Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook Instructions Manual
Lucent Technologies BCS Products Security Handbook Instructions Manual
Have a look at the manual Lucent Technologies BCS Products Security Handbook Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Glossary Page GL-5 ETN Electronic Tandem Network Enhanced Call Transfer An AUDIX Voice Mail System feature that provides security by interacting with the PBX system to validate that the number entered by an AUDIX Voice Mail System caller is a valid extension number in the dial plan. Enhanced Private Switched Communications Service A private telecommunications network that provides advanced voice and data telecommunications services to companies with many locations. Electronic Tandem Network A tandem tie trunk network that has automatic call routing capabilities based on the number dialed and the most preferred route available at the time the call is placed. Each switch in the network is assigned a unique private network office code (RNX), and each voice terminal is assigned a unique extension number. Extended User Administration of Redirected Calls Feature that allows station users to select one of two previously administered call coverage paths assigned to them (for example, a work location coverage path or a remote work location coverage path) from any on-site extension or from a remote location (for example, home). Also provided is the ability to activate, change, or deactivate Call Forward Add or Call Forward Busy/Don’t Answer from any on-site extension or from a remote location. F FAC Feature Access Code; Facility Access Code FEAC Forced Entry of Account Code FNPA Foreign Numbering-Plan Area FRL Facility Restriction Level FX Foreign Exchange Facility Access Code The code required to access outgoing facilities (trunks). Facility Restriction Level Identifies where AAR/ARS/WCR calls can be made and what facilities can be used. FRLs range from 0 to 7 with the lower numbers being the most restrictive. In an ETN environment, it is passed along with the call as a Traveling Class Mark. Facility Test Call Allows a local voice terminal user or an INADS voice terminal user to call a trunk, touch-tone receiver, time slot or system tone to see if the facility is working properly. Feature A specifically defined function or service provided by the PBX system.
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Glossary Page GL-6 Feature Access Code A code used to access a feature, such as ARS, Data Origination, Priority Calling and Call Pickup. Foreign Exchange A Central Office other than the one providing local access to the public telephone network. Foreign Numbering-Plan Area Code An area code other than the local area code. The FNPAC must be dialed to call outside the local geographic area. Fully Restricted A feature that denies outgoing calls, including dial access to trunks, and allows no incoming calls from Public Network trunks. G G3-MA Generic 3 Management Application G3-MT Generic 3 Management Terminal H Hacker A criminal who attempts to penetrate PBX systems to gain unauthorized access to their features. I ICC Interexchange Carrier Code INADS Initialization and Administration System INPA Improved Numbering Plan Address IXC Interexchange Carrier Intercept Tone An alternating high and low tone; indicates a dialing error or denial of the service requested. Invalid Attempt A single invalid Remote Access (barrier code), authorization code, or login access attempt.
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Glossary Page GL-7 L LEC Local Exchange Carrier M Manual Terminating Restriction Prevents the station from receiving calls other than those originated by the attendant. MERLIN Attendant A Lucent Technologies adjunct that provides voice mail and automated attendant services for use with the MERLIN LEGEND Communications System and MERLIN II Communications System R3. Message Indicator Lamp The light on a voice terminal that is activated by the attendant or a voice mail adjunct when there is a message for the user. Miscellaneous Restrictions Restricts certain CORs from calling other CORs. Miscellaneous Trunk Restrictions Restricts certain stations from calling certain trunk groups. N NETCON Network Control (port) data channel NMS Network Management System NPA Numbering Plan Area NSAC National Service Assistance Center Night Service Provides different coverage paths for stations after business hours. O OTTOTT Outgoing Trunk to Outgoing Trunk Transfer
