Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook

Lucent Technologies BCS Products Security Handbook

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 281

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Special Security Product and Service Offers 
Page G-5 Toll Fraud Contact List 
G
Toll Fraud Contact List
Contact: For:
Your Lucent Technologies Account 
Executive or Design SpecialistsGeneral questions related to toll fraud
Lucent Technologies Toll Fraud 
Intervention Hotline
800 643-2353All systems and products— 
including DEFINITY ECS, 
DEFINITY Communications 
Systems, DIMENSION, System 75, 
System 85, MERLIN II, MERLIN 
LEGEND,...

Page 282


				            

Page 283

Product Security Checklists 
Page H-1  
H
BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
H
HProduct Security Checklists
This appendix contains the following security checklists:
nGeneral Security Procedures (page H-3)
nAUDIX Voice Mail System (page H-5)
nAUDIX Voice Power System (page H-7)
nBasicWorks (page H-9)
nCONVERSANT Voice Information System (page H-13)
nDEFINITY G1 (page H-15), G2 (page H-21), and G3 (page H-15)
nDEFINITY AUDIX System (page H-5)
nDIMENSION PBX System and...

Page 284

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-2  
H
nPARTNER Plus Communications System (page H-53)
nSystem 25 (page H-58)
nSystem 75 (page H-15)
nSystem 85 (page H-21)
nPassageWay Telephony Services (page H-60) 

Page 285

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-3 General Security Procedures 
H
General Security Procedures
Customer: ________________________________________
Location: _________________________________________
System & Version: _________________________________________
Date Installed: _________________________________________
Table H-1. General Security Procedures
Y/N
1Note N/A
Physical Security
Switch room and wiring closets 
locked
All equipment...

Page 286

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-4 General Security Procedures 
H
1.If “NO” (N), provide Note reference number and explain.
System security policy reviewed 
periodically
Security policy included in new-hire 
orientation
Employees know how to detect 
potential toll fraud
Employees know where to report 
suspected toll fraud
Authorization Codes not sequential
Remote access phone number not 
published
Barrier codes and passwords are...

Page 287

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-5 AUDIX, DEFINITY AUDIX and INTUITY AUDIX Voice Messaging Systems 
H
AUDIX, DEFINITY AUDIX and 
I
NTUITY AUDIX Voice Messaging 
Systems
Also see the general security checklist on page H-3, and the security checklist for 
the host communications system.
(
Customer: _________________________________________
PBX Type: _________________________________________
Location:...

Page 288

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-6 AUDIX, DEFINITY AUDIX and INTUITY AUDIX Voice Messaging Systems 
H
1.If “NO” (N), provide Note reference number and explain.
If transfer allowed, number 
restrictions administered 
(DEFINITY AUDIX Voice 
Messaging System 3.2 only)
  not allowed on Auto 
Attendants
Retries before lockout < 6
Retries before disconnect < 4
Busy lamp on modem port
Voice Processing ports restricted 
from toll calls by...

Page 289

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-7 AUDIX Voice Power System 
H
AUDIX Voice Power System
Also see the general security checklist on page H-3, the security checklist for the 
host communications system.
Customer: _________________________________________
PBX Type: _________________________________________
Location: _________________________________________
New Install: _________________________________________
System Upgrade:...

Page 290

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Product Security Checklists 
Page H-8 AUDIX Voice Power System 
H
1.If “NO” (N), provide Note reference number and explain.
Invalid Auto Attendant menu 
options directed to operator or 
security
Voice processing ports on host 
PBX system restricted from toll 
calls
Voice Processing ports restricted 
from dialing remote access 
extension
Product Monitoring
Administration Log and Activity Log 
checked daily
End-User Education
Passwords...
Start reading Lucent Technologies BCS Products Security Handbook

Related Manuals for Lucent Technologies BCS Products Security Handbook

All Lucent Technologies manuals