Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook
Lucent Technologies BCS Products Security Handbook
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 121
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Small Business Communications Systems Page 4-11 MERLIN LEGEND Communications System 4 The following table gives examples of how to allow and disallow calls via star codes and Disallowed Lists. Default Disallowed List By default, Disallowed List #7 contains the following entries, which are frequently associated with toll fraud: n0 n10 n11 n976 n1809 n1700 n1900 n1ppp976 (where each p represents any digit) n* This list is automatically...
Page 122
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Small Business Communications Systems Page 4-12 MERLIN LEGEND Communications System 4 Assigning a Second Dial Tone Timer A second dial tone timer can be assigned to lines and trunks to help prevent toll fraud. NOTE: This timer can be used with star codes, which are discussed earlier in this chapter. If the timer is assigned, and if the user dials a certain set of digits, the CO provides a second dial tone to prompt the user to enter...
Page 123
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Small Business Communications Systems Page 4-13 MERLIN LEGEND Communications System 4 — 4 (international calling) NOTE: In Release 3.1 and later systems, default local and default toll tables are factory-assigned an FRL of 2. This simplifies the task of restricting extensions; the FRL for an extension merely needs to be changed from the default of 3. Protecting Remote Access The Remote Access feature allows users to call into the...
Page 124
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Small Business Communications Systems Page 4-14 MERLIN LEGEND Communications System 4 To turn off Remote Access, do the following: 1. On the System Administration screen, select Lines and Trunks and then select Remote Access. 2. Choose Disable Remote Access. If you need the feature, use as many of the security measures presented in this section as you can. nProgram the Remote Access feature to require the caller to enter a barrier...
Page 125
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Small Business Communications Systems Page 4-15 MERLIN LEGEND Communications System 4 — Calls to suspicious destinations — High numbers of “ineffective call attempts” indicating attempts at entering invalid barrier codes or authorization codes — Numerous calls to the same number — Undefined account codes Protecting Remote System Programming The Remote System Programming feature allows your system administrator to use System...
Page 126
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Small Business Communications Systems Page 4-16 MERLIN Plus Communications System 4 Protecting Remote Call Forwarding The Remote Call Forwarding feature allows a customer to forward an incoming call to another off-premises number. However, a caller could stay on the line and receive another dial tone. At this point, the caller could initiate another toll call. The following security measures assist you in managing the Remote Call...
Page 127
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Small Business Communications Systems Page 4-17 MERLIN Plus Communications System 4 nUse the system’s toll restriction capabilities to restrict the long distance calling ability of Remote Line Access users as much as possible, consistent with the needs of your business. nBlock out-of-hours calling by turning off DXD and Remote Line Access features at an extension 10 telephone whenever possible. nProtect your Remote Line Access...
Page 128
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Small Business Communications Systems Page 4-18 PARTNER II Communications System 4 PARTNER II Communications System This section provides information on protecting the PARTNER II Communications System. Additional security measures are required to protect adjunct equipment. nChapter 5 contains security measures to protect the attached voice messaging system. For general security measures, refer to ‘‘ Protecting Voice Messaging...
Page 129
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Small Business Communications Systems Page 4-19 System 25 4 Administration Unit by making sure to assign a password for unattended mode, and once remote administration is not necessary, remove it from unattended mode. Otherwise, a hacker could change the programming remotely. System 25 This section provides information on protecting the System 25. Additional security measures are required to protect adjunct equipment. nChapter 5...
Page 130
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Small Business Communications Systems Page 4-20 System 25 4 For greater security, always use the maximum available digits when assigning barrier access codes. The following security measures assist you in managing the Remote Access feature to help prevent unauthorized use. Security Tips nEvaluate the necessity for Remote Access. If this feature is not vital to your organization, consider not using it or limiting its use. If you need...