Home > Lucent Technologies > Communications System > Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide

Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 1707
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    857 Remote Access 
    17
    H12
    NXDS0
    Contiguous
    Specifies whether to hunt contiguous NXDS0 channels. This field only appears if 
    y is entered in NXDS0. The hunt algorithm to satisfy an NXDS0 call is as follows:
    Remote Access
    The Remote Access screen is used to implement the Remote Access feature. 
    Remote Access permits a caller located outside the system to access the system 
    through the public or private network and then use the features and services of the 
    system.
    Remote Access users can dial into the system using central office (CO), Foreign 
    Exchange (FX), Wide Area Telecommunications trunks (WATS), and Integrated 
    Services Digital Network Primary Rate Interface (ISDN-PRI) trunks. In addition, 
    a dedicated Remote Access Direct Inward Dialing number can be provided.
    Valid entries Usage
    y/n
    Enter y to specify the ISDN information transfer rate for 1920 
    Kbps data, which includes 30 B-channels. When a PE is 
    administered to support H12, the hunt algorithm to satisfy a 
    call requiring 1920 Kbps of bandwidth uses a fixed allocation 
    scheme.
    Valid entries Usage
    y/n
    Enter y to specify the NXDS0 multi-rate service.
    Valid entries Usage
    y
     Enter y to specify the “floating” scheme. NXDS0 calls are 
    placed on a contiguous group of B-channels large enough to 
    satisfy the requested bandwidth without constraint on the 
    starting channel (no fixed starting point trunk).
    H0 and NXDS0 “floating” scheme cannot both be 
    y.
    n Enter n to specify the “flexible” scheme. NXDS0 calls are 
    placed on any set of B-channels on the same facility as long as 
    the requested bandwidth is satisfied. There are no constraints, 
    such as contiguity of B-channels or fixed starting points. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    858 Remote Access 
    17
    !SECURITY ALERT:
    Lucent Technologies designed the Remote Access feature incorporated in 
    this product that, when properly administered by the customer, enables the 
    customer to minimize the ability of unauthorized persons to gain access to 
    the network. It is the customer’s responsibility to take the appropriate steps 
    to properly implement the features, evaluate and administer the various 
    restriction levels, protect access codes and distribute them only to 
    individuals who have been advised of the sensitive nature of the access 
    information. Each authorized user should be instructed concerning the 
    proper use and handling of access codes.
    In rare instances, unauthorized individuals make connections to the 
    telecommunications network through use of remote access features. In such 
    an event, applicable tariffs require the customer pay all network charges for 
    traffic. Lucent Technologies cannot be responsible for such charges, and will 
    not make any allowance or give any credit for charges that result from 
    unauthorized access.
    To ensure the security of your system, consider the following:
    nMake all remote access facilities unlisted directory telephone numbers.
    nRequire users to enter a Barrier Code of at least seven random digits AND 
    an Authorization Code of at least 13 random digits to make network calls.
    nMake Authorization Codes nonconsecutive (random) and change them, at 
    least, quarterly.
    nDeactivate Authorization Codes immediately if the user leaves the 
    company or changes assignments.
    nAssign the minimum level of calling permissions required to each 
    Authorization Code.
    nBlock off-hours and weekend remote access calling, when possible. Use 
    Alternative Facility Restriction Levels, if available.
    nUse a voice recording, warble tone, or no tone and avoid use of a dial tone 
    as a prompt when the remote access unit answers.
    nAssign the lowest possible FRL to only allow internal switch calls.
    As an additional step to ensure System security, you can permanently disable the 
    Remote Access feature if you do not intend to use it now or in the future. If you do 
    decide to permanently disable the feature, it will require Lucent Services 
    intervention to activate the feature again. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    859 Remote Access 
    17
    !CAUTION:
    Your attempt to disable the Remote Access feature will be lost if the switch is 
    rebooted without saving translations. Therefore, execute a “save 
    translation” command after permanently disabling the Remote Access 
    feature.
    To assist you in maintaining the security of your system, DEFINITY ECS 
    provides the status remote access command, which provides status and 
    information on each remote access barrier code and on the remote access feature. 
    A sample Status Remote Access screen follows the Remote Access screen.
