Home > Lucent Technologies > Communications System > Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual

Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 1718
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Enhancing system security 
    337 Changing login permissions 
    11
    This screen contains the following fields:
    nDate — Contains the date of the session establishment or rejection. For 
    example, the date displays in the mm/dd format where mm = month and  
    dd = day.
    nTime — Contains the time of the session establishment or rejection. For 
    example, the time displays in the hh/mm format where hh = hour and mm = 
    minute.
    nPort — Contains the port mnemonic associated with the port on which the 
    session was established or rejected. The port mnemonics for G3r systems 
    are SYSAM-LCL, SYSAM-RMT, MAINT, and SYS-PORT. For G3si 
    systems, they are MRG1, INADS, NET, and EPN.
    nLogin — Contains the alphanumeric login string entered by the user and 
    associated with the session establishment or rejection.
    nStatus — Contains a code that indicates whether the session was 
    established or rejected and, if rejected, the reason for the rejection. Refer to 
    Access security gateway
     for a list of the possible status values.
    Related topics
    ‘‘
    Logging in with Access Security Gateway’’ on page 3
    ‘‘Security violations notification’’ on page 1491
    Changing login permissions
    This section shows you how to change login permissions.
    Once you have created a login, you can modify the permissions associated with 
    the login. The system maintains default permissions for each level of login, but 
    you may want to further restrict the login, or at least make sure the defaults are 
    appropriate for the user. The default values for these fields vary based on the login 
    type. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Enhancing system security 
    338 Changing login permissions 
    11
    Instructions
    We will change the login permissions of 
    angi3.
    To change login permissions:
    1. Type 
    change permissions angi3 and press RETURN.
    The Command Permission Categories
     screen appears.
    2. In the Administer Stations field, type 
    y.
    This allows your user to add, change, duplicate, or remove stations, data 
    modules and associated features.
    3. In the Additional Restrictions field, type 
    y.
    A 
    y in this field brings up the second and third pages of this screen.
    4. In the first field, type 
    vdn.
    This restricts your user from administering a VDN.
    5. Press 
    ENTER to save your changes.
     
    COMMAND PERMISSION CATEGORIES
                                 Login Name: angi3
       COMMON COMMANDS
                      Display Admin. and Maint. Data? n
                                 System Measurements? n
       ADMINISTRATION COMMANDS
             Administer Stations? y             Administer Features? n
               Administer Trunks? n Administer Permissions? n
         Additional Restrictions? y
       MAINTENANCE COMMANDS
               Maintain Stations? n       Maintain Switch Circuit Packs? n
                 Maintain Trunks? n      Maintain Process Circuit Packs? n
                Maintain Systems? n  Maintain Enhanced DS1? n 
    COMMAND PERMISSION CATEGORIES
                                  RESTRICTED OBJECT LIST
               vdn  ______________________
               _______________________        ______________________
               _______________________        ______________________
               _______________________        ______________________
               _______________________        ______________________
               _______________________        ______________________
               _______________________        ______________________
               _______________________        ______________________
               _______________________        ______________________
               _______________________        ______________________ 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Enhancing system security 
    339 Changing passwords 
    11
    Changing passwords
    This section shows you how to change a user’s password.
    Instructions
    We will change the password for login 
    angi3 to g3or5e.
    To change passwords:
    1. Type 
    change password angi3 and press RETURN.
    The Password Administration screen appears.
    2. In the Password of Login Making Change field, type your password to 
    change any field on this screen.
    We’ll type 
    angi3.
    3. In the Login’s Password field, type the initial password for this login. 
    We’ll type 
    g3or5e.
    Notify the owner of the login to change their password immediately. The 
    password does not appear on the screen as you type.
    A password must be from 4 to 11 characters in length and contain at least 1 
    alphabetic and 1 numeric symbol. 
    4. In the Reenter Login’s Password field, retype the login’s password as 
    above, for verification.
    We’ll type 
    g3or5e.
    The password does not appear on the screen as you type.
    5. Press 
    ENTER to save your changes.
