896
C
N0008589 3.3
centralized voice mail
You can use the Business Communications Manager auto attendant and voice mail
applications on one Business Communications Manager system within a private MCDN
network to support all the systems connected on the private network. The Business
Communications Manager can also be set up to access voice mail systems attached to
other systems, such as a Meridian 1. If the M1 is supporting the voice mail system, and the
private network is MCDN, the Business Communications Manager systems on the
network can also support the attendant call features from the M1. The Business
Communications Manager also supports centralized voice mail connected to a DSM100/
SL100, or a Succession 1000/1000M.
CHAP
Challenge-Handshake Authentication Protocol (CHAP) is a method of establishing
security on PPP links where the peers must share a plain text identifier. The caller sends a
challenge message to its receiving peer and the receiver responds with a value it calculates
based on the identifier. The first peer then matches the response with its own calculation.
If the values match, the link is established.
CHAP is a more secure procedure for connecting to a system than the Password
Authentication Procedure (PAP).
cipher
Cryptographic algorithms used as part of security authentication between the system and
servers and clients. A cipher suite contains a number of these algorithms:
•
DES: Data Encryption Standard
•
DSA: Digital Signature Algorithm
•
KEA: Key Exchange Algorithm
•
MD5: Message Digest algorithm
•
RC2 and RC4: Rivest encryption ciphers
•
RSA: A public-key algorithm for both encryption and authentication
•
RSA key exchange: A key-exchange algorithm for SSL-based
•
SHA-1: Secure Hash Algorithm
•
SKIPJACK: a classified symmetric-key algorithm
•
Triple-DES: DES applied three times
(Information obtained from Netscape Navigator Corporation; http://developer.netscape.com/docs/manuals/
security/sslin/index.html)
client
A client is a computer system or process that requests a service of another computer
system or process. For example, a workstation requesting the contents of a file from a file
server is a client of the file server.
Summary of Contents for BCM 3.7
Page 4: ...4 Software licensing N0008589 3 3...
Page 32: ...32 Contents N0008589 3 3 W 937 Index 939...
Page 46: ...46 Tables N0008589 3 3...
Page 64: ...64 How to get help N0008589 3 3...
Page 90: ...90 Manually activating Telnet N0008589 3 3...
Page 116: ...116 Delayed system restart N0008589 3 3...
Page 194: ...194 Configuring a data module N0008589 3 3...
Page 276: ...276 Setting line telco features N0008589 3 3...
Page 310: ...310 Using COS passwords N0008589 3 3...
Page 364: ...364 Enhanced 911 E911 configuration N0008589 3 3...
Page 380: ...380 Renumbering DNs N0008589 3 3...
Page 398: ...398 Saving wizard pages on your computer N0008589 3 3...
Page 458: ...458 Voice Mail settings N0008589 3 3...
Page 488: ...488 Setting system telco features N0008589 3 3...
Page 508: ...508 Other programming that affects public networking N0008589 3 3...
Page 522: ...522 PRI networking using Call by Call services N0008589 3 3...
Page 592: ...592 Monitoring Hunt groups N0008589 3 3...
Page 636: ...636 Configuring Double Density N0008589 3 3...
Page 640: ...640 Using the Network Update Wizard N0008589 3 3...
Page 666: ...666 Importing and Exporting DHCP data N0008589 3 3...
Page 722: ...722 Restarting the router N0008589 3 3...
Page 726: ...726 Important Web Cache considerations N0008589 3 3...
Page 748: ...748 Configuring an Interface with NAT N0008589 3 3...
Page 794: ...794 IPSec N0008589 3 3...
Page 818: ...818 Configuring the Policy Agent characteristics N0008589 3 3...
Page 832: ...832 Firewall rules for Business Communications Manager with Dialup interfaces N0008589 3 3...
Page 876: ...876 ISDN Programming N0008589 3 3...
Page 1004: ...1004 Index N0008589 3 3...