Instruction manual
Small business communications systems
6-14 Issue 9 May 2003
Protecting remote system programming
The Remote System Programming feature allows your system administrator to 
use system programming and maintenance (SPM) software to make changes to 
your MERLIN LEGEND Communications System programming from another 
location. The system can be accessed remotely either by dialing into it directly 
using remote access or by dialing the system operator and asking to be 
transferred to the system’s built-in modem. The feature also may be used, at your 
request, by Avaya personnel to do troubleshooting or system maintenance.
However, unauthorized persons could disrupt your business by altering your 
system programming. In addition, they could activate features (such as Remote 
Access) that would permit them to make long distance calls, or they could change 
restriction levels to allow long distance calls that would otherwise have been 
blocked.
The following security measures assist you in managing the Remote System 
Programming feature to help prevent unauthorized use.
Security tips
■ The system programming capability of the MERLIN LEGEND 
Communications System is protected by a password. Passwords can be 
up to five characters in length and can be alpha or numeric and special 
characters. See ‘‘Administration / maintenance access’’ on page 4-4
 and 
‘‘General security measures’’ on page 4-8
 for secure password guidelines.
■ If you use the Remote Access feature to do remote system programming 
on your MERLIN LEGEND Communications System, follow all of the 
security tips listed for protecting the Remote Access feature.
— Even if the Remote Access feature is used only for remote system 
programming, it should be protected by a barrier code.
— Do not write the remote access telephone number or barrier code on 
the MERLIN LEGEND Communications System, the connecting 
equipment, or anywhere else in the system room.
■ Train all employees, especially your system operator, to transfer only 
authorized callers to the system’s built-in modem for remote programming. 
Hackers have also been known to use “social engineering” to gain transfer 
to the built-in modem.










