Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual
Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual
Have a look at the manual Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 337 Changing login permissions 11 This screen contains the following fields: nDate — Contains the date of the session establishment or rejection. For example, the date displays in the mm/dd format where mm = month and dd = day. nTime — Contains the time of the session establishment or rejection. For example, the time displays in the hh/mm format where hh = hour and mm = minute. nPort — Contains the port mnemonic associated with the port on which the session was established or rejected. The port mnemonics for G3r systems are SYSAM-LCL, SYSAM-RMT, MAINT, and SYS-PORT. For G3si systems, they are MRG1, INADS, NET, and EPN. nLogin — Contains the alphanumeric login string entered by the user and associated with the session establishment or rejection. nStatus — Contains a code that indicates whether the session was established or rejected and, if rejected, the reason for the rejection. Refer to Access security gateway for a list of the possible status values. Related topics ‘‘ Logging in with Access Security Gateway’’ on page 3 ‘‘Security violations notification’’ on page 1491 Changing login permissions This section shows you how to change login permissions. Once you have created a login, you can modify the permissions associated with the login. The system maintains default permissions for each level of login, but you may want to further restrict the login, or at least make sure the defaults are appropriate for the user. The default values for these fields vary based on the login type.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 338 Changing login permissions 11 Instructions We will change the login permissions of angi3. To change login permissions: 1. Type change permissions angi3 and press RETURN. The Command Permission Categories screen appears. 2. In the Administer Stations field, type y. This allows your user to add, change, duplicate, or remove stations, data modules and associated features. 3. In the Additional Restrictions field, type y. A y in this field brings up the second and third pages of this screen. 4. In the first field, type vdn. This restricts your user from administering a VDN. 5. Press ENTER to save your changes. COMMAND PERMISSION CATEGORIES Login Name: angi3 COMMON COMMANDS Display Admin. and Maint. Data? n System Measurements? n ADMINISTRATION COMMANDS Administer Stations? y Administer Features? n Administer Trunks? n Administer Permissions? n Additional Restrictions? y MAINTENANCE COMMANDS Maintain Stations? n Maintain Switch Circuit Packs? n Maintain Trunks? n Maintain Process Circuit Packs? n Maintain Systems? n Maintain Enhanced DS1? n COMMAND PERMISSION CATEGORIES RESTRICTED OBJECT LIST vdn ______________________ _______________________ ______________________ _______________________ ______________________ _______________________ ______________________ _______________________ ______________________ _______________________ ______________________ _______________________ ______________________ _______________________ ______________________ _______________________ ______________________ _______________________ ______________________
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 339 Changing passwords 11 Changing passwords This section shows you how to change a user’s password. Instructions We will change the password for login angi3 to g3or5e. To change passwords: 1. Type change password angi3 and press RETURN. The Password Administration screen appears. 2. In the Password of Login Making Change field, type your password to change any field on this screen. We’ll type angi3. 3. In the Login’s Password field, type the initial password for this login. We’ll type g3or5e. Notify the owner of the login to change their password immediately. The password does not appear on the screen as you type. A password must be from 4 to 11 characters in length and contain at least 1 alphabetic and 1 numeric symbol. 4. In the Reenter Login’s Password field, retype the login’s password as above, for verification. We’ll type g3or5e. The password does not appear on the screen as you type. 5. Press ENTER to save your changes. PASSWORD ADMINISTRATION Password of Login Making Change: angi3 LOGIN BEING CHANGED Login Name: LOGIN’S PASSWORD INFORMATION Login’s Password: Reenter Login’s Password:
