Technical information
Product Security Checklists
16-20 Issue 7 June 2001
DEFINITY G2 and System 85
Also see the general security checklist on page 16-2, and the security checklist for
any attached voice mail systems or other adjuncts.
Customer: _________________________________________
Location: _________________________________________
System & Version: _________________________________________
New Install: _________________________________________
System Upgrade: _________________________________________
Major Addition: _________________________________________
Table 16-7. DEFINITY G2 and System 85
Y/N
1
Note N/A
System Administration
Logins and Procedures
Security code changed from factory
default
PBX Features
Trunk groups have dial access
disabled
COS/Miscellaneous Trunk
Restrictions on dial-accessed
trunks
Disable Trunk Verification Access
Code
ACA (Automatic Circuit Assurance)
on trunk groups
Alternate FRLs used
Individual and Group Controlled
Restrictions used
Continued on next page