Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook Instructions Manual

Lucent Technologies BCS Products Security Handbook Instructions Manual

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 331

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-49 Multipoint Conferencing Unit (MCU)/Conference Reservation and Control System 
H
NETCON channels secured
Non-DID extensions used for NETCON 
ports
Unused NETCON channels removed
Login Security Violation Notification 
feature active
nLogins automatically disabled after 
security violation
nLogin Security Violations monitored 
24 hours per day
Login permissions customized
Unused logins removed (“remove...

Page 332

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-50 Multipoint Conferencing Unit (MCU)/Conference Reservation and Control System 
H
Remote Access administered (continued)
nVoice processing ports COR-to-COR 
restricted from dialing Remote Access 
barrier codes
nRemote Access Security Violation 
Notification feature active
— Remote Access Security Violations 
monitored 24 hours per day
— Remote Access automatically 
disabled following detection of a...

Page 333

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-51 Multipoint Conferencing Unit (MCU)/Conference Reservation and Control System 
H
Routing
ARS/WCR used for call routing
n1+809 and 0+809 area code blocked
n900 and 976 calls blocked
n976 “look-alikes” blocked
nBlock access to Alliance 
teleconference service (0700)
n011/LD calls limited by FRLs
n011/LD calls limited by Time-of-Day 
routing
n011/LD calls limited by 6-digit or digit 
analysis
nAlternate...

Page 334

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-52 Multipoint Conferencing Unit (MCU)/Conference Reservation and Control System 
H
1.If “NO” (N), provide Note reference number and explain.
Product Monitoring
Traffic measurements reports monitored 
daily
SMDR/CMS reports monitored daily
Recent change history log reviewed daily 
(G1/G3)
Table H-20.MSM  — Continued
Y/N
1Note N/A 

Page 335

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-53 PARTNER II and PARTNER Plus Communications Systems 
H
PARTNER II and PARTNER Plus
Communications Systems
Also see the general security checklist on page H-3, and the security checklist for 
any attached voice mail systems or other adjuncts.
Customer: _________________________________________
Location: _________________________________________
Product Type: _________________________________________...

Page 336

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-54 PARTNER II and PARTNER Plus Communications Systems 
H
System security policy reviewed 
periodically
Security policy included in new-hire 
orientation
Employees know how to detect 
potential toll fraud
Employees know where to report 
suspected toll fraud
Account codes not sequential
Account codes and logins not 
written down or translated on 
auto-dial buttons
Social engineering explained
Customer is...

Page 337

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-55 PARTNER II and PARTNER Plus Communications Systems 
H
 
1.If “NO” (N), provide Note reference number and explain.
2. Use line access restrictions, outgoing call restrictions, allowed and disallowed lists
features.
Product Monitoring
SMDR reports monitored daily
HackerTracker reports monitored 
daily
Automated Attendant
Administer range of valid 
extensions
Administer maximum digits to 
match dial...

Page 338

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-56 PARTNER MAIL and PARTNER MAIL VS Systems 
H
PARTNER MAIL and PARTNER MAIL 
VS Systems
Also see the general security checklist on page H-3, and the security checklist for 
the host communications system.
Customer: _________________________________________
Location: _________________________________________
PBX Type: _________________________________________
New Install:...

Page 339

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-57 PARTNER MAIL and PARTNER MAIL VS Systems 
H
 
1.If “NO” (N), provide Note reference number and explain.
System Features
Mailboxes created only for active 
subscribers
Outcalling privileges not assigned 
or assigned only to those requiring 
them
PARTNER II and PARTNER Plus 
Communications Systems’ voice 
mail port(s) used for outcalling 
restricted via allow list to specific 
areas if outcalling is...

Page 340

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-58 System 25 
H
System 25
Also see the general security checklist on page H-3, and the security checklist for 
any attached voice mail systems or other adjuncts.
Customer: _________________________________________
Location: _________________________________________
PBX Type: _________________________________________
New Install: _________________________________________
System Upgrade:...
Start reading Lucent Technologies BCS Products Security Handbook Instructions Manual

Related Manuals for Lucent Technologies BCS Products Security Handbook Instructions Manual

All Lucent Technologies manuals