Technical information
Index
Issue 7 June 2001 IN-3
Call Forward Off-Net, 4-16, 6-7, 7-3
Call Forwarding, 2-8, 4-69
Feature Access Code, 4-8
call list, 6-7, 7-5
free, 4-18
specifying, 4-18
unrestricted, 4-18, 6-28
Call Management System
helplines, 8-2
log, 4-57
Measurements, 4-57
securing, 3-6
security tips, 8-1
call pager, 6-28
scam, 2-7
Call Prompting, 4-10
call sell operations, 2-2
Call Traffic Report, 6-13, 7-10, 7-13
Call Vectoring, 4-9, 4-10, 4-32
call volume increases, 4-53
calling
out-of-hours, 5-6, 5-13, 5-60
restricting by area, 6-8
calling cards, 2-3, 2-5, 2-7
CallMaster PC
security tips, 8-3
CAS Plus, see Call Accounting System Plus
CDR, see Call Detail Recording
cellular phones, 6-3
Central Office restrictions, 4-20
Centralized Attendant Service, 4-30
Centralized System Management
securing, 3-6
change remote-access command, 12-6
change station command, 4-69
change system-parameters features command, 12-7
change system-parameters features security command, 12-6
change system-parameters security command, 12-2, 12-4
circuit pack
TN744 Call Classifier, 4-39, 4-40
Tone Detector, 4-39, 4-40
Class of Restriction, 4-13, 4-30, 6-6, 7-3
3-way calling, 4-15
authorization code, 4-13
barrier code, 4-13
blocking access, 4-10
Facility Access Trunk test option, 4-39
maximum allowed, 4-13, 6-6, 7-3
outward-restricted, 4-29
Remote Access, 4-29
VDN, 4-15
Class of Service, 4-16, 6-7, 7-3
clear measurements security-violations command, 4-51
CMS, see Call Management System
CO trunks, 3-2
code
account, 6-56, 6-58
authorization, 3-2, 4-3, 6-35, 6-45, 6-56, 6-58, 6-59
barrier, 3-2, 4-3, 4-4
restriction, 4-14
Code Restriction Level, 7-4
command
add/change login, 12-7
change remote-access, 12-6
change station, 4-69
change system-parameters features, 12-7
change system-parameters features security, 12-6
change system-parameters security, 12-2, 12-4
clear measurements security-violations, 4-51
disable remote-access, 12-7
enable remote-access, 12-6
list bcms trunk, 4-56
list call forwarding, 4-69
list data module, 3-7
list history, 4-67
list hunt group, 3-7
list measurements, 4-54
list performance, 4-54
monitor, 4-45
monitor security-violations, 4-58, 4-63
status remote access, 4-11
verify, 4-69
Committee of the Alliance for Telecommunications, 1-8
con games, 2-6, 2-8
Conference Reservation and Control System
protecting the system, 8-4
security checklists, 16-46
conferencing, 6-34
console
attendant, 4-69, 6-26, 7-12
key, 4-39
permissions, 4-16
CONVERSANT Voice Information System
automated attendant, 7-18
password
changing, 13-2
remote maintenance board, 6-32
security checklists, 16-12
security tips, 6-34
COR-to-COR restrictions, 4-15, 4-47
NETCON, 3-7
credit card calls, 2-3, 2-5, 2-7
D
DAC, see Dial Access Code
data channel, 3-3
Data Origination
Feature Access Code, 4-8
Data Privacy
Feature Access Code, 4-8