    Field descriptions for page 1
    Screen 175. Remote Access 
    change remote-access
                                      REMOTE ACCESS
       Remote Access Extension________              Barrier Code Length:____
    Authorization Code Required? y  Remote Access Dial Tone: n
         Barrier      COR  TN  COS   Expiration    No. of     Calls
          Code        COR  TN  COS      Date       Calls      Used
       1:________     1__  1_ 1__   __/__/__ ______     ______
       2:________  1__  1_ 1__   __/__/__      ______     ______
       3:________  1__  1_ 1__   __/__/__      ______     ______
       4:________  1__  1_ 1__   __/__/__      ______     ______
       5:________  1__  1_ 1__   __/__/__      ______     ______
       6:________  1__  1_ 1__   __/__/__      ______     ______
       7:________  1__  1_ 1__   __/__/__      ______     ______
       8:________  1__  1_ 1__   __/__/__      ______     ______
       9:________  1__  1_ 1__   __/__/__      ______     ______
      10:_______  1__  1_ 1__   __/__/__       ______     ______
    Permanently Disable? __ Disable Following A Security Violation? y
    (NOTE:  You must logoff to effect permanent disabling of Remote Access) 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    860 Remote Access 
    17
    Screen 176. Remote Access Status 
    Remote Access Extension
    The remote access extension is used as if it was a DID extension. Only one DID 
    extension can be assigned as the remote access extension. Calls to that number are 
    treated the same as calls on the remote access trunk.
    When a trunk group is dedicated to Remote Access, the remote access extension 
    number is administered on the trunk group’s incoming destination field.
    Barrier Code Length
    Assign a barrier code length of 7 to provide maximum security.
    Valid entries Usage
    Extension 
    numberEnter the extension number for Remote Access associated with 
    each trunk that supports the Remote Access feature. You 
    cannot assign a Vector Directory Number (VDN) extension as 
    the remote access extension.
    Valid entries Usage
    4 
    to 7 Enter a number to indicate the length of the barrier code. 
    status remote-access
    REMOTE ACCESS STATUS
    Remote Access Status: enabled
    Date/Time Modified: 01/30/95 17:00
    Barrier  Date  Expiration No. of Calls Status Date/Time Expired Cause
    Code Modified Date Calls Used
    1:2374745 01/30/95 03/31/95 50 50 expired 02/15/95 20:43 calls
    2:3374837 01/30/95 / / 20 4 active / /
    3:3285038 01/30/95 01/31/96 13 expired 02/10/95 09:32 date
    4:5738557 01/30/95 07/31/95 20 20 expired 02/03/95 10:14 calls
    5:7764884 01/30/95 05/20/95 0 active / / :
    6: // // // :
    7: // // // :
    8: // // // :
    9: // // // :
    10: // // // : 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    861 Remote Access 
    17
    Authorization Code Required
    When you use an authorization code in conjunction with a barrier codes it 
    increases the security of the Remote Access feature.
    Remote Access Dial Tone
    Set this field to 
    n for maximum security. This field appears when the 
    Authorization Code Required field is set to y.
    Barrier Code
    You must assign a barrier code that conforms to the number entered in the Barrier 
    Code Length field. You may enter up to 10 barrier codes per system. Duplicate 
    entries are not allowed. You must keep your own records regarding the 
    distribution of these barrier codes to your personnel.
    COR
    Assign the most restrictive class of restriction (COR), that provides only the level 
    of service required, to provide the maximum security.
    Valid entries Usage
    y/n
    Enter y to require an authorization code be dialed by Remote 
    Access users to access the system’s Remote Access facilities.
    Valid entries Usage
    y/n
    Enter n so that there is no Remote Access Dial Tone prompt.
    Valid entries Usage
    0 
    to 9Enter a 4- to 7-digit number in any combination of digits.
    noneMust be specified in the first Barrier Code field, if the Barrier 
    Code Length field is blank.
    Valid entries Usage
    0 
    through 95Enter the COR number associated with the barrier code that 
    defines the call restriction features.  
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    862 Remote Access 
    17
    TN
    COS
    Assign the most restrictive class of service (COS), that provides only the level of 
    service required to provide the maximum security.
    Expiration Date
    Assign an expiration date based on the expected length of time the barrier code 
    will be needed. If it is expected the barrier code is to be used for a 2-week period, 
    assign a date two weeks from the current date. If the Expiration Date is assigned, a 
    warning message is displayed on the system copyright screen seven days prior to 
    the expiration date. The system administer can modify the expiration date to 
    extend the time interval if needed.
    No. of Calls
    The Expiration Date and No. of Calls fields can be used independently or in 
    conjunction to provide the maximum security. If both the Expiration Date and No. 
    of Calls fields are assigned, the corresponding barrier code expires when the first 
    of these criteria is satisfied.
