Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook Instructions Manual
Lucent Technologies BCS Products Security Handbook Instructions Manual
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 341
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-59 System 25 H 1.If “NO” (N), provide Note reference number and explain. Remote Access Remote activated only if required Use non-DID number for remote access Barrier codes are maximum allowable digits, random number sequence, non-sequential AVP/VMS Do not register ARS or FACS as subscribers Provide small mailboxes (AVP) and no voice mail coverage on “utility” stations (that is, non-voice such...
Page 342
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-60 PassageWay Telephony Services H PassageWay Telephony Services Also see the general security checklist on page H-3. Customer: _________________________________________ Location: _________________________________________ PassageWay Install Date: ________________________________________ Table H-24. PassageWay Telephony Services Y/N 1Note N/A General Telephony Server is in a secure location (locked...
Page 343
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-61 PassageWay Telephony Services H System Administration Guidelines followed for logins/passwords for user accounts. (See PassageWay customer documentation.) Customer educated about standard Lucent password recommendations (For example, at least 7 characters and forced password change for new subscribers. See PassageWay customer documentation.) Default administrator login for Tserver changed...
Page 344
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-62 PassageWay Telephony Services H For NetWare only: Used the NetWare Administrator feature (NetWare 4.10 and 4.11) or SYSCON utility (NetWare 3.12) to set the appropriate login and password restrictions (For example, require users to have passwords with a minimum length of 7 characters, enable password aging, and so forth.) Used the NetWare Administrator feature (NetWare 4.10 and 4.11) or...
Page 345
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-63 PassageWay Telephony Services H Access Control To ensure protection of sensitive system files used by Tserver, only System Administrator has access to Tserver, Security Database, and log files. For Windows NT only: Make file system NTFS instead of FAT. Remote Access When using pcANYWHERE (or another tool for remote access of customer PCs), customer has been advised of the following...
Page 346
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-64 PassageWay Telephony Services H 1.If “NO” (N), provide Note reference number and explain nWhen on the PC, pcANYWHERE is not started except as required. nFor added security, unplug phone jack from modem when pcANYWHERE is not in use. nChange password after services leaves and after remote access. nConfigure the following security options: — Require login names for callers — Make passwords...
Page 347
Large Business Communications Systems Security Tools by Release Page I-1 I BCS Products Security Handbook 555-025-600 Issue 6 December 1997 I ILarge Business Communications Systems Security Tools by Release The following tables contain page references for the available security features for the System 75, System 85, DEFINITY G1, G2, G3, and DEFINITY ECS. Information is listed by release.
Page 348
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Security Tools by Release Page I-2 I Table I-1. Large Business Communications Systems Security Tools by Release Feature See Section/Page S75 S85 G1 G2 G3V1 G3V2 G3V3 G3V4ECS R5 & later 3-way COR check‘‘ Restriction Override (3-way COR Check)’’ on page 3-14 xxxx AAR/ARS Analysis‘‘ AAR/ARS Analysis’’ on page 3-17 xxxxxxxxx Administrable Logins‘‘ Forced Password Aging and Administrable...
Page 349
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Security Tools by Release Page I-3 I Automatic Circuit Assurance‘‘Automatic Circuit Assurance (ACA)’’ on page 3-51 ‘‘Automatic Circuit Assurance’’ on page 6-11 xxxxxxxxx Barrier Code‘‘ Remote Access’’ on page 2-2 ‘‘Security Tips’’ on page 3-2 ‘‘Barrier Codes’’ on page 3-4 ‘‘Restrict Who Can Use Remote Access/Track its Usage’’ on page 3-25 ‘‘Protecting Remote Access’’ on page 4-13...
Page 350
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Security Tools by Release Page I-4 I Call Detail Recording (SMDR)‘‘Call Detail Recording (CDR) / Station Message Detail Recording (SMDR)’’ on page 3-48 ‘‘Call Detail Recording (CDR) / Station Message Detail Recording (SMDR)’’ on page 5-11 ‘‘Call Detail Recording (CDR) / Station Message Detail Recording (SMDR)’’ on page 6-8 xxxxxxxxx Call Forward On/Off Net‘‘ Class of Service’’ on...