Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook

Lucent Technologies BCS Products Security Handbook

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 61

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-15 Tools that Restrict Unauthorized Outgoing Calls 
3
nToll Restriction: prevents users from placing toll calls over CO, FX, or 
WATS trunks using dial access codes to trunks. Use ARS/WCR with WCR 
toll restrictions instead.
nARS/WCR Toll Restriction: restricts users from dialing the ARS or WCR 
Network I Toll Access Code or from completing a toll call over ARS/WCR.
nFRL: establishes the...

Page 62

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-16 Tools that Restrict Unauthorized Outgoing Calls 
3
NOTE:
ARS/WRC route patterns should never be assigned an FRL of 0 (zero).
The FRL is used by AAR/ARS/WCR to determine call access to an outgoing trunk 
group. Outgoing call routing is determined by a comparison of the FRLs in the 
AAR/ARS/WCR routing pattern with the FRL associated with the originating 
endpoint.
Authorization codes...

Page 63

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-17 Tools that Restrict Unauthorized Outgoing Calls 
3
AAR/ARS Analysis
ARS routing allows calls to be routed based on the number dialed and the routing 
plan in effect. The routing is normally to the lowest-cost facility. Different Time of 
Day plans can be implemented to allow or prohibit calling at certain times.
NOTE:
Never route public network calls (leading digit = 0 or 1) via AAR...

Page 64

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-18 Tools that Restrict Unauthorized Outgoing Calls 
3
administer switchhook flash to “n” (administered by means of the Add or Change 
Station screen) for FAX machines and modems.
Attendant - Controlled Voice Terminals 
When telephones are located in easily-accessible locations (such as lobbies) that 
do not provide protection against abuse, you can assign them to an 
attendant-controlled...

Page 65

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-19 Tools that Restrict Unauthorized Outgoing Calls 
3
Central Office Restrictions
Some Central Offices offer additional services that screen long distance calls, 
such as  + calls and 10xxx + calls. Contact your local telephone company for 
details.
Restricting Incoming Tie Trunks
You can deny access to AAR/ARS/WCR trunks when the caller is on an incoming 
tie trunk. For all the switches, you...

Page 66

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-20 Tools that Restrict Unauthorized Outgoing Calls 
3
nrestricted — Public network trunks are not transferred.
nnone — No trunks are transferred.
NOTE:
Starting with DEFINITY ECS Release 5, trunk-to-trunk transfer is 
automatically restricted via administration. To this end, the “Restriction 
Override” field in the Class of Restriction form is set to none by default.
To disallow this feature,...

Page 67

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-21 Tools that Restrict Unauthorized Outgoing Calls 
3
You may also route  or   calls to a local attendant for handling. In addition, 
10xxx + calls can be restricted. Certain laws and regulations may prevent you 
from blocking these calls, however. Check with your local or long distance carrier 
for applicable laws and regulations.
If possible, use WCR to shut down toll routes during...

Page 68

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-22 Tools that Restrict Unauthorized Outgoing Calls 
3
Personal Station Access (PSA)
The Personal Station Access (PSA) feature allows multiple users to work at the 
same voice terminal location at different times. PSA provides capabilities that are 
similar to TTI, but for a single station. This feature is available starting with 
DEFINITY ECS Release 5.
Each PSA user must have a Station...

Page 69

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-23 Tools that Restrict Unauthorized Outgoing Calls 
3
or separated. Therefore, PSA users should dissociate before they disconnect 
from a DCP extender.
PSA security violations are recorded by SVN software, if enabled. Refer to the 
SVN feature description and to the 
DEFINITY ECS Release 5 Feature Description 
and to 
DEFINITY ECS Release 5 Implementation for security report information....

Page 70

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-24 Security Measures 
3
Invalid attempts to change the coverage path or the call forwarding destination are 
recorded by the SVN.
To identify unauthorized activation of the Call Forwarding features, use the
list call-forwarding command. The command output includes stations that have 
Call Forwarding All Calls and Call Forwarding Busy/Don’t Answer active. Also 
displayed are the number and...
Start reading Lucent Technologies BCS Products Security Handbook

Related Manuals for Lucent Technologies BCS Products Security Handbook

All Lucent Technologies manuals