AT&T DEFINITY Remote Port Security Device Información técnica

Busca en linea o descarga Información técnica para Redes AT&T DEFINITY Remote Port Security Device. AT&T DEFINITY Remote Port Security Device Technical information Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 470
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente

Indice de contenidos

Pagina 1 - Security Handbook

Avaya Products Security Handbook555-025-600Comcode 108074378Issue 7June 2001

Pagina 2

Contentsx Issue 7 June 2001 Call Traffic Report 6-13Trunk Group Report 6-13SAT, Manager I, and G3-MT Reporting 6-13ARS Measurement Selection 6-14Auto

Pagina 3

Large Business Communications Systems4-42 Issue 7 June 2001For DEFINITY G2.2: Use PROC103 WORD1 FIELD15 to suppress WCR dial tone for that trunk gro

Pagina 4

Security MeasuresIssue 7 June 20014-43Disable Transfer Outgoing Trunk to Outgoing TrunkThe outgoing trunk to outgoing trunk transfer (OTTOTT) (G3r an

Pagina 5

Large Business Communications Systems4-44 Issue 7 June 2001Disallow Outgoing Calls from Tie TrunksIf your tie trunks are used solely for office-to-of

Pagina 6

Security MeasuresIssue 7 June 20014-45 Set the default FRL to a low value with PROC103 WORD1 FIELD2.NOTE:ETN trunks pass along the originating stati

Pagina 7

Large Business Communications Systems4-46 Issue 7 June 2001For DEFINITY ECS, DEFINITY G1, G3, and System 75 R1V3: Use change system-parameters featu

Pagina 8

Security MeasuresIssue 7 June 20014-47Disable Distinctive Audible AlertDistinctive Audible Alert on a 2500 set has the potential of returning stutter

Pagina 9

Large Business Communications Systems4-48 Issue 7 June 2001 Use change ars analysis to display the ARS Toll Analysis screen. Limit long distance and

Pagina 10 - Contents

Detecting Toll FraudIssue 7 June 20014-49Change Override Restrictions on 3-way COR CheckFor G3V2 and later releases, the Restriction Override feature

Pagina 11

Large Business Communications Systems4-50 Issue 7 June 2001Administration SecurityLogins for INADS PortFor DEFINITY G3V4 and later, which includes DE

Pagina 12

Detecting Toll FraudIssue 7 June 20014-51Forced Password Aging and AdministrableLoginsDEFINITY G3V3 and later releases, which includes DEFINITY ECS,

Pagina 13

ContentsIssue 7 June 2001 xiProtecting the MERLIN MAIL, MERLINMAIL-ML, MERLIN MAIL R3, and MERLINLEGEND Mail Voice Messaging Systems 6-44Protecting A

Pagina 14

Large Business Communications Systems4-52 Issue 7 June 2001Commands for the DEFINITY G3V3 or later, which includes DEFINITY ECS, are grouped into thr

Pagina 15

Detecting Toll FraudIssue 7 June 20014-53Review CDR/SMDR records for the following symptoms of abuse: Short holding times on one trunk group Patter

Pagina 16

Large Business Communications Systems4-54 Issue 7 June 2001Monitor IFor DEFINITY G2 and System 85, the optional Monitor I tracks call volume and aler

Pagina 17

Detecting Toll FraudIssue 7 June 20014-55ARS Measurement SelectionThe ARS Measurement Selection feature can monitor up to 20 routing patterns (25 for

Pagina 18

Large Business Communications Systems4-56 Issue 7 June 2001 To review and verify the entries, enter list aca-parameters. Enter change trunk group t

Pagina 19 - About This Document

Detecting Toll FraudIssue 7 June 20014-57CMS MeasurementsThis monitoring technique measures traffic patterns and times on calls and compares them to

Pagina 20 - 1-2 Issue 7 June 2001

Large Business Communications Systems4-58 Issue 7 June 2001The SVN time interval selected, in conjunction with the threshold, specifies when a referr

Pagina 21 - Intended Audience

Detecting Toll FraudIssue 7 June 20014-59 Enter the extension number of the person who will monitor violations in the Referral Destination field(s).

Pagina 22 - How this Guide is Organized

Large Business Communications Systems4-60 Issue 7 June 2001In addition to those SVN features already discussed (SVN Authorization Code Violation Noti

Pagina 23

Detecting Toll FraudIssue 7 June 20014-61For DEFINITY ECS and DEFINITY G3, the report is divided into two sub-reports, a Summary report and a Detail

Pagina 24 - 1-6 Issue 7 June 2001

Contentsxii Issue 7 June 2001 Class of Service 7-3Toll Analysis 7-5Security Measures 7-5Limit Transfers to Internal Destinations 7-5Prevent Calls to

Pagina 25 - Roles and Responsibilities

Large Business Communications Systems4-62 Issue 7 June 2001— Login Forced Disconnects: The total number of login processes that were disconnected aut

Pagina 26 - 1-8 Issue 7 June 2001

Detecting Toll FraudIssue 7 June 20014-63For DEFINITY ECS and DEFINITY G3: Use monitor security-violations for a real-time report of invalid attempt

Pagina 27 - Avaya Security Offerings

Large Business Communications Systems4-64 Issue 7 June 2001 INADS: The INADS (Initialization and Administration System) port EIA: Other EIA portsTh

Pagina 28 - 1-10 Issue 7 June 2001

Detecting Toll FraudIssue 7 June 20014-65— Auth Code: The invalid authorization code entered— TG No: The trunk group number associated with the trunk

Pagina 29 - Related Documentation

Large Business Communications Systems4-66 Issue 7 June 2001Remote Access Barrier Code Aging/Access Limits(DEFINITY G3V3 and Later)For DEFINITY G3V3 a

Pagina 30 - 1-12 Issue 7 June 2001

Detecting Toll FraudIssue 7 June 20014-67Recent Change History Report (DEFINITY ECSand DEFINITY G1 and G3 only)The latest administration changes are

Pagina 31 - Introduction

Large Business Communications Systems4-68 Issue 7 June 2001 If the call originates outside the system, the incoming trunk equipment location is disp

Pagina 32 - Who is the Enemy?

Detecting Toll FraudIssue 7 June 20014-69For DEFINITY G2 and System 85:NOTE:This feature is available only with an ACD split. Use PROC054 WORD2 FIEL

Pagina 33 - What is in a Loss?

Large Business Communications Systems4-70 Issue 7 June 2001

Pagina 34 - Known Toll Fraud Activity

Issue 7 June 2001 5-15Small Business Communications SystemsThis chapter provides information on protecting the following communications systems: MER

Pagina 35 - 1 for Auto Loans

ContentsIssue 7 June 2001 xiii PARTNER II Communications System 7-21PARTNER MAIL and PARTNER MAIL VS Systems 7-21PARTNER Attendant 7-21 PARTNER Plu

Pagina 36 - 2-6 Issue 7 June 2001

Small Business Communications Systems5-2 Issue 7 June 2001Features for the MERLIN SystemsThe following table indicates MERLIN II and MERLIN LEGEND se

Pagina 37 - — Beeper and/or Pager Scam

Features for the MERLIN SystemsIssue 7 June 20015-3Forced Entry of Account Codesx x x x x x Affects only outgoing callsNight Service x x x x x Whenev

Pagina 38 - 2-8 Issue 7 June 2001

Small Business Communications Systems5-4 Issue 7 June 2001Station Message Detail Recording (SMDR)x x x x x x For ML R3 w/ Call ID, remote access numb

Pagina 39 - Security Risks

MERLIN II Communications SystemIssue 7 June 20015-5MERLIN II Communications SystemThis section provides information on protecting the MERLIN II Commu

Pagina 40

Small Business Communications Systems5-6 Issue 7 June 2001— With a MERLIN II Communications System display console:1. From the administration menu, p

Pagina 41 - Other Port Security Risks

MERLIN LEGEND Communications SystemIssue 7 June 20015-7MERLIN LEGEND Communications SystemThis section provides information on protecting the MERLIN

Pagina 42

Small Business Communications Systems5-8 Issue 7 June 2001Unlike the MERLIN II Communications System R3, the MERLIN LEGEND Communications System does

Pagina 43

MERLIN LEGEND Communications SystemIssue 7 June 20015-9Protection Via Star Codes andAllowed/Disallowed ListsStarting with MERLIN LEGEND Release 3.1,

Pagina 44 - 3-6 Issue 7 June 2001

Small Business Communications Systems5-10 Issue 7 June 2001Default Disallowed ListBy default, Disallowed List #7 contains the following entries, whic

Pagina 45

MERLIN LEGEND Communications SystemIssue 7 June 20015-11Security Defaults and TipsThe following list identifies features and components that can be r

Pagina 46

Contentsxiv Issue 7 June 2001 10 Blocking Calls 10-1 Country Codes 10-1 Blocking Toll Fraud Destinations 10-9Blocking ARS Calls on DEFINITY G1 an

Pagina 47

Small Business Communications Systems5-12 Issue 7 June 2001Protecting Remote AccessThe Remote Access feature allows users to call into the MERLIN LEG

Pagina 48 - Security Goals Tables

MERLIN LEGEND Communications SystemIssue 7 June 20015-13 Program the Remote Access feature to require the caller to enter a barrier code before the

Pagina 49

Small Business Communications Systems5-14 Issue 7 June 2001Protecting Remote System ProgrammingThe Remote System Programming feature allows your syst

Pagina 50 - 3-12 Issue 7 June 2001

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-15Protecting Remote Call ForwardingThe Remote Call Forwarding feature allows a customer to forward a

Pagina 51

Small Business Communications Systems5-16 Issue 7 June 2001 Employees receive calls requesting the be transferred for outside “operator assistance”

Pagina 52 - 3-14 Issue 7 June 2001

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-17 Have only system administrator transfer calls to “*10.” The customer’s long distance carrier ma

Pagina 53

Small Business Communications Systems5-18 Issue 7 June 2001The Remote Access features of your system, if you choose to use them, permit off-premises

Pagina 54 - 3-16 Issue 7 June 2001

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-19 Frequently monitor system call detail reports for quicker detection of any unauthorized or abnor

Pagina 55

Small Business Communications Systems5-20 Issue 7 June 2001Preventive MeasuresTake the following preventive measures to limit the risk of unauthorize

Pagina 56 - 3-18 Issue 7 June 2001

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-21Security Risks Associated with Transferringthrough Voice Messaging SystemsToll fraud hackers try t

Pagina 57

ContentsIssue 7 June 2001 xvChanging a Login’s Attributes 12-15Administering Login Command Permissions 12-16Display a Specified Login 12-17List Login

Pagina 58 - 3-20 Issue 7 June 2001

Small Business Communications Systems5-22 Issue 7 June 2001WARNING:Each extension should be assigned the appropriate FRL to match its calling require

Pagina 59

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-23 If the Automated Attendant prompts callers to use Remote Call Forwarding (RCF) to reach an outsi

