Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook Instructions Manual
Lucent Technologies BCS Products Security Handbook Instructions Manual
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 301
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-19 DEFINITY ECS, DEFINITY G1 and G3, and System 75 H Block access to Alliance teleconference service (0700) 011/LD calls limited by FRLs 011/LD calls limited by Time-of-Day routing 011/LD calls limited by 6-digit or digit analysis Alternate FRLs used (G3r) Facility Test Call/Data Origination Facility Test code changed from default, if used Facility Test code translated only when needed Facility...
Page 302
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-20 DEFINITY ECS, DEFINITY G1 and G3, and System 75 H 1.If “NO” (N), provide Note reference number and explain. Three-way COR check on transfer/conference (G3V3 and later) Authorization Code Security Violation Notification feature active (G3V3 and later) Product Monitoring Traffic measurement reports monitored daily SMDR/CMS reports monitored daily Recent change history log reviewed daily...
Page 303
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-21 DEFINITY G2 and System 85 H DEFINITY G2 and System 85 Also see the general security checklist on page H-3, and the security checklist for any attached voice mail systems or other adjuncts. Customer: _________________________________________ Location: _________________________________________ System & Version: _________________________________________ New Install:...
Page 304
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-22 DEFINITY G2 and System 85 H VDNs have their own restricted COSs Ports for adjuncts in own restricted COS Authorization codes used Authorization codes not sequential 900, 976 calls blocked Operator calls restricted 011/LD calls restricted 011/LD calls limited by Time-of-Day Routing 1+809 and 0+809 Area Code blocked Digit Conversion of unauthorized calls to console or security SMDR/CDR activated...
Page 305
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-23 DEFINITY G2 and System 85 H Traffic measurement reports, including remote access history reviewed daily Customer Education Security code changed on a scheduled basis and coordinated with Denver Maintenance Center Blocking 976 look-alikes DID/DNIS number range does not overlap facility access codes Remote Call Forwarding not active Remote Call Forwarding used only offnet with groundstart...
Page 306
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-24 DEFINITY G2 and System 85 H 1.If “NO” (N), provide Note reference number and explain. Voice ports outward restricted if outcalling not used Use of outcalling denied or minimized Invalid Auto Attendant menu options directed to operator Disable remote maintenance access when not in use Table H-7. DEFINITY G2 and System 85 — Continued Y/N 1Note N/A
Page 307
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-25 DIMENSION PBX System H DIMENSION PBX System Also see the general security checklist on page H-3, and the security checklist for any attached voice mail systems or other adjuncts. Customer: _________________________________________ FP & Issue: _________________________________________ Location: _________________________________________ System Upgrade: _________________________________________ Major...
Page 308
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-26 DIMENSION PBX System H Ports for adjuncts in own restricted COS Authorization codes used Authorization codes not sequential 900, 976 calls blocked Operator calls restricted 011/LD calls restricted 011/LD calls limited by Time-of-Day Routing 1+809 and 0+809 Area Code blocked Digit Conversion of unauthorized calls to console or security SMDR activated on all trunk groups Trunks measured by...
Page 309
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-27 DIMENSION PBX System H 1.If “NO” (N), provide Note reference number and explain. Traffic measurement reports, including remote access history reviewed daily Customer Education Security code changed on a scheduled basis and coordinated with Denver Maintenance Center Blocking 976 look-alikes Table H-8. DIMENSION PBX System — Continued Y/N 1Note N/A
Page 310
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-28 Lucent Technologies/Bay Networks H Lucent Technologies/Bay Networks Also see the general security checklist on page H-3. 1.If “NO” (N), provide Note reference number and explain. Customer: _________________________________________ System & Version: _________________________________________ Location: _________________________________________ New Install: _________________________________________...