Technical information

Large Business Communications Systems
4-52 Issue 7 June 2001
Commands for the DEFINITY G3V3 or later, which includes DEFINITY ECS, are
grouped into three categories: common, administration, and maintenance. Each
category has a group of subcategories, and each subcategory has a list of
command objects that the commands act on. A superuser can set a users
permissions to restrict or block access to any command in these categories.
NOTE:
DEFINITY G3V3 and later releases, which includes DEFINITY ECS, allow
for unique logins to be assigned (for example, MARY83, B3V3RLY, etc.).
This eliminates the need to use cust, rcust, browser, and bcms. The list
login command shows the assigned logins, and the state of the login (for
example, VOID, disabled, etc.).
For information on administering Forced Password Aging and Administrable
Logins for DEFINITY G3V3 and later, including DEFINITY ECS, see Chapter 13.
Call Detail Recording (CDR) / Station Message
Detail Recording (SMDR)
This feature creates records of calls that should be checked regularly. A series of
short holding times may indicate repeated attempts to decode barrier codes or
authorization codes on Remote Access. Call Records can be generated for
Remote Access when CDR/SMDR is activated for the Remote Access trunk
group.
Authorization codes, if required, are recorded by CDR/SMDR; barrier codes are
not. When you set the Suppress CDR for Ineffective Call Attempts field to
no,
calls that fail because the caller does not have adequate calling privileges print a
condition code in the report to reflect the failed attempt. (See the CDR description
in the DEFINITY ECS Feature Description.) Review the report for these condition
codes, which might indicate hacker activity.
Two optional products, Avaya Cost Allocator and Call Accounting System (CAS)
Plus, enhance CDR/SMDR by allowing you to create customized reports. These
reports can be used to isolate calls that may be suspicious.
NOTE:
Only the last extension on the call is reported. Unauthorized users who are
aware of this procedure originate calls on one extension, then transfer to
another extension before terminating the call. Internal toll abusers may
transfer unauthorized calls to another extension before they disconnect so
that CDR does not track the originating station. If the transfer is to your voice
mail system, it could give a false indication that your voice mail system is the
source of the toll fraud.