Technical information

DEFINITY ECS, DEFINITY Communications Systems,
System 75, and System 85
Issue 7 June 2001
7-13
Call Traffic Report
This report provides hourly port usage data and counts the number of calls
originated by each port. By tracking normal traffic patterns, you can respond
quickly if an unusually high volume of calls begins to appear, especially after
business hours or during weekends, which might indicate hacker activity.
For DEFINITY ECS, DEFINITY G1, G3, and System 75, traffic data reports are
maintained for the last hour and the peak hour. For G2 and System 85, traffic data
is available via Monitor I which can store the data and analyze it over specified
periods.
Trunk Group Report
This report tracks call traffic on trunk groups at hourly intervals. Since trunk traffic
is fairly predictable, you can easily establish, over time, what is normal usage for
each trunk group. Use this report to watch for abnormal traffic patterns, such as
unusually high off-hour loading.
Traffic Reports
Both the AUDIX Voice Mail System and the AUDIX Voice Power System track
traffic data over various timespans. Reviewing these reports on a regular basis
helps to establish traffic trends. If increased activity or unusual usage patterns
occur, they can be investigated immediately. Beginning with AUDIX Voice Mail
System R1V2, the AUDIX Data Acquisition Package (ADAP) uses a PC to provide
extended storage and analysis capabilities for the traffic data.
Call Detail Recording
For AUDIX Voice Mail System R1V5 and later, this optional feature provides a
detailed view of the activity associated with each voice mail session, outgoing
calls, and system-wide activity.
Voice Session Record
A voice session begins whenever a caller attempts to log into the AUDIX Voice
Mail System, is redirected to the AUDIX Voice Mail System for call answering,
enters *R or **R, transfers from one automated attendant to another automated
attendant (nested), or is transferred by the Enhanced Automated Attendant
feature.
The record reveals the routing of the call, including the caller (if internal), recipient,
port, community, mail IDs (corresponds to the AUDIX Voice Mail System
subscribers extension number input during a login or as input by the calling
party), the time and duration of the call, the type of session (voice mail, call
answer, guest password, or automated attendant), the message activity, and
number of login attempts.