Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook

Lucent Technologies BCS Products Security Handbook

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 71

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-25 Security Measures 
3
NOTE:
System 75 R1V2 customers should contact the Lucent Technologies 
Technical Service Center for “browse” password administration 
procedures.
— For System 75 R1V3N and the DEFINITY G1.1N and G3V2, 
systems are shipped with the customer logins disabled.
!CAUTION:
Systems upgraded from earlier versions will have the logins 
and passwords of its previous version. This...

Page 72

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-26 Security Measures 
3
nWhen providing attendant coverage, enter y in the Timeout to Attendant 
field. Invalid entries of authorization codes and failure to enter an 
authorization code result in a transfer to an attendant.
nUse change remote-access to display the Remote Access screen.
nIf not already assigned, enter the appropriate extension number in the 
Remote Access Extension field....

Page 73

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-27 Security Measures 
3
NOTE:
As an alternative, you can require an authorization code. However, 
since only one code can be used to gain access to Remote Access, 
more protection is provided when you require a barrier code to enter 
Remote Access and then an authorization code to dial out of the 
system.
nUse PROC350 WORD2 FIELD1 = 26 to assign an access code that allows 
you to change the...

Page 74

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-28 Security Measures 
3
Provide Individualized Calling Privileges 
Using FRLs
FRLs are used to allow or deny calls when AAR/ARS/WCR route patterns are 
accessed. An originating FRL assigned to a station or tie-line trunk group must be 
equal to or greater than the terminating route pattern FRL for the call to be 
completed. A COR or COS assigned an FRL of 7 is allowed to complete a call on...

Page 75

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-29 Security Measures 
3
For DEFINITY G2 and System 85: 
nUse PROC010 WORD3 FIELD23 to assign FRLs to a station originator’s 
COS for use with AAR/ARS/WCR trunks. (COS 31 is used for Remote 
Access.)
nUse PROC103 WORD1 FIELD2 to assign FRLs to an incoming trunk.
nUse PROC309 WORD1 FIELD3 to assign FRLs to an ARS route pattern.
nUse PROC321 WORD1 FIELD4 to assign FRLs to an AAR pattern.
nOn...

Page 76

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-30 Security Measures 
3
nWhen using WCR, enter PROC311 to separate toll and non-toll numbers 
into different routing indices. Use PROC314 for tenant services to separate 
toll and non-toll numbers into different routing indices.
nUse PROC311, PROC316, and PROC317 to shut down toll routes outside 
of business hours.
nUse PROC286 WORD1 FIELD5-12 to lower FRLs after hours to make 
them more...

Page 77

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-31 Security Measures 
3
nLeave the following FNPA fields for international calling blank, or, for older 
versions of software, assign them to an unused route pattern (for example, 
254) with no trunk assignments. 
NOTE:
As a reminder, not all international calls follow this pattern. For example, 
Canada uses standard area codes.
For DEFINITY ECS and DEFINITY G3:
nEnter change ars analysis...

Page 78

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-32 Security Measures 
3
Limit International Calling
If your company does business overseas with certain countries, you can allow 
calls to those countries while blocking calls to other countries.
For DEFINITY G1 and System 75:
For 000, 011, and each country code to be blocked:
nEnter change ars fnpa nnn (where nnn is either 000, 011, or the country 
code to be blocked) to display the ARS FNPA...

Page 79

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-33 Security Measures 
3
Select Authorization Code Time-Out to Attendant
For DEFINITY ECS, DEFINITY G1, G3, and System 75, you can send calls to an 
attendant if the caller fails to enter a required authorization code within 10 
seconds. For DEFINITY G2 and System 85, you can route calls to an attendant 
when callers fail to enter a required telephone number or authorization code within 
10...

Page 80

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-34 Security Measures 
3
For DEFINITY G1 and System 75:
nEnter change ars fnpa xxx, where xxx is the area code, to display the 
ARS FNPA Tables screen.
nAssign RHNPA table r1-r32 to the area code. For example, enter change 
ars fnpa r1:, where r1 is NXX.
For DEFINITY ECS and DEFINITY G3:
nEnter change ars analysis to display the ARS Analysis screen.
nEnter the area codes or telephone numbers...
Start reading Lucent Technologies BCS Products Security Handbook

Related Manuals for Lucent Technologies BCS Products Security Handbook

All Lucent Technologies manuals