Lucent Technologies 6.1 manual Remote Access, SecurityAlert

Models: 6.1

1 588
Download 588 pages 27.3 Kb
Page 112
Image 112

MERLIN LEGENDCommunications System Release 6.1

Issue 1

System Planning 555-661-112

August 1998

3 Lines/Trunks

 

 

Selecting Line/Trunk Options

Page 3-18

 

 

 

 

Remote Access

3

 

 

 

!SecurityAlert:

The Remote Access feature of your system, if you choose to use it, permits off-premises callers to access the system from a remote telephone by using an 800 number or a 7- or 10-digit telephone number. The system returns an acknowledgment signaling the user to enter his or her barrier code, which is selected and programmed by the system manager. After the barrier code is accepted, the system returns dial tone to the user. If you do not program specific egress restrictions, the user will be able to place any call normally dialed from a telephone associated with the system. Such an off-premises network call is originated at, and will be billed from, the system location.

The Remote Access feature, as designed, helps the customer, through proper programming, to minimize the ability of unauthorized persons to gain access to the network. Most commonly, phone numbers and codes are compromised when overheard in a public location, through theft of a wallet or purse containing access information, or through carelessness (writing codes on a piece of paper and improperly discarding it). Additionally, hackers may use a computer to dial an access code and then publish the information to other hackers.

(See Appendix A, “Customer Support Information,” for more information about security.)

Use these instructions only if remote users need access to the system. Systems that are part of a private network need to use these instructions to modify Remote Access so that users can access remote trunks. Otherwise, skip to the next section, “DS1 Connectivity (100D Module).”

The Remote Access feature allows people to use the system from a remote location. It also allows remote system programming and maintenance by a qualified technician.

You can assign remote access to any incoming line/trunk connected to the system except T1 Switched 56 data facilities, DID and dial-in tie trunks, and private network tandem trunks. (For DID, the routing digits supplied by the central office must match the remote access code.)

This section contains instructions for:

Renumbering the remote access code from the factory setting

Allowing access to the Automatic Callback feature

Designating trunks for remote access

Specifying shared or dedicated access

Assigning barrier codes and class-of-restriction for security

Allowing access to private network tandem trunks

Page 112
Image 112
Lucent Technologies 6.1 manual Remote Access, SecurityAlert