Instruction manual

Large business communications systems
5-56 Issue 9 May 2003
To review the traffic measurements, enter list measurements followed by
one of the measurement types (trunk-groups, call-rate, call-summary,
outage-trunk, or security-violations) and the timeframe
(yesterday-peak, today-peak, or last-hour).
To review performance, enter list performance followed by one of the
performance types (summary or trunk-group) and the timeframe
(yesterday or today).
ARS measurement selection
The ARS Measurement Selection feature can monitor up to 20 routing patterns
(25 for Communication Manager, MultiVantage™ Software, DEFINITY ECS and
DEFINITY G3) for traffic flow and usage.
For Communication Manager, MultiVantage™ Software, DEFINITY ECS,
DEFINITY G1, G3, and System 75:
Enter change ars meas-selection to choose the routing patterns you want
to track.
Enter list measurements route-pattern followed by the timeframe
(
yesterday, today, or last-hour) to review the measurements.
Automatic circuit assurance
This monitoring technique detects a pattern of short holding time calls or a single
long holding time call which may indicate hacker activity. Long holding times on
trunk-to-trunk calls can be a warning sign. The Automatic Circuit Assurance
(ACA) feature allows you to establish time limit thresholds defining what is
considered a short holding time and a long holding time. When a violation occurs,
a designated station is notified. A display message accompanies the referral call.
If the switch is equipped with a speech synthesis board, an audible message
accompanies the call.
When a notification occurs, determine if the call is still active. If toll fraud is
suspected (for example, aca-short or aca-long is displayed on the designated
phone), use the busy verification feature (see ‘‘Busy verification’’ on page 5-70
) to
monitor the call in progress.
When hacker activity is present and remote access is enabled, there is usually a
burst of short holding times as the hacker attempts to break the barrier code or
authorization code protection, or long holding time calls after the hacker is
successful. An ACA alarm on a remote access trunk should be considered a
potential threat and investigated immediately. If the call is answered by an
automated attendant, a hacker may be attempting to gain access to the system
facilities using TACs.