Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook
Lucent Technologies BCS Products Security Handbook
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 101
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-55 Detecting Toll Fraud 3 nFor Remote Access, enter the number of attempts allowed before a violation occurs in the Barrier Code Threshold field, and enter the time interval in hours or minutes for tracking the number of attempts. nFor logins, enter the number of login attempts before a violation occurs in the Login Threshold field and the time interval in hours or minutes for tracking...
Page 102
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-56 Detecting Toll Fraud 3 DEFINITY G3V4 offers an additional feature: nThe status remote access command provides information on the state of remote access. Valid states are enabled, disabled, svn-disabled, or not-administered. Valid barrier code states include active and expired. For information on administering these parts of the Security Violation Notification Feature, see Appendix...
Page 103
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-57 Detecting Toll Fraud 3 nTrunk (other than remote access) nRemote Access nAttendant — Port Type: The type of port used by the measured login process. If break-ins are occurring at this level, the offender may have access to your system administration. With DEFINITY Release 5r, port types can be: nSYSAM-LCL (SYSAM Local Port) nSYSAM-RMT (SYSAM Remote Port) nMAINT nSYS-PORT (System Ports)...
Page 104
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-58 Detecting Toll Fraud 3 nMAIN nSYS-PORT (System Ports) nMGR1 nINADS (The Initialization and Administration System port) nEPN (The EPN maintenance EIA port) nNET — Successful Logins: The total number of times a login was used successfully to log into the system for the given port type. — Invalid Passwords: The total number of login attempts where the attempting person submitted an invalid...
Page 105
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-59 Detecting Toll Fraud 3 — Time: The time the invalid attempt occurred — Login: The invalid login that was entered as part of the login violation attempt. An invalid password may cause a security violation. If a valid login causes a security violation by entering an incorrect password, the Security Violation Status report lists the login. — Port: The port on which the failed login...
Page 106
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-60 Detecting Toll Fraud 3 — Date: The day that the violation occurred — Time: The time the violation occurred — Originator: The type of resource originating the call that generated the invalid authorization code access attempt. Originator types include: nStation nTrunk (other than a trunk assigned to a Remote Access trunk group) nRemote Access (when the invalid authorization code is...
Page 107
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-61 Detecting Toll Fraud 3 Remote Access Barrier Code Aging/Access Limits (DEFINITY G3V3 and Later) For DEFINITY G3V3 and later, including DEFINITY ECS, Remote Access Barrier Code Aging allows the system administrator to specify both the time interval a barrier code is valid, and/or the number of times a barrier code can be used to access the Remote Access feature. A barrier code will...
Page 108
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-62 Detecting Toll Fraud 3 NOTE: Since the amount of space available for storing this information is limited, you should print the entire output of the list history command immediately upon suspicion of toll fraud. For DEFINITY G3V4 with the Intel ® processor, the history log has doubled in size to 500 entries, and provides login and logoff entries. This log includes the date, time, port,...
Page 109
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-63 Detecting Toll Fraud 3 Service Observing When toll fraud is suspected, this feature allows an authorized person, such as a security supervisor, to monitor actual calls in progress to establish whether or not an authorized user is on the call. The service observer has the option to listen only or to listen and talk. An optional warning tone can be administered (on a per-system basis) to...
Page 110
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-64 Detecting Toll Fraud 3 Busy Verification When toll fraud is suspected, you can interrupt the call on a specified trunk group or extension number and monitor the call in progress. Callers will hear a long tone to indicate the call is being monitored. For DEFINITY ECS, DEFINITY G1, G3, and System 75: nEnter change station to display the Station screen for the station that will be...