Technical information

Product Security Checklists
16-16 Issue 7 June 2001
Second dial tone omitted between
barrier and authorization codes
Authorization code timeout to
attendant
Voice processing ports
COR-to-COR restricted from dialing
Remote Access barrier codes
Remote Access Security Violation
Notification feature active
Remote Access Security Violations
monitored 24 hours per day
Login Security Violations monitored
24 hours per day
Remote Access automatically
disabled following detection of a
Security Violation (G3V3 and later)
Barrier code aging used (G3V3 and
later)
Remote Access temporarily
disabled when not needed
(disable/enable commands) (G3V3
and later)
Logoff notification enabled (G3V4)
PBX Features
Trunking
Prohibit Trunk-to-Trunk transfer on
public access trunks
Tie trunk groups are COR-to-COR
restricted
Trunk groups have dial access = n
COR-to-COR restrictions on
dial-accessed trunks
ACA (Automatic Circuit Assurance)
on trunk groups
Table 16-6. DEFINITY ECS, G1, and G3, and System 75 (Continued)
Y/N
1
Note N/A
Continued on next page