Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook
Lucent Technologies BCS Products Security Handbook
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 71
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-25 Security Measures 3 NOTE: System 75 R1V2 customers should contact the Lucent Technologies Technical Service Center for “browse” password administration procedures. — For System 75 R1V3N and the DEFINITY G1.1N and G3V2, systems are shipped with the customer logins disabled. !CAUTION: Systems upgraded from earlier versions will have the logins and passwords of its previous version. This...
Page 72
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-26 Security Measures 3 nWhen providing attendant coverage, enter y in the Timeout to Attendant field. Invalid entries of authorization codes and failure to enter an authorization code result in a transfer to an attendant. nUse change remote-access to display the Remote Access screen. nIf not already assigned, enter the appropriate extension number in the Remote Access Extension field....
Page 73
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-27 Security Measures 3 NOTE: As an alternative, you can require an authorization code. However, since only one code can be used to gain access to Remote Access, more protection is provided when you require a barrier code to enter Remote Access and then an authorization code to dial out of the system. nUse PROC350 WORD2 FIELD1 = 26 to assign an access code that allows you to change the...
Page 74
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-28 Security Measures 3 Provide Individualized Calling Privileges Using FRLs FRLs are used to allow or deny calls when AAR/ARS/WCR route patterns are accessed. An originating FRL assigned to a station or tie-line trunk group must be equal to or greater than the terminating route pattern FRL for the call to be completed. A COR or COS assigned an FRL of 7 is allowed to complete a call on...
Page 75
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-29 Security Measures 3 For DEFINITY G2 and System 85: nUse PROC010 WORD3 FIELD23 to assign FRLs to a station originator’s COS for use with AAR/ARS/WCR trunks. (COS 31 is used for Remote Access.) nUse PROC103 WORD1 FIELD2 to assign FRLs to an incoming trunk. nUse PROC309 WORD1 FIELD3 to assign FRLs to an ARS route pattern. nUse PROC321 WORD1 FIELD4 to assign FRLs to an AAR pattern. nOn...
Page 76
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-30 Security Measures 3 nWhen using WCR, enter PROC311 to separate toll and non-toll numbers into different routing indices. Use PROC314 for tenant services to separate toll and non-toll numbers into different routing indices. nUse PROC311, PROC316, and PROC317 to shut down toll routes outside of business hours. nUse PROC286 WORD1 FIELD5-12 to lower FRLs after hours to make them more...
Page 77
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-31 Security Measures 3 nLeave the following FNPA fields for international calling blank, or, for older versions of software, assign them to an unused route pattern (for example, 254) with no trunk assignments. NOTE: As a reminder, not all international calls follow this pattern. For example, Canada uses standard area codes. For DEFINITY ECS and DEFINITY G3: nEnter change ars analysis...
Page 78
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-32 Security Measures 3 Limit International Calling If your company does business overseas with certain countries, you can allow calls to those countries while blocking calls to other countries. For DEFINITY G1 and System 75: For 000, 011, and each country code to be blocked: nEnter change ars fnpa nnn (where nnn is either 000, 011, or the country code to be blocked) to display the ARS FNPA...
Page 79
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-33 Security Measures 3 Select Authorization Code Time-Out to Attendant For DEFINITY ECS, DEFINITY G1, G3, and System 75, you can send calls to an attendant if the caller fails to enter a required authorization code within 10 seconds. For DEFINITY G2 and System 85, you can route calls to an attendant when callers fail to enter a required telephone number or authorization code within 10...
Page 80
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Large Business Communications Systems Page 3-34 Security Measures 3 For DEFINITY G1 and System 75: nEnter change ars fnpa xxx, where xxx is the area code, to display the ARS FNPA Tables screen. nAssign RHNPA table r1-r32 to the area code. For example, enter change ars fnpa r1:, where r1 is NXX. For DEFINITY ECS and DEFINITY G3: nEnter change ars analysis to display the ARS Analysis screen. nEnter the area codes or telephone numbers...