Avaya G700 Installation And Upgrades page 2

Media gateway controlled by media server
Hide thumbs Also See for G700:
Table of Contents

Advertisement

Copyright 2002, Avaya Inc.
All Rights Reserved
Notice
Every effort was made to ensure that the information in this docu-
ment was complete and accurate at the time of printing. However,
information is subject to change.
Your Responsibility for Your Company's Telecommunications
Security
The final responsibility for securing both this system and its net-
worked equipment rests with you - an Avaya customer's system ad-
ministrator, your telecommunications peers, and your managers.
The scope of your responsibilities is based upon acquired knowl-
edge and resources from a variety of sources including but not lim-
ited to:
• Installation documents
• System administration documents
• Security documents
• Hardware-/software-based security tools
• Shared information between you and your peers
• Telecommunications security experts
To prevent intrusions to your telecommunications equipment, you
and your peers should carefully program and configure:
• Your Avaya-provided telecommunications systems and their
interfaces
• Your Avaya-provided software applications, and their under-
lying hardware/software platforms and interfaces
• Any other equipment networked to your Avaya products.
Preventing Toll Fraud
"Toll fraud" is the unauthorized use of your telecommunications
system by an unauthorized party (for example, a person who is not
a corporate employee, agent, subcontractor, or is not working on
your company's behalf). Be aware that there may be a risk of toll
fraud associated with your system and that, if toll fraud occurs, it
can result in substantial additional charges for your telecommunica-
tions services.
Avaya Fraud Intervention and how to get help
If you suspect that you are being victimized by toll fraud and you
need technical assistance or support, in the United States and Can-
ada, call the Technical Service Center's Toll Fraud Intervention
Hotline at 1-800-643-2353.
For additional support telephone numbers, see the Avaya web site:
http://www.avaya.com
Click on Support, click on Escalation Lists US and International.
This web site includes phone numbers for escalation within the
United States. For escalation phone numbers outside the United
States, click on Global Escalation List. This list contains the phone
numbers for the Centers of Excellence in each Avaya-defined re-
gion.
Providing Telecommunications Security
Telecommunications security (of voice, data and/or video commu-
nications) is the prevention of any type of intrusion to (that is, either
unauthorized or malicious access to or use of) your company's tele-
communications equipment by some party.
Your company's telecommunications equipment includes both this
Avaya product and any other voice/data/video equipment that could
be accessed via this Avaya product (that is, networked equipment).
An outside party is anyone who is not a corporate employee, agent,
subcontractor, or is not working on your company's behalf. Where-
as, a malicious party is anyone (including someone who may be
otherwise authorized) who accesses your telecommunications
equipment with either malicious or mischievous intent.
Such intrusions may be either to/through synchronous (time-multi-
plexed and. or circuit-based) or asynchronous (character-, mes-
sage-, or packet-based) equipment or interfaces for reasons of:
• Utilization (of capabilities special to the accessed equip-
ment)
• Theft (such as, of intellectual property, financial assets, or
toll-facility access)
• Eavesdropping (privacy invasions to humans)
• Mischief (troubling, but apparently innocuous, tampering)
• Harm (such as harmful tampering, data loss or alteration,
regardless of motive or intent)
Be aware that there may be a risk of unauthorized intrusions asso-
ciated with your system and/or its networked equipment. Also real-
ize than, if such an intrusion should occur, it could result in a variety
of losses to your company (including but not limited to, human/data
privacy, intellectual property, material assets, financial resources,
labor costs, and/or legal costs).
Voice over Internet Protocol (VoIP)
If the equipment supports Voice over Internet Protocol (VoIP) facil-
ities, you may experience certain compromises in performance, re-
liability and security, even when the equipment performs as
warranted. These compromises may become more acute if you fail
to follow Avaya's recommendations for configuration, operation and
use of the equipment. YOU ACKNOWLEDGE THAT YOU ARE
AWARE OF THESE RISKS AND THAT YOU HAVE DETERMINED
THEY ARE ACCEPTABLE FOR YOUR APPLICATION OF THE
EQUIPMENT. YOU ALSO ACKNOWLEDGE THAT, UNLESS EX-
PRESSLY PROVIDED IN ANOTHER AGREEMENT, YOU ARE
SOLELY RESPONSIBLE FOR (1) ENSURING THAT YOUR NET-
WORKS AND SYSTEMS ARE ADEQUATELY SECURED
AGAINST UNAUTHORIZED INTRUSION AND (2) BACKING UP
YOUR DATA AND FILES.
Standards Compliance
Avaya Inc. is not responsible for any radio or television interference
caused by unauthorized modifications of this equipment or the sub-
stitution or attachment of connecting cables and equipment other
than those specified by Avaya Inc. The correction of interference
caused by such unauthorized modifications, substitution or attach-
ment will be the responsibility of the user. Pursuant to Part 15 of the
FCC Rules, the user is cautioned that changes or modifications not
expressly approved by Avaya Inc. could void the user's authority to
operate this equipment.
The equipment described in this manual complies with standards of
the following organizations and laws, as applicable:
• Australian Communications Agency (ACA)
• American National Standards Institute (ANSI)
• Canadian Standards Association (CSA)
• Committee for European Electrotechnical Standardization
(EENELEC) - European Norms (EN's)
• Digital Private Network Signaling System (DPNSS)
• European computer Manufactures Association (ECMA)
• European Telecommunications Standards Institute (ETSI)
• FCC Rules Parts 15 and 68
• International Electrotechnical Commission (IEC)
• International Special Committee on Radio Interference
(CISPR)
• International Telecommunications Union Telephony (ITU-T)
• ISDN PBX Network Specification (IPNS)
• National ISDN-1
• National ISDN-2
• Underwriters Laboratories (UL)

Advertisement

Table of Contents
loading

This manual is also suitable for:

S8300S8700

Table of Contents