Technical information
Small Business Communications Systems
5-14 Issue 7 June 2001
Protecting Remote System Programming
The Remote System Programming feature allows your system administrator to
use System Programming and Maintenance (SPM) software to make changes to
your MERLIN LEGEND Communications System programming from another
location. The system can be accessed remotely either by dialing into it directly
using Remote Access or by dialing the system operator and asking to be
transferred to the system’s built-in modem. The feature also may be used, at your
request, by Avaya personnel to do troubleshooting or system maintenance.
However, unauthorized persons could disrupt your business by altering your
system programming. In addition, they could activate features (such as Remote
Access) that would permit them to make long distance calls, or they could change
restriction levels to allow long distance calls that would otherwise have been
blocked.
The following security measures assist you in managing the Remote System
Programming feature to help prevent unauthorized use.
Security Tips
The System Programming capability of the MERLIN LEGEND
Communications System is protected by a password. Passwords can be
up to five characters in length and can be alpha or numeric and special
characters. See ‘‘Administration / Maintenance Access’’ on page 3-4 and
‘‘General Security Measures’’ on page 3-8 for secure password guidelines.
If you use Remote Access to do remote system programming on your
MERLIN LEGEND Communications System, follow all of the security tips
listed for protecting the Remote Access feature.
— Even if the Remote Access feature is used only for remote system
programming, it should be protected by a barrier code.
— Do not write the Remote Access telephone number or barrier code
on the MERLIN LEGEND Communications System, the connecting
equipment, or anywhere else in the system room.
Train all employees, especially your system operator, to transfer only
authorized callers to the system’s built-in modem for remote programming.
Hackers have also been known to use “Social Engineering” to gain transfer
to the built-in modem.