Instruction manual

Index
IN-2 Issue 9 May 2003 (draft)
authorization code, 5-3, 5-19, 5-22, 5-29, 5-30, 7-57, 7-59
invalid login attempts, 5-64
maximum allowed, 5-9
monitoring usage, 5-30
Network Access Flag set, 5-9
removing, 5-30
Time-Out to Attendant, 5-36
usage patterns, 6-13, 6-60
used with barrier code, 5-7
VDN, 5-9
Authorization Code Violations Status Report, 5-64, 5-66
auto dial button, 4-8
programming passwords, 7-3
automated attendant, 2-1, 2-5, 4-3, 7-19, 7-25, 7-28, 7-32, 7-40
adjunct equipment, 8-3
AUDIX Voice Mail System, 8-16
AUDIX Voice Power System, 8-17, 8-20, 8-22
CONVERSANT Voice Information System, 8-18
DEFINITY AUDIX Voice Messaging System, 8-18
DEFINITY Communications System, 8-1
INTUITY System, 8-18
MERLIN MAIL R3 Voice Messaging System, 8-20
MERLIN MAIL Voice Messaging System, 8-19, 8-20
MERLIN MAIL-ML Voice Messaging System, 8-20
nested, 8-14
PARTNER MAIL System, 8-21, 8-22
PARTNER MAIL VS System, 8-21, 8-22
ports, 8-5
restricting menu options, 8-5
security tools, 8-2
symptoms of abuse, 8-9
System 75, 8-1
System 85, 8-1
toll fraud detection, 8-8
Automatic Alternate Routing, 5-25
analysis, 5-20
setting FRLs, 5-15
Automatic Call Restriction Reset, 6-60
Automatic Circuit Assurance, 5-56, 8-11
referral calls, 5-57
Automatic Number Identification, 15-2
Automatic Route Selection, 5-20
Automatic Timeout, 6-60
B
barrier code, 5-3, 5-5, 5-29, 5-30, 5-36, 6-12, 6-14, 6-60, 6-63
aging, 5-67, 13-11
COR, 5-7, 5-14, 5-30
COS, 5-7
default expiration dates and upgrades, 5-67
invalid entry, 5-62
Basic Call Transfer, 7-23, 7-43
BasicWorks
security checklists, 17-8
BCMS Measurements, 5-58
beeper scam, 2-7
bridging to outbound call, 7-33, 7-34, 7-35
bulletin board, 2-6, 7-25
Busy Verification, 5-70, 7-16, 8-12
button, 5-70
button
act-tr-grp, 5-40
Alternate Facility Restriction Level, 5-34
asvn-call, 5-61
auto dial, 4-8, 7-3
Busy Verification, 5-70, 7-16, 8-13
deact-tr-grp, 5-40
Login SVN, 5-61
lsvn-call, 5-61
lsvn-halt, 13-3
night service, 5-10
Remote Access SVN, 5-61
rsvn-call, 5-61
rsvn-halt, 13-5
trk-ac-alm, 5-42
Verify, 5-70, 8-13
C
call
ACA referral, 5-57
allowing to specified numbers, 7-10, 8-6
disallowing outbound, 7-26, 8-16
FX, 7-9
international, 5-34, 5-35
monitoring, 5-56, 5-69, 8-11
private network, 5-16, 7-9
public network, 5-20
Remote Access
sending to attendant, 5-36
Tandem Tie Trunk, 5-39
toll, 8-5
Transfer Out of AUDIX, 8-16
trunk-to-trunk, 5-56, 8-11
volume
tracking, 5-55
WATS, 7-9
Call Accounting System Plus, 5-54
Call Accounting System reports, 6-6, 6-13, 6-60, 6-63, 7-35,
7-37, 7-47, 7-56, 7-58, 7-60
call attempt
invalid, 5-31, 5-54, 5-59, 6-60, 6-62, 6-63, 8-5, 8-6
Call Detail Recording, 2-4, 5-30, 7-13, 7-19, 8-13
account code, 5-18
outgoing voice, 7-21, 8-15
required with FEAC, 5-24
reviewing for abuse, 5-54
call diverters, 2-7
call flow through PBX system, 10-1
Call Forward Follow Me, 5-17, 7-7, 8-4
Call Forward Off/On-Net, 5-18