Home > Lucent Technologies > Communications System > Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide

Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide

Here you can view all the pages of manual Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 351

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1
April 2000
Enhancing system security 
327 Using busy verify 
11
Using busy verify
This section shows you how to use Busy Verify (also known as Busy Verification) 
to help find fraud problems.
When you suspect toll fraud, you can interrupt the call on a specified trunk group 
or extension number and monitor the call in progress. Callers will hear a long tone 
to indicate the call is being monitored.
!SECURITY ALERT:
Listening to someone...

Page 352

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1
April 2000
Enhancing system security 
328 Setting up security violations notification 
11
2. In the Feature Button Assignments area, type verify.
3. Press 
ENTER to save your changes.
4. To activate the feature, press the 
VERIFY button on the phone and then enter 
the Trunk Access Code and member number to be monitored.
Setting up security violations 
notification
This section shows you how to use Security Violations Notification (SVN)...

Page 353

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1
April 2000
Enhancing system security 
329 Setting up security violations notification 
11
2. In the SVN Login Violation Notification Enabled field, type y.
This sets Security Violations Notification login violation notification.
3. In the Originating Extension field, type 
3040.
This becomes the phone extension for the purpose of originating and 
identifying SVN referral calls for login security violations.
4. In the Referral...

Page 354

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1
April 2000
Enhancing system security 
330 Setting up security violations notification 
11
9. In the Disable Following A Security Violation field, type y.
This disables Remote Access following detection of a remote access 
security violation.
10. Press 
ENTER to save your changes.
11. Type 
change station xxxx and press RETURN, where xxxx is the station to 
be assigned the notification halt button.
The Station
 screen appears....

Page 355

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1
April 2000
Enhancing system security 
331 Setting up authorization codes 
11
12. In the Feature Button Assignments section, type one of the following:
nasvn-halt — The Authorization Code Security Violation 
Notification call is activated when an authorization code security 
violation is detected. This applies only if you are using authorization 
codes.
nlsvn-halt — The Login Security Violation Notification call is 
activated a referral...

Page 356

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1
April 2000
Enhancing system security 
332 Setting up authorization codes 
11
Instructions
1. Type 
change system-parameters features and press RETURN.
The Feature-Related System Parameters
 screen appears.
2. In the Authorization Code Enabled field, type 
y.
This enables the Authorization Codes feature on a system-wide basis.
3. In the Authorization Code Length field, type 
7.
This defines the length of the Authorization Codes your...

Page 357

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1
April 2000
Enhancing system security 
333 Setting up authorization codes 
11
8. Type change authorization-code nnnn and press RETURN, where nnnn is 
the authorization code.
The Authorization Code — COR Mapping
 screen appears.
9. In the AC field, enter the authorization code your users must dial.
In our example, type 
4285193. The number of digits entered must agree 
with the number assigned in the Feature-Related System Parameters...

Page 358

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1
April 2000
Enhancing system security 
334 Dealing with security violations 
11
Refer to ‘‘Facility restriction levels and traveling class marks’’ on page 1338 and 
‘‘
Route Pattern’’ on page 865 for more information on assigning Facility 
Restriction Levels.
Refer to ‘‘
Call Detail Recording’’ on page 1221 and ‘‘Station’’ on page 882 for 
more information on using Call Detail Recording on station phones.
Refer to ‘‘
Class of...

Page 359

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1
April 2000
Enhancing system security 
335 Dealing with security violations 
11
Disabling remote access 
There may be occasions when you have to disable remote access for one of your 
users because of a security violation.
1. Log in to the switch using a login ID with the correct permissions.
2. Type 
disable remote-access and press RETURN. 

Page 360

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1
April 2000
Enhancing system security 
336 Dealing with security violations 
11 
Start reading Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide

Related Manuals for Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide

All Lucent Technologies manuals