Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook Instructions Manual
Lucent Technologies BCS Products Security Handbook Instructions Manual
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 191
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Automated Attendant Page 6-3 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 6 attendant ports can be assigned to a COR with an FRL that is low enough to limit calls to the calling area needed. NOTE: Stations that are outward restricted cannot use AAR/ARS/WCR trunks. Therefore, the FRL level does not matter since FRLs are not checked. Station-to-Trunk Restrictions Station-to-Trunk Restrictions can be assigned...
Page 192
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Automated Attendant Page 6-4 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 6 nOutward Restriction: restricts the user from placing calls over CO, FX, or WATS trunks using dial access codes to trunks. Outward Restriction also restricts the user from placing calls via ARS/WCR. Use ARS/WCR with WCR toll restrictions instead. nToll Restriction: prevents users from placing toll calls over CO, FX, or WATS trunks...
Page 193
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Automated Attendant Page 6-5 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 6 Toll Analysis When an automated attendant system transfers calls to locations outside the switch, you can use the Toll Analysis form to limit call transfers to the numbers you identify. You can also specify toll calls to be assigned to a restricted call list so automated attendant callers cannot dial the numbers on the list. Call...
Page 194
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Automated Attendant Page 6-6 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 6 Prevent Calls to Certain Numbers If some menu options transfer to locations off-premises, you can still protect the system from unauthorized calls. You can restrict calls to certain area codes and/or country codes, and even to specific telephone numbers. For DEFINITY ECS and DEFINITY G1 and G3: nOn the Class of Restriction form for...
Page 195
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Automated Attendant Page 6-7 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 6 For DEFINITY G2 and System 85: nUse PROC311 WORD2 to establish 6-digit translation tables for foreign NPAs, and assign up to 10 different routing designators to each foreign NPA (area code). nUse PROC311 WORD3 to map restricted and unrestricted exchanges to different routing designators. nIf the unrestricted toll exchanges are in...
Page 196
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Automated Attendant Page 6-8 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 6 Detecting Automated Attendant Toll Fraud Table 6-2 shows the reports that help determine if your automated attendant system is being used for fraudulent purposes. Call Detail Recording (CDR) / Station Message Detail Recording (SMDR) With Call Detail Recording activated for the incoming trunk groups, you can monitor the number of...
Page 197
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Automated Attendant Page 6-9 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 6 need can be stored by making adjustments in the software. If it cannot be stored, be sure to check the raw data supplied by the CDR. Review CDR for the following symptoms of automated attendant abuse: nShort holding times on any trunk group where automated attendant is the originating endpoint or terminating endpoint nCalls to...
Page 198
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Automated Attendant Page 6-10 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 6 Trunk Group Report This report tracks call traffic on trunk groups at hourly intervals. Since trunk traffic is fairly predictable, you can easily establish, over time, what is normal usage for each trunk group. Use this report to watch for abnormal traffic patterns, such as unusually high off-hour loading. SAT, Manager I, and...
Page 199
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Automated Attendant Page 6-11 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 6 Automatic Circuit Assurance This monitoring technique detects a number of short holding time calls or a single long holding time call, both of which may indicate hacker activity. Long holding times on Trunk-to-Trunk calls can be a warning sign. The ACA feature allows you to establish time limit thresholds defining what is...
Page 200
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Automated Attendant Page 6-12 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 6 For DEFINITY G2 and System 85: nUse PROC285 WORD1 FIELD5 and PROC286 WORD1 FIELD1 to enable ACA systemwide. nUse PROC120 WORD1 to set ACA call limits and number of calls threshold. nChoose the appropriate option: — To send the alarms and/or reports to an attendant, use PROC286 WORD1 FIELD3. Busy Verification When toll fraud is...