GHTROUT http://www.GHTROUT.net/
 

Also Check These:


Gene's Meridian 1 Security Audit

An audit of the Meridian 1 telephone system will ensure that every possible "system" precaution has been made to prevent fraud. The first step involves querying data from the system in the form of printouts (or "capturing" the data to a file in a PC). The next step is to analyze the data and confirm the reason for each entry. Please be advised that this procedure is not designed for all "networked" Meridian 1 systems, however, most of the items apply to all systems. Use at your own risk.  ©GHTROUT

PRINTOUTS REQUIRED FOR SECURITY AUDIT: It is suggested that you "capture" all of the data from these printouts to separate files. This can be accomplished with a PC and communications program.   For the BARS LD90 NET printout, look here ©GHTROUT

LD22 CFN LD22 PWD LD21 CDB LD21 RDB
LD21 LTM LD23 ACD LD24 DISA LD20 SCL
LD86 ESN (Detail) LD86 RLB (Detail) LD86 DMI (Detail) LD87 NCTL (Detail)
LD87 FCAS (Detail) LD87 CDP (Detail) LD90 NET (Detail) LD90 SUM (Detail)
LD20 TNB LD22 DNB LD88 AUB  

GATHERING DATA FROM LD81 ©GHTROUT

List (LST) the following FEAT entries to form an information base on the telephones. ©GHTROUT

NCOS 00 99 CFXA UNR TLD SRE
FRE FR1 FR2 CUN CTD

DATA BLOCK REVIEW ITEMS ©GHTROUT

From the printouts, a review of the following areas must be made. Some of the items may or may not be appropriate depending on the applications of the telephone system. ©GHTROUT

CFN - Configuration
  • Verify that History File is in use. ©GHTROUT
PWD - Passwords
  • Verify that FLTH (failed login attempt threshold) is low enough.
  • Verify that PWD1 and PWD2 (passwords) use both alpha and numeric characters and are eight or more characters long.
  • Note any LAPW's (limited access passwords) assigned.
  • Enable audit trails. ©GHTROUT
CDB - Customer Data Block
  • Verify that CFTA (call forward to trunk access code) is set to NO.
  • Verify NCOS level of console. ©GHTROUT
  • Verify that NIT1 through NIT4 (or other night numbers) are pointing to valid numbers. ©GHTROUT
  • EXTT prompt should be NO to work in conjunction with trunk route disconnect controls (See RDB) ©GHTROUT
RDB - Trunk Route Data Block
  • Verify that every route has a TARG assigned. ©GHTROUT
  • Confirm that FEDC and NEDC are set correctly. ETH is typical, however for maximum security in blocking trunk to trunk connections, set NEDC to ORG and FEDC to JNT ©GHTROUT
  • Confirm that ACCD's are a minimum of four digits long (unless for paging). ©GHTROUT
  • If ESN signaling is active on trunk routes, verify that it needs to be. ESN signaling, if not required, should be avoided. ©GHTROUT
  • NOTES ON TGAR: For demonstration purposes, this document suggests that sets be a "TGAR 1". The only requirement for TGAR is that it match one of the TARG numbers assigned in the Route Data Block ©GHTROUT
ACD - Automatic Call Distribution
  • Verify ACD queues and associated NCFW numbers. Verify all referenced extensions. ©GHTROUT
DISA - Direct Inward System Access
  • Remove DISA if not required. If required, verify that security codes are in use. ©GHTROUT
ESN - Electronic Switched Network
  • AC1 is typically "9". If there is an AC2 assigned, verify its use.
  • If TOD or ETOD is used - verify what NCOS levels are changed, when they are changed and why they are changed. ©GHTROUT
  • Apply FLEN to your SPNs to insure nobody is ever allowed to be transferred to a partially dialed number, like "Transfer me to 91800" ©GHTROUT
  • Study EQAR (Equal Access Restriction) to insure that users can only follow a "Carrier Access Code" with a zero rather than a one:   (1010321-1-414-555-1212 is blocked but 1010321-0-414-555-1212 is allowed with EQAR) ©GHTROUT
NCTL - Network Control
  • Use LD81 FEAT PRINT to verify all NCOS being used.
  • Does NCOS 0 = FRL 0? Does NCOS X always equal FRL X in the NCTL? ©GHTROUT
  • Does FRL 0 have any capabilities? - It should not be able to dial anything. ©GHTROUT
FCAS - Free Call Area Screening
  • Confirm the need to use FCAS and remove it if possible. FCAS is usually a waste of system memory and complicates the system without saving money. ©GHTROUT
DGT (DMI) - Digit Manipulation
  • Confirm all numbers referenced in the "insert" section of each DMI table. ©GHTROUT
RLB - BARS Route List Block
  • Are any RLB ENTR'S assigned FRL 0 - typically, only the RLB that handles 911 calls should have an FRL 0. ©GHTROUT
  • If DMI is in use, confirm all "inserted" numbers. ©GHTROUT
CDP - BARS Coordinated Dialing Plan
  • Are all CDP numbers valid? Check the RLBs they point to and see what the DMI value is. Confirm insertions. ©GHTROUT
NET - ALL - BARS Network Numbers
  • Add 000,001,002,003,004,005,006,007,008,009 as SPNs pointing to a route list block that is set to LTER YES. These entries block transfers to "ext. 9000" and similar numbers. ©GHTROUT
  • Point SPN "0" to a RLI with a high FRL, then consider adding new SPNs of 02, 03, 04, 05, 06, 07, 08, 09 to point to a RLI with a lower FRL so that users cannot dial "0", but can dial "0+NPA credit card calls. ©GHTROUT
  • Check FRL of 0, 00, 011 and confirm that each is pointed to separate NET entry requiring a high FRL. ©GHTROUT
  • Remove all of shore NPAs (Like 1-809 Dominican Republic) if possible.   Regulations are almost non-existent in some of those areas and they are hot fraud targets. ©GHTROUT
  • Verify blocking 900 and 976 access.  Also consider blocking the NXX of your local radio station contest lines.  Users will go nuts calling a radio station to win a free toaster, taking over all the trunks in your phone system. ©GHTROUT
  • Restrict the main numbers and DID range within the BARS system. There is no need to call from an outgoing to an incoming line at the same location. ©GHTROUT
TRUNKS
  • Confirm that all trunks have TGAR assigned. ©GHTROUT
  • Confirm that all incoming and TIE trunks have class of service SRE assigned. (caution on networked systems) ©GHTROUT
  • Confirm that all trunks have an NCOS of zero. ©GHTROUT
  • NOTES ON TGAR: For demonstration purposes, this document suggests that sets be a "TGAR 1". The only requirement for TGAR is that it match one of the TARG numbers assigned in the Route Data Block ©GHTROUT
SETS-PHONES
  • Does every phone have a TGAR of 1 assigned? (This must be checked set by set, TN by TN). ©GHTROUT
  • Can you change every phone that is UNR to CTD? Review LD81 FEAT PRINT to find out the UNR sets. CTD class of service is explained below. ©GHTROUT
  • Confirm that all sets are assigned CLS CFXD? ©GHTROUT
  • Confirm that the NCOS is appropriate on each set. ©GHTROUT
  • In Release 20 or above, removing transfer feature may be appropriate. ©GHTROUT
  • Confirm that all sets CFW digit length is set to the system DN length. ©GHTROUT
  • NOTES ON TGAR: For demonstration purposes, this document suggests that sets be a "TGAR 1". The only requirement for TGAR is that it match one of the TARG numbers assigned in the Route Data Block ©GHTROUT
  • Apply Flexible Trunk to Trunk Connections on the set (Such as CLS=FTTR), and FTOP in the CDB if deemed appropriate.  These restrictions are done on a set by set basis and allow or deny the ability to transfer incoming calls out of the facility. ©GHTROUT
VOICE MAIL PORTS
  • Each port should be CLS of SRE ©GHTROUT
  • Apply Flexible Trunk to Trunk Connections on the TNs (CLS=FTTR), and verify FTOP in the CDB ©GHTROUT
  • Each port should be NCOS 0 - NCOS 0 must be known to be too low to pass any call ©GHTROUT
  • Each port should be TGAR 1 (all trunk routes must be TARG 1 also) ©GHTROUT
  • NOTES ON TGAR: For demonstration purposes, this document suggests that sets be a "TGAR 1". The only requirement for TGAR is that it match one of the TARG numbers assigned in the Route Data Block ©GHTROUT
  • NOTE:  If you are used to your Mail system doing outcalling, you can forget about that working after applying these restrictions.  An alternative that will allow Outcalling but restrict thru-dialing to external numbers is to keep the NCOS and CLS restrictions high enough to place outcalls, but "Apply Flexible Trunk to Trunk Connections on the TNs (CLS=FTTR), and verify FTOP in the CDB" as indicated in point 1 above.  ©GHTROUT

