EasyManuals Logo

Lucent Technologies MERLIN LEGEND Release 6.1 System Programming

Lucent Technologies MERLIN LEGEND Release 6.1
1010 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #680 background imageLoading...
Page #680 background image
MERLIN LEGEND Communications System Release 6.1
System Programming Guide
555-661-111
Issue 1
August 1998
Programming Procedures
Page 3-502Remote Access Features
3
Remote Access Features 3
This section covers the following Remote Access features:
â–  Remote Access over Networked Tandem and Tie Trunks (Release 6.0 and
later systems only)
â–  Remote Access Trunk Assignment
â–  Remote Access Automatic Callback
â–  Remote Access without Barrier Codes
â–  Remote Access Barrier Codes
â–  Remote Access with Barrier Codes
!
SECURITY ALERT:
As a customer of a new communications system, you should be aware that
there exists an increasing problem of telephone toll fraud. Telephone toll
fraud can occur in many forms, despite the numerous efforts of telephone
companies and telephone equipment manufacturers to control it. Some indi-
viduals use electronic devices to prevent or falsify records of these calls.
Others charge calls to someone else’s number by illegally using lost or sto-
len calling cards, billing innocent parties, clipping on to someone else’s line,
and breaking into someone else’s telephone equipment physically or elec-
tronically. In certain instances, unauthorized individuals make connections
to the public switched network through the use of remote access features.
The Remote Access feature of your system, if you choose to use it, permits
off-premises callers to access the system from a remote telephone by using
an 800 number or a 7- or 10-digit telephone number. The system returns an
acknowledgment signaling the user to key in his or her barrier code, which is
selected and programmed by the system manager. After the barrier code is
accepted, the system returns dial tone to the user. If you do not program
specific restrictions, the user will be able to place any call normally dialed
from a telephone associated with the system. Such an off-premises network
call is originated at and will be billed from the system location.
The Remote Access feature helps the customer, through proper administra-
tion, to minimize the ability of unauthorized persons to gain access to the
network. Most commonly, phone numbers and codes are compromised
when overheard in a public location, through theft of a wallet or purse con-
taining access information, or through carelessness (writing codes on a
piece of paper and improperly discarding it). Additionally, hackers may use a
computer to dial an access code and then publish the information to other
hackers. Enormous charges can be run up quickly. It is the customer’s
responsibility to take the appropriate steps to properly implement the fea-
tures, evaluate and program the various restriction levels, protect access
codes, and distribute access codes only to individuals who have been fully
advised of the sensitive nature of the access information.

Table of Contents

Other manuals for Lucent Technologies MERLIN LEGEND Release 6.1

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Lucent Technologies MERLIN LEGEND Release 6.1 and is the answer not in the manual?

Lucent Technologies MERLIN LEGEND Release 6.1 Specifications

General IconGeneral
BrandLucent Technologies
ModelMERLIN LEGEND Release 6.1
CategoryConference System
LanguageEnglish

Related product manuals