Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook

Lucent Technologies BCS Products Security Handbook

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies BCS Products Security Handbook online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Large Business Communications Systems Security Tools by Release 
    Page I-5  
    I
    Class of Service‘‘Class of Service’’ 
    on page 3-14
    ‘‘Class of Service’’ 
    on page 5-6
    ‘‘Class of Service’’ 
    on page 6-3
    xxxxxxxxx
    CMS 
    Measurements‘‘
    CMS 
    Measurements’’ on 
    page 3-52
    xxxxxxxxx
    COR Descriptions‘‘
    Class of 
    Restriction’’ on 
    page 3-12
    xxx
    Digit Conversion‘‘
    Digit Conversion’’ 
    on page 3-21
    ‘‘Block International 
    Calling’’ on page 
    3-30
    ‘‘Limit International 
    Calling’’ on page 
    3-32
    ‘‘Restrict Calls to 
    Specified Area 
    Codes’’ on page 
    3-33
    xxxG3ixxxx
    Enhanced Call 
    Transfer‘‘
    Basic Call 
    Transfer’’ on page 
    5-21
    ‘‘Disallow Outside 
    Calls’’ on page 
    6-16
    R1V3 
    Issue 
    2.0R2V4 Issue 
    5.0xxxxxx
    Extended User 
    Administration of 
    Redirected Calls‘‘
    Extended User 
    Administration of 
    Redirected Calls’’ 
    on page 3-23
    x
    Table I-1. Large Business Communications Systems Security Tools by Release — 
    Feature See Section/Page S75 S85 G1 G2 G3V1 G3V2 G3V3 G3V4ECS 
    R5 & 
    later 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Large Business Communications Systems Security Tools by Release 
    Page I-6  
    I
    Facility Restriction 
    Levels‘‘Class of 
    Restriction’’ on 
    page 3-12
    ‘‘Facility 
    Restriction Level 
    (FRL)’’ on page 
    3-15
    ‘‘Facility 
    Restriction Levels’’ 
    on page 5-5
    ‘‘Facility 
    Restriction Levels’’ 
    on page 6-2
    xxxxxxxxx
    Feature Access 
    Code 
    Administration‘‘
    Known Toll Fraud 
    Activity’’ on page 
    1-3
    ‘‘Feature Access 
    Code 
    Administration’’ on 
    page 3-8
    xxxxxxxxx
    Forced Entry of 
    Account Code‘‘
    Forced Entry of 
    Account Code’’ on 
    page 3-20
    ‘‘Require Account 
    Codes’’ on page 
    3-42
    xxxxxxxxx
    Forced Password 
    Aging‘‘
    Forced Password 
    Aging and 
    Administrable 
    Logins’’ on page 
    3-47
    xxx
    Free Call List‘‘
    Free Call List’’ on 
    page 3-16
    xx
    Fully Restricted 
    Service‘‘
    Calling Party and 
    Called Party 
    Restrictions’’ on 
    page 3-12
    ‘‘Fully Restrict 
    Service’’ on page 
    3-27
    xxxxxxxxx
    Table I-1. Large Business Communications Systems Security Tools by Release — 
    Feature See Section/Page S75 S85 G1 G2 G3V1 G3V2 G3V3 G3V4ECS 
    R5 & 
    later 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Large Business Communications Systems Security Tools by Release 
    Page I-7  
    I
    INADS Port 
    Access 
    Restrictions‘‘Adding Customer 
    Logins and 
    Assigning Initial 
    Password’’ on page 
    D-13
    xx
    List Call Forward 
    Command‘‘
    Class of Service’’ 
    on page 3-14
    xx
    Login ID Kill After 
    “N” Attempts‘‘
    Administering 
    Login ID Kill After N 
    Attempts’’ on page 
    D-7
    xxx
    Logoff Notification 
    - Facility Test Call‘‘
    Adding Customer 
    Logins and 
    Assigning Initial 
    Password’’ on page 
    D-13
    xx
    Logoff Notification 
    - Remote Access‘‘
    Adding Customer 
    Logins and 
    Assigning Initial 
    Password’’ on page 
    D-13
    xx
    Malicious Call 
    Trace‘‘
    Malicious Call 
    Trace’’ on page 
    3-62
    R2V4 xG3rxxxx
    Monitor Command‘‘
    Monitor Trunks’’ 
    on page 3-41
    x x xxxx
    Monitor Security 
    Violations Reports‘‘
    Administering the 
