TOC Index Search

 

Security

Overview

No telecommunications system can be entirely free from risk of unauthorized use. However, diligent attention to system management and to security can considerably reduce that risk. Customers know best how to tailor the system to meet their unique needs and are, therefore, in the best position to protect the system from unauthorized use. Because the customer has the ultimate control over the configuration and use of the Avaya services and products it purchases, the customer properly bears responsibility for fraudulent uses of those services and products.

Avaya, however, is committed to help customers use and manage their system to ensure the greatest security possible.

This section highlights some of the things you can do to secure your messaging system against fraudulent use.

Purpose

The purpose of this section is to alert the customer to the dangers of telecommunications fraud. This section also provides some guidelines on how to administer a messaging system to prevent unauthorized use. For a complete discussion, see the BCS Products Security Handbook, 555-025-600.

Protecting Your Messaging System

Voice Messaging toll fraud has risen dramatically in recent years. Now more than ever, it is imperative that you take steps to secure your system. This means protecting your standard voice messaging and automated attendant applications.
 

Note: No security issues exist that are unique to fax messaging. Voice messaging security issues generally apply also to fax or text messaging.

Voice Messaging

There are two types of voice mail fraud. The first type occurs when a hacker takes over a mailbox and uses it to communicate with other hackers. This can be expensive if access is gained to the voice mail system through an 800 number. Typically a hacker hacks the mailbox password and changes both it and the greeting.

Once thieves transfer to dial tone, they can dial a Trunk Access Code (TAC), Feature Access Code (FAC), or extension number, which is the second type of abuse. If the system is not properly secured, thieves can make fraudulent long distance calls or request that a company employee to transfer them to a long distance number.

Automated Attendant

Auto attendants are used by many companies to augment or replace a switchboard operator. When an auto attendant answers, the caller is generally given several options. A typical greeting is: "Hello, you've reached XYZ Bank. Please enter 1 for Auto Loans and 2 for Home Mortgages. If you know the number of the person you are calling, please enter that now."

In some switches, button 9 is used to access dial tone. In addition, when asked to enter an extension, the hacker enters 9180 or 9011. If the system is not properly configured, the auto attendant passes the call back to the PBX. The PBX reacts to 9 as a request for a dial tone. The 180 becomes the first numbers of a 1809 call to the Dominican Republic. The 011 is treated as the first digits of an international call. The hacker then enters the remaining digits of the phone number, and the call is completed. You, the PBX owner, pay for it. This hacker scenario works the same way with a voice mail system.

Switch Administration

To minimize the risk of unauthorized people using the AUDIX system to make toll calls, administer your switch in any of the following ways:

Restrict Outward Dialing

The measures you can take to minimize the security risk of outcalling depend on how it is used. When outcalling is used only to alert onpremises subscribers who do not have AUDIX message indicator lamps on their phones, you can assign an outwardrestricted Class of Restrictions (COR) to the AUDIX voice ports.

For G1, G3, and System 75:

Assign Low Facilities Restriction Level (FRL)

The switch treats all the PBX ports used by voice mail systems as stations. Therefore, each voice mail port can be assigned a COR/COS with an FRL associated with the COR/COS. FRLs provide eight different levels of restrictions for Automatic Alternate Routing (AAR), Automatic Route Selection (ARS), or World Class Routing (WCR) calls. They are used in combination with calling permissions and routing patterns and/or preferences to determine where calls can be made. FRLs range from 0 to 7, with each number representing a different level of restriction (or no restrictions at all).

The FRL is used for the AAR/ARS/WCR feature to determine call access to an outgoing trunk group. Outgoing call routing is determined by a comparison of the FRLs in the AAR/ARS/WCR routing pattern to the FRL associated with the COR/COS of the call originator.

The higher the FRL number, the greater the calling privileges. For example, when voice mail ports are assigned to a COR with an FRL of 0, outside calls are disallowed. If that is too restrictive, the voice mail ports can be assigned to a COR with an FRL that is higher, yet low enough to limit calls to the calling area needed.
 

