Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook Instructions Manual
Lucent Technologies BCS Products Security Handbook Instructions Manual
Have a look at the manual Lucent Technologies BCS Products Security Handbook Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Security Tools by Release Page I-5 I Class of Service‘‘Class of Service’’ on page 3-14 ‘‘Class of Service’’ on page 5-6 ‘‘Class of Service’’ on page 6-3 xxxxxxxxx CMS Measurements‘‘ CMS Measurements’’ on page 3-52 xxxxxxxxx COR Descriptions‘‘ Class of Restriction’’ on page 3-12 xxx Digit Conversion‘‘ Digit Conversion’’ on page 3-21 ‘‘Block International Calling’’ on page 3-30 ‘‘Limit International Calling’’ on page 3-32 ‘‘Restrict Calls to Specified Area Codes’’ on page 3-33 xxxG3ixxxx Enhanced Call Transfer‘‘ Basic Call Transfer’’ on page 5-21 ‘‘Disallow Outside Calls’’ on page 6-16 R1V3 Issue 2.0R2V4 Issue 5.0xxxxxx Extended User Administration of Redirected Calls‘‘ Extended User Administration of Redirected Calls’’ on page 3-23 x Table I-1. Large Business Communications Systems Security Tools by Release — Feature See Section/Page S75 S85 G1 G2 G3V1 G3V2 G3V3 G3V4ECS R5 & later
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Security Tools by Release Page I-6 I Facility Restriction Levels‘‘Class of Restriction’’ on page 3-12 ‘‘Facility Restriction Level (FRL)’’ on page 3-15 ‘‘Facility Restriction Levels’’ on page 5-5 ‘‘Facility Restriction Levels’’ on page 6-2 xxxxxxxxx Feature Access Code Administration‘‘ Known Toll Fraud Activity’’ on page 1-3 ‘‘Feature Access Code Administration’’ on page 3-8 xxxxxxxxx Forced Entry of Account Code‘‘ Forced Entry of Account Code’’ on page 3-20 ‘‘Require Account Codes’’ on page 3-42 xxxxxxxxx Forced Password Aging‘‘ Forced Password Aging and Administrable Logins’’ on page 3-47 xxx Free Call List‘‘ Free Call List’’ on page 3-16 xx Fully Restricted Service‘‘ Calling Party and Called Party Restrictions’’ on page 3-12 ‘‘Fully Restrict Service’’ on page 3-27 xxxxxxxxx Table I-1. Large Business Communications Systems Security Tools by Release — Feature See Section/Page S75 S85 G1 G2 G3V1 G3V2 G3V3 G3V4ECS R5 & later
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Security Tools by Release Page I-7 I INADS Port Access Restrictions‘‘Adding Customer Logins and Assigning Initial Password’’ on page D-13 xx List Call Forward Command‘‘ Class of Service’’ on page 3-14 xx Login ID Kill After “N” Attempts‘‘ Administering Login ID Kill After N Attempts’’ on page D-7 xxx Logoff Notification - Facility Test Call‘‘ Adding Customer Logins and Assigning Initial Password’’ on page D-13 xx Logoff Notification - Remote Access‘‘ Adding Customer Logins and Assigning Initial Password’’ on page D-13 xx Malicious Call Trace‘‘ Malicious Call Trace’’ on page 3-62 R2V4 xG3rxxxx Monitor Command‘‘ Monitor Trunks’’ on page 3-41 x x xxxx Monitor Security Violations Reports‘‘ Administering the Security Violations Reports’’ on page D-17 xxxx Night Service‘‘ Night Service’’ on page 3-8 xxxxxxxxx Permanently Disable Remote Access‘‘ Administering Barrier Code Aging’’ on page D-11 R1V3n G1V4n x x x x x Personal Station Access (PSA)‘‘ Personal Station Access (PSA)’’ on page 3-22 x Recall Signaling‘‘ Recall Signaling (Switchhook Flash)’’ on page 3-17 x x x xxxx Table I-1. Large Business Communications Systems Security Tools by Release — Feature See Section/Page S75 S85 G1 G2 G3V1 G3V2 G3V3 G3V4ECS R5 & later