    Security Violations 
    Reports’’ on page 
    D-17
    xxxx
    Night Service‘‘
    Night Service’’ on 
    page 3-8
    xxxxxxxxx
    Permanently 
    Disable Remote 
    Access‘‘
    Administering 
    Barrier Code 
    Aging’’ on page 
    D-11
    R1V3n G1V4n x x x x x
    Personal Station 
    Access (PSA)‘‘
    Personal Station 
    Access (PSA)’’ on 
    page 3-22
    x
    Recall Signaling‘‘
    Recall Signaling 
    (Switchhook 
    Flash)’’ on page 
    3-17
    x x x xxxx
    Table I-1. Large Business Communications Systems Security Tools by Release — 
    Feature See Section/Page S75 S85 G1 G2 G3V1 G3V2 G3V3 G3V4ECS 
    R5 & 
    later 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Large Business Communications Systems Security Tools by Release 
    Page I-8  
    I
    Recent Change 
    History Report‘‘Recent Change 
    History Report 
    (DEFINITY ECS 
    and DEFINITY G1 
    and G3 only)’’ on 
    page 3-61
    x x xxxx
    Remote Access 
    Authorization 
    Code Dial Tone‘‘
    Remote Access 
    Dial Tone’’ on page 
    3-8
    R1V3 x x xxxx
    Remote Access 
    Kill After “N” 
    Attempts‘‘
    Administering 
    Remote Access 
    Kill After N 
    Attempts’’ on page 
    D-6
    xxx
    Remote User 
    Administration of 
    Call Coverage‘‘
    Remote User 
    Administration of 
    Call Coverage’’ on 
    page 3-23
    x
    Restrict Changes 
    to Administration 
    Objects‘‘
    Require 
    Passwords’’ on 
    page 3-24
    ‘‘Forced Password 
    Aging and 
    Administrable 
    Logins’’ on page 
    3-47
    xxxx
    Restricting 
    Incoming Tie 
    Trunks‘‘
    Restricting 
    Incoming Tie 
    Trunks’’ on page 
    3-19
    xx
    Restrictions; 
    Individual and 
    Group-
    Controlled‘‘
    Restrictions — 
    Individual and 
    Group-Controlled 
    (DEFINITY ECS, 
    DEFINITY G1, G3, 
    and System 75)’’ 
    on page 3-18
    x x x xxxx
    Security Violations 
    Measurement 
    Report‘‘
    Security Violations 
    Measurement 
    Report’’ on page 
    3-56
    xxxxxxxxx
    Table I-1. Large Business Communications Systems Security Tools by Release — 
    Feature See Section/Page S75 S85 G1 G2 G3V1 G3V2 G3V3 G3V4ECS 
    R5 & 
    later 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Large Business Communications Systems Security Tools by Release 
    Page I-9  
    I
    Security Violation 
    Notification 
    Feature‘‘Security Violation 
    Notification Feature 
    (DEFINITY ECS 
    and DEFINITY G3 
    only)’’ on page 
    3-53
    x xxxx
    Service Observing‘‘
    Service 
    Observing’’ on 
    page 3-63
    xxxxxxxxx
    Station 
    Restrictions‘‘
    Station 
    Restrictions’’ on 
    page 3-17
    xxxxxxxxx
    Status Remote 
    Access‘‘
    Adding Customer 
    Logins and 
    Assigning Initial 
    Password’’ on page 
    D-13
    xx
    SVN Referral Call 
    With 
    Announcements‘‘
    Security Violation 
    Notification Feature 
    (DEFINITY ECS 
    and DEFINITY G3 
    only)’’ on page 
    3-53
    xxx
    Terminal 
    Translation 
    Initialization‘‘
    Use Terminal 
    Translation 
    Initialization’’ on 
    page 3-42
    G3rxxxx
    Toll Analysis‘‘
    Toll Analysis (G3 
    only)’’ on page 
    3-16
    ‘‘Toll Analysis’’ on 
    page 5-7
    ‘‘Toll Analysis’’ on 
    page 6-5
    x xxxx
    Table I-1. Large Business Communications Systems Security Tools by Release — 
    Feature See Section/Page S75 S85 G1 G2 G3V1 G3V2 G3V3 G3V4ECS 
    R5 & 
    later 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Large Business Communications Systems Security Tools by Release 
    Page I-10  
    I
    Traffic 
    Measurements 
    and Performance‘‘Traffic 
    Measurements 
    and Performance’’ 
    on page 3-49
