Instruction manual
Large business communications systems security tools 
by release
18-6 Issue 9 May 2003
Facility Restriction 
Levels
‘‘Class of restriction’’ 
on page 5-14
‘‘Facility restriction 
level’’ on page 5-19
‘‘Facility restriction 
levels’’ on page 7-6
‘‘Facility restriction 
levels’’ on page 8-2
xxxxxxxxx
Feature Access 
Code 
Administration
‘‘Known toll fraud 
activity’’ on page 2-4
‘‘Feature access 
code administration’’ 
on page 5-9
xxxxxxxxx
Forced Entry of 
Account Code
‘‘Forced entry of 
account code’’ on 
page 5-24
‘‘Require account 
codes’’ on page 
5-47
xxxxxxxxx
Forced Password 
Aging
‘‘Forced password 
aging and 
administrable 
logins’’ on page 5-52
xxx
Free Call List ‘‘Free call list’’ on 
page 5-20
xx
Fully Restricted 
Service
‘‘Calling party and 
called party 
restrictions’’ on page 
5-15
‘‘Fully restrict 
service’’ on page 
5-31
xxxxxxxxx
INADS Port 
Access 
Restrictions
‘‘Adding customer 
logins and assigning 
initial password’’ on 
page 13-13
xx
Table 18-1. Large Business communications systems security tools by release 
 — Continued 
Feature See Section/Page S75 S85 G1 G2 G3V1 G3V2 G3V3 G3V4
ECS 
R5 & 
later
Continued on next page










