Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook
Lucent Technologies BCS Products Security Handbook
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 141
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-9 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 nEnter the FRL number (0 through 7) in the FRL field. Assign the lowest FRL that will meet the outcalling requirements, if the outcalling feature is being utilized. The route patterns for restricted calling areas should have a higher FRL assigned to the trunk groups. nUse change route-pattern to display the Route Pattern...
Page 142
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-10 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 NOTE: If assigning a low FRL to a pattern preference conflicts with requirements for other callers (it allows calls that should not be allowed), use ARS partitioning to establish separate FNPA/HNPA/RHNPA tables for the voice mail ports. For DEFINITY G2 and System 85: nUse PROC311 WORD2 to establish 6-digit translation tables...
Page 143
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-11 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 Detecting Voice Mail Fraud Table 5-3 shows the reports that help determine if a voice mail system used with the DEFINITY ECS, DEFINITY Communications Systems, System 75, or System 85 is being used for fraudulent purposes. See ‘‘Security Tips’’ on page 5-3 for additional ways to detect voice mail fraud. NOTE: The System...
Page 144
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-12 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 NOTE: Most call accounting packages discard this valuable security information. If you are using a call accounting package, check to see if this information can be stored by making adjustments in the software. If it cannot be stored, be sure to check the raw data supplied by the CDR. Review CDR for the following symptoms of...
Page 145
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-13 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 Call Traffic Report This report provides hourly port usage data and counts the number of calls originated by each port. By tracking normal traffic patterns, you can respond quickly if an unusually high volume of calls begins to appear, especially after business hours or during weekends, which might indicate hacker activity....
Page 146
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-14 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 ARS Measurement Selection The ARS Measurement Selection can monitor up to 20 routing patterns (25 for G3) for traffic flow and usage. For DEFINITY ECS, DEFINITY G1, G3, and System 75: nUse change ars meas-selection to choose the routing patterns you want to track. nUse list measurements route-pattern followed by the timeframe...
Page 147
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-15 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 For DEFINITY G2 and System 85: nUse PROC285 WORD1 FIELD5 and PROC286 WORD1 FIELD1 to enable ACA system-wide. nUse PROC120 WORD1 to set ACA call limits and number of calls thresholds. nUse PROC286 WORD1 FIELD3 to send the alarms and/or reports to an attendant. Busy Verification When toll fraud is suspected, you can interrupt...
Page 148
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-16 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 Administration Passwords Your INTUITY AUDIX system comes equipped with administrative password features and options that you control to assist you in securing your system. These include: nChange default administrator password nAdministrator password standards nAdministrator password aging Changing the Default Administrator...
Page 149
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-17 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 Trusted servers can access and manipulate an AUDIX message just as the AUDIX application can do. (See Lucent Technologies INTUITY Messaging Solutions Release 4 Administration , 585-310-564 for in-depth discussions and definitions of trusted servers, domains, and integration of e-mail and other trusted server software with...
Page 150
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-18 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 preventing the transmission of software viruses that you can use when planning for e-mail. Furthermore, your administrator has minimum requirements that the AUDIX server and e-mail server must meet to be allowed on the company network at all. At a minimum, you should advise your users that file attachments should be detached...