Remote Access Features - AT&T MERLIN LEGEND Release 2.0 Programming Summary Manual

Hide thumbs Also See for MERLIN LEGEND Release 2.0:
Table of Contents

Advertisement

System Features

Remote Access Features

The following Remote Access features are available:
Remote Access
Remote Access
Remote Access
Remote Access
Remote Access
Security of Your System—Preventing Toll Fraud
As a customer of a new telephone system, you should be aware that there
exists an increasing problem of telephone toll fraud. Telephone toll fraud can
occur in many forms, despite the numerous efforts of telephone companies
and telephone equipment manufacturers to control it. Some individuals use
electronic devices to prevent or falsify records of these calls. Others charge
calls to someone else's number by illegally using lost or stolen calling cards,
billing innocent parties, clipping on to someone else's line, and breaking into
someone else's telephone equipment physically or electronically. In certain
instances, unauthorized individuals make connections to the telephone
network through the use of remote access features.
The Remote Access feature of your system, if you choose to use it, permits
off-premises callers to access the system from a remote telephone by using
an 800 number or a 7- or 10-digit telephone number. The system returns an
acknowledgement signaling the user to key in his or her authorization code,
which is selected and administered by the system manager. After the
authorization code is accepted, the system returns dial tone to the user. If
you do not program specific egress restrictions, the user will be able to place
any call normally dialed from a telephone associated with the system. Such
an off-premises network call is originated at, and will be billed from the system
location.
The Remote Access feature, as designed, helps the customer, through proper
administration, to minimize the ability of unauthorized persons to gain access
to the network. Most commonly, phone numbers and codes are
compromised when overheard in a public location, through theft of a wallet or
purse containing access information, or through carelessness (writing codes
on a piece of paper and improperly discarding it). Additionally, hackers may
Trunk Assignment
Automatic Callback
without Barrier Codes
Barrier Codes
with Barrier Codes
Remote Access Features
14-27

Advertisement

Table of Contents
loading

Table of Contents