Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook

Lucent Technologies BCS Products Security Handbook

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 51

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-5 Keeping Unauthorized Third Parties from Entering the System 
3
Figure 3-1. Remote Access Call Path
INCOMING
REMOTE
ACCESS CALL
YES
YES
NO
YES
CODE?VALID
CODE ENTERED
CODE?VALID
STOP
BARRIER
CODE
REQUIRED?NO
APPLY SECURITY
VIOLATION NOTIFICATION
STOP
NO
STOP
YES
ROUTE TO ATTENDANT
OR DISCONNECT
STOPNO
CODE ENTERED
ACCESS DIAL
TONE?
LOG INVALID ATTEMPT
DISCONNECT CALL
SYSTEM DIAL TONECALL...

Page 52

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-6 Keeping Unauthorized Third Parties from Entering the System 
3
For DEFINITY ECS, DEFINITY G1, G3, and System 75, you can assign up to 10 
barrier codes to provide the first checkpoint. When barrier codes are required for 
Remote Access, callers hear a special dial tone, and then must enter a valid 
barrier code before they can access the PBX system.
NOTE:
With DEFINITY ECS, DEFINITY G1, G3,...

Page 53

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-7 Keeping Unauthorized Third Parties from Entering the System 
3
code should be used to screen entry into Remote Access; authorization codes 
can then be used to screen outgoing calls on Automatic Alternate Routing (AAR), 
Automatic Route Selection (ARS), and World Class Routing (WCR) (G2.2) trunks.
Authorization Codes1
NOTE:
For all systems, once established, the number of digits (four to...

Page 54

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-8 Keeping Unauthorized Third Parties from Entering the System 
3
System 85, DEFINITY G2, and G3 users. However, it is best to keep the number 
of authorized users to a minimum.
To maximize the security of the system, follow these steps:
nWhen assigning authorization codes, give the users the lowest possible 
FRL needed for their calling requirements.
nBe sure to remove any unused...

Page 55

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-9 Keeping Unauthorized Third Parties from Entering the System 
3
For DEFINITY ECS, DEFINITY G1, G3, and System 75, trunks translated for 
Remote Access can be given a night service destination. Although it is not 
recommended, trunks accessing the system can be assigned a Remote Access 
extension as a night service destination. The system will change to either allow or 
deny access for a...

Page 56

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-10 Keeping Unauthorized Third Parties from Entering the System 
3
dialed (or inferred), routes calls to the vector. Calls processed by the vector 
carry the permissions and restrictions associated with the COR of the VDN
.
In order to deny incoming callers access to outgoing facilities, including tie lines, 
configure the COR of the VDN to prohibit outgoing access. To do this, follow the...

Page 57

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-11 Tools that Restrict Unauthorized Outgoing Calls 
3
Use of the acknowledgment option is strongly recommended for those systems 
utilizing both Remote Access and Facility Test Call (for notification if the feature is 
inadvertently left enabled), or those systems requiring notification if Facility Test 
Call is linked to hacking activity.
Tools that Restrict Unauthorized 
Outgoing Calls
Use...

Page 58

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-12 Tools that Restrict Unauthorized Outgoing Calls 
3
Class of Restriction
For DEFINITY ECS, DEFINITY G1, G3, and System 75, the Class of Restriction 
(COR) places calling permissions and restrictions on both the calling party and the 
called extension. Up to 64 CORs can be defined in the system. For DEFINITY 
ECS, DEFINITY G3rV1, G3i-Global, and G3V2, the number of CORs has been 
increased...

Page 59

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-13 Tools that Restrict Unauthorized Outgoing Calls 
3
The following restrictions can be placed on the originating station or trunk:
nOutward Restricted: cannot make Public Network Calls via AAR/ARS or 
TACs. Calls can be placed to internal stations, to tie trunks via TACs, and 
off-switch via the Uniform Dial Plan (UDP).
NOTE:
Some states require that all telephones be able to dial emergency...

Page 60

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Large Business Communications Systems 
Page 3-14 Tools that Restrict Unauthorized Outgoing Calls 
3
accessed. After the vector is accessed, the COR of the VDN is used 
for further call permission checking. See also ‘‘
Restriction Override 
(3-way COR Check)’’ on page 3-14.
Restriction Override (3-way COR Check)
The Restriction Override feature, which is available only with DEFINITY 
G3i-Global and G3V2 and later, determines whether or...
Start reading Lucent Technologies BCS Products Security Handbook

Related Manuals for Lucent Technologies BCS Products Security Handbook

All Lucent Technologies manuals