Lucent Technologies MERLIN LEGEND Release 6.1 Feature Reference page 585

Release 6.1
Hide thumbs Also See for MERLIN LEGEND Release 6.1:
Table of Contents

Advertisement

MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
Features
Programming
applicable tariffs state that the customer of record is responsible for
payment of all long-distance or other network charges. Lucent Technologies
cannot be responsible for such charges and will not make any allowance or
give any credit for charges that result from unauthorized access.
To minimize the risk of unauthorized access to your communications
system:
Description
The system provides three types of programming:
System programming
Centralized telephone programming
Extension programming
The tables in Appendix C provide complete lists of system operator and extension
features, their programming codes, and the telephones on which the features can
be programmed. The tables also show which features can be assigned only
through centralized telephone programming.
System Programming
Initial system programming is performed when the system is planned and
installed. The system can be reprogrammed as needs change.
Like centralized telephone programming, you can program the system either from
the system programming console or by using SPM software.
Use an unpublished remote access number.
Assign barrier codes randomly to users on a need-to-have basis,
keeping a log of ALL authorized users and assigning one code to
one person.
Use random-sequence barrier codes, which are less likely to be
easily broken.
Deactivate all unassigned codes promptly.
Ensure that remote access users are aware of their responsibility to
keep the telephone number and any barrier codes secure.
When possible, restrict the off-network capability of off-premises
callers through use of calling restrictions and Disallowed List
capabilities.
When possible, block out-of-hours calling.
Frequently monitor system call detail reports for quicker detection of
any unauthorized or abnormal calling patterns.
Limit Remote Call Forwarding to persons on a need-to-have basis.
3 7
3 7
Issue 1
August 1998
Page 536

Advertisement

Table of Contents
loading

This manual is also suitable for:

Merlin legend

Table of Contents