Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual
Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual
Have a look at the manual Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 867 PRI Endpoint 17 Width Enter the number of adjacent DS0 ports beginning with the specified Starting Port, that make up the PRI Endpoint.This field cannot be blank. Originating Auto Restoration Signaling Group COR COS A through EThird character is the carrier 01 through 20Fourth and fifth characters are the slot number 01 through 31 (DS1 Interface ports)Sixth and seventh characters are the circuit number Valid entries Usage 1 to 31A width of 6 defines a PRI Endpoint that can support data rates up to 384 Kbps. Valid entries Usage y/n Enter y to automatically restore calls originating from this PRI Endpoint (while maintaining endpoint call status) in the case of network failure if the call is over SDDN network facilities. Valid entries Usage 1 to 30Enter the D-channel or D-channel pair that will provide the signaling information for the set of B-channels that make up the PRI Endpoint. Valid entries Usage 0 to 95Enter class of restriction (COR) to determine calling and called party privileges Valid entries Usage 0 to 15Enter the Class of Service (COS) to determine the features that can be activated by, or on behalf of, the endpoint. Valid entries Usage
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 868 PRI Endpoint 17 TN Simultaneous Calls Maintenance Tests H0 H11 Valid entries Usage 1 –20 Enter the Tenant Partition number. Valid entries Usage y/n Enter y to specify that multiple simultaneous calls can be placed to/from the PRI Endpoint. Valid entries Usage y/n Enter y to run hourly maintenance tests on this PRI Endpoint. Valid entries Usage y/n Enter y to specify the ISDN information transfer rate for 384 Kbps of data, which is comprised of six B-channels. When a PRI Endpoint is administered to support H0, the hunt algorithm to satisfy a call requiring 384 Kbps of bandwidth uses a fixed allocation scheme. Valid entries Usage y/n Enter y to specify the ISDN information transfer rate for 1536 Kbps of data, which is comprised of 24 B-channels. When a PRI Endpoint is administered to support H11, the hunt algorithm to satisfy a call requiring 1536 Kbps of bandwidth uses a fixed allocation scheme.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 869 PRI Endpoint 17 H12 NXDS0 Contiguous Specifies whether to hunt contiguous NXDS0 channels. This field only appears if y is entered in NXDS0. The hunt algorithm to satisfy an NXDS0 call is as follows: Valid entries Usage y/n Enter y to specify the ISDN information transfer rate for 1920 Kbps data, which includes 30 B-channels. When a PE is administered to support H12, the hunt algorithm to satisfy a call requiring 1920 Kbps of bandwidth uses a fixed allocation scheme. Valid entries Usage y/n Enter y to specify the NXDS0 multi-rate service. Valid entries Usage y Enter y to specify the “floating” scheme. NXDS0 calls are placed on a contiguous group of B-channels large enough to satisfy the requested bandwidth without constraint on the starting channel (no fixed starting point trunk). H0 and NXDS0 “floating” scheme cannot both be y. n Enter n to specify the “flexible” scheme. NXDS0 calls are placed on any set of B-channels on the same facility as long as the requested bandwidth is satisfied. There are no constraints, such as contiguity of B-channels or fixed starting points.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 870 Remote Access 17 Remote Access The Remote Access screen is used to implement the Remote Access feature. Remote Access permits a caller located outside the system to access the system through the public or private network and then use the features and services of the system. Remote Access users can dial into the system using central office (CO), Foreign Exchange (FX), Wide Area Telecommunications trunks (WATS), and Integrated Services Digital Network Primary Rate Interface (ISDN-PRI) trunks. In addition, a dedicated Remote Access Direct Inward Dialing number can be provided. !SECURITY ALERT: Lucent Technologies designed the Remote Access feature incorporated in this product that, when properly administered by the customer, enables the customer to minimize the ability of unauthorized persons to gain access to the network. It is the customer’s responsibility to take the appropriate steps to properly implement the features, evaluate and administer the various restriction levels, protect access codes and distribute them only to individuals who have been advised of the sensitive nature of the access information. Each authorized user should be instructed concerning the proper use and handling of access codes. In rare instances, unauthorized individuals make connections to the telecommunications network through use of remote access features. In such an event, applicable tariffs require the customer pay all network charges for traffic. Lucent Technologies cannot be responsible for such charges, and will not make any allowance or give any credit for charges that result from unauthorized access. To ensure the security of your system, consider the following: nMake all remote access facilities unlisted directory telephone numbers. nRequire users to enter a Barrier Code of at least seven random digits AND an Authorization Code of at least 13 random digits to make network calls. nMake Authorization Codes nonconsecutive (random) and change them, at least, quarterly. nDeactivate Authorization Codes immediately if the user leaves the company or changes assignments. nAssign the minimum level of calling permissions required to each Authorization Code. nBlock off-hours and weekend remote access calling, when possible. Use Alternative Facility Restriction Levels, if available.