Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook Instructions Manual

Lucent Technologies BCS Products Security Handbook Instructions Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies BCS Products Security Handbook Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Glossary 
    Page GL-5  
    ETN
    Electronic Tandem Network
    Enhanced Call Transfer
    An AUDIX Voice Mail System feature that provides security by interacting with the PBX system to 
    validate that the number entered by an AUDIX Voice Mail System caller is a valid extension number 
    in the dial plan.
    Enhanced Private Switched Communications Service
    A private telecommunications network that provides advanced voice and data telecommunications 
    services to companies with many locations.
    Electronic Tandem Network
    A tandem tie trunk network that has automatic call routing capabilities based on the number dialed 
    and the most preferred route available at the time the call is placed. Each switch in the network is 
    assigned a unique private network office code (RNX), and each voice terminal is assigned a unique 
    extension number.
    Extended User Administration of Redirected Calls
    Feature that allows station users to select one of two previously administered call coverage paths 
    assigned to them (for example, a work location coverage path or a remote work location coverage 
    path) from any on-site extension or from a remote location (for example, home). Also provided is 
    the ability to activate, change, or deactivate Call Forward Add or Call Forward Busy/Don’t Answer 
    from any on-site extension or from a remote location.
    F
    FAC
    Feature Access Code; Facility Access Code
    FEAC
    Forced Entry of Account Code
    FNPA
    Foreign Numbering-Plan Area
    FRL
    Facility Restriction Level
    FX
    Foreign Exchange
    Facility Access Code
    The code required to access outgoing facilities (trunks).
    Facility Restriction Level
    Identifies where AAR/ARS/WCR calls can be made and what facilities can be used. FRLs range 
    from 0 to 7 with the lower numbers being the most restrictive. In an ETN environment, it is passed 
    along with the call as a Traveling Class Mark.
    Facility Test Call
    Allows a local voice terminal user or an INADS voice terminal user to call a trunk, touch-tone 
    receiver, time slot or system tone to see if the facility is working properly.
    Feature
    A specifically defined function or service provided by the PBX system. 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Glossary 
    Page GL-6  
    Feature Access Code
    A code used to access a feature, such as ARS, Data Origination, Priority Calling and Call Pickup.
    Foreign Exchange
    A Central Office other than the one providing local access to the public telephone network.
    Foreign Numbering-Plan Area Code
    An area code other than the local area code. The FNPAC must be dialed to call outside the local 
    geographic area.
    Fully Restricted
    A feature that denies outgoing calls, including dial access to trunks, and allows no incoming calls 
    from Public Network trunks.
    G
    G3-MA
    Generic 3 Management Application
    G3-MT
    Generic 3 Management Terminal
    H
    Hacker
    A criminal who attempts to penetrate PBX systems to gain unauthorized access to their features.
    I
    ICC
    Interexchange Carrier Code
    INADS
    Initialization and Administration System
    INPA
    Improved Numbering Plan Address
    IXC
    Interexchange Carrier
    Intercept Tone
    An alternating high and low tone; indicates a dialing error or denial of the service requested.
    Invalid Attempt
    A single invalid Remote Access (barrier code), authorization code, or login access attempt. 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Glossary 
    Page GL-7  
    L
    LEC
    Local Exchange Carrier
    M
    Manual Terminating Restriction
    Prevents the station from receiving calls other than those originated by the attendant.
    MERLIN Attendant
    A Lucent Technologies adjunct that provides voice mail and automated attendant services for use 
    with the MERLIN LEGEND Communications System and MERLIN II Communications System R3.
    Message Indicator Lamp
    The light on a voice terminal that is activated by the attendant or a voice mail adjunct when there is 
    a message for the user.
    Miscellaneous Restrictions
    Restricts certain CORs from calling other CORs.
    Miscellaneous Trunk Restrictions
    Restricts certain stations from calling certain trunk groups.
    N
    NETCON
    Network Control (port) data channel
    NMS
    Network Management System
    NPA
    Numbering Plan Area
    NSAC
    National Service Assistance Center
    Night Service
    Provides different coverage paths for stations after business hours.
    O
    OTTOTT
    Outgoing Trunk to Outgoing Trunk Transfer 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Glossary 
    Page GL-8  
    Outcalling
    An AUDIX Voice Mail System feature that alerts designated subscribers when a voice mail 
    message is delivered to their voice mailbox.
    Outgoing Trunk to Outgoing Trunk Transfer
    Allows a controlling party, such as a station user or attendant, to initiate two or more outgoing trunk 
    calls and then transfer the trunks together. The transfer removes the controlling party from the 
    connection and conferences the outgoing trunks. Alternatively, the controlling party can establish a 
    conference call with the outgoing trunks and then drop out of the conference, leaving only the 
    outgoing trunks on the conference connection.
