MERLIN LEGEND Communications System Release 6.1

Issue 1

Network Reference 555-661-150

August 1998

4 Security

Page 4-1

 

 

 

Security

This chapter describes the security issues that you must consider as you plan and maintain a system in a private network. Most of these points have been raised in earlier chapters, and Chapter 2, “Call-Handling Scenarios,” provides examples of security considerations. This chapter consolidates the information in order to make security planning and implementation easier for system managers.

In a network of two systems, the system managers must work together to agree upon security measures and how they are implemented. In a larger network, system managers cooperate in the same way. Once they have agreed upon security plans, a coordinating system manager for the network should clear all modifications to the original security plan.

After an introductory overview that summarizes security design for networked systems and covers a variety of system features, this chapter explains Facility Restriction Levels (FRLs) as they are used by various features such as Automatic Route Selection (ARS), Remote Access, and Uniform Dial Plan (UDP) routing.

NOTE:

This chapter discusses only those aspects of system features and system programming that affect security. Detailed information about features and programming is included in the Feature Reference and in System Programming. In this book, Chapter 5, “Network Management,” highlights programming for networks. Chapter 3, “Feature Interactions,” describes how system features work in private networks. General information about security is included in Appendix A, “Customer Support Information.” Information about security for specific voice messaging systems for non- local users using centralized VMS/AA is included in Appendix C, “Voice Messaging Systems.” You should review these appendices carefully.

Page 185
Image 185
Lucent Technologies 555-661-150 manual Security