     
    PASSWORD ADMINISTRATION
    Password of Login Making Change: angi3
    LOGIN BEING CHANGED
    Login Name:
    LOGIN’S PASSWORD INFORMATION
    Login’s Password:
    Reenter Login’s Password: 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Enhancing system security 
    340 Using busy verify 
    11
    Using busy verify
    This section shows you how to use Busy Verify (also known as Busy Verification) 
    to help find fraud problems.
    When you suspect toll fraud, you can interrupt the call on a specified trunk group 
    or extension number and monitor the call in progress. Callers will hear a long tone 
    to indicate the call is being monitored.
    !SECURITY ALERT:
    Listening to someone else’s calls may be subject to federal, state, or local 
    laws, rules, or regulations. It may require the consent of one or both of the 
    parties on the call. Familiarize yourself with all applicable laws, rules, and 
    regulations and comply with them when you use this feature.
    Before you start
    On the Trunk Group
     screen, verify the Dial Access field is y. If not, contact your 
    Lucent representative.
    Instructions
    To use busy verify:
    1. Type 
    change station xxxx and press RETURN, where xxxx is the station to 
    be assigned the busy verify button.
    For our example, we’ll enter extension 
    1014.
    The Station
     screen appears.
                                                                  Page 3 of X
                                              STATION
         SITE DATA
              Room: _______                                      Headset? n
              Jack: ___                                          Speaker? n
             Cable: ___                                         Mounting: d
             Floor: _______                                  Cord Length: 0_
          Building: _______                                    Set Color: _____
    ABBREVIATED DIALING
         List1: ________           List2: _________          List3: _________
    BUTTON ASSIGNMENTS
     1: call-appr
     4: verify__
     2: call-appr 5: ________
     3: call-appr  
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Enhancing system security 
    341 Setting up security violations notification 
    11
    2. In the Feature Button Assignments area, type verify.
    3. Press 
    ENTER to save your changes.
    4. To activate the feature, press the 
    VERIFY button on the phone and then enter 
    the Trunk Access Code and member number to be monitored.
    Setting up security violations 
    notification
    This section shows you how to use Security Violations Notification (SVN) to set 
    security-related parameters and to receive notification when established limits are 
    exceeded. You can run reports related to invalid access attempts. You also can 
    disable a login ID or remote access authorization that is associated with a security 
    violation.
    When a security violation has occurred, there are steps that you can take to be sure 
    that this same attempt is not successful in the future. Refer to the BCS Products 
    Security Handbook for more information.
    Before you start
    If you are using ASG, on the System Parameters Customer-Options
     screen, verify 
    the Access Security Gateway (ASG) field is 
    y. If not, contact your Lucent 
    representative. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Enhancing system security 
    342 Setting up security violations notification 
    11
    Instructions
    To set up security violations notification:
    1. Type 
    change system-parameters security and press RETURN.
    The Security-Related System Parameters
     screen appears.
    2. In the SVN Login Violation Notification Enabled field, type 
    y.
    This sets Security Violations Notification login violation notification.
    3. In the Originating Extension field, type 
    3040.
    This becomes the phone extension for the purpose of originating and 
    identifying SVN referral calls for login security violations.
    4. In the Referral Destination field, type 
    attd to send all calls to the attendant.
    This is the phone extension that receives the referral call when a security 
    violation occurs.
    5. In the Login Threshold field, type 
    3.
    This is the minimum number of login attempts that are permitted before a 
    referral call is made. More than 3 attempts causes a security violation 
    notification.
    6. In the Time Interval field, type 
    0:03.
    This the time interval in which the threshold, or number of violations, must 
    occur.
    SECURITY-RELATED SYSTEM PARAMETERS
    SECURITY VIOLATION NOTIFICATION PARAMETERS
    SVN Login Violation Notification Enabled? y
    Originating Extension: 3040_ Referral Destination: attd_
    Login Threshold: 3_  Time Interval: 0:03
    Announcement Extension: _____
    SVN Remote Access Violation Notification Enabled? y
    Originating Extension: 2719_ Referral Destination: 2720_
    Barrier Code Threshold: 3   Time Interval: 0:03
    Announcement Extension: _____
    SVN Authorization Code Violation Notification Enabled? y
    Originating Extension: 3030_ Referral Destination: 3031_
    Authorization Code Threshold: 3  Time Interval: 0:03
    Announcement Extension: _____ 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Enhancing system security 
    343 Setting up security violations notification 
    11
    7. Press ENTER to save your changes.
    NOTE:
    The following 3 steps are optional. If you are not using Remote 
    Access, go to step 11
    .