Pagina 60 - 4-2 Issue 7 June 2001

Small Business Communications Systems5-24 Issue 7 June 2001Security Risks Associated with the RemoteAccess FeatureRemote Access allows the MERLIN MAG

Pagina 61

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-25Educating UsersEveryone in your company who uses the telephone system is responsible for system se

Pagina 62 - Barrier Codes

Small Business Communications Systems5-26 Issue 7 June 2001Detecting Toll FraudTo detect toll fraud, users and operators should look for the followin

Pagina 63

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-27 Regularly back up your MERLIN MAGIX Integrated System files to ensure a timely recovery should i

Pagina 64 - 4-6 Issue 7 June 2001

Small Business Communications Systems5-28 Issue 7 June 2001Limiting OutcallingWhen Outcalling is used to contact subscribers who are off-site, use th

Pagina 65 - Authorization Codes

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-29Consider the following when you use wild card characters in Allowed and Disallowed Lists: Disallo

Pagina 66 - Remote Access Dial Tone

Small Business Communications Systems5-30 Issue 7 June 2001For example: *67 and 420 are two entries in an Allowed List. If someone at an Outward Rest

Pagina 67 - DEFINITY G3 only)

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-31If you program the route in the 6-Digit table to absorb N digits, the actual number of digits abso

Pagina 68 - 4-10 Issue 7 June 2001

Contentsxvi Issue 7 June 2001 15 Special Security Product and Service Offers 15-1 Remote Port Security Device (RPSD) 15-1Key and Lock Features 15-

Pagina 69 - Logoff Screen Notification

Small Business Communications Systems5-32 Issue 7 June 2001If you program the route in the 6-Digit table to absorb N digits, the actual number of dig

Pagina 70 - Outgoing Calls

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-33****SECURITY ALERT****The MERLIN MAGIX Integrated System ships with ARS activated with all extensi

Pagina 71

Small Business Communications Systems5-34 Issue 7 June 2001Additional general security for voice messaging systems: Use a secure password for the Ge

Pagina 72 - 4-14 Issue 7 June 2001

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-35Magix R1.5: Disallowed Lists EnhancementsConsider the following when you use wild card characters

Pagina 73

Small Business Communications Systems5-36 Issue 7 June 2001For example: *67 and 420 are two entries in an Allowed List. If someone at an Outward Rest

Pagina 74 - 4-16 Issue 7 June 2001

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-37Disconnect Signaling Reliability 3Use this procedure to classify the disconnect signal sent by the

Pagina 75

Small Business Communications Systems5-38 Issue 7 June 2001 Outside lines can be assigned to Night Service groups in order for calls received on the

Pagina 76 - AAR/ARS Analysis

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-39Remote AccessDescriptionThe Remote Access feature allows people to use the system by dialing the n

Pagina 77 - Station Restrictions

Small Business Communications Systems5-40 Issue 7 June 2001access code and then publish the information to other hackers. Enormous charges can be run

Pagina 78 - Central Office Restrictions

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-41 Whether or not the dialed digits are correct, an inter-digit time-out occurs during the first at

Pagina 79 - Trunk-to-Trunk Transfer

ContentsIssue 7 June 2001 xvii16 Product Security Checklists 16-1 General Security Procedures 16-2 AUDIX, DEFINITY AUDIX andINTUITY AUDIX Voice M

Pagina 80 - Forced Entry of Account Code

Small Business Communications Systems5-42 Issue 7 June 2001“ * “ : Up to R3.1, was not permitted in the disallow lists. (it has always been permitte

Pagina 81 - Digit Conversion

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-431ppp900 Pay per minute toll call with wild cards.976 Pay per minute toll call.1976 Pay per minute

Pagina 82 - Personal Station Access (PSA)

Small Business Communications Systems5-44 Issue 7 June 20013. Can the remote access password, be changed?  From “craftr4” to something else.4. Does

Pagina 83

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-45System Directory. (Print) Check for marked system speed dials.Calling Groups. (Print) Identify

Pagina 84 - 4-26 Issue 7 June 2001

Small Business Communications Systems5-46 Issue 7 June 2001Allow Lists When outcalling is used.Night Service Exclusion list: Are voice mail ports l

Pagina 85

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-47Check lines for remote call forwarding. 1. Remove if not needed.2. If needed: instruct customer o

Pagina 86 - 4-28 Issue 7 June 2001

Small Business Communications Systems5-48 Issue 7 June 2001d. Make allowed list for outcalling numbers.e. Make sure no other ARS tables have FRL of 2

Pagina 87

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-496. Assign all unused auto attendant selector codes to go to either the operator or the general mai

Pagina 88 - Using FRLs

Small Business Communications Systems5-50 Issue 7 June 2001DS1 – T1 and/or PRI.1. WATTS: Customers may restrict 011 and 809 (the Dominican Republic)

Pagina 89

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-51Extension restrictions.1. Outward restrict MFM extensions not used for calling outside.2. Outward

Pagina 90 - Routing or Alternate FRLs

Contentsxviii Issue 7 June 2001 17 Large Business Communications Systems Security Tools by Release 17-118 Non-supported Products 18-1 Products No

Pagina 91 - Block International Calling

Small Business Communications Systems5-52 Issue 7 June 2001LEGEND TOLL FRAUD INTERVENTION FORM7DATE: ______________ TIME: _________________ IL#: __

Pagina 92 - Limit International Calling

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-53REMOTE CALL FORWARDING EXTS:_____________________________________________DISALLOW LIST INT’L : __

Pagina 93

Small Business Communications Systems5-54 Issue 7 June 2001EXHIBIT 1 8/16/00 Toll Fraud Incident ReportBusiness Name:Business Address:

Pagina 94 - 4-36 Issue 7 June 2001

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-55 You may contact your 800 carrier and restrict access to your 800#’s from locations you do not wi

Pagina 95

Small Business Communications Systems5-56 Issue 7 June 2001EXHIBIT 2 8/16/00Toll Fraud Incident ReportBusiness Name:Business Address: Contact Name: M

Pagina 96 - 4-38 Issue 7 June 2001

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-572: Created Disallow list 5 when encompasses the Caribbean countries:Puerto RicoPuerto RicoBahamas

Pagina 97 - Disable Facility Test Calls

Small Business Communications Systems5-58 Issue 7 June 2001All voice mail ports, extensions 563, 564, 565, 566, 567, 568, are accessing this list. C

Pagina 98

MERLIN LEGEND/MAGIX Toll FraudIssue 7 June 20015-59Revised 8/17/00EXHIBIT 3: Letter from AvayaDear ,At your request, Avaya has conducted a toll fraud

Pagina 99

Small Business Communications Systems5-60 Issue 7 June 2001MERLIN Plus Communications SystemThis section provides information on protecting the MERLI

Pagina 100 - 4-42 Issue 7 June 2001

MERLIN Plus Communications SystemIssue 7 June 20015-61 Monitor your SMDR records and/or your Call Accounting System reports regularly for signs of i

Pagina 101 - CAUTION:

Issue 7 June 2001 1-11About This DocumentScope of this HandbookThis handbook discusses security risks and measures that can help prevent external tel

Pagina 102 - Limit Access to Tie Trunks

Small Business Communications Systems5-62 Issue 7 June 2001PARTNER II Communications SystemThis section provides information on protecting the PARTNE

Pagina 103

System 25Issue 7 June 20015-63System 25This section provides information on protecting the System 25.Additional security measures are required to pro

Pagina 104 - Expert Agents

Small Business Communications Systems5-64 Issue 7 June 2001Security Tips Evaluate the necessity for Remote Access. If this feature is not vital to y

Pagina 105 - (DEFINITY G2.2 and G3 only)

System 25Issue 7 June 20015-65Security Tips The System Administration capability of the system is protected by a password. Passwords can be up to ei

Pagina 106 - 4-48 Issue 7 June 2001

Small Business Communications Systems5-66 Issue 7 June 2001

Pagina 107 - Detecting Toll Fraud

Issue 7 June 2001 6-16Voice Messaging SystemsThe information in this chapter helps prevent unauthorized users from finding pathways through the voice

Pagina 108 - Logins for INADS Port

Voice Messaging Systems6-2 Issue 7 June 2001Protecting Voice Messaging SystemsVoice messaging toll fraud has risen dramatically in recent years. Now

Pagina 109

Protecting Voice Messaging SystemsIssue 7 June 20016-3All security restrictions that prevent transfer to these codes should be implemented. The only

Pagina 110 - Detail Recording (SMDR)

Voice Messaging Systems6-4 Issue 7 June 2001 If you receive any strange messages on the voice mail system, if your greeting has been changed, or if

Pagina 111

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20016-5Tools that Prevent Unauthorized CallsYou can help prevent

Pagina 112 - Monitor I

NoticeWhile reasonable efforts were made to ensure that the information in this document was complete and accurate at the time of printing, Avaya can

Pagina 113 - ARS Measurement Selection

About This Document1-2 Issue 7 June 2001 MERLIN MAIL®-ML Voice Messaging System MERLIN MAIL® R3 Voice Messaging System PARTNER MAIL® System PARTN

Pagina 114 - DEFINITY G1 and G3 only)

Voice Messaging Systems6-6 Issue 7 June 2001The higher the FRL number, the greater the calling privileges. For example, if a station is not permitted

Pagina 115 - CMS Measurements

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20016-7Class of ServiceFor DEFINITY G2 and System 85, a voice mai

Pagina 116 - 4-58 Issue 7 June 2001

Voice Messaging Systems6-8 Issue 7 June 2001Limit Voice Mail to Internal CallingIf outcalling is not activated in the voice mail system, you can rest

Pagina 117

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20016-9NOTE:In Table 6-2, FRLs 1 through 7 include the capabiliti

Pagina 118 - 4-60 Issue 7 June 2001

Voice Messaging Systems6-10 Issue 7 June 2001Allow Calling Only to Specified NumbersA reverse strategy to preventing calls is to allow outbound calls

Pagina 119

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20016-11For DEFINITY ECS and DEFINITY G3: Use change ars analysi

Pagina 120 - 4-62 Issue 7 June 2001

Voice Messaging Systems6-12 Issue 7 June 2001See ‘‘Security Tips’’ on page 6-3 for additional ways to detect voice mail fraud.NOTE:The System Adminis

Pagina 121

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20016-13 Administer the appropriate format to collect the most i

Pagina 122 - 4-64 Issue 7 June 2001

Voice Messaging Systems6-14 Issue 7 June 2001 To review the traffic measurements, use list measurements followed by one of the measurement types (tr

Pagina 123

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20016-15 Establish short and long holding times. The defaults ar

Pagina 124 - (DEFINITY G3V3 and Later)

Reason for ReissueIssue 7 June 20011-3Reason for ReissueThis issue, Issue 7 of the Avaya Security Handbook, updates information to include the follow

Pagina 125 - Malicious Call Trace

Voice Messaging Systems6-16 Issue 7 June 2001Unauthorized System UseYou can minimize the risk of unauthorized people gaining access to your system by

