Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide
Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide
Have a look at the manual Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
![](/img/blank.gif)
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Setting up telecommuting 297 Setting up remote access 10 Associating your office phone number to the home station To associate your phone number: 1. On your home station, type #4. This is the associate feature access code. 2. Type 4321 and press #. This is your extension number. 3. Type 1996 and press #. This is your password. Disassociating your home station To disassociate your home station: 1. Press HOLD four times. Related topics Refer to ‘‘ Configuring DEFINITY ECS for telecommuting’’ on page 285 for step-by-step instructions on how to configure your office equipment. Refer to ‘‘ Training users’’ on page 301 for step-by-step instructions on how to use your home station. Setting up remote access Remote Access permits a caller located outside the system to access the switch through the public or private network and then use the features and services of the system. Remote Access users can dial into the system using central office (CO), Foreign Exchange (FX), Wide Area Telecommunications trunks (WATS), and Integrated Services Digital Network Primary Rate Interface (ISDN-PRI) trunks. In addition, a dedicated Remote Access Direct Inward Dialing number can be provided. !SECURITY ALERT: Lucent Technologies has designed the Remote Access feature incorporated in this product that, when properly administered by the customer, will enable the customer to minimize the ability of unauthorized persons to gain access to the network. It is the customer’s responsibility to take the appropriate steps to properly implement the features, evaluate and administer the various restriction levels, protect access codes and distribute them only to
![](/img/blank.gif)
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Setting up telecommuting 298 Setting up remote access 10 individuals who have been advised of the sensitive nature of the access information. Each authorized user should be instructed concerning the proper use and handling of access codes. In rare instances, unauthorized individuals make connections to the telecommunications network through use of remote access features. In such an event, applicable tariffs require that the customer pay all network charges for traffic. Lucent Technologies cannot be responsible for such charges, and will not make any allowance or give any credit for charges that result from unauthorized access. If you do not intend to use Remote Access now or in the future, you can permanently disable the feature. If you do decide to permanently disable the feature, it will require Lucent Services intervention to activate the feature again. Before you start Configure the Incoming Destination and Night Service fields on the CO trunk screen. For information about configuring a CO trunk, refer to ‘‘ Adding a CO, FX, or WATS trunk group’’ on page 340. Verify that the Authorization Codes field on the System Parameters Customer Options screen is set to y. Verify that the SVN Authorization Code Violation Notification Enabled field on the Security-Related System Parameters screen is set to y. Instructions Setting up remote access In our example, we set up a remote access extension with maximum security. This assists you in blocking unauthorized people from gaining access to your network. To set up remote access: 1. Type change remote-access and press RETURN. The Remote Access screen appears.
![](/img/blank.gif)
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Setting up telecommuting 299 Setting up remote access 10 2. Type 1234 in the Remote Access Extension field. This is the extension specified in the Incoming Destination field on the CO trunk screen. 3. Type 7 in the Barrier Code Length field. This is the number of digits your barrier code must be when entered. 4. Type y in the Authorization Code Required field. This means you must also enter an authorization code when you access the system’s Remote Access facilities. For information about setting up access codes, refer to ‘‘ Setting up authorization codes’’ on page 331. 5. Type y in the Remote Access Dial Tone field. This means you hear dial tone as a prompt to enter your authorization code. 6. Type 1234567 in the Barrier Code field. This is the 7-digit barrier code you must enter to access the system’s Remote Access facilities. 7. Type 1 in the COR field. This is the class of restriction (COR) number associated with the barrier code that defines the call restriction features. 8. Type 1 in the TN field. This is the Tenant Partition (TN) number. 9. Type 1 in the COS field. This is the class of service (COS) number associated with the barrier code that defines access permissions for Call Processing features. REMOTE ACCESS Remote Access Extension 1234___ Barrier Code Length 7__ Authorization Code Required? y Remote Access Dial Tone: y Barrier Code COR TN COS Expiration Date No. of Calls Calls Used 1:1234567 1__ 1_ 1__ 01/01/99 ______ ______ 2:________ 1__ 1_ 1__ __/__/__ ______ ______ 3:________ 1__ 1_ 1__ __/__/__ ______ ______ 4:________ 1__ 1_ 1__ __/__/__ ______ ______ 5:________ 1__ 1_ 1__ __/__/__ ______ ______ 6:________ 1__ 1_ 1__ __/__/__ ______ ______ 7:________ 1__ 1_ 1__ __/__/__ ______ ______ 8:________ 1__ 1_ 1__ __/__/__ ______ ______ 9:________ 1__ 1_ 1__ __/__/__ ______ ______ 10:_______ 1__ 1_ 1__ __/__/__ ______ ______ Permanently Disable? __ Disable Following A Security Violation? y (NOTE: You must logoff to effect permanent disabling of Remote Access)