    8. Type 
    change remote-access and press RETURN.
    The Remote Access
     screen appears.
    9. In the Disable Following A Security Violation field, type 
    y.
    This disables Remote Access following detection of a remote access 
    security violation.
    10. Press 
    ENTER to save your changes.
    11. Type 
    change station xxxx and press RETURN, where xxxx is the station to 
    be assigned the notification halt button.
    The Station
     screen appears.
     
                                      REMOTE ACCESS
       Remote Access Extension________          Barrier Code Length____
    Authorization Code Required? y  Remote Access Dial Tone: n
    Barrier Code   COR  TN  COS    Expiration Date   No. of Calls    Calls Used
    1:________     1__  1_ 1__    __/__/__          ______          ______
    2:________  1__  1_ 1__    __/__/__          ______          ______
    3:________  1__  1_ 1__    __/__/__          ______          ______
    4:________  1__  1_ 1__    __/__/__          ______          ______
    5:________  1__  1_ 1__    __/__/__          ______          ______
    6:________  1__  1_ 1__    __/__/__          ______          ______
    7:________  1__  1_ 1__    __/__/__          ______          ______
    8:________  1__  1_ 1__    __/__/__          ______          ______
    9:________  1__  1_ 1__    __/__/__          ______          ______
    10:_______  1__  1_ 1__    __/__/__          ______          ______
    Permanently Disable? __ Disable Following A Security Violation? y
    (NOTE:  You must logoff to effect permanent disabling of Remote Access)
                                                                  Page 3 of X
                                              STATION
         SITE DATA
              Room: _______                                      Headset? n
              Jack: ___                                          Speaker? n
             Cable: ___                                         Mounting: d
             Floor: _______                                  Cord Length: 0_
          Building: _______                                    Set Color: _____
    ABBREVIATED DIALING
         List1: ________           List2: _________          List3: _________
    BUTTON ASSIGNMENTS
     1: asvn-halt  4: ________
     2: ________  5: ________
     3: ________  
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Enhancing system security 
    344 Setting up authorization codes 
    11
    12. In the Feature Button Assignments section, type one of the following:
    nasvn-halt — The Authorization Code Security Violation 
    Notification call is activated when an authorization code security 
    violation is detected. This applies only if you are using authorization 
    codes.
    nlsvn-halt — The Login Security Violation Notification call is 
    activated a referral call when a login security violation is detected.
    nrsvn-halt — The Remote Access Barrier Code Security Violation 
    Notification call is activated as a call referral. This applies only if 
    you are using Remote Access barrier codes.
    nssvn-halt — The Station Code Security Violation Notification call 
    is activated when a station code security violation is detected. This 
    applies only if you are using station codes.
    NOTE:
    Any of the above 4 security violations will cause the system to place 
    a notification call to the designated phone. The call continues to ring 
    until answered. To stop notification of any further violations, press 
    the button associated with the type of violation.
    13. Press 
    ENTER to save your changes.
    Setting up authorization codes
    Authorization codes provide the means for extending control of system users’ 
    calling privileges. They extend calling-privilege control and provide an extra level 
    of security for remote-access callers.
    NOTE:
    To maintain system security, Lucent recommends you use 
    authorization codes.
    Refer to BCS Products Security Handbook for more information.
    Before you start
    On the System Parameters Customer-Options
     screen, verify the Authorization 
    Codes field is 
    y. If not, contact your Lucent representative. This field turns on the 
    feature and permits you to selectively specify levels of calling privileges that 
    override in-place restrictions. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Enhancing system security 
    345 Setting up authorization codes 
    11
    Instructions
    1. Type 
    change system-parameters features and press RETURN.
    The Feature-Related System Parameters
     screen appears.
    2. In the Authorization Code Enabled field, type 
    y.
