Справочник Пользователя для Lucent Technologies 555-670-111
MERLIN LEGEND Communications System Release 7.0
System Programming
System Programming
555-670-111
Issue 1
April 1999
About This Guide
lxiv
Security
Product Safety Advisories
0
Throughout these documents, hazardous situations are indicated by an
exclamation point inside a triangle and the word
exclamation point inside a triangle and the word
CAUTION or WARNING.
!
WARNING:
Warning indicates the presence of a hazard that could cause death or
severe personal injury if the hazard is not avoided.
severe personal injury if the hazard is not avoided.
!
CAUTION:
Caution indicates the presence of a hazard that could cause minor personal
injury or property damage if the hazard is not avoided.
injury or property damage if the hazard is not avoided.
Security
0
Certain features of the system can be protected by passwords to prevent
unauthorized users from abusing the system. You should assign passwords
wherever possible and limit distribution of such passwords to three or fewer
people.
unauthorized users from abusing the system. You should assign passwords
wherever possible and limit distribution of such passwords to three or fewer
people.
Nondisplaying authorization codes and telephone numbers provide another layer
of security. For more information, see
of security. For more information, see
Throughout this guide, toll fraud security hazards are indicated by an exclamation
point inside a triangle and the words
point inside a triangle and the words
SECURITY ALERT.
!
SECURITY ALERT:
Security Alert indicates the presence of a toll fraud security hazard. Toll
fraud is the unauthorized use of your telecommunications system, or use by
an unauthorized party (e.g., persons other than your company’s employees,
agents, subcontractors, or persons working on your company’s behalf). Be
sure to read “Your Responsibility for Your System’s Security” on the inside
front cover of this guide and
fraud is the unauthorized use of your telecommunications system, or use by
an unauthorized party (e.g., persons other than your company’s employees,
agents, subcontractors, or persons working on your company’s behalf). Be
sure to read “Your Responsibility for Your System’s Security” on the inside
front cover of this guide and
.”