Lucent Technologies 8.2 Security Camera User Manual


  Open as PDF
of 1707
 
DEFINITY ECS Release 8.2
Administrator’s Guide
555-233-506
Issue 1
April 2000
Enhancing system security
313System security checklist
11
Tip:
You can use the
list route-pattern print
command to print a copy of
your facility restriction levels (FRL) and check their status.
11. On all trunk group screens, set the Dial Access field to
n. If set to y, it
allows users to dial Trunk Access Codes, thus bypassing all the ARS call
screening functions.
Refer to ‘‘
Trunk Group’’ on page 967 for more information.
12. On the ‘‘
AAR and ARS Digit Analysis Table’’ on page 451, set all dial
strings not required to conduct business to
den (deny).
13. If you require international calling, on the ‘‘
AAR and ARS Digit
Conversion Table’’ on page 455, use only the 011+ country codes/city
codes or specific dial strings.
14. Assign all trunk groups or same trunk group types a unique Class of
Restriction. If the trunk group does not require networking through your
switch, administer the Class of Restriction of the trunk group where the
FRL is
0, the Calling Party Restriction field is outward, and all unique
Class of Restriction assigned to your outgoing trunk groups are
n. Refer to
‘‘
Class of Restriction’’ on page 520 for more information.
Tip:
You can use the
list trunk-group print
command to have a printout of
all your trunks groups. Then, you can use the
display trunk-group x
command (where x is the trunk group) to check the Class of
Restriction (COR) of each trunk group.
15. For your AUDIX, on the System Appearance screen, set:
the Enhanced Call Transfer field to y.
the Transfer Type field to enhanced. If set to basic, set the Transfer
Restriction field to
subscribers. Refer to ‘‘Feature-Related System
Parameters’’ on page 632 for more information.
NOTE:
The Class of Restriction of the voice mail ports dictates the calling
restrictions of the voice mail. If the above settings are not
administered correctly, the possibility exists to complete a transfer to
trunk access codes or ARS/AAR feature codes for fraudulent
purposes. Never assign mailboxes that begin with the digits or trunk
access codes of ARS/AAR feature access codes. Require your users
to use a mailbox password length greater than the amount of digits in
the extension number.