Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook
Lucent Technologies BCS Products Security Handbook
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 151
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-19 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 Outgoing Voice Call Detail Record (AUDIX Voice Mail System Only) An outgoing call record is also created for every outbound call that is originated by the AUDIX Voice Mail System via a voice port. This includes call transfers, outcalling, and message waiting activation and/or deactivation via access codes. A record is also...
Page 152
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-20 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 the call, the voice mailbox id, the number dialed, and the call type as shown in Table 5-5 . Unsuccessful call transfer attempts can result in multiple records being created for a single session. Review these records regularly for the following signs of hacker activity: nFailed login attempts nMultiple call transfers for a...
Page 153
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-21 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 For the Lucent Technologies INTUITY System, administrator passwords follow standard UNIX conventions, but have a 6-character minimum, one of which must be non-alpha. Subscriber passwords can be up to 15 digits. For DEFINITY ECS, administrator passwords are 3 to 10 characters, alpha and numeric. Subscriber passwords can be up...
Page 154
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-22 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 Technologies INTUITY System only), the voice mail system also verifies that the digits entered match the extension number of an administered subscriber. 2. If Step 1 is successful, the voice mail system performs a switch-hook flash, putting the caller on hold. NOTE: If step 1 is unsuccessful, the voice mail system plays an...
Page 155
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-23 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 2. If Step 1 is successful, the voice mail system sends a transfer control link message containing the digits to the switch. If Step 1 is unsuccessful, the voice mail system plays an error message to the caller and prompts for another try. 3. The switch verifies that the digits entered match a valid station number in the dial...
Page 156
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-24 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 nThe voice mail system transfers calls from the automated attendant via a menu selection, extension request, or time out. nThe voice mail system transfers calls from the automated attendant or Bulletin Board sessions (some versions) when the caller enters . NOTE: For the DEFINITY AUDIX System Release 2.2, transfers are...
Page 157
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-25 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 Disallow Outside Calls !CAUTION: If TAC calls are permitted, they may be accepted as a valid extension number. Even with Enhanced Call Transfer activated, toll hackers may be able to enter a TAC to get an outside line if 3-digit station numbers and 3-digit TACs are used. The Enhanced Call Transfer feature is available on a...
Page 158
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-26 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 NOTE: For the DEFINITY AUDIX System and the Lucent Technologies I NTUITY System, no audit is required. 3. For DEFINITY ECS, DEFINITY G1, G3, and System 75: On the switch, use change listed-directory-number to change the Listed Directory Number form, and enter a 4-digit extension number that routes calls to an attendant. For...
Page 159
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-27 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 2. Tab to the Start field and enter x. 3. Then press . NOTE: For the DEFINITY AUDIX System and the Lucent Technologies I NTUITY System, no audit is required. Limit Outcalling The measures you can take to minimize the security risk of outcalling depend on how it is used. When outcalling is used only to alert on-premises...
Page 160
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-28 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 5 Security Tips nRequire callers to use passwords. nHave the application verify that long distance numbers are not being requested, or verify that only permitted numbers are requested. nUse appropriate switch translation restrictions. nAdminister all appropriate switch restrictions on the voice mail system voice ports. nYou may...