Technical information

Contents
iv Issue 7 June 2001
Automated Attendant 3-3
Other Port Security Risks 3-3
Voice Messaging Systems 3-4
Administration / Maintenance Access 3-4
Passwords 3-4
Changing Default Passwords 3-4
Choosing Passwords 3-5
Increasing Adjunct Access Security 3-6
Increasing Product Access (Port) Security 3-6
General Security Measures 3-8
Educating Users 3-8
Establishing a Policy 3-9
Physical Security 3-9
Security Goals Tables 3-10
4 Large Business Communications Systems 4-1
Keeping Unauthorized Third Parties
from Entering the System 4-2
How Third Parties Enter the System 4-2
Protecting the Remote Access Feature 4-2
Security Tips 4-2
Disabling/Removing Remote Access 4-3
Tools to Protect Remote Access 4-3
Barrier Codes 4-4
Authorization Codes 4-7
Feature Access Code Administration 4-8
Trunk Administration 4-8
Remote Access Dial Tone 4-8
Night Service 4-9
Call Vectoring (DEFINITY ECS and
DEFINITY G3 only) 4-9
Protecting Vectors That Contain Call Prompting 4-10
Status Remote Access Command 4-11
Logoff Screen Notification 4-11