Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook Instructions Manual
Lucent Technologies BCS Products Security Handbook Instructions Manual
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 281
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Special Security Product and Service Offers Page G-5 Toll Fraud Contact List G Toll Fraud Contact List Contact: For: Your Lucent Technologies Account Executive or Design SpecialistsGeneral questions related to toll fraud Lucent Technologies Toll Fraud Intervention Hotline 800 643-2353All systems and products— including DEFINITY ECS, DEFINITY Communications Systems, DIMENSION, System 75, System 85, MERLIN II, MERLIN LEGEND,...
Page 283
Product Security Checklists Page H-1 H BCS Products Security Handbook 555-025-600 Issue 6 December 1997 H HProduct Security Checklists This appendix contains the following security checklists: nGeneral Security Procedures (page H-3) nAUDIX Voice Mail System (page H-5) nAUDIX Voice Power System (page H-7) nBasicWorks (page H-9) nCONVERSANT Voice Information System (page H-13) nDEFINITY G1 (page H-15), G2 (page H-21), and G3 (page H-15) nDEFINITY AUDIX System (page H-5) nDIMENSION PBX System and...
Page 284
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-2 H nPARTNER Plus Communications System (page H-53) nSystem 25 (page H-58) nSystem 75 (page H-15) nSystem 85 (page H-21) nPassageWay Telephony Services (page H-60)
Page 285
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-3 General Security Procedures H General Security Procedures Customer: ________________________________________ Location: _________________________________________ System & Version: _________________________________________ Date Installed: _________________________________________ Table H-1. General Security Procedures Y/N 1Note N/A Physical Security Switch room and wiring closets locked All equipment...
Page 286
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-4 General Security Procedures H 1.If “NO” (N), provide Note reference number and explain. System security policy reviewed periodically Security policy included in new-hire orientation Employees know how to detect potential toll fraud Employees know where to report suspected toll fraud Authorization Codes not sequential Remote access phone number not published Barrier codes and passwords are...
Page 287
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-5 AUDIX, DEFINITY AUDIX and INTUITY AUDIX Voice Messaging Systems H AUDIX, DEFINITY AUDIX and I NTUITY AUDIX Voice Messaging Systems Also see the general security checklist on page H-3, and the security checklist for the host communications system. ( Customer: _________________________________________ PBX Type: _________________________________________ Location:...
Page 288
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-6 AUDIX, DEFINITY AUDIX and INTUITY AUDIX Voice Messaging Systems H 1.If “NO” (N), provide Note reference number and explain. If transfer allowed, number restrictions administered (DEFINITY AUDIX Voice Messaging System 3.2 only) not allowed on Auto Attendants Retries before lockout < 6 Retries before disconnect < 4 Busy lamp on modem port Voice Processing ports restricted from toll calls by...
Page 289
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-7 AUDIX Voice Power System H AUDIX Voice Power System Also see the general security checklist on page H-3, the security checklist for the host communications system. Customer: _________________________________________ PBX Type: _________________________________________ Location: _________________________________________ New Install: _________________________________________ System Upgrade:...
Page 290
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-8 AUDIX Voice Power System H 1.If “NO” (N), provide Note reference number and explain. Invalid Auto Attendant menu options directed to operator or security Voice processing ports on host PBX system restricted from toll calls Voice Processing ports restricted from dialing remote access extension Product Monitoring Administration Log and Activity Log checked daily End-User Education Passwords...