Technical information

DEFINITY ECS, DEFINITY Communications Systems,
System 75, and System 85
Issue 7 June 2001
6-11
For DEFINITY ECS and DEFINITY G3:
Use change ars analysis to display the ARS Analysis screen.
Enter the area codes or telephone numbers that you want to allow and
assign an available routing pattern to each of them.
Use change routing pattern to give the pattern preference an FRL that is
equal to or lower than the FRL of the voice mail ports.
NOTE:
For DEFINITY G3, the Unrestricted Call List (UCL) on the Toll Analysis Table
can be used to allow calls to specified numbers through ARS/WCR. The
COR for the voice mail ports should show all-toll restriction and access to
at least one UCL.
For DEFINITY G2.2:
Use PROC314 WORD1 to assign a VNI to the unrestricted dial string. Map
the VNI to a routing pattern in
PROC317 WORD2, and assign a low FRL to
the pattern in
PROC318 WORD1. If you permit only certain numbers,
consider using Network 3, which contains only those numbers.
Detecting Voice Mail Fraud
Table 6-3 shows the reports that help determine if a voice mail system used with
the DEFINITY ECS, DEFINITY Communications Systems, System 75, or
System 85 is being used for fraudulent purposes.
Table 6-3. Reports and Monitoring Techniques for Voice Mail
Monitoring Technique Switch Page #
Call Detail Recording (SMDR) All 6-12
Traffic Measurements and
Performance
All 6-13
Automatic Circuit Assurance All 6-14
Busy Verification All 6-15
Call Traffic Report All 6-13
Trunk Group Report G1, G3, System 75 6-13
Traffic Reports Any with the AUDIX
Voice Mail System
6-15
Call Detail Recording Any with the AUDIX
Voice Mail System
R1V5 with Digital
Networking
6-18