Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook

Lucent Technologies BCS Products Security Handbook

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 161

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-29 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
Protecting Passwords
The AUDIX Voice Power System offers password protection to help restrict 
unauthorized access. Subscribers should use a maximum length password and 
should change it routinely. Passwords can be up to 9 digits. See ‘‘
Administration / 
Maintenance Access’’ on page 2-4 and ‘‘General Security Measures’’ on page...

Page 162

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-30 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
Security Measures
The security measures described in this section do not apply if you are using 
Release 1.0 of the AUDIX Voice Power System. In this case, use PBX restrictions 
to safeguard your system.
Transfer Only to System Subscribers
The AUDIX Voice Power System has the ability to allow callers to transfer only to 
mailbox...

Page 163

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-31 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
NOTE:
On AUDIX Voice Power System 2.1.1, mailboxes can be set individually to 
“1 minute,” reducing the clean-up that these mailboxes require.
Protecting the CONVERSANT Voice Information
System
This section addresses security issues for the CONVERSANT and INTUITY 
CONVERSANT Voice Information Systems. These systems provide a...

Page 164

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-32 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
5
Security Measures
Design applications with toll fraud in mind.
nMake sure the application verifies that long distance numbers are not being 
requested, or that only permitted numbers are requested. The Transfer Call 
and Call Bridge capabilities of Script Builder, and the “tic” instruction at the 
Transaction State Machine (TSM)...

Page 165

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-33 MERLIN II Communications System 
5
Security Tips
Toll fraud is possible when the application allows the incoming caller to make a 
network connection with another person. Thus, bridging to an outbound call, call 
transfer, and 3-way-conferencing should be protected.
nRequire callers to use passwords.
nHave the application verify that long distance numbers are not being 
requested, or verify that only...

Page 166

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-34 MERLIN II Communications System 
5
The MERLIN MAIL Voice Messaging System provides automated attendant, call 
answer, and voice mail functionality. The automated attendant feature answers 
incoming calls and routes them to the appropriate department, person, or mailbox. 
The call answer feature provides call coverage to voice mailboxes. The voice mail 
feature provides a variety of voice messaging...

Page 167

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-35 MERLIN II Communications System 
5
nCreate a Disallowed List to disallow dialing 0, 70, 011, 809, 1809, 0809, 10, 
9999, 411, 1411, 800, 888, 700, 900, 976, 550, 1800, 1888,1700, 1500, 
1900, 1976, 1550, 0800, 0888, 0700, 0500, 0900, 0976, and 0550. Assign 
all MERLIN MAIL Voice Messaging System ports to this list. Lucent 
Technologies recommends using List 7 — the last Disallowed List. This is 
an...

Page 168

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-36 MERLIN LEGEND Communications System 
5
MERLIN LEGEND Communications 
System
The MERLIN LEGEND Communications System may be used with the following 
voice messaging systems:
nAUDIX Voice Power System — the AUDIX Voice Power System is a 
system that is external to the MERLIN LEGEND Communications System 
and connected to the switch by station lines and data links. (See 
‘‘
Protecting the AUDIX Voice Power...

Page 169

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-37 MERLIN LEGEND Communications System 
5
Protecting the AUDIX Voice Power System
The AUDIX Voice Power System provides both automated attendant and voice 
mail functionality. The automated attendant feature answers incoming calls and 
routes them to the appropriate department, person, or mailbox. The voice mail 
feature provides call coverage to voice mailboxes along with a variety of voice 
messaging...

Page 170

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-38 MERLIN LEGEND Communications System 
5
nSet up auto attendant selection codes so that they do not permit outside 
line selection.
nAssign toll restriction levels to the AUDIX Voice Power System ports.
nIf you do not need to use the Outcalling feature of the AUDIX Voice Power 
System, completely restrict the outward calling capability of the AUDIX 
Voice Power System ports.
!WARNING:
Entering “#”...
Start reading Lucent Technologies BCS Products Security Handbook

Related Manuals for Lucent Technologies BCS Products Security Handbook

All Lucent Technologies manuals