Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook Instructions Manual

Lucent Technologies BCS Products Security Handbook Instructions Manual

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 291

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-9 BasicWorks 
H
BasicWorks
Also see the general security checklist on page H-3.
Customer: _________________________________________
System & Version: _________________________________________
Location: _________________________________________
New Install: _________________________________________
System Upgrade: _________________________________________
Major Addition:...

Page 292

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-10 BasicWorks 
H
Unused logins removed (“remove login” 
command or disabled [passwords 
VOIDed])
UNIQUE customer logins used
Password aging activated
Logins temporarily disabled when not 
needed (“disable/enable” commands)
Customer access to INADS port disabled
nAdjunct connectivity (TroubleTracker, 
Monitor I, SNMP, and G3MA) to access 
the switch through the INADS port 
established
Remote Access...

Page 293

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-11 BasicWorks 
H
PBX Features
Trunking
Prohibit Trunk-to-Trunk Transfer on public 
access trunks
Tie trunk groups are COR-to-COR 
restricted
Trunk groups have dial access = n
COR-to-COR restrictions on dial-accessed 
trunks
Automatic Circuit Assurance (ACA) on 
trunks groups
SMDR/CDR activated on all trunk groups
Attendant control of trunk groups with TAC 
= y
Routing
ARS/WCR used for call routing...

Page 294

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-12 BasicWorks 
H
1.If “NO” (N), provide Note reference number and explain.
Facility Test Call/Data Origination
Facility Test code changed from default, if 
used
nFacility Test code translated only when 
needed
nFacility Test code limited to system 
admin/mtce COR
nLogoff Notification enabled for Facility 
Test Call
Data Origination feature code not 
translated
Miscellaneous
Console permissions...

Page 295

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-13 CONVERSANT Voice Information System 
H
CONVERSANT Voice Information 
System
Also see the general security checklist on page H-3, and the security checklist for 
the host communications system.
Customer: _________________________________________
PBX Type: _________________________________________
Location: _________________________________________
New Install:...

Page 296

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-14 CONVERSANT Voice Information System 
H
1.If “NO” (N), provide Note reference number and explain.
Host PBX
Analog ports in CONVERSANT 
Voice Information System hunt 
group restricted from toll calls by 
host PBX, for example, restricted 
COR
Analog ports in CONVERSANT 
Voice Information System hunt 
group COR-to-COR restricted from 
dialing RA barrier codes (when host 
communications system is...

Page 297

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-15 DEFINITY ECS, DEFINITY G1 and G3, and System 75 
H
DEFINITY ECS, DEFINITY G1 and 
G3, and System 75
Also see the general security checklist on page H-3, and the security checklist for 
any attached voice mail systems or other adjuncts.
Customer: _________________________________________
Location: _________________________________________
System & Version: _________________________________________...

Page 298

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-16 DEFINITY ECS, DEFINITY G1 and G3, and System 75 
H
Login permissions customized 
(G3V2)
Unused logins removed (remove 
login command, (G3V3 and later) or 
disabled (passwords VOIDed)
UNIQUE customer logins used 
(G3V3 and later)
Password aging activated (G3V3 
and later)
Logins temporarily disabled when 
not needed (disable/enable 
commands) (G3V3 and later)
If customer access to INADS port...

Page 299

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-17 DEFINITY ECS, DEFINITY G1 and G3, and System 75 
H
Voice processing ports 
COR-to-COR restricted from dialing 
Remote Access barrier codes
Remote Access Security Violation 
Notification feature active
Remote Access Security Violations 
monitored 24 hours per day
Login Security Violations 
monitored 24 hours per day
Remote Access automatically 
disabled following detection of a 
Security Violation...

Page 300

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-18 DEFINITY ECS, DEFINITY G1 and G3, and System 75 
H
Personal Station Access (PSA) 
(DEFINITY ECS R5)
PSA COS assignment limited to 
stations with need to access PSA
8-digit security codes assigned to 
stations using PSA
Station Security Code Security 
Violation Notification feature active
nStation Security Code Security 
Violations monitored 24 hours 
per day
Extended User Administration of...
Start reading Lucent Technologies BCS Products Security Handbook Instructions Manual

Related Manuals for Lucent Technologies BCS Products Security Handbook Instructions Manual

All Lucent Technologies manuals