Technical information

Security Risks
3-10 Issue 7 June 2001
Security Goals Tables
The following tables list the security goals for each communications system, and
provide an overview of the methods and steps that are offered through the
switches to minimize the risk of unauthorized use of the system.
Table 3-1 on page 3-10 provides information for the DEFINITY ECS,
DEFINITY Communications Systems, System 75, and System 85.
Table 3-2 on page 3-14 provides information for the MERLIN II, MERLIN
LEGEND, MERLIN Plus, and System 25 Communications Systems.
Table 3-3 on page 3-19 provides information for the PARTNER II and
PARTNER Plus Communications Systems.
Table 3-1. Security Goals: DEFINITY ECS, DEFINITY Communications
Systems, System 75 and System 85
Security Goal Method Security Tool Steps
Protect Remote
Access feature
Limit access to
authorized users
Barrier codes Set to maximum
length
Set COR/COS
Authorization
codes
Set to maximum
length
Set FRL on COR
Use VDNs to
route calls
Call Vectoring
(G2 and G3 only)
Administer Call
Vectoring (G3
only)
Use CORs to
restrict calling
privileges of
VDNs
Limit times when
Remote Access
is available
Night Service
(G1, G2, G3, and
System 75 only)
Administer Night
Service
Shared Trunk
Group (System
85 only)
Assign shared
trunk group
Continued on next page