    Outward Restricted
    Restricts the station from placing outgoing calls over specified trunks.
    P
    PARTNER Attendant
    A Lucent Technologies adjunct that provides voice mail and automated attendant services for use 
    with the PARTNER II Communications System.
    PBX
    Private Branch Exchange
    PC
    Personal Computer
    Personal Station Access (PSA)
    A feature that allows multiple users to work at the same voice terminal location at different times. 
    PSA provides capabilities that are similar to TTI, but for a single station.
    PGN
    Partitioned Group Number
    PNA
    Private Network Access
    Private Network
    A network used exclusively for handling the telecommunications needs of a particular customer.
    Private Network Office Code (RNX)
    The first three digits of a 7-digit private network number. These codes are numbered 220 through 
    999, excluding any codes that have 0 or 1 as the second digit.
    Public Network
    The network that can be openly accessed by all customers for local or long-distance calling.
    R
    RAU
    Remote Administration Unit
    RNX
    Route Number Index (See 
    Private Network Office Code) 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Glossary 
    Page GL-9  
    RHNPA
    Remote Home Numbering Plan Area
    RPSD
    Remote Port Security Device
    Random Number Generators
    Devices frequently used by hackers to decipher passwords and access codes.
    Redirect
    A feature that sends an incoming call to another station for coverage.
    Referral Call
    An internally-generated call that terminates to a designated destination and indicates an event such 
    as a security violation.
    Remote Access
    A feature that provides remote callers access to most of the PBX features.
    Remote Access Dial Tone
    A special dial tone for the Remote Access feature that can be used after the caller enters the barrier 
    code.
    Remote Home Numbering Plan Area Code
    A foreign numbering-plan area code that is treated as a home area code by the Automatic Route 
    Selection (ARS) feature. Calls can be allowed or denied based on the area code and the dialed 
    Central Office (CO) code rather than just the area code. If the call is allowed, the ARS pattern used 
    for the call is determined by these six digits.
    Remote Port Security Device
    A Lucent Technologies product that helps protect administration and maintenance ports from 
    unauthorized access.
    Remote User Administration of Call Coverage
    A feature that allows calls that are forwarded off of the network to be tracked for busy or no-answer 
    conditions and to be brought back for further call coverage processing in such cases.
    S
    SAT
    System Administrator Tool; System Administration Terminal
    SDN
    Software Defined Network
    SMDR
    Station Message Detail Recording
    SPM
    System Programming and Maintenance
    SVN
    Security Violations Notification 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Glossary 
    Page GL-10  
    Security Violation
    An event that occurs when the number of invalid access attempts (login, Remote Access, or 
    authorization code) exceeds the customer-administered threshold of the number of invalid access 
    attempts permitted within a specified time interval. 
    Security Violations Measurement Report 
    Monitors Remote Access and administration ports for invalid login attempts and attempts to enter 
    invalid barrier codes.
    Security Violations Notification Feature
    Detects attempts to enter barrier codes or authorization codes, as well as attempts to log in to 
    Remote Access or administration ports. Alerts a designated station of threshold violations.
    Service Observing
    The monitoring of actual calls in progress for security purposes.
    Station Message Detail Recording
    Creates call records for incoming and outgoing calls.
    System Manager
    A person responsible for specifying and administering features and services for the PBX system.
    T
    TAC
    Trunk Access Code
    TCM
    Traveling Class Mark
     TSC
    Technical Service Center
    TTI
    Terminal Translation Initialization
    Tandem Tie Trunk Network
    A private network that interconnects several customer switching systems by dial repeating tie 
    trunks. Access to the various systems is dictated by the codes that are individually dialed for each 
    system.
    Telecommunications Fraud
    The unauthorized use of a company’s telecommunications system. Also called any of the following: 
    telephone abuse, toll fraud, phone fraud, call fraud.
    Tie Trunk
    A telecommunications channel that directly connects two private switching systems.
    Toll Analysis
    Specifies the routing of toll calls, including numbers to be assigned to the Restricted Call List and 
    the Unrestricted Call List.
    Toll Restriction
    Prevents the user from making toll calls unless the number is specified on an Unrestricted Call List. 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Glossary 
    Page GL-11  
    Trunk Group
    Telecommunications channels assigned as a group for certain functions that can be used 
    interchangeably between two communications systems or Central Offices.
    Trunk Access Code
    A digit assignment assigned during trunk administration that identifies the trunk.
    U
    UCL
    Unrestricted Call List
    UDP
    Uniform Dial Plan
    Uniform Dial Plan
    A feature that allows a unique 4- or 5-digit number assignment for each terminal in a multi-switch 
    configuration such as a distributed communications system (DCS) or main-satellite tributary 
    configuration.
