Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual
Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual
Here you can view all the pages of manual Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 361
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 337 Changing login permissions 11 This screen contains the following fields: nDate — Contains the date of the session establishment or rejection. For example, the date displays in the mm/dd format where mm = month and dd = day. nTime — Contains the time of the session establishment or rejection. For example, the time displays in the hh/mm format where hh = hour and mm = minute. nPort —...
Page 362
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 338 Changing login permissions 11 Instructions We will change the login permissions of angi3. To change login permissions: 1. Type change permissions angi3 and press RETURN. The Command Permission Categories screen appears. 2. In the Administer Stations field, type y. This allows your user to add, change, duplicate, or remove stations, data modules and associated features. 3. In the...
Page 363
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 339 Changing passwords 11 Changing passwords This section shows you how to change a user’s password. Instructions We will change the password for login angi3 to g3or5e. To change passwords: 1. Type change password angi3 and press RETURN. The Password Administration screen appears. 2. In the Password of Login Making Change field, type your password to change any field on this screen. We’ll type...
Page 364
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 340 Using busy verify 11 Using busy verify This section shows you how to use Busy Verify (also known as Busy Verification) to help find fraud problems. When you suspect toll fraud, you can interrupt the call on a specified trunk group or extension number and monitor the call in progress. Callers will hear a long tone to indicate the call is being monitored. !SECURITY ALERT: Listening to someone...
Page 365
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 341 Setting up security violations notification 11 2. In the Feature Button Assignments area, type verify. 3. Press ENTER to save your changes. 4. To activate the feature, press the VERIFY button on the phone and then enter the Trunk Access Code and member number to be monitored. Setting up security violations notification This section shows you how to use Security Violations Notification...
Page 366
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 342 Setting up security violations notification 11 Instructions To set up security violations notification: 1. Type change system-parameters security and press RETURN. The Security-Related System Parameters screen appears. 2. In the SVN Login Violation Notification Enabled field, type y. This sets Security Violations Notification login violation notification. 3. In the Originating Extension...
Page 367
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 343 Setting up security violations notification 11 7. Press ENTER to save your changes. NOTE: The following 3 steps are optional. If you are not using Remote Access, go to step 11 . 8. Type change remote-access and press RETURN. The Remote Access screen appears. 9. In the Disable Following A Security Violation field, type y. This disables Remote Access following detection of a remote access...
Page 368
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 344 Setting up authorization codes 11 12. In the Feature Button Assignments section, type one of the following: nasvn-halt — The Authorization Code Security Violation Notification call is activated when an authorization code security violation is detected. This applies only if you are using authorization codes. nlsvn-halt — The Login Security Violation Notification call is activated a referral...
Page 369
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 345 Setting up authorization codes 11 Instructions 1. Type change system-parameters features and press RETURN. The Feature-Related System Parameters screen appears. 2. In the Authorization Code Enabled field, type y. This enables the Authorization Codes feature on a system-wide basis. 3. In the Authorization Code Length field, type 7. This defines the length of the Authorization Codes your...
Page 370
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 346 Setting up authorization codes 11 8. Type change authorization-code nnnn and press RETURN, where nnnn is the authorization code. The Authorization Code — COR Mapping screen appears. 9. In the AC field, enter the authorization code your users must dial. In our example, type 4285193. The number of digits entered must agree with the number assigned in the Feature-Related System Parameters...