Note: Voice Messaging ports that are outward restricted through COR cannot use AAR/ARS/WCR trunks. Therefore, the FRL level does not matter since FRLs are not checked.

FRLs can be assigned to offer a range of calling areas. Choose the one that provides the most restricted required calling area. See the table for Suggested Values for FRLs for more information on suggested FRL values.
 
Table� 1. Suggested Values for FRLs
FRL
Suggested Value
0
No outgoing (offswitch) calls permitted.
1
Allow local calls only; deny 0+ and 1800 calls.
2
Allow local calls, 0+, and 1800 calls.
3
Allow local calls plus calls on FX and WATS trunks.
4
Allow calls within the home NPA.
5
Allow calls to certain destinations within the continental USA.
6
Allow calls throughout the continental USA.
7
Allow international calling. Assign attendant console FRL 7. Be aware, however, that if Extension Number Portability is used, the originating endpoint is assigned FRL 7.

 

Note: In the table for Suggested Values for FRLs, FRLs 1 through 7 include the capabilities of the lower FRLs. For example, FRL 3 allows private network trunk calls and local calls in addition to FX and WATS trunk calls.

To set FRLs on G1, G3 and System 75:

Restrict Toll Areas

A reverse strategy for preventing calls is to allow outbound calls only to certain numbers. For G1 and System 75, you must specify both the area code and the office code of the allowable numbers. For G3, you can specify the area code or telephone number of calls you allow.

For G1 and System 75:

For G3:

Create Restricted Number Lists (G1, G3, and System 75 Only)

The Toll Analysis screen allows you to specify the toll calls you want to assign to a restricted call list (for example, 900 numbers) or to an unrestricted call list (for example, an outcalling number to a call pager). Call lists can be specified for CO/FX/WATS, TAC, and ARS calls, but not for tie TAC or AAR calls.

Restrict AMIS Networking Number Ranges

To increase security for AMIS analog networking, including the Message Delivery service, restrict the number ranges that might be used to address messages. Be sure to assign all the appropriate PBX outgoing call restrictions on the AUDIX voice ports.

Subscriber Password Guidelines

To minimize the risk of unauthorized people accessing AUDIX subscriber mailboxes and using them for toll fraud, educate subscribers in the following guidelines for AUDIX passwords:

INTUITY AUDIX Administration

To minimize the risk of unauthorized people using the INTUITY AUDIX system to make toll calls, you can administer the AUDIX system in any of the following ways:

Mailbox Administration

Outcalling

When outcalling is used for subscribers who are offsite (often the message notification is forwarded to a call pager number), the following three options exist to minimize toll fraud:

  1. The AUDIX voice ports can be assigned to a tollrestricted COR that allows calling only within a local area.
  2. The outcalling numbers can be entered into an unrestricted calling list for either ARS or Toll Analysis.
  3. Outcalling numbers can be limited to 7 or 10 digits.

On the Subscriber form, turn off outcalling by using the proper COS for each subscriber.

On the System Parameters Outcalling form, limit the number of digits that can be dialed for outcalling.
 

Note: If outcalling to a pager is allowed, additional digits might be required.

Basic Call Transfer (5ESS, DMS-100, MERLIN LEGEND, and Non-Avaya Switches)

With Basic Call Transfer, after an AUDIX caller enters * + T, the AUDIX system does the following:

  1. The AUDIX system verifies that the digits entered contain the same number of digits as administered on the AUDIX system for extension lengths.
  2. If call transfers are restricted to subscribers, the AUDIX system also verifies that the digits entered match the extension number for an administered subscriber.

  3. If step 1 is successful, the AUDIX system performs a switch-hook flash, putting the caller on hold.
     

    Note: If step 1 is unsuccessful, the AUDIX system plays an error message and prompts the caller for another try.

