System information
Contents
Issue 1 October 1997 iii
About This Book xi
■ Purpose xi
■ Intended Audiences xi
■ Release History xi
■ Conventions Used in This Book xi
Terminology xii
Keyboard and Telephone Keypad
Representations xiv
Screen Displays xv
Data Entry Conventions xv
Safety and Security Alert Labels xvi
■ Trademarks and Service Marks xvi
■ Related Resources xviii
Documentation xviii
Training xviii
Technical Assistance xviii
■ How to Comment on This Book xix
System Security and Toll Fraud xxi
■ Protecting Your Voice Messaging System xxi
Voice Messaging xxi
Automated Attendant xxii
■ Switch Administration xxii
Restrict Outward Dialing xxii
Assign Low Facilities Restriction Level (FRL) xxii
Restrict Toll Areas xxiv
Block Subscriber Use of Trunk Access Codes xxv
Restrict AMIS Networking Number Ranges xxv
■ Subscriber Password Guidelines xxv
■ INTUITY AUDIX Administration xxvi
Outcalling xxvi
Mailbox Administration xxvi
Enhanced Call Transfer xxvii
Coverage Limitations with Enhanced Call
Transfer xxviii
■ Detecting Voice Mail Fraud xxviii