Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook Instructions Manual

Lucent Technologies BCS Products Security Handbook Instructions Manual

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 81

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-35 Security Measures 
3
nSpecify the type of intercept treatment (announcement, attendant, 
extension, or tone) the controlled stations will receive.
nEnter change COS to display the Class of Service screen.
nEnter y in the Console Permissions field.
nEnter change station or change attendant to assign the COS to the 
station handling the controlled restrictions.
For DEFINITY G2 and System...

Page 82

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-36 Security Measures 
3
nUse PROC010 WORD3 FIELD2-10 to deny access to the MTRG.
nIf DACs are required by switch users, use PROC275 WORD1 FIELD15 to 
disable Tandem Tie Trunk calls.
Use Attendant Control of Trunk Group Access
If direct access to trunk groups must be allowed, consider making them 
attendant-controlled trunk groups. The attendant can then screen the calls.
Up to 12 trunk groups...

Page 83

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-37 Security Measures 
3
nTouch-tone receiver test call — Accesses and tests the four touch-tone 
receivers located on a Tone Detector circuit pack or the eight receivers if a 
TN744 Call Classifier circuit pack is used.
nTime slot test call — Connects the voice terminal user to a specific time slot 
located on the Time Division Multiplex buses or out-of-service time slots.
nSystem tone test...

Page 84

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-38 Security Measures 
3
For DEFINITY ECS, DEFINITY G1, G3, and System 75:
nUse change cor to display the Class of Restriction screen.
nEnter y in the Facility Access Trunk Test field.
nUse change station to assign the COR with the FAC test permission to the 
appropriate station.
nAssign all other stations to a COR with the Facility Access Trunk Test field 
set to n.
nNever use the default...

Page 85

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-39 Security Measures 
3
For DEFINITY G2.2:
nUse PROC103 WORD1 FIELD15 to suppress WCR dial tone for that trunk 
group.
nUse PROC312 WORD1 FIELD2 to suppress a specific network’s dial tone 
for all users.
For DEFINITY G2.1 and System 85:
nUse PROC103 WORD1 FIELD3=2 to set the Network Trunk field to a value 
of 2 to suppress AAR/AAS dial tone for that trunk group.
nUse PROC285 WORD1 FIELD12 to...

Page 86

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-40 Security Measures 
3
Disable Transfer Outgoing Trunk to 
Outgoing Trunk
The outgoing trunk to outgoing trunk transfer (OTTOTT) (G3r and G3V2 and later) 
feature allows a controlling party, such as a station user or attendant, to initiate 
two or more outgoing trunk calls and then transfer the trunks together. The 
transfer removes the controlling party from the connection and conferences...

Page 87

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-41 Security Measures 
3
nUse change trunk-group to assign the COR to the tie line trunk group.
For G2 and System 85:
nUse PROC103 WORD1 FIELD5=0 to deny access to AAR/ARS/WCR 
trunks from tie trunks [other than Electronic Tandem Network (ETN) 
trunks]. However, the calls coming in on an access tie line will not be able 
to access AAR to dial other network numbers, including extensions that...

Page 88

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-42 Security Measures 
3
monitor command can be used by any super user or non-super user with 
permission to display administration and maintenance data.
The monitor command also helps locate facilities to which the trunk is 
communicating, and thus allows you to track hacking activity as it occurs. The 
monitor command provides 30 second updates on trunk activity. 
Use Terminal Translation...

Page 89

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-43 Security Measures 
3
NOTE:
Station Message Detail Recording (SMDR) and account codes are 
only required for toll calls.
nFor DEFINITY ECS and DEFINITY G3, use change toll to display the Toll 
Analysis screen.
nEnter dialed strings that require FEAC, and enter x in the Toll and 
SMDR/CDR FEAC fields. For G3, any dialed string, including 7-digit local 
numbers, can be identified as “toll.”...

Page 90

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-44 Security Measures 
3
Remove Data Origination Code
The Data Origination feature is used in conjunction with modem pooling. It allows 
users to bypass many system restrictions and gives them access to outside 
facilities. It has the potential to be used by hackers to compromise a system.
The Data Origination default code is 134. When a voice mail system is set to 
digits 
(instead of...
Start reading Lucent Technologies BCS Products Security Handbook Instructions Manual

Related Manuals for Lucent Technologies BCS Products Security Handbook Instructions Manual

All Lucent Technologies manuals