Instruction manual
Contents
12 Issue 9 May 2003
Recent Change History report (Communication
Manager, MultiVantage Software, DEFINITY
ECS, and DEFINITY G1 and G3) 5-68
Malicious call trace 5-68
Service observing 5-69
Busy verification 5-70
List call-forwarding command 5-70
6 Small business communications systems 6-1
■ Features for the MERLIN systems 6-2
■ MERLIN II Communications System 6-5
Protecting direct inward system access 6-5
Security tips 6-5
■ MERLIN LEGEND Communications System 6-7
Preventive measures 6-8
Protection via star codes and
allowed/disallowed lists 6-9
Default disallowed list 6-10
Assigning a second dial tone timer 6-10
Setting facility restriction levels 6-10
Security defaults and tips 6-11
Protecting the Remote Access feature 6-12
Security tips 6-12
Protecting remote system programming 6-14
Security tips 6-14
Protecting remote call forwarding 6-15
■ MERLIN LEGEND/MAGIX toll fraud 6-15
Why toll fraud happens 6-15
Tool fraud warning signs 6-15
Tips to prevent toll fraud 6-16
Responsibility 6-17
Programming tools to prevent fraud 6-17
Security of your systems: preventing toll fraud 6-17