Lucent Technologies MERLIN LEGEND Release 6.1 System Manager's Manual page 188

Release 6.1
Hide thumbs Also See for MERLIN LEGEND Release 6.1:
Table of Contents

Advertisement

MERLIN LEGEND Communications System Release 6.1
System Manager's Guide 555-661-118
4
Features and Applications
Features
!
SECURITYlALERT:
Authorization codes are not designed to function as a security measure
against toll fraud. For information on system security, see the next section,
"Security," and "Security of Your System: Preventing Toll Fraud," in
Appendix A, "Customer Support Information."
Security
Most security issues are covered in
describes the various ways you can help guard against toll fraud. There are four
additional features you can use to enhance security and make phone use easier
for people in your company:
Barrier Codes. Barrier codes are unique passwords assigned to remote
access users. They are designed to prevent unauthorized individuals from
using the system. As noted above, you can also apply calling restrictions to
barrier codes. Change barrier codes frequently and immediately deactivate
any unused barrier codes. In Release 3.1 and later systems (Hybrid/PBX
only), remote access barrier codes are restricted, by default, from making
outside calls.
Disabling Trunk-to-Trunk Transfer. In Release 3.1 and later systems,
extensions are, by default, not allowed to make trunk-to-trunk transfers,
that is, to transfer an outside caller to another outside line/trunk. This
enhancement helps secure against toll fraud. To change the trunk-to-trunk
transfer privileges of an extension, see Chapter 6, "Managing the System."
Star-Code Dialing Pause. In Release 3.1 and later systems, a system
programming feature allows you to help guard against toll fraud when star
codes are dialed under certain circumstances. Star codes, typically dialed
before an outgoing call, provide special services from the CO. For
example, in many areas a telephone user can dial
number to disable central office-supplied caller identification at the
receiving party's telephone (to allow or disallow star codes preceding a
call, see Chapter 6, "Managing the System"). Some central offices supply a
second dial tone following the dialed star (*) code, to signal customers that
they must dial additional digits. If this second dial tone is not immediate, a
hacker can enter digits that are not detected by the CO but are detected by
the system's calling restrictions. If your business uses central office star
codes and the CO issues a second dial tone after a pause, see System
Programming for information about including a timed delay that causes the
system to prevent the call when digits are entered during the pause.
NOTE:
Read the Security Alert on
4
"Calling Restrictions" on page
page 4–67
before using this feature.
Issue 1
August 1998
Page 4-51
4–43, which
before a telephone

Advertisement

Table of Contents
loading

This manual is also suitable for:

Merlin legend

Table of Contents