Instruction manual

Index
Issue 9 May 2003 (draft) IN-5
Feature Access Code, 2-5
Abbreviated Dialing, 5-9
ARS/AAR, 5-9
Call Forwarding, 5-9
Data Origination, 5-9
Data Privacy, 5-9
Data Restriction, 5-9
Facility Test Calls, 5-9
firewalls, 3-2
FNPA, see Foreign Numbering Plan Area
Forced Entry of Account Code, 5-24, 5-47
Forced Password Aging, 5-52
Foreign Numbering Plan Area, 5-34, 5-35, 5-37
free call list, 5-20
AAR/ARS calls, 5-20
TAC calls, 5-20
FRL, see Facility Restriction Level
Fully Restricted Service, 5-16, 5-31
FX trunks, 4-2
G
G3-MA, see Generic 3 Management Application
G3-MT, see Generic 3 Management Terminal
Generic 3 Management Application, 4-6, 5-59
invalid login attempts, 5-64
Generic 3 Management Terminal, 5-55, 5-59, 7-14, 8-10
H
hackers, 2-2
800 numbers, 4-2
accessing automated attendant systems, 4-3
random number generators, 2-2, 4-2
Highest Extension, 8-19
holding time
long, 5-55, 5-56, 5-57, 8-11
short, 5-53, 5-54, 5-55, 5-56, 5-57, 6-63, 8-11, 15-1
I
INADS port, 5-51
individual and group-controlled restrictions, 5-21
individualized calling privileges
providing, 5-31
intercept tone, 5-25
call routing, 5-31
intercept treatment, 5-38
Interexchange Carrier, 2-7, 6-62
internal abusers, 2-8
international
calls, 5-34, 5-35
disallowing, 6-62
operator, 5-35
INTUITY AUDIX Voice Messaging System, 7-41
logins, 7-22
password
protecting, 7-22, 7-42
protecting, 7-41
protecting the system, 7-16
security checklists, 17-4
security considerations, 7-23
INTUITY System
automated attendant, 8-18
password
changing, 14-6
Inward Restriction, 8-4
IP
security, 3-1
IP telephony networks, 3-1
IXC, see Interexchange Carrier
L
LDN, see Listed Directory Number
LEC, see Local Exchange Carrier
list bcms trunk command, 5-58
list call forwarding command, 5-70
list data module command, 4-7
list history command, 5-68
list hunt group command, 4-7
list measurements command, 5-56
list performance command, 5-56
Listed Directory Number, 5-10, 7-27, 8-17
lobby
telephones, 5-38
Local Exchange Carrier, 2-7
log
Real-Time Exception, 5-58
Trunk Group Exceptions, 5-58
login
invalid attempts, 5-59
Login Violations Status Report, 5-64, 5-65
logins, 5-52
assigned during installation, 5-29
bcms, 5-28, 5-46
browse, 5-28, 5-46
cust, 5-28, 5-46
invalid attempts, 5-60, 5-62
NMS, 5-28
rcust, 5-28, 5-46
storing, 4-6
logoff screen, 5-12
looping, 2-3, 2-7
loop-start trunks, 6-15, 6-62
trunk to trunk transfers, 6-62
Lowest Extension, 8-19