Issue 4 September 1995 I-1
I

Security Issues

Introduction
There are a number of security issues vis-a-vis Call Vectoring that should be
noted. For example, Call Vectoring and Call Prompting can be used to help
prevent unauthorized users from gainin g access to the switch via the Remote
Access feature. This appendix explains how this is done.
NOTE:
For more information on se curit y issues, refer to the
GBCS Product s
Security Handbook
, 555-025-600.

Remote Access

Abuse of remote access on the switch is one of the main methods by which
unauthorized users obtain telephone services illegally. This section explains how
a number of Call Vectoring features can be used to prevent unauthorized use of
the DEFI N ITY remote access feature. No new development is required for any of
these services.
Two methods are available, as follows:
Front-ending remote access (that is, reaching the remote access
extension via Call Vectoring)
Replacing the f u nctio n o f th e r e mo t e access e x tension by one or more call
vectors.