![](/img/blank.gif)
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Setting up telecommuting 300 Setting up remote access 10 10. Type 01/01/99 in the Expiration Date field. This is the date the barrier code expires. A warning message is displayed on the system copyright screen seven days before the expiration date. The system administrator can modify the expiration date to extend the time interval, if necessary. 11. Type y in the Disable Following A Security Violation field. This disables the remote access feature following detection of a remote access security violation. 12. Press ENTER to save your work. Disabling remote access permanently To disable remote access permanently: 1. Type change remote-access and press RETURN. The Remote Access screen appears. 2. Type y in the Permanently Disable field. If you permanently disable this feature, it requires Lucent Services intervention to reactivate the feature. There is a charge for reactivation of this feature. 3. Press ENTER to save your work. !CAUTION: Your attempt to disable the Remote Access feature will be lost if the switch is rebooted without saving translations. Therefore, execute a save translation command after permanently disabling the Remote Access feature. More information Remote Access provides you with access to the system and its features from the public network. This allows you to make business calls from home or use Recorded Telephone Dictation Access to dictate a letter. If authorized, you can also access system features from any on-site extension. With Remote Access you can dial into the system using Direct Inward Dialing (DID), Central Office (CO), Foreign Exchange (FX), or 800 Service trunks. When a call comes in on a trunk group dedicated to Remote Access, the system routes the call to the Remote Access extension you have assigned. If DID is provided and the Remote Access extension is within the range of numbers that can be accessed by DID, Remote Access is accessed through DID.
![](/img/blank.gif)
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Setting up telecommuting 301 Training users 10 Barrier codes provide your system security and define calling privileges through the administered COR. You can administer up to 10 barrier codes, each with a different COR and COS. Barrier codes can be from 4 to 7 digits, but all codes must be the same length. You can also require that users enter an authorization code to use this feature. Both barrier codes and authorization codes are described under ‘‘ Setting up authorization codes’’ on page 331. Related topics Refer to ‘‘ Remote Access’’ on page 857 for information about and field descriptions on the Remote Access screen. Refer to ‘‘ Remote Access’’ on page 1466 for a description of the Remote Access feature. Training users DEFINITIY ECS allows you to associate and disassociate PSA, change the coverage path for your station, change the extension to which you forward your calls, and change your personal station’s security code. Before you start Configure PSA. For information about configuring PSA, refer to ‘‘ Setting up Personal Station Access’’ on page 287 Assign two coverage options for your system. For information on how to assign coverage options, refer to ‘‘ Assigning coverage options’’ on page 291. Configure call forwarding for your system. For information about configuring call forwarding, refer to ‘‘ Setting up call forwarding’’ on page 292. Configure security codes for a station. For information about configuring personal station security codes, refer to ‘‘ Assigning an extender password’’ on page 294.
![](/img/blank.gif)
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Setting up telecommuting 302 Training users 10 Instructions Associating PSA In this example, we associate PSA (preferences and permissions) assigned to your station with another compatible terminal. To associate PSA: 1. Dial #4. This is the associate PSA feature access code. You hear dial tone. 2. Type 1234 and press #. This is your extension. 3. Type 4321 and press #. This is your Station Security Code. You hear a confirmation tone. Disassociating PSA In our example, we disassociate PSA from the station you are using. To disassociate PSA: 1. Dial #3. This is the disassociate PSA feature access code. You are no longer PSA associated to this station. Changing a coverage option In this example, we change the coverage option from path 1 to path 2 from a remote location. To change a coverage option: 1. Dial 1234. This is the extension you configured for telecommuting. You hear dial tone. 2. Dial #9 and press #. This is the feature access code you set for changing a coverage path. You hear dial tone. 3. Dial 4321 and press #. This is the extension for which you want to change the coverage path.
