Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook Instructions Manual
Lucent Technologies BCS Products Security Handbook Instructions Manual
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 181
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-49 PARTNER II Communications System 5 — Assign a Class of Service that provides outcalling privileges (for PARTNER MAIL Release 1, assign 4, 5, 6, or 8; for PARTNER MAIL Release 3, assign 3,4, or 6) only to those mailboxes requiring these privileges. — Assign Classes of Service 1-6 (for PARTNER MAIL Release 1) or 1-4 and 20-23 (for PARTNER MAIL Release 3), Transfer Permitted, only to mailboxes for...
Page 182
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-50 PARTNER Plus Communications System 5 nNo Security Notification (strongly discouraged). nProgram the PARTNER II Communications System to: — Block direct access to outgoing lines and force the use of account codes and/or authorization codes. — Assign toll restrictions to individual’s phones, especially in public areas. — If you do not need to use the Outcalling feature of the PARTNER MAIL System,...
Page 183
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-51 PARTNER Plus Communications System 5 Protecting Passwords For PARTNER MAIL Release 1 and all releases of PARTNER MAIL VS, passwords can be up to four digits. For PARTNER MAIL Release 3, passwords can be up to 15 digits in length. See ‘‘ Administration / Maintenance Access’’ on page 2-4 and ‘‘General Security Measures’’ on page 2-7 for secure password guidelines. See Appendix E for information on...
Page 184
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-52 System 25 5 the largest acceptable minimum length in order to maximize the security of your system. nInstruct employees not to make a statement, in their recorded greeting, indicating that they will accept collect calls. nHave the voice messaging System Administrator delete unneeded voice mailboxes from the system immediately. nThe Security Violation Notification feature enables the System...
Page 185
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-53 System 25 5 nUse the voice processing system’s maximum extension length, valid extension range, and transfer to subscriber only feature, if available. nTightly control system administration access to these systems. nProgram the System 25 to: — Block direct access to outgoing lines and force the use of account codes and/or authorization codes. — Disallow trunk-to-trunk transfer unless it is required....
Page 186
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-54 System 25 5 nIf you have Release 1.0 of the AUDIX Voice Power System, implement all appropriate security measures on the PBX side. nRequire employees who have voice mailboxes to use passwords to protect their mailboxes. See ‘‘ Administration / Maintenance Access’’ on page 2-4 and ‘‘ General Security Measures’’ on page 2-7 for secure password guidelines. nMake sure subscribers change the default...
Page 187
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-55 System 25 5 NOTE: You cannot use this security measure if calls are transferred to people in your company who are not AUDIX Voice Power System subscribers (see ‘‘ Limit Transfers Out of the System’’ on page 5-30). Limit Transfers Out of the System When you need to allow transfers to people who are not AUDIX Voice Power System subscribers, you can add their extension numbers to the AUDIX Voice...
Page 189
Automated Attendant Page 6-1 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 6 BCS Products Security Handbook 555-025-600 Issue 6 December 1997 6 6Automated Attendant DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 Automated attendant is a service that connects to the PBX/communications system to help route calls to the appropriate extension. A menu of options allows callers to choose a predefined destination, such as a department, announcement,...
Page 190
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Automated Attendant Page 6-2 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 6 Tools that Prevent Unauthorized Calls You can help prevent unauthorized callers who enter the automated attendant system from obtaining an outgoing facility by using the security tools shown in Table 6-1 . Facility Restriction Levels The switch treats all the PBX ports used by automated attendant systems as stations. Therefore,...