Technical information

Keeping Unauthorized Third Parties from Entering the
System
Issue 7 June 2001
4-7
For DEFINITY G2 and System 85, either a barrier code or an authorization code
(see below) can be required before callers can access switch features or trunks.
There is only one 4-digit barrier code for Remote Access. This can be changed
using a Feature Access Code, and is normally assigned by the attendant. When
callers enter the wrong barrier code, the calls are given intercept treatment.
(When no barrier code is entered, the call can be routed to an attendant.) A barrier
code should be used to screen entry into Remote Access; authorization codes
can then be used to screen outgoing calls on Automatic Alternate Routing (AAR),
Automatic Route Selection (ARS), and World Class Routing (WCR) (G2.2) trunks.
Authorization Codes
1
NOTE:
For all systems, once established, the number of digits (four to seven) in the
authorization code remains fixed unless all codes are removed and
re-entered. All authorization codes used in the system must be the same
length.
For DEFINITY ECS, DEFINITY G1, G3, and System 75 R1V3, the calling
privileges of an authorization code overrides the privileges established by the
barrier code. With Remote Access calls, dialing an authorization code overrides
the COR set for the barrier code. Individual users should be assigned unique
authorization codes from four to seven digits (use all seven for maximum
security).
Authorization codes serve as a second layer of protection when combined with
barrier codes for Remote Access. When authorization codes are required, the
caller hears a special dial tone (optional) and must then enter a valid authorization
code to access the system.
NOTE:
If a Remote Access caller is to be restricted from long distance but allowed
other ARS calls (for example, local), then the authorization code COR
should have an appropriately low FRL.
NOTE:
Authorization codes are also recorded by the PBXs call detail recording
feature (SMDR/CDR), allowing for call verification by the individual assigned
the authorization code. Proper security must be followed to protect any
printed copies of the call records.
For DEFINITY G2 and System 85, authorization codes can replace barrier codes
on incoming Remote Access facilities or can be used to screen outgoing calls on
AAR/ARS/WCR trunks. Only authorization codes with the Network Access Flag
set are permitted to make outgoing calls.
1. Authorization codes are standard only in System 85 and DEFINITY G2. They are an option
for System 75 R1V3, DEFINITY G1, and G3, and DEFINITY ECS require the customer to
purchase the appropriate right to use.