Instruction manual
Small business communications systems
6-18 Issue 9 May 2003
The Remote Access features of your system, if you choose to use them, permit 
off-premises callers to access the system from a remote telephone by using a 
telephone number with or without a barrier code. The system returns an 
acknowledgment, signaling the user to key in his or her barrier code, which is 
selected and administered by the system manager. After the barrier code is 
accepted, the system returns dial tone to the user. Barrier codes are, by default, 
restricted from making outside calls. If no specific outward calling restrictions are 
programmed, the user is able to place any call normally dialed from a telephone 
associated with the system. Such an off-premises network call is originated at, 
and will be billed from, the system location.
The Remote Access feature, as designed, helps the customer, through proper 
administration, to minimize the ability of unauthorized persons to gain access to 
the network. Most commonly, telephone numbers and codes are compromised 
when overheard in a public location, through theft of a wallet or purse containing 
access information, or through carelessness (for example, writing codes on a 
piece of paper and improperly discarding it). Additionally, hackers may use a 
computer to dial an access code and then publish the information to other 
hackers. Enormous charges can be run up quickly. It is the customer’s 
responsibility to take the appropriate steps to properly implement the features, 
evaluate and administer the various restriction levels, protect access codes, and 
distribute access codes only to individuals who have been fully advised of the 
sensitive nature of the access information.
Common carriers are required by law to collect their tariffed charges. While these 
charges are fraudulent charges made by persons with criminal intent, applicable 
tariffs state that the customer of record is responsible for payment of all 
long-distance or other network charges. Avaya cannot be responsible for such 
charges and will not make any allowance or give any credit for charges that result 
from unauthorized access.
To minimize the risk of unauthorized access to your system:
■ Use an unpublished remote access number
■ Assign access codes randomly to users on a need-to-have basis, keeping 
a log of all authorized users and assigning one code to each person
■ Use random-sequence access codes, which are less likely to be broken
■ Use the longest-length access codes the system will allow
■ Deactivate all unassigned codes promptly
■ Ensure that remote access users are aware of their responsibility to keep 
the telephone number and any access codes secure
■ When possible, restrict the off-network capability of off-premises callers, 
using calling restrictions, facility restriction levels (Hybrid/PBX mode only), 
and disallowed list capabilities. A prepared Disallowed List (number 7) is 
provided and is designed to prevent the types of calls that toll fraud 
abusers often make.
■ When possible, block out-of-hours calling.










