Technical information
Product Security Checklists
16-6 Issue 7 June 2001
AUDIX Voice Power System
Also see the general security checklist on page 16-2, the security checklist for the
host communications system.
Number of digits on outcalling
minimized, and/or outcalling
destination restricted by host PBX
Voice processing ports
COR-to-COR restricted from dialing
RA barrier codes (when host
communications system is
System 75, or DEFINITY ECS, or
DEFINITY G1 or G3)
Product Monitoring
Administration Log and Activity Log
checked daily
1. If “NO” (N), provide Note reference number and explain.
Customer: _________________________________________
PBX Type: _________________________________________
Location: _________________________________________
New Install: _________________________________________
System Upgrade: _________________________________________
Major Addition: _________________________________________
Table 16-2. AUDIX, DEFINITY AUDIX and I
NTUITY AUDIX Voice
Messaging Systems (Continued)
Y/N
1
Note N/A
Continued on next page