Pagina 126 - Service Observing

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20016-17Trusted Server SecurityA trusted server is a computer or

Pagina 127 - List Call Forwarding Command

Voice Messaging Systems6-18 Issue 7 June 2001Internal Security. INTUITY AUDIX R4 allows the transmission between domains of two new message component

Pagina 128 - 4-70 Issue 7 June 2001

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20016-19The record reveals the routing of the call, including the

Pagina 129

Voice Messaging Systems6-20 Issue 7 June 2001Outgoing Voice Call Detail Record (AUDIX Voice Mail System Only)An outgoing call record is also created

Pagina 130 - 5-2 Issue 7 June 2001

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20016-21Protecting PasswordsThe AUDIX, DEFINITY AUDIX, and Avaya

Pagina 131

Voice Messaging Systems6-22 Issue 7 June 2001Security FeaturesBefore implementing any security measures to protect the voice mail system, it is impor

Pagina 132 - 5-4 Issue 7 June 2001

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20016-23Enhanced Call TransferWith Enhanced Call Transfer, the vo

Pagina 133 - Security Tips

Voice Messaging Systems6-24 Issue 7 June 2001This restriction may not be acceptable where it is desirable to have the call follow the coverage path o

Pagina 134 - 5-6 Issue 7 June 2001

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20016-25AMIS NetworkingAMIS Networking (the DEFINITY AUDIX System

Pagina 135 - MERLIN LEGEND Communications

About This Document1-4 Issue 7 June 2001How this Guide is OrganizedThe Avaya Security Handbook has the following chapters:Chapter 1: About This Docum

Pagina 136 - Preventative Measures

Voice Messaging Systems6-26 Issue 7 June 2001For ALL systems (DEFINITY ECS, DEFINITY G1, G2, G3, System 75, and System 85 R2V4):1. On the AUDIX Voice

Pagina 137 - Allowed/Disallowed Lists

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20016-27After you activate Enhanced Call Transfer, test it by fol

Pagina 138 - Default Disallowed List

Voice Messaging Systems6-28 Issue 7 June 2001Limit OutcallingThe measures you can take to minimize the security risk of outcalling depend on how it i

Pagina 139 - Security Defaults and Tips

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20016-29Security Tips Require callers to use passwords. Have th

Pagina 140 - Protecting Remote Access

Voice Messaging Systems6-30 Issue 7 June 2001Protecting PasswordsThe AUDIX Voice Power System offers password protection to help restrict unauthorize

Pagina 141

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20016-31Security MeasuresThe security measures described in this

Pagina 142 - 5-14 Issue 7 June 2001

Voice Messaging Systems6-32 Issue 7 June 2001NOTE:On AUDIX Voice Power System 2.1.1, mailboxes can be set individually to “1 minute,” reducing the cl

Pagina 143 - Tool Fraud Warning Signs

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20016-33Security MeasuresDesign applications with toll fraud in m

Pagina 144 - TIPS to Prevent Toll Fraud

Voice Messaging Systems6-34 Issue 7 June 2001Security TipsToll fraud is possible when the application allows the incoming caller to make a network co

Pagina 145 - Responsibility

MERLIN II Communications SystemIssue 7 June 20016-35The MERLIN MAIL Voice Messaging System provides automated attendant, call answer, and voice mail

Pagina 146 - 5-18 Issue 7 June 2001

Avaya’s Statement of DirectionIssue 7 June 20011-5Avaya’s Statement of DirectionThe telecommunications industry is faced with a significant and growi

Pagina 147 - General Security Measures

Voice Messaging Systems6-36 Issue 7 June 2001To reduce the risk of unauthorized access through your voice messaging system, observe the following pro

Pagina 148 - Preventive Measures

MERLIN LEGEND Communications SystemIssue 7 June 20016-37MERLIN LEGEND Communications SystemThe MERLIN LEGEND Communications System may be used with t

Pagina 149 - WARNING:

Voice Messaging Systems6-38 Issue 7 June 2001Protecting the AUDIX Voice Power SystemThe AUDIX Voice Power System provides both automated attendant an

Pagina 150

MERLIN LEGEND Communications SystemIssue 7 June 20016-39 Set up auto attendant selection codes so that they do not permit outside line selection. A

Pagina 151

Voice Messaging Systems6-40 Issue 7 June 2001 Enter # in the Subscriber Password field to prevent access to the corresponding voice mail. Enter yes

Pagina 152 - Other Security Hints

MERLIN LEGEND Communications SystemIssue 7 June 20016-41Security Tips At the switch, assign toll restrictions to voice message system and automated

Pagina 153 - Educating Operators

Voice Messaging Systems6-42 Issue 7 June 2001Basic Call TransferWith Basic Call Transfer, after a voice mail system caller enters *T, the system perf

Pagina 154 - Establishing a Policy

MERLIN LEGEND Communications SystemIssue 7 June 20016-43 Avoid or closely monitor the use of “guest” mailboxes (mailboxes without a physical extensi

Pagina 155 - Physical Security

Voice Messaging Systems6-44 Issue 7 June 2001Protecting the MERLIN MAIL, MERLINMAIL-ML, MERLIN MAIL R3, and MERLINLEGEND Mail Voice Messaging Systems

Pagina 156

MERLIN LEGEND Communications SystemIssue 7 June 20016-45Take the following preventative measures to limit the risk of unauthorized use of the automat

Pagina 157

About This Document1-6 Issue 7 June 2001To help customers use and manage their systems in light of the trade-off decisions they make and to ensure th

Pagina 158

Voice Messaging Systems6-46 Issue 7 June 2001Hackers may also use a computer to dial an access code and then publish the information for other hacker

Pagina 159

MERLIN LEGEND Communications SystemIssue 7 June 20016-47 Set the maximum number of digits in an extension parameter appropriate to your dial plan. T

Pagina 160

Voice Messaging Systems6-48 Issue 7 June 2001Additional MERLIN MAIL R3 and MERLIN LEGEND Mail Voice Messaging System Security FeaturesThe MERLIN MAIL

Pagina 161

Messaging 2000 Voice Mail SystemIssue 7 June 20016-49Messaging 2000 Voice Mail SystemThe Messaging 2000 (M2000) System provides Voice Mail services f

Pagina 162

Voice Messaging Systems6-50 Issue 7 June 2001When Quick Assist is run in Recover Mode from the Quick Assist icon in the Lucent folder, use the “Mailb

Pagina 163

Messaging 2000 Voice Mail SystemIssue 7 June 20016-51The Uninitialized Mailbox report lists all mailboxes for which the password has not yet been cha

Pagina 164 - **** SECURITY ALERT ****

Voice Messaging Systems6-52 Issue 7 June 2001Mailbox Lock-Out Option on the Class of Service dialog box determines whether this feature is enabled. T

Pagina 165

Messaging 2000 Voice Mail SystemIssue 7 June 20016-53 Securing the M2000 System PCIt is imperative that the M2000 system PC be protected from unauth

Pagina 166

Voice Messaging Systems6-54 Issue 7 June 2001Security Recommendations for Remote AccessRemote access to the system should be secured via the followin

Pagina 167

PARTNER II Communications SystemIssue 7 June 20016-55Protecting PasswordsFor PARTNER MAIL Release 1 and all releases of PARTNER MAIL VS, passwords ca

Pagina 168 - 5-40 Issue 7 June 2001

Avaya/Customer Security Roles and ResponsibilitiesIssue 7 June 20011-7Avaya/Customer Security Roles and ResponsibilitiesThe purchase of a telecommuni

Pagina 169 - General Information

Voice Messaging Systems6-56 Issue 7 June 2001 Instruct employees not to make a statement, in their recorded greeting, indicating that they will acce

Pagina 170 - 5-42 Issue 7 June 2001

PARTNER Plus Communications SystemIssue 7 June 20016-57Protecting the PARTNER MAIL and PARTNERMAIL VS SystemsThe PARTNER MAIL and PARTNER MAIL VS Sys

Pagina 171 - QUESTIONS TO ASK THE CUSTOMER

Voice Messaging Systems6-58 Issue 7 June 2001 Require the System Administrator and all voice mailbox owners to change their password from the defaul

Pagina 172 - 5-44 Issue 7 June 2001

System 25Issue 7 June 20016-59System 25System 25 may be used with the AUDIX Voice Power System. (For information on this system, see ‘‘Protecting the

Pagina 173

Voice Messaging Systems6-60 Issue 7 June 2001Protecting PasswordsThe AUDIX Voice Power System offers password protection to help restrict unauthorize

Pagina 174 - 5-46 Issue 7 June 2001

System 25Issue 7 June 20016-61Security MeasuresThe security measures described in this section do not apply if you are using Release 1.0 of the AUDIX

Pagina 175

Voice Messaging Systems6-62 Issue 7 June 2001

Pagina 176 - 5-48 Issue 7 June 2001

Issue 7 June 2001 7-17Automated AttendantDEFINITY ECS, DEFINITYCommunications Systems, System 75,and System 85Automated attendant is a service that c

Pagina 177

Automated Attendant7-2 Issue 7 June 2001Tools that Prevent Unauthorized CallsYou can help prevent unauthorized callers who enter the automated attend

Pagina 178 - 5-50 Issue 7 June 2001

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20017-3For example, when automated attendant ports are assigned t

Pagina 179

About This Document1-8 Issue 7 June 2001Avaya’s Roles and Responsibilities1. Avaya, as a manufacturer, has the responsibility to PROVIDE the customer

Pagina 180 - 5-52 Issue 7 June 2001

Automated Attendant7-4 Issue 7 June 2001 Outward Restriction: restricts the user from placing calls over CO, FX, or WATS trunks using dial access co

Pagina 181 - Issue 7 June 2001

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20017-5Toll Analysis When an automated attendant system transfers

Pagina 182 - 5-54 Issue 7 June 2001

Automated Attendant7-6 Issue 7 June 2001Prevent Calls to Certain NumbersIf some menu options transfer to locations off-premises, you can still protec

Pagina 183

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20017-7For DEFINITY G2 and System 85: Use PROC311 WORD2 to estab

Pagina 184 - 5-56 Issue 7 June 2001

Automated Attendant7-8 Issue 7 June 2001Detecting Automated Attendant Toll FraudTable 7-2 shows the reports that help determine if your automated att

Pagina 185

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20017-9Call Detail Recording (CDR) / Station MessageDetail Record

Pagina 186 - 5-58 Issue 7 June 2001

Automated Attendant7-10 Issue 7 June 2001Call Traffic ReportThis report provides hourly port usage data and counts the number of calls originated by

Pagina 187 - EXHIBIT 3: Letter from Avaya

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20017-11ARS Measurement SelectionThe ARS Measurement Selection ca

Pagina 188 - MERLIN Plus Communications

Automated Attendant7-12 Issue 7 June 2001 Assign an aca referral button on that station (or the attendant station). Use change trunk group to displ

Pagina 189

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20017-13Call Traffic ReportThis report provides hourly port usage

