Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook Instructions Manual

Lucent Technologies BCS Products Security Handbook Instructions Manual

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 241

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Remote Access Example (DEFINITY ECS, DEFINITY G1, G3, and System 75) 
Page C-3 Permanently Disabling Remote Access 
C
18. Leave the Route Pattern blank for all dialed strings that you want to 
disallow the calls, such as international and operator calls. Any ARS/AAR 
calls starting with that dialed string will be blocked.
19. For all the Route Patterns assigned to ARS/AAR Partition 8, use change 
route-pattern to administer an...

Page 242

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Remote Access Example (DEFINITY ECS, DEFINITY G1, G3, and System 75) 
Page C-4 Permanently Disabling Remote Access 
C
NOTE:
Once Remote Access has been permanently disabled, only the Lucent 
Technologies Technical Service Center can reenable it. Charges may apply 
for this service. 

Page 243

Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS 
Page D-1 Administering the SVN Feature 
D
BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
D
DAdministering Features of the
DEFINITY G3V3 and Later,
Including DEFINITY ECS
This appendix provides information on administering these features in the 
following DEFINITY ECS and DEFINITY G3.
DEFINITY G3V3 and later, which includes DEFINITY ECS:
nEnhanced Security Violation Notification (SVN)
nBarrier code aging...

Page 244

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS 
Page D-2 Administering the SVN Feature 
D
Administering the Login Component
To administer system parameters for the login component of the SVN feature, do 
the following:
1. To access the System Parameter Security form from the command line 
interface, enter change system-parameters security (G3V3 and later) or 
change system-parameters (releases prior to...

Page 245

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS 
Page D-3 Administering the SVN Feature 
D
3.For releases before DEFINITY G3V3, administer an “lsvn-call” button on 
any station/attendant console (maximum 1 per system). The SVN button 
location can be determined by entering the command display 
svn-button-location. Activation of this feature button initiates the 
placement of login referral calls, until the...

Page 246

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS 
Page D-4 Administering the SVN Feature 
D
nsvn-disabled — A security violation was detected for that login and the 
login was disabled by the SVN feature.
nactive — The login is currently logged in.
ninactive — The login is not logged in.
nvoid — The password associated with the login has been set to void.
Administering the Remote Access Component
To...

Page 247

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS 
Page D-5 Administering the SVN Feature 
D
nTime Interval
Enter the time interval within which a login security violation must 
occur. The range is one minute to eight hours (0:01 to 7:59), and is 
entered in the form x:xx. For example, if you want the time interval to 
be 1 minute, enter 0:01. If you want the time interval to be seven 
and one-half hours,...

Page 248

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS 
Page D-6 Administering the SVN Feature 
D
Administering Remote Access Kill After N 
Attempts
Following is an example of how to administer this feature.
1. To access the System Parameters Features screen from the command line 
interface, enter change system-parameters features security (G3V3 
and later) or change system-parameters features (releases prior to...

Page 249

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS 
Page D-7 Administering the SVN Feature 
D
If the Remote Access feature is to be dormant for a period of time, the feature can 
be disabled using the disable remote-access command. Entry of this command 
will disable the Remote Access feature until it is re-enabled using the enable 
remote-access command.
Administering Login ID Kill After N Attempts
Following...

Page 250

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS 
Page D-8 Administering the SVN Feature 
D
Administering the Authorization Code 
Component
To administer the Authorization Code component of the SVN feature in G3V3 and 
later releases, do the following:
1. Access the System Parameter Security form by entering change 
system-parameters security from the command line interface.
2. When the SVN Authorization Code...
Start reading Lucent Technologies BCS Products Security Handbook Instructions Manual

Related Manuals for Lucent Technologies BCS Products Security Handbook Instructions Manual

All Lucent Technologies manuals