![](/img/blank.gif)
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Setting up telecommuting 303 Training users 10 4. Dial 87654321 and press #. This is the extension security code. 5. Dial 2. This is the new coverage path. You hear confirmation tone. Changing call forwarding In this example, we change call forwarding to extension 1235. To change call forwarding: 1. Dial 1234. This is the extension you configured for telecommuting. 2. Dial #8 and press #. This is the feature access code you set for activating extended call forward. You hear dial tone. 3. Dial 4321and press #. This is the extension from which you want to forward calls. 4. Dial 87654321 and press #. This is the extension security code. You hear dial tone. 5. Dial 1235. This is the extension to which you want to forward calls. You hear the confirmation tone. Changing your personal station security codes In this example, we change the security code for extension 1235 from 98765432 to 12345678. To change your security code: 1. Dial #5. This is the feature access code you set for changing your security code. You hear dial tone. 2. Dial 1235 and press #. This is the extension for which you want to change the security code. 3. Dial 98765432 and press #. This is the current security code for the extension. You hear dial tone.
![](/img/blank.gif)
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Setting up telecommuting 304 Training users 10 4. Dial 12345678 and press #. This is the new security code. Security codes can be 4- to 8-digits long. 5. Dial 12345678 and press #. This is to confirm your new security code. You hear the confirmation tone. NOTE: If you cannot change your security code, Manager 1 can clear the problem using the Clear Audit Summary command. Interrupting the command sequence for personal station security codes To interrupt the command sequence for personal station security codes: 1. To interrupt the command sequence before step 3, choose one of these options: nHang up or press the disconnect or recall button before hearing intercept tone in step 3. The system does not log an invalid attempt. You must restart the process at step 1. nType * before the second # in step 3. You must begin the change sequence at the point of entering your extension in step 2. (You should not enter the FAC again.) nType * after the FAC has been entered and before the final #. You must restart the process at step1. 2. To interrupt the command sequence after step 3, type * in steps 4 or 5, you must begin the change sequence at the point of entering the new SSC in step 4. If you hear intercept tone in any step, the command sequence has been invalidated for some reason and you must restart the process at step 1. If you hear intercept tone after step 3, the system logs an invalid attempt via the Security Violation Notification (SVN) feature. This is true even if you attempt to interrupt the change sequence with an asterisk.
![](/img/blank.gif)
Enhancing system security 305 11 DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 11 Enhancing system security Toll fraud is the theft of long distance service and can come from both internal and external sources. When toll fraud occurs, your company is responsible for usage charges. In addition, unauthorized use may tie up your system, preventing your customers from reaching you and your employees from doing business. Lucent Technologies designed the DEFINITY ECS to help you to limit toll fraud. However, there are steps that you, as the administrator, must also take to keep your system secure from unauthorized use. Need help quickly? nFor assistance with toll fraud prevention (including systems and products), call the Lucent Technologies Toll Fraud Intervention Hotline at 800-643-2353 or contact your Lucent representative. nIf you have identified fraudulent calling in progress, and require assistance in stopping the fraud, call the Lucent Technologies Technical Service Center at 800-242-2121 and select the toll fraud help option or contact your Lucent representative.
![](/img/blank.gif)
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1 April 2000 Enhancing system security 306 Basic security 11 Basic security Keeping your system secure The following is a partial list you can use to help secure your system. It is not intended as a comprehensive security checklist. Refer to the BCS Products Security Handbook for more information about these and other security-related features. nSecure the system administration and maintenance ports and/or logins on DEFINITY ECS using the Access Security Gateway. This optional password authentication interface program is provided to customers with maintenance contracts. nActivate Security Violation Notification to report unsuccessful attempts to access the system. Security Violation Notification lets you automatically disable a valid login ID following a security violation involving that login ID and disable remote access following a security violation involving a barrier code or authorization code. nUse the list history command to determine if unauthorized changes have been made to the system. To assist in identifying unauthorized use of the system, the History report lists each time a user logs on or off the system. Refer to the DEFINITY ECS Reports for more information about this report. nSecure trunks using Automatic Route Selection, Class of Restriction, Facility Restriction Levels and Alternate Facility Restriction Levels, Authorization Codes, Automatic Circuit Assurance, and Forced Entry of Account Codes (refer to ‘‘ Call Detail Recording’’ on page 1221 for more information). nActivate Enhanced Call Transfer for your voice messaging system, if available. This limits transfers to valid extensions, but you also need to restrict transfers to extensions that may offer dial tone to the caller, such as screen extensions. Preventing toll fraud Top 15 tips to help prevent toll fraud 1. Protect system administration access Make sure secure passwords exist for all logins that allow System Administration or Maintenance access to the system. Change the passwords frequently.