Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook Instructions Manual
Lucent Technologies BCS Products Security Handbook Instructions Manual
Have a look at the manual Lucent Technologies BCS Products Security Handbook Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Index Page IN-13 P Partitioned Group Numb er,C-1PA RTN ER A t t e nd a nt,6-20 PARTNER II Communic ations System p rotecting the system,4-18sec urity c hec klists,H-53 sec urity g oals and tools,2-16voic e mail,5-48PA RTN ER M A IL Sys te m,5-48, 5-50 automated attend ant,6-20outc alling,5-50, 5-52password chang ing ,E- 8 p rotec ting,5-48, 5-51 p rotecting,5-48 security checklist,H-56sec urity tip s,5-48, 5-51PA RTN ER M A IL VS Sys t em,5-48, 5-50 automated attend ant,6-20password chang ing,E- 8 p rotec ting,5-48, 5-51 p rotecting,5-48security checklist,H-56sec urity tip s,5-48, 5-51 PA RTN ER Pl us C om mu ni c at i on s Sy st em p rotecting the system,4-18sec urity c hec klists,H-53 sec urity g oals and tools,2-16voic e mail,5-50Passag eWay Telep hony Servic es sec urity tip s ,7-5Pa ss w or d sec urity for ad ministrator p assword s,5-16 passwords adjunc t,5-3aging,3-48 c hoosing,2-5d efault,1-4forc ed ag ing,3-47 g eneral security measures,2-8p rog rams to crac k,1-2, 2-2p rotecting,2-7 storing,2-6PB X acc essing,1-5 toll fraud,2-1peg counts,3-50, 6-10hig h,3-49 Personal Id entific ation Numb er,F-2Personal Station Ac c ess,3-22, H-18Personal Station Ac c ess (PSA),3-22 PGN, see Partitioned Group Numb er PIN, see Personal Id entific ation Numb er PNA, see Private Network Ac c ess
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Index Page IN-14 ports administration,3-50, 3-56 automated attend ant,6-3INADS,3-47maintenance,3-56 MERLIN LEGEND Communic ations System,4-8MERLIN MAIL Voic e Messag ing System,5-33outward restricted,5-7 PA RTN ER MA I L Sy st e m,5-50PA RTN ER MA I L VS Sys te m,5-50PB X,5-5 Re mo te A c c e ss,3-54, 3-56sec urity,2-3, 2-6System Management,3-54 tip /ring,4-19treated as station,5-5TTI,3-42 usag e d ata,6-12used as station,6-2 voic e,5-27voic e mail,5-5Voic e Mail Integ rated,4-8 Private Network Ac c ess,3-21p roduc t sec urity c hec klists,H-1 R random numb er g enerators,1-2, 2-2rec all sig naling,3-17Rec ent Change History Rep ort,3-61 referral c all SVN,3-53Remote Ac c ess,1-1, 1-4, 1-5, 2-2 800 numb ers,3-2attendant c ontrol of c alls,3-34Barrier Cod e Ag ing,3-61 DEFINITY Communications System,2-2d ial tone,3-38dialing in 800 service trunks ,2-2CO trunks,2-2FX trunks,2-2disabled during business hours,3-34disabling,3-3, C-3 invalid log in attempts,3-58kill,D-6MERLIN II Communic ations System,4-7 MERLIN LEGEND Communic ations System,4-13MERLIN Plus Communic ations System,4-16permanently disabling,D-12 removing,3-3setting up,C-1St at u s Re p o r t,3-58 status rep ort,3-58System 25,4-19System 75,3-2 System 85,3-2Violations Status Rep ort,3-59
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Index Page IN-15 Remote Ad ministration Unit,2-16, 4-18Remote Call Forward ing,4-16, 4-17 used with loop -start trunks,4-16Remote Home Numb ering Plan Area,3-34Remote Line Acc ess,4-16 Remote Maintenanc e Board,5-31Remote Maintenanc e Devic e,4-19Remote Port Security Devic e,G-1 remote servic e ob serving,3-63Remote System Administration System 25,4-20 Remote System Prog ramming,4-15Remote User Ad ministration of Call Coverag e,3-23rep orts Authorization Code Violations Status ,3-58Call Acc ounting System,4-7, 4-14, 4-17, 4-20, 5-33, 5-34, 5-45, 5-48, 5-51c all traffic,5-13, 6-9, 6-12 distributed,2-9G3-MT,3-50, 6-10 Manag er I,3-50, 6-10Recent Chang e History,3-61Remote Ac c ess status,3-58 SA T,3-50, 6-10sec uring,2-9Sec urity Measurement,3-47 Sec u r it y Vi ol a ti o ns,D-17Sec urity Violations Measurement,3-54Sec urity Violations Status,3-54 send ing to attend ant,3-52SMD R,4-14, 4-17, 4-20, 5-12, 5-33, 5-34, 5-45, 