Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook Instructions Manual
Lucent Technologies BCS Products Security Handbook Instructions Manual
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 61
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-15 Tools that Restrict Unauthorized Outgoing Calls 3 nToll Restriction: prevents users from placing toll calls over CO, FX, or WATS trunks using dial access codes to trunks. Use ARS/WCR with WCR toll restrictions instead. nARS/WCR Toll Restriction: restricts users from dialing the ARS or WCR Network I Toll Access Code or from completing a toll call over ARS/WCR. nFRL: establishes the...
Page 62
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-16 Tools that Restrict Unauthorized Outgoing Calls 3 NOTE: ARS/WRC route patterns should never be assigned an FRL of 0 (zero). The FRL is used by AAR/ARS/WCR to determine call access to an outgoing trunk group. Outgoing call routing is determined by a comparison of the FRLs in the AAR/ARS/WCR routing pattern with the FRL associated with the originating endpoint. Authorization codes...
Page 63
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-17 Tools that Restrict Unauthorized Outgoing Calls 3 AAR/ARS Analysis ARS routing allows calls to be routed based on the number dialed and the routing plan in effect. The routing is normally to the lowest-cost facility. Different Time of Day plans can be implemented to allow or prohibit calling at certain times. NOTE: Never route public network calls (leading digit = 0 or 1) via AAR...
Page 64
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-18 Tools that Restrict Unauthorized Outgoing Calls 3 administer switchhook flash to “n” (administered by means of the Add or Change Station screen) for FAX machines and modems. Attendant - Controlled Voice Terminals When telephones are located in easily-accessible locations (such as lobbies) that do not provide protection against abuse, you can assign them to an attendant-controlled...
Page 65
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-19 Tools that Restrict Unauthorized Outgoing Calls 3 Central Office Restrictions Some Central Offices offer additional services that screen long distance calls, such as + calls and 10xxx + calls. Contact your local telephone company for details. Restricting Incoming Tie Trunks You can deny access to AAR/ARS/WCR trunks when the caller is on an incoming tie trunk. For all the switches, you...
Page 66
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-20 Tools that Restrict Unauthorized Outgoing Calls 3 nrestricted — Public network trunks are not transferred. nnone — No trunks are transferred. NOTE: Starting with DEFINITY ECS Release 5, trunk-to-trunk transfer is automatically restricted via administration. To this end, the “Restriction Override” field in the Class of Restriction form is set to none by default. To disallow this feature,...
Page 67
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-21 Tools that Restrict Unauthorized Outgoing Calls 3 You may also route or calls to a local attendant for handling. In addition, 10xxx + calls can be restricted. Certain laws and regulations may prevent you from blocking these calls, however. Check with your local or long distance carrier for applicable laws and regulations. If possible, use WCR to shut down toll routes during...
Page 68
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-22 Tools that Restrict Unauthorized Outgoing Calls 3 Personal Station Access (PSA) The Personal Station Access (PSA) feature allows multiple users to work at the same voice terminal location at different times. PSA provides capabilities that are similar to TTI, but for a single station. This feature is available starting with DEFINITY ECS Release 5. Each PSA user must have a Station...
Page 69
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-23 Tools that Restrict Unauthorized Outgoing Calls 3 or separated. Therefore, PSA users should dissociate before they disconnect from a DCP extender. PSA security violations are recorded by SVN software, if enabled. Refer to the SVN feature description and to the DEFINITY ECS Release 5 Feature Description and to DEFINITY ECS Release 5 Implementation for security report information....
Page 70
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-24 Security Measures 3 Invalid attempts to change the coverage path or the call forwarding destination are recorded by the SVN. To identify unauthorized activation of the Call Forwarding features, use the list call-forwarding command. The command output includes stations that have Call Forwarding All Calls and Call Forwarding Busy/Don’t Answer active. Also displayed are the number and...