Chapter 11: Enhancing System Security; Basic Security - Avaya Communication Manager Administrator's Manual

Hide thumbs Also See for Communication Manager:
Table of Contents

Advertisement

Chapter 11: Enhancing System Security

Basic Security

Keeping your system secure
The following is a partial list you can use to help secure your system. It is not intended as a
comprehensive security checklist. See the Avaya Toll Fraud and Security Handbook,
555-025-600 for more information about these and other security-related features.
Secure the system administration and maintenance ports and/or logins on Avaya
Communication Manager using the Access Security Gateway. This optional password
authentication interface program is provided to customers with maintenance contracts.
Activate Security Violations Notification to report unsuccessful attempts to access the
system. Security Violations Notification lets you automatically disable a valid login ID
following a security violation involving that login ID and disable remote access following a
security violation involving a barrier code or authorization code.
Use the list history command to determine if unauthorized changes have been made
to the system. To assist in identifying unauthorized use of the system, the History report
lists each time a user logs on or off the system. See the Reports for Avaya Communication
Manager, 555-233-505 for more information about this report.
Secure trunks using Automatic Route Selection (ARS), Class of Restriction (COR), Facility
Restriction Levels (FRLs) and Alternate Facility Restriction Levels (AFRLs), Authorization
Codes, Automatic Circuit Assurance (ACA), and Forced Entry of Account Codes (see "Call
Detail Recording" in Feature Description and Implementation for Avaya Communication
Manager, 555-245-205 for more information).
You can log in remotely using Secure Shell (SSH) as a secure protocol. The SSH
capability provides a highly secure method for remote access. The capability also allows a
system administrator to disable Telnet when it is not needed, making for a more secure
system.
Activate Enhanced Call Transfer for your voice messaging system, if available. This limits
transfers to valid extensions, but you also need to restrict transfers to extensions that may offer
dial tone to the caller, such as screen extensions.
Issue 1 June 2005
385

Hide quick links:

Advertisement

Table of Contents

Troubleshooting

loading

Table of Contents