Instruction manual
Securing DEFINITY systems (Release 7.2 and Later) 
with Access Security Gateway
Issue 9 May 2003
16-9
■ Security measurements
ASG session establishment or reject events do not increment the 
successful logins, invalid attempts, invalid IDs, forced disconnects, login 
security violations or trivial attempts counters maintained for the Security 
Violations Detail report. Additionally, login-specific information maintained 
by the Security Violations Summary report does not include ASG-related 
data.
Securing INTUITY AUDIX ports (Release 5.0 
and later) with ASG
ASG also provides up-to-date authentication for the Intuity AUDIX system logins. 
For Intuity Release 5.0, ASG protection is available for remote dial-up logins only.
ASG protects Intuity AUDIX systems by challenging each potential dial-up session 
user. If an ASG login ID is established for a particular user (such as sa, which 
refers to a login for the “system administrator,” or vm, which refers to the login of 
the “voice messaging administrator”), the ASG layer of protection is in place for 
anyone who attempts to log in as that user. If an ASG login ID is not established 
for a particular user, the user logs in to the system with the UNIX system 
password. 
NOTE:
Information about ASG with Intuity and procedures for administering and 
using ASG can be found on the Intuity Messaging Solutions documentation 
CD. There, do a search within the index for “Access Security Gateway 
(ASG).”
In order to respond to the ASG challenge, the user must have a hand-held device 
called the ASG key. The ASG key must be set with an encryption key number that 
matches that of the user’s ASG encryption key number in the Intuity AUDIX 
system. For more information about the ASG Key, see the Administrator’s Guide 
for Avaya™ Communication Manager, 555-233-506. 
Use the following procedures for logging in with ASG, maintaining login IDs, and 
setting and resolving violation warnings.










