Voice Messaging Systems - Lucent Technologies MERLIN LEGEND Release 5.0 Feature Reference

Communications system
Hide thumbs Also See for MERLIN LEGEND Release 5.0:
Table of Contents

Advertisement

MERLIN LEGEND Communications System Release 5.0
Feature Reference 555-650-110
I
Applications

Voice Messaging Systems

Platform Requirements
To use PassageWay Direct Connection Solution on the system, you must have
the following components:
A Lucent Technologies-approved personal computer (PC) with a 286, 386,
or more powerful microprocessor and:
Microsoft Windows, version 3.1 or later
MLX-16DP, MLX-28D, MLX-20L, or MLX-10DP telephone connected to the
system
PassageWay Direct Connection Solution software
PassageWay Direct Connection Solution adapter
9-pin to 25-pin adapter
4-foot, 4-pair keyed modular phone cord (D8AC)
Additional MERLIN LEGEND Communications System requirements are:
MLX telephones must be wired with 3- or 4-pair extension wiring; otherwise
local telephone power is required.
If you use a console and DSS, local telephone power is required.
Voice Messaging Systems
IMPORTANT:
This section is intended solely as an overview of the applications. For
comprehensive information about the use of the applications, see the
documentation for the products.
!
SECURITYlALERT:
Your voice messaging system permits callers to leave verbal messages for
system users or gain access to the backup position in an emergency as well
as create and distribute voice messages among system users.
The voice messaging system, through proper programming, can help you
reduce the risk of unauthorized persons gaining access to the network.
However, phone numbers and authorization codes can be compromised
when overheard in a public location or are lost either through theft of a
wallet or purse containing access information or through carelessness
(writing codes on a piece of paper and improperly discarding them).
Additionally, hackers may use a computer to dial an access code and then
publish the information to other hackers. Substantial charges can
accumulate quickly. It is your responsibility to take appropriate steps to
implement the features properly, evaluate and program the various
restriction levels, protect and carefully distribute access codes.
9
9
Issue 1
June 1997
Page I-7

Advertisement

Table of Contents
loading

Table of Contents