    V
    VDN
    Vector Directory Number
    VF
    Virtual Facility
    VNI
    Virtual Nodepoint Identifier
    Vector Directory Number
    An extension that provides access to the Call Vectoring feature on the switch. Call vectoring allows 
    a customer to specify the treatment of incoming calls based on the dialed number.
    Virtual Facility
    A call routing facility not defined by the physical facility (trunk) over which calls are routed.
    Voice Terminal
    A single-line or multi-appearance telephone.
    W
    War Dialer
    Slang. A device used by hackers that randomly dials telephone numbers (generally 800 numbers) 
    until a modem or dial tone is obtained.
    WATS
    Wide Area Telecommunications Service 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Glossary 
    Page GL-12  
    WCR
    World Class Routing
    Wide Area Telecommunications Service
    A service that allows calls to a certain area or areas for a flat-rate charge based on expected usage.
    World Class Routing
    For DEFINITY ECS and DEFINITY G2.2 and G3, provides flexible network numbering plans. 
    						
    							Index 
    Page IN-1  
    BCS Products
    Security Handbook  
    555-025-600   Issue 6
    December 1997
    IN
    Index
    Numerics
    0 calls,3-21, 3-5000 c alls,3-21
    01 c alls,3-31blocking,B-14010 c alls,3-31
    011 c alls,3-31, 3-50blocking,B-1410xxx calls,1-7, 3-21
    10xxx01 c alls,3-3110xxx11 c alls,3-31
    2-way trunk g roup s,3-133-way COR c hec k,3-14, 3-453-way-c onferencing,5-33
    6-d ig it screening,1-8800 numb ers,1-6, 2-2, 3-2, F- 1800 servic e,5-48, 5-50
    trunks,2-2911 numb er,3-13950 numb ers,1-7
    976-look-alike numb ers,1-8
    A
    AAR, see Automatic  Alternate Routing
    AAR/ARS
    analysis
    ,3-17Feature Acc ess Cod e,3-8
    Abbreviated Dialing
    Feature Acc ess Cod e,3-8ab use
    internal
    ,1-8, 2-7ac cess
    administration and  maintenance,2-4
    ac count cod e,5-50, 5-52CDR,3-15und efined,3-49, 4-17, 4-20
    ADAP, see AUDIX Data Acq uisition Pac kag e
    add/change login command,D-7ad junct
    c hanging d efault p assword
    ,2-4sec urity,2-6ad ministrab le log ins,3-47
    ad ministration and maintenanc e acc ess,2-4ad ministration p ort,3-50Ad vanced  Private Line Termination,3-13
    Off-Net,3-14after-hours c alling
    p reventing,3-29
    restric ting,3-16 
    						
    							BCS Products
    Security Handbook  
    555-025-600    Issue 6
    December 1997
    Index 
    Page IN-2  
    alarm
    ACA,3-51
    long  hold ing  time,6-11send ing  to attend ant,3-52alternate carrier ac c ess,1-6
    Alternate Fac ility Restric tion Level,3-16p reventing  after-hours c alling,3-29AMIS Networking,5-24
    ANI, see Automatic  Number Identific ation
    area c od es
    restric ting  calls
    ,6-6
    ARS Measurement Selec tion,3-51, 5-14, 6-10ARS, see Automatic Route Selec tion
    attend ant
    c all routing
    ,3-27, 3-45, A-2CAS
    call routing,3-27
    reporting  susp icious c alls,2-8, 3-46
    send ing  alarms/rep orts,6-12transferring,3-27attend ant console,3-64, 5-26, 6-12, 6-17
    Facility Restriction Level,3-28, 5-8physical security,2-9attend ant control
    activating
    ,3-36Remote Access calls,3-34sp ec ific extensions,3-34
    trunk group access,3-36Aud io Messag e Interc hang e Sp ec ific ation,5-24AUDIX Data Acq uisition Packag e,xx, 5-18, 6-13
    A U D I X Voi c e Ma i l Sys t em
    Call Detail Record ing,5-18, 6-13disabling transfer out,5-26
    log ins,5-21password
    chang ing,E- 1
    p rotec ting,5-20
    p rotecting the system,5-15security checklist,H-5sec urity c onsid erations,5-21
    session termination values,5-18A U D I X Voi c e Pow e r  Sys te m,5-37automated  attend ant,5-4, 6-16, 6-17, 6-19, 6-21
    limiting  outb ound  transfers,5-30, 5-55Lod g ing,5-4password
    chang ing
    ,E- 1
    p rotec ting,5-37, 5-53
    p rotecting,5-28, 5-37sec urity c hec klists,H-7
    sec urity measures,5-38, 5-54sec urity tip s,5-29, 5-37, 5-53traffic reports,5-28
    Transfer Only to System Sub scrib ers,5-30, 5-54 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies BCS Products Security Handbook Instructions Manual