Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook Instructions Manual
Lucent Technologies BCS Products Security Handbook Instructions Manual
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 311
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-29 MERLIN II Communications System H MERLIN II Communications System Also see the general security checklist on page H-3, and the security checklist for any attached voice mail systems or other adjuncts. Customer: _________________________________________ Location: _________________________________________ PBX Type: _________________________________________ New Install:...
Page 312
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-30 MERLIN II Communications System H 1.If “NO” (N), provide Note reference number and explain. 2. See also AVP or MERLIN MAIL Voice Messaging System checklists, as appropriate. If outcalling enabled: nAll voice mail ports except last one toll restricted nLast port for voice mail restricted to areas appropriate for outcalling Product Monitoring SMDR reports monitored daily Customer Education...
Page 313
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-31 MERLIN LEGEND Communications System H MERLIN LEGEND Communications System Also see the general security checklist on page H-3, and the security checklist for any attached voice mail systems or other adjuncts. Customer: _________________________________________ Location: _________________________________________ System Version: _________________________________________ New Install:...
Page 314
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-32 MERLIN LEGEND Communications System H Trunk groups dial access = n FRLs assigned to limit network access based on business needs Remote Access Remote Access inactive Use of non-DID/DNIS remote access number Barrier codes are random maximum-length, difficult-to-guess sequences Each Barrier Code’s FRL is appropriate Assign allowed/disallowed lists when appropriate Different barrier code...
Page 315
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-33 MERLIN LEGEND Communications System H 1.If “NO” (N), provide Note reference number and explain. 2. See also AVP or MERLIN MAIL Voice Messaging System checklists, as appropriate. Disallow list created containing 0, 011, 10, 700, 800, 1800, 809, 1809, 411, 1411, 900, and 9999 Access denied to pooled facility codes 70, and 890-899 Product Monitoring SMDR/Hacker Tracker reports monitored daily...
Page 316
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-34 MERLIN MAIL Voice Messaging System H MERLIN MAIL Voice Messaging System Also see the general security checklist on page H-3, and the security checklist for the host communications system. Customer: _________________________________________ Location: _________________________________________ PBX Type: _________________________________________ New Install: _________________________________________...
Page 317
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-35 MERLIN MAIL Voice Messaging System H 1.If “NO” (N), provide Note reference number and explain. MERLIN LEGEND Communications System voice mail port(s) used for outcalling restricted via allow list to specific areas if outcalling is needed. All other MERLIN LEGEND Communications System voice mail ports outward restricted. Disallow list created containing 0, 011, 10, 700, 800, 1800, 809, 1809,...
Page 318
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-36 MERLIN MAIL-ML Voice Messaging System H MERLIN MAIL-ML Voice Messaging System Also see the general security checklist on page H-3, and the security checklist for the host communications system. Customer: _________________________________________ Location: _________________________________________ PBX Type: _________________________________________ New Install:...
Page 319
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-37 MERLIN MAIL-ML Voice Messaging System H 1.If “NO” (N), provide Note reference number and explain. MERLIN LEGEND Communications System voice mail port(s) used for outcalling restricted via allowed list to specific areas if outcalling is needed. All other MERLIN LEGEND Communications System voice mail ports outward restricted. On MERLIN LEGEND Communications System, create disallow list...
Page 320
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-38 MERLIN MAIL R3 Voice Messaging System H MERLIN MAIL R3 Voice Messaging System Also see the general security checklist on page H-3, and the security checklist for the host communications system. Customer: _________________________________________ Location: _________________________________________ PBX Type: _________________________________________ New Install:...