Technical information
DEFINITY ECS, DEFINITY Communications Systems,
System 75, and System 85
Issue 7 June 2001
6-29
Security Tips
Require callers to use passwords.
Have the application verify that long distance numbers are not being
requested, or verify that only permitted numbers are requested.
Use appropriate switch translation restrictions.
Administer all appropriate switch restrictions on the voice mail system
voice ports.
You may determine whether to allow transfer only to another system
subscriber or to any extension of the correct extension length (that is, the
number of digits for extensions administered through the switch). For
example, your system may be configured to support the 4-digit plan, the
5-digit plan, and so on. The most secure approach, which is the default, is
to only allow transfers to other system subscribers. If you decide to allow
transfers to any extension, then you should check the switch COR on the
voice ports for proper restrictions.
Administer the voice mail system to use Enhanced Call Transfer if the
switch software allows.
NOTE:
When configured to operate in Digital Port Emulation mode, the
DEFINITY AUDIX System does not support Enhanced Call Transfer.
Protecting the AUDIX Voice Power System
The AUDIX Voice Power System provides both automated attendant and voice
mail functionality. The automated attendant feature answers incoming calls and
routes them to the appropriate department, person, or mailbox. The voice mail
feature provides call coverage to voice mailboxes along with a variety of voice
messaging features.
Unauthorized persons concentrate their activities in two areas with the AUDIX
Voice Power System:
They try to transfer out of the AUDIX Voice Power System to gain access to
an outgoing trunk and make long distance calls.
They try to locate unused or unprotected mailboxes and use them as
dropoff points for their own messages.
Traffic Reports
The AUDIX Voice Power System tracks traffic data over various timespans.
Reviewing these reports on a regular basis helps to establish traffic trends. If
increased activity or unusual usage patterns occur, such as heavy call volume on
ports assigned to outcalling, they can be investigated immediately.