Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook Instructions Manual

Lucent Technologies BCS Products Security Handbook Instructions Manual

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 301

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-19 DEFINITY ECS, DEFINITY G1 and G3, and System 75 
H
Block access to Alliance 
teleconference service (0700)
011/LD calls limited by FRLs
011/LD calls limited by Time-of-Day 
routing
011/LD calls limited by 6-digit or 
digit analysis 
Alternate FRLs used (G3r)
Facility Test Call/Data 
Origination
Facility Test code changed from 
default, if used
Facility Test code translated only 
when needed
Facility...

Page 302

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-20 DEFINITY ECS, DEFINITY G1 and G3, and System 75 
H
1.If “NO” (N), provide Note reference number and explain.
Three-way COR check on 
transfer/conference (G3V3 and 
later)
Authorization Code Security 
Violation Notification feature active 
(G3V3 and later)
Product Monitoring
Traffic measurement reports 
monitored daily
SMDR/CMS reports monitored daily
Recent change history log reviewed 
daily...

Page 303

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-21 DEFINITY G2 and System 85 
H
DEFINITY G2 and System 85
Also see the general security checklist on page H-3, and the security checklist for 
any attached voice mail systems or other adjuncts.
Customer: _________________________________________
Location: _________________________________________
System & Version: _________________________________________
New Install:...

Page 304

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-22 DEFINITY G2 and System 85 
H
VDNs have their own restricted 
COSs
Ports for adjuncts in own restricted 
COS
Authorization codes used
Authorization codes not sequential
900, 976 calls blocked
Operator calls restricted
011/LD calls restricted
011/LD calls limited by Time-of-Day 
Routing
1+809 and 0+809 Area Code 
blocked
Digit Conversion of unauthorized 
calls to console or security
SMDR/CDR activated...

Page 305

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-23 DEFINITY G2 and System 85 
H
Traffic measurement reports, 
including remote access history 
reviewed daily
Customer Education
Security code changed on a 
scheduled basis and coordinated 
with Denver Maintenance Center
Blocking 976 look-alikes
DID/DNIS number range does not 
overlap facility access codes
Remote Call Forwarding not active
Remote Call Forwarding used only 
offnet with groundstart...

Page 306

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-24 DEFINITY G2 and System 85 
H
1.If “NO” (N), provide Note reference number and explain.
Voice ports outward restricted if 
outcalling not used
Use of outcalling denied or 
minimized
Invalid Auto Attendant menu 
options directed to operator
Disable remote maintenance 
access when not in use
Table H-7. DEFINITY G2 and System 85 — Continued
Y/N
1Note N/A 

Page 307

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-25 DIMENSION PBX System 
H
DIMENSION PBX System
Also see the general security checklist on page H-3, and the security checklist for 
any attached voice mail systems or other adjuncts.
Customer: _________________________________________
FP & Issue: _________________________________________
Location: _________________________________________
System Upgrade: _________________________________________
Major...

Page 308

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-26 DIMENSION PBX System 
H
Ports for adjuncts in own restricted 
COS
Authorization codes used
Authorization codes not sequential
900, 976 calls blocked
Operator calls restricted
011/LD calls restricted
011/LD calls limited by Time-of-Day 
Routing 
1+809 and 0+809 Area Code 
blocked
Digit Conversion of unauthorized 
calls to console or security
SMDR activated on all trunk groups
Trunks measured by...

Page 309

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-27 DIMENSION PBX System 
H
1.If “NO” (N), provide Note reference number and explain.
Traffic measurement reports, 
including remote access history 
reviewed daily
Customer Education
Security code changed on a 
scheduled basis and coordinated 
with Denver Maintenance Center
Blocking 976 look-alikes
Table H-8. DIMENSION PBX System — Continued
Y/N
1Note N/A 

Page 310

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-28 Lucent Technologies/Bay Networks 
H
Lucent Technologies/Bay Networks
Also see the general security checklist on page H-3.
1.If “NO” (N), provide Note reference number and explain.
Customer: _________________________________________
System & Version: _________________________________________
Location: _________________________________________
New Install: _________________________________________...
Start reading Lucent Technologies BCS Products Security Handbook Instructions Manual

Related Manuals for Lucent Technologies BCS Products Security Handbook Instructions Manual

All Lucent Technologies manuals