Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook

Lucent Technologies BCS Products Security Handbook

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 121

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Small Business Communications Systems 
Page 4-11 MERLIN LEGEND Communications System 
4
The following table gives examples of how to allow and disallow calls via star 
codes and Disallowed Lists.
Default Disallowed List
By default, Disallowed List #7 contains the following entries, which are frequently 
associated with toll fraud:
n0
n10
n11
n976
n1809
n1700
n1900
n1ppp976 (where each p represents any digit)
n*
This list is automatically...

Page 122

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Small Business Communications Systems 
Page 4-12 MERLIN LEGEND Communications System 
4
Assigning a Second Dial Tone Timer
A second dial tone timer can be assigned to lines and trunks to help prevent toll 
fraud.
NOTE:
This timer can be used with star codes, which are discussed earlier in this 
chapter.
If the timer is assigned, and if the user dials a certain set of digits, the CO provides 
a second dial tone to prompt the user to enter...

Page 123

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Small Business Communications Systems 
Page 4-13 MERLIN LEGEND Communications System 
4
— 4 (international calling)
NOTE:
In Release 3.1 and later systems, default local and default toll tables 
are factory-assigned an FRL of 2. This simplifies the task of 
restricting extensions; the FRL for an extension merely needs to be 
changed from the default of 3.
Protecting Remote Access
The Remote Access feature allows users to call into the...

Page 124

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Small Business Communications Systems 
Page 4-14 MERLIN LEGEND Communications System 
4
To turn off Remote Access, do the following:
1. On the System Administration screen, select Lines and Trunks and 
then select Remote Access.
2. Choose Disable Remote Access.
If you need the feature, use as many of the security measures presented in 
this section as you can.
nProgram the Remote Access feature to require the caller to enter a barrier...

Page 125

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Small Business Communications Systems 
Page 4-15 MERLIN LEGEND Communications System 
4
— Calls to suspicious destinations
— High numbers of “ineffective call attempts” indicating attempts at 
entering invalid barrier codes or authorization codes
— Numerous calls to the same number
— Undefined account codes
Protecting Remote System Programming
The Remote System Programming feature allows your system administrator to 
use System...

Page 126

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Small Business Communications Systems 
Page 4-16 MERLIN Plus Communications System 
4
Protecting Remote Call Forwarding
The Remote Call Forwarding feature allows a customer to forward an incoming 
call to another off-premises number. However, a caller could stay on the line and 
receive another dial tone. At this point, the caller could initiate another toll call.
The following security measures assist you in managing the Remote Call...

Page 127

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Small Business Communications Systems 
Page 4-17 MERLIN Plus Communications System 
4
nUse the system’s toll restriction capabilities to restrict the long distance 
calling ability of Remote Line Access users as much as possible, 
consistent with the needs of your business.
nBlock out-of-hours calling by turning off DXD and Remote Line Access 
features at an extension 10 telephone whenever possible.
nProtect your Remote Line Access...

Page 128

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Small Business Communications Systems 
Page 4-18 PARTNER II Communications System 
4
PARTNER II Communications System
This section provides information on protecting the PARTNER II Communications 
System. 
Additional security measures are required to protect adjunct equipment.
nChapter 5 contains security measures to protect the attached voice 
messaging system. For general security measures, refer to ‘‘
Protecting 
Voice Messaging...

Page 129

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Small Business Communications Systems 
Page 4-19 System 25 
4
Administration Unit by making sure to assign a password for unattended mode, 
and once remote administration is not necessary, remove it from unattended 
mode. Otherwise, a hacker could change the programming remotely.
System 25
This section provides information on protecting the System 25.
Additional security measures are required to protect adjunct equipment.
nChapter 5...

Page 130

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Small Business Communications Systems 
Page 4-20 System 25 
4
For greater security, always use the maximum available digits when assigning 
barrier access codes.
The following security measures assist you in managing the Remote Access 
feature to help prevent unauthorized use.
Security Tips
nEvaluate the necessity for Remote Access. If this feature is not vital to your 
organization, consider not using it or limiting its use. If you need...
Start reading Lucent Technologies BCS Products Security Handbook

Related Manuals for Lucent Technologies BCS Products Security Handbook

All Lucent Technologies manuals