Technical information

Index
IN-4 Issue 7 June 2001
Data Restriction
Feature Access Code, 4-8
DCS, see Distributed Communication System
default passwords
changing, 3-4
DEFINITY AUDIX Voice Messaging System
automated attendant, 7-18
logins, 6-21
password
changing, 13-4
protecting, 6-21
protecting the system, 6-15
security checklists, 16-4
security considerations, 6-22
DEFINITY Communications System
automated attendant, 7-1
detecting toll fraud, 4-49
Remote Access, 4-3
restricting unauthorized outgoing calls, 4-12
security goals and tools, 3-10
security measures, 4-27
security tips, 4-2
security tools by release, 17-1
voice mail, 6-4
DEFINITY Communications System G1
password
changing, 13-5
security checklists, 16-14
DEFINITY Communications System G2
password
changing, 13-6
security checklists, 16-20
DEFINITY Communications System G3
password
changing, 13-5
security checklists, 16-14
DEFINITY ECS, see DEFINITY Enterprise Communications
Server
DEFINITY Enterprise Communications Server
detecting toll fraud, 4-49
Remote Access, 4-3
restricting unauthorized outgoing calls, 4-12
security checklists, 16-14
security measures, 4-27
security tips, 4-2
voice mail, 6-4
Dial Access Code, 4-40, 6-2
dial tone
AAR, 4-41
accessing, 2-5
ARS, 4-19, 4-41
authorization code, 4-7
barrier code, 4-6
Remote Access, 4-2
suppressing, 4-41
switch, 4-41
transferring, 2-5
DID Restriction, 7-4
digit conversion, 4-23, 4-34, 4-35
Digital Port Emulation Mode, 6-29
DIMENSION PBX System
security checklists, 16-24
direct dial access, 4-8, 4-19
Direct Distance Dialing, 2-1
Direct Inward Dialing, 14-1
Direct Inward System Access, 2-4, 2-5, 3-2, 14-1
MERLIN LEGEND Communications System, 5-6
DISA, see Direct Inward System Access
disable remote-access command, 12-7
disabling Remote Access, 11-3
disallowing outside calls, 6-25, 7-2, 7-16
Distributed Communication System, 4-43, 4-55
Trunk Turnaround, 4-43
dumpster diving, 2-6
E
Electronic Tandem Network, 4-18, 4-44
E-mail administration
Viruses, 6-18
employee
abuse, 2-8, 3-8, 8-9
education, 3-8
emulation programs
PC-based, 3-6
enable remote-access command, 12-6
Enhanced Automated Attendant, 6-18, 7-13
Enhanced Call Transfer, 6-23, 6-25, 6-29, 7-1, 7-16
coverage limitations, 6-23
EPSCS network, 4-16
equipment rooms
physical security, 3-9
Escape to Attendant, 6-23
ETN, see Electronic Tandem Network
Extended User Administration of Redirected Calls, 4-25
F
FAC, see Feature Access Code
Facility Restriction Level, 4-16, 4-17, 6-5, 7-2, 7-4
attendant console, 4-31
overriding, 4-17
providing individualized calling privileges, 4-30
suggested value, 4-31
Facility Restriction Levels
MERLIN LEGEND System, 5-10
Facility Test Call, 4-41
access code, 4-40, 6-2
denying, 4-10
disabling, 4-39
FEAC, see Forced Entry of Account Code