Avaya

Modular Messaging Help

 Getting Started 
 Installation 
 Administration 
 Maintenance 
 Reference 
Home > Administration > System security > Security in the Avaya Message Storage Server

Security in the Avaya Message Storage Server

This section discusses security in Modular Messaging systems with Avaya Messaging Application Server (MAS) or with Avaya Message Storage Server (MSS).

Topics in this section include:

IP security

An IP telephony server is an important asset in an organization. You must take enough care to prevent unauthorized users from accessing these systems. Use firewalls, routers, and passwords correctly to reduce the possibility of fraud.

Firewalls and routing

A firewall is a barrier that keeps potentially harmful elements away from your systems. Company-managed firewalls and routers can help restrict access to administrative services to specific parts of the network or particular IP addresses. Restrict access to firewalls, routers, and switches.

Avaya recommends that the customer talk to their software specialist or their business partner to discuss Modular Messaging local area network (LAN) port usage. Customers must know how to best configure their firewall.

Password protection

Passwords help you to protect your system. Avaya recommends that you use passwords that contain at least six characters. Include a combination of alphanumeric and special characters in your passwords as such passwords are difficult to crack. Never share your passwords with anybody, and change them regularly.

Unauthorized system use

The MSS provides two accounts for customer administration: system administrator (sa) and voice mail administrator (vm). The sa account provides access to all customer-accessible system functions. The vm account provides access to all subscriber-management functions.

You can minimize the risk of unauthorized people accessing your system. For both administration accounts, use the following guidelines:

  • Never reveal your password to others

  • Do not ask others to reveal their password to you
  • Never write down your password
  • Passwords should be at least 6 characters long
  • Use complex passwords, including 3 or 4 of the following: upper case letters, lower case letters, numbers, and special characters
  • Your password should be easy to remember and hard to guess

You can also use the trusted server feature. A trusted server has direct access to the MSS and its functionality. Use the same guidelines of trusted server passwords as for administration passwords.

Trusted server security

This topic discusses trusted servers for Modular Messaging systems with Avaya Message Storage Server (MSS).

A trusted server can be a computer or a software application that has privileged access to the MSS. The server uses its own login and password to access the MSS. The MSS verifies that IP packets come from the administered IP address for the trusted server. An example of a trusted server is the Mailbox Manager (MBM) software.

Securing a system that allows access from another domain involves a two-way approach. Consider security from an external and an internal perspective. External security involves administration to prevent access from an unauthorized source. Internal security focuses on preventing or recovering from damage if a breach occurs. An example of a breach is a virus that is transmitted in a message component, such as an attached software file.

External security

The trusted server can do everything to a user mailbox that an MSS administrator can do. Administer a password that the trusted server application must use to request a connection to the MSS. Additionally, administer a password for the trusted server to prevent unauthorized access to your system from an external source. The trusted server must use the password to connect to the MSS. This password is a secondary layer of security in addition to the required trusted server password. Change the password on a regular basis, and follow the standards for account naming.

Internal security

The MSS allows transmission between domains of message components, including .wav, .tif, and .txt file attachments. The MSS supports access to standard e-mail clients. The main security consideration is the delivery of a virus that is embedded in a file attachment. This can occur in any system that supports the delivery of file attachments. A user can infect client computers when starting the application that is associated with the software file.

MSS does not perform any virus detection. You must carefully evaluate the security risks of file attachments. Provide virus detection software on computers that run an e-mail application and on each MAS. Consult your personal computer and LAN administrators when planning for e-mail. Your administrators are experienced in detecting and preventing transmission of software viruses. Tell your users to detach attachments from files and scan the attachments for viruses before opening the attachments.

Traffic reports

The MSS provides tracking of traffic data over various time spans. You can use the tracing system to gather information about the voice mail system activity. For more information, see VMSC - VMD - Tracing System Dialog Box. Review these reports on a regular basis to check the traffic trends. For more information, see Reporting Tool.

Security measures

Use the following security measures and security tips to reduce possible fraud and security risks:

Blocking calls

You cannot block calls to selected telephone numbers on the MSS. The MSS is a subscriber database and message storage facility. The MAS provides some facility to control outbound calls to telephone numbers. The Voice Mail System Configuration (VMSC) administers the control of outbound calls.

Disabling transfer out of the system

You can disable transferring of calls out of your system. However, if you do not need to transfer calls out, consider eliminating this feature. If your automated attendant system uses transfer to an extension, you cannot use this security measure. Use the Subscriber Options on the MAS to enable this feature.

Message delivery

The Call Me and Find Me features deliver messages to subscriber-designated telephone numbers.

The Call Me feature places telephone calls to subscribers at a designated number whenever the subscriber receives a message that meets certain criteria. The feature invites the subscriber to log in to the telephone user interface (TUI) and review the message. For more information, see VMSC - VMD - Call Me Dialog Box.

The Find Me feature enables your mailbox to redirect unanswered calls to a list of telephone numbers. The system asks callers if they want the system to find the called subscriber. If the caller answers yes, the system asks the caller to speak his or her name and then records the name. The system dials each call in the sequence that the telephone number appears in the subscriber's list. If the subscriber does not answer the call, the system proceeds to the next number. If the subscriber answers the call, the system plays the name of the caller and asks if the subscriber wants to take the call. If the subscriber neither answers the call nor chooses to take the call, the system asks the caller to leave a message. For more information, see VMSC - VMD - Messaging - Offline Access Tab.

Changing your password

Passwords prevent misuse of your system. You can minimize the possibility of fraud and misuse of your system by selecting an unique password. For more information about password administration in MSS, see "Changing the administrator account name and password" in the Installation and Upgrades guide (pdf).

Passwords must be encrypted. Encryption prevents unauthorized users from accessing the logins and passwords. All subscriber passwords that are stored in the Message Core Subscriber database are encrypted reversibly. Passwords that are stored in the MSS database are encrypted reversibly through Triple Data Encryption Standard (3DES).

Top of page