Technical information

Contents
Issue 7 June 2001 ix
MERLIN Mail/MERLIN LEGEND Mail/MERLIN
Messaging Toll Fraud at a Glance 5-46
LEGEND/MAGIX Toll Fraud Check List 5-46
LEGEND TOLL FRAUD INTERVENTION FORM 5-52
MERLIN Plus Communications System 5-60
Protecting Remote Line Access (R2 only) 5-60
Security Tips 5-60
Protecting Remote Call Forwarding (R2 only) 5-61
PARTNER II Communications System 5-62
PARTNER Plus Communications System 5-62
System 25 5-63
Protecting Remote Access 5-63
Security Tips 5-64
Protecting Remote System Administration 5-64
Security Tips 5-65
6 Voice Messaging Systems 6-1
Protecting Voice Messaging Systems 6-2
Security Tips 6-3
DEFINITY ECS, DEFINITY
Communications Systems, System 75,
and System 85 6-4
Tools that Prevent Unauthorized Calls 6-5
Facility Restriction Levels 6-5
Station-to-Trunk Restrictions 6-6
Class of Restriction 6-6
Class of Service 6-7
Toll Analysis 6-7
Security Measures in the PBX 6-7
Limit Voice Mail to Internal Calling 6-8
Restrict the Outside Calling Area 6-8
Allow Calling Only to Specified Numbers 6-10
Detecting Voice Mail Fraud 6-11
Call Detail Recording (CDR) / Station Message
Detail Recording (SMDR) 6-12