Instruction manual
Automated attendant
8-2 Issue 9 May 2003
■ AUDIX Voice Mail System owners: use the Enhanced Call Transfer feature. 
Apply the appropriate security measures described in Chapter 7
.
Tools that prevent unauthorized calls
You can help prevent unauthorized callers who enter the automated attendant 
system from obtaining an outgoing facility by using the security tools shown in 
Table 8-1
.
Facility restriction levels
The switch treats all the PBX ports used by automated attendant systems as 
stations. Therefore, each automated attendant port can be assigned a COR with 
an associated FRL. FRLs provide for eight different levels of restrictions for 
AAR/ARS/WCR calls. FRLs are used in combination with calling permissions and 
routing patterns and/or preferences to determine where calls can be made. FRLs 
range from 0 to 7, with each number representing a different level of restriction (or 
no restrictions at all).
The FRL is used for the AAR/ARS/WCR feature to determine call access to an 
outgoing trunk group. Outgoing call routing is determined by a comparison of the 
FRLs in the AAR/ARS/WCR routing pattern to the FRL associated with the 
COR/COS of the call originator.
Table 8-1. Automated attendant security tools
Security Tool Switch Page #
Enhanced call transfer (see 
‘‘Protecting the AUDIX, 
DEFINITY AUDIX, and Avaya 
INTUITY Voice Mail Systems’’)
Communication Manager, 
MultiVantage™ Software, 
DEFINITY ECS, DEFINITY 
G1, G2, G3, System 75 R1V3 
Issue 2.0, System 85 R2V4
7-16
Facility restriction levels* 
(FRLs)
All 8-2
Station-to-trunk restrictions* All 8-3
Class of restriction (COR) Communication Manager, 
MultiVantage™ Software, 
DEFINITY ECS, DEFINITY 
G1, G3, and System 75
8-3
Class of service (COS) DEFINITY G2 and System 85 8-4
Toll analysis Communication Manager, 
MultiVantage™ Software, 
DEFINITY ECS, DEFINITY 
G1, G2, G3, and System 85
8-5










