Instruction manual

Automated attendant
8-2 Issue 9 May 2003
AUDIX Voice Mail System owners: use the Enhanced Call Transfer feature.
Apply the appropriate security measures described in Chapter 7
.
Tools that prevent unauthorized calls
You can help prevent unauthorized callers who enter the automated attendant
system from obtaining an outgoing facility by using the security tools shown in
Table 8-1
.
Facility restriction levels
The switch treats all the PBX ports used by automated attendant systems as
stations. Therefore, each automated attendant port can be assigned a COR with
an associated FRL. FRLs provide for eight different levels of restrictions for
AAR/ARS/WCR calls. FRLs are used in combination with calling permissions and
routing patterns and/or preferences to determine where calls can be made. FRLs
range from 0 to 7, with each number representing a different level of restriction (or
no restrictions at all).
The FRL is used for the AAR/ARS/WCR feature to determine call access to an
outgoing trunk group. Outgoing call routing is determined by a comparison of the
FRLs in the AAR/ARS/WCR routing pattern to the FRL associated with the
COR/COS of the call originator.
Table 8-1. Automated attendant security tools
Security Tool Switch Page #
Enhanced call transfer (see
‘‘Protecting the AUDIX,
DEFINITY AUDIX, and Avaya
INTUITY Voice Mail Systems’’)
Communication Manager,
MultiVantage™ Software,
DEFINITY ECS, DEFINITY
G1, G2, G3, System 75 R1V3
Issue 2.0, System 85 R2V4
7-16
Facility restriction levels*
(FRLs)
All 8-2
Station-to-trunk restrictions* All 8-3
Class of restriction (COR) Communication Manager,
MultiVantage™ Software,
DEFINITY ECS, DEFINITY
G1, G3, and System 75
8-3
Class of service (COS) DEFINITY G2 and System 85 8-4
Toll analysis Communication Manager,
MultiVantage™ Software,
DEFINITY ECS, DEFINITY
G1, G2, G3, and System 85
8-5