Technical information
Issue 7 June 2001 IN-1
IN
Index
Numerics
0 calls, 4-23, 4-53
00 calls, 4-23
01 calls, 4-34
blocking, 10-14
010 calls, 4-34
011 calls, 4-34, 4-53
10xxx calls, 2-7, 4-23
10xxx01 calls, 4-34
10xxx11 calls, 4-34
2-way trunk groups, 4-15
3-way COR check, 4-15, 4-49
3-way-conferencing, 6-34
6-digit screening, 2-8
800 numbers, 2-7, 3-2, 4-2, 14-1
800 service, 6-54, 6-57
trunks, 3-2
911 number, 4-14
950 numbers, 2-7
976-look-alike numbers, 2-8
A
AAR, see Automatic Alternate Routing
AAR/ARS
analysis, 4-18
Feature Access Code, 4-8
Abbreviated Dialing
Feature Access Code, 4-8
abuse
internal, 2-8, 3-8
access
administration and maintenance, 3-4
Access Security Gateway feature
loss of an ASG Key, 15-8
restarting temporarily disabled ASG, 15-7
Access Security Gateway, interactions, 15-8
account code, 6-56, 6-58
CDR, 4-16
undefined, 4-53, 5-61, 5-64
ADAP, see AUDIX Data Acquisition Package
add/change login command, 12-7
adjunct
changing default password, 3-4
security, 3-6
administrable logins, 4-51
administration and maintenance access, 3-4
administration port, 4-54
Advanced Private Line Termination, 4-15
Off-Net, 4-16
after-hours calling
preventing, 4-32
restricting, 4-18
alarm
ACA, 4-55
long holding time, 7-11
sending to attendant, 4-56
alternate carrier access, 2-6
Alternate Facility Restriction Level, 4-18
preventing after-hours calling, 4-32
AMIS Networking, 6-25
ANI, see Automatic Number Identification
area codes
restricting calls, 7-6
ARS Measurement Selection, 4-55, 6-14, 7-11
ARS, see Automatic Route Selection
attendant
call routing, 4-30, 4-48, 9-1
CAS
call routing, 4-30
reporting suspicious calls, 3-8, 4-49
sending alarms/reports, 7-12
transferring, 4-30
attendant console, 4-69, 6-26, 7-12, 7-17
Facility Restriction Level, 4-31, 6-8
physical security, 3-9
attendant control
activating, 4-39
Remote Access calls, 4-37
specific extensions, 4-37
trunk group access, 4-38
Audio Message Interchange Specification, 6-25
AUDIX Data Acquisition Package, 1-9, 6-18, 6-19, 7-13
AUDIX Voice Mail System
Call Detail Recording, 6-18, 7-13
disabling transfer out, 6-27
logins, 6-21
password
changing, 13-1
protecting, 6-21
protecting the system, 6-15
security checklist, 16-4
security considerations, 6-22
session termination values, 6-19
AUDIX Voice Power System, 6-38
automated attendant, 6-4, 7-16, 7-17, 7-20, 7-22
limiting outbound transfers, 6-31, 6-61
Lodging, 6-4
password
changing, 13-2
protecting, 6-38, 6-60
protecting, 6-29, 6-38
security checklists, 16-6
security measures, 6-39, 6-61
security tips, 6-30, 6-38, 6-60
traffic reports, 6-29
Transfer Only to System Subscribers, 6-31, 6-61