    Calls Used
    This display-only field shows the number of calls placed using the corresponding 
    barrier code. This field is incremented each time a barrier code is successfully 
    used to access the Remote Access feature. A usage that exceeds the expected rate 
    indicates improper use.
    Valid entries Usage
    1
     to 20 (G3si)
    1 to 100 (G3r)Enter the appropriate Tenant Partition number.
    Valid entries Usage
    0
     to 15Enter the COS number, associated with the barrier code, that 
    defines access permissions for Call Processing features. 
    Valid entries Usage
    A date greater than the 
    current date Enter the date you want the barrier code to expire. 
    Valid 
    entries Usage
    1
     to 9999  Enter the number of Remote Access calls that can be placed 
    using the associated barrier code.  
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    863 Remote Call Coverage Table 
    17
    Permanently Disable
    Reactivation of remote access to the interface requires Lucent Services 
    intervention.
    Disable Following a Security Violation
    This field appears on the screen when the SVN Authorization Code Violation 
    Notification Enabled field on the Security-Related System Parameters screen is 
    set to y. 
    Related Topics
    Refer to ‘‘
    Setting up remote access’’ on page 297 for step-by-step instructions for 
    configuring remote access.
    Refer to ‘‘
    Remote Access’’ on page 1466 for a description of this feature.
    Remote Call Coverage Table
    The Remote Call Coverage Table allows you to provide automatic redirection of 
    certain calls to alternate non-local answering positions in a coverage path.
    Non-local numbers may be any ARS or AAR number, any number on the public 
    network, any international number, or a UDP/DCS extension up to 16 digits, 
    which includes any ARS/AAR facility access code, any trunk dial access code 
    (TAC), long distance dialing code, or international dial code. Up to 999 remote 
    call coverage points can be entered on the 23 pages of this screen.
    Valid entries Usage
    y/n
    Enter y to permanently block remote access to the 
    administration interface. 
    Valid 
    entries Usage
    y/n
    Enter y to disable the remote access feature following detection of a 
    remote access security violation. The system administrator can 
    re-enable Remote Access using the enable remote access command. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    864 RHNPA Table 
    17
    Field descriptions for page 1
    Screen 177. Remote Call Coverage Table 
    RHNPA Table
    The RHNPA Table defines route patterns for specific 3-digit codes, usually direct 
    distance dialing (DDD) prefix numbers. 
    Screen 178. RHNPA Table
    change coverage remote
    REMOTE CALL COVERAGE TABLE
    01: ________________      16: ________________      31: ________________        
    02: ________________      17: ________________      32: ________________        
    03: ________________      18: ________________      33: ________________        
    04: ________________      19: ________________      34: ________________        
    05: ________________      20: ________________      35: ________________        
    06: ________________      21: ________________      36: ________________        
    07: ________________      22: ________________      37: ________________        
    08: ________________      23: ________________      38: ________________        
    09: ________________      24: ________________      39: ________________        
    10: ________________      25: ________________      40: ________________        
    11: ________________      26: ________________      41: ________________        
    12: ________________      27: ________________      42: ________________        
    13: ________________      28: ________________      43: ________________        
    14: ________________      29: ________________      44: ________________        
    15: _____________ 30: _____________ 45: _____________
    change rhnpa table  Page 1 of X
    RHNPA TABLE: __ 
                            CODE:  x00 - x99
                                  Pattern Choices
               1: ___   3: ___   5: ___   7: ___   9: ___   11: ___
               2: ___   4: ___   6: ___   8: ___  10: ___   12: ___
           Code-Pattern Choice Assignments (from 1 - 12 above)
    00: 1__ 10: 1__ 20: 1__ 30: 1__ 40: 1__ 50: 1__ 60: 1__ 70: 1__ 80: 1__ 90: 1__
    01: 1__ 11: 1__ 21: 1__ 31: 1__ 41: 1__ 51: 1__ 61: 1__ 71: 1__ 81: 1__ 91: 1__
    02: 1__ 12: 1__ 22: 1__ 32: 1__ 42: 1__ 52: 1__ 62: 1__ 72: 1__ 82: 1__ 92: 1__
    03: 1__ 13: 1__ 23: 1__ 33: 1__ 43: 1__ 53: 1__ 63: 1__ 73: 1__ 83: 1__ 93: 1__
    04: 1__ 14: 1__ 24: 1__ 34: 1__ 44: 1__ 54: 1__ 64: 1__ 74: 1__ 84: 1__ 94: 1__
    05: 1__ 15: 1__ 25: 1__ 35: 1__ 45: 1__ 55: 1__ 65: 1__ 75: 1__ 85: 1__ 95: 1__
    06: 1__ 16: 1__ 26: 1__ 36: 1__ 46: 1__ 56: 1__ 66: 1__ 76: 1__ 86: 1__ 96: 1__
    07: 1__ 17: 1__ 27: 1__ 37: 1__ 47: 1__ 57: 1__ 67: 1__ 77: 1__ 87: 1__ 97: 1__
    08: 1__ 18: 1__ 28: 1__ 38: 1__ 48: 1__ 58: 1__ 68: 1__ 78: 1__ 88: 1__ 98: 1__
    09: 1__ 19: 1__ 29: 1__ 39: 1__ 49: 1__ 59: 1__ 69: 1__ 79: 1__ 89: 1__ 99: 1__ 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    865 Route Pattern 
    17
    RHNPA TABLE
    CODE
    Enter the desired 100-block, for example 000 through 099 or 900 through 999. A 
    separate screen is required for each 100-block.