    ‘‘SAT, Manager I, 
    and G3-MT 
    Reporting’’ on page 
    5-13
    ‘‘SAT, Manager I, 
    and G3-MT 
    Reporting’’ on page 
    6-10
    xxxxxxxxx
    Trunk 
    Administration‘‘
    Trunk 
    Administration’’ on 
    page 3-8
    xxxxxxxxx
    Trunk-to-Trunk 
    Transfer‘‘
    Disable Transfer 
    Outgoing Trunk to 
    Outgoing Trunk’’ on 
    page 3-40
    xxxxxxxxx
    Trunk-to-Trunk 
    Transfer (all 
    trunks) ‘‘
    Disallow 
    Trunk-to-Trunk 
    Transfer’’ on page 
    3-39
    xxx
    Void Customer 
    Passwords‘‘
    Require 
    Passwords’’ on 
    page 3-24
    R1V2
    R1V3x x xxxx
    World Class 
    Routing‘‘
    Known Toll Fraud 
    Activity’’ on page 
    1-3
    ‘‘World Class 
    Routing 
    (DEFINITY ECS 
    and DEFINITY 
    G2.2 and G3 only)’’ 
    on page 3-20
    ‘‘Use World Class 
    Routing 
    Restrictions 
    (DEFINITY G2.2 
    and G3 only)’’ on 
    page 3-44
    G2.2 all 
    except 
    G3iV1xxxx
    Table I-1. Large Business Communications Systems Security Tools by Release — 
    Feature See Section/Page S75 S85 G1 G2 G3V1 G3V2 G3V3 G3V4ECS 
    R5 & 
    later 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Page GL-1
    Glossary 
     
    GL
    Glossary
    A
    AAR
    Automatic Alternate Routing 
    ACA
    Automatic Circuit Assurance
    ACD
    Automatic Call Distribution
    ADAP
    AUDIX Data Acquisition Package 
    AFRL
    Alternate Facility Restriction Level
    AMIS
    Audio Messaging Interface Specification 
    ANI
    Automatic Number Identification
    APLT
    Advanced Private Line Termination
    ARS
    Automatic Route Selection, replaced by WCR in DEFINITY G2.2
    AUDIX
    Audio Information Exchange
    AVP
    AUDIX Voice Power
    Access
    The act of entering into a PBX system.
    Account Code
    A number (1 to 15 digits) that can be required when originating toll calls or WCR network calls.
    Adjunct
    Equipment that connects to a PBX port and interacts with the PBX system to provide a service, 
    such as voice mail, automated attendant, and call traffic reporting.
    Administer
    Access or change the parameters associated with the services or features of the PBX system.
    Alternate Facility Restriction Level
    Sets time-dependent limits on access to routing patterns.
    AMIS Analog Networking
    An AUDIX Voice Mail System feature that connects the AUDIX Voice Mail System to other voice 
    mail systems to exchange messages. Call Delivery is a service of AMIS Analog Networking. 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Glossary 
    Page GL-2  
    ARS Dial Tone
    The dial tone callers hear after they enter the ARS feature access code.
    Attendant
    The operator of the console.
    Attendant Console
    An electronic call-handling position with push-button control. Used by attendants to answer and 
    place calls and to manage and monitor some of the PBX operations.
    AUDIX Voice Mail System 
    A Lucent Technologies adjunct that provides voice mail and automated attendant services.
    Authorization Code
    A security code used with Remote Access to prevent unauthorized access or egress. A dialed code 
    that can raise the Facility Restriction Level or Class of Restriction (COR) of the trunk used to place 
    an outgoing call. An authorization code can also be used in preference to or in combination with a 
    barrier code to protect against unauthorized use of Remote Access trunks.
    Automated Attendant
    Adjunct equipment that performs the services of an attendant, such as directing calls to individuals 
    or departments.
    Automatic Circuit Assurance
    Detects short and long holding times and visually notifies a designated station when corresponding 
    thresholds are exceeded.
