Instruction manual
Features and Services
If a Remote Access call reaches an inside station, the station can transfer the call back out of the
system, subject to System 25 trunk-to-trunk restrictions and the transferring station’s calling
restrictions. This is allowed even if the caller’s barrier code does not allow a direct call out.
Considerations
Using Remote Access, an employee of a company with a System 25 PBX can access system
facilities from home or other remote locations. This is a valuable feature for salesmen on the road
and people at small branch offices.
Stations receiving Remote Access calls can treat them like any other kind of incoming call and use
features such as Pickup and Forwarding.
Features requiring recall dial tone (for example, Park and Transfer) cannot be used by Remote
Access callers.
Security Considerations
Potential Abuse of the Feature
Unauthorized persons might learn the Remote Access telephone number, call into the System 25,
and make long-distance calls.
Techniques for Minimizing Abuse
1. Program Remote Access to require the caller to enter a password (called a barrier code)
before the System will allow access. Follow secure password procedures as described below:
Choosing Passwords
Passwords should be as many digits as possible and should not be obvious. Avoid those with
ascending digits (e.g.,
1234), the same digits (e.g.,
0000), digits corresponding to the
employee’s name (e.g., 5646 for John), the current year (e.g., 1993), the same number as
extension (e.g., extension 3455, password 3455), reverse extension (e.g., extension 3455,
password 5543), numbers that identify the user (e.g., social security, employee ID, room
number, etc.)
Establishing a Policy
As a safeguard against toll fraud, change passwords frequently. Set password expiration times
and tell users when the changes go into effect. Changing passwords routinely on a specific
date (such as the first of the month) helps users to remember to do so.
2. Block out-of-hours calling through Remote Access whenever possible.
3. Use the toll-restriction capabilities of your System 25 to restrict the long-distance calling ability
of Remote Access users as much as possible consistent with the needs of your business.
4. Protect your Remote Access telephone number. Only give it to people who need to know it,
and impress upon them the need to keep it secret.
5. Monitor your SMDR records and/or your Call Accounting System reports regularly for signs of
irregular calls.
2-274
November 1995