Lucent Technologies 555-670-111 Manual Do Utilizador
MERLIN LEGEND Communications System Release 7.0
System Programming
System Programming
555-670-111
Issue 1
April 1999
Programming Procedures
3-518
Remote Access Features
3
implement the features, evaluate and program the various restriction levels,
and protect and distribute access codes only to individuals who have been
fully advised of the sensitive nature of the access information.
and protect and distribute access codes only to individuals who have been
fully advised of the sensitive nature of the access information.
Common carriers are required by law to collect their tariffed charges. While
these charges are fraudulent charges when made by persons with criminal
intent, applicable tariffs state that the customer of record is responsible for
payment of all long-distance or other network charges. Lucent Technologies
cannot be responsible for such charges and will not make any allowance or
give any credit for charges that result from unauthorized access.
these charges are fraudulent charges when made by persons with criminal
intent, applicable tariffs state that the customer of record is responsible for
payment of all long-distance or other network charges. Lucent Technologies
cannot be responsible for such charges and will not make any allowance or
give any credit for charges that result from unauthorized access.
To minimize the risk of unauthorized access to your communications
system, follow these basic rules:
system, follow these basic rules:
■
Use a nonpublished remote access number.
■
Assign barrier codes randomly to users on a need-to-have basis,
keeping a log of ALL authorized users and assigning one code to
one person.
keeping a log of ALL authorized users and assigning one code to
one person.
■
Use random sequence barrier codes, which are less likely to be
broken.
broken.
■
Deactivate all unassigned codes promptly.
■
Ensure that remote access users are aware of their responsibility to
keep the telephone number and any barrier codes secure.
keep the telephone number and any barrier codes secure.
■
When possible, restrict the off-network capability of off-premises
callers using the Calling Restrictions and Disallowed List
capabilities.
callers using the Calling Restrictions and Disallowed List
capabilities.
■
When possible, block out-of-hours calling.
■
Frequently monitor system call detail reports for quicker detection of
any unauthorized or abnormal calling patterns.
any unauthorized or abnormal calling patterns.
■
Limit remote call forward to persons on a need-to-have basis.
■
Always use the longest length password allowed on the system.
■
Passwords should consist of a random, non-repetitive, hard-to-
guess sequence of digits.
guess sequence of digits.