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 871 Remote Access 17 nUse a voice recording, warble tone, or no tone and avoid use of a dial tone as a prompt when the remote access unit answers. nAssign the lowest possible FRL to only allow internal switch calls. As an additional step to ensure System security, you can permanently disable the Remote Access feature if you do not intend to use it now or in the future. If you do decide to permanently disable the feature, it will require Lucent Services intervention to activate the feature again. !CAUTION: Your attempt to disable the Remote Access feature will be lost if the switch is rebooted without saving translations. Therefore, execute a “save translation” command after permanently disabling the Remote Access feature. To assist you in maintaining the security of your system, DEFINITY ECS provides the status remote access command, which provides status and information on each remote access barrier code and on the remote access feature. A sample Status Remote Access screen follows the Remote Access screen. Field descriptions for page 1 Screen 175. Remote Access change remote-access REMOTE ACCESS Remote Access Extension________ Barrier Code Length:____ Authorization Code Required? y Remote Access Dial Tone: n Barrier COR TN COS Expiration No. of Calls Code COR TN COS Date Calls Used 1:________ 1__ 1_ 1__ __/__/__ ______ ______ 2:________ 1__ 1_ 1__ __/__/__ ______ ______ 3:________ 1__ 1_ 1__ __/__/__ ______ ______ 4:________ 1__ 1_ 1__ __/__/__ ______ ______ 5:________ 1__ 1_ 1__ __/__/__ ______ ______ 6:________ 1__ 1_ 1__ __/__/__ ______ ______ 7:________ 1__ 1_ 1__ __/__/__ ______ ______ 8:________ 1__ 1_ 1__ __/__/__ ______ ______ 9:________ 1__ 1_ 1__ __/__/__ ______ ______ 10:_______ 1__ 1_ 1__ __/__/__ ______ ______ Permanently Disable? __ Disable Following A Security Violation? y (NOTE: You must logoff to effect permanent disabling of Remote Access)
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 872 Remote Access 17 Screen 176. Remote Access Status Remote Access Extension The remote access extension is used as if it was a DID extension. Only one DID extension can be assigned as the remote access extension. Calls to that number are treated the same as calls on the remote access trunk. When a trunk group is dedicated to Remote Access, the remote access extension number is administered on the trunk group’s incoming destination field. Barrier Code Length Assign a barrier code length of 7 to provide maximum security. Valid entries Usage Extension numberEnter the extension number for Remote Access associated with each trunk that supports the Remote Access feature. You cannot assign a Vector Directory Number (VDN) extension as the remote access extension. Valid entries Usage 4 to 7 Enter a number to indicate the length of the barrier code. status remote-access REMOTE ACCESS STATUS Remote Access Status: enabled Date/Time Modified: 01/30/95 17:00 Barrier Date Expiration No. of Calls Status Date/Time Expired Cause Code Modified Date Calls Used 1:2374745 01/30/95 03/31/95 50 50 expired 02/15/95 20:43 calls 2:3374837 01/30/95 / / 20 4 active / / 3:3285038 01/30/95 01/31/96 13 expired 02/10/95 09:32 date 4:5738557 01/30/95 07/31/95 20 20 expired 02/03/95 10:14 calls 5:7764884 01/30/95 05/20/95 0 active / / : 6: // // // : 7: // // // : 8: // // // : 9: // // // : 10: // // // :
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 873 Remote Access 17 Authorization Code Required When you use an authorization code in conjunction with a barrier codes it increases the security of the Remote Access feature. Remote Access Dial Tone Set this field to n for maximum security. This field appears when the Authorization Code Required field is set to y. Barrier Code You must assign a barrier code that conforms to the number entered in the Barrier Code Length field. You may enter up to 10 barrier codes per system. Duplicate entries are not allowed. You must keep your own records regarding the distribution of these barrier codes to your personnel. COR Assign the most restrictive class of restriction (COR), that provides only the level of service required, to provide the maximum security. Valid entries Usage y/n Enter y to require an authorization code be dialed by Remote Access users to access the system’s Remote Access facilities. Valid entries Usage y/n Enter n so that there is no Remote Access Dial Tone prompt. Valid entries Usage 0 to 9Enter a 4- to 7-digit number in any combination of digits. noneMust be specified in the first Barrier Code field, if the Barrier Code Length field is blank. Valid entries Usage 0 through 95Enter the COR number associated with the barrier code that defines the call restriction features.