Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook Instructions Manual

Lucent Technologies BCS Products Security Handbook Instructions Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies BCS Products Security Handbook Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Product Security Checklists 
    Page H-19 DEFINITY ECS, DEFINITY G1 and G3, and System 75 
    H
    Block access to Alliance 
    teleconference service (0700)
    011/LD calls limited by FRLs
    011/LD calls limited by Time-of-Day 
    routing
    011/LD calls limited by 6-digit or 
    digit analysis 
    Alternate FRLs used (G3r)
    Facility Test Call/Data 
    Origination
    Facility Test code changed from 
    default, if used
    Facility Test code translated only 
    when needed
    Facility Test code limited to system 
    admin/mtc COR
    Data Origination feature code not 
    translated
    Logoff notification enabled (G3V4)
    Miscellaneous
    Console permissions 
    restricted/limited
    Operator calls restricted
    Switch-hook flash denied on FAX 
    machines, modems, etc.
    COR-to-COR restrictions used on 
    all CORs
    Ports for adjuncts in own restricted 
    COR
    VDNs have own restricted CORs 
    (G3)
    Restrict call forwarding off-net = y 
    (G3)
    Digit conversion of unauthorized 
    calls to console or security (G3)
    Table H-6. DEFINITY ECS, G1, and G3, and System 75 — Continued
    Y/N
    1Note N/A 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Product Security Checklists 
    Page H-20 DEFINITY ECS, DEFINITY G1 and G3, and System 75 
    H
    1.If “NO” (N), provide Note reference number and explain.
    Three-way COR check on 
    transfer/conference (G3V3 and 
    later)
    Authorization Code Security 
    Violation Notification feature active 
    (G3V3 and later)
    Product Monitoring
    Traffic measurement reports 
    monitored daily
    SMDR/CMS reports monitored daily
    Recent change history log reviewed 
    daily (G1/G3)
    Table H-6. DEFINITY ECS, G1, and G3, and System 75 — Continued
    Y/N
    1Note N/A 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Product Security Checklists 
    Page H-21 DEFINITY G2 and System 85 
    H
    DEFINITY G2 and System 85
    Also see the general security checklist on page H-3, and the security checklist for 
    any attached voice mail systems or other adjuncts.
    Customer: _________________________________________
    Location: _________________________________________
    System & Version: _________________________________________
    New Install: _________________________________________
    System Upgrade: _________________________________________
    Major Addition: _________________________________________
    Table H-7. DEFINITY G2 and System 85
    Y/N
    1Note N/A
    System Administration 
    Logins and Procedures
    Security code changed from factory 
    default
    PBX Features
    Trunk groups have dial access 
    disabled
    COS/Miscellaneous Trunk 
    Restrictions on dial-accessed 
    trunks
    Disable Trunk Verification Access 
    Code
    ACA (Automatic Circuit Assurance) 
    on trunk groups
    Alternate FRLs used
    Individual and Group Controlled 
    Restrictions used
    Attendant Control of Trunk Group 
    activated for any trunk groups with 
    TACs 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Product Security Checklists 
    Page H-22 DEFINITY G2 and System 85 
    H
    VDNs have their own restricted 
    COSs
    Ports for adjuncts in own restricted 
    COS
    Authorization codes used
    Authorization codes not sequential
    900, 976 calls blocked
    Operator calls restricted
    011/LD calls restricted
    011/LD calls limited by Time-of-Day 
    Routing
    1+809 and 0+809 Area Code 
    blocked
    Digit Conversion of unauthorized 
    calls to console or security
    SMDR/CDR activated on all trunk 
    groups
    Trunks measured by BCMS/CMS
    ARS/WCR used for call routing
    Remote Access
    Remote access disabled (no trunk 
    groups translated as remote 
    access)
    Remote access number is 
    unpublished
    Seven-digit authorization codes 
    used with RA
    Authorization code timeout to 
    attendant
    Barrier code is a random four-digit 
    sequence
    SMDR/CAS/CDR reports monitored 
    daily, including authorization code 
    violations
    Table H-7. DEFINITY G2 and System 85 — Continued
    Y/N
    1Note N/A 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Product Security Checklists 
    Page H-23 DEFINITY G2 and System 85 
    H
    Traffic measurement reports, 
    including remote access history 
    reviewed daily
    Customer Education
    Security code changed on a 
    scheduled basis and coordinated 
    with Denver Maintenance Center
    Blocking 976 look-alikes
    DID/DNIS number range does not 
    overlap facility access codes
    Remote Call Forwarding not active
    Remote Call Forwarding used only 
    offnet with groundstart trunks
    Positive disconnect verified with 
    loop start trunks
    Remote Access
    Remote activated only if required
    Use non-DID number for remote 
    access
    Barrier codes are maximum 
    allowable digits, random number 
    sequence
    Barrier codes are not sequential
    AVP/VMS
    Do not register ARS or FACS as 
    subscribers
    Provide small mailboxes (AVP) 
    and no voice mail coverage on 
    “utility” stations (that is, non-voice 
    such as FAX endpoints)
    Administration login password 
    changed on regular basis
    Transfer to Subscribers Only = y 
    (AVP)
    Change password from default for 
    new subscribers
    Table H-7. DEFINITY G2 and System 85 — Continued
    Y/N
    1Note N/A 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Product Security Checklists 
    Page H-24 DEFINITY G2 and System 85 
    H
    1.If “NO” (N), provide Note reference number and explain.
