Any server that is connected to the Internet is potentially subject to unauthorized use and malicious attacks. Like any other server on your network, the Avaya IR system can and should be configured in accordance with your own corporate security policies.
This section describes approaches that Avaya recommends for securing the network.