Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook

Lucent Technologies BCS Products Security Handbook

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies BCS Products Security Handbook online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							BCS Products
    Security Handbook  
    555-025-600    Issue 6
    December 1997
    Index 
    Page IN-13  
    P
    Partitioned Group Numb er,C-1PA RTN ER A t t e nd a nt,6-20
    PARTNER II Communic ations System
    p rotecting the system,4-18sec urity c hec klists,H-53
    sec urity g oals and  tools,2-16voic e mail,5-48PA RTN ER M A IL  Sys te m,5-48, 5-50
    automated  attend ant,6-20outc alling,5-50, 5-52password
    chang ing
    ,E- 8
    p rotec ting,5-48, 5-51
    p rotecting,5-48
    security checklist,H-56sec urity tip s,5-48, 5-51PA RTN ER M A IL  VS Sys t em,5-48, 5-50
    automated  attend ant,6-20password
    chang ing,E- 8
    p rotec ting,5-48, 5-51
    p rotecting,5-48security checklist,H-56sec urity tip s,5-48, 5-51
    PA RTN ER Pl us  C om mu ni c at i on s Sy st em
    p rotecting the system,4-18sec urity c hec klists,H-53
    sec urity g oals and  tools,2-16voic e mail,5-50Passag eWay Telep hony Servic es
    sec urity tip s
    ,7-5Pa ss w or d
    sec urity for ad ministrator p assword s,5-16
    passwords
    adjunc t,5-3aging,3-48
    c hoosing,2-5d efault,1-4forc ed ag ing,3-47
    g eneral security measures,2-8p rog rams to crac k,1-2, 2-2p rotecting,2-7
    storing,2-6PB X
    acc essing,1-5
    toll fraud,2-1peg counts,3-50, 6-10hig h,3-49
    Personal Id entific ation Numb er,F-2Personal Station Ac c ess,3-22, H-18Personal Station Ac c ess (PSA),3-22
    PGN, see Partitioned  Group  Numb er
    PIN, see Personal Id entific ation Numb er
    PNA, see Private Network Ac c ess 
    						
    							BCS Products
    Security Handbook  
    555-025-600    Issue 6
    December 1997
    Index 
    Page IN-14  
    ports
    administration,3-50, 3-56
    automated  attend ant,6-3INADS,3-47maintenance,3-56
    MERLIN LEGEND Communic ations System,4-8MERLIN MAIL Voic e Messag ing  System,5-33outward  restricted,5-7
    PA RTN ER MA I L  Sy st e m,5-50PA RTN ER MA I L  VS Sys te m,5-50PB X,5-5
    Re mo te  A c c e ss,3-54, 3-56sec urity,2-3, 2-6System Management,3-54
    tip /ring,4-19treated as station,5-5TTI,3-42
    usag e d ata,6-12used  as station,6-2
    voic e,5-27voic e mail,5-5Voic e Mail Integ rated,4-8
    Private Network Ac c ess,3-21p roduc t sec urity c hec klists,H-1
    R
    random numb er g enerators,1-2, 2-2rec all sig naling,3-17Rec ent Change History Rep ort,3-61
    referral c all
    SVN,3-53Remote Ac c ess,1-1, 1-4, 1-5, 2-2
    800 numb ers,3-2attendant c ontrol of c alls,3-34Barrier Cod e Ag ing,3-61
    DEFINITY Communications System,2-2d ial tone,3-38dialing in
    800 service trunks
    ,2-2CO trunks,2-2FX trunks,2-2disabled during business hours,3-34disabling,3-3, C-3
    invalid log in attempts,3-58kill,D-6MERLIN II Communic ations System,4-7
    MERLIN LEGEND Communic ations System,4-13MERLIN Plus Communic ations System,4-16permanently disabling,D-12
    removing,3-3setting  up,C-1St at u s Re p o r t,3-58
    status rep ort,3-58System 25,4-19System 75,3-2
    System 85,3-2Violations Status Rep ort,3-59 
    						
