Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies Octel 100 Implementation And Service Manual
Lucent Technologies Octel 100 Implementation And Service Manual
Here you can view all the pages of manual Lucent Technologies Octel 100 Implementation And Service Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 521
23. Maintaining the System Implementation and Service ManualProtecting Your System23-23 W hen these parameters are disabled, callers dialing an extension that has not been assigned a mailbox hear, “ is not valid. Please redial the number of the person you are calling.” It is recommended that these parameters are disabled. For additional information on these parameters, see Chapter 13, “Setting Up the System.” Impeding Callers from Accessing the Quick Assist Maintenance Mailbox W hen you run Quick Assist...
Page 522
23. Maintaining the System Implementation and Service ManualProtecting Your System23-24 the length of the system’s mailbox numbers. For example, if the system uses four-digit mailboxes, it is recommended that the Minimum Length of Password parameter be set to at least 5. Remember when setting this parameter to balance system security against ease of use for the subscribers. Setting this parameter too high may make it difficult for system subscribers to remember their passwords. For additional information...
Page 523
23. Maintaining the System Implementation and Service ManualProtecting Your System23-25 Providing Notification of Unsuccessful Mailbox Login Attempts The system can v oice notification to subscribers when one or more unsuccessful login attempts hav e been made to their mailboxes. This feature informs subscribers that someone may hav e attempted to gain unauthorized access to their mailboxes. The Failed Login Notification option on the Class of Serv ice dialog box determines whether this feature is...
Page 524
23. Maintaining the System Implementation and Service ManualProtecting Your System23-26 Deleting Unused Mailboxes Immediately If a mailbox is no longer being used, it is recommended that you immediately delete that mailbox from the system. This prev ents anyone from gaining unauthorized system access through the mailbox. If a mailbox is being reassigned to a new mailbox owner, it is strongly recommended that you delete, then re-create the mailbox. For additional information on deleting system mailboxes,...
Page 525
23. Maintaining the System Implementation and Service ManualProtecting Your System23-27 Using Supervisor Passwords to Restrict System Management Access Access to system management features is password-protected. There are two lev els of system manager passwords. Lev el 2 access allows a system manager to create, edit, and delete mailboxes; to access reports and system statistics; to create and specify prompts; maintain network nodes; and to create V-Trees. Lev el 3 access allows a system manager to...
Page 526
23. Maintaining the System Implementation and Service ManualProtecting Your System23-28 Security Checklist It is recommended that the following checklist to be used to ensure that the security measures listed below are implemented, as appropriate, on the messaging system. _____1. (Required) Store the messaging system PC in a secure area. _____2. (Required - Toll Fraud) Disable the Transfer Inv alid Mailboxes During Hours and Transfer Inv alid Mailboxes After Hours parameters on the Inv alid Mailbox tab...
Page 527
23. Maintaining the System Implementation and Service ManualProtecting Your System23-29 _____18. (Recommended) Notify the local serv ice prov ider of any changes to lev el 2 or lev el 3 superv isor passwords in case remote maintenance is required. _____19. (Required) Contact the system representativ e to determine what security features are av ailable for the phone system and how to implement them. Before implementing any security features on the phone system, contact a technical support representativ e...
Page 528
23. Maintaining the System Implementation and Service ManualProtecting Your System23-30 Notes:
Page 529
Implementation and Service Manual Testing and Troubleshooting the System24-1 CHAPTER 24 Testing and Troubleshooting the System After you install and set up the messaging system, you should test the integration with the phone system and the software features to ensure that the entire system works properly. The topics included in this chapter will help you to: · Test the messaging system to ensure that it is correctly installed and configured · Troubleshoot possible program problems you may encounter ·...
Page 530
24. Testing and Troubleshooting the System Implementation and Service Manual Testing and Troubleshooting the System24-2 Testing and Troubleshooting the System After you install and set up the messaging system and optional add-on modules at the customer site, it is essential that you test the software to ensure that it is correctly configured and functioning as intended. To thoroughly test the software, you must exercise all Automated Attendant and Voice/Fax Mail features to confirm that all calls...