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 340 Using busy verify 11 Using busy verify This section shows you how to use Busy Verify (also known as Busy Verification) to help find fraud problems. When you suspect toll fraud, you can interrupt the call on a specified trunk group or extension number and monitor the call in progress. Callers will hear a long tone to indicate the call is being monitored. !SECURITY ALERT: Listening to someone else’s calls may be subject to federal, state, or local laws, rules, or regulations. It may require the consent of one or both of the parties on the call. Familiarize yourself with all applicable laws, rules, and regulations and comply with them when you use this feature. Before you start On the Trunk Group screen, verify the Dial Access field is y. If not, contact your Lucent representative. Instructions To use busy verify: 1. Type change station xxxx and press RETURN, where xxxx is the station to be assigned the busy verify button. For our example, we’ll enter extension 1014. The Station screen appears. Page 3 of X STATION SITE DATA Room: _______ Headset? n Jack: ___ Speaker? n Cable: ___ Mounting: d Floor: _______ Cord Length: 0_ Building: _______ Set Color: _____ ABBREVIATED DIALING List1: ________ List2: _________ List3: _________ BUTTON ASSIGNMENTS 1: call-appr 4: verify__ 2: call-appr 5: ________ 3: call-appr
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 341 Setting up security violations notification 11 2. In the Feature Button Assignments area, type verify. 3. Press ENTER to save your changes. 4. To activate the feature, press the VERIFY button on the phone and then enter the Trunk Access Code and member number to be monitored. Setting up security violations notification This section shows you how to use Security Violations Notification (SVN) to set security-related parameters and to receive notification when established limits are exceeded. You can run reports related to invalid access attempts. You also can disable a login ID or remote access authorization that is associated with a security violation. When a security violation has occurred, there are steps that you can take to be sure that this same attempt is not successful in the future. Refer to the BCS Products Security Handbook for more information. Before you start If you are using ASG, on the System Parameters Customer-Options screen, verify the Access Security Gateway (ASG) field is y. If not, contact your Lucent representative.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 342 Setting up security violations notification 11 Instructions To set up security violations notification: 1. Type change system-parameters security and press RETURN. The Security-Related System Parameters screen appears. 2. In the SVN Login Violation Notification Enabled field, type y. This sets Security Violations Notification login violation notification. 3. In the Originating Extension field, type 3040. This becomes the phone extension for the purpose of originating and identifying SVN referral calls for login security violations. 4. In the Referral Destination field, type attd to send all calls to the attendant. This is the phone extension that receives the referral call when a security violation occurs. 5. In the Login Threshold field, type 3. This is the minimum number of login attempts that are permitted before a referral call is made. More than 3 attempts causes a security violation notification. 6. In the Time Interval field, type 0:03. This the time interval in which the threshold, or number of violations, must occur. SECURITY-RELATED SYSTEM PARAMETERS SECURITY VIOLATION NOTIFICATION PARAMETERS SVN Login Violation Notification Enabled? y Originating Extension: 3040_ Referral Destination: attd_ Login Threshold: 3_ Time Interval: 0:03 Announcement Extension: _____ SVN Remote Access Violation Notification Enabled? y Originating Extension: 2719_ Referral Destination: 2720_ Barrier Code Threshold: 3 Time Interval: 0:03 Announcement Extension: _____ SVN Authorization Code Violation Notification Enabled? y Originating Extension: 3030_ Referral Destination: 3031_ Authorization Code Threshold: 3 Time Interval: 0:03 Announcement Extension: _____
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 343 Setting up security violations notification 11 7. Press ENTER to save your changes. NOTE: The following 3 steps are optional. If you are not using Remote Access, go to step 11 . 8. Type change remote-access and press RETURN. The Remote Access screen appears. 9. In the Disable Following A Security Violation field, type y. This disables Remote Access following detection of a remote access security violation. 10. Press ENTER to save your changes. 11. Type change station xxxx and press RETURN, where xxxx is the station to be assigned the notification halt button. The Station screen appears. REMOTE ACCESS Remote Access Extension________ Barrier Code Length____ Authorization Code Required? y Remote Access Dial Tone: n Barrier Code COR TN COS Expiration Date No. of Calls Calls Used 1:________ 1__ 1_ 1__ __/__/__ ______ ______ 2:________ 1__ 1_ 1__ __/__/__ ______ ______ 3:________ 1__ 1_ 1__ __/__/__ ______ ______ 4:________ 1__ 1_ 1__ __/__/__ ______ ______ 5:________ 1__ 1_ 1__ __/__/__ ______ ______ 6:________ 1__ 1_ 1__ __/__/__ ______ ______ 7:________ 1__ 1_ 1__ __/__/__ ______ ______ 8:________ 1__ 1_ 1__ __/__/__ ______ ______ 9:________ 1__ 1_ 1__ __/__/__ ______ ______ 10:_______ 1__ 1_ 1__ __/__/__ ______ ______ Permanently Disable? __ Disable Following A Security Violation? y (NOTE: You must logoff to effect permanent disabling of Remote Access) Page 3 of X STATION SITE DATA Room: _______ Headset? n Jack: ___ Speaker? n Cable: ___ Mounting: d Floor: _______ Cord Length: 0_ Building: _______ Set Color: _____ ABBREVIATED DIALING List1: ________ List2: _________ List3: _________ BUTTON ASSIGNMENTS 1: asvn-halt 4: ________ 2: ________ 5: ________ 3: ________