5-48, 5-51, 5-53traffic,6-13 trunk g roup,5-13, 6-10, 6-12Restriction Overrid e,3-45restrictions calling party and called party ,3-13ind ivid ual and g roup -controlled,3-18orig inating station,3-13 orig inating trunk,3-13switc h translation,5-28, 5-33RHNPA, see Remote Home Numb ering Plan Area RMB, see Remote Maintenanc e Board routing p atterns ,3-51 Tim e o f Da y,3-21, 3-53RPSD, see Remote Port Sec urity Devic e S SAT, see System Ad ministrator Tool screening 6-dig it ,1-8sec uring the INADS p ort,3-47 Se c u r i ty administrator p assword s,5-16e-mail,5-15 IMAPI password,5-15trusted server,5-15virus transmission via e-mail,5-17
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Index Page IN-16 Se c u r i ty A ud i t Se r vi c e,G-3security checklist AUDIX Voice Mail System ,H-5security checklists A U D I X Vo i c e Po w e r Sy s t e m,H-7 BasicWorks,H-9Bay Networks,H-28Conferenc e Reservation and Control System,H-43 C ON VERSA N T Vo ic e I n f or m at i on Syst e m,H-13D EFI N I TY A U D IX Voi c e Me s sa g i n g Sy st em,H-5DEFINITY Communications System G1,H-15 DEFINITY Communications System G2,H-21DEFINITY Communications System G3,H-15DEFINITY ECS,H-15 DIMENSION PBX System,H-25INTUITY AUDIX Voic e Messag ing System,H-5MERLIN II Communic ations System,H-29 MERLIN LEGEND Communic ations System,H-31MERLIN MAIL R3 Voice Messag ing System,H-38 MERLIN MAIL Voic e Messag ing System,H-34MERLIN MAIL-ML Voic e Messag ing System,H-36MERLIN Plus Communic ations System,H-41 Multimed ia Communic ations Exc hang e Server,H-42Multip oint Conferenc ing Unit,H-43PA RTN ER MA I L VS Sys te m,H-56 PARTNER Plus Communications System,H-53System 75,H-15System 85,H-21 Security Measurement rep orts,3-47sec urity risks port,2-3 Sec urity Tools for Outg oing Calls,3-11Sec urity Tools for Remote Ac c ess,3-4Security Violation Notific ation feature,3-53 referral c all,3-53Security Violations measurement rep ort,3-54, 3-56 report,D-17status rep ort,3-54Security Violations Detail Rep ort,3-57 Security Violations Summary Report,3-56send ing overlap ped,3-45 servic e ob serving,3-63should er surfing,1-6six-d ig it screening,1-8 SMD R reports,4-7, 4-14, 4-17, 4-20, 5-33, 5-34, 5-45, 5-48, 5-51, 5-53SMDR, see Station Messag e Detail Rec ord ing soc ial eng ineering ,1-6SPM, see System Prog ramming and Maintenance Station Message Detail Record ing,1-4, 3-43, 3-48, 5-11, 5-42, 6-8, F- 1 station restric tions,3-17St a ti o n Se c u r it y C od e Vi ol a t io ns Rep o r t,3-60Station Security Violation Status Rep ort,3-58 Station-to-Trunk Restric tions,5-6, 6-3status remote acc ess c ommand,3-10SVN, see Security Violation Notific ation feature
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Index Page IN-17 switc h d ial tone,3-38 translation restrictions,5-28, 5-33switc hhook flash administering,3-18 System 25 password chang ing ,E- 9 p rotecting Remote Ac cess,4-19p rotecting the system,4-19 sec urity g oals and tools,2-13voic e mail,5-52System 75 automated attend ant ,6-1d etec ting toll fraud,3-45password chang ing ,E- 9 Re mo te A c c e ss,3-3restric ting unauthorized outg oing c alls,3-11sec urity c hec klists,H-15 sec urity g oals and tools,2-10sec urity measures,3-24sec urity tip s,3-2 voic e mail,5-4System 85 automated attend ant,6-1 d etec ting toll fraud,3-45password chang ing,E- 1 0 Re mo te A c c e ss,3-3restric ting unauthorized outg oing c alls,3-11 sec urity c hec klists,H-21sec urity g oals and tools,2-10sec urity measures,3-24 voic e mail,5-4system ad ministration remote,4-14 System Administrator Tool,3-50, 5-13reporting,3-50, 6-10system c onsole physical security ,2-9system files performing backups,2-9 System Prog ramming and Maintenance,4-15system tone test c all,3-37 T TA C, se e Tr un k A c c es s Co d e Tand em Tie Trunk,3-36TCM, see Traveling Class Mark Technic al Servic e Center ,xxi
