Lucent Technologies MERLIN LEGEND System Manager's Manual page 163

Communications system release 5.0
Hide thumbs Also See for MERLIN LEGEND:
Table of Contents

Advertisement

MERLIN LEGEND Communications System Release 5.0
System Manager's Guide 555-650-118
4
Features and Applications
Features
Authorization codes can be used for call control and call accounting
through the Station Message Detail Recording (SMDR) printout. However,
if the user enters both an authorization code and an account code, the
account code takes precedence and is stored in the SMDR record.
For more information about authorization codes, see the Feature Reference .
!
SECURITYlALERT:
Authorization codes are not designed to function as a security measure
against toll fraud. For information on system security, see the next section,
''Security'', and
Appendix A, ''Customer Support
Security
Most security issues are covered in
describes the various ways you can help guard against toll fraud. There are four
additional features you can use to enhance security and make phone use easier
for people in your company:
Barrier Codes. Barrier codes are unique passwords assigned to remote
access users. They are designed to prevent unauthorized individuals from
using the system. As noted above, you can also apply calling restrictions to
barrier codes. Change barrier codes frequently and immediately deactivate
any unused barrier codes. In Release 3.1 and later systems (Hybrid/PBX
only), remote access barrier codes are restricted, by default, from making
outside calls.
NOTE:
Read the Security Alert on
Disabling Trunk-to-Trunk Transfer. In Release 3.1 and later systems,
extensions are, by default, not allowed to make trunk-to-trunk transfers,
that is, to transfer an outside caller to another outside line/trunk. This
enhancement helps secure against toll fraud. To change the trunk-to-trunk
transfer privileges of an extension, see
Star-Code Dialing Pause. In Release 3.1 and later systems, a system
programming feature allows you to help guard against toll fraud when star
codes are dialed under certain circumstances. Star codes, typically dialed
before an outgoing call, provide special services from the CO. For
example, in many areas a telephone user can dial
number to disable central office-supplied caller identification at the
receiving party's telephone (to allow or disallow star codes preceding a
call, see
a second dial tone following the dialed star (*) code, to signal customers
that they must dial additional digits. If this second dial tone is not
immediate, a hacker can enter digits that are not detected by the CO but
are detected by the system's calling restrictions. If your business uses
''Security of Your System: Preventing Toll
''Calling Restrictions'' on page
page 4-62
Chapter 6, ''Managing the
Information''.
4
before using this feature.
Chapter 6, ''Managing the
*67
System''). Some central offices supply
Issue 1
June 1997
Page 4-47
Fraud'', in
4-40, which
System''.
before a telephone

Advertisement

Table of Contents
loading

Table of Contents