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Security Tools by Release Page I-8 I Recent Change History Report‘‘Recent Change History Report (DEFINITY ECS and DEFINITY G1 and G3 only)’’ on page 3-61 x x xxxx Remote Access Authorization Code Dial Tone‘‘ Remote Access Dial Tone’’ on page 3-8 R1V3 x x xxxx Remote Access Kill After “N” Attempts‘‘ Administering Remote Access Kill After N Attempts’’ on page D-6 xxx Remote User Administration of Call Coverage‘‘ Remote User Administration of Call Coverage’’ on page 3-23 x Restrict Changes to Administration Objects‘‘ Require Passwords’’ on page 3-24 ‘‘Forced Password Aging and Administrable Logins’’ on page 3-47 xxxx Restricting Incoming Tie Trunks‘‘ Restricting Incoming Tie Trunks’’ on page 3-19 xx Restrictions; Individual and Group- Controlled‘‘ Restrictions — Individual and Group-Controlled (DEFINITY ECS, DEFINITY G1, G3, and System 75)’’ on page 3-18 x x x xxxx Security Violations Measurement Report‘‘ Security Violations Measurement Report’’ on page 3-56 xxxxxxxxx Table I-1. Large Business Communications Systems Security Tools by Release — Feature See Section/Page S75 S85 G1 G2 G3V1 G3V2 G3V3 G3V4ECS R5 & later
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Security Tools by Release Page I-9 I Security Violation Notification Feature‘‘Security Violation Notification Feature (DEFINITY ECS and DEFINITY G3 only)’’ on page 3-53 x xxxx Service Observing‘‘ Service Observing’’ on page 3-63 xxxxxxxxx Station Restrictions‘‘ Station Restrictions’’ on page 3-17 xxxxxxxxx Status Remote Access‘‘ Adding Customer Logins and Assigning Initial Password’’ on page D-13 xx SVN Referral Call With Announcements‘‘ Security Violation Notification Feature (DEFINITY ECS and DEFINITY G3 only)’’ on page 3-53 xxx Terminal Translation Initialization‘‘ Use Terminal Translation Initialization’’ on page 3-42 G3rxxxx Toll Analysis‘‘ Toll Analysis (G3 only)’’ on page 3-16 ‘‘Toll Analysis’’ on page 5-7 ‘‘Toll Analysis’’ on page 6-5 x xxxx Table I-1. Large Business Communications Systems Security Tools by Release — Feature See Section/Page S75 S85 G1 G2 G3V1 G3V2 G3V3 G3V4ECS R5 & later
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Security Tools by Release Page I-10 I Traffic Measurements and Performance‘‘Traffic Measurements and Performance’’ on page 3-49 ‘‘SAT, Manager I, and G3-MT Reporting’’ on page 5-13 ‘‘SAT, Manager I, and G3-MT Reporting’’ on page 6-10 xxxxxxxxx Trunk Administration‘‘ Trunk Administration’’ on page 3-8 xxxxxxxxx Trunk-to-Trunk Transfer‘‘ Disable Transfer Outgoing Trunk to Outgoing Trunk’’ on page 3-40 xxxxxxxxx Trunk-to-Trunk Transfer (all trunks) ‘‘ Disallow Trunk-to-Trunk Transfer’’ on page 3-39 xxx Void Customer Passwords‘‘ Require Passwords’’ on page 3-24 R1V2 R1V3x x xxxx World Class Routing‘‘ Known Toll Fraud Activity’’ on page 1-3 ‘‘World Class Routing (DEFINITY ECS and DEFINITY G2.2 and G3 only)’’ on page 3-20 ‘‘Use World Class Routing Restrictions (DEFINITY G2.2 and G3 only)’’ on page 3-44 G2.2 all except G3iV1xxxx Table I-1. Large Business Communications Systems Security Tools by Release — Feature See Section/Page S75 S85 G1 G2 G3V1 G3V2 G3V3 G3V4ECS R5 & later
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Page GL-1 Glossary GL Glossary A AAR Automatic Alternate Routing ACA Automatic Circuit Assurance ACD Automatic Call Distribution ADAP AUDIX Data Acquisition Package AFRL Alternate Facility Restriction Level AMIS Audio Messaging Interface Specification ANI Automatic Number Identification APLT Advanced Private Line Termination ARS Automatic Route Selection, replaced by WCR in DEFINITY G2.2 AUDIX Audio Information Exchange AVP AUDIX Voice Power Access The act of entering into a PBX system. Account Code A number (1 to 15 digits) that can be required when originating toll calls or WCR network calls. Adjunct Equipment that connects to a PBX port and interacts with the PBX system to provide a service, such as voice mail, automated attendant, and call traffic reporting. Administer Access or change the parameters associated with the services or features of the PBX system. Alternate Facility Restriction Level Sets time-dependent limits on access to routing patterns. AMIS Analog Networking An AUDIX Voice Mail System feature that connects the AUDIX Voice Mail System to other voice mail systems to exchange messages. Call Delivery is a service of AMIS Analog Networking.
