Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook Instructions Manual

Lucent Technologies BCS Products Security Handbook Instructions Manual

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 341

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-59 System 25 
H
1.If “NO” (N), provide Note reference number and explain.
Remote Access
Remote activated only if required
Use non-DID number for remote 
access
Barrier codes are maximum 
allowable digits, random number 
sequence, non-sequential
AVP/VMS
Do not register ARS or FACS as 
subscribers
Provide small mailboxes (AVP) 
and no voice mail coverage on 
“utility” stations (that is, non-voice 
such...

Page 342

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-60 PassageWay Telephony Services 
H
PassageWay Telephony Services
Also see the general security checklist on page H-3.
Customer: _________________________________________
Location: _________________________________________
PassageWay Install 
Date:
________________________________________
Table H-24. PassageWay Telephony Services
Y/N
1Note N/A
General
Telephony Server is in a secure 
location (locked...

Page 343

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-61 PassageWay Telephony Services 
H
System Administration
Guidelines followed for 
logins/passwords for user 
accounts. (See PassageWay 
customer documentation.)
Customer educated about 
standard Lucent password 
recommendations (For example, at 
least 7 characters and forced 
password change for new 
subscribers. See PassageWay 
customer documentation.)
Default administrator login for 
Tserver changed...

Page 344

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-62 PassageWay Telephony Services 
H
For NetWare only:
Used the NetWare Administrator 
feature (NetWare 4.10 and 4.11) or 
SYSCON utility (NetWare 3.12) to 
set the appropriate login and 
password restrictions (For example, 
require users to have passwords 
with a minimum length of 7 
characters, enable password aging, 
and so forth.)
Used the NetWare Administrator 
feature (NetWare 4.10 and 4.11) or...

Page 345

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-63 PassageWay Telephony Services 
H
Access Control
To ensure protection of sensitive 
system files used by Tserver, only 
System Administrator has access to 
Tserver, Security Database, and 
log files.
For Windows NT only:
Make file system NTFS instead of 
FAT.
Remote Access
When using pcANYWHERE (or 
another tool for remote access of 
customer PCs), customer has 
been advised of the following...

Page 346

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-64 PassageWay Telephony Services 
H
1.If “NO” (N), provide Note reference number and explain
nWhen on the PC, 
pcANYWHERE is not started 
except as required.
nFor added security, unplug 
phone jack from modem when 
pcANYWHERE is not in use.
nChange password after 
services leaves and after 
remote access.
nConfigure the following 
security options:
— Require login names for 
callers
— Make passwords...

Page 347

Large Business Communications Systems Security Tools by Release 
Page I-1  
I
BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
I
ILarge Business Communications
Systems Security Tools by Release
The following tables contain page references for the available security features for 
the System 75, System 85, DEFINITY G1, G2, G3, and DEFINITY ECS. 
Information is listed by release. 

Page 348

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems Security Tools by Release 
Page I-2  
I
Table I-1. Large Business Communications Systems Security Tools by Release
Feature See Section/Page S75 S85 G1 G2 G3V1 G3V2 G3V3 G3V4ECS 
R5 & 
later
3-way COR check‘‘
Restriction 
Override (3-way 
COR Check)’’ on 
page 3-14
xxxx
AAR/ARS Analysis‘‘
AAR/ARS 
Analysis’’ on page 
3-17
xxxxxxxxx
Administrable 
Logins‘‘
Forced Password 
Aging and 
Administrable...

Page 349

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems Security Tools by Release 
Page I-3  
I
Automatic Circuit 
Assurance‘‘Automatic Circuit 
Assurance (ACA)’’ 
on page 3-51
‘‘Automatic Circuit 
Assurance’’ on 
page 6-11
xxxxxxxxx
Barrier Code‘‘
Remote Access’’ 
on page 2-2
‘‘Security Tips’’ on 
page 3-2
‘‘Barrier Codes’’ on 
page 3-4
‘‘Restrict Who Can 
Use Remote 
Access/Track its 
Usage’’ on page 
3-25
‘‘Protecting 
Remote Access’’ 
on page 4-13...

Page 350

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems Security Tools by Release 
Page I-4  
I
Call Detail 
Recording (SMDR)‘‘Call Detail 
Recording (CDR) / 
Station Message 
Detail Recording 
(SMDR)’’ on page 
3-48
‘‘Call Detail 
Recording (CDR) / 
Station Message 
Detail Recording 
(SMDR)’’ on page 
5-11
‘‘Call Detail 
Recording (CDR) / 
Station Message 
Detail Recording 
(SMDR)’’ on page 
6-8
xxxxxxxxx
Call Forward 
On/Off Net‘‘
Class of Service’’ 
on...
Start reading Lucent Technologies BCS Products Security Handbook Instructions Manual

Related Manuals for Lucent Technologies BCS Products Security Handbook Instructions Manual

All Lucent Technologies manuals