Technical information
Index
IN-6 Issue 7 June 2001
M
maintenance access, 3-7
maintenance port, 3-9
target of abuse, 2-4
Malicious Call Trace, 4-67
Manager I, 6-13
reporting, 4-54, 7-10
Manager III/IV, 3-6
Manual Terminating Line Restriction, 7-4
Measurement Selection
ARS, 4-55, 6-14, 7-11
measurements
BCMS, 4-56
CMS, 4-57
MERLIN Attendant, 7-19, 7-20
MERLIN II Communications System
protecting DISA, 5-5
security checklists, 16-27
security goals and tools, 3-14
security tips, 5-5
voice mail, 6-34
MERLIN LEGEND Communications System
allowed and disallowed lists, 5-9
preventative measures, 5-8
Remote Access, 5-12
security checklists, 16-29
security goals and tools, 3-14
setting facility restriction levels, 5-10
star codes, 5-9
voice mail, 6-37
MERLIN LEGEND Mail Voice Messaging System, 6-44
automated attendant
protecting, 6-44
password
changing, 13-8
protecting, 6-45
MERLIN MAIL R3 Voice Messaging System, 6-44
automated attendant, 7-20
protecting, 6-44
password
changing, 13-8
protecting, 6-45
security checklists, 16-36
security tips, 6-45
MERLIN MAIL Voice Messaging System, 6-44
automated attendant, 7-19, 7-20
protecting, 6-44
password
changing, 13-7
protecting, 6-35, 6-45
ports, 6-34
protecting, 6-34
security checklists, 16-32
security tips, 6-35, 6-45
MERLIN MAIL-ML Voice Messaging System, 6-44
automated attendant, 7-20
protecting, 6-44
password
changing, 13-7
protecting, 6-45
security checklists, 16-34
security tips, 6-45
MERLIN Plus Communications System
protecting Remote Call Forwarding, 5-61
protecting Remote Line Access, 5-60
Remote Line Access, 5-60
security checklists, 16-39
security goals and tools, 3-14
Message Delivery, 6-20, 6-25, 7-14
Miscellaneous Trunk Restrictions, 6-6, 6-7, 7-3
modem
flashing switch-hook, 3-3
protecting ports, 3-3
monitor command, 4-45
Monitor I, 4-54, 6-13, 7-10, 7-11, 7-13
monitor security-violations command, 4-58, 4-63
Multimedia Communications Exchange Server
security checklists, 16-40
Multipoint Conferencing Unit
protecting the system, 8-4
security checklists, 16-46
N
NETCON, see Network Control data channel
Network 3, 4-37, 6-11, 7-7
network access
unauthorized, 2-1
Network Control data channel, 3-3, 3-7
Network Corporate Security, 6-4
Network I Toll Access Code, 4-16, 7-4
night
service, 4-9
shut-down procedure, 4-19
North American Dialing Plan, 4-35, 10-1
NSAC, see National Service Assistance Center
Numbering Plan
area, 4-31, 10-9
defining, 4-48
O
Observe Remotely feature, 4-69
Originating Line Screening, 5-63
Origination Restriction, 7-4
OTTOTT, see Outgoing Trunk to Outgoing Trunk Transfer
outcalling, 6-24, 6-39, 6-56, 6-58, 6-60
limiting, 6-28, 6-43