Instruction manual
Index
Issue 9 May 2003 (draft) IN-3
Call Forward Off-Net, 5-17, 7-7, 8-4
Call Forwarding, 2-8, 5-70
Feature Access Code, 5-9
call list, 7-7, 8-5
free, 5-20
specifying, 5-19
unrestricted, 5-19, 7-29
Call Management System
helplines, 9-2
log, 5-58
Measurements, 5-58
securing, 4-6
security tips, 9-1
call pager, 7-29
scam, 2-7
Call Prompting, 5-11
call sell operations, 2-2
Call Traffic Report, 7-14, 8-10, 8-13
Call Vectoring, 5-10, 5-11, 5-33
call volume increases, 5-55
calling
out-of-hours, 6-6, 6-13, 6-59
restricting by area, 7-8
calling cards, 2-3, 2-5, 2-7
CallMaster PC
security tips, 9-3
CAS Plus, see Call Accounting System Plus
CDR, see Call Detail Recording
cellular phones, 7-3
Central Office restrictions, 5-22
Centralized Attendant Service, 5-31
Centralized System Management
securing, 4-6
change remote-access command, 13-6
change station command, 5-70
change system-parameters features command, 13-7
change system-parameters features security command, 13-6
change system-parameters security command, 13-2, 13-4
circuit pack
TN744 Call Classifier, 5-40, 5-41
Tone Detector, 5-40, 5-41
Class of Restriction, 5-14, 5-31, 7-7, 8-3
3-way calling, 5-17
authorization code, 5-14
barrier code, 5-14
blocking access, 5-11
Facility Access Trunk test option, 5-40
maximum allowed, 5-14, 7-7, 8-3
outward-restricted, 5-30
Remote Access, 5-30
VDN, 5-16
Class of Service, 5-17, 7-7, 8-4
clear measurements security-violations command, 5-52
CMS, see Call Management System
CO trunks, 4-2
code
account, 7-57, 7-59
authorization, 4-2, 5-3, 7-36, 7-46, 7-57, 7-59, 7-60
barrier, 4-2, 5-3, 5-5
restriction, 5-16
Code Restriction Level, 8-4
command
add/change login, 13-7
change remote-access, 13-6
change station, 5-70
change system-parameters features, 13-7
change system-parameters features security, 13-6
change system-parameters security, 13-2, 13-4
clear measurements security-violations, 5-52
disable remote-access, 13-7
enable remote-access, 13-6
list bcms trunk, 5-58
list call forwarding, 5-70
list data module, 4-7
list history, 5-68
list hunt group, 4-7
list measurements, 5-56
list performance, 5-56
monitor, 5-46
monitor security-violations, 5-59, 5-64
status remote access, 5-12
verify, 5-70
Committee of the Alliance for Telecommunications, 1-8
con games, 2-6, 2-8
Conference Reservation and Control System
protecting the system, 9-4
security checklists, 17-46
conferencing, 7-35
console
attendant, 5-70, 7-27, 8-13
key, 5-40
permissions, 5-18
converged networks, 3-1
CONVERSANT Voice Information System
automated attendant, 8-18
password
changing, 14-2
remote maintenance board, 7-33
security checklists, 17-12
security tips, 7-35
COR-to-COR restrictions, 5-16, 5-49
NETCON, 4-7
credit card calls, 2-3, 2-5, 2-7
D
DAC, see Dial Access Code
data channel, 4-3
Data Origination
Feature Access Code, 5-9