Lucent Technologies 5 用户手册

下载
页码 429
MERLIN LEGEND Communications System Release 5.0
System Manager’s Guide  
555-650-118  
Issue 1
June 1997
Features and Applications 
Page 4-63
Applications 
4
are overheard in a public location, lost through theft of a wallet or purse 
containing access information or through carelessness (writing codes on a 
piece of paper and improperly discarding them). Additionally, hackers may 
use a computer to dial a password and then publish the information to other 
hackers. Substantial charges can accumulate quickly. It is your 
responsibility to take appropriate steps to implement the features properly, 
evaluate and program the various restriction levels, protect and carefully 
distribute access codes.
Under applicable tariffs, you will be responsible for payment of toll charges. 
Lucent Technologies cannot be responsible for such charges and will not 
make any allowance or give any credit resulting from unauthorized access. 
To reduce the risk of unauthorized access through your Voice Messaging 
System, please observe the following procedures:
Employees who have voice mailboxes should be required to use the 
passwords to protect their mailboxes.
— Have them use random sequence passwords.
— Impress upon them the importance of keeping their passwords a 
secret.
— Encourage them to change their passwords regularly.
The administrator should remove any unneeded voice mailboxes 
from the system immediately.
Lucent Technologies Voice Messaging Systems have the ability to 
limit transfers to subscribers only. You are strongly urged to limit 
transfers in this manner.
Use the system programming capability to do the following:
— Block direct access to outgoing lines and force the use of account 
codes/barrier codes.
— Disallow trunk-to-trunk transfer unless required (in Release 3.1 
and later systems, trunk-to-transfer is disallowed by default and 
can be permitted only through system programming). 
— Assign toll restriction levels to all voice messaging ports. In 
Release 3.1 and later systems, voice messaging ports are 
automatically outward-restricted, assigned an FRL of 0 
(Hybrid/PBX mode only), and assigned a Disallowed List that 
restricts calls to many numbers often dialed by toll-fraud abusers.
— If you do not need to use the outcalling feature, completely 
restrict the outward calling capability of the voice messaging 
ports (the default in Release 3.1 and later systems). For AUDIX 
Voice Power and MERLIN MAIL, use the “transfer to subscribers 
only” feature to restrict outside calls.
Monitor SMDR reports or Call Accounting System reports for 
outgoing calls that might be originated by voice messaging ports.