MERLIN LEGEND Communications System Release 5.0
System Manager’s Guide
555-650-118
Issue 1
June 1997
Features and Applications
Page 4-63Applications
4
are overheard in a public location, lost through theft of a wallet or purse
containing access information or through carelessness (writing codes on a
piece of paper and improperly discarding them). Additionally, hackers may
use a computer to dial a password and then publish the information to other
hackers. Substantial charges can accumulate quickly. It is your
responsibility to take appropriate steps to implement the features properly,
evaluate and program the various restriction levels, protect and carefully
distribute access codes.
Under applicable tariffs, you will be responsible for payment of toll charges.
Lucent Technologies cannot be responsible for such charges and will not
make any allowance or give any credit resulting from unauthorized access.
To reduce the risk of unauthorized access through your Voice Messaging
System, please observe the following procedures:
■
Employees who have voice mailboxes should be required to use the
passwords to protect their mailboxes.
— Have them use random sequence passwords.
— Impress upon them the importance of keeping their passwords a
secret.
— Encourage them to change their passwords regularly.
■
The administrator should remove any unneeded voice mailboxes
from the system immediately.
■
Lucent Technologies Voice Messaging Systems have the ability to
limit transfers to subscribers only. You are strongly urged to limit
transfers in this manner.
■
Use the system programming capability to do the following:
— Block direct access to outgoing lines and force the use of account
codes/barrier codes.
— Disallow trunk-to-trunk transfer unless required (in Release 3.1
and later systems, trunk-to-transfer is disallowed by default and
can be permitted only through system programming).
— Assign toll restriction levels to all voice messaging ports. In
Release 3.1 and later systems, voice messaging ports are
automatically outward-restricted, assigned an FRL of 0
(Hybrid/PBX mode only), and assigned a Disallowed List that
restricts calls to many numbers often dialed by toll-fraud abusers.
— If you do not need to use the outcalling feature, completely
restrict the outward calling capability of the voice messaging
ports (the default in Release 3.1 and later systems). For AUDIX
Voice Power and MERLIN MAIL, use the “transfer to subscribers
only” feature to restrict outside calls.
■
Monitor SMDR reports or Call Accounting System reports for
outgoing calls that might be originated by voice messaging ports.