Security

Overview of Security

This topic describes ways to use system administration tools to minimize the possibility of telecommunications toll fraud on your system. It offers safeguards that make it harder for an unauthorized user to penetrate the messaging system.

What Is Toll Fraud?

Toll fraud is the unauthorized use of a company's telecommunications service. It occurs when people misdirect their own telecommunications charges to another person or business.

For messaging systems, toll fraud consists of using the system and messaging software to complete a toll call through a networked switch.

NoteNote

Much of the information in this section is from the Avaya Products Security Handbook. See this handbook for complete information on securing your voice mail system from possible toll fraud.

How Toll Fraud Occurs

There are several ways that unauthorized users might attempt to breach your system, including:

Unauthorized System Use

To minimize the risk of unauthorized system use, follow the guidelines for your voice mail (vm), messaging system administration (sa), including the Password Aging feature. Provide additional protection for your system with Avaya's Access Security Gateway (ASG) option.

Administration Passwords

The following aspects of password management affect the security of your system:

Default Administrator Password

When your system is installed, both the sa and vm logins come with a default password. You are required to change this password immediately. Use the procedures in Changing Passwords to make this change.

Password Standards

Passwords must comply with certain minimum standards. These standards are described in Guidelines for Passwords.

Password Aging

Password aging ensures that administration passwords are changed at reasonable intervals by causing passwords to expire after a set period of time. Use password aging for administrative logins to reduce the danger of unauthorized system access.

You can change password aging by starting at the Communication Manager server SAT Command Line Interface and entering change password<login_name>. The items and their operation are described in Changing a System Password or Password Aging.

Access Security Gateway

The Access Security Gateway (ASG) feature is an optional authentication interface that you can use to secure the vm and sa logins on the Communication Manager server. Whenever a dial-up port user begins a session on the system for purposes of administration or maintenance, the user must enter a valid login ID. If the ASG interface is activated, the system issues a numerical challenge. In order for the user to access the Communication Manager server and messaging administration and maintenance features, the user must enter the correct numerical response. By activating the ASG feature, you can reduce the possibility of unauthorized remote access to the system.

You administer ASG parameters to specify whether access to the system requires ASG authentication. See the Communication Manager server documentation for appropriate administration and login procedures.

NoteNote

For more information on using the ASG Key, see the Access Security Gateway Key User's Guide, 585-212-012.

Trusted Server Security

A trusted server is a computer or a software application in a domain outside of messaging. A trusted server uses its own login and password to launch an MCAPI (Message Core Application Programming Interface); formerly called Avaya INTUITY Messaging Applications Programming Interface (IMAPI), LAN session and access messaging mailboxes.

Trusted servers can access and manipulate a message just as the messaging application can do. See Overview of Activating Internet Messaging for in-depth discussions and definitions of trusted servers, domains, and integration of email and other trusted server software with messaging.

Passwords for Trusted Servers

The trusted server can do everything to a user mailbox that a messaging user can do. You must administer a password that the trusted server application uses to request a connection to the messaging server.

The two trusted server screens are Trusted-Server Profile and MCAPI-Password. See Activating Internet Messaging for trusted server and MCAPI administration information.

To prevent unauthorized access through MCAPI into your system from an external source such as a trusted server, you must administer an MCAPI password that the trusted server uses to connect to messaging. The MCAPI password is another layer of security. It prevents an unauthorized source from starting an MCAPI session.

We recommend that you change MCAPI passwords on a regular basis, for example, monthly. If you set your administrator's password to age automatically, the system prompts you to change your password. You can also use this prompt to remind you to change the MCAPI password.

Virus Detection

Messaging allows the transmission between domains of two message components, text (email) and binary (software) file attachments. When used with a messaging system, Message Manager also supports these message components. These components introduce the possibility of a computer virus being embedded in a file attachment. While the messaging system cannot be infected with viruses embedded in these software files, client machines may become infected when a subscriber opens or launches an infected binary file.

Messaging does not perform any virus detection. Your company should carefully evaluate the security risks of file attachments and make provisions for virus detection software on personal computers running an email application or Message Manager. Your PC/LAN administrator probably has experience in detecting and preventing the transmission of software viruses. Your PC/LAN administrator may also know the minimum requirements that the messaging server and email server must meet to be allowed on the company network at all.

At a minimum, you should advise your subscribers that file attachments should be detached (not launched) and scanned for viruses before use.

Unauthorized Use of Mailboxes

One type of voice mail fraud occurs when an unauthorized user obtains the mailbox password and changes both it and the greeting. The unauthorized user then uses the mailbox for nonbusiness purposes. This use can be expensive if access is gained to the voice mail system through a 1-800 or 1-888 number.

Mailbox Administration

When you administer the system and subscribers' mailboxes, perform the following tasks to prevent unauthorized use:

Subscriber Password Security

To minimize the risk of unauthorized access to messaging mailboxes, ensure that your subscribers follow these guidelines for messaging passwords:

Fraudulent Transfers

Once users transfer to dial tone, they can dial a trunk access code (TAC), feature access code (FAC), or extension number. If the system is not properly secured, thieves can make fraudulent long distance calls or request a company employee to transfer them to a long distance number.

Fraudulent transfers can be minimized by administering features and options in messaging and on the Communication Manager server.