    Pattern Choices
    Code-Pattern Choice Assignments
    Route Pattern
    The Route Pattern screen defines the route patterns used by your switch. Each 
    route pattern contains a list of trunk groups that can be used to route the call. The 
    maximum number of route patterns and trunk groups allowed depends on the 
    configuration and memory available in your system.
    Use this screen to insert or delete digits so AAR or ARS calls route over different 
    trunk groups. You can convert an AAR number into an international number, and 
    insert an area code in an AAR number to convert an on-network number to a 
    public network number. Also, when a call directly accesses a local central office 
    (CO), if the long-distance carrier provided by your CO is not available, your 
    switch can insert the dial access code for an alternative carrier into the digit string.
    Valid entries Usage
    1
     to 32Enter the table number. You can use up to 8 screens for each 
    table, one screen for each 100 numbers.
    Valid entries Usage
    Enter the route pattern number you want associated with each 
    code. The pattern choice you list on one screen automatically 
    defaults to the other screens of the same table. If you use one 
    pattern for most of the codes, assign that pattern to choice 1. 
    Valid entries Usage
    1
     through 12Enter a Pattern Choice number from the list above to choose 
    the route pattern for each prefix code.  
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    866 Route Pattern 
    17
    Screen 179. Route Pattern
    Pattern Number
    Displays the route pattern number (
    1 to 640).
    Grp No
    FRL
    !SECURITY ALERT:
    For system security reasons, Lucent recommends using the most restrictive 
    FRL possible.
    Network Specific Facility
    Identifies the services and features used to complete a call. 
    Valid entries Usage
    1
     to 99Enter the trunk group number associated with this row 
    (preference).
    Valid entries Usage
     0 to 7Enter the Facility Restriction Level (FRL) associated with the 
    entries on this row (preference). 0 is the least restrictive and 7 is 
    the most restrictive. The calling party’s FRL must be greater than 
    or equal to this FRL to access the associated trunk-group. 
    change route-pattern 1 Page 1 of X
      Pattern Number: 1_               
        Grp.  FRL NPA Pfx Hop Toll No. Del Inserted                             IXC
        No.           Mrk Lmt List Digits  Digits
     1: ___   _  ___  _  __   __    __    _____________________________________ user
     2: ___   _  ___  _  __   __    __    _____________________________________ user
     3: ___   _  ___  _  __   __    __    _____________________________________ user
     4: ___   _  ___  _  __   __    __    _____________________________________ user
     5: ___   _  ___  _  __   __    __    _____________________________________ user
     6: ___   _  ___  _  __   __    __    _____________________________________ user
    BCC VALUE  TSC CA-TSC   ITC BCIE Service/Feature BAND No.  Numbering LAR
    0 1 2 3 4 W    Request                                   Dgts Format
    Subaddress
      1: y y y y y n  y none_____ both ept  outwats-bnd____ ___  _ ________  none
      2: y y y y y n  n           rest      _______________       _  ________  next
      3: y y y y y n  n           rest      _______________       _  ________  rehu
      4: y y y y y n  n           rest      _______________       _  ________  none
      5: y y y y y n  n           rest      _______________       _  ________  none
      6: y y y y y n  n           rest      _______________       _  ________  none 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide