Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook

Lucent Technologies BCS Products Security Handbook

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 131

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Small Business Communications Systems 
Page 4-21 System 25 
4
However, unauthorized persons could disrupt your business by altering your 
system programming. In addition, they could activate features (such as Remote 
Access) that would permit them to make long distance calls through your system.
The following security measures assist you in managing the Remote System 
Administration feature to help prevent unauthorized use.
Security...

Page 132


				            

Page 133

Voice Messaging Systems 
Page 5-1  
5
BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
5
5Voice Messaging Systems
The information in this chapter helps prevent unauthorized users from finding 
pathways through the voice messaging system and out of the switch. This chapter 
presents each communications system, and the voice mail systems it may host.
nDEFINITY ECS (page 5-4)
nDEFINITY Communications Systems (page 5-4)
nMERLIN II Communications System (page 5-33)
nMERLIN LEGEND...

Page 134

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-2 Protecting Voice Messaging Systems 
5
Protecting Voice Messaging Systems
Voice messaging toll fraud has risen dramatically in recent years. Now more than 
ever, it is imperative that you take steps to secure your communications systems. 
Callers into the voice messaging/auto attendant system may transfer to an 
outgoing trunk if adequate security measures are not implemented (see Figure 
5-1).
In...

Page 135

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-3 Protecting Voice Messaging Systems 
5
system is a touch tone telephone. With the advent of cellular phones, hackers 
have yet another means of accessing voice mailboxes. If a user calls the voice 
mail system from a cellular phone and inputs his or her password, the voice 
mailbox becomes vulnerable to toll fraud. Since cellular phones can be monitored, 
a hacker can obtain the password and access the...

Page 136

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-4 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
nContact your central office to verify that your carrier provides “reliable 
disconnect” for your host PBX or switch. “Reliable disconnect” is 
sometimes referred to as a forward disconnect or disconnect supervision. It 
guarantees that the central office will not return a dial tone after the called 
party hangs up. If the central...

Page 137

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-5 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
Tools that Prevent Unauthorized Calls
You can help prevent unauthorized callers who enter the voice messaging system 
from obtaining an outgoing facility by using the security tools shown in Table 5-1
.
Facility Restriction Levels
The switch treats all the PBX ports used by voice mail systems as stations. 
Therefore, each voice...

Page 138

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-6 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
ensure that the FRLs on the trunk group preferences in the routing patterns are 
1or higher.
For example, when voice mail ports are assigned to a COR with an FRL of 0, 
outside calls are disallowed. If this is too restrictive because the outcalling feature 
is being used, the voice mail ports can be assigned to a COR with an FRL...

Page 139

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-7 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
nMiscellaneous Trunk Restrictions: restricts certain stations from calling 
certain trunk groups via dial access codes.
nOutward Restriction: restricts the user from placing calls over the CO, FX, 
or WATS trunks using dial access codes to trunks. Outward restriction also 
restricts the user from placing calls via ARS/WCR. Use...

Page 140

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-8 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
For DEFINITY G2 and System 85:
nUse PROC010 WORD3 FIELD19 to assign outward restriction to the voice 
mail ports’ COS.
nMake the voice ports Toll Restricted and ARS Toll Restricted, and assign 
an FRL of 0. Enter no for all Miscellaneous Trunk Restriction Groups 
(MTRGs).
Restrict the Outside Calling Area
When you assign the...
Start reading Lucent Technologies BCS Products Security Handbook

Related Manuals for Lucent Technologies BCS Products Security Handbook

All Lucent Technologies manuals