Technical information

DEFINITY ECS, DEFINITY Communications Systems,
System 75, and System 85
Issue 7 June 2001
6-7
Class of Service
For DEFINITY G2 and System 85, a voice mail port must be assigned a COS. The
following COS options relate to voice mail toll fraud prevention:
Call Forward Off-Net: allows a user to call forward outside the switch to
non-toll locations.
Call Forward Follow Me: allows a user to forward calls outside the switch
when other options are set.
Miscellaneous Trunk Restrictions: restricts certain stations from calling
certain trunk groups via dial access codes.
Outward Restriction: restricts the user from placing calls over the CO, FX,
or WATS trunks using dial access codes to trunks. Outward restriction also
restricts the user from placing calls via ARS/WCR. Use ARS/WCR with
WCR toll restrictions instead.
Toll Restriction: prevents users from placing toll calls over CO, FX, or
WATS trunks using dial access codes to trunks. Use ARS/WCR with WCR
toll restrictions instead.
WCR Toll Restriction: restricts users from dialing the ARS or WCR Network
I Toll Access Code, or from completing a toll call over ARS/WCR.
Terminal-to-Terminal Restrictions: restricts the user from placing or
receiving any calls except from and to other stations on the switch.
Toll Analysis
The Toll Analysis screen allows you to specify the toll calls you want to assign to a
restricted call list (for example, 900 numbers) or to an unrestricted call list (for
example, an outcalling number to a call pager). Call lists can be specified for
CO/FX/WATS, TAC, and ARS calls, but not for tie TAC or AAR calls.
Security Measures in the PBX
Security measures in the PBX are designed to prevent criminals from placing
fraudulent calls once they have accessed the voice messaging system. However,
these security measures do not restrict criminals from reaching the voice mail
system, such as by dialing a DID station that is forwarded to the voice mail
system. Incoming calls to the voice mail system may transfer to outgoing facilities
if proper security measures are not implemented. Security steps can be
implemented in the PBX and in the voice messaging/auto attendant system.