Technical information
Index
IN-10 Issue 7 June 2001
traffic
abnormal patterns, 7-10
measurements, 4-53
monitoring flow, 4-55
reports, 6-18, 6-29, 7-13
Trans Talk 9000 Digital Wireless System
security tips, 8-9
Transfer Out of AUDIX, 6-24
disabling, 6-27
transfers
limiting, 7-5
Traveling Class Mark, 4-44, 4-45, 4-48
Trouble Tracker, 3-6
trunk
800 service, 3-2
AAR, 4-7
administration, 4-8
ARS, 4-7, 4-45
CO, 3-2, 4-14, 4-16, 4-18, 7-4
disabling direct access, 4-38
FX, 3-2, 4-14, 4-16, 7-4
loop-start, 5-63
monitoring, 4-45
outgoing, 4-45
public network, 4-14
Remote Access, 3-2
tie, 4-14, 4-21
WATS, 4-16, 4-18, 4-21, 4-31, 4-42, 7-4
WCR, 4-7, 4-45
Trunk Access Code, 2-5, 4-14, 4-34, 4-35, 4-44, 4-48, 4-69, 6-2,
6-6, 6-25, 7-3, 7-16
obtaining outgoing trunk, 4-8
Trunk Group Report, 6-13, 7-10, 7-13
trunk groups
800, 4-2
attendant control, 4-39
CO, 3-2
outgoing, 4-10, 4-15
Remote Access, 3-2
two-way, 4-15
trunk override, 4-22
trunk test call, 4-39
Trunk Turnaround
Distributed Communication System, 4-43
Trunk Verification, 6-6, 7-3
Trunk-to Trunk Transfer
restriction override, 4-15
Trunk-to-Trunk Transfer
disallowing, 4-42, 6-59
restriction override, 16-17
Trusted server
definition, 6-17
overview, 6-17
TTI, see Terminal Translation Initialization
U
UDP, see Uniform Dial Plan
Unattended Console Service, 4-9, 4-37
Unauthorized Call Control table, 6-9
unauthorized calls
preventing, 6-5
Uniform Dial Plan, 4-14
unrestricted call list, 4-18
usage
monitoring, 4-55
V
VDN, see Vector Directory Number
Vector Directory Number, 4-9, 4-10
authorization code, 4-8
COR, 4-10
Verify button, 4-69
Video Conference, see Multipoint Control Unit
Virtual Nodepoint Identifier, 6-9, 6-11, 7-6, 7-7
VMAAP
securing, 3-6
VNI, see Virtual Nodepoint Identifier
voice mail, 2-1, 2-5, 2-6, 2-8, 3-4
cellular phones, 6-3
DEFINITY Communications System, 6-4
DEFINITY ECS, 6-4
detecting toll fraud, 6-11
limiting, 6-8
MERLIN II Communications System, 6-34
MERLIN LEGEND Communications System, 6-37
PARTNER II Communications System, 6-54
PARTNER Plus Communications System, 6-56
protecting, 6-2
security risks, 3-4
System 25, 6-59
System 75, 6-4
System 85, 6-4
Voice Session Record, 6-18
voice mailboxes
deleting unused, 3-9
maximum invalid attempts allowed, 3-9
passwords, 3-8
unassigned, 3-4, 6-3
voice messaging systems
automated attendant, 3-3
transfer command, 3-4
voice processing systems, 3-4
voice session record, 6-18, 7-13