Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook Instructions Manual
Lucent Technologies BCS Products Security Handbook Instructions Manual
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 81
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-35 Security Measures 3 nSpecify the type of intercept treatment (announcement, attendant, extension, or tone) the controlled stations will receive. nEnter change COS to display the Class of Service screen. nEnter y in the Console Permissions field. nEnter change station or change attendant to assign the COS to the station handling the controlled restrictions. For DEFINITY G2 and System...
Page 82
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-36 Security Measures 3 nUse PROC010 WORD3 FIELD2-10 to deny access to the MTRG. nIf DACs are required by switch users, use PROC275 WORD1 FIELD15 to disable Tandem Tie Trunk calls. Use Attendant Control of Trunk Group Access If direct access to trunk groups must be allowed, consider making them attendant-controlled trunk groups. The attendant can then screen the calls. Up to 12 trunk groups...
Page 83
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-37 Security Measures 3 nTouch-tone receiver test call — Accesses and tests the four touch-tone receivers located on a Tone Detector circuit pack or the eight receivers if a TN744 Call Classifier circuit pack is used. nTime slot test call — Connects the voice terminal user to a specific time slot located on the Time Division Multiplex buses or out-of-service time slots. nSystem tone test...
Page 84
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-38 Security Measures 3 For DEFINITY ECS, DEFINITY G1, G3, and System 75: nUse change cor to display the Class of Restriction screen. nEnter y in the Facility Access Trunk Test field. nUse change station to assign the COR with the FAC test permission to the appropriate station. nAssign all other stations to a COR with the Facility Access Trunk Test field set to n. nNever use the default...
Page 85
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-39 Security Measures 3 For DEFINITY G2.2: nUse PROC103 WORD1 FIELD15 to suppress WCR dial tone for that trunk group. nUse PROC312 WORD1 FIELD2 to suppress a specific network’s dial tone for all users. For DEFINITY G2.1 and System 85: nUse PROC103 WORD1 FIELD3=2 to set the Network Trunk field to a value of 2 to suppress AAR/AAS dial tone for that trunk group. nUse PROC285 WORD1 FIELD12 to...
Page 86
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-40 Security Measures 3 Disable Transfer Outgoing Trunk to Outgoing Trunk The outgoing trunk to outgoing trunk transfer (OTTOTT) (G3r and G3V2 and later) feature allows a controlling party, such as a station user or attendant, to initiate two or more outgoing trunk calls and then transfer the trunks together. The transfer removes the controlling party from the connection and conferences...
Page 87
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-41 Security Measures 3 nUse change trunk-group to assign the COR to the tie line trunk group. For G2 and System 85: nUse PROC103 WORD1 FIELD5=0 to deny access to AAR/ARS/WCR trunks from tie trunks [other than Electronic Tandem Network (ETN) trunks]. However, the calls coming in on an access tie line will not be able to access AAR to dial other network numbers, including extensions that...
Page 88
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-42 Security Measures 3 monitor command can be used by any super user or non-super user with permission to display administration and maintenance data. The monitor command also helps locate facilities to which the trunk is communicating, and thus allows you to track hacking activity as it occurs. The monitor command provides 30 second updates on trunk activity. Use Terminal Translation...
Page 89
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-43 Security Measures 3 NOTE: Station Message Detail Recording (SMDR) and account codes are only required for toll calls. nFor DEFINITY ECS and DEFINITY G3, use change toll to display the Toll Analysis screen. nEnter dialed strings that require FEAC, and enter x in the Toll and SMDR/CDR FEAC fields. For G3, any dialed string, including 7-digit local numbers, can be identified as “toll.”...
Page 90
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-44 Security Measures 3 Remove Data Origination Code The Data Origination feature is used in conjunction with modem pooling. It allows users to bypass many system restrictions and gives them access to outside facilities. It has the potential to be used by hackers to compromise a system. The Data Origination default code is 134. When a voice mail system is set to digits (instead of...