Pagina 190 - PARTNER Plus Communications

Avaya Security OfferingsIssue 7 June 20011-9Avaya Security OfferingsAvaya has developed a variety of offerings to assist in maximizing the security o

Pagina 191 - System 25

Automated Attendant7-14 Issue 7 June 2001Also reported is the session termination method. Each possible termination method is assigned a value as sho

Pagina 192 - 5-64 Issue 7 June 2001

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20017-15Unsuccessful call transfer attempts can result in multipl

Pagina 193

Automated Attendant7-16 Issue 7 June 2001Protecting Automated Attendant on the AUDIX Voice Mail System This section discusses security measures imple

Pagina 194 - 5-66 Issue 7 June 2001

DEFINITY ECS, DEFINITY Communications Systems, System 75, and System 85Issue 7 June 20017-17For DEFINITY G2 and System 85:1. On the AUDIX Voice Mail

Pagina 195 - Voice Messaging Systems

Automated Attendant7-18 Issue 7 June 2001Protecting Automated Attendant on theCONVERSANT Voice Information System The CONVERSANT Voice Information Sy

Pagina 196 - 6-2 Issue 7 June 2001

MERLIN II Communications System R3Issue 7 June 20017-19MERLIN II Communications System R3MERLIN MAIL Voice Messaging SystemThe MERLIN MAIL Voice Mess

Pagina 197

Automated Attendant7-20 Issue 7 June 2001MERLIN LEGEND Communications SystemAUDIX Voice Power SystemThe MERLIN LEGEND Communications System supports

Pagina 198 - DEFINITY ECS, DEFINITY

PARTNER II Communications SystemIssue 7 June 20017-21PARTNER II Communications SystemThe PARTNER II Communications System supports the PARTNER MAIL S

Pagina 199 - Facility Restriction Levels

Automated Attendant7-22 Issue 7 June 2001PARTNER Plus Communications SystemThe PARTNER Plus Communications System R3.1 and later releases, supports t

Pagina 200 - Class of Restriction

Issue 7 June 2001 8-18Other Products and ServicesThis chapter contains security information for Avaya products other than PBXs and adjuncts that have

Pagina 201 - Security Measures in the PBX

About This Document1-10 Issue 7 June 2001Avaya Toll Fraud Crisis InterventionIf you suspect you are being victimized by toll fraud or theft of servic

Pagina 202 - 6-8 Issue 7 June 2001

Other Products and Services8-2 Issue 7 June 2001For additional information on administering CMS, refer to the following documents: Call Management S

Pagina 203

CallMaster PCIssue 7 June 20018-3CallMaster PCCallMaster PC, a software application used with the DEFINITY ECS, gives Call Center agents and supervis

Pagina 204 - 6-10 Issue 7 June 2001

Other Products and Services8-4 Issue 7 June 2001Multipoint Conferencing Unit(MCU)/Conference Reservation andControl System (CRCS)The MCU has a DEFINI

Pagina 205 - Detecting Voice Mail Fraud

PassageWay® Telephony Services for NetWare® and Windows NT®Issue 7 June 20018-5PassageWay® Telephony Services forNetWare® and Windows NT®NOTE:The fol

Pagina 206 - 6-12 Issue 7 June 2001

Other Products and Services8-6 Issue 7 June 2001Security TipsThe following tips are for the PassageWay Telephony Server administrator.  When the pro

Pagina 207 - Trunk Group Report

PassageWay® Telephony Services for NetWare® and Windows NT®Issue 7 June 20018-7 PassageWay Telephony Server administrators should be aware of switch

Pagina 208 - Automatic Circuit Assurance

Other Products and Services8-8 Issue 7 June 2001 Set a maximum number of login attempts per call Allow time to enter the complete login Disconnect

Pagina 209

TransTalk 9000 Digital Wireless SystemIssue 7 June 20018-9TransTalk 9000 Digital Wireless SystemThe TransTalk 9000 Digital Wireless System is a flexi

Pagina 210 - Administration Passwords

Other Products and Services8-10 Issue 7 June 2001

Pagina 211 - Trusted Server Security

Issue 7 June 2001 9-19Call RoutingCall Routing Call FlowThe following is the basic call flow through the DEFINITY ECS, DEFINITY G1 and G3, or System

Pagina 212 - System Only)

Related DocumentationIssue 7 June 20011-11Helplines For technical assistance or support with DEFINITY ECS, DEFINITY Communications System, System 75

Pagina 213

Call Routing9-2 Issue 7 June 2001The system checks the calling permissions of the originator’s COR to see if the COR of the originator is allowed to

Pagina 214 - 6-20 Issue 7 June 2001

Issue 7 June 2001 10-110Blocking CallsCountry CodesThe following is a list of international country codes for direct dialing. In developing your ARS

Pagina 215 - Protecting Passwords

Blocking Calls10-2 Issue 7 June 2001Azerbaijan 994Bahamas 1-242*Bahrain 973Bangladesh 880Barbados 1-246*Barbuda 1-268*Belarus 375Belgium 32Belize 501

Pagina 216 - Basic Call Transfer

Country CodesIssue 7 June 200110-3Cocos-Keeling Islands 61Colombia 57Comoros 269Congo 242Cook Islands 682Costa Rica 506Croatia 385Cuba 53Cuba (Guanta

Pagina 217 - Enhanced Call Transfer

Blocking Calls10-4 Issue 7 June 2001French Polynesia 689Gabon 241Gambia 220Georgia 995Germany 49Ghana 233Gibraltar 350Global Mobile Satellite System

Pagina 218 - Outcalling

Country CodesIssue 7 June 200110-5Iraq 964Ireland 353Iridium (under deactivation) 8816, 8817Israel 972Italy 39Ivory Coast 225Jamaica 1-876*Japan 81Jo

Pagina 219

Blocking Calls10-6 Issue 7 June 2001Marshall Islands 692Martinique 596Mauritania 222Mauritius 230Maayotte Island 269Mexico 52Micronesia (Federal Stat

Pagina 220 - 6-26 Issue 7 June 2001

Country CodesIssue 7 June 200110-7Palau 680Palestine 970Panama 507Papua New Guinea 675Paraguay 595Peru 51Philippines 63Poland 48Portugal 351Puerto Ri

Pagina 221 - NTUITY System, no

Blocking Calls10-8 Issue 7 June 2001Spain 34Sri Lanka 94Sudan 249Suriname 597Swaziland 268Sweden 46Switzerland 41Syria 963Taiwan 886Tajikistan 992Tan

Pagina 222 - Protect AMIS Networking

Blocking Toll Fraud DestinationsIssue 7 June 200110-9Blocking Toll Fraud DestinationsToll fraud calls are placed to locations all over the world. Tab

Pagina 223 - Traffic Reports

ContentsIssue 7 June 2001 iii1 About This Document 1-1 Scope of this Handbook 1-1 Reason for Reissue 1-3 Intended Audience 1-3 How this Guide i

Pagina 224

About This Document1-12 Issue 7 June 2001

Pagina 225 - Security Measures

Blocking Calls10-10 Issue 7 June 2001Blocking ARS Calls on DEFINITY G1 and System 75Use the following procedure to block calls to the destinations li

Pagina 226 - 6-32 Issue 7 June 2001

Blocking Toll Fraud DestinationsIssue 7 June 200110-114. Enter the routing pattern changes to ARS FNPA tables 500 to 599 and 900 to 999 as shown in t

Pagina 227

Blocking Calls10-12 Issue 7 June 20015. Use change rhnpa table 31 to display the RHNPA Table 31 screen.6. Enter the routing pattern changes to RHNPA

Pagina 228 - 6-34 Issue 7 June 2001

Blocking Toll Fraud DestinationsIssue 7 June 200110-13ARS RHNPA TABLE: 31OFFICE CODES: 500-599Pattern Choices01:2 03: 05: 07: 09: 11:02: 04: 06: 08:

Pagina 229

Blocking Calls10-14 Issue 7 June 2001Blocking ARS Calls on G2.1 and System 85Use the following procedure to block calls to the destinations listed in

Pagina 230 - 6-36 Issue 7 June 2001

Blocking Toll Fraud DestinationsIssue 7 June 200110-15Blocking WCR Calls on DEFINITY G2.2Use the following procedure to block calls to the destinatio

Pagina 231

Blocking Calls10-16 Issue 7 June 2001Blocking ARS Calls on G3This section contains a sample ARS Digit Analysis Table for G3. In the example, internat

Pagina 232 - 6-38 Issue 7 June 2001

Blocking Toll Fraud DestinationsIssue 7 June 200110-1701198 10 23 int0700 11 11 op101xxxx 5 5 op101xxxx 12 12 hnpa101xxxx0 6 6 1 op101xxxx0 16 16 1 o

Pagina 233

Blocking Calls10-18 Issue 7 June 2001Blocking ARS Calls on System 25 R3V3The Toll Call Allowed/Disallowed Lists, available in System 25 R3V3, permit

Pagina 234 - 6-40 Issue 7 June 2001

Issue 7 June 2001 11-111Remote Access Example (DEFINITY ECS, DEFINITY G1, G3, and System 75)This chapter provides procedures for setting up and disab

Pagina 235

Issue 7 June 2001 2-12IntroductionBackgroundTelecommunications fraud is the unauthorized use of a company’s telecommunications service. This type of

Pagina 236 - Closely Monitor All Mailboxes

Remote Access Example (DEFINITY ECS, DEFINITY G1, G3, and System 75)11-2 Issue 7 June 200111. Select a PGN (1 through 8) that is not in use in any ot

Pagina 237 - Restrict Outcalling

Permanently Disabling Remote AccessIssue 7 June 200111-319. For all the Route Patterns assigned to ARS/AAR Partition 8, use change route-pattern to a

Pagina 238 - 6-44 Issue 7 June 2001

Remote Access Example (DEFINITY ECS, DEFINITY G1, G3, and System 75)11-4 Issue 7 June 2001

Pagina 239

Issue 7 June 2001 12-112Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECSThis chapter provides information on administeri

Pagina 240 - 6-46 Issue 7 June 2001

Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS12-2 Issue 7 June 2001Administering the SVN FeatureThis section contains

Pagina 241

Administering the SVN FeatureIssue 7 June 200112-3 Time IntervalEnter the time interval within which a login security violation must occur. The rang

Pagina 242 - MERLIN LEGEND

Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS12-4 Issue 7 June 2001List the Status of a Login IDTo list the status of

Pagina 243

Administering the SVN FeatureIssue 7 June 200112-5 Login ThresholdEnter the minimum number of login attempts that will be permitted before a referra

Pagina 244 - 6-50 Issue 7 June 2001

Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS12-6 Issue 7 June 2001Administering Remote Access Kill After N AttemptsF

Pagina 245

Administering the SVN FeatureIssue 7 June 200112-7If the Remote Access feature is to be dormant for a period of time, the feature can be disabled usi

