Instruction manual
Issue 9 May 2003 17-1
17
Product security checklists
NOTE:
Unless specifically stated otherwise, references in this document to “G3Vx
and later” include the specified DEFINITY G3 (and more recent) versions,
DEFINITY ECS, MultiVantage™ Software, and Communication Manager.
This chapter contains the following security checklists:
■ General security procedures (page 17-2)
■ AUDIX Voice Mail System (page 17-4)
■ AUDIX Voice Power System (page 17-6)
■ BasicWorks (page 17-8)
■ CONVERSANT Voice Information System (page 17-12)
■ DEFINITY G1 (page 17-14), G2 (page 17-20), and G3 (page 17-14)
■ DEFINITY AUDIX System (page 17-4)
■ DIMENSION PBX System and Communication Manager, MultiVantage™
Software, and DEFINITY ECS (page 17-24
)
■ INTUITY AUDIX Voice Messaging System (page 17-4)
■ MERLIN II Communications System (page 17-27)
■ MERLIN LEGEND Communications System (page 17-29)
■ MERLIN MAIL Voice Messaging System (page 17-32)
■ MERLIN MAIL-ML Voice Messaging System (page 17-34)
■ MERLIN MAIL R3 Voice Messaging System (page 17-36)
■ MERLIN Plus Communications System (page 17-39)
■ Messaging 2000 Voice Mail System (page 17-40)
■ Multimedia Communications Exchange Server (page 17-45)
■ Multipoint Conferencing Unit (MCU)/Conference Reservation and Control
System (CRCS) (page 17-46
)
■ PARTNER II Communications System (page 17-56)