Technical information
Contents
Issue 7 June 2001 xi
Protecting the MERLIN MAIL, MERLIN
MAIL-ML, MERLIN MAIL R3, and MERLIN
LEGEND Mail Voice Messaging Systems 6-44
Protecting Automated Attendant 6-44
Protecting Passwords 6-45
Security Tips 6-45
Additional MERLIN MAIL R3 and MERLIN LEGEND
Mail Voice Messaging System Security Features 6-48
Messaging 2000 Voice Mail System 6-49
Maintaining Message 2000 System Security 6-49
Security Recommendations for Remote Access 6-54
PARTNER II Communications System 6-54
Protecting the PARTNER MAIL and PARTNER
MAIL VS Systems 6-54
Protecting Passwords 6-55
Security Tips 6-55
PARTNER Plus Communications System 6-56
Protecting the PARTNER MAIL and PARTNER
MAIL VS Systems 6-57
Protecting Passwords 6-57
Security Tips 6-57
System 25 6-59
Protecting the AUDIX Voice Power System 6-59
Protecting Passwords 6-60
Security Tips 6-60
Security Measures 6-61
7 Automated Attendant 7-1
DEFINITY ECS, DEFINITY
Communications Systems, System 75,
and System 85 7-1
Security Tips 7-1
Tools that Prevent Unauthorized Calls 7-2
Facility Restriction Levels 7-2
Station-to-Trunk Restrictions 7-3
Class of Restriction (System 75, DEFINITY G1,
and G3, and DEFINITY ECS only) 7-3