Instruction manual
Product security checklists
17-30 Issue 9 May 2003
ARS activated
Trunk groups dial access = n
FRLs assigned to limit network
access based on business needs
Remote Access
Remote access inactive
Use of non-DID/DNIS Remote
Access number
Barrier codes are random
maximum-length, difficult-to-guess
sequences
Each barrier code’s FRL is
appropriate
Assign allowed/disallowed lists
when appropriate
Different barrier code assigned to
each user
Voice Mail
2
Ports use for voice mail outward
restricted (FRL) unless outcalling is
used
■ If outcalling is used, all voice
mail ports are outward
restricted except those used for
outcalling, which are restricted
areas appropriate for outcalling
by FRL
■ If outcalling to specific non-local
areas is required, special
allowed list has been created
for those areas and assigned to
the outcalling port(s)
Table 17-10. MERLIN LEGEND Communications System security
checklist — Continued
Y/N
1
Note N/A
Continued on next page