Technical information
DEFINITY ECS, DEFINITY Communications Systems,
System 75, and System 85
Issue 7 June 2001
6-5
Tools that Prevent Unauthorized Calls
You can help prevent unauthorized callers who enter the voice messaging system
from obtaining an outgoing facility by using the security tools shown in Table 6-1.
Facility Restriction Levels
The switch treats all the PBX ports used by voice mail systems as stations.
Therefore, each voice mail port can be assigned a COR/COS with an FRL
associated with the COR/COS. FRLs provide eight different levels of restrictions
for AAR/ARS/WCR calls. They are used in combination with calling permissions
and routing patterns and/or preferences to determine where calls can be made.
FRLs range from 0 to 7, with each number representing a different level of
restriction (or no restrictions at all).
The FRL is used for the AAR/ARS/WCR feature to determine call access to an
outgoing trunk group. Outgoing call routing is determined by a comparison of the
FRLs in the AAR/ARS/WCR routing pattern to the FRL associated with the
COR/COS of the call originator.
Table 6-1. DEFINITY ECS, DEFINITY Communications Systems, System 75,
and System 85 Voice Mail Security Tools
Security Tool Switch Page #
Enhanced Call Transfer
(see ‘‘Protecting the
AUDIX, DEFINITY
AUDIX, and Avaya
INTUITY Voice Mail
Systems’’)
DEFINITY G1 (Issue
5.0), G2, G3, DEFINITY
ECS, System 75 R1V3
(Issue 2.0), System 85
R2V4
6-15
Facility Restriction
Levels*
All 6-5
Station-to-Trunk
Restrictions*
All 6-6
Class of Restriction DEFINITY G1, G3,
DEFINITY ECS, and
System 75
6-6
Class of Service DEFINITY G2 and
System 85
6-7
Toll Analysis DEFINITY G1, G2, G3,
DEFINITY ECS, and
System 85
6-7