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Glossary Page GL-8 Outcalling An AUDIX Voice Mail System feature that alerts designated subscribers when a voice mail message is delivered to their voice mailbox. Outgoing Trunk to Outgoing Trunk Transfer Allows a controlling party, such as a station user or attendant, to initiate two or more outgoing trunk calls and then transfer the trunks together. The transfer removes the controlling party from the connection and conferences the outgoing trunks. Alternatively, the controlling party can establish a conference call with the outgoing trunks and then drop out of the conference, leaving only the outgoing trunks on the conference connection. Outward Restricted Restricts the station from placing outgoing calls over specified trunks. P PARTNER Attendant A Lucent Technologies adjunct that provides voice mail and automated attendant services for use with the PARTNER II Communications System. PBX Private Branch Exchange PC Personal Computer Personal Station Access (PSA) A feature that allows multiple users to work at the same voice terminal location at different times. PSA provides capabilities that are similar to TTI, but for a single station. PGN Partitioned Group Number PNA Private Network Access Private Network A network used exclusively for handling the telecommunications needs of a particular customer. Private Network Office Code (RNX) The first three digits of a 7-digit private network number. These codes are numbered 220 through 999, excluding any codes that have 0 or 1 as the second digit. Public Network The network that can be openly accessed by all customers for local or long-distance calling. R RAU Remote Administration Unit RNX Route Number Index (See Private Network Office Code)
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Glossary Page GL-9 RHNPA Remote Home Numbering Plan Area RPSD Remote Port Security Device Random Number Generators Devices frequently used by hackers to decipher passwords and access codes. Redirect A feature that sends an incoming call to another station for coverage. Referral Call An internally-generated call that terminates to a designated destination and indicates an event such as a security violation. Remote Access A feature that provides remote callers access to most of the PBX features. Remote Access Dial Tone A special dial tone for the Remote Access feature that can be used after the caller enters the barrier code. Remote Home Numbering Plan Area Code A foreign numbering-plan area code that is treated as a home area code by the Automatic Route Selection (ARS) feature. Calls can be allowed or denied based on the area code and the dialed Central Office (CO) code rather than just the area code. If the call is allowed, the ARS pattern used for the call is determined by these six digits. Remote Port Security Device A Lucent Technologies product that helps protect administration and maintenance ports from unauthorized access. Remote User Administration of Call Coverage A feature that allows calls that are forwarded off of the network to be tracked for busy or no-answer conditions and to be brought back for further call coverage processing in such cases. S SAT System Administrator Tool; System Administration Terminal SDN Software Defined Network SMDR Station Message Detail Recording SPM System Programming and Maintenance SVN Security Violations Notification
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Glossary Page GL-10 Security Violation An event that occurs when the number of invalid access attempts (login, Remote Access, or authorization code) exceeds the customer-administered threshold of the number of invalid access attempts permitted within a specified time interval. Security Violations Measurement Report Monitors Remote Access and administration ports for invalid login attempts and attempts to enter invalid barrier codes. Security Violations Notification Feature Detects attempts to enter barrier codes or authorization codes, as well as attempts to log in to Remote Access or administration ports. Alerts a designated station of threshold violations. Service Observing The monitoring of actual calls in progress for security purposes. Station Message Detail Recording Creates call records for incoming and outgoing calls. System Manager A person responsible for specifying and administering features and services for the PBX system. T TAC Trunk Access Code TCM Traveling Class Mark TSC Technical Service Center TTI Terminal Translation Initialization Tandem Tie Trunk Network A private network that interconnects several customer switching systems by dial repeating tie trunks. Access to the various systems is dictated by the codes that are individually dialed for each system. Telecommunications Fraud The unauthorized use of a company’s telecommunications system. Also called any of the following: telephone abuse, toll fraud, phone fraud, call fraud. Tie Trunk A telecommunications channel that directly connects two private switching systems. Toll Analysis Specifies the routing of toll calls, including numbers to be assigned to the Restricted Call List and the Unrestricted Call List. Toll Restriction Prevents the user from making toll calls unless the number is specified on an Unrestricted Call List.
