Administrator's Guide

Enhancing system security
555-233-506382 Issue 5 October 2002
System security checklist
Heres some of the steps required for indemnification. Use these to analyze your
system security.
1. Remove all default factory logins of
cust, rcust, browse, nms, and bcms
and assign unique logins with 7-character alphanumeric passwords and a
90-day password aging. Use the
list logins command to find out what
logins are there.
2. If you do not use Remote Access, be sure to disable it permanently.
Tip:
You can use the display remote-access command to check the status
of your remote access.
To disable Remote Access, on the Remote Access screen, in the
Permanently Disable field, type
y. See ‘‘QSIG to DCS TSC Gateway
screen’’ on page 1085 for more information on remote access.
NOTE:
Avaya recommends that you permanently disable Remote Access
using the
change remote-access command. If you do permanently
disable Remote Access, the code is removed from the software.
Avaya charges a fee to restore the Remote Access feature.
3. If you use Remote Access, but only for internal calls, change
announcements or remote service observing.
a. Use a 7-digit barrier code.
b. Assign a unique COR to the 7-digit barrier code.
The unique COR must be administered where the FRL is
0, the
Calling Party Restriction field is
outward, the Calling Permissions
field is
n on all unique Trunk Group COR.
c. Assign Security Violation Notification Remote to
10 attempts in 2
minutes.
d. Set the aging cycle to
90 days with 100 call limit per barrier code.
See ‘‘QSIG to DCS TSC Gateway screen’’ on page 1085 for more
information.