Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual
Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual
Here you can view all the pages of manual Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 341
Enhancing system security 317 11 DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 11 Enhancing system security Toll fraud is the theft of long distance service and can come from both internal and external sources. When toll fraud occurs, your company is responsible for usage charges. In addition, unauthorized use may tie up your system, preventing your customers from reaching you and your employees from doing business. Lucent Technologies designed the DEFINITY ECS to...
Page 342
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 318 Basic security 11 Basic security Keeping your system secure The following is a partial list you can use to help secure your system. It is not intended as a comprehensive security checklist. Refer to the BCS Products Security Handbook for more information about these and other security-related features. nSecure the system administration and maintenance ports and/or logins on DEFINITY ECS...
Page 343
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 319 Preventing toll fraud 11 Preventing toll fraud Top 15 tips to help prevent toll fraud 1. Protect system administration access Make sure secure passwords exist for all logins that allow System Administration or Maintenance access to the system. Change the passwords frequently. Set logoff notification and forced password aging when administering logins. You must assign passwords for these...
Page 344
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 320 Preventing toll fraud 11 7. Protect access to information stored as voice Password restrict access to voice mail mailboxes. Use non-trivial passwords and change passwords regularly. 8. Provide physical security for telecommunications assets Restrict unauthorized access to equipment rooms and wire connection closets. Protect system documentation and reports data from being compromised. 9....
Page 345
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 321 Physical security 11 14.Callers misrepresenting themselves as the “phone company,” “AT&T,” “RBOCS,” or even known employees within your company may claim to be testing the lines and ask to be transferred to “900,” “90,” or ask the attendant to do “start 9 release.” This transfer reaches an outside operator, allowing the unauthorized caller to place a long distance or international call....
Page 346
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 322 System security checklist 11 System security checklist Here’s some of the steps required for indemnification. Use these to analyze your system security. 1. Remove all default factory logins of cust, rcust, browse, nms, and bcms and assign unique logins with 7-character alphanumeric passwords and a 90-day password aging. Use the list logins command to find out what logins are there. 2. If...
Page 347
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 323 System security checklist 11 4. If you use Remote Access to process calls off-net or in any way access the public network: a. Use a 7-digit barrier code. b. Assign a unique COR to the barrier code. c. Restrict the COR assigned to each barrier code by FRL level to only the required calling areas to conduct business. d. Set the aging cycle to 90 days with 100 call limit per barrier code. e....
Page 348
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 324 System security checklist 11 c.If the vector has a “route-to” step that routes the call to a remote switch via AAR, assign a unique COR with a unique ARS/AAR Partition Group, the lowest FRL to complete an AAR call, and n on all unique COR assigned to your public network trunking facilities on the Calling Permissions. Assign the appropriate AAR route patterns on the AAR Partition Group...
Page 349
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 325 System security checklist 11 8. If loop start trunks are administered in the switch and cannot be changed by the Local Exchange Company, block all class of service from forwarding calls off-net. In the Class of Service screen, Restriction Call Fwd-Off Net field, set to y for the 16 (0-15) COS numbers. Refer to ‘‘ Class of Service’’ on page 545 for more information. NOTE: If a station is...
Page 350
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 326 System security checklist 11 14. Assign all trunk groups or same trunk group types a unique Class of Restriction. If the trunk group does not require networking through your switch, administer the Class of Restriction of the trunk group where the FRL is 0, the Calling Party Restriction field is outward, and all unique Class of Restriction assigned to your outgoing trunk groups are n....