning messages received.
PARTNER II Communications System
The PARTNER II Communications System R3, and later releases, supports the 
PARTNER MAIL System. The PARTNER II Communications System R3.1 and 
later...
Start reading Lucent Technologies BCS Products Security Handbook Instructions Manual

Related Manuals for Lucent Technologies BCS Products Security Handbook Instructions Manual

All Lucent Technologies manuals