Pagina 246 - 6-52 Issue 7 June 2001

Introduction2-2 Issue 7 June 2001Who is the Enemy?Hackers and PhreakersHackers and “phreakers” (phone freaks) use personal computers, random number g

Pagina 247

Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS12-8 Issue 7 June 2001Enter the enable login <login ID> command to

Pagina 248 - MAIL VS Systems

Administering the SVN FeatureIssue 7 June 200112-9 Time IntervalEnter the time interval within which the authorization code security violations must

Pagina 249

Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS12-10 Issue 7 June 2001 Originating ExtensionThis is a dynamic field th

Pagina 250

Administering Barrier Code AgingIssue 7 June 200112-11 Announcement ExtensionThis field contains an extension corresponding to a recorded announceme

Pagina 251

Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS12-12 Issue 7 June 2001 Barrier CodeAssign a barrier code that conforms

Pagina 252 - 6-58 Issue 7 June 2001

Administering Customer Logins and Forced Password AgingIssue 7 June 200112-13 Calls UsedThis field is a display-only field that specifies the number

Pagina 253

Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS12-14 Issue 7 June 2001To add a customer login you must be a superuser,

Pagina 254

Administering Customer Logins and Forced Password AgingIssue 7 June 200112-159. In the Password Aging Cycle Length field, enter the number of days (f

Pagina 255

Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS12-16 Issue 7 June 20016. Enter a password for the new login in the Logi

Pagina 256 - 6-62 Issue 7 June 2001

Administering Customer Logins and Forced Password AgingIssue 7 June 200112-17If the Maintenance option is set to y on the Customer Options form, the

Pagina 257 - Automated Attendant

What is in a Loss?Issue 7 June 20012-3Call sell operations are dependent on calling card numbers or other means to fraudulently use a customer premis

Pagina 258 - 7-2 Issue 7 June 2001

Administering Features of the DEFINITY G3V3 and Later, Including DEFINITY ECS12-18 Issue 7 June 2001Administering the Security Violations ReportsThe

Pagina 259

Issue 7 June 2001 13-113Changing Your PasswordThis chapter provides steps for changing passwords for systems listed in this handbook, where applicabl

Pagina 260 - 7-4 Issue 7 June 2001

Changing Your Password13-2 Issue 7 June 2001AUDIX Voice Power System System administrators:1. Access the AUDIX Voice Power System main menu.2. Selec

Pagina 261

CONVERSANT Voice Information SystemIssue 7 June 200113-36. When prompted to repeat the new password (re-enter new password), enter the new password a

Pagina 262 - 7-6 Issue 7 June 2001

Changing Your Password13-4 Issue 7 June 2001DEFINITY AUDIX System System administrators:You can change two passwords: 1) that of the currently logge

Pagina 263

DEFINITY ECS and DEFINITY G1 and G3Issue 7 June 200113-5DEFINITY ECS and DEFINITY G1 and G3 System administrators:Use the Change Password form to ch

Pagina 264 - 7-8 Issue 7 June 2001

Changing Your Password13-6 Issue 7 June 2001DEFINITY G2For DEFINITY G2, passwords are shared between the customer and Avaya. Contact the Database Adm

Pagina 265

MERLIN MAIL or MERLIN MAIL-ML Voice Messaging SystemIssue 7 June 200113-7MERLIN MAIL or MERLIN MAIL-MLVoice Messaging SystemNOTE:No default password

Pagina 266 - 7-10 Issue 7 June 2001

Changing Your Password13-8 Issue 7 June 2001MERLIN MAIL R3, MERLIN LEGENDMail, or PARTNER MAIL R3 VoiceMessaging System System administrators:You ca

Pagina 267

PARTNER MAIL SystemIssue 7 June 200113-9PARTNER MAIL System System administrators:Change your password by means of the Voice Mail Menu.1. To access

Pagina 268 - 7-12 Issue 7 June 2001

Introduction2-4 Issue 7 June 2001Known Toll Fraud ActivityUnderstanding how hackers penetrate your system is the first step in learning what to do to

Pagina 269

Changing Your Password13-10 Issue 7 June 2001System 25 System administrators:1. From the Main Menu prompt, enter 4.2. At Action = enter 75.3. At Dat

Pagina 270 - 7-14 Issue 7 June 2001

System 85Issue 7 June 200113-11 End users:Use the Change Password form to change the login password.1. Verify that the screen displays:command:2. En

Pagina 271

Changing Your Password13-12 Issue 7 June 2001

Pagina 272

Issue 7 June 2001 14-114Toll Fraud Job AidsThe job aids in this appendix are tools for your organization to use in securing your system against toll

Pagina 273 - Voice Power System

Toll Fraud Job Aids14-2 Issue 7 June 2001 An upsurge in use on DISA or other trunks. Unusual increase in customer premises equipment-based system m

Pagina 274

System Security Action PlanIssue 7 June 200114-3System Security Action PlanFigure 14-1. System Security Action PlanEducate End Users Establish Port S

Pagina 275 - System R3

Toll Fraud Job Aids14-4 Issue 7 June 2001Top 10 Tips to Help Prevent Phone “Phraud”1. Protect System Administration AccessInsure secure passwords exi

Pagina 276

Top 10 Tips to Help Prevent Phone “Phraud”Issue 7 June 200114-59. Monitor Traffic and System Activity for Abnormal PatternsActivate features that “Tu

Pagina 277 - PARTNER Attendant

Toll Fraud Job Aids14-6 Issue 7 June 2001

Pagina 278

Issue 7 June 2001 15-115Special Security Product and Service OffersRemote Port Security Device (RPSD)The Remote Port Security Device (RPSD)1 offers e

Pagina 279 - Other Products and Services

Known Toll Fraud ActivityIssue 7 June 20012-5— Voice MailThere are two types of voice mail fraud. The first type, which is responsible for the bulk o

Pagina 280 - CMS Helplines

Special Security Product and Service Offers15-2 Issue 7 June 2001The Key and Lock use a sophisticated dynamic challenge/response technique to assist

Pagina 281 - CallMaster PC

Remote Port Security Device (RPSD)Issue 7 June 200115-3Securing DEFINITY Systems (Prior to Release 7.2)with the Remote Port Security Device (RPSD)If

Pagina 282 - Control System (CRCS)

Special Security Product and Service Offers15-4 Issue 7 June 2001Securing DEFINITY Systems (Release 7.2 and Later) with AccessSecurity Gateway (ASG)T

Pagina 283 - and Windows NT

Securing DEFINITY Systems (Release 7.2 and Later) with Access Security Gateway (ASG)Issue 7 June 200115-5Administering Access Security GatewayUse the

Pagina 284 - 8-6 Issue 7 June 2001

Special Security Product and Service Offers15-6 Issue 7 June 2001Logging in via Access Security Gateway (Session Establishment)Use the following proc

Pagina 285

Securing DEFINITY Systems (Release 7.2 and Later) with Access Security Gateway (ASG)Issue 7 June 200115-7Maintaining Login IDsTemporarily Disabling A

Pagina 286 - 8-8 Issue 7 June 2001

Special Security Product and Service Offers15-8 Issue 7 June 2001Loss of an ASG KeyIf a user loses their ASG Key, he/she must notify the system admin

Pagina 287

Securing DEFINITY Systems (Release 7.2 and Later) with Access Security Gateway (ASG)Issue 7 June 200115-9 Security MeasurementsAccess Security Gatew

Pagina 288 - 8-10 Issue 7 June 2001

Special Security Product and Service Offers15-10 Issue 7 June 2001Logging In With ASGWhen you begin a remote session with an Intuity AUDIX system tha

Pagina 289 - Call Routing

Securing DEFINITY Systems (Release 7.2 and Later) with Access Security Gateway (ASG)Issue 7 June 200115-11Adding an ASG Login You must be logged in a

Pagina 290 - 9-2 Issue 7 June 2001

Introduction2-6 Issue 7 June 2001If the system allows uninterrupted, continuous access, a war dialer can crack a 6-digit code within 6 hours. The cod

Pagina 291 - Blocking Calls

Special Security Product and Service Offers15-12 Issue 7 June 2001Blocking or Reinstating Access Privileges for anASG LoginIf a user will not need ac

Pagina 292 - 10-2 Issue 7 June 2001

Securing DEFINITY Systems (Release 7.2 and Later) with Access Security Gateway (ASG)Issue 7 June 200115-13Displaying ASG Login InformationIf you need

Pagina 293

Special Security Product and Service Offers15-14 Issue 7 June 20012. Type a new value in the Number of failed login attempts: field, if needed.(This

Pagina 294 - 10-4 Issue 7 June 2001

Avaya SupportIssue 7 June 200115-15Avaya SupportAvaya provides RPSD Keys to their maintenance centers to accommodate access to systems you secure wit

Pagina 295

Special Security Product and Service Offers15-16 Issue 7 June 2001Toll Fraud Contact ListContact: For:Your Avaya Account Executive or Design Speciali

Pagina 296 - 10-6 Issue 7 June 2001

Issue 7 June 2001 16-116Product Security ChecklistsThis chapter contains the following security checklists: General Security Procedures (page 16-2)

Pagina 297

Product Security Checklists16-2 Issue 7 June 2001 System 75 (page 16-14) System 85 (page 16-20) PassageWay Telephony Services (page 16-66)General

Pagina 298 - 10-8 Issue 7 June 2001

General Security ProceduresIssue 7 June 200116-3Customer EducationSystem manager/administrator has copy of Security Handbook/Toll Fraud OverviewSyste

Pagina 299

Product Security Checklists16-4 Issue 7 June 2001AUDIX, DEFINITY AUDIX andINTUITY AUDIX Voice MessagingSystemsAlso see the general security checklist

Pagina 300 - System 75

AUDIX, DEFINITY AUDIX and INTUITY AUDIX Voice Messaging SystemsIssue 7 June 200116-5(Table 16-2. AUDIX, DEFINITY AUDIX and INTUITY AUDIX Voice Messag

Pagina 301

Known Toll Fraud ActivityIssue 7 June 20012-7— LoopingLooping is a method that call sell operators use to circumvent restrictions that IXCs (Interexc

Pagina 302 - 10-12 Issue 7 June 2001

Product Security Checklists16-6 Issue 7 June 2001AUDIX Voice Power SystemAlso see the general security checklist on page 16-2, the security checklist

Pagina 303

AUDIX Voice Power SystemIssue 7 June 200116-7Table 16-3. AUDIX Voice Power SystemY/N11. If “NO” (N), provide Note reference number and explain.Note N

Pagina 304 - 10-14 Issue 7 June 2001

Product Security Checklists16-8 Issue 7 June 2001BasicWorksAlso see the general security checklist on page 16-2.Customer: ___________________________

Pagina 305 - Country Code Length VNI

BasicWorksIssue 7 June 200116-9Password aging activatedLogins temporarily disabled when not needed (“disable/enable” commands)Customer access to INAD

Pagina 306 - Blocking ARS Calls on G3

Product Security Checklists16-10 Issue 7 June 2001COR-to-COR restrictions on dial-accessed trunksAutomatic Circuit Assurance (ACA) on trunks groupsSM

