
Product Security Checklists
16-20 Issue 7 June 2001
DEFINITY G2 and System 85
Also see the general security checklist on page 16-2, and the security checklist for
any attached voice mail systems or other adjuncts.
Customer: _________________________________________
Location: _________________________________________
System & Version: _________________________________________
New Install: _________________________________________
System Upgrade: _________________________________________
Major Addition: _________________________________________
Table 16-7. DEFINITY G2 and System 85
Y/N
1
Note N/A
System Administration
Logins and Procedures
Security code changed from factory
default
PBX Features
Trunk groups have dial access
disabled
COS/Miscellaneous Trunk
Restrictions on dial-accessed
trunks
Disable Trunk Verification Access
Code
ACA (Automatic Circuit Assurance)
on trunk groups
Alternate FRLs used
Individual and Group Controlled
Restrictions used
Continued on next page
Commenti su questo manuale