  4. The AUDIX system sends the digits to the switch.
  5. The AUDIX system completes the transfer.

With Basic Call Transfer, a caller can dial any number, provided the number of digits matches the length of a valid extension. So, if an unauthorized caller dials an access code followed by the first digits of a long distance telephone number, such as 9 1 8 0 9, the AUDIX system passes the numbers on to the switch. (This example shows a 5-digit plan.) The switch interprets the first digit (9) as an access code, and the following digits as the prefix digit and area code. The caller then enters the remaining digits of the phone number to complete the call.

If call transfers are restricted to subscribers, a caller cannot initiate a transfer to an off-premises destination unless the digits entered match an administered subscriber's mailbox identifier (for example, 91809). To ensure the integrity of the "subscriber" restriction, do not administer mailboxes that start with the same digit(s) as a valid switch trunk access code.

Enhanced Call Transfer (System 75, System 85, G1, G2, G3)

With Enhanced Call Transfer, the AUDIX system uses a digital control link message to initiate the transfer, and the switch verifies that the requested destination is a valid station in the dial plan. With Enhanced Call Transfer, when AUDIX callers enter * T followed by digits (or * A for name addressing) and #, the following steps are performed:

  1. The AUDIX system verifies that the digits entered contain the same number of digits as administered on the AUDIX system for extension lengths.
  2. If call transfers are restricted to subscribers, the AUDIX system also verifies that the digits entered match the extension number for an administered subscriber.
     

    Note: When callers request a name addressing transfer, the name must match the name of an AUDIX subscriber (either local or remote) whose extension number is in the dial plan.

  3. If step 1 is successful, the AUDIX system sends a transfer control link message containing the digits to the switch. If step 1 is unsuccessful, the AUDIX system plays an error message to the caller and prompts for another try.
  4. The switch verifies that the digits entered match a valid extension in the dial plan.

INTUITY AUDIX FAX Messaging

No fax-specific security issues exist. However, since INTUITY AUDIX FAX Messaging requires that AMIS Analog Networking be turned on, be sure that outgoing AUDIX voice ports have the appropriate PBX calling restrictions

Detecting Voice Mail Fraud

The table for Suggested Values for FRLs shows the reports that help determine if your voice mail system is being used for fraudulent purposes.
 
Monitoring Technique
Switch
Call Detail Recording (or SMDR)
All*
Traffic Measurements and Performance
All
Automatic Circuit Assurance
All
Busy Verification
All
Call Traffic Report
All
Trunk Group Report
G1, G3, System 75
AUDIX Traffic Reports
All*
* MERLIN LEGEND supports only these monitoring techniques.

Call Detail Recording (or SMDR)

With call detail recording (CDR) activated for the incoming trunk groups, you can find out details about the calls made into your voice mail ports. This feature is known as Station Message Detail Recording (SMDR) on some switches, including MERLIN LEGEND.
 

Note: Avaya's optional Call Accounting System (CAS) might be installed on the INTUITY AUDIX system, allowing you to create customized reports with your G1, G3, or MERLIN LEGEND/MAGIX CDR/SMDR data. The optional Avaya Hacker Tracker program works in conjunction with CAS Plus Version 3 to alert you to abnormal calling activities. Call 800 521-7872 for more information.

Most other call accounting packages discard valuable security information. If you are using a call accounting package, check to see if this information can be stored by making adjustments in the software. If it cannot be stored, be sure to check the raw data supplied by CDR.

Review CDR for the following symptoms of voice messaging abuse:

For G1, G3, and System 75:

Call Traffic Report

This report provides hourly port usage data and counts the number of calls originated by each port. By tracking normal traffic patterns, you can respond quickly if an unusually high volume of calls begins to appear, especially after business hours or during weekends, which might indicate hacker activity.

For G1, G3, and System 75, traffic data reports are maintained for the last hour and the peak hour. For G2 and System 85, traffic data is available through Monitor I which can store the data and analyze it over specified periods.

Trunk Group Report

This report tracks call traffic on trunk groups at hourly intervals. Since trunk traffic is fairly predictable, you can easily establish over time what is normal usage for each trunk group. Use this report to watch for abnormal traffic patterns, such as unusually high offhour loading.

