Technical information

Security Risks
3-6 Issue 7 June 2001
Increasing Adjunct Access Security
Since system adjuncts can be used to log in to otherwise protected systems, you
also should secure access to the following products:
G3 Management Applications (G3-MA)
CSM (Centralized System Management)
CMS (Call Management System)
Manager III/IV
Trouble Tracker
VMAAP
Logins and passwords should be changed and managed in the same manner as
the system being managed (for example, the switch or the AUDIX Voice Mail
System). See ‘‘Administration Security’’ on page 4-50 for additional information.
Increasing Product Access (Port) Security
You need to protect your security measures from being changed by the hacker
who gains access to the administration or maintenance ports of your customer
premises equipment-based system or its adjuncts. See ‘‘Logins for INADS Port’’
on page 4-50.
If you use PC-based emulation programs to access administration capabilities,
never store dial-up numbers, logins, or passwords as part of an automatically
executed script.
For greater security, you may want to purchase and use the optional Remote Port
Security Device (RPSD). The RPSD consists of two modem-sized devices, a lock,
installed on the receiving modem (for example, at the PBX), and a Key, which is
placed on the originating modem (for example, at the remote administration
terminal). The lock and key must match before a communications pathway is
opened. Refer to Chapter 15 for more information.
The Access Security Gateway (ASG) software interface was integrated into the
DEFINITY ECS Release 7.2 and included in all later releases, as well as the
Intuity Release 5 software base. For more information on ASG, refer to Chapter
15.