Technical information

Product Security Checklists
16-14 Issue 7 June 2001
DEFINITY ECS, DEFINITY G1 and
G3, and System 75
Also see the general security checklist on page 16-2, and the security checklist for
any attached voice mail systems or other adjuncts.
Customer: _________________________________________
Location: _________________________________________
System & Version: _________________________________________
New Install: _________________________________________
System Upgrade: _________________________________________
Major Addition: _________________________________________
Table 16-6. DEFINITY ECS, G1, and G3, and System 75
Y/N
1
Note N/A
System Administration
Customer advised of all logins
under their control
Passwords changed from factory
defaults
Passwords are customer entered,
maximum length, unique, nonsense
alphanumeric words
NETCON access restricted by
COR-to-COR
NETCON channels secured
Non-DID extensions used for
NETCON ports
Unused NETCON channels
removed
Login Security Violation Notification
feature active
Continued on next page