Installation Overview
Protecting Your System
Octel 50 Installation Guide
12-17
Using Supervisor Passwords to Restrict System Management
Access
Access to system management features is password-protected. There are two levels of
system manager passwords. Level 2 access allows a system manager to create, edit, and
delete mailboxes; to access reports and system statistics; to create and specify prompts;
maintain network nodes; and to create V-Trees. Level 3 access allows a system manager
to perform all Level 2 tasks, to set system parameters using the System Setup utility, to
configure greeting by port, to modify classes of service, and to configure multilingual
systems.
It is recommended that you use at least a six-digit password for both the Level 2 and
Level 3 passwords. The longer the Level 2 and Level 3 passwords, the more difficult it is
for someone to guess them. It is also recommended that the supervisor passwords be
changed on a regular basis to further protect against unauthorized system manager
access.
When giving the Level 2 or Level 3 password to system managers, keep in mind that the
more people who have a password, the greater the possibility for problems to occur.
There should be more than one individual who knows the passwords for the system,
however, so when one system manager is away from the office, another is available to
maintain the system.
For additional information on supervisor passwords, see Chapter 2, “
The File Menu
,” in
the
Supervisor’s Guide
.
Logging Off from the System When Not Using It to Restrict
System Management Access
It is recommended that you always logoff from the Octel 50 system when not using it. This
helps prevent unauthorized access to system manager functions.
For additional information on logging into the system, see Chapter 2, “
The File Menu
,” in
the
Supervisor’s Guide
.
Remote Access
Use the following guidelines to secure remote access to the system:
•
The remote access software that you install and use should be configured to require a
password to gain access to the system.
•
The passwords should be periodically changed. Make sure you notify the appropriate
individuals or organizations each time you change the passwords.
•
The modem connected to the system should be disabled when it is not required for
use by authorized personnel. The connection should be enabled only by the system
administrator on an “as needed” basis.