    B
    BCMS
    Basic Call Management System
    Barrier Code
    A security code used with the Remote Access feature to help prevent unauthorized access.
    Basic Call Transfer
    A type of transfer where the AUDIX Voice Mail System validates that the number of digits entered 
    matches the length of extensions in the dial plan, and then transfers the call to the switch before 
    disconnecting.
    BCMS Measurements
    Reports traffic patterns for measured trunk groups.
    C
    CAS
    Centralized Attendant Service, Call Accounting System
    CDR
    Call Detail Recording 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Glossary 
    Page GL-3  
    Call Forwarding
    A set of features that allow calls destined for an extension to be redirected to another extension, 
    designated during activation.
    Call Forwarding All Calls (Follow Me)
    A feature that allows calls destined for an extension to be redirected to another extension, 
    designated during activation, regardless of the busy or idle state of the called extension. Intended to 
    redirect calls to the called party when he or she is away from his or her desk.
    Call Forwarding (Off Net)
    A function of the Call Forwarding Follow Me feature that allows a user to forward all calls to a 
    telephone in the public network.
    Call Forward Off/On-Net
    A function of the Call Forwarding Follow Me feature that allows a user to call forward outside the 
    switch (Off-Net), or inside AND outside the switch to non-toll locations (Off/On-Net).
    CMS
    Call Management System
    CO
    Central Office
    COR
    Class of Restriction
    COS
    Class of Service
    CSM
    Centralized System Management
    Call Detail Recording
    Records call information when specified trunk groups are used for the call.
    Called Party Restrictions
    The calling privileges or restrictions that can be placed on the receiving station or trunk.
    Calling Party Restrictions
    The calling privileges or restrictions that can be placed on the originating station or trunk.
    Call Management System
    An adjunct processor that collects data from an ACD and generates reports to be stored or 
    displayed regarding status of agents, splits, and trunks.
    Call Vector
    A set of commands to be performed for an incoming or internal call. See 
    Call Vectoring.
    Call Vectoring
    Directs incoming and internal calls to various destinations: on- or off-premises destinations, a hunt 
    group or split, or a specific call treatment, such as an announcement, forced disconnect, forced 
    busy, or delay treatment. Calls access these destinations, or vectors, through Vector Directory 
    Numbers (VDNs).
    Central Office
    The location housing the telephone switching equipment that provides local telephone service and 
    access to toll facilities for long-distance calls. 
    						
    							BCS Products
    Security Handbook  
    555-025-600  Issue 6
    December 1997
    Glossary 
    Page GL-4  
    Class of Restriction
    A number (0 through 63) that specifies the calling privileges and limitations assigned to stations, 
    Remote Access users, and trunk groups. For DEFINITY G3rV1, G3i-Global, and G3V2 and later, 
    CORs have been increased to 96; thus, the number is 0 through 95.
    Class of Service
    For DEFINITY G2 and System 85, specifies the calling privileges and limitations assigned to the 
    station. For DEFINITY ECS, DEFINITY G1, G3, and System 75, a number (0 through 15) that 
    specifies if users can activate Automatic Callback, Call Forwarding, Console Permissions, Data 
    Privacy, and Priority Calling features. For G3V2 and later, also specifies additional COR feature 
    restrictions.
    CMS Measurements
    Measures traffic patterns and time on calls to compare them with preset traffic counts and time limit 
    thresholds.
    Coverage Path
    The order in which calls are redirected to alternate answering positions.
    Customer Premises Equipment-Based System
    A customer’s PBX, voice mail, or voice processing system.
    D
    DAC
    Dial Access Code (see 
    Trunk Access Code)
    DCS
    Distributed Communications System
    DDD
    Direct Distance Dialing
    DID
    Direct Inward Dialing
    DISA
    Direct Inward System Access
    Digit Conversion
    A process used to convert specific dialed numbers into other dialed numbers.
    Direct Inward Dialing
    Allows an incoming call from the public network (not FX or WATS) to reach a specific telephone 
    without attendant assistance. DID calls to DID-restricted telephone lines are routed to an attendant 
    or recorded announcement, depending on the option selected.
    E
    EPSCS
    Enhanced Private Switched Communications Service 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies BCS Products Security Handbook