Instruction manual
Index
IN-2 Issue 9 May 2003 (draft)
authorization code, 5-3, 5-19, 5-22, 5-29, 5-30, 7-57, 7-59 
invalid login attempts, 5-64 
maximum allowed, 5-9 
monitoring usage, 5-30 
Network Access Flag set, 5-9 
removing, 5-30 
Time-Out to Attendant, 5-36 
usage patterns, 6-13, 6-60 
used with barrier code, 5-7 
VDN, 5-9 
Authorization Code Violations Status Report, 5-64, 5-66 
auto dial button, 4-8 
programming passwords, 7-3 
automated attendant, 2-1, 2-5, 4-3, 7-19, 7-25, 7-28, 7-32, 7-40 
adjunct equipment, 8-3 
AUDIX Voice Mail System, 8-16 
AUDIX Voice Power System, 8-17, 8-20, 8-22 
CONVERSANT Voice Information System, 8-18 
DEFINITY AUDIX Voice Messaging System, 8-18 
DEFINITY Communications System, 8-1 
INTUITY System, 8-18 
MERLIN MAIL R3 Voice Messaging System, 8-20 
MERLIN MAIL Voice Messaging System, 8-19, 8-20 
MERLIN MAIL-ML Voice Messaging System, 8-20 
nested, 8-14 
PARTNER MAIL System, 8-21, 8-22 
PARTNER MAIL VS System, 8-21, 8-22 
ports, 8-5 
restricting menu options, 8-5 
security tools, 8-2 
symptoms of abuse, 8-9 
System 75, 8-1 
System 85, 8-1 
toll fraud detection, 8-8 
Automatic Alternate Routing, 5-25 
analysis, 5-20 
setting FRLs, 5-15 
Automatic Call Restriction Reset, 6-60 
Automatic Circuit Assurance, 5-56, 8-11 
referral calls, 5-57 
Automatic Number Identification, 15-2 
Automatic Route Selection, 5-20 
Automatic Timeout, 6-60 
B 
barrier code, 5-3, 5-5, 5-29, 5-30, 5-36, 6-12, 6-14, 6-60, 6-63 
aging, 5-67, 13-11 
COR, 5-7, 5-14, 5-30 
COS, 5-7 
default expiration dates and upgrades, 5-67 
invalid entry, 5-62 
Basic Call Transfer, 7-23, 7-43 
BasicWorks 
security checklists, 17-8 
BCMS Measurements, 5-58 
beeper scam, 2-7 
bridging to outbound call, 7-33, 7-34, 7-35 
bulletin board, 2-6, 7-25 
Busy Verification, 5-70, 7-16, 8-12 
button, 5-70 
button 
act-tr-grp, 5-40 
Alternate Facility Restriction Level, 5-34 
asvn-call, 5-61 
auto dial, 4-8, 7-3 
Busy Verification, 5-70, 7-16, 8-13 
deact-tr-grp, 5-40 
Login SVN, 5-61 
lsvn-call, 5-61 
lsvn-halt, 13-3 
night service, 5-10 
Remote Access SVN, 5-61 
rsvn-call, 5-61 
rsvn-halt, 13-5 
trk-ac-alm, 5-42 
Verify, 5-70, 8-13 
C 
call 
ACA referral, 5-57 
allowing to specified numbers, 7-10, 8-6 
disallowing outbound, 7-26, 8-16 
FX, 7-9 
international, 5-34, 5-35 
monitoring, 5-56, 5-69, 8-11 
private network, 5-16, 7-9 
public network, 5-20 
Remote Access 
sending to attendant, 5-36 
Tandem Tie Trunk, 5-39 
toll, 8-5 
Transfer Out of AUDIX, 8-16 
trunk-to-trunk, 5-56, 8-11 
volume 
tracking, 5-55 
WATS, 7-9 
Call Accounting System Plus, 5-54 
Call Accounting System reports, 6-6, 6-13, 6-60, 6-63, 7-35, 
7-37, 7-47, 7-56, 7-58, 7-60 
call attempt 
invalid, 5-31, 5-54, 5-59, 6-60, 6-62, 6-63, 8-5, 8-6 
Call Detail Recording, 2-4, 5-30, 7-13, 7-19, 8-13 
account code, 5-18 
outgoing voice, 7-21, 8-15 
required with FEAC, 5-24 
reviewing for abuse, 5-54 
call diverters, 2-7 
call flow through PBX system, 10-1 
Call Forward Follow Me, 5-17, 7-7, 8-4 
Call Forward Off/On-Net, 5-18 










