Instruction manual
Security risks
4-10 Issue 9 May 2003
Security goals tables
The following tables list the security goals for each communications system, and 
provide an overview of the methods and steps that are offered through the 
switches to minimize the risk of unauthorized use of the system.
■ Table 4-1 on page 4-10 provides information for the DEFINITY ECS, 
DEFINITY communications systems, System 75, and System 85.
■ Table 4-2 on page 4-14 provides information for the MERLIN II, MERLIN 
LEGEND, MERLIN Plus, and System 25 communications systems.
■ Table 4-3 on page 4-19 provides information for the PARTNER II and 
PARTNER Plus communications systems.
Table 4-1. Security goals: DEFINITY ECS, DEFINITY communications 
systems, System 75 and System 85
Security Goal Method Security Tool Steps
Protect Remote 
Access feature
Limit access to 
authorized users
Barrier codes Set to maximum 
length 
Set COR/COS
Authorization 
codes
Set to maximum 
length 
Set FRL on COR
Use VDNs to 
route calls
Call vectoring 
(G2 and G3 only)
Administer call 
vectoring (G3 
only)
Use CORs to 
restrict calling 
privileges of 
VDNs
Limit times when 
Remote Access 
is available
Night service 
(G1, G2, G3, and 
System 75 only)
Administer night 
service
Shared trunk 
group (System 
85 only)
Assign shared 
trunk group
Continued on next page










