Instruction manual
Detecting toll fraud
Issue 9 May 2003
5-51
Table 5-4 shows the reports and monitoring techniques that track system activity
and help detect unauthorized use:
Administration security
Logins for INADS port
For DEFINITY G3V4 and later, only Avaya logins can access the INADS port. If
the customer wants INADS access, Avaya must administer customer login
permission.
Table 5-4. Reports and monitoring techniques
Monitoring Technique Switch Page #
Administration security All 5-51
Call detail recording (CDR) / station
message detail recording (SMDR)
All 5-53
Traffic measurements/performance All 5-55
Automatic circuit assurance All 5-56
BCMS measurements G1 and G3 5-58
CMS measurements All 5-58
Security Violations Measurement
report
All 5-62
Security Violation Notification feature Communication Manager,
MultiVantage⢠Software,
DEFINITY ECS and
DEFINITY G3
5-59
Recent Change History report Communication Manager,
MultiVantage⢠Software,
DEFINITY ECS and
DEFINITY G1 and G3
5-68
Service observing All 5-69
Malicious call trace System 85 R2V4,
DEFINITY G2, G3r, G3V2
and later
5-68
list call-forwarding command DEFINITY G3V4 and later 5-70
Continued on next page