Pagina 307

BasicWorksIssue 7 June 200116-11Authorization codes usedOperator calls restrictedSwitch-hook flash denied on FAX machines, modems, etc.COR-to-COR res

Pagina 308 - 10-18 Issue 7 June 2001

Product Security Checklists16-12 Issue 7 June 2001CONVERSANT Voice Information SystemAlso see the general security checklist on page 16-2, and the se

Pagina 309 - G3, and System 75)

CONVERSANT Voice Information SystemIssue 7 June 200116-13Host PBXAnalog ports in CONVERSANT Voice Information System hunt group restricted from toll

Pagina 310 - 11-2 Issue 7 June 2001

Product Security Checklists16-14 Issue 7 June 2001DEFINITY ECS, DEFINITY G1 and G3, and System 75Also see the general security checklist on page 16-2

Pagina 311

DEFINITY ECS, DEFINITY G1 and G3, and System 75Issue 7 June 200116-15Logins automatically disabled after security violations (G3V3 and later)Login pe

Pagina 312 - 11-4 Issue 7 June 2001

Introduction2-8 Issue 7 June 2001This same scam could also easily apply to messages left on voice mail. The person could state, “I’m John Doe calling

Pagina 313 - DEFINITY ECS

Product Security Checklists16-16 Issue 7 June 2001Second dial tone omitted between barrier and authorization codesAuthorization code timeout to atten

Pagina 314 - Administering the SVN Feature

DEFINITY ECS, DEFINITY G1 and G3, and System 75Issue 7 June 200116-17SMDR/CDR activated on all trunk groupsTrunks measured by BCMS/CMSTrunk-to-Trunk

Pagina 315 - Enable/Disable a Login ID

Product Security Checklists16-18 Issue 7 June 2001Station Security Code Security Violation Notification feature active Station Security Code Securit

Pagina 316 - List the Status of a Login ID

DEFINITY ECS, DEFINITY G1 and G3, and System 75Issue 7 June 200116-19Switch-hook flash denied on FAX machines, modems, etc.COR-to-COR restrictions us

Pagina 317

Product Security Checklists16-20 Issue 7 June 2001DEFINITY G2 and System 85Also see the general security checklist on page 16-2, and the security che

Pagina 318 - Attempts

DEFINITY G2 and System 85Issue 7 June 200116-21Attendant Control of Trunk Group activated for any trunk groups with TACsVDNs have their own restricte

Pagina 319

Product Security Checklists16-22 Issue 7 June 2001SMDR/CAS/CDR reports monitored daily, including authorization code violationsTraffic measurement re

Pagina 320 - Component

DEFINITY G2 and System 85Issue 7 June 200116-23Administration login password changed on regular basisTransfer to Subscribers Only = y (AVP)Change pas

Pagina 321

Product Security Checklists16-24 Issue 7 June 2001DIMENSION PBX SystemAlso see the general security checklist on page 16-2, and the security checklis

Pagina 322 - 12-10 Issue 7 June 2001

DIMENSION PBX SystemIssue 7 June 200116-25Ports for adjuncts in own restricted COSAuthorization codes usedAuthorization codes not sequential900, 976

Pagina 323

Issue 7 June 2001 3-13Security RisksOverviewIn order for your system to be secure against toll fraud, you need to address access, egress, and system

Pagina 324 - 12-12 Issue 7 June 2001

Product Security Checklists16-26 Issue 7 June 2001Barrier code is a random 4-digit sequenceProduct MonitoringSMDR reports monitored daily, including

Pagina 325 - Forced Password Aging

MERLIN II Communications SystemIssue 7 June 200116-27MERLIN II Communications SystemAlso see the general security checklist on page 16-2, and the sec

Pagina 326 - 12-14 Issue 7 June 2001

Product Security Checklists16-28 Issue 7 June 2001If outcalling enabled: All voice mail ports except last one toll restricted Last port for voice m

Pagina 327 - Changing a Login’s Attributes

MERLIN LEGEND Communications SystemIssue 7 June 200116-29MERLIN LEGEND Communications SystemAlso see the general security checklist on page 16-2, and

Pagina 328 - 12-16 Issue 7 June 2001

Product Security Checklists16-30 Issue 7 June 2001Trunk groups dial access = nFRLs assigned to limit network access based on business needsRemote Acc

Pagina 329 - Remove a Login

MERLIN LEGEND Communications SystemIssue 7 June 200116-31Disallow list created containing 0, 011, 10, 700, 800, 1800, 809, 1809, 411, 1411, 900, and

Pagina 330 - 12-18 Issue 7 June 2001

Product Security Checklists16-32 Issue 7 June 2001MERLIN MAIL Voice Messaging SystemAlso see the general security checklist on page 16-2, and the sec

Pagina 331 - Changing Your Password

MERLIN MAIL Voice Messaging SystemIssue 7 June 200116-33MERLIN LEGEND Communications System voice mail port(s) used for outcalling restricted via all

Pagina 332 - CONVERSANT Voice Information

Product Security Checklists16-34 Issue 7 June 2001MERLIN MAIL-ML Voice Messaging SystemAlso see the general security checklist on page 16-2, and the

Pagina 333 -  End users:

MERLIN MAIL-ML Voice Messaging SystemIssue 7 June 200116-35MERLIN LEGEND Communications System voice mail port(s) used for outcalling restricted via

Pagina 334 - DEFINITY AUDIX System

Contentsiv Issue 7 June 2001  Automated Attendant 3-3 Other Port Security Risks 3-3 Voice Messaging Systems 3-4 Administration / Maintenance Acce

Pagina 335 - DEFINITY ECS and DEFINITY G1

Security Risks3-2 Issue 7 June 2001Remote AccessRemote Access, or Direct Inward System Access (DISA), permits callers from the public network to acce

Pagina 336 - Avaya INTUITY System

Product Security Checklists16-36 Issue 7 June 2001MERLIN MAIL R3 Voice Messaging SystemAlso see the general security checklist on page 16-2, and the

Pagina 337 - Voice Messaging System

MERLIN MAIL R3 Voice Messaging SystemIssue 7 June 200116-37Transfer restricted to subscribers onlyLogin attempts before warning message < 6Login a

Pagina 338 - Messaging System

Product Security Checklists16-38 Issue 7 June 2001Automated AttendantNo pooled facility access codes translated on menusNo ARS codes translated on me

Pagina 339 - PARTNER MAIL VS System

MERLIN Plus Communications SystemIssue 7 June 200116-39MERLIN Plus Communications SystemAlso see the general security checklist on page 16-2, and the

Pagina 340

Product Security Checklists16-40 Issue 7 June 2001Messaging 2000 Voice Mail SystemAlso see the general security checklist on page 16-2.Customer: ____

Pagina 341 - System 85

Messaging 2000 Voice Mail SystemIssue 7 June 200116-41[Recommended] Use the Randomly Generated method of assigning passwords to new mailboxes.[Recomm

Pagina 342 - 13-12 Issue 7 June 2001

Product Security Checklists16-42 Issue 7 June 2001[Required] Set the Consecutive Login Failures Before Lock-Out parameter on the Subscriber tab in Sy

Pagina 343 - Toll Fraud Job Aids

Messaging 2000 Voice Mail SystemIssue 7 June 200116-43[Recommended] When Quick Assist is run in recover mode from the \CVR prompt in an OS/2 window,

Pagina 344 - 14-2 Issue 7 June 2001

Product Security Checklists16-44 Issue 7 June 2001End-User Education[Required] The end-user must periodically/frequently change all secondary passwor

Pagina 345 - System Security Action Plan

Multimedia Communications Exchange ServerIssue 7 June 200116-45Multimedia Communications Exchange ServerAlso see the general security checklist on pa

Pagina 346 - “Phraud”

Automated AttendantIssue 7 June 20013-3Automated AttendantAutomated attendant systems direct calls to pre-designated stations by offering callers a m

Pagina 347 - Appropriately

Product Security Checklists16-46 Issue 7 June 2001Multipoint Conferencing Unit(MCU)/Conference Reservation andControl System (CRCS)Also see the gener

Pagina 348 - 14-6 Issue 7 June 2001

Multipoint Conferencing Unit (MCU)/Conference Reservation and Control System (CRCS)Issue 7 June 200116-47Customer EducationSystem manager/administrat

Pagina 349 - Service Offers

Product Security Checklists16-48 Issue 7 June 2001ESM Security ChecklistNOTE:See the appropriate security checklist for the host MSM.MCU Product Chec

Pagina 350 - Key and Lock Features

Multipoint Conferencing Unit (MCU)/Conference Reservation and Control System (CRCS)Issue 7 June 200116-49Table 16-18. ESM Y/N11. If “NO” (N), provide

Pagina 351 - Avaya Support

Product Security Checklists16-50 Issue 7 June 2001CRCS Security ChecklistCustomer: _________________________________________CRCS Type: ______________

Pagina 352 - Security Gateway (ASG)

Multipoint Conferencing Unit (MCU)/Conference Reservation and Control System (CRCS)Issue 7 June 200116-51MSM Security ChecklistSee the appropriate se

Pagina 353

Product Security Checklists16-52 Issue 7 June 2001Table 16-20. MSM Y/N1Note N/ASystem AdministrationCustomer advised of all logins under their contro

Pagina 354 - (Session Establishment)

Multipoint Conferencing Unit (MCU)/Conference Reservation and Control System (CRCS)Issue 7 June 200116-53Remote Access administered Remote access nu

Pagina 355

Product Security Checklists16-54 Issue 7 June 2001Tie trunk groups are COR-to-COR restrictedTrunk groups have dial access = nCOR-to-COR restrictions

Pagina 356 - Interactions of ASG

Multipoint Conferencing Unit (MCU)/Conference Reservation and Control System (CRCS)Issue 7 June 200116-55Data Origination feature code not translated

Pagina 357 -  Security Measurements

Security Risks3-4 Issue 7 June 2001Voice Messaging SystemsVoice messaging systems provide a variety of voice messaging applications; operating simila

Pagina 358 - Maintaining Login IDs

Product Security Checklists16-56 Issue 7 June 2001PARTNER, PARTNER II, and PARTNER Plus Communications Systems, and PARTNER Advanced Communications S

Pagina 359 - Adding an ASG Login

PARTNER, PARTNER II, and PARTNER Plus Communications Systems, and PARTNER Advanced Communications System (ACS)Issue 7 June 200116-57Customer Educatio

Pagina 360 - ASG Login

Product Security Checklists16-58 Issue 7 June 2001Customer is aware of network-based toll fraud surveillance offerings such as netPROTECTCustomer kno

Pagina 361 - Setting Notification Limits

PARTNER, PARTNER II, and PARTNER Plus Communications Systems, and PARTNER Advanced Communications System (ACS)Issue 7 June 200116-59System Administra