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 874 Remote Access 17 TN COS Assign the most restrictive class of service (COS), that provides only the level of service required to provide the maximum security. Expiration Date Assign an expiration date based on the expected length of time the barrier code will be needed. If it is expected the barrier code is to be used for a 2-week period, assign a date two weeks from the current date. If the Expiration Date is assigned, a warning message is displayed on the system copyright screen seven days prior to the expiration date. The system administer can modify the expiration date to extend the time interval if needed. No. of Calls The Expiration Date and No. of Calls fields can be used independently or in conjunction to provide the maximum security. If both the Expiration Date and No. of Calls fields are assigned, the corresponding barrier code expires when the first of these criteria is satisfied. Calls Used This display-only field shows the number of calls placed using the corresponding barrier code. This field is incremented each time a barrier code is successfully used to access the Remote Access feature. A usage that exceeds the expected rate indicates improper use. Valid entries Usage 1 to 20 (G3si) 1 to 100 (G3r)Enter the appropriate Tenant Partition number. Valid entries Usage 0 to 15Enter the COS number, associated with the barrier code, that defines access permissions for Call Processing features. Valid entries Usage A date greater than the current date Enter the date you want the barrier code to expire. Valid entries Usage 1 to 9999 Enter the number of Remote Access calls that can be placed using the associated barrier code.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 875 Remote Call Coverage Table 17 Permanently Disable Reactivation of remote access to the interface requires Lucent Services intervention. Disable Following a Security Violation This field appears on the screen when the SVN Authorization Code Violation Notification Enabled field on the Security-Related System Parameters screen is set to y. Related Topics Refer to ‘‘ Setting up remote access’’ on page 310 for step-by-step instructions for configuring remote access. Refer to ‘‘ Remote Access’’ on page 1479 for a description of this feature. Remote Call Coverage Table The Remote Call Coverage Table allows you to provide automatic redirection of certain calls to alternate non-local answering positions in a coverage path. Non-local numbers may be any ARS or AAR number, any number on the public network, any international number, or a UDP/DCS extension up to 16 digits, which includes any ARS/AAR facility access code, any trunk dial access code (TAC), long distance dialing code, or international dial code. Up to 999 remote call coverage points can be entered on the 23 pages of this screen. Valid entries Usage y/n Enter y to permanently block remote access to the administration interface. Valid entries Usage y/n Enter y to disable the remote access feature following detection of a remote access security violation. The system administrator can re-enable Remote Access using the enable remote access command.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 876 RHNPA Table 17 Field descriptions for page 1 Screen 177. Remote Call Coverage Table RHNPA Table The RHNPA Table defines route patterns for specific 3-digit codes, usually direct distance dialing (DDD) prefix numbers. Screen 178. RHNPA Table change coverage remote REMOTE CALL COVERAGE TABLE 01: ________________ 16: ________________ 31: ________________ 02: ________________ 17: ________________ 32: ________________ 03: ________________ 18: ________________ 33: ________________ 04: ________________ 19: ________________ 34: ________________ 05: ________________ 20: ________________ 35: ________________ 06: ________________ 21: ________________ 36: ________________ 07: ________________ 22: ________________ 37: ________________ 08: ________________ 23: ________________ 38: ________________ 09: ________________ 24: ________________ 39: ________________ 10: ________________ 25: ________________ 40: ________________ 11: ________________ 26: ________________ 41: ________________ 12: ________________ 27: ________________ 42: ________________ 13: ________________ 28: ________________ 43: ________________ 14: ________________ 29: ________________ 44: ________________ 15: _____________ 30: _____________ 45: _____________ change rhnpa table Page 1 of X RHNPA TABLE: __ CODE: x00 - x99 Pattern Choices 1: ___ 3: ___ 5: ___ 7: ___ 9: ___ 11: ___ 2: ___ 4: ___ 6: ___ 8: ___ 10: ___ 12: ___ Code-Pattern Choice Assignments (from 1 - 12 above) 00: 1__ 10: 1__ 20: 1__ 30: 1__ 40: 1__ 50: 1__ 60: 1__ 70: 1__ 80: 1__ 90: 1__ 01: 1__ 11: 1__ 21: 1__ 31: 1__ 41: 1__ 51: 1__ 61: 1__ 71: 1__ 81: 1__ 91: 1__ 02: 1__ 12: 1__ 22: 1__ 32: 1__ 42: 1__ 52: 1__ 62: 1__ 72: 1__ 82: 1__ 92: 1__ 03: 1__ 13: 1__ 23: 1__ 33: 1__ 43: 1__ 53: 1__ 63: 1__ 73: 1__ 83: 1__ 93: 1__ 04: 1__ 14: 1__ 24: 1__ 34: 1__ 44: 1__ 54: 1__ 64: 1__ 74: 1__ 84: 1__ 94: 1__ 05: 1__ 15: 1__ 25: 1__ 35: 1__ 45: 1__ 55: 1__ 65: 1__ 75: 1__ 85: 1__ 95: 1__ 06: 1__ 16: 1__ 26: 1__ 36: 1__ 46: 1__ 56: 1__ 66: 1__ 76: 1__ 86: 1__ 96: 1__ 07: 1__ 17: 1__ 27: 1__ 37: 1__ 47: 1__ 57: 1__ 67: 1__ 77: 1__ 87: 1__ 97: 1__ 08: 1__ 18: 1__ 28: 1__ 38: 1__ 48: 1__ 58: 1__ 68: 1__ 78: 1__ 88: 1__ 98: 1__ 09: 1__ 19: 1__ 29: 1__ 39: 1__ 49: 1__ 59: 1__ 69: 1__ 79: 1__ 89: 1__ 99: 1__