Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook
Lucent Technologies BCS Products Security Handbook
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 2
Copyright Ó 1996, Lucent Technologies All Rights Reserved Printed in U.S.A. NoticeWhile reasonable efforts were made to ensure that the information in this document was complete and accurate at the time of printing, Lucent Technologies can assume no responsibility for any errors. Changes and corrections to the information contained in this document may be incorporated into future reissues. Your Responsibility for Your System’s SecurityToll fraud is the unauthorized use of your telecommunications...
Page 3
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Contents Page iii Contents About This Document xiii nScope of this Handbookxiii nReason for Reissuexv nIntended Audiencexv nHow this Guide is Organizedxvi nLucent Technologies’ Statement of Directionxvii nLucent Technologies/Customer Security Roles and Responsibilitiesxviii Lucent Technologies’ Roles and Responsibilitiesxix Customer Roles and Responsibilitiesxx nLucent Technologies Security Offeringsxx nLucent Technologies Toll...
Page 4
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Contents Page iv Increasing Product Access (Port) Security2-6 nGeneral Security Measures2-7 Educating Users2-7 Establishing a Policy2-8 Physical Security2-9 nSecurity Goals Tables2-9 3 Large Business Communications Systems 3-1 nKeeping Unauthorized Third Parties from Entering the System3-2 How Third Parties Enter the System3-2 Protecting the Remote Access Feature3-2 Security Tips3-2 Disabling/Removing Remote Access3-3 Tools to...
Page 5
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Contents Page v World Class Routing (DEFINITY ECS and DEFINITY G2.2 and G3 only)3-20 Digit Conversion3-21 Station Security Codes (SSCs)3-21 Personal Station Access (PSA)3-22 Extended User Administration of Redirected Calls3-23 Remote User Administration of Call Coverage3-23 nSecurity Measures3-24 Require Passwords3-24 Restrict Who Can Use Remote Access/Track its Usage3-25 Fully Restrict Service3-27 Provide Individualized Calling...
Page 6
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Contents Page vi Disable Distinctive Audible Alert3-43 Remove Data Origination Code3-44 Use World Class Routing Restrictions (DEFINITY G2.2 and G3 only)3-44 Change Override Restrictions on 3-way COR Check3-45 nDetecting Toll Fraud3-45 Administration Security3-47 Call Detail Recording (CDR) / Station Message Detail Recording (SMDR)3-48 Traffic Measurements and Performance3-49 Automatic Circuit Assurance (ACA)3-51 BCMS Measurements...
Page 7
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Contents Page vii Protecting Remote Call Forwarding4-16 nMERLIN Plus Communications System4-16 Protecting Remote Line Access (R2 only)4-16 Protecting Remote Call Forwarding (R2 only)4-17 nPARTNER II Communications System4-18 nPARTNER Plus Communications System4-18 nSystem254-19 Protecting Remote Access4-19 Protecting Remote System Administration4-20 5 Voice Messaging Systems 5-1 nProtecting Voice Messaging Systems5-2 Security...
Page 8
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Contents Page viii Protecting the AUDIX Voice Power System5-53 6 Automated Attendant 6-1 nDEFINITY ECS, DEFINITY Communications Systems, System75, and System856-1 Security Tips6-1 Tools that Prevent Unauthorized Calls6-2 Security Measures6-5 Detecting Automated Attendant Toll Fraud6-8 Protecting Automated Attendant on the AUDIX Voice Mail System6-16 Protecting Automated Attendant on the AUDIX Voice Power System6-17 Protecting...
Page 9
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Contents Page ix CMS Helplines7-2 nCallMaster PC7-3 Security Tips7-3 nMultipoint Conferencing Unit (MCU)/Conference Reservation and Control System (CRCS)7-4 nPassageWay®Telephony Services for NetWare® and Windows NT®7-4 Security Tips7-5 nTransTalk 9000 Digital Wireless System7-8 Security Tips7-8 A Call Routing A-1 nCall RoutingA-1 B Blocking Calls B-1 nCountry CodesB-1 nBlocking Toll Fraud DestinationsB-8 Blocking ARS Calls on...
Page 10
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Contents Page x nAdministering Customer Logins and Forced Password AgingD-13 Adding Customer Logins and Assigning Initial PasswordD-13 Changing a Login’s AttributesD-15 Administering Login Command PermissionsD-16 nAdministering the Security Violations ReportsD-17 E Changing Your Password E-1 nAUDIX Voice Mail SystemE-1 nAUDIX Voice Power SystemE-1 nCONVERSANT Voice Information SystemE-2 nDEFINITY AUDIX SystemE-3 nDEFINITY ECS and...