Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook

Lucent Technologies BCS Products Security Handbook

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 1

555-025-600
Comcode 108074378
Issue 6
December 1997
BCS Products
Security Handbook 

Page 2

Copyright Ó 1996, Lucent Technologies
All Rights Reserved
Printed in U.S.A.
NoticeWhile reasonable efforts were made to ensure that the 
information in this document was complete and accurate at the 
time of printing, Lucent Technologies can assume no 
responsibility for any errors. Changes and corrections to the 
information contained in this document may be incorporated into 
future reissues.
Your Responsibility for Your System’s SecurityToll fraud is the unauthorized use of your telecommunications...

Page 3

BCS Products
Security Handbook  
555-025-600  
Issue 6
December 1997
Contents 
Page iii  
Contents
About This Document xiii
nScope of this Handbookxiii
nReason for Reissuexv
nIntended Audiencexv
nHow this Guide is Organizedxvi
nLucent Technologies’ Statement of Directionxvii
nLucent Technologies/Customer Security Roles and 
Responsibilitiesxviii
Lucent Technologies’ Roles and Responsibilitiesxix
Customer Roles and Responsibilitiesxx
nLucent Technologies Security Offeringsxx
nLucent Technologies Toll...

Page 4

BCS Products
Security Handbook  
555-025-600  
Issue 6
December 1997
Contents 
Page iv  
Increasing Product Access (Port) Security2-6
nGeneral Security Measures2-7
Educating Users2-7
Establishing a Policy2-8
Physical Security2-9
nSecurity Goals Tables2-9
3 Large Business Communications Systems 3-1
nKeeping Unauthorized Third Parties
from Entering the System3-2
How Third Parties Enter the System3-2
Protecting the Remote Access Feature3-2
Security Tips3-2
Disabling/Removing Remote Access3-3
Tools to...

Page 5

BCS Products
Security Handbook  
555-025-600  
Issue 6
December 1997
Contents 
Page v  
World Class Routing (DEFINITY ECS and
DEFINITY G2.2 and G3 only)3-20
Digit Conversion3-21
Station Security Codes (SSCs)3-21
Personal Station Access (PSA)3-22
Extended User Administration of Redirected Calls3-23
Remote User Administration of Call Coverage3-23
nSecurity Measures3-24
Require Passwords3-24
Restrict Who Can Use Remote Access/Track 
its Usage3-25
Fully Restrict Service3-27
Provide Individualized Calling...

Page 6

BCS Products
Security Handbook  
555-025-600  
Issue 6
December 1997
Contents 
Page vi  
Disable Distinctive Audible Alert3-43
Remove Data Origination Code3-44
Use World Class Routing Restrictions 
(DEFINITY G2.2 and G3 only)3-44
Change Override Restrictions on 3-way 
COR Check3-45
nDetecting Toll Fraud3-45
Administration Security3-47
Call Detail Recording (CDR) / Station Message Detail 
Recording (SMDR)3-48
Traffic Measurements and Performance3-49
Automatic Circuit Assurance (ACA)3-51
BCMS Measurements...

Page 7

BCS Products
Security Handbook  
555-025-600  
Issue 6
December 1997
Contents 
Page vii  
Protecting Remote Call Forwarding4-16
nMERLIN Plus Communications System4-16
Protecting Remote Line Access (R2 only)4-16
Protecting Remote Call Forwarding (R2 only)4-17
nPARTNER II Communications System4-18
nPARTNER Plus Communications System4-18
nSystem254-19
Protecting Remote Access4-19
Protecting Remote System Administration4-20
5 Voice Messaging Systems 5-1
nProtecting Voice Messaging Systems5-2
Security...

Page 8

BCS Products
Security Handbook  
555-025-600  
Issue 6
December 1997
Contents 
Page viii  
Protecting the AUDIX Voice Power System5-53
6 Automated Attendant 6-1
nDEFINITY ECS, DEFINITY Communications Systems, 
System75, and System856-1
Security Tips6-1
Tools that Prevent Unauthorized Calls6-2
Security Measures6-5
Detecting Automated Attendant Toll Fraud6-8
Protecting Automated Attendant on the 
AUDIX Voice Mail System6-16
Protecting Automated Attendant on the AUDIX
Voice Power System6-17
Protecting...

Page 9

BCS Products
Security Handbook  
555-025-600  
Issue 6
December 1997
Contents 
Page ix  
CMS Helplines7-2
nCallMaster PC7-3
Security Tips7-3
nMultipoint Conferencing Unit
(MCU)/Conference Reservation and
Control System (CRCS)7-4
nPassageWay®Telephony Services for
NetWare® and Windows NT®7-4
Security Tips7-5
nTransTalk 9000 Digital Wireless System7-8
Security Tips7-8
A Call Routing A-1
nCall RoutingA-1
B Blocking Calls B-1
nCountry CodesB-1
nBlocking Toll Fraud DestinationsB-8
Blocking ARS Calls on...

Page 10

BCS Products
Security Handbook  
555-025-600  
Issue 6
December 1997
Contents 
Page x  
nAdministering Customer Logins and
Forced Password AgingD-13
Adding Customer Logins and Assigning Initial
PasswordD-13
Changing a Login’s AttributesD-15
Administering Login Command PermissionsD-16
nAdministering the Security Violations ReportsD-17
E Changing Your Password E-1
nAUDIX Voice Mail SystemE-1
nAUDIX Voice Power SystemE-1
nCONVERSANT Voice Information SystemE-2
nDEFINITY AUDIX SystemE-3
nDEFINITY ECS and...
Start reading Lucent Technologies BCS Products Security Handbook

Related Manuals for Lucent Technologies BCS Products Security Handbook

All Lucent Technologies manuals