CLASS OF SERVICE AND TRUNK GROUP ACCESS RESTRICTIONS: ©GHTROUT

EXPLANATION OF CLASS OF SERVICE SRE:  ©GHTROUT

  • NTP DEFINITION: Allowed to receive calls from the exchange network. Restricted from all dial access to the exchange network. Allowed to access the exchange network through an attendant or an unrestricted telephone only. ©GHTROUT
  • Essentially, an SRE set can do nothing on it's own except dial internal and TIE line extensions. If a trunk is SRE - it will work normally and allow conference calls and transfers. ©GHTROUT

EXAMPLES OF 'SRE' IN USE:  ©GHTROUT

  • Voice Mail cannot connect to an outgoing line, but can receive incoming calls. ©GHTROUT
  • Callers on the far end of a TIE line cannot call out through your end (for their sake, both ends should be SRE). ©GHTROUT

EXPLANATION OF CLASS OF SERVICE CTD:  ©GHTROUT

  • If a route access code is accessed (if there was no match between the TGAR and TARG), the caller cannot dial 1 or 0 as the leading digits. ©GHTROUT
  • If the caller makes a "dial 9" BARS call, the NCOS will control the call. ©GHTROUT

EXPLANATION OF TGAR AND TARG:  ©GHTROUT

  • The best restriction is to have all trunk routes TARG'd to 1 and all TNs (including actual trunk TNs) TGAR'd to 1. This will block all access to direct trunk route selection. ©GHTROUT

BENEFITS OF IMPLEMENTING THESE SECURITY RESTRICTIONS  ©GHTROUT

  • No incoming caller will have access to an outside line unless physically transferred or conferenced by an internal party. If voice mail ports are SRE and NCOS 0 and have a TGAR matching the TARG - they will not be able to transfer a call out of the system, regardless of the voice mail system's resident restrictions assigned. ©GHTROUT
  • No phone will be able to dial a trunk route access code. Consider allowing telecom staff this ability for testing. ©GHTROUT
  • Layered security:  ©GHTROUT
    • If in phone programming, TGAR was overlooked on a phone, the CTD class of service would block the user from dialing a 0 or 1 if they stumble upon a route access code.
    • If in programming, the CTD class of service was overlooked, both TGAR and NCOS would maintain the restrictions. ©GHTROUT
    • If in programming, the NCOS is overlooked, it will defaults to zero, which is totally restricted if NCTL and RLBs are set up correctly. ©GHTROUT