    This enables the Authorization Codes feature on a system-wide basis.
    3. In the Authorization Code Length field, type 
    7.
    This defines the length of the Authorization Codes your users need to enter. 
    To maximize the security of your system, Lucent recommends you make 
    each authorization code the maximum length allowed by the system.
    4. In the Authorization Code Cancellation Symbol field, leave the default of 
    #.
    This is the symbol a caller must dial to cancel the 10-second wait period 
    during which your user can enter an authorization code.
    5. In the Attendant Time Out Flag field, leave the default of 
    n.
    This means a call is not to be routed to the attendant if a caller does not dial 
    an authorization code within 10 seconds or dials an invalid authorization 
    code.
    6. In the Display Authorization Code field, type 
    n.
    This prevents the authorization code from displaying on phone sets thus 
    maximizing your security.
    7. Press 
    ENTER to save your changes.
                                                                      Page 3 of 8
                          FEATURE-RELATED SYSTEM PARAMETERS
                           Reserved Slots for Attendant Priority Queue: 5_
                                            Time Before Off-Hook Alert: 10__
                                Emergency Access Redirection Extension: _____
    Number of Emergency Calls Allowed in Attendant Queue: __
                                                  Call Pickup Alerting? n
    Temporary Bridged Appearance on Call Pickup? y
    Call Pickup on Intercom Calls? y
    Directed Call Pickup? n
                     Deluxe Paging and Call Park Timeout to Originator? n
    Controlled Outward Toll Restriction Intercept Treatment: tone _______
        Controlled Termination Restriction (Do Not Disturb): tone _______
                  Controlled Station to Station Restriction: tone _______
    AUTHORIZATION CODE PARAMETERS           Authorization Code Enabled? y
                                             Authorization Code Length: 7
                                Authorization Code Cancellation Symbol? #
                                               Attendant Time Out Flag? n
    Display Authorization Code? _
    Controlled Toll Restriction Replaces: station-station
              Controlled Toll Restriction Intercept Treatment: extension     3000 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Enhancing system security 
    346 Setting up authorization codes 
    11
    8. Type change authorization-code nnnn and press RETURN, where nnnn is 
    the authorization code.
    The Authorization Code — COR Mapping
     screen appears.
    9. In the AC field, enter the authorization code your users must dial.
    In our example, type 
    4285193. The number of digits entered must agree 
    with the number assigned in the Feature-Related System Parameters 
    screen, Authorization Code Length field.
    NOTE:
    Remember, all authorization codes used in the system must be the 
    same length.
    10. In the COR field, enter the desired Class of Restriction number from 0 
    through 95.
    In our example, type 
    1.
    11. Press 
    ENTER to save your changes.
     Page 1 of 1
    Authorization Code - COR Mapping
    Note: XX codes administered.  Use “list” to display all codes.
    AC    COR   AC    COR   AC    COR   AC    COR  AC     COR    AC  COR
        4285193 1_  _______ __  _______ __  _______ __   _______ __   _______ __
        _______ __  _______ __  _______ __  _______ __   _______ __   _______ __
        _______ __  _______ __  _______ __  _______ __   _______ __   _______ __
        _______ __  _______ __  _______ __  _______ __   _______ __   _______ __
        _______ __  _______ __  _______ __  _______ __   _______ __   _______ __
        _______ __  _______ __  _______ __  _______ __   _______ __   _______ __
        _______ __  _______ __  _______ __  _______ __   _______ __   _______ __
        _______ __  _______ __  _______ __  _______ __   _______ __   _______ __
        _______ __  _______ __  _______ __  _______ __   _______ __   _______ __
        _______ __  _______ __  _______ __  _______ __   _______ __   _______ __
        _______ __  _______ __  _______ __  _______ __   _______ __   _______ __
        _______ __  _______ __  _______ __  _______ __   _______ __   _______ __
        _______ __  _______ __  _______ __  _______ __   _______ __   _______ __
        _______ __  _______ __  _______ __  _______ __   _______ __   _______ __
        _______ __  _______ __  _______ __  _______ __   _______ __   _______ __
        _______ __  _______ __  _______ __  _______ __   _______ __   _______ __ 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual