Instruction manual
Avaya’s statement of direction
Issue 9 May 2003
1-5
Avaya’s statement of direction
The telecommunications industry is faced with a significant and growing problem 
of theft of customer services. To aid in combating these crimes, Avaya intends to 
strengthen relationships with its customers and its support of law enforcement 
officials in apprehending and successfully prosecuting those responsible.
No telecommunications system can be entirely free from the risk of unauthorized 
use. However, diligent attention to system management and to security can 
reduce that risk considerably. Often, a trade-off is required between reduced risk 
and ease of use and flexibility. Customers who use and administer their systems 
make this trade-off decision. They know how to best tailor the system to meet their 
unique needs and, necessarily, are in the best position to protect the system from 
unauthorized use. Because the customer has ultimate control over the 
configuration and use of Avaya services and products it purchases, the customer 
properly bears responsibility for fraudulent uses of those services and products.
Chapter 12
: Remote 
Access example (G1, 
G3, and System 75)
Offers an example of how to set up Remote Access 
and an example of how to disable it.
Chapter 13
: 
Administering features 
of the DEFINITY G3V3 
and later
Provides information on administering features 
available in DEFINITY Releases G3V3 and later, 
including the DEFINITY ECS Release 5 and 6.
Chapter 14
: Changing 
your password
Tells how to change passwords for systems in the 
handbook.
Chapter 15: Toll fraud 
job aids
Provides job aids to help prevent toll fraud.
Chapter 16
: Special 
security product and 
service offers
Details special product and service offers and 
provides a toll fraud contact list.
Chapter 17
: Product 
security checklists
Lists the available security features and tips by 
product.
Chapter 18: Large 
business 
communications 
systems security tools 
by release
Details security tools referenced in this guide, for 
the System 75, System 85, DEFINITY ECS, and 
DEFINITY communications systems by release.
Chapter 19
: 
Non-supported products
Lists the non-supported products.
Chapter 20: Links to 
additional resources
Provides links to additional information sources for 
security issues.










