Technical information
Contents
x Issue 7 June 2001
Call Traffic Report 6-13
Trunk Group Report 6-13
SAT, Manager I, and G3-MT Reporting 6-13
ARS Measurement Selection 6-14
Automatic Circuit Assurance 6-14
Busy Verification 6-15
Protecting the AUDIX, DEFINITY AUDIX, and
Avaya INTUITY Voice Mail
Systems 6-15
Unauthorized System Use 6-16
Traffic Reports (AUDIX Voice Mail System Only) 6-18
Call Detail Recording (AUDIX Voice Mail
System Only) 6-18
Protecting Passwords 6-21
Security Features 6-22
Security Measures 6-25
Security Tips 6-29
Protecting the AUDIX Voice Power System 6-29
Traffic Reports 6-29
Protecting Passwords 6-30
Security Tips 6-30
Security Measures 6-31
Protecting the CONVERSANT Voice Information
System 6-32
Protecting Passwords 6-32
Security Measures 6-33
Security Tips 6-34
MERLIN II Communications System 6-34
Protecting the MERLIN MAIL Voice Messaging
System 6-34
Protecting Passwords 6-35
Security Tips 6-35
MERLIN LEGEND Communications System 6-37
Protecting the AUDIX Voice Power System 6-38
Protecting Passwords 6-38
Security Tips 6-38
Security Measures 6-39
Protecting the INTUITY Voice Messaging System 6-40
Protecting Passwords 6-40
Security Tips 6-41
Security Measures 6-41