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 344 Setting up authorization codes 11 12. In the Feature Button Assignments section, type one of the following: nasvn-halt — The Authorization Code Security Violation Notification call is activated when an authorization code security violation is detected. This applies only if you are using authorization codes. nlsvn-halt — The Login Security Violation Notification call is activated a referral call when a login security violation is detected. nrsvn-halt — The Remote Access Barrier Code Security Violation Notification call is activated as a call referral. This applies only if you are using Remote Access barrier codes. nssvn-halt — The Station Code Security Violation Notification call is activated when a station code security violation is detected. This applies only if you are using station codes. NOTE: Any of the above 4 security violations will cause the system to place a notification call to the designated phone. The call continues to ring until answered. To stop notification of any further violations, press the button associated with the type of violation. 13. Press ENTER to save your changes. Setting up authorization codes Authorization codes provide the means for extending control of system users’ calling privileges. They extend calling-privilege control and provide an extra level of security for remote-access callers. NOTE: To maintain system security, Lucent recommends you use authorization codes. Refer to BCS Products Security Handbook for more information. Before you start On the System Parameters Customer-Options screen, verify the Authorization Codes field is y. If not, contact your Lucent representative. This field turns on the feature and permits you to selectively specify levels of calling privileges that override in-place restrictions.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 345 Setting up authorization codes 11 Instructions 1. Type change system-parameters features and press RETURN. The Feature-Related System Parameters screen appears. 2. In the Authorization Code Enabled field, type y. This enables the Authorization Codes feature on a system-wide basis. 3. In the Authorization Code Length field, type 7. This defines the length of the Authorization Codes your users need to enter. To maximize the security of your system, Lucent recommends you make each authorization code the maximum length allowed by the system. 4. In the Authorization Code Cancellation Symbol field, leave the default of #. This is the symbol a caller must dial to cancel the 10-second wait period during which your user can enter an authorization code. 5. In the Attendant Time Out Flag field, leave the default of n. This means a call is not to be routed to the attendant if a caller does not dial an authorization code within 10 seconds or dials an invalid authorization code. 6. In the Display Authorization Code field, type n. This prevents the authorization code from displaying on phone sets thus maximizing your security. 7. Press ENTER to save your changes. Page 3 of 8 FEATURE-RELATED SYSTEM PARAMETERS Reserved Slots for Attendant Priority Queue: 5_ Time Before Off-Hook Alert: 10__ Emergency Access Redirection Extension: _____ Number of Emergency Calls Allowed in Attendant Queue: __ Call Pickup Alerting? n Temporary Bridged Appearance on Call Pickup? y Call Pickup on Intercom Calls? y Directed Call Pickup? n Deluxe Paging and Call Park Timeout to Originator? n Controlled Outward Toll Restriction Intercept Treatment: tone _______ Controlled Termination Restriction (Do Not Disturb): tone _______ Controlled Station to Station Restriction: tone _______ AUTHORIZATION CODE PARAMETERS Authorization Code Enabled? y Authorization Code Length: 7 Authorization Code Cancellation Symbol? # Attendant Time Out Flag? n Display Authorization Code? _ Controlled Toll Restriction Replaces: station-station Controlled Toll Restriction Intercept Treatment: extension 3000
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Enhancing system security 346 Setting up authorization codes 11 8. Type change authorization-code nnnn and press RETURN, where nnnn is the authorization code. The Authorization Code — COR Mapping screen appears. 9. In the AC field, enter the authorization code your users must dial. In our example, type 4285193. The number of digits entered must agree with the number assigned in the Feature-Related System Parameters screen, Authorization Code Length field. NOTE: Remember, all authorization codes used in the system must be the same length. 10. In the COR field, enter the desired Class of Restriction number from 0 through 95. In our example, type 1. 11. Press ENTER to save your changes. Page 1 of 1 Authorization Code - COR Mapping Note: XX codes administered. Use “list” to display all codes. AC COR AC COR AC COR AC COR AC COR AC COR 4285193 1_ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __ _______ __