Technical information

Automated Attendant
7-2 Issue 7 June 2001
Tools that Prevent Unauthorized Calls
You can help prevent unauthorized callers who enter the automated attendant
system from obtaining an outgoing facility by using the security tools shown in
Table 7-1.
Facility Restriction Levels
The switch treats all the PBX ports used by automated attendant systems as
stations. Therefore, each automated attendant port can be assigned a COR with
an FRL associated with the COR. FRLs provide for eight different levels of
restrictions for AAR/ARS/WCR calls. FRLs are used in combination with calling
permissions and routing patterns and/or preferences to determine where calls can
be made. FRLs range from 0 to 7, with each number representing a different level
of restriction (or no restrictions at all).
The FRL is used for the AAR/ARS/WCR feature to determine call access to an
outgoing trunk group. Outgoing call routing is determined by a comparison of the
FRLs in the AAR/ARS/WCR routing pattern to the FRL associated with the
COR/COS of the call originator.
The higher the station FRL number, the greater the calling privileges. For
example, if a station is not permitted to make outside calls, assign it an FRL value
of 0. Then ensure that the FRLs on the trunk group preferences in the routing
patterns are
1 or higher.
Table 7-1. Automated Attendant Security Tools
Security Tool Switch Page #
Enhanced Call Transfer (see
‘‘Protecting the AUDIX,
DEFINITY AUDIX, and Avaya
INTUITY Voice Mail Systems’’)
DEFINITY ECS, DEFINITY
G1, G2, G3, System 75 R1V3
Issue 2.0, System 85 R2V4
6-15
Facility Restriction Levels* All 7-2
Station-to-Trunk Restrictions* All 7-3
Class of Restriction DEFINITY ECS, DEFINITY
G1, G3, and System 75
7-3
Class of Service DEFINITY G2 and System 85 7-3
Toll Analysis DEFINITY ECS, DEFINITY
G1, G2, G3, and System 85
7-5