    							BCS Products
    Security Handbook  
    555-025-600    Issue 6
    December 1997
    Index 
    Page IN-15  
    Remote Ad ministration Unit,2-16, 4-18Remote Call Forward ing,4-16, 4-17
    used  with loop -start trunks,4-16Remote Home Numb ering  Plan Area,3-34Remote Line Acc ess,4-16
    Remote Maintenanc e Board,5-31Remote Maintenanc e Devic e,4-19Remote Port Security Devic e,G-1
    remote servic e ob serving,3-63Remote System Administration
    System 25,4-20
    Remote System Prog ramming,4-15Remote User Ad ministration of Call Coverag e,3-23rep orts
    Authorization Code Violations Status
    ,3-58Call Acc ounting  System,4-7, 4-14, 4-17, 4-20, 5-33, 5-34, 5-45, 5-48, 5-51c all traffic,5-13, 6-9, 6-12
    distributed,2-9G3-MT,3-50, 6-10
    Manag er I,3-50, 6-10Recent Chang e History,3-61Remote Ac c ess status,3-58
    SA T,3-50, 6-10sec uring,2-9Sec urity Measurement,3-47
    Sec u r it y  Vi ol a ti o ns,D-17Sec urity Violations Measurement,3-54Sec urity Violations Status,3-54
    send ing  to attend ant,3-52SMD R,4-14, 4-17, 4-20, 5-12, 5-33, 5-34, 5-45, 5-48, 5-51, 5-53traffic,6-13
    trunk g roup,5-13, 6-10, 6-12Restriction Overrid e,3-45restrictions
    calling party and called party
    ,3-13ind ivid ual and g roup -controlled,3-18orig inating  station,3-13
    orig inating  trunk,3-13switc h translation,5-28, 5-33RHNPA, see Remote Home Numb ering Plan Area
    RMB, see Remote Maintenanc e Board
    routing
    p atterns
    ,3-51
    Tim e o f  Da y,3-21, 3-53RPSD, see Remote Port Sec urity Devic e
    S
    SAT, see System Ad ministrator Tool
    screening
    6-dig it
    ,1-8sec uring  the INADS p ort,3-47
    Se c u r i ty
    administrator p assword s,5-16e-mail,5-15
    IMAPI password,5-15trusted  server,5-15virus transmission via e-mail,5-17 
    						
    							BCS Products
    Security Handbook  
    555-025-600    Issue 6
    December 1997
    Index 
    Page IN-16  
    Se c u r i ty  A ud i t  Se r vi c e,G-3security checklist
    AUDIX Voice Mail System
    ,H-5security checklists
    A U D I X Vo i c e  Po w e r  Sy s t e m,H-7
    BasicWorks,H-9Bay Networks,H-28Conferenc e Reservation and  Control System,H-43
    C ON VERSA N T Vo ic e I n f or m at i on  Syst e m,H-13D EFI N I TY A U D IX Voi c e Me s sa g i n g  Sy st em,H-5DEFINITY Communications System G1,H-15
    DEFINITY Communications System G2,H-21DEFINITY Communications System G3,H-15DEFINITY ECS,H-15
    DIMENSION PBX System,H-25INTUITY AUDIX Voic e Messag ing  System,H-5MERLIN II Communic ations System,H-29
    MERLIN LEGEND Communic ations System,H-31MERLIN MAIL R3 Voice Messag ing  System,H-38
    MERLIN MAIL Voic e Messag ing  System,H-34MERLIN MAIL-ML Voic e Messag ing  System,H-36MERLIN Plus Communic ations System,H-41
    Multimed ia Communic ations Exc hang e Server,H-42Multip oint Conferenc ing  Unit,H-43PA RTN ER MA I L  VS Sys te m,H-56
    PARTNER Plus Communications System,H-53System 75,H-15System 85,H-21
    Security Measurement rep orts,3-47sec urity risks
    port,2-3
    Sec urity Tools for Outg oing  Calls,3-11Sec urity Tools for Remote Ac c ess,3-4Security Violation Notific ation feature,3-53
    referral c all,3-53Security Violations
    measurement rep ort,3-54, 3-56
    report,D-17status rep ort,3-54Security Violations Detail Rep ort,3-57
    Security Violations Summary Report,3-56send ing
    overlap ped,3-45
    servic e ob serving,3-63should er surfing,1-6six-d ig it screening,1-8
    SMD R
    reports,4-7, 4-14, 4-17, 4-20, 5-33, 5-34, 5-45, 5-48, 5-51, 5-53SMDR, see Station Messag e Detail Rec ord ing
    soc ial eng ineering
    ,1-6SPM, see System Prog ramming and  Maintenance
    Station Message Detail Record ing,1-4, 3-43, 3-48, 5-11, 5-42, 6-8, F- 1
    station restric tions,3-17St a ti o n Se c u r it y  C od e  Vi ol a t io ns  Rep o r t,3-60Station Security Violation Status Rep ort,3-58
    Station-to-Trunk Restric tions,5-6, 6-3status remote acc ess c ommand,3-10SVN, see Security Violation Notific ation feature 
    						
