Lucent Technologies 8.2 Security Camera User Manual


  Open as PDF
of 1707
 
DEFINITY ECS Release 8.2
Administrator’s Guide
555-233-506
Issue 1
April 2000
Enhancing system security
310System security checklist
11
To disable Remote Access, on the Remote Access screen, Permanently
Disable field, type
y. Refer to ‘‘Remote Access’’ on page 857 for more
information on remote access.
NOTE:
Lucent recommends that you permanently disable Remote Access
using the
change remote-access command. If you do permanently
disable Remote Access, the code is removed from the software.
Lucent charges a fee to restore the Remote Access feature.
3. If you use Remote Access, but only for internal calls, change
announcements or remote service observing.
a. Use a 7-digit barrier code.
b. Assign a unique Class of Restriction (COR) to the 7-digit barrier
code.
The unique COR must be administered where the FRL is
0, the
Calling Party Restriction field is
outward, the Calling Permissions
field is
n on all unique Trunk Group COR.
c. Assign Security Violation Notification Remote to
10 attempts in 2
minutes.
d. Set the aging cycle to
90 days with 100 call limit per barrier code.
Refer to ‘‘
Remote Access’’ on page 857 for more information.
4. If you use Remote Access to process calls off-net or in any way access the
public network:
a. Use a 7-digit barrier code.
b. Assign a unique COR to the barrier code.
c. Restrict the COR assigned to each barrier code by FRL level to only
the required calling areas to conduct business.
d. Set the aging cycle to
90 days with 100 call limit per barrier code.
e. Suppress dial tone where applicable.
f. Administer Authorization Codes.
g. Use a minimum of 11 digits (combination of barrier codes and
authorization codes).
h. Assign Security Violation Notification Remote to 10 attempts in 2
minutes.