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Index Page IN-18 telec ommunic ations fraud airp orts,1-6 by employees,1-8d efinition,1-1effec t,1-2, 1-3 emp loyees,2-7in lob b y,3-18telep hone numb er nonp ub lished ,3-2Tenant Services,3-30, 5-10, 6-7Terminal Translation Initialization,3-42 Terminal-to-Terminal Only Calling Restric tion,6-4Terminal-to-Terminal Restric tion,3-14, 5-7, 6-4Termination Restric tion,6-4 test c all fac ility,3-36trunk,3-36 third party calls,5-3three-way-c onferencing,5-33 tie trunk,3-41disallowing outgoing calls,3-40inc oming,3-19 limiting acc ess,3-41restric ting,3-19tand em,3-41, 3-44 Ti me o f Day plan,3-29routing,3-21, 3-53 preventing after-hours c alling,3-29 time slot test call,3-37 Time-Out to Attend ant authorization cod e,3-33tip/ring port,4-19TN744 Call Classifier c ircuit p ack,3-37 Toll Analysis,3-16, 5-7, 6-5tab le,5-9, 5-10toll fraud contact list ,G-5internal,3-49voic e messag ing,5-2 Toll Fraud Intervention Hotline,xxiToll Restric tion,3-13, 3-15, 5-7, 5-33, 6-4Tone Detec tor circ uit pac k,3-37 traffic abnormal p atterns,6-10measurements,3-49 monitoring flow,3-51reports,5-18, 5-28, 6-13Trans Talk 9000 Dig ital Wireless System sec urity tip s ,7-8Transfer Out of AUDIX,5-23disabling,5-26 transfers limiting,6-5Traveling Class Mark,3-41, 3-45 Tr o ub l e Tr ac ke r,2-6
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Index Page IN-19 trunk 800 servic e,2-2 AAR,3-7administration,3-8ARS,3-7, 3-42 CO,2-2, 3-13, 3-15, 3-16, 6-4disabling direct access,3-35FX,2-2, 3-13, 3-15, 6-4 loop -start,4-19monitoring,3-41outg oing,3-42 public network,3-13Re mo te A c c e ss,2-2tie,3-13, 3-19 WA TS,3-14, 3-15, 3-16, 3-19, 3-28, 3-39, 6-4WCR,3-7, 3-42Trunk Ac c ess Cod e,1-4, 3-13, 3-32, 3-40, 3-41, 3-44, 3-64, 5-2, 5-6, 5-25, 6-3, 6-16 obtaining outg oing trunk,3-8Trunk Group Report,5-13, 6-10, 6-12 trunk groups 800,3-2attendant c ontrol,3-36 CO,2-2outg oing,3-10, 3-13Re mo te A c c e ss,2-2 two-way,3-13trunk overrid e,3-20trunk test c all,3-36 Trunk Turnaround Distrib uted Communic ation System,3-40Trunk Verific ation,5-6, 6-3 Trunk-to Trunk Transfer restric tion overrid e,3-14Trunk-to-Trunk Transfer d isallowing ,3-39, 5-53restric tion overrid e,H-17Tr u st ed s er v er d efinition ,5-16overview,5-16TSC, see Tec hnic al Servic e Center TTI, see Terminal Translation Initialization U UDP, see Uniform Dial Plan Unattended Console Service ,3-9, 3-34Unauthorized Call Control tab le,5-9unauthorized c alls p reventing ,5-5Uniform Dial Plan,3-13unrestric ted call list,3-16 usag e monitoring,3-51
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Index Page IN-20 V VDN, see Vec tor Direc tory Numb er Vector Direc tory Numb er,3-9 authorization cod e,3-8COR,3-10Verify b utton,3-64 Video Conference, see Multip oint Control Unit Virtual Nod ep oint Id entifier,5-9, 5-10, 6-6, 6-7VMAAP sec uring ,2-6VNI, see Virtual Nod ep oint Id entifier voic e mail,1-1, 1-4, 1-5, 1-8, 2-4 c ellular p hones,5-3DEFINITY Communications System,5-4 DEFINITY ECS,5-4d etec ting toll fraud,5-11limiting,5-7 MERLIN II Communic ations System,5-33MERLIN LEGEND Communic ations System,5-36PARTNER II Communications System,5-48 PARTNER Plus Communications System,5-50p rotecting,5-2sec urity risks,2-4 System 25,5-52System 75,5-4System 85,5-4 Voi c e Se ssi o n Re c o r d,5-18voic e mailb oxes d eleting unused,2-8 maximum invalid attemp ts allowed,2-8passwords,2-8unassig ned,2-4, 5-3 voic e messag ing systems automated attend ant,2-3transfer c ommand,2-4 voic e p rocessing systems,2-4voic e session rec ord,5-18, 6-13voic e terminal Pub lic Restric tion ,3-13Termination Restriction,3-13voic e terminal g roup attendant-c ontrolled ,3-18void disabling logins,3-24 W WC R, se e Wor l d C la ss Rou t in g wild card characters,3-44, 3-45wiring closets physical security ,2-9World Class Routing,3-20, 3-30restric ting,3-44 Toll Restriction,3-15toll restric tion,6-4