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Glossary Page GL-2 ARS Dial Tone The dial tone callers hear after they enter the ARS feature access code. Attendant The operator of the console. Attendant Console An electronic call-handling position with push-button control. Used by attendants to answer and place calls and to manage and monitor some of the PBX operations. AUDIX Voice Mail System A Lucent Technologies adjunct that provides voice mail and automated attendant services. Authorization Code A security code used with Remote Access to prevent unauthorized access or egress. A dialed code that can raise the Facility Restriction Level or Class of Restriction (COR) of the trunk used to place an outgoing call. An authorization code can also be used in preference to or in combination with a barrier code to protect against unauthorized use of Remote Access trunks. Automated Attendant Adjunct equipment that performs the services of an attendant, such as directing calls to individuals or departments. Automatic Circuit Assurance Detects short and long holding times and visually notifies a designated station when corresponding thresholds are exceeded. B BCMS Basic Call Management System Barrier Code A security code used with the Remote Access feature to help prevent unauthorized access. Basic Call Transfer A type of transfer where the AUDIX Voice Mail System validates that the number of digits entered matches the length of extensions in the dial plan, and then transfers the call to the switch before disconnecting. BCMS Measurements Reports traffic patterns for measured trunk groups. C CAS Centralized Attendant Service, Call Accounting System CDR Call Detail Recording
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Glossary Page GL-3 Call Forwarding A set of features that allow calls destined for an extension to be redirected to another extension, designated during activation. Call Forwarding All Calls (Follow Me) A feature that allows calls destined for an extension to be redirected to another extension, designated during activation, regardless of the busy or idle state of the called extension. Intended to redirect calls to the called party when he or she is away from his or her desk. Call Forwarding (Off Net) A function of the Call Forwarding Follow Me feature that allows a user to forward all calls to a telephone in the public network. Call Forward Off/On-Net A function of the Call Forwarding Follow Me feature that allows a user to call forward outside the switch (Off-Net), or inside AND outside the switch to non-toll locations (Off/On-Net). CMS Call Management System CO Central Office COR Class of Restriction COS Class of Service CSM Centralized System Management Call Detail Recording Records call information when specified trunk groups are used for the call. Called Party Restrictions The calling privileges or restrictions that can be placed on the receiving station or trunk. Calling Party Restrictions The calling privileges or restrictions that can be placed on the originating station or trunk. Call Management System An adjunct processor that collects data from an ACD and generates reports to be stored or displayed regarding status of agents, splits, and trunks. Call Vector A set of commands to be performed for an incoming or internal call. See Call Vectoring. Call Vectoring Directs incoming and internal calls to various destinations: on- or off-premises destinations, a hunt group or split, or a specific call treatment, such as an announcement, forced disconnect, forced busy, or delay treatment. Calls access these destinations, or vectors, through Vector Directory Numbers (VDNs). Central Office The location housing the telephone switching equipment that provides local telephone service and access to toll facilities for long-distance calls.
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Glossary Page GL-4 Class of Restriction A number (0 through 63) that specifies the calling privileges and limitations assigned to stations, Remote Access users, and trunk groups. For DEFINITY G3rV1, G3i-Global, and G3V2 and later, CORs have been increased to 96; thus, the number is 0 through 95. Class of Service For DEFINITY G2 and System 85, specifies the calling privileges and limitations assigned to the station. For DEFINITY ECS, DEFINITY G1, G3, and System 75, a number (0 through 15) that specifies if users can activate Automatic Callback, Call Forwarding, Console Permissions, Data Privacy, and Priority Calling features. For G3V2 and later, also specifies additional COR feature restrictions. CMS Measurements Measures traffic patterns and time on calls to compare them with preset traffic counts and time limit thresholds. Coverage Path The order in which calls are redirected to alternate answering positions. Customer Premises Equipment-Based System A customer’s PBX, voice mail, or voice processing system. D DAC Dial Access Code (see Trunk Access Code) DCS Distributed Communications System DDD Direct Distance Dialing DID Direct Inward Dialing DISA Direct Inward System Access Digit Conversion A process used to convert specific dialed numbers into other dialed numbers. Direct Inward Dialing Allows an incoming call from the public network (not FX or WATS) to reach a specific telephone without attendant assistance. DID calls to DID-restricted telephone lines are routed to an attendant or recorded announcement, depending on the option selected. E EPSCS Enhanced Private Switched Communications Service