Technical information
Small Business Communications Systems
5-12 Issue 7 June 2001
Protecting Remote Access
The Remote Access feature allows users to call into the MERLIN LEGEND
Communications System from a remote location (for example, a satellite office, or
while traveling) and use the system to make calls. However, unauthorized
persons might learn the Remote Access telephone number and password, call
into the system, and make long distance calls.
For MERLIN LEGEND R3.1 and later systems, system passwords, called barrier
codes, are by default restricted from making outside calls. In MERLIN LEGEND
releases prior to Release 3.0, if you do not program specific outward calling
restrictions, the user is able to place any call normally dialed from a telephone
associated with the system. Such an off-premises network call is originated at,
and will be billed from, the system location.
The MERLIN LEGEND Communications System has 16 barrier codes for use with
Remote Access. For systems prior to MERLIN LEGEND R3, barrier codes have a
5-digit maximum; for R3 systems and later, barrier codes have an 11-digit
maximum. For greater security, always use the maximum available digits when
assigning barrier codes.
Beginning with MERLIN LEGEND R3.0, the following rules on barrier codes have
been included in order to prevent telephone toll fraud:
— The Remote Access default requires a barrier code
— The barrier code is a flexible-length code ranging from 4 to 11 digits
(with a default of 7) and includes the * character. The length is set
system-wide.
— The user is given three attempts to enter the correct barrier code
The following security measures assist you in managing the Remote Access
feature to help prevent unauthorized use.
Security Tips
Evaluate the necessity for Remote Access. If this feature is not vital to your
organization, consider not using it or limiting its use.
To turn off Remote Access, do the following:
1. On the System Administration screen, select Lines and Trunks and
then select Remote Access.
2. Choose Disable Remote Access.
If you need the feature, use as many of the security measures presented in
this section as you can.