Technical information

Large Business Communications Systems
4-6 Issue 7 June 2001
For DEFINITY ECS, DEFINITY G1, G3, and System 75, you can assign up to 10
barrier codes to provide the first checkpoint. When barrier codes are required for
Remote Access, callers hear a special dial tone, and then must enter a valid
barrier code before they can access the PBX system.
NOTE:
With DEFINITY ECS, DEFINITY G1, G3, and System 75 R1V3, you can
require the entry of an authorization code after the barrier code prior to
callers receiving system dial tone for placing calls.
Barrier codes can be up to seven digits (use all seven for maximum security).
Each barrier code can be assigned a different Class of Restriction (COR) and
Class of Service (COS) to identify the calling privileges available to the user who
enters it. For Remote Access calls, dialing a barrier code overrides the COR set
for the incoming facility; if no barrier code is required, the default COR on the
Trunk Group is used.
NOTE:
The COS assigned to the barrier code should be set to console
permission = n
.
For DEFINITY G3V3 and later (which includes DEFINITY ECS), the Remote
Access Barrier Code Aging feature provides a means of limiting the time that
remote access barrier codes are valid, and/or specifying the number of remote
access calls that can be placed per barrier code. The ability to define a barrier
codes lifespan and automatically retire it at the end of its usefulness, or to specify
the number of times it can be used before it is retired can significantly reduce the
opportunity for unauthorized, fraudulent use of the remote access feature. For
more information, see ‘‘Remote Access Barrier Code Aging/Access Limits
(DEFINITY G3V3 and Later)’’ on page 4-66, and ‘‘Administering Barrier Code
Aging’’ on page 12-11.
For DEFINITY G3V3 and later, which includes DEFINITY ECS, the security
violation notification feature alerts the switch administrator of a login violation.
When a violation is detected for a valid login ID, the login ID is disabled,
prohibiting its further use until the security violation is investigated and the login ID
re-enabled. For more information, see ‘‘Administering Login ID Kill After N
Attempts’’ on page 12-7.
For DEFINITY G3V4 and later, which includes DEFINITY ECS, the Remote
Access Notification feature provides automatic reporting when Remote Access is
in use. For more information, see ‘‘Adding Customer Logins and Assigning Initial
Password’’ on page 12-13.