Appendix A: General Information

Security - Page 115

Security

The IPNC provides a number of measures for the protection of your data and systems against intrusion – either unintentional or malicious – from both the Internet and unauthorised dial-in users. These include:

A Firewall.

Encrypted Passwords.

CLI.

Time Profiles.

NAT / Proxy Server.

In essence, a firewall creates a barrier between your subnet and the outside world, and controls who leaves and who enters, according to one or all of several criteria. Anyone who fails the test is prevented from entering or leaving, i.e., starting a session with an internal or external application. The main criteria can be defined as:

1.All common TCP/IP protocols can be restricted to incoming or outgoing only. This means that, for example, your network administrator alone could be permitted to use diagnostic and management protocols, and further restrict his use of them to incoming access only.

2.Access to and from services with specific IP addresses and masks can be prevented.

3.Filters can be defined to search for specific data patterns. Traffic containing a match can then be allowed through the firewall or not, as required.

The systems security features can be combined for maximum protection. For example, the network administrator’s restrictions can include a time profile, limiting access to outside normal working hours, and a user profile set up to check that the CLI of the incoming call matches the number of his home or mobile phone. This gives full coverage for an out-of-hours emergency with maximum protection in normal circumstances.

For Internet services, the system includes a proxy server providing NAT / IP masquerading to conceal your local addresses from other Internet users. Password protection, with optional password encryption, is available for all services, including dial-in services.

The importance of security cannot be over-emphasised and the part users play cannot be under-estimated. Just as you take care of your credit cards, you must be mindful of security issues. No matter how powerful a password verification technique is, it is no use if the password is written on a note stuck to your PC. Your system’s security is ultimately your own responsibility. You must:

Store back-ups and all system information securely, for both security and disaster recovery purposes

Change all passwords regularly

Change the default start IP address of your system

Install a reliable virus protection program and keep it up to date

Ensure that all members of your staff are aware of security issues.

We recommend that you utilise your default firewall by naming it and including it's user and service profiles where appropriate. Punch additional holes in the firewall only as and when experience shows they are needed.

YOU MUST CHANGE YOUR REMOTE ACCESS PASSWORD.

INDeX IPNC Cassette Administration Manual

Appendix A: General Information - Page 115

38DHB0002UKDD – Issue 7 (22/11/02)

Security

Page 115
Image 115
Avaya 38DHB0002UKDD manual Security, YOU Must Change Your Remote Access Password

38DHB0002UKDD specifications

The Avaya 38DHB0002UKDD is a high-quality IP desk phone, designed to cater to the communication needs of modern businesses. With its sleek design and advanced features, this device enhances productivity and collaboration in any professional setting.

One of the key features of the Avaya 38DHB0002UKDD is its intuitive user interface, which facilitates easy navigation through menus and settings. The phone is equipped with a large, backlit display, allowing users to view information clearly, even in low-light environments. This ensures that important calls or messages are not missed, promoting efficient communication.

In terms of audio quality, the Avaya 38DHB0002UKDD stands out with its HD voice quality. This technology enhances the clarity of calls, making conversations more natural and intelligible. The use of wideband audio ensures that users can hear every detail without distortion, which is particularly beneficial for those who engage in lengthy discussions or conference calls.

The device supports Power over Ethernet (PoE), which allows it to receive power and data through a single cable. This simplifies installation and reduces clutter, making it an ideal choice for businesses looking to optimize their workspace. The phone is also compatible with various networking protocols, ensuring seamless integration into existing communication systems.

Another significant characteristic of the Avaya 38DHB0002UKDD is its programmable keys. These can be customized to access frequently used functions or to streamline common tasks. This feature enables users to enhance their efficiency, minimizing the time spent navigating through menus.

Additionally, the Avaya 38DHB0002UKDD includes programmable soft keys that can adapt to the user's specific workflow. This flexibility allows for personalized configurations, enhancing user experience and productivity.

Security is a top priority for businesses, and the Avaya 38DHB0002UKDD addresses this need with robust encryption protocols. This ensures that sensitive conversations are protected against eavesdropping and unauthorized access.

In summary, the Avaya 38DHB0002UKDD is a versatile and feature-rich IP desk phone that enhances communication in the corporate environment. With its intuitive interface, HD audio quality, PoE support, programmable keys, and strong security features, it stands as a powerful tool for any organization aiming to improve its communication systems. This phone is perfect for both small and large enterprises seeking to boost productivity and collaboration among their teams.