Technical information

Issue 7 June 2001 4-1
4
Large Business Communications
Systems
This chapter provides information on protecting the following:
DEFINITY ECS Release 5 and later
DEFINITY Communications Systems
System 75
System 85
The first section of this chapter, ‘‘Keeping Unauthorized Third Parties from
Entering the System’’ details the major ways third parties enter the system and
tells how to keep them from doing so. The second section, ‘‘Tools that Restrict
Unauthorized Outgoing Calls’’details features within the system that prevent
unauthorized egress from the system. The third section, ‘‘Security Measures’’ tells
how to use the tools described in the preceding section. The final section,
‘‘Detecting Toll Fraud’’ details methods for monitoring the system and determining
the effectiveness of the security measures you implemented.
Other chapters detail additional security measures to protect your equipment:
Chapter 6 contains security measures to protect the attached voice
messaging system. For general security measures, refer to ‘‘Protecting
Voice Messaging Systems’’ on page 6-2. For product-specific security
measures, refer to ‘‘DEFINITY ECS, DEFINITY Communications Systems,
System 75, and System 85’’ on page 6-4.
Chapter 7 contains security measures to protect the Automated Attendant
feature of your communications system. See ‘‘DEFINITY ECS, DEFINITY
Communications Systems, System 75, and System 85’’ on page 7-1.
Chapter 12 provides instructions for administering the features of the
DEFINITY G3V3 and later (which includes DEFINITY ECS), specifically
designed to provide protection from toll fraud.
Chapter 15 describes ‘‘Securing DEFINITY Systems (Release 7.2 and
Later) with Access Security Gateway (ASG)’’ on page 15-4.