Instruction manual

Keeping unauthorized third parties from entering the
system
Issue 9 May 2003
5-7
For Communication Manager, MultiVantage™ Software, DEFINITY ECS,
DEFINITY G1, G3, and System 75, you can assign up to 10 barrier codes to
provide the first checkpoint. When barrier codes are required for remote access,
callers hear a special dial tone, and then must enter a valid barrier code before
they can access the PBX system.
NOTE:
With Communication Manager, MultiVantage™ Software, DEFINITY ECS,
DEFINITY G1, G3, and System 75 R1V3, you can require the entry of an
authorization code after the barrier code prior to callers receiving system
dial tone for placing calls.
Barrier codes can be up to seven digits (use all seven for maximum security).
Each barrier code can be assigned a different Class of Restriction (COR) and
Class of Service (COS) to identify the calling privileges available to the user who
enters it. For remote access calls, dialing a barrier code overrides the COR set for
the incoming facility; if no barrier code is required, the default COR on the trunk
group is used.
NOTE:
The COS assigned to the barrier code should be set to console
permission = n
.
For DEFINITY G3V3 and later, the Remote Access Barrier Code Aging feature
provides a means of limiting the time that remote access barrier codes are valid,
and/or specifying the number of remote access calls that can be placed per
barrier code. The ability to define a barrier code’s lifespan and automatically retire
it at the end of its usefulness, or to specify the number of times it can be used
before it is retired can significantly reduce the opportunity for unauthorized,
fraudulent use of the Remote Access feature. For more information, see ‘‘Remote
access barrier code aging/access limits (DEFINITY G3V3 and Later)’’ on page
5-67, and ‘‘Administering barrier code aging’’ on page 13-11.
For DEFINITY G3V3 and later, the security violation notification feature alerts the
switch administrator of a login violation. When a violation is detected for a valid
login ID, the login ID is disabled, prohibiting its further use until the security
violation is investigated and the login ID re-enabled. For more information, see
‘‘Administering the Login ID Kill After N Attempts feature’’ on page 13-7
.
For DEFINITY G3V4 and later, the Remote Access Notification feature provides
automatic reporting when remote access is in use. For more information, see
‘‘Adding customer logins and assigning initial password’’ on page 13-13
.