Technical information
Large Business Communications Systems
4-12 Issue 7 June 2001
Tools that Restrict Unauthorized
Outgoing Calls
Use the following tools to prevent fraudulent calls and monitor long distance
usage. (See Table 4-2.)
Table 4-2. Security Tools for Outgoing Calls
Security Tool Switch Page
Class of Restriction DEFINITY ECS, DEFINITY G1, G3,
and System 75
4-13
Class of Service All 4-16
Facility Restriction Levels All 4-17
Alternate Facility Restriction
Levels
DEFINITY ECS, DEFINITY G2, G3,
and System 85
4-18
Toll Analysis DEFINITY ECS and DEFINITY G3 4-18
Free Call List All 4-18
AAR/ARS Analysis DEFINITY ECS, DEFINITY G1,
G2.1, G3, System 75, System 85
4-18
ARS Dial Tone All 4-19
Station Restrictions All 4-19
Fully Restricted Service All 4-30
Recall Signaling DEFINITY ECS, DEFINITY G1, G3,
and System 75
4-19
Attendant-Controlled Voice
Terminals
All 4-19
Restrictions—Individual and
Group-Controlled
DEFINITY ECS, DEFINITY G1, G3,
and System 75
4-20
Central Office Restrictions All 4-20
Restricting Incoming Tie Trunks All 4-21
Monitoring Trunks DEFINITY ECS and DEFINITY G1
and G3
4-45
Terminal Translation
Initialization
DEFINITY ECS, DEFINITY G2,
G3r, G3V2, System 85
4-45
Authorization Codes DEFINITY ECS, DEFINITY G1, G2,
G3, System 75 (R1V3), System 85
4-21