Instruction manual
Voice messaging systems
7-46 Issue 9 May 2003
Take the following preventative measures to limit the risk of unauthorized use of 
the Automated Attendant feature by hackers:
■ Do not use automated attendant selector codes for automatic route 
selection (ARS) codes or pooled facility codes.
■ Assign all unused automated attendant selector codes to zero, so that 
attempts to dial these will be routed to the system operator or General 
Mailbox.
■ If RCF is required, coordinate with your Avaya Account Team or authorized 
dealer to verify the type of central office facility used for RCF. If a 
ground-start line/trunk, or a loop-start line/trunk and central office reliable 
disconnect can be ensured, then nothing else need be done.
NOTE:
In many cases these will be loop-start lines/trunks without reliable 
disconnect. The local telephone company will need to be involved to 
change the facilities used for RCF to ground start lines/trunks. 
Usually a charge applies for this change. Also, hardware and 
software changes may need to be made in the MERLIN LEGEND 
Communications System. The Automated Attendant feature merely 
accesses the RCF feature in the MERLIN LEGEND Communications 
System. Without these changes being made, this feature is highly 
susceptible to toll fraud. The same preventative measures must be 
taken if the RCF feature is active for MERLIN LEGEND 
Communications System extensions, whether or not accessed by an 
automated attendant menu.
Protecting passwords
For the MERLIN MAIL and MERLIN MAIL-ML voice messaging systems, 
passwords can be up to four digits. For the MERLIN MAIL R3 and MERLIN 
LEGEND Mail Voice Messaging System, passwords can be up to 15 digits. See 
‘‘Administration / maintenance access’’ on page 4-4
 and ‘‘General security 
measures’’ on page 4-8 for secure password guidelines. See Chapter 14 for 
information on how to change passwords.
Security tips
The MERLIN MAIL, MERLIN MAIL-ML, MERLIN MAIL R3, and MERLIN LEGEND 
Mail voice messaging systems, through proper administration, can help you 
reduce the risk of unauthorized persons gaining access to the network. However, 
phone numbers and authorization codes can be compromised when overheard in 
a public location, lost through theft of a wallet or purse containing access 
information, or when treated carelessly (writing codes on a piece of paper and 
improperly discarding them).










