Instruction manual

Securing DEFINITY systems (Release 7.2 and Later)
with Access Security Gateway
Issue 9 May 2003
16-9
Security measurements
ASG session establishment or reject events do not increment the
successful logins, invalid attempts, invalid IDs, forced disconnects, login
security violations or trivial attempts counters maintained for the Security
Violations Detail report. Additionally, login-specific information maintained
by the Security Violations Summary report does not include ASG-related
data.
Securing INTUITY AUDIX ports (Release 5.0
and later) with ASG
ASG also provides up-to-date authentication for the Intuity AUDIX system logins.
For Intuity Release 5.0, ASG protection is available for remote dial-up logins only.
ASG protects Intuity AUDIX systems by challenging each potential dial-up session
user. If an ASG login ID is established for a particular user (such as sa, which
refers to a login for the “system administrator,” or vm, which refers to the login of
the “voice messaging administrator”), the ASG layer of protection is in place for
anyone who attempts to log in as that user. If an ASG login ID is not established
for a particular user, the user logs in to the system with the UNIX system
password.
NOTE:
Information about ASG with Intuity and procedures for administering and
using ASG can be found on the Intuity Messaging Solutions documentation
CD. There, do a search within the index for “Access Security Gateway
(ASG).”
In order to respond to the ASG challenge, the user must have a hand-held device
called the ASG key. The ASG key must be set with an encryption key number that
matches that of the users ASG encryption key number in the Intuity AUDIX
system. For more information about the ASG Key, see the Administrator’s Guide
for Avaya™ Communication Manager, 555-233-506.
Use the following procedures for logging in with ASG, maintaining login IDs, and
setting and resolving violation warnings.