Home > Lucent Technologies > Communications System > Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual

Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual

Here you can view all the pages of manual Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 361

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1.1
June 2000
Enhancing system security 
337 Changing login permissions 
11
This screen contains the following fields:
nDate — Contains the date of the session establishment or rejection. For 
example, the date displays in the mm/dd format where mm = month and  
dd = day.
nTime — Contains the time of the session establishment or rejection. For 
example, the time displays in the hh/mm format where hh = hour and mm = 
minute.
nPort —...

Page 362

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1.1
June 2000
Enhancing system security 
338 Changing login permissions 
11
Instructions
We will change the login permissions of 
angi3.
To change login permissions:
1. Type 
change permissions angi3 and press RETURN.
The Command Permission Categories
 screen appears.
2. In the Administer Stations field, type 
y.
This allows your user to add, change, duplicate, or remove stations, data 
modules and associated features.
3. In the...

Page 363

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1.1
June 2000
Enhancing system security 
339 Changing passwords 
11
Changing passwords
This section shows you how to change a user’s password.
Instructions
We will change the password for login 
angi3 to g3or5e.
To change passwords:
1. Type 
change password angi3 and press RETURN.
The Password Administration screen appears.
2. In the Password of Login Making Change field, type your password to 
change any field on this screen.
We’ll type...

Page 364

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1.1
June 2000
Enhancing system security 
340 Using busy verify 
11
Using busy verify
This section shows you how to use Busy Verify (also known as Busy Verification) 
to help find fraud problems.
When you suspect toll fraud, you can interrupt the call on a specified trunk group 
or extension number and monitor the call in progress. Callers will hear a long tone 
to indicate the call is being monitored.
!SECURITY ALERT:
Listening to someone...

Page 365

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1.1
June 2000
Enhancing system security 
341 Setting up security violations notification 
11
2. In the Feature Button Assignments area, type verify.
3. Press 
ENTER to save your changes.
4. To activate the feature, press the 
VERIFY button on the phone and then enter 
the Trunk Access Code and member number to be monitored.
Setting up security violations 
notification
This section shows you how to use Security Violations Notification...

Page 366

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1.1
June 2000
Enhancing system security 
342 Setting up security violations notification 
11
Instructions
To set up security violations notification:
1. Type 
change system-parameters security and press RETURN.
The Security-Related System Parameters
 screen appears.
2. In the SVN Login Violation Notification Enabled field, type 
y.
This sets Security Violations Notification login violation notification.
3. In the Originating Extension...

Page 367

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1.1
June 2000
Enhancing system security 
343 Setting up security violations notification 
11
7. Press ENTER to save your changes.
NOTE:
The following 3 steps are optional. If you are not using Remote 
Access, go to step 11
.
8. Type 
change remote-access and press RETURN.
The Remote Access
 screen appears.
9. In the Disable Following A Security Violation field, type 
y.
This disables Remote Access following detection of a remote access...

Page 368

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1.1
June 2000
Enhancing system security 
344 Setting up authorization codes 
11
12. In the Feature Button Assignments section, type one of the following:
nasvn-halt — The Authorization Code Security Violation 
Notification call is activated when an authorization code security 
violation is detected. This applies only if you are using authorization 
codes.
nlsvn-halt — The Login Security Violation Notification call is 
activated a referral...

Page 369

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1.1
June 2000
Enhancing system security 
345 Setting up authorization codes 
11
Instructions
1. Type 
change system-parameters features and press RETURN.
The Feature-Related System Parameters
 screen appears.
2. In the Authorization Code Enabled field, type 
y.
This enables the Authorization Codes feature on a system-wide basis.
3. In the Authorization Code Length field, type 
7.
This defines the length of the Authorization Codes your...

Page 370

DEFINITY ECS Release 8.2
Administrator’s Guide  555-233-506  Issue 1.1
June 2000
Enhancing system security 
346 Setting up authorization codes 
11
8. Type change authorization-code nnnn and press RETURN, where nnnn is 
the authorization code.
The Authorization Code — COR Mapping
 screen appears.
9. In the AC field, enter the authorization code your users must dial.
In our example, type 
4285193. The number of digits entered must agree 
with the number assigned in the Feature-Related System Parameters...
Start reading Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual

Related Manuals for Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual

All Lucent Technologies manuals