Technical information

Securing DEFINITY Systems (Release 7.2 and Later)
with Access Security Gateway (ASG)
Issue 7 June 2001
15-9
Security Measurements
Access Security Gateway session establishment or reject events do not
increment the Successful Logins, Invalid Attempts, Invalid IDs, Forced
Disconnects, Login Security Violations or Trivial Attempts counters
maintained for the list measurements security-violations detail report.
Additionally, login specific information maintained by the measurements
security-violations summary report does not include Access Security
Gateway related data.
Securing INTUITY AUDIX Ports (Release 5.0
and Later) with ASG
Access Security Gateway also provides up-to-date authentication for the Intuity
AUDIX system logins. For Intuity Release 5.0, ASG protection is available for
remote dial-up logins only.
ASG protects Intuity AUDIX systems by challenging each potential dial-up session
user. If an ASG login ID is established for a particular user (such as sa, which
refers to a login for the system administrator, or vm, which refers to the login of
the voice messaging administrator), the ASG layer of protection is in place for
anyone who attempts to log in as that user. If an ASG login ID is not established
for a particular user, the user logs in to the system with the UNIX system
password.
NOTE:
Information about ASG with Intuity and procedures for administering and
using ASG can be found on the Intuity Messaging Solutions Release 5.0
documentation CD. There, do a search within the index for Access Security
Gateway (ASG).
In order to respond to the ASG challenge, the user must have a hand-held device
called the ASG Key. The ASG Key must be set with an encryption key number
that matches that of the users ASG encryption key number in the Intuity AUDIX
system. For more information about the ASG Key, see the ASG Key User Guide,
585-212-012.
Use the following procedures for logging in with ASG, maintaining Login IDs, and
setting and resolving violation warnings.