Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide
Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide
Here you can view all the pages of manual Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 331
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Enhancing system security 307 Preventing toll fraud 11 Set logoff notification and forced password aging when administering logins. You must assign passwords for these logins at setup time. Establish well-controlled procedures for resetting passwords. 2. Prevent voice mail system transfer to dial tone Activate “secure transfer” features in voice mail systems. Place appropriate restrictions on voice mail access/egress...
Page 332
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Enhancing system security 308 Preventing toll fraud 11 9. Monitor traffic and system activity for abnormal patterns Activate features that “turn off” access in response to unauthorized access attempts. Use Traffic and Call Detail reports to monitor call activity levels. 10. Educate system users to recognize toll fraud activity and react appropriately From safely using calling cards to securing voice mailbox password,...
Page 333
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Enhancing system security 309 Physical security 11 conducted at public payphones located in subways, shopping malls, or airport locations. Refer to ‘‘ Remote Access’’ on page 857 to prevent this happening to your company. Physical security Physical security is your responsibility. Implement the following safeguards as an added layer of security: 1. Unplug and secure attendant console handsets when the attendant position...
Page 334
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Enhancing system security 310 System security checklist 11 To disable Remote Access, on the Remote Access screen, Permanently Disable field, type y. Refer to ‘‘Remote Access’’ on page 857 for more information on remote access. NOTE: Lucent recommends that you permanently disable Remote Access using the change remote-access command. If you do permanently disable Remote Access, the code is removed from the software....
Page 335
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Enhancing system security 311 System security checklist 11 5. If you use vectors: a. Assign all Vector Directory Numbers (VDN) a unique COR. Refer to DEFINITY ECS Guide to ACD Call Centers for more information. NOTE: The COR associated with the VDN dictates the calling privileges of the VDN/vector. High susceptibility to toll fraud exists on vectors that have “collect digits” steps. When a vector collects digits, it...
Page 336
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Enhancing system security 312 System security checklist 11 6. On the Feature Access Code screen, Facility Test Calls Access Code, the Data Origination Access Code, and the Data Privacy Access Code fields, change from the default or remove them. NOTE: These codes, when dialed, return system dial tone or direct access to outgoing trunking facilities. Transfers to these codes can take place via an unsecured vector with...
Page 337
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Enhancing system security 313 System security checklist 11 Tip: You can use the list route-pattern print command to print a copy of your facility restriction levels (FRL) and check their status. 11. On all trunk group screens, set the Dial Access field to n. If set to y, it allows users to dial Trunk Access Codes, thus bypassing all the ARS call screening functions. Refer to ‘‘ Trunk Group’’ on page 967 for more...
Page 338
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Enhancing system security 314 Adding logins and passwords 11 16. Lucent recommends you administer the following on all voice mail ports: nAssign all voice mail ports a unique Class of Restriction. Refer to ‘‘ Class of Restriction’’ on page 520 for more information. nIf you are not using outcalling, fax attendant, or networking, administer the unique Class of Restriction where the FRL is 0, the Calling Party Restriction...
Page 339
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Enhancing system security 315 Adding logins and passwords 11 Instructions We will add the login angi3 with the password b3stm0m. We also will require the user to change their password every 30 days. To add new logins and passwords: 1. Type add login angi3 and press RETURN. The Login Administration screen appears. The Login’s Name field shows the name you typed in the add command. 2. In the Password of Login Making...
Page 340
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Enhancing system security 316 Adding logins and passwords 11 8. Type change permissions angi3 and press RETURN. The Command Permission Categories screen appears. 9. In the Administer Stations field, type y. This allows your user to add, change, duplicate, or remove stations, data modules and associated features. 10. In the Additional Restrictions field, type y. A y in this field brings up the second and third pages of...