Instruction manual
Small business communications systems
6-38 Issue 9 May 2003
Remote Access feature
The Remote Access feature allows people to use the system by dialing the 
number of a line/trunk designated for remote access. The remote user should be 
required to dial a barrier code (password) after reaching the system. Beginning 
with Release 3.0, the system-wide barrier code length is programmed for a 
minimum of 4 digits and a maximum of 11. After gaining access to the system, a 
remote user can do any of the following:
■ Dial extension numbers directly without going through a system operator. 
Remote callers can call inside extensions, data workstations, or calling 
groups just as if they were calling from an extension within the system.
■ Select a regular or special-purpose outside line (for example, a WATS line) 
or a pool or ARS line to make outgoing calls. If the pool is busy, the system 
can be programmed to allow the remote user to use Callback to queue a 
call for the busy pool.
■ Arrange to have calls forwarded, change the forwarding destination, or 
cancel forwarding to a telephone inside or outside the system.
**** SECURITY ALERT ****
Security of your system. As a customer of a new communications system, you 
should be aware that telephone toll fraud is an increasing problem. Telephone toll 
fraud can occur in many forms, despite the numerous efforts of telephone 
companies and telephone equipment manufacturers to control it. Some 
individuals use electronic devices to prevent or falsify records of these calls. 
Others charge calls to someone else’s number by illegally using lost or stolen 
calling cards, billing innocent parties, clipping on to someone else’s line, and 
breaking into someone else’s telephone equipment physically or electronically. In 
certain instances, unauthorized individuals make connections to the telephone 
network through the use of remote access features.
The Remote Access feature of your system, if you choose to use it, permits 
off-premises callers to access the system from a remote telephone by using an 
800 number or a 7- or 10-digit telephone number. The system returns an 
acknowledgment signaling you to key in your barrier code, which is selected and 
programmed by the system manager. After the barrier code is accepted, the 
system returns a dial tone to you. If restrictions are not in place, you can place any 
call normally dialed from a telephone within the system. Such an off-premises 
network call is originated at, and will be billed from, the system location.
The Remote Access feature, as designed, helps the customer, through proper 
programming, to minimize the ability of unauthorized persons to gain access to 
the network. Most commonly, telephone numbers and codes are compromised 
when overheard in a public location, through theft of a wallet or purse containing 
access information, or through carelessness (writing codes on a piece of paper 
and improperly discarding it). Additionally, hackers may use a computer to dial an 
access code and then publish the information to other hackers. Enormous 
charges can be run up quickly. It is the customer’s responsibility to take the 










