Technical information

Administration / Maintenance Access
Issue 7 June 2001
3-5
The following is a list of customer logins for systems in this handbook that provide
login capabilities. For information on password parameters, see the applicable
system chapter. For information on how to change passwords, see Chapter 13.
AUDIX Voice Mail System: cust
AUDIX Voice Power System: audix (or is on the Integrated
Solution-equipped system)
DEFINITY AUDIX System: cust
DEFINITY ECS, DEFINITY G1, G3V1, G3V2, and System 75: cust, rcust,
bcms
1
, browse*, NMS*
Avaya INTUITY System: sa, vm
MERLIN LEGEND Communications System: admin on Integrated Voice
Response platform-supported systems
MERLIN MAIL and MERLIN MAIL-ML Voice Messaging Systems: 1234
PARTNER MAIL and PARTNER MAIL VS Systems: 1234
System 25: systemx5
Choosing Passwords
Follow the guidelines listed below when choosing passwords.
Passwords should be as long as allowed. See the section specific to your
system for maximum password length information.
Passwords should be hard to guess and should not contain:
all the same characters (for example, 1111, xxxx)
sequential characters (for example, 1234, abcd)
character strings that can be associated with you or your business,
such as your name, birthday, business name, phone number, or
social security number
words and commonly-used names. Many of the war dialers used by
hackers are programmed to try all of the names from books listing
potential baby names. In one documented case, the contents of an
entire dictionary were used to try and crack passwords.
Passwords should use as great a variety of characters as possible. For
example, if both numbers and letters are permitted, the password should
contain both.
Passwords should be changed regularly, at least on a quarterly basis.
Recycling old passwords is not recommended.
1. Not available in System 75 R1V1 (bcms is not available in System 75 at all.)