04.11.2014 Views

Definity ECS Admin for Network Connectivity.pdf - TextFiles.com

Definity ECS Admin for Network Connectivity.pdf - TextFiles.com

Definity ECS Admin for Network Connectivity.pdf - TextFiles.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

C Security Issues<br />

This Appendix briefly discusses issues related to system security <strong>for</strong> DEFINITY <strong>ECS</strong> in a TCP/IP<br />

network environment.<br />

<strong>Network</strong> Security Issues<br />

This section describes a strategy to ensure the security of an intranet that is connected to DEFINITY<br />

<strong>ECS</strong> R7 or later systems.<br />

Overview<br />

The TCP/IP connectivity available with Release 7 and later of DEFINITY<br />

<strong>ECS</strong> makes it possible to connect one or more DEFINITY <strong>ECS</strong> systems in a<br />

network that includes connections to a <strong>com</strong>pany’s existing data network<br />

(LAN or intranet). This integration of networks introduces the possibility of<br />

unauthorized access — to the DEFINITY network through the LAN/intranet<br />

and to the LAN/intranet through the DEFINITY network.<br />

Security concerns<br />

Security can mean many different things. The strategy described here focuses<br />

on three key concerns from a customer perspective:<br />

1 How can a customer network be protected from unauthorized outside access<br />

through a DEFINITY <strong>ECS</strong>? That is, how can a hacker be prevented from dialing<br />

into a DEFINITY <strong>ECS</strong> and getting on the customer LAN?<br />

2 How can a customer network be protected from unauthorized access by Lucent<br />

services personnel?<br />

3 How can a DEFINITY <strong>ECS</strong> be protected from unauthorized access through the<br />

customer LAN?<br />

Security solutions<br />

The first and most important line of defense in any security strategy is access<br />

control. Damage to the network or theft of proprietary in<strong>for</strong>mation by hackers<br />

can be prevented by <strong>com</strong>pletely denying access to unauthorized users.<br />

Access control can be provided by three means:<br />

• network topology<br />

• network administration<br />

• authentication<br />

<strong>Admin</strong>istration <strong>for</strong> <strong>Network</strong> <strong>Connectivity</strong><br />

555-233-504 — Issue 1 — April 2000 CID: 77730<br />

403

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!