    							BCS Products
    Security Handbook  
    555-025-600    Issue 6
    December 1997
    Index 
    Page IN-17  
    switc h
    d ial tone,3-38
    translation restrictions,5-28, 5-33switc hhook flash
    administering,3-18
    System 25
    password
    chang ing
    ,E- 9
    p rotecting Remote Ac cess,4-19p rotecting the system,4-19
    sec urity g oals and  tools,2-13voic e mail,5-52System 75
    automated  attend ant
    ,6-1d etec ting toll fraud,3-45password
    chang ing
    ,E- 9
    Re mo te  A c c e ss,3-3restric ting  unauthorized  outg oing  c alls,3-11sec urity c hec klists,H-15
    sec urity g oals and  tools,2-10sec urity measures,3-24sec urity tip s,3-2
    voic e mail,5-4System 85
    automated  attend ant,6-1
    d etec ting toll fraud,3-45password
    chang ing,E- 1 0
    Re mo te  A c c e ss,3-3restric ting  unauthorized  outg oing  c alls,3-11
    sec urity c hec klists,H-21sec urity g oals and  tools,2-10sec urity measures,3-24
    voic e mail,5-4system ad ministration
    remote,4-14
    System Administrator Tool,3-50, 5-13reporting,3-50, 6-10system c onsole
    physical security
    ,2-9system files
    performing backups,2-9
    System Prog ramming  and  Maintenance,4-15system tone test c all,3-37
    T
    TA C,  se e Tr un k  A c c es s Co d e
    Tand em Tie Trunk,3-36TCM, see Traveling  Class Mark
    Technic al Servic e Center
    ,xxi 
    						
    							BCS Products
    Security Handbook  
    555-025-600    Issue 6
    December 1997
    Index 
    Page IN-18  
    telec ommunic ations fraud
    airp orts,1-6
    by employees,1-8d efinition,1-1effec t,1-2, 1-3
    emp loyees,2-7in lob b y,3-18telep hone numb er
    nonp ub lished
    ,3-2Tenant Services,3-30, 5-10, 6-7Terminal Translation Initialization,3-42
    Terminal-to-Terminal Only Calling  Restric tion,6-4Terminal-to-Terminal Restric tion,3-14, 5-7, 6-4Termination Restric tion,6-4
    test c all
    fac ility,3-36trunk,3-36
    third party calls,5-3three-way-c onferencing,5-33
    tie trunk,3-41disallowing outgoing calls,3-40inc oming,3-19
    limiting  acc ess,3-41restric ting,3-19tand em,3-41, 3-44
    Ti me  o f  Day
    plan,3-29routing,3-21, 3-53
    preventing  after-hours c alling,3-29
    time slot test call,3-37
    Time-Out to Attend ant authorization cod e,3-33tip/ring port,4-19TN744 Call Classifier c ircuit p ack,3-37
    Toll Analysis,3-16, 5-7, 6-5tab le,5-9, 5-10toll fraud
    contact list
    ,G-5internal,3-49voic e messag ing,5-2
    Toll Fraud Intervention Hotline,xxiToll Restric tion,3-13, 3-15, 5-7, 5-33, 6-4Tone Detec tor circ uit pac k,3-37
    traffic
    abnormal p atterns,6-10measurements,3-49
    monitoring  flow,3-51reports,5-18, 5-28, 6-13Trans Talk 9000 Dig ital Wireless System
    sec urity tip s
    ,7-8Transfer Out of AUDIX,5-23disabling,5-26
    transfers
    limiting,6-5Traveling Class Mark,3-41, 3-45
    Tr o ub l e Tr ac ke r,2-6 
    						
