18 Meridian Digital Telephone IP Adapter Installation and Administration GuideMeridian Digital Telephone IP Adapter description Standard 1.1System securityThere are two levels of security that you can set to control access from MeridianDigital Telephone IP Adapter units to the RLC on the host PBX. This sectiondescribes these security levels and how you can manage them usingConfiguration Manager.No securityWhen no security measures are used, the RLC accepts incoming calls from allMeridian Digital Telephone IP Adapter units.Use this level with caution as it exposes the RLC to unauthorized use. Forexample, No security allows a user from an unauthorized remote site canaccidentally, or intentionally, connect to the RLC. With this connection made,the unauthorized user can now place long distance phone calls through the RLCand the host PBX.Security identifierWhen you choose the security identifier level of security, the Meridian DigitalTelephone IP Adapter automatically sends its configured security identifier(password) for each connection request. The RLC compares the identifierconfigured to the RLC port with the identifier assigned to the Meridian DigitalTelephone IP Adapter. If the identifiers match, then the RLC grants therequested connection.If the identifiers do not match, then the RLC records an event in the MeridianDigital Telephone IP Adapter system log. You can view the system log inConfiguration Manager. The telephone displays HOSTLESS MODE, indicating thatcommunications with the host PBX are down.