SAT, Manager I, and G3MT Reporting

Traffic reporting capabilities are built in and are obtained through the System Administrator Tool (SAT), Manager I, and G3MT terminals. These programs track and record the usage of hardware and software features. The measurements include peg counts (number of times ports are accessed) and call duration. Traffic measurements are maintained constantly and are available on demand. However, reports are not archived and should, therefore, be printed to monitor a history of traffic patterns.

For G1, G3, and System 75:

ARS Measurement Selection

The ARS Measurement Selection can monitor up to 20 routing patterns (25 for G3) for traffic flow and usage.

For G1, G3, and System 75:

Automatic Circuit Assurance

This monitoring technique detects a number of short holding time calls or a single long holding time call, which may indicate hacker activity. Long holding times on TrunktoTrunk calls can be a warning sign. The ACA feature allows you to set time-limit thresholds defining what is considered a short holding time and a long holding time. When a violation occurs, a designated station is visually notified.

When an alarm occurs, determine if the call is still active. If toll fraud is suspected (for example, a long holding time alarm occurs on a TrunktoTrunk call), you might want to use the busy verification feature to monitor the call in progress. See Busy Verification for more information.

For G1, G3, and System 75:

Busy Verification

When toll fraud is suspected, you can interrupt the call on a specified trunk group and monitor the call in progress. Callers will hear a long tone to indicate the call is being monitored.

For G1, G3, and System 75:

AUDIX Traffic Reports

The INTUITY AUDIX system tracks traffic data over various time spans. Reviewing these reports on a regular basis helps to establish traffic trends. If increased activity or unusual usage patterns occur, such as heavy call volume on ports assigned to outcalling, they can be investigated immediately. In addition, the AUDIX Administration and Data Acquisition Package (ADAP) uses a PC to provide extended storage and analysis capabilities for the traffic data. You can also use the AUDIX Administration Log and Activity Log to monitor usage and investigate possible breakin attempts.

Avaya's Statement of Direction

The telecommunications industry is faced with a significant and growing problem of theft of customer services. To aid in combating these crimes, Avaya intends to strengthen relationships with its customers and its support of law enforcement officials in apprehending and successfully prosecuting those responsible.

No telecommunications system can be entirely free from risk of unauthorized use. However, diligent attention to system management and to security can reduce that risk considerably. Often, a trade-off is required between reduced risk and ease of use and flexibility. Customers who use and administer their systems make this trade-off decision. They know best how to tailor the system to meet their unique needs and are, therefore, in the best position to protect the system from unauthorized use. Because the customer has ultimate control over the configuration and use of Avaya services and products it purchases, the customer properly bears responsibility for fraudulent uses of those services and products.

To help customers use and manage their systems in light of the trade-off decisions they make and to ensure the greatest security possible, Avaya commits to the following:

We are committed to meeting and exceeding our customers' expectations and to providing services and products that are easy to use and are of high value. This fundamental principle drives our renewed assault on the fraudulent use by third parties of our customers' communications services and products.

Avaya Security Offerings

Avaya has developed a variety of offerings to assist in maximizing the security of your system. These offerings include:

For more information about these services, see the BCS Products Security Handbook, 555-025-600.

Avaya Toll Fraud Crisis Intervention

If you suspect you are being victimized by toll fraud or theft of service and need technical support or assistance, call one of the following numbers immediately.
 
Avaya Technical Service Center (TSC)
800 6432353
Avaya Corporate Security
800 821-8235
AUDIX Help Line
800 5628349

 

Note: These services are available 24 hours a day, 365 days a year. Consultation charges can apply.

Avaya Corporate Security

Whether or not immediate support is required, please report all toll fraud incidents perpetrated on Avaya services to Avaya Corporate Security. In addition to recording the incident, Avaya Corporate Security is available for consultation on product issues, investigation support, law enforcement, and education programs.


Avaya Communication
http://www.avaya.com
Avaya UCS Information Development
TOC Index Search