Lucent Technologies 555-670-111 Manual Do Utilizador

Página de 1082
MERLIN LEGEND Communications System Release 7.0
System Programming  
555-670-111  
Issue 1
April 1999
Programming Procedures 
3-518
Remote Access Features 
3
implement the features, evaluate and program the various restriction levels, 
and protect and distribute access codes only to individuals who have been 
fully advised of the sensitive nature of the access information.
Common carriers are required by law to collect their tariffed charges. While 
these charges are fraudulent charges when made by persons with criminal 
intent, applicable tariffs state that the customer of record is responsible for 
payment of all long-distance or other network charges. Lucent Technologies 
cannot be responsible for such charges and will not make any allowance or 
give any credit for charges that result from unauthorized access.
To minimize the risk of unauthorized access to your communications 
system, follow these basic rules:
Use a nonpublished remote access number.
Assign barrier codes randomly to users on a need-to-have basis, 
keeping a log of ALL authorized users and assigning one code to 
one person.
Use random sequence barrier codes, which are less likely to be 
broken.
Deactivate all unassigned codes promptly.
Ensure that remote access users are aware of their responsibility to 
keep the telephone number and any barrier codes secure.
When possible, restrict the off-network capability of off-premises 
callers using the Calling Restrictions and Disallowed List 
capabilities.
When possible, block out-of-hours calling.
Frequently monitor system call detail reports for quicker detection of 
any unauthorized or abnormal calling patterns.
Limit remote call forward to persons on a need-to-have basis.
Always use the longest length password allowed on the system.
Passwords should consist of a random, non-repetitive, hard-to-
guess sequence of digits.