Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook Instructions Manual

Lucent Technologies BCS Products Security Handbook Instructions Manual

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 191

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Automated Attendant 
Page 6-3 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
6
attendant ports can be assigned to a COR with an FRL that is low enough to limit 
calls to the calling area needed.
NOTE:
Stations that are outward restricted cannot use AAR/ARS/WCR trunks. 
Therefore, the FRL level does not matter since FRLs are not checked.
Station-to-Trunk Restrictions
Station-to-Trunk Restrictions can be assigned...

Page 192

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Automated Attendant 
Page 6-4 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
6
nOutward Restriction: restricts the user from placing calls over CO, FX, or 
WATS trunks using dial access codes to trunks. Outward Restriction also 
restricts the user from placing calls via ARS/WCR. Use ARS/WCR with 
WCR toll restrictions instead.
nToll Restriction: prevents users from placing toll calls over CO, FX, or 
WATS trunks...

Page 193

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Automated Attendant 
Page 6-5 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
6
Toll Analysis 
When an automated attendant system transfers calls to locations outside the 
switch, you can use the Toll Analysis form to limit call transfers to the numbers you 
identify. You can also specify toll calls to be assigned to a restricted call list so 
automated attendant callers cannot dial the numbers on the list. Call...

Page 194

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Automated Attendant 
Page 6-6 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
6
Prevent Calls to Certain Numbers
If some menu options transfer to locations off-premises, you can still protect the 
system from unauthorized calls. You can restrict calls to certain area codes and/or 
country codes, and even to specific telephone numbers.
For DEFINITY ECS and DEFINITY G1 and G3:
nOn the Class of Restriction form for...

Page 195

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Automated Attendant 
Page 6-7 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
6
For DEFINITY G2 and System 85:
nUse PROC311 WORD2 to establish 6-digit translation tables for foreign 
NPAs, and assign up to 10 different routing designators to each foreign 
NPA (area code).
nUse PROC311 WORD3 to map restricted and unrestricted exchanges to 
different routing designators.
nIf the unrestricted toll exchanges are in...

Page 196

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Automated Attendant 
Page 6-8 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
6
Detecting Automated Attendant Toll Fraud
Table 6-2 shows the reports that help determine if your automated attendant 
system is being used for fraudulent purposes.
Call Detail Recording (CDR) / Station Message 
Detail Recording (SMDR)
With Call Detail Recording activated for the incoming trunk groups, you can 
monitor the number of...

Page 197

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Automated Attendant 
Page 6-9 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
6
need can be stored by making adjustments in the software. If it cannot be 
stored, be sure to check the raw data supplied by the CDR.
Review CDR for the following symptoms of automated attendant abuse:
nShort holding times on any trunk group where automated attendant is the 
originating endpoint or terminating endpoint
nCalls to...

Page 198

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Automated Attendant 
Page 6-10 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
6
Trunk Group Report
This report tracks call traffic on trunk groups at hourly intervals. Since trunk traffic 
is fairly predictable, you can easily establish, over time, what is normal usage for 
each trunk group. Use this report to watch for abnormal traffic patterns, such as 
unusually high off-hour loading. 
SAT, Manager I, and...

Page 199

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Automated Attendant 
Page 6-11 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
6
Automatic Circuit Assurance
This monitoring technique detects a number of short holding time calls or a single 
long holding time call, both of which may indicate hacker activity. Long holding 
times on Trunk-to-Trunk calls can be a warning sign. The ACA feature allows you 
to establish time limit thresholds defining what is...

Page 200

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Automated Attendant 
Page 6-12 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
6
For DEFINITY G2 and System 85:
nUse PROC285 WORD1 FIELD5 and PROC286 WORD1 FIELD1 to enable 
ACA systemwide.
nUse PROC120 WORD1 to set ACA call limits and number of calls 
threshold.
nChoose the appropriate option:
— To send the alarms and/or reports to an attendant, use PROC286 
WORD1 FIELD3.
Busy Verification
When toll fraud is...
Start reading Lucent Technologies BCS Products Security Handbook Instructions Manual

Related Manuals for Lucent Technologies BCS Products Security Handbook Instructions Manual

All Lucent Technologies manuals