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Glossary Page GL-11 Trunk Group Telecommunications channels assigned as a group for certain functions that can be used interchangeably between two communications systems or Central Offices. Trunk Access Code A digit assignment assigned during trunk administration that identifies the trunk. U UCL Unrestricted Call List UDP Uniform Dial Plan Uniform Dial Plan A feature that allows a unique 4- or 5-digit number assignment for each terminal in a multi-switch configuration such as a distributed communications system (DCS) or main-satellite tributary configuration. V VDN Vector Directory Number VF Virtual Facility VNI Virtual Nodepoint Identifier Vector Directory Number An extension that provides access to the Call Vectoring feature on the switch. Call vectoring allows a customer to specify the treatment of incoming calls based on the dialed number. Virtual Facility A call routing facility not defined by the physical facility (trunk) over which calls are routed. Voice Terminal A single-line or multi-appearance telephone. W War Dialer Slang. A device used by hackers that randomly dials telephone numbers (generally 800 numbers) until a modem or dial tone is obtained. WATS Wide Area Telecommunications Service
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Glossary Page GL-12 WCR World Class Routing Wide Area Telecommunications Service A service that allows calls to a certain area or areas for a flat-rate charge based on expected usage. World Class Routing For DEFINITY ECS and DEFINITY G2.2 and G3, provides flexible network numbering plans.
Index Page IN-1 BCS Products Security Handbook 555-025-600 Issue 6 December 1997 IN Index Numerics 0 calls,3-21, 3-5000 c alls,3-21 01 c alls,3-31blocking,B-14010 c alls,3-31 011 c alls,3-31, 3-50blocking,B-1410xxx calls,1-7, 3-21 10xxx01 c alls,3-3110xxx11 c alls,3-31 2-way trunk g roup s,3-133-way COR c hec k,3-14, 3-453-way-c onferencing,5-33 6-d ig it screening,1-8800 numb ers,1-6, 2-2, 3-2, F- 1800 servic e,5-48, 5-50 trunks,2-2911 numb er,3-13950 numb ers,1-7 976-look-alike numb ers,1-8 A AAR, see Automatic Alternate Routing AAR/ARS analysis ,3-17Feature Acc ess Cod e,3-8 Abbreviated Dialing Feature Acc ess Cod e,3-8ab use internal ,1-8, 2-7ac cess administration and maintenance,2-4 ac count cod e,5-50, 5-52CDR,3-15und efined,3-49, 4-17, 4-20 ADAP, see AUDIX Data Acq uisition Pac kag e add/change login command,D-7ad junct c hanging d efault p assword ,2-4sec urity,2-6ad ministrab le log ins,3-47 ad ministration and maintenanc e acc ess,2-4ad ministration p ort,3-50Ad vanced Private Line Termination,3-13 Off-Net,3-14after-hours c alling p reventing,3-29 restric ting,3-16
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Index Page IN-2 alarm ACA,3-51 long hold ing time,6-11send ing to attend ant,3-52alternate carrier ac c ess,1-6 Alternate Fac ility Restric tion Level,3-16p reventing after-hours c alling,3-29AMIS Networking,5-24 ANI, see Automatic Number Identific ation area c od es restric ting calls ,6-6 ARS Measurement Selec tion,3-51, 5-14, 6-10ARS, see Automatic Route Selec tion attend ant c all routing ,3-27, 3-45, A-2CAS call routing,3-27 reporting susp icious c alls,2-8, 3-46 send ing alarms/rep orts,6-12transferring,3-27attend ant console,3-64, 5-26, 6-12, 6-17 Facility Restriction Level,3-28, 5-8physical security,2-9attend ant control activating ,3-36Remote Access calls,3-34sp ec ific extensions,3-34 trunk group access,3-36Aud io Messag e Interc hang e Sp ec ific ation,5-24AUDIX Data Acq uisition Packag e,xx, 5-18, 6-13 A U D I X Voi c e Ma i l Sys t em Call Detail Record ing,5-18, 6-13disabling transfer out,5-26 log ins,5-21password chang ing,E- 1 p rotec ting,5-20 p rotecting the system,5-15security checklist,H-5sec urity c onsid erations,5-21 session termination values,5-18A U D I X Voi c e Pow e r Sys te m,5-37automated attend ant,5-4, 6-16, 6-17, 6-19, 6-21 limiting outb ound transfers,5-30, 5-55Lod g ing,5-4password chang ing ,E- 1 p rotec ting,5-37, 5-53 p rotecting,5-28, 5-37sec urity c hec klists,H-7 sec urity measures,5-38, 5-54sec urity tip s,5-29, 5-37, 5-53traffic reports,5-28 Transfer Only to System Sub scrib ers,5-30, 5-54