EasyManuals Logo

Lucent Technologies MERLIN LEGEND Release 6.1 User Manual

Lucent Technologies MERLIN LEGEND Release 6.1
1021 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #628 background imageLoading...
Page #628 background image
MERLIN LEGEND Communications System Release 6.1
Feature Reference
555-661-110
Issue 1
August 1998
Features
Page 579Remote Access
At a Glance - Continued
SECURITYlALERT:
!
Security of Your System. As a customer of a new communications
system, you should be aware that there exists an increasing problem of
telephone toll fraud. Telephone toll fraud can occur in many forms, despite
the numerous efforts of telephone companies and telephone equipment
manufacturers to control it. Some individuals use electronic devices to
prevent or falsify records of these calls. Others charge calls to someone
else’s number by illegally using lost or stolen calling cards, billing innocent
parties, clipping on to someone else’s line, and breaking into someone
else’s telephone equipment physically or electronically. In certain instances,
unauthorized individuals make connections to the telephone network
through the use of remote access features.
The Remote Access feature of your system, if you choose to use it, permits
off-premises callers to access the system from a remote telephone by using
an 800 number or a 7- or 10-digit telephone number. The system returns an
acknowledgment signaling the user to key in his or her barrier code, which
is selected and programmed by the system manager. After the barrier code
is accepted, the system returns dial tone to the user. If restrictions are not in
place, the user can place any call normally dialed from a telephone within
the system. Such an off-premises network call is originated at, and will be
billed from, the system location.
The Remote Access feature, as designed, helps the customer, through
proper programming, to minimize the ability of unauthorized persons to gain
access to the network. Most commonly, telephone numbers and codes are
compromised when overheard in a public location, through theft of a wallet
or purse containing access information, or through carelessness (writing
codes on a piece of paper and improperly discarding it). Additionally,
hackers may use a computer to dial an access code and then publish the
information to other hackers. Enormous charges can be run up quickly. It is
the customer’s responsibility to take the appropriate steps to properly
implement the features, evaluate and program the various restriction levels,
protect access codes, and distribute access codes only to individuals who
have been fully advised of the sensitive nature of the access information.
Factory Settings
continued
Restriction for Barrier
Codes or Lines/Trunks
Maintenance/Programming
Barrier Code
Redirect Destination for
Calls to Unassigned
Numbers
Remote Access Code
Outward-Restricted
In Release 3.0 and later systems, there is no default barrier
code. In Release 2.1 and earlier systems, the default barrier
code is 16.
Primary Operator
889

Table of Contents

Other manuals for Lucent Technologies MERLIN LEGEND Release 6.1

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Lucent Technologies MERLIN LEGEND Release 6.1 and is the answer not in the manual?

Lucent Technologies MERLIN LEGEND Release 6.1 Specifications

General IconGeneral
BrandLucent Technologies
ModelMERLIN LEGEND Release 6.1
CategoryConference System
LanguageEnglish

Related product manuals