Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook
Lucent Technologies BCS Products Security Handbook
Have a look at the manual Lucent Technologies BCS Products Security Handbook online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-19 DEFINITY ECS, DEFINITY G1 and G3, and System 75 H Block access to Alliance teleconference service (0700) 011/LD calls limited by FRLs 011/LD calls limited by Time-of-Day routing 011/LD calls limited by 6-digit or digit analysis Alternate FRLs used (G3r) Facility Test Call/Data Origination Facility Test code changed from default, if used Facility Test code translated only when needed Facility Test code limited to system admin/mtc COR Data Origination feature code not translated Logoff notification enabled (G3V4) Miscellaneous Console permissions restricted/limited Operator calls restricted Switch-hook flash denied on FAX machines, modems, etc. COR-to-COR restrictions used on all CORs Ports for adjuncts in own restricted COR VDNs have own restricted CORs (G3) Restrict call forwarding off-net = y (G3) Digit conversion of unauthorized calls to console or security (G3) Table H-6. DEFINITY ECS, G1, and G3, and System 75 — Continued Y/N 1Note N/A
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-20 DEFINITY ECS, DEFINITY G1 and G3, and System 75 H 1.If “NO” (N), provide Note reference number and explain. Three-way COR check on transfer/conference (G3V3 and later) Authorization Code Security Violation Notification feature active (G3V3 and later) Product Monitoring Traffic measurement reports monitored daily SMDR/CMS reports monitored daily Recent change history log reviewed daily (G1/G3) Table H-6. DEFINITY ECS, G1, and G3, and System 75 — Continued Y/N 1Note N/A
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-21 DEFINITY G2 and System 85 H DEFINITY G2 and System 85 Also see the general security checklist on page H-3, and the security checklist for any attached voice mail systems or other adjuncts. Customer: _________________________________________ Location: _________________________________________ System & Version: _________________________________________ New Install: _________________________________________ System Upgrade: _________________________________________ Major Addition: _________________________________________ Table H-7. DEFINITY G2 and System 85 Y/N 1Note N/A System Administration Logins and Procedures Security code changed from factory default PBX Features Trunk groups have dial access disabled COS/Miscellaneous Trunk Restrictions on dial-accessed trunks Disable Trunk Verification Access Code ACA (Automatic Circuit Assurance) on trunk groups Alternate FRLs used Individual and Group Controlled Restrictions used Attendant Control of Trunk Group activated for any trunk groups with TACs
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-22 DEFINITY G2 and System 85 H VDNs have their own restricted COSs Ports for adjuncts in own restricted COS Authorization codes used Authorization codes not sequential 900, 976 calls blocked Operator calls restricted 011/LD calls restricted 011/LD calls limited by Time-of-Day Routing 1+809 and 0+809 Area Code blocked Digit Conversion of unauthorized calls to console or security SMDR/CDR activated on all trunk groups Trunks measured by BCMS/CMS ARS/WCR used for call routing Remote Access Remote access disabled (no trunk groups translated as remote access) Remote access number is unpublished Seven-digit authorization codes used with RA Authorization code timeout to attendant Barrier code is a random four-digit sequence SMDR/CAS/CDR reports monitored daily, including authorization code violations Table H-7. DEFINITY G2 and System 85 — Continued Y/N 1Note N/A
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-23 DEFINITY G2 and System 85 H Traffic measurement reports, including remote access history reviewed daily Customer Education Security code changed on a scheduled basis and coordinated with Denver Maintenance Center Blocking 976 look-alikes DID/DNIS number range does not overlap facility access codes Remote Call Forwarding not active Remote Call Forwarding used only offnet with groundstart trunks Positive disconnect verified with loop start trunks Remote Access Remote activated only if required Use non-DID number for remote access Barrier codes are maximum allowable digits, random number sequence Barrier codes are not sequential AVP/VMS Do not register ARS or FACS as subscribers Provide small mailboxes (AVP) and no voice mail coverage on “utility” stations (that is, non-voice such as FAX endpoints) Administration login password changed on regular basis Transfer to Subscribers Only = y (AVP) Change password from default for new subscribers Table H-7. DEFINITY G2 and System 85 — Continued Y/N 1Note N/A
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-24 DEFINITY G2 and System 85 H 1.If “NO” (N), provide Note reference number and explain. Voice ports outward restricted if outcalling not used Use of outcalling denied or minimized Invalid Auto Attendant menu options directed to operator Disable remote maintenance access when not in use Table H-7. DEFINITY G2 and System 85 — Continued Y/N 1Note N/A
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-25 DIMENSION PBX System H DIMENSION PBX System Also see the general security checklist on page H-3, and the security checklist for any attached voice mail systems or other adjuncts. Customer: _________________________________________ FP & Issue: _________________________________________ Location: _________________________________________ System Upgrade: _________________________________________ Major Addition: _________________________________________ Table H-8. DIMENSION PBX System Y/N 1Note N/A System Administration Security Code changed from factory default PBX Features Trunk-to-trunk transfer disabled Trunk groups have dial access disabled COS/Miscellaneous Trunk Restrictions on dial-accessed trunks Disable Trunk Verification Access Code ACA (Automatic Circuit Assurance) on trunk groups Alternate FRLs used Individual and Group Controlled Restrictions used Attendant Control of Trunk Group Activated for any trunk groups with TACS
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-26 DIMENSION PBX System H Ports for adjuncts in own restricted COS Authorization codes used Authorization codes not sequential 900, 976 calls blocked Operator calls restricted 011/LD calls restricted 011/LD calls limited by Time-of-Day Routing 1+809 and 0+809 Area Code blocked Digit Conversion of unauthorized calls to console or security SMDR activated on all trunk groups Trunks measured by BCMS/CMS Call Forwarding Off-Net disabled ARS used for call routing Remote Access Remote access disabled (no trunk groups translated as remote access) Remote access number is unpublished 7-digit authorization codes used with RA Authorization code timeout to attendant Remote access COS is restricted Barrier code is a random 4-digit sequence Product Monitoring SMDR reports monitored daily, including authorization code violations Table H-8. DIMENSION PBX System — Continued Y/N 1Note N/A
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-27 DIMENSION PBX System H 1.If “NO” (N), provide Note reference number and explain. Traffic measurement reports, including remote access history reviewed daily Customer Education Security code changed on a scheduled basis and coordinated with Denver Maintenance Center Blocking 976 look-alikes Table H-8. DIMENSION PBX System — Continued Y/N 1Note N/A
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Product Security Checklists Page H-28 Lucent Technologies/Bay Networks H Lucent Technologies/Bay Networks Also see the general security checklist on page H-3. 1.If “NO” (N), provide Note reference number and explain. Customer: _________________________________________ System & Version: _________________________________________ Location: _________________________________________ New Install: _________________________________________ System Upgrade: _________________________________________ Major Addition: _________________________________________ Table H-9. Lucent Technologies/Bay Networks Y/N 1Note N/A System Administration Root password changed from default Manager-level password changed from default Monitor-level password changed from default