User`s guide

Setting up Meridian Mail security 6-5
Overview
Standard 1.0 System Administration Guide January 1998
Therefore, a good security system has to incorporate elements
from PBX and system security, and awareness on the part of
your users in order to provide effective security.
Unauthorized access
to the PBX
Hackers are using the PBX to place unauthorized calls primarily
through inbound 800 numbers and voice mail.
Nortel’s Meridian 1 products meet a wide variety of customer
requirements. In particular, the Meridian 1 (M1) has security
features to help minimize its vulnerability while maintaining its
flexibility.
For more information, see Sections B to G.
Unauthorized Meridian
Mail access
Hackers may attempt to hack into your voice messaging system
so they can use the outdialing feature to make free local- and
long-distance calls.
With Meridian Mail, you can reduce, if not eliminate, this abuse
by implementing some or all of the recommendations for
system access. For more information, see Sections H to K.
Unauthorized mailbox
access
Most hackers want access to the outdialing features—they are
not concerned with personal mailboxes. If they do hack into a
personal mailbox, they usually have some “fun” with it like
changing the greeting, listening to messages, and so on.
With Meridian Mail, you can reduce the risk of unauthorized
mailbox access by implementing some or all of the
recommendations for mailbox access. For more information,
see “Controlling access to Meridian Mail mailboxes” on
page 6-123.
Unauthorized access
to the equipment
Your system hardware could be a potential point of
unauthorized access.