Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook Instructions Manual
Lucent Technologies BCS Products Security Handbook Instructions Manual
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 331
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-49 Multipoint Conferencing Unit (MCU)/Conference Reservation and Control System H NETCON channels secured Non-DID extensions used for NETCON ports Unused NETCON channels removed Login Security Violation Notification feature active nLogins automatically disabled after security violation nLogin Security Violations monitored 24 hours per day Login permissions customized Unused logins removed (“remove...
Page 332
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-50 Multipoint Conferencing Unit (MCU)/Conference Reservation and Control System H Remote Access administered (continued) nVoice processing ports COR-to-COR restricted from dialing Remote Access barrier codes nRemote Access Security Violation Notification feature active — Remote Access Security Violations monitored 24 hours per day — Remote Access automatically disabled following detection of a...
Page 333
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-51 Multipoint Conferencing Unit (MCU)/Conference Reservation and Control System H Routing ARS/WCR used for call routing n1+809 and 0+809 area code blocked n900 and 976 calls blocked n976 “look-alikes” blocked nBlock access to Alliance teleconference service (0700) n011/LD calls limited by FRLs n011/LD calls limited by Time-of-Day routing n011/LD calls limited by 6-digit or digit analysis nAlternate...
Page 334
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-52 Multipoint Conferencing Unit (MCU)/Conference Reservation and Control System H 1.If “NO” (N), provide Note reference number and explain. Product Monitoring Traffic measurements reports monitored daily SMDR/CMS reports monitored daily Recent change history log reviewed daily (G1/G3) Table H-20.MSM — Continued Y/N 1Note N/A
Page 335
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-53 PARTNER II and PARTNER Plus Communications Systems H PARTNER II and PARTNER Plus Communications Systems Also see the general security checklist on page H-3, and the security checklist for any attached voice mail systems or other adjuncts. Customer: _________________________________________ Location: _________________________________________ Product Type: _________________________________________...
Page 336
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-54 PARTNER II and PARTNER Plus Communications Systems H System security policy reviewed periodically Security policy included in new-hire orientation Employees know how to detect potential toll fraud Employees know where to report suspected toll fraud Account codes not sequential Account codes and logins not written down or translated on auto-dial buttons Social engineering explained Customer is...
Page 337
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-55 PARTNER II and PARTNER Plus Communications Systems H 1.If “NO” (N), provide Note reference number and explain. 2. Use line access restrictions, outgoing call restrictions, allowed and disallowed lists features. Product Monitoring SMDR reports monitored daily HackerTracker reports monitored daily Automated Attendant Administer range of valid extensions Administer maximum digits to match dial...
Page 338
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-56 PARTNER MAIL and PARTNER MAIL VS Systems H PARTNER MAIL and PARTNER MAIL VS Systems Also see the general security checklist on page H-3, and the security checklist for the host communications system. Customer: _________________________________________ Location: _________________________________________ PBX Type: _________________________________________ New Install:...
Page 339
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-57 PARTNER MAIL and PARTNER MAIL VS Systems H 1.If “NO” (N), provide Note reference number and explain. System Features Mailboxes created only for active subscribers Outcalling privileges not assigned or assigned only to those requiring them PARTNER II and PARTNER Plus Communications Systems’ voice mail port(s) used for outcalling restricted via allow list to specific areas if outcalling is...
Page 340
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-58 System 25 H System 25 Also see the general security checklist on page H-3, and the security checklist for any attached voice mail systems or other adjuncts. Customer: _________________________________________ Location: _________________________________________ PBX Type: _________________________________________ New Install: _________________________________________ System Upgrade:...