Instruction manual
Security risks
4-6 Issue 9 May 2003
Increasing adjunct access security
Since system adjuncts can be used to log in to otherwise “protected” systems, you 
also should secure access to the following products:
■ G3 Management Applications (G3-MA)
■ CSM (Centralized System Management)
■ CMS (Call Management System)
■ Manager III/IV
■ Trouble Tracker
■ VMAAP
Logins and passwords should be changed and managed in the same manner as 
the system being managed (for example, the switch or the AUDIX Voice Mail 
System). See ‘‘Administration security’’ on page 5-51
 for additional information.
Increasing product access (port) security
You need to protect your security measures from being changed by the hacker 
who gains access to the administration or maintenance ports of your customer 
premises equipment-based system or its adjuncts. See ‘‘Logins for INADS port’’ 
on page 5-51.
If you use PC-based emulation programs to access administration capabilities, 
never store dial-up numbers, logins, or passwords as part of an automatically 
executed script.
For greater security, you may want to purchase and use the optional Remote Port 
Security Device (RPSD). The RPSD consists of two modem-sized devices, a lock, 
installed on the receiving modem (for example, at the PBX), and a key, which is 
placed on the originating modem (for example, at the remote administration 
terminal). The lock and key must match before a communication pathway is 
opened. Refer to Chapter 16
 for more information.
The Access Security Gateway (ASG) software interface was integrated into the 
DEFINITY ECS Release 7.2 and included in all later releases, as well as the 
Intuity Release 5 software base. For more information on ASG, refer to Chapter 
16.