Pagina 362 - 15-14 Issue 7 June 2001

Product Security Checklists16-60 Issue 7 June 2001Product Monitoringfor PARTNER Plus, PARTNER II, and PARTNER ACS onlySMDR/Call Accounting reports mo

Pagina 363 - Security Tune-Up Service

PARTNER MAIL, PARTNER MAIL VS, and PARTNER Voice Mail (PVM) SystemsIssue 7 June 200116-61PARTNER MAIL, PARTNER MAIL VS, and PARTNER Voice Mail (PVM)

Pagina 364 - Toll Fraud Contact List

Product Security Checklists16-62 Issue 7 June 2001for PARTNER MAIL System onlySystem mailboxes (90 to 98 and 9999) assigned COS 7 to 9 to prevent tra

Pagina 365 - Product Security Checklists

System 25Issue 7 June 200116-63System 25Also see the general security checklist on page 16-2, and the security checklist for any attached voice mail

Pagina 366 - General Security Procedures

Product Security Checklists16-64 Issue 7 June 2001Positive disconnect verified with loop start trunksRemote AccessRemote activated only if requiredUs

Pagina 367 - Customer Education

System 25Issue 7 June 200116-65Disable remote maintenance access when not in useProduct MonitoringSMDR/CAS reports monitored daily, administration lo

Pagina 368 - AUDIX Voice Messaging

Administration / Maintenance AccessIssue 7 June 20013-5The following is a list of customer logins for systems in this handbook that provide login cap

Pagina 369 - System Features

Product Security Checklists16-66 Issue 7 June 2001PassageWay Telephony ServicesAlso see the general security checklist on page 16-2.Customer: _______

Pagina 370

PassageWay Telephony ServicesIssue 7 June 200116-67System AdministrationGuidelines followed for logins/passwords for user accounts. (See PassageWay c

Pagina 371 - End-User Education

Product Security Checklists16-68 Issue 7 June 2001For NetWare only:Used the NetWare Administrator feature (NetWare 4.10 and 4.11) or SYSCON utility (

Pagina 372 - BasicWorks

PassageWay Telephony ServicesIssue 7 June 200116-69Access ControlTo ensure protection of sensitive system files used by Tserver, only System Administ

Pagina 373 - PBX Features

Product Security Checklists16-70 Issue 7 June 2001 Configure the following security options:— Require login names for callers— Make passwords case s

Pagina 374 - 16-10 Issue 7 June 2001

Issue 7 June 2001 17-117Large Business Communications Systems Security Tools by ReleaseThe following tables contain page references for the available

Pagina 375

Large Business Communications Systems Security Tools by Release17-2 Issue 7 June 2001Alternate Facility Restriction Levels‘‘Remote Access’’ on page 3

Pagina 376

Issue 7 June 2001 17-3Barrier Code ‘‘Remote Access’’ on page 3-2‘‘Security Tips’’ on page 4-2‘‘Barrier Codes’’ on page 4-4‘‘Restrict Who Can Use Remo

Pagina 377 - Host PBX

Large Business Communications Systems Security Tools by Release17-4 Issue 7 June 2001Call Detail Recording (SMDR)‘‘Call Detail Recording (CDR) / Stat

Pagina 378 - G3, and System 75

Issue 7 June 2001 17-5Class of Service ‘‘Class of Service’’ on page 4-16‘‘Class of Service’’ on page 6-7‘‘Class of Service’’ on page 7-3xxxxxxxxxCMS

Pagina 379

Security Risks3-6 Issue 7 June 2001Increasing Adjunct Access SecuritySince system adjuncts can be used to log in to otherwise “protected” systems, yo

Pagina 380

Large Business Communications Systems Security Tools by Release17-6 Issue 7 June 2001Facility Restriction Levels‘‘Class of Restriction’’ on page 4-13

Pagina 381

Issue 7 June 2001 17-7INADS Port Access Restrictions‘‘Adding Customer Logins and Assigning Initial Password’’ on page 12-13xxList Call Forward Comman

Pagina 382 - 16-18 Issue 7 June 2001

Large Business Communications Systems Security Tools by Release17-8 Issue 7 June 2001Recent Change History Report‘‘Recent Change History Report (DEFI

Pagina 383

Issue 7 June 2001 17-9Security Violation Notification Feature‘‘Security Violation Notification Feature (DEFINITY ECS and DEFINITY G3 only)’’ on page

Pagina 384 - DEFINITY G2 and System 85

Large Business Communications Systems Security Tools by Release17-10 Issue 7 June 2001Traffic Measurements and Performance‘‘Traffic Measurements and

Pagina 385

Issue 7 June 2001 18-118Non-supported ProductsProducts No Longer SupportedBelow are listed the products Avaya no longer supports as of the given date

Pagina 386

Non-supported Products18-2 Issue 7 June 2001Non-supported Products as of Sept. 30, 2000As of September 30, 2000, Avaya no longer supports these produ

Pagina 387

Issue 7 June 2001 GL-1 GLGlossaryAAARAutomatic Alternate Routing ACAAutomatic Circuit AssuranceACDAutomatic Call DistributionADAPAUDIX Data Acquisiti

Pagina 388 - DIMENSION PBX System

GlossaryGL-2 Issue 7 June 2001 ARS Dial ToneThe dial tone callers hear after they enter the ARS feature access code.AttendantThe operator of the cons

Pagina 389

GlossaryIssue 7 June 2001 GL-3 Call ForwardingA set of features that allow calls destined for an extension to be redirected to another extension, des

Pagina 390

Administration / Maintenance AccessIssue 7 June 20013-7Another area that may be vulnerable to toll fraud is the System 75 and the DEFINITY ECS, DEFIN

Pagina 391 - Remote Access (DISA)

GlossaryGL-4 Issue 7 June 2001 Class of RestrictionA number (0 through 63) that specifies the calling privileges and limitations assigned to stations

Pagina 392

GlossaryIssue 7 June 2001 GL-5 ETNElectronic Tandem NetworkEnhanced Call TransferAn AUDIX Voice Mail System feature that provides security by interac

Pagina 393

GlossaryGL-6 Issue 7 June 2001 Feature Access CodeA code used to access a feature, such as ARS, Data Origination, Priority Calling and Call Pickup.Fo

Pagina 394

GlossaryIssue 7 June 2001 GL-7 LLECLocal Exchange Carrier

Pagina 395

GlossaryGL-8 Issue 7 June 2001 MManual Terminating RestrictionPrevents the station from receiving calls other than those originated by the attendant.

Pagina 396 - MERLIN MAIL Voice Messaging

GlossaryIssue 7 June 2001 GL-9 Outward RestrictedRestricts the station from placing outgoing calls over specified trunks.PPARTNER AttendantAn Avaya a

Pagina 397 - End User Education

GlossaryGL-10 Issue 7 June 2001 Referral CallAn internally-generated call that terminates to a designated destination and indicates an event such as

Pagina 398

GlossaryIssue 7 June 2001 GL-11 Service ObservingThe monitoring of actual calls in progress for security purposes.Station Message Detail RecordingCre

Pagina 399

GlossaryGL-12 Issue 7 June 2001 UDPUniform Dial PlanUniform Dial PlanA feature that allows a unique 4- or 5-digit number assignment for each terminal

Pagina 400

Issue 7 June 2001 IN-1 INIndexNumerics 0 calls, 4-23, 4-53 00 calls, 4-23 01 calls, 4-34 blocking, 10-14 010 calls, 4-34 011 calls, 4-34, 4-53 10xxx

Pagina 401

Security Risks3-8 Issue 7 June 2001General Security MeasuresGeneral security measures can be taken systemwide to discourage unauthorized use.Educatin

Pagina 402

IndexIN-2 Issue 7 June 2001authorization code, 4-3, 4-17, 4-21, 4-28, 4-29, 6-56, 6-58 invalid login attempts, 4-63 maximum allowed, 4-8 monitoring u

Pagina 403

IndexIssue 7 June 2001 IN-3 Call Forward Off-Net, 4-16, 6-7, 7-3 Call Forwarding, 2-8, 4-69 Feature Access Code, 4-8 call list, 6-7, 7-5 free, 4-18 s

Pagina 404 - 16-40 Issue 7 June 2001

IndexIN-4 Issue 7 June 2001Data Restriction Feature Access Code, 4-8 DCS, see Distributed Communication System default passwords changing, 3-4 DEFINI

Pagina 405

IndexIssue 7 June 2001 IN-5 Feature Access Code, 2-5 Abbreviated Dialing, 4-8 ARS/AAR, 4-8 Call Forwarding, 4-8 Data Origination, 4-8 Data Privacy, 4

Pagina 406 - 16-42 Issue 7 June 2001

IndexIN-6 Issue 7 June 2001M maintenance access, 3-7 maintenance port, 3-9 target of abuse, 2-4 Malicious Call Trace, 4-67 Manager I, 6-13 reporting,

Pagina 407

IndexIssue 7 June 2001 IN-7 Outgoing Trunk to Outgoing Trunk Transfer disabling, 4-43 Outward Restriction, 4-14, 4-16, 6-7, 7-4 overlapped sending, 4

Pagina 408 - 16-44 Issue 7 June 2001

IndexIN-8 Issue 7 June 2001Remote Access, (continued)status report, 4-63 System 25, 5-63 System 75, 4-2 System 85, 4-2 Violations Status Report, 4-64

Pagina 409 - Exchange Server

IndexIssue 7 June 2001 IN-9 service observing, 4-68, 4-69 shoulder surfing, 2-6 six-digit screening, 2-8 SMDR reports, 5-6, 5-13, 5-61, 5-64, 6-34, 6

Pagina 410

IndexIN-10 Issue 7 June 2001traffic abnormal patterns, 7-10 measurements, 4-53 monitoring flow, 4-55 reports, 6-18, 6-29, 7-13 Trans Talk 9000 Digita

Pagina 411

IndexIssue 7 June 2001 IN-11 voice terminal Public Restriction, 4-15 Termination Restriction, 4-15 voice terminal group attendant-controlled, 4-19 vo

Pagina 412 - ESM Security Checklist

General Security MeasuresIssue 7 June 20013-9Establishing a PolicyAs a safeguard against toll fraud, follow these guidelines: Change passwords frequ

Pagina 413

IndexIN-12 Issue 7 June 2001

Pagina 414

Security Risks3-10 Issue 7 June 2001Security Goals TablesThe following tables list the security goals for each communications system, and provide an

Pagina 415

Security Goals TablesIssue 7 June 20013-11Suppress dial tone after barrier code enteredSuppress Remote Access Dial Tone — (G1, G3 and System 75 R1V3

Pagina 416

ContentsIssue 7 June 2001 v Tools that Restrict Unauthorized Outgoing Calls 4-12Class of Restriction 4-13Calling Party and Called Party Restrictions

Pagina 417 - Networking Features

Security Risks3-12 Issue 7 June 2001Limit calling permissionsCOS (G2 and System 85 only)Set COS restrictionsCOR (G1, G3, and System 75 only)Set FRLSe

