Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook Instructions Manual

Lucent Technologies BCS Products Security Handbook Instructions Manual

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 311

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-29 MERLIN II Communications System 
H
MERLIN II Communications System
Also see the general security checklist on page H-3, and the security checklist for 
any attached voice mail systems or other adjuncts.
Customer: _________________________________________
Location: _________________________________________
PBX Type: _________________________________________
New Install:...

Page 312

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-30 MERLIN II Communications System 
H
1.If “NO” (N), provide Note reference number and explain.
2. See also AVP or MERLIN MAIL Voice Messaging System checklists, as appropriate.
If outcalling enabled:
nAll voice mail ports except last 
one toll restricted
nLast port for voice mail 
restricted to areas appropriate 
for outcalling
Product Monitoring
SMDR reports monitored daily
Customer Education...

Page 313

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-31 MERLIN LEGEND Communications System 
H
MERLIN LEGEND Communications 
System
Also see the general security checklist on page H-3, and the security checklist for 
any attached voice mail systems or other adjuncts.
Customer: _________________________________________
Location: _________________________________________
System Version: _________________________________________
New Install:...

Page 314

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-32 MERLIN LEGEND Communications System 
H
Trunk groups dial access = n
FRLs assigned to limit network 
access based on business needs
Remote Access
Remote Access inactive
Use of non-DID/DNIS remote 
access number
Barrier codes are random 
maximum-length, difficult-to-guess 
sequences
Each Barrier Code’s FRL is 
appropriate
Assign allowed/disallowed lists 
when appropriate
Different barrier code...

Page 315

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-33 MERLIN LEGEND Communications System 
H
1.If “NO” (N), provide Note reference number and explain.
2. See also AVP or MERLIN MAIL Voice Messaging System checklists, as appropriate.
Disallow list created containing 0, 
011, 10, 700, 800, 1800, 809, 1809, 
411, 1411, 900, and 9999
Access denied to pooled facility 
codes 70, and 890-899
Product Monitoring
SMDR/Hacker Tracker reports 
monitored daily...

Page 316

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-34 MERLIN MAIL Voice Messaging System 
H
MERLIN MAIL Voice Messaging 
System
Also see the general security checklist on page H-3, and the security checklist for 
the host communications system.
Customer: _________________________________________
Location: _________________________________________
PBX Type: _________________________________________
New Install: _________________________________________...

Page 317

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-35 MERLIN MAIL Voice Messaging System 
H
1.If “NO” (N), provide Note reference number and explain.
MERLIN LEGEND 
Communications System voice mail 
port(s) used for outcalling 
restricted via allow list to specific 
areas if outcalling is needed. All 
other MERLIN LEGEND 
Communications System voice mail 
ports outward restricted.
Disallow list created containing 0, 
011, 10, 700, 800, 1800, 809, 1809,...

Page 318

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-36 MERLIN MAIL-ML Voice Messaging System 
H
MERLIN MAIL-ML Voice Messaging 
System
Also see the general security checklist on page H-3, and the security checklist for 
the host communications system.
Customer: _________________________________________
Location: _________________________________________
PBX Type: _________________________________________
New Install:...

Page 319

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-37 MERLIN MAIL-ML Voice Messaging System 
H
1.If “NO” (N), provide Note reference number and explain.
MERLIN LEGEND 
Communications System voice mail 
port(s) used for outcalling 
restricted via allowed list to specific 
areas if outcalling is needed. All 
other MERLIN LEGEND 
Communications System voice mail 
ports outward restricted.
On MERLIN LEGEND 
Communications System, create 
disallow list...

Page 320

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-38 MERLIN MAIL R3 Voice Messaging System 
H
MERLIN MAIL R3 Voice Messaging 
System
Also see the general security checklist on page H-3, and the security checklist for 
the host communications system.
Customer: _________________________________________
Location: _________________________________________
PBX Type: _________________________________________
New Install:...
Start reading Lucent Technologies BCS Products Security Handbook Instructions Manual

Related Manuals for Lucent Technologies BCS Products Security Handbook Instructions Manual

All Lucent Technologies manuals