Lucent Technologies 555-661-150 IP Phone User Manual


 
Security
Page 4-1
4
MERLIN LEGEND Communications System Release 6.1
Network Reference
555-661-150
Issue 1
August 1998
Security 4
This chapter describes the security issues that you must consider as you plan and
maintain a system in a private network. Most of these points have been raised in
earlier chapters, and Chapter 2, “Call-Handling Scenarios,” provides examples of
security considerations. This chapter consolidates the information in order to
make security planning and implementation easier for system managers.
In a network of two systems, the system managers must work together to agree
upon security measures and how they are implemented. In a larger network,
system managers cooperate in the same way. Once they have agreed upon
security plans, a coordinating system manager for the network should clear all
modifications to the original security plan.
After an introductory overview that summarizes security design for networked
systems and covers a variety of system features, this chapter explains Facility
Restriction Levels (FRLs) as they are used by various features such as Automatic
Route Selection (ARS), Remote Access, and Uniform Dial Plan (UDP) routing.
NOTE:
This chapter discusses only those aspects of system features and system
programming that affect security. Detailed information about features and
programming is included in the
Feature Reference
and in
System
Programming.
In this book
,
Chapter 5, “Network Management,” highlights
programming for networks. Chapter 3, “Feature Interactions,” describes
how system features work in private networks. General information about
security is included in Appendix A, “Customer Support Information.”
Information about security for specific voice messaging systems for non-
local users using centralized VMS/AA is included in Appendix C, “Voice
Messaging Systems.” You should review these appendices carefully.