System information
Subscriber Password Guidelines
Issue 1 October 1997
xxv
Block Subscriber Use of Trunk Access Codes
Station-to-Trunk Restrictions can be assigned to disallow stations from dialing
specific outside trunks. By implementing these restrictions, callers cannot
transfer out of voice mail to an outside facility using Trunk Access Codes.
For G2 and System 85, if TACs are necessary for certain users to allow direct dial
access to specific facilities, such as tie trunks, use the Miscellaneous Trunk
Restriction feature to deny access to
others. For those stations and all trunk-originated calls, always use
ARS/AAR/WCR for outside calling.
NOTE:
Allowing TAC access to tie trunks on your switch may give the caller access
to the Trunk Verification feature on the next switch.
Restrict AMIS Networking Number Ranges
To increase security for AMIS analog networking, including the Message Delivery
service, restrict the number ranges that may be used to address messages. Be
sure to assign all the appropriate PBX outgoing call restrictions on the AUDIX
voice ports.
Subscriber Password Guidelines
To minimize the risk of unauthorized people accessing AUDIX subscriber
mailboxes and using them for toll fraud, educate subscribers in the following
guidelines for AUDIX passwords.
■ When password protection into voice mailboxes is offered, require the
maximum number of digits allowed, or a minimum of five digits. Also, be
sure that the password length is at least one digit longer than the
extension length.
■ Make sure subscribers change the default password the first time they log
in to the AUDIX system. To insure this, make the default password fewer
digits than the minimum password length.
■ Establish your password as soon as your AUDIX extension is assigned.
This ensures that only YOU will have access to your mailbox, not anyone
who enters your extension number and #. (The use of only the “#”
indicates the lack of a password. This fact is well-known by telephone
hackers.)
■ Never have your greeting state that you will accept third party billed calls.
A greeting like this allows unauthorized individuals to charge calls to your
company. If you call someone at your company and get a greeting like
this, point out the vulnerability to the person and recommend that they
change the greeting immediately.