Technical information

About This Document
1-4 Issue 7 June 2001
How this Guide is Organized
The Avaya Security Handbook has the following chapters:
Chapter 1: About This
Document
Describes the scope, intended audience, and
contents of this handbook. Contains Avayas
Statement of Direction. Also defines Avayas and
the customers roles and responsibilities.
Chapter 2: Introduction Provides a background for toll fraud.
Chapter 3: Security
Risks
Discusses the major areas in which customer
premises equipment-based systems are vulnerable,
and introduces available security measures.
Chapter 4: Large
Business
Communications
Systems
Provides information on protecting the DEFINITY
ECS Release 5 and later, DEFINITY
Communications System Generic 1, Generic 2, and
Generic 3, System 75, and System 85. Details how
Remote Access is vulnerable to toll fraud, explains
numerous system security features, and provides
detailed procedures.
Chapter 5: Small
Business
Communications
Systems
Provides information on protecting the MERLIN II,
MERLIN LEGEND, MERLIN Plus, PARTNER II,
PARTNER Plus, and System 25 Communications
Systems. Details product features that are
vulnerable to toll fraud, such as Remote Access
and Remote Call Forwarding, and recommends
security measures.
Chapter 6: Voice
Messaging Systems
Provides information on protecting voice messaging
systems. Explains the tools available and
recommends security measures.
Chapter 7: Automated
Attendant
Provides information on protecting Automated
Attendant systems. Explains the features available
and recommends security measures.
Chapter 8: Other
Products and Services
Provides information to protect other Avaya
products and services from toll fraud.
Chapter 9: Call Routing Details call flow through a customer premises
equipment-based system.
Chapter 10: Blocking
Calls
Provides procedures for blocking calls to common
toll fraud destinations.
Chapter 11: Remote
Access Example (G1,
G3, and System 75)
Offers an example of how to set up Remote Access
and an example of how to disable it.