Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook Instructions Manual
Lucent Technologies BCS Products Security Handbook Instructions Manual
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 291
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-9 BasicWorks H BasicWorks Also see the general security checklist on page H-3. Customer: _________________________________________ System & Version: _________________________________________ Location: _________________________________________ New Install: _________________________________________ System Upgrade: _________________________________________ Major Addition:...
Page 292
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-10 BasicWorks H Unused logins removed (“remove login” command or disabled [passwords VOIDed]) UNIQUE customer logins used Password aging activated Logins temporarily disabled when not needed (“disable/enable” commands) Customer access to INADS port disabled nAdjunct connectivity (TroubleTracker, Monitor I, SNMP, and G3MA) to access the switch through the INADS port established Remote Access...
Page 293
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-11 BasicWorks H PBX Features Trunking Prohibit Trunk-to-Trunk Transfer on public access trunks Tie trunk groups are COR-to-COR restricted Trunk groups have dial access = n COR-to-COR restrictions on dial-accessed trunks Automatic Circuit Assurance (ACA) on trunks groups SMDR/CDR activated on all trunk groups Attendant control of trunk groups with TAC = y Routing ARS/WCR used for call routing...
Page 294
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-12 BasicWorks H 1.If “NO” (N), provide Note reference number and explain. Facility Test Call/Data Origination Facility Test code changed from default, if used nFacility Test code translated only when needed nFacility Test code limited to system admin/mtce COR nLogoff Notification enabled for Facility Test Call Data Origination feature code not translated Miscellaneous Console permissions...
Page 295
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-13 CONVERSANT Voice Information System H CONVERSANT Voice Information System Also see the general security checklist on page H-3, and the security checklist for the host communications system. Customer: _________________________________________ PBX Type: _________________________________________ Location: _________________________________________ New Install:...
Page 296
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-14 CONVERSANT Voice Information System H 1.If “NO” (N), provide Note reference number and explain. Host PBX Analog ports in CONVERSANT Voice Information System hunt group restricted from toll calls by host PBX, for example, restricted COR Analog ports in CONVERSANT Voice Information System hunt group COR-to-COR restricted from dialing RA barrier codes (when host communications system is...
Page 297
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-15 DEFINITY ECS, DEFINITY G1 and G3, and System 75 H DEFINITY ECS, DEFINITY G1 and G3, and System 75 Also see the general security checklist on page H-3, and the security checklist for any attached voice mail systems or other adjuncts. Customer: _________________________________________ Location: _________________________________________ System & Version: _________________________________________...
Page 298
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-16 DEFINITY ECS, DEFINITY G1 and G3, and System 75 H Login permissions customized (G3V2) Unused logins removed (remove login command, (G3V3 and later) or disabled (passwords VOIDed) UNIQUE customer logins used (G3V3 and later) Password aging activated (G3V3 and later) Logins temporarily disabled when not needed (disable/enable commands) (G3V3 and later) If customer access to INADS port...
Page 299
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-17 DEFINITY ECS, DEFINITY G1 and G3, and System 75 H Voice processing ports COR-to-COR restricted from dialing Remote Access barrier codes Remote Access Security Violation Notification feature active Remote Access Security Violations monitored 24 hours per day Login Security Violations monitored 24 hours per day Remote Access automatically disabled following detection of a Security Violation...
Page 300
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-18 DEFINITY ECS, DEFINITY G1 and G3, and System 75 H Personal Station Access (PSA) (DEFINITY ECS R5) PSA COS assignment limited to stations with need to access PSA 8-digit security codes assigned to stations using PSA Station Security Code Security Violation Notification feature active nStation Security Code Security Violations monitored 24 hours per day Extended User Administration of...