Avaya

Modular Messaging Help

 Getting Started 
 Administration 
 Maintenance 
 Reference 
Home > Getting started > Modular Messaging and Security > Adjuncts

Adjuncts

Access Security Gateway (ASG)

Access Security Gateway (ASG) is an optional authentication interface you can use to secure the voice mail, system administration and craft logins on the Avaya Message Storage Server (MSS). Whenever a dial-up port user begins a session on the system for purposes of administration or maintenance, the user must enter a valid login ID. If the ASG interface is activated, the system issues a numerical challenge. In order for the user to access the administration and maintenance features, the user must enter the correct numerical response. By activating the ASG feature, you can reduce the possibility of unauthorized remote access to the system.

You administer ASG parameters to specify whether access to the system requires ASG authentication. You can assign this protection to all system administration maintenance ports or to a subset of those ports. If the port or login being used is not protected by ASG, the user can enter the system with the standard login and password.

The following procedure describes how the ASG interface works:

  1. At the beginning of a login session, the user is prompted to enter a login ID.

  2. Upon receipt of the login ID, ASG generates a number based upon the system ASG secret key number and presents this 7-digit number as a challenge.

  3. The user must have a hand-held device, called the ASG Key. The ASG Key must be set with an ASG secret key number that matches that of the user's ASG secret key number in the Modular Messaging system.

  4. The user enters the PIN and challenge number into the ASG Key.

  5. The ASG Key generates and displays a unique, 7-digit numerical response that corresponds to the challenge number.

  6. The user enters the response number at the prompt.

  7. If the response supplied by the user corresponds to the numerical response expected by the Modular Messaging system, the authentication is successful and the user is logged in to the system.

If the response does not correspond, the user is not authenticated and is denied access to the system. Also, the failed authentication attempt is recorded in the system history log.

 

Note: The system administrator determines how many login attempts are permitted. If the user is not authenticated after that number of attempts, the system displays the message INVALID LOGIN and terminates the session.

For more information on administering ASG on Modular Messaging, see Access Security Gateway (ASG).

For more information about ASG and Avaya Modular Messaging security, see ASG Key User Guide, 585-212-012.

Mailbox Manager

Mailbox Manager (MBM) for Avaya Modular Messaging is a Windows interface for doing moves, adds, and changes on the Message Storage Server (MSS) of Modular Messaging system. With this software tool, administrators can create, edit, and delete subscribers and edit class of service (COS) profiles. You can also use MBM to configure subscriber management. MBM extracts information from the MSS and maintains an offline database on your desktop. You can make the desired changes to the subscribers and classes of service, and MBM sends it to the MSS.

Mailbox Manager is typically installed on a desktop or laptop PC used by the system administrator. It can be installed on their current workstation, providing it meets minimum requirements as described in the Mailbox Manager User Guide, and has a static IP address needed for the Trusted Server connection. However, if the corporate network has a dynamic host configuration protocol (DHCP) environment, Mailbox Manager must be installed on the Message Application Server (MAS).

Mailbox Manager connects via a network through a trusted server connection on the MSS. MBM uses the mbmserver trusted server profile on the MSS. The mbmserver profile consists of the IP address of the computer on which you have set up MBM and a password. Make sure that passwords are at least eight characters long and not composed of easily guessed words or numeric combinations. You must use alphanumeric character combinations for the trusted server passwords. Note that on changing the password for the mbmserver profile on the MSS, you have to run the Connection Setup wizard to establish connection between the MBM computer and the MSS. See the Mailbox Manager User Guide for more information.

There are two types of logins that allow you to control access to the MBM, System Technician and System Administrator. The System Technician log in is reserved for technical support people. The System Administrator is the primary login and does not have a default password for it. You can create additional users and set up permissions for each user. It is advisable that all logins to MBM should be password protected. It is important that you do not leave any desktop or laptop machine that has MBM installed unattended, even for a little while. Make sure that you lock your computer every time you are not working on it. This will prevent any unauthorized access to MBM. It is also advisable to change the passwords on a regular basis as unauthorized people may obtain documentation copies of your system and adjuncts and circulate the administrative passwords to gain entry into your systems.

Top of page