122 Chapter 4 BCM50 Security Policies and Accounts and Privileges
NN40020-600NN40020-600

Security audits

A security log file is created at system startup to record user logins and transactions. This log is
rolled each day and kept until the maximum log size is reached. When the maximum size is
reached, the oldest record is deleted to make room for the newest record. For information about
managing logs, see Chapter 12, “Managing BCM50 Logs,” on page 301.
Administrators can view security logs using the Log Management capabilities found under the
Administration tab.
Each security log record contains:
the time of the event
the user ID
a summary of the action performed in the configchange.systemlog

System security considerations

To define security parameters for the system and for users, you must consider what level of
security you need to meet your network security standard. Note that the default security settings
are not set to their maximum secure settings and can be changed to suit your specific requirements.

Considerations

Consider the following:
Do you want administrative users to be able to access the system through the telset
configuration menus?
How much access to the Element Manager interface are users allowed?
Access is based on user privileges defined through user group membership. There is one
default Element Manager administrator account, nnadmin. This account has a default telset
user ID and password. There is also a read-only guest default account (nnguest), which does
not have a default telset user ID and password. You can delete the guest account to increase
security if you wish.
Do you need to have a temporary account that expires?
How long do you want the Element Manager to remain open if there is no input from the user?
How long do you want a user account to be locked out after a specified number of incorrect
passwords are entered?
How complex do you want user IDs and passwords to be in terms of length and character
requirements?
Do you want modem access to use callbacks?
!
Security Note: Nortel recommends changing all default system passwords after the
system is up and running and operation is verified.