    Voice ports outward restricted if 
    outcalling not used
    Use of outcalling denied or 
    minimized
    Invalid Auto Attendant menu 
    options directed to operator
    Disable remote maintenance 
    access when not in use
    Table H-7. DEFINITY G2 and System 85 — Continued
    Y/N
    1Note N/A 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Product Security Checklists 
    Page H-25 DIMENSION PBX System 
    H
    DIMENSION PBX System
    Also see the general security checklist on page H-3, and the security checklist for 
    any attached voice mail systems or other adjuncts.
    Customer: _________________________________________
    FP & Issue: _________________________________________
    Location: _________________________________________
    System Upgrade: _________________________________________
    Major Addition: _________________________________________
    Table H-8. DIMENSION PBX System
    Y/N
    1Note N/A
    System Administration
    Security Code changed from 
    factory default
    PBX Features
    Trunk-to-trunk transfer disabled
    Trunk groups have dial access 
    disabled
    COS/Miscellaneous Trunk 
    Restrictions on dial-accessed 
    trunks
    Disable Trunk Verification Access 
    Code
    ACA (Automatic Circuit Assurance) 
    on trunk groups
    Alternate FRLs used
    Individual and Group Controlled 
    Restrictions used
    Attendant Control of Trunk Group 
    Activated for any trunk groups with 
    TACS 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Product Security Checklists 
    Page H-26 DIMENSION PBX System 
    H
    Ports for adjuncts in own restricted 
    COS
    Authorization codes used
    Authorization codes not sequential
    900, 976 calls blocked
    Operator calls restricted
    011/LD calls restricted
    011/LD calls limited by Time-of-Day 
    Routing 
    1+809 and 0+809 Area Code 
    blocked
    Digit Conversion of unauthorized 
    calls to console or security
    SMDR activated on all trunk groups
    Trunks measured by BCMS/CMS
    Call Forwarding Off-Net disabled
    ARS used for call routing
    Remote Access
    Remote access disabled (no trunk 
    groups translated as remote 
    access)
    Remote access number is 
    unpublished
    7-digit authorization codes used 
    with RA
    Authorization code timeout to 
    attendant
    Remote access COS is restricted
    Barrier code is a random 4-digit 
    sequence
    Product Monitoring
    SMDR reports monitored daily, 
    including authorization code 
    violations
    Table H-8. DIMENSION PBX System — Continued
    Y/N
    1Note N/A 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Product Security Checklists 
    Page H-27 DIMENSION PBX System 
    H
    1.If “NO” (N), provide Note reference number and explain.
    Traffic measurement reports, 
    including remote access history 
    reviewed daily
    Customer Education
    Security code changed on a 
    scheduled basis and coordinated 
    with Denver Maintenance Center
    Blocking 976 look-alikes
    Table H-8. DIMENSION PBX System — Continued
    Y/N
    1Note N/A 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Product Security Checklists 
    Page H-28 Lucent Technologies/Bay Networks 
    H
    Lucent Technologies/Bay Networks
    Also see the general security checklist on page H-3.
    1.If “NO” (N), provide Note reference number and explain.
    Customer: _________________________________________
    System & Version: _________________________________________
    Location: _________________________________________
    New Install: _________________________________________
    System Upgrade: _________________________________________
    Major Addition: _________________________________________
    Table H-9. Lucent Technologies/Bay Networks
    Y/N
    1Note N/A
    System Administration
    Root password changed from default
    Manager-level password changed 
    from default
    Monitor-level password changed 
    from default 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies BCS Products Security Handbook Instructions Manual