Lucent Technologies Definity Enterprise Communication Server 8.2 User Manual

Page of 1707
DEFINITY ECS Release 8.2
Administrator’s Guide  
555-233-506  
Issue 1
April 2000
Enhancing system security 
309
Physical security 
11
conducted at public payphones located in subways, shopping malls, or 
airport locations. Refer to 
‘‘Remote Access’’ on page 857
 to prevent this 
happening to your company.
Physical security
Physical security is your responsibility. Implement the following safeguards as an 
added layer of security:
1. Unplug and secure attendant console handsets when the attendant position 
is not in use.
2. Lock wiring closets and switch rooms.
3. Keep a log book register of technicians and visitors.
4. Shred all switch information or directories you discard.
5. Always demand verification of a technician or visitor by asking for a valid 
I.D. badge.
6. Keep any reports that may reveal trunk access codes, screen barrier codes, 
authorization codes, or password information secure.
7. Keep the attendant console and supporting documentation in an office that 
is secured with a changeable combination lock. Provide the combination 
only to those individuals who need to enter the office.
8. Keep any documentation pertaining to switch operation secure.
9. Label all backup tapes or flash cards with correct dates to avoid using an 
outdated one when restoring data. Be sure that all backup media have the 
correct generic software load.
System security checklist
Here’s some of the steps required for indemnification. Use these to analyze your 
system security.
1. Remove all default factory logins of 
cust
rcust
browse
nms
, and 
bcms
 
and assign unique logins with 7-character alphanumeric passwords and a 
90-day password aging. Use the 
list logins
 command to find out what 
logins are there.
2. If you do not use Remote Access, be sure to disable it permanently.
Tip:
You can use the 
display remote-access
 command to check the status 
of your remote access.