Lucent Technologies 6.0 Telephone User Manual


  Open as PDF
of 1114
 
MERLIN LEGEND Communications System Release 6.0
System Programming
555-660-111
Issue 1
February 1998
Common Administrative Procedures
Page 4-338Remote Access Features
4
levels, protect access codes, and distribute access codes only to individuals
who have been fully advised of the sensitive nature of the access
information.
Common carriers are required by law to collect their tariffed charges. While
these charges are fraudulent charges made by persons with criminal intent,
applicable tariffs state that the customer of record is responsible for
payment of all long-distance or other network charges. Lucent Technologies
cannot be responsible for such charges and will not make any allowance or
give any credit for charges that result from unauthorized access.
To minimize the risk of unauthorized access to your communications system
follow these basic rules:
Use a nonpublished remote access number.
Assign barrier codes randomly to users on a need-to-have basis,
keeping a log of ALL authorized users and assigning one code to
one person.
Use random sequence barrier codes, which are less likely to be
broken.
Deactivate all unassigned codes promptly.
Ensure that remote access users are aware of their responsibility to
keep the telephone number and any barrier codes secure.
When possible, restrict the off-network capability of off-premises
callers using the Calling Restrictions and Disallowed List
capabilities.
When possible, block out-of-hours calling.
Frequently monitor system call detail reports for quicker detection of
any unauthorized or abnormal calling patterns.
Limit remote call forward to persons on a need-to-have basis.
Always use the longest length password allowed on the system.
Passwords should consist of a random, non-repetitive, hard-to-
guess sequence of digits.