Pagina 418 - 16-54 Issue 7 June 2001

Security Goals TablesIssue 7 June 20013-13Prevent exit from Voice Messaging SystemLimit calling permissionsCOR (G1, G3, and System 75 only)Set low FR

Pagina 419

Security Risks3-14 Issue 7 June 2001Prevent exit from Automated Attendant ServiceLimit calling permissionsCOR (G1, G3, and System 75 only)Set low FRL

Pagina 420 - Communications System (ACS)

Security Goals TablesIssue 7 June 20013-15Prevent unauthorized outgoing callsLimit calling permissionsSwitch dial restrictionsSet outward/toll restri

Pagina 421

Security Risks3-16 Issue 7 June 2001Protect Remote System ProgrammingRequire password to access system programmingSystem Programming password (MERLIN

Pagina 422 - 16-58 Issue 7 June 2001

Security Goals TablesIssue 7 June 20013-17Prevent exit from Voice Messaging SystemLimit calling permissionsSwitch Dial Restrictions (System 25, MERLI

Pagina 423 - Release 1 and later

Security Risks3-18 Issue 7 June 2001Prevent theft of information via Voice Messaging SystemAssign secure passwordsPasswords Encourage users to select

Pagina 424 - 16-60 Issue 7 June 2001

Security Goals TablesIssue 7 June 20013-19Table 3-3. Security Goals: PARTNER II and PARTNER Plus Communications SystemsSecurity Goal Method Security

Pagina 425 - VS, and

Security Risks3-20 Issue 7 June 2001Prevent theft of information via Voice Messaging SystemAssign secure passwordsPasswords (PARTNER Plus Communicati

Pagina 426 - 16-62 Issue 7 June 2001

Issue 7 June 2001 4-14Large Business Communications SystemsThis chapter provides information on protecting the following: DEFINITY ECS Release 5 and

Pagina 427

Contentsvi Issue 7 June 2001 Provide Individualized Calling Privileges Using FRLs 4-30Prevent After-Hours Calling Using Time of DayRouting or Alterna

Pagina 428

Large Business Communications Systems4-2 Issue 7 June 2001Keeping Unauthorized Third Partiesfrom Entering the SystemHow Third Parties Enter the Syste

Pagina 429

Keeping Unauthorized Third Parties from Entering the SystemIssue 7 June 20014-3 Require maximum length barrier codes and authorization codes. For Sy

Pagina 430 - PassageWay Telephony Services

Large Business Communications Systems4-4 Issue 7 June 2001*For ASAI, see the applicable product feature description.Barrier CodesFigure 4-1 illustrat

Pagina 431

Keeping Unauthorized Third Parties from Entering the SystemIssue 7 June 20014-5Figure 4-1. Remote Access Call PathINCOMINGREMOTEACCESS CALLYESYESNOYE

Pagina 432 - 16-68 Issue 7 June 2001

Large Business Communications Systems4-6 Issue 7 June 2001For DEFINITY ECS, DEFINITY G1, G3, and System 75, you can assign up to 10 barrier codes to

Pagina 433 - Access Control

Keeping Unauthorized Third Parties from Entering the SystemIssue 7 June 20014-7For DEFINITY G2 and System 85, either a barrier code or an authorizati

Pagina 434 - 16-70 Issue 7 June 2001

Large Business Communications Systems4-8 Issue 7 June 2001The authorization code option requires that the caller enter a valid authorization code to

Pagina 435 - Systems Security Tools by

Keeping Unauthorized Third Parties from Entering the SystemIssue 7 June 20014-9Night ServiceYou can control the time of day that Remote Access is ava

Pagina 436 - 17-2 Issue 7 June 2001

Large Business Communications Systems4-10 Issue 7 June 2001Protecting Vectors That Contain Call PromptingHackers try to enter unanticipated digit str

Pagina 437 - Continued on next page

Keeping Unauthorized Third Parties from Entering the SystemIssue 7 June 20014-11Status Remote Access CommandFor DEFINITY G3V4 and later, which includ

Pagina 438 - 17-4 Issue 7 June 2001

ContentsIssue 7 June 2001 viiCall Detail Recording (CDR) / Station MessageDetail Recording (SMDR) 4-52Traffic Measurements and Performance 4-53Monito

Pagina 439 - Issue 7 June 2001 17-5

Large Business Communications Systems4-12 Issue 7 June 2001Tools that Restrict Unauthorized Outgoing CallsUse the following tools to prevent fraudule

Pagina 440 - 17-6 Issue 7 June 2001

Tools that Restrict Unauthorized Outgoing CallsIssue 7 June 20014-13Class of RestrictionFor DEFINITY ECS, DEFINITY G1, G3, and System 75, the Class o

Pagina 441 - Issue 7 June 2001 17-7

Large Business Communications Systems4-14 Issue 7 June 2001Calling Party and Called Party RestrictionsFor DEFINITY G3 systems prior to DEFINITY ECS R

Pagina 442 - 17-8 Issue 7 June 2001

Tools that Restrict Unauthorized Outgoing CallsIssue 7 June 20014-15COR-to-COR Restrictions/Calling PermissionsIf it is not practical to dial-access-

Pagina 443 - Issue 7 June 2001 17-9

Large Business Communications Systems4-16 Issue 7 June 2001Class of ServiceFor DEFINITY G2 and System 85, station access to various switch features i

Pagina 444 - 17-10 Issue 7 June 2001

Tools that Restrict Unauthorized Outgoing CallsIssue 7 June 20014-17For DEFINITY G3V2 and later releases, which includes DEFINITY ECS, an additional

Pagina 445 - Non-supported Products

Large Business Communications Systems4-18 Issue 7 June 2001Alternate Facility Restriction LevelsFor DEFINITY G2, G3r, and System 85, this tool is use

Pagina 446 - 18-2 Issue 7 June 2001

Tools that Restrict Unauthorized Outgoing CallsIssue 7 June 20014-19ARS Dial ToneFor all switches, the dial tone after the ARS feature access code is

Pagina 447 - Glossary

Large Business Communications Systems4-20 Issue 7 June 2001Restrictions — Individual and Group-Controlled(DEFINITY ECS, DEFINITY G1, G3, andSystem 75

Pagina 448 - GL-2 Issue 7 June 2001

Tools that Restrict Unauthorized Outgoing CallsIssue 7 June 20014-21Restricting Incoming Tie TrunksYou can deny access to AAR/ARS/WCR trunks when the

Pagina 449 - Issue 7 June 2001 GL-3

Contentsviii Issue 7 June 2001 Protecting Remote Access 5-12Security Tips 5-12Protecting Remote System Programming 5-14Security Tips 5-14Protecting R

Pagina 450 - GL-4 Issue 7 June 2001

Large Business Communications Systems4-22 Issue 7 June 2001DEFINITY G3V3 and later releases, including DEFINITY ECS Release 5 and later, offer three

Pagina 451 - Issue 7 June 2001 GL-5

Tools that Restrict Unauthorized Outgoing CallsIssue 7 June 20014-23World Class Routing (DEFINITY ECS andDEFINITY G2.2 and G3 only)The World Class Ro

Pagina 452 - GL-6 Issue 7 June 2001

Large Business Communications Systems4-24 Issue 7 June 2001Station Security Codes (SSCs)Station Security Codes (SSCs) are used with two features: Per

Pagina 453 - Issue 7 June 2001 GL-7

Tools that Restrict Unauthorized Outgoing CallsIssue 7 June 20014-25Security TipsPSA/TTI transactions are recorded in the history log, which can be a

Pagina 454 - GL-8 Issue 7 June 2001

Large Business Communications Systems4-26 Issue 7 June 2001For remote users, an additional security precaution for feature access is provided via the

Pagina 455 - Issue 7 June 2001 GL-9

Security MeasuresIssue 7 June 20014-27Security MeasuresThe following procedures explain how to use security tools to create restrictions that help pr

Pagina 456 - GL-10 Issue 7 June 2001

Large Business Communications Systems4-28 Issue 7 June 2001DEFINITY G3V3 and later systems, which includes DEFINITY ECS, are shipped without any cust

Pagina 457 - Issue 7 June 2001 GL-11

Security MeasuresIssue 7 June 20014-29 Enter up to 10 barrier codes (use all seven digits) and assign each a COR and COS that allow only necessary c

Pagina 458 - GL-12 Issue 7 June 2001

Large Business Communications Systems4-30 Issue 7 June 2001 Use PROC286 WORD1 FIELD16 to send calls to an intercept tone, a CAS attendant, or a loca

Pagina 459 - Numerics

Security MeasuresIssue 7 June 20014-31NOTE:FRLs 1 through 7 include the capabilities of the lower FRLs.For DEFINITY ECS, DEFINITY G1, G3 and System 7

Pagina 460 - IN-2 Issue 7 June 2001

ContentsIssue 7 June 2001 ixMERLIN Mail/MERLIN LEGEND Mail/MERLINMessaging Toll Fraud at a Glance 5-46LEGEND/MAGIX Toll Fraud Check List 5-46LEGEND T

Pagina 461

Large Business Communications Systems4-32 Issue 7 June 2001Prevent After-Hours Calling Using Time of DayRouting or Alternate FRLsYou can regulate the

Pagina 462 - IN-4 Issue 7 June 2001

Security MeasuresIssue 7 June 20014-33Block International CallingIf your company does not do business overseas, deny everyone the ability to directly

Pagina 463

Large Business Communications Systems4-34 Issue 7 June 2001For DEFINITY ECS and DEFINITY G3: Enter change ars analysis partition to display the ARS

Pagina 464 - IN-6 Issue 7 June 2001

Security MeasuresIssue 7 June 20014-35For DEFINITY ECS and DEFINITY G3: Enter change ars analysis to display the ARS Analysis screen. Specify the t

Pagina 465

Large Business Communications Systems4-36 Issue 7 June 2001Restrict Calls to Specified Area CodesIf your business does not make calls to certain area

Pagina 466 - IN-8 Issue 7 June 2001

Security MeasuresIssue 7 June 20014-37For DEFINITY G2.2: Use WCR with PROC314 WORD1 and WORD2 and permit only certain numbers. Consider using Networ

Pagina 467

Large Business Communications Systems4-38 Issue 7 June 2001For DEFINITY G2 and System 85: Enter PROC000 WORDD2 FIELD5 to assign an extension to a gr

Pagina 468 - IN-10 Issue 7 June 2001

Security MeasuresIssue 7 June 20014-39Use Attendant Control of Trunk Group AccessIf direct access to trunk groups must be allowed, consider making th

Pagina 469

Large Business Communications Systems4-40 Issue 7 June 2001 Time slot test call — Connects the voice terminal user to a specific time slot located o

Pagina 470 - IN-12 Issue 7 June 2001

Security MeasuresIssue 7 June 20014-41For DEFINITY ECS, DEFINITY G1, G3, and System 75: Use change cor to display the Class of Restriction screen.

Comentarios a estos manuales

Sin comentarios