Instruction manual
Product security checklists
17-30 Issue 9 May 2003
ARS activated
Trunk groups dial access = n
FRLs assigned to limit network 
access based on business needs
Remote Access
Remote access inactive
Use of non-DID/DNIS Remote 
Access number
Barrier codes are random 
maximum-length, difficult-to-guess 
sequences
Each barrier code’s FRL is 
appropriate
Assign allowed/disallowed lists 
when appropriate
Different barrier code assigned to 
each user
Voice Mail
2
Ports use for voice mail outward 
restricted (FRL) unless outcalling is 
used 
■ If outcalling is used, all voice 
mail ports are outward 
restricted except those used for 
outcalling, which are restricted 
areas appropriate for outcalling 
by FRL
■ If outcalling to specific non-local 
areas is required, special 
allowed list has been created 
for those areas and assigned to 
the outcalling port(s)
Table 17-10. MERLIN LEGEND Communications System security 
checklist — Continued 
Y/N
1
Note N/A
Continued on next page










