Mailboxes; Security - Lucent Technologies PARTNER Voice Messaging PC Card Release 2 Installation And Programming

Table of Contents

Advertisement

Security

Mailboxes

The PARTNER Voice Messaging PC Card provides a maximum of four mailboxes
(01 through 04), which are assigned to extensions 10 through 13 respectively by
default. The System Manager can assign these mailboxes to other extensions.
The System Manager's mailbox is 0.
When a caller leaves a message, the voice messaging system places the
message in the mailbox and turns on the message light (if available) at the
subscriber's phone.
NOTE:
It is recommended that mailbox subscribers use system telephones with
message lights.
Subscribers can retrieve these messages at their convenience from any
touch-tone phone either while on-site or from an off-site location. The system
informs subscribers of the number of new and old (saved) messages in their
mailboxes, and plays new messages first.
Security
The System Manager is responsible for the security of the system. As the System
Manager, it is important that you fully understand and appropriately administer
this product to reduce your risk of incurring charges that result from unauthorized
use of the system. Under the law, your company is responsible for paying for part
or all of those unauthorized calls.
Be aware that criminals called hackers may attempt to gain unauthorized access
to your communications system and your voice messaging system. Hackers
often try to trick a company's employees into providing them with access to an
outside line or an outside operator. They may also concentrate their activities in
two areas related to the voice messaging system:
They try to dial into a mailbox, then execute a transfer by dialing *8.
Then they dial an access code, followed by a digit string to either direct
dial or access a network operator to complete the call.
They try to locate unused or unprotected mailboxes and use them as
drop-off points for their own messages.
Issue 1 August 1998
1-5

Advertisement

Table of Contents
loading

Table of Contents