MERLIN LEGEND Communications System Release 5.0
Feature Reference
555-650-110
Issue 1
June 1997
Applications
Page I-7
Voice Messaging Systems
I
Platform Requirements
9
To use PassageWay Direct Connection Solution on the system, you must have
the following components:
■
A Lucent Technologies-approved personal computer (PC) with a 286, 386,
or more powerful microprocessor and:
■
Microsoft Windows, version 3.1 or later
■
MLX-16DP, MLX-28D, MLX-20L, or MLX-10DP telephone connected to the
system
■
PassageWay Direct Connection Solution software
■
PassageWay Direct Connection Solution adapter
■
9-pin to 25-pin adapter
■
4-foot, 4-pair keyed modular phone cord (D8AC)
Additional MERLIN LEGEND Communications System requirements are:
■
MLX telephones must be wired with 3- or 4-pair extension wiring; otherwise
local telephone power is required.
■
If you use a console and DSS, local telephone power is required.
Voice Messaging Systems
9
IMPORTANT:
This section is intended solely as an overview of the applications. For
comprehensive information about the use of the applications, see the
documentation for the products.
!
SECURITY
l
ALERT:
Your voice messaging system permits callers to leave verbal messages for
system users or gain access to the backup position in an emergency as well
as create and distribute voice messages among system users.
The voice messaging system, through proper programming, can help you
reduce the risk of unauthorized persons gaining access to the network.
However, phone numbers and authorization codes can be compromised
when overheard in a public location or are lost either through theft of a
wallet or purse containing access information or through carelessness
(writing codes on a piece of paper and improperly discarding them).
Additionally, hackers may use a computer to dial an access code and then
publish the information to other hackers. Substantial charges can
accumulate quickly. It is your responsibility to take appropriate steps to
implement the features properly, evaluate and program the various
restriction levels, protect and carefully distribute access codes.