    							BCS Products
    Security Handbook  
    555-025-600    Issue 6
    December 1997
    Index 
    Page IN-19  
    trunk
    800 servic e,2-2
    AAR,3-7administration,3-8ARS,3-7, 3-42
    CO,2-2, 3-13, 3-15, 3-16, 6-4disabling direct access,3-35FX,2-2, 3-13, 3-15, 6-4
    loop -start,4-19monitoring,3-41outg oing,3-42
    public network,3-13Re mo te  A c c e ss,2-2tie,3-13, 3-19
    WA TS,3-14, 3-15, 3-16, 3-19, 3-28, 3-39, 6-4WCR,3-7, 3-42Trunk Ac c ess Cod e,1-4, 3-13, 3-32, 3-40, 3-41, 3-44, 3-64, 5-2, 5-6, 5-25, 6-3, 6-16
    obtaining  outg oing  trunk,3-8Trunk Group Report,5-13, 6-10, 6-12
    trunk groups
    800,3-2attendant c ontrol,3-36
    CO,2-2outg oing,3-10, 3-13Re mo te  A c c e ss,2-2
    two-way,3-13trunk overrid e,3-20trunk test c all,3-36
    Trunk Turnaround
    Distrib uted  Communic ation System,3-40Trunk Verific ation,5-6, 6-3
    Trunk-to Trunk Transfer
    restric tion overrid e,3-14Trunk-to-Trunk Transfer
    d isallowing
    ,3-39, 5-53restric tion overrid e,H-17Tr u st ed  s er v er
    d efinition
    ,5-16overview,5-16TSC, see Tec hnic al Servic e Center
    TTI, see Terminal Translation Initialization
    U
    UDP, see Uniform Dial Plan
    Unattended  Console Service
    ,3-9, 3-34Unauthorized  Call Control tab le,5-9unauthorized c alls
    p reventing
    ,5-5Uniform Dial Plan,3-13unrestric ted  call list,3-16
    usag e
    monitoring,3-51 
    						
    							BCS Products
    Security Handbook  
    555-025-600    Issue 6
    December 1997
    Index 
    Page IN-20  
    V
    VDN, see Vec tor Direc tory Numb er
    Vector Direc tory Numb er,3-9
    authorization cod e,3-8COR,3-10Verify b utton,3-64
    Video Conference, see Multip oint Control Unit
    Virtual Nod ep oint Id entifier,5-9, 5-10, 6-6, 6-7VMAAP
    sec uring
    ,2-6VNI, see Virtual Nod ep oint Id entifier
    voic e mail,1-1, 1-4, 1-5, 1-8, 2-4
    c ellular p hones,5-3DEFINITY Communications System,5-4
    DEFINITY ECS,5-4d etec ting toll fraud,5-11limiting,5-7
    MERLIN II Communic ations System,5-33MERLIN LEGEND Communic ations System,5-36PARTNER II Communications System,5-48
    PARTNER Plus Communications System,5-50p rotecting,5-2sec urity risks,2-4
    System 25,5-52System 75,5-4System 85,5-4
    Voi c e Se ssi o n Re c o r d,5-18voic e mailb oxes
    d eleting  unused,2-8
    maximum invalid  attemp ts allowed,2-8passwords,2-8unassig ned,2-4, 5-3
    voic e messag ing  systems
    automated  attend ant,2-3transfer c ommand,2-4
    voic e p rocessing  systems,2-4voic e session rec ord,5-18, 6-13voic e terminal
    Pub lic  Restric tion
    ,3-13Termination Restriction,3-13voic e terminal g roup
    attendant-c ontrolled
    ,3-18void
    disabling logins,3-24
    W
    WC R,  se e Wor l d  C la ss  Rou t in g
    wild card characters,3-44, 3-45wiring  closets
    physical security
    ,2-9World  Class Routing,3-20, 3-30restric ting,3-44
    Toll Restriction,3-15toll restric tion,6-4 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies BCS Products Security Handbook