Instruction manual
Security risks
4-2 Issue 9 May 2003
Remote access
Remote access, or direct inward system access (DISA), permits callers from the 
public network to access a customer premises equipment-based system to use its 
features and services. Callers dial into the system using CO, FX, DID, or 800 
service trunks.
After accessing the feature, the user hears system dial tone, and, for system 
security, may be required to dial a barrier code, depending on the system. If a 
valid barrier code is dialed, the user again hears dial tone, and can place calls the 
same as an on-premises user.
For the DEFINITY ECS, DEFINITY G1 and G3, and for the System 75, incoming 
calls are routed to a remote access extension. For DEFINITY G2 and System 85, 
callers are connected to the Remote Access feature when they dial the number 
for an incoming remote access trunk group.
Different product releases have different restrictions, as follows. When a remote 
access call is answered, the caller can be requested to enter either a barrier code 
or an authorization code (the DEFINITY ECS, DEFINITY G1, G2.2 Issue 3.0 and 
later), G3, and System 75 R1V3 can require both) before calls are processed. 
When both maximum length barrier codes and authorization codes are required, 
hackers need to decipher up to 14 digits to gain access to the feature.
Hackers frequently call toll-free 800 numbers to enter customer premises 
equipment-based PBX systems so that they do not pay for the inbound calls. After 
they are connected, hackers use random number generators and password 
cracking programs to find a combination of numbers that gives them access to an 
outside facility.
Unprotected remote access numbers (those that do not require barrier codes or 
authorization codes) are favorite targets of hackers. After being connected to the 
system through the Remote Access feature, a hacker may make an unauthorized 
call by simply dialing and the telephone number. Even when the Remote 
Access feature is protected, hackers try to decipher the codes. When the right 
combination of digits is discovered (accidentally or otherwise), hackers can then 
make and sell calls to the public.
For these reasons, all switches in the network should be protected. Refer to 
Chapter 5
 for more information on remote access for the DEFINITY ECS, 
DEFINITY communications systems, System 75, and System 85. Refer to 
Chapter 6
 for more information on remote access for the MERLIN II, MERLIN 
LEGEND, MERLIN Plus, PARTNER II, PARTNER Plus, and System 25 
communications systems.
9










