Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook

Lucent Technologies BCS Products Security Handbook

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 181

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-49 PARTNER II Communications System 
5
— Assign a Class of Service that provides outcalling privileges (for 
PARTNER MAIL Release 1, assign 4, 5, 6, or 8; for PARTNER MAIL 
Release 3, assign 3,4, or 6) only to those mailboxes requiring these 
privileges.
— Assign Classes of Service 1-6 (for PARTNER MAIL Release 1) or 
1-4 and 20-23 (for PARTNER MAIL Release 3), Transfer Permitted, 
only to mailboxes for...

Page 182

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-50 PARTNER Plus Communications System 
5
nNo Security Notification (strongly discouraged).
nProgram the PARTNER II Communications System to:
— Block direct access to outgoing lines and force the use of account 
codes and/or authorization codes. 
— Assign toll restrictions to individual’s phones, especially in public 
areas.
— If you do not need to use the Outcalling feature of the PARTNER 
MAIL System,...

Page 183

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-51 PARTNER Plus Communications System 
5
Protecting Passwords
For PARTNER MAIL Release 1 and all releases of PARTNER MAIL VS, 
passwords can be up to four digits. For PARTNER MAIL Release 3, passwords 
can be up to 15 digits in length. See ‘‘
Administration / Maintenance Access’’ on 
page 2-4 and ‘‘General Security Measures’’ on page 2-7 for secure password 
guidelines. See Appendix E for information on...

Page 184

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-52 System 25 
5
the largest acceptable minimum length in order to maximize the 
security of your system.
nInstruct employees not to make a statement, in their recorded greeting, 
indicating that they will accept collect calls.
nHave the voice messaging System Administrator delete unneeded voice 
mailboxes from the system immediately.
nThe Security Violation Notification feature enables the System...

Page 185

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-53 System 25 
5
nUse the voice processing system’s maximum extension length, valid 
extension range, and transfer to subscriber only feature, if available.
nTightly control system administration access to these systems.
nProgram the System 25 to:
— Block direct access to outgoing lines and force the use of account 
codes and/or authorization codes.
— Disallow trunk-to-trunk transfer unless it is required....

Page 186

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-54 System 25 
5
nIf you have Release 1.0 of the AUDIX Voice Power System, implement all 
appropriate security measures on the PBX side.
nRequire employees who have voice mailboxes to use passwords to protect 
their mailboxes. See ‘‘
Administration / Maintenance Access’’ on page 2-4 
and ‘‘
General Security Measures’’ on page 2-7 for secure password 
guidelines.
nMake sure subscribers change the default...

Page 187

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Voice Messaging Systems 
Page 5-55 System 25 
5
NOTE:
You cannot use this security measure if calls are transferred to 
people in your company who are not AUDIX Voice Power System 
subscribers (see ‘‘
Limit Transfers Out of the System’’ on page 5-30). 
Limit Transfers Out of the System
When you need to allow transfers to people who are not AUDIX Voice Power 
System subscribers, you can add their extension numbers to the AUDIX Voice...

Page 188


				            

Page 189

Automated Attendant 
Page 6-1 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
6
BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
6
6Automated Attendant
DEFINITY ECS, DEFINITY 
Communications Systems, System 75, 
and System 85
Automated attendant is a service that connects to the PBX/communications 
system to help route calls to the appropriate extension. A menu of options allows 
callers to choose a predefined destination, such as a department, announcement,...

Page 190

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Automated Attendant 
Page 6-2 DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85 
6
Tools that Prevent Unauthorized Calls
You can help prevent unauthorized callers who enter the automated attendant 
system from obtaining an outgoing facility by using the security tools shown in 
Table 6-1
.
Facility Restriction Levels
The switch treats all the PBX ports used by automated attendant systems as 
stations. Therefore,...
Start reading Lucent Technologies BCS Products Security Handbook

Related Manuals for Lucent Technologies BCS Products Security Handbook

All Lucent Technologies manuals