Overview - Lucent Technologies MERLIN LEGEND Release 6.0 Network Reference Manual

Communications system
Hide thumbs Also See for MERLIN LEGEND Release 6.0:
Table of Contents

Advertisement

MERLIN LEGEND Communications System Release 6.0
Network Reference 555-660-150
4
Security

Overview

Overview
Security planning and implementation, like other aspects of networking, require
careful coordination among system managers. Local system business needs
must be balanced with overall routing and security considerations. Network
system managers must combine existing features and new networking features to
safeguard against toll fraud. At the same time, security features must be fine-
tuned to enable efficient calling across the network.
As discussed in earlier chapters, ARS and Remote Access features are used in
combination to allow users to access PSTN trunks connected to other systems in
the network. Such ARS calls are made normally, just as they are in non-
networked systems. System programming of ARS tables, routes for tandem
trunks, and remote access default class-of-restriction (COR) ensures correct and
secure call routing. For the purposes of security, Facility Restriction Levels (FRLs)
are the most important components of these features. The next topic in this
chapter discusses how different types of FRLs—ARS, remote access default
COR, and extension—interact in a private network.
NOTE:
The ARS access code of a networked system should never be assigned to
the non-local dial plan. This might allow network users to inadvertently or
purposefully access PSTN facilities connected to a network system. The
local system ARS access code cannot be programmed into the non-local
dial plan; if all ARS access codes in a network match, this safeguard is
more effective. For this reason and for convenience and proper call-routing
in some situations, it is recommended that all the systems in a network
use the same ARS access code.
To enable calling among users on a network, certain calling restrictions are
suspended when people on one system call extensions on another system, while
others remain in effect. In addition, private network trunks and pools of private
network trunks must be safeguarded and treated differently than PSTN trunks in
order to avoid toll fraud through access to other networked systems.
summarizes these operations. The Suspended column relates to restrictions only
and indicates whether or not the restriction is applied to calls made to non-local
extensions.
"Facility Restriction Levels and Remote Access" on page 4–5
considerations that require more detailed information.
4
discusses security
Issue 1
February 1998
Page 4-2
Table 4–1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the MERLIN LEGEND Release 6.0 and is the answer not in the manual?

Table of Contents