Instruction manual
Index
Issue 9 May 2003 (draft) IN-5 
Feature Access Code, 2-5 
Abbreviated Dialing, 5-9 
ARS/AAR, 5-9 
Call Forwarding, 5-9 
Data Origination, 5-9 
Data Privacy, 5-9 
Data Restriction, 5-9 
Facility Test Calls, 5-9 
firewalls, 3-2 
FNPA, see Foreign Numbering Plan Area 
Forced Entry of Account Code, 5-24, 5-47 
Forced Password Aging, 5-52 
Foreign Numbering Plan Area, 5-34, 5-35, 5-37 
free call list, 5-20 
AAR/ARS calls, 5-20 
TAC calls, 5-20 
FRL, see Facility Restriction Level 
Fully Restricted Service, 5-16, 5-31 
FX trunks, 4-2 
G 
G3-MA, see Generic 3 Management Application 
G3-MT, see Generic 3 Management Terminal 
Generic 3 Management Application, 4-6, 5-59 
invalid login attempts, 5-64 
Generic 3 Management Terminal, 5-55, 5-59, 7-14, 8-10 
H 
hackers, 2-2 
800 numbers, 4-2 
accessing automated attendant systems, 4-3 
random number generators, 2-2, 4-2 
Highest Extension, 8-19 
holding time 
long, 5-55, 5-56, 5-57, 8-11 
short, 5-53, 5-54, 5-55, 5-56, 5-57, 6-63, 8-11, 15-1 
I 
INADS port, 5-51 
individual and group-controlled restrictions, 5-21 
individualized calling privileges 
providing, 5-31 
intercept tone, 5-25 
call routing, 5-31 
intercept treatment, 5-38 
Interexchange Carrier, 2-7, 6-62 
internal abusers, 2-8 
international 
calls, 5-34, 5-35 
disallowing, 6-62 
operator, 5-35 
INTUITY AUDIX Voice Messaging System, 7-41 
logins, 7-22 
password 
protecting, 7-22, 7-42 
protecting, 7-41 
protecting the system, 7-16 
security checklists, 17-4 
security considerations, 7-23 
INTUITY System 
automated attendant, 8-18 
password 
changing, 14-6 
Inward Restriction, 8-4 
IP 
security, 3-1 
IP telephony networks, 3-1 
IXC, see Interexchange Carrier 
L 
LDN, see Listed Directory Number 
LEC, see Local Exchange Carrier 
list bcms trunk command, 5-58 
list call forwarding command, 5-70 
list data module command, 4-7 
list history command, 5-68 
list hunt group command, 4-7 
list measurements command, 5-56 
list performance command, 5-56 
Listed Directory Number, 5-10, 7-27, 8-17 
lobby 
telephones, 5-38 
Local Exchange Carrier, 2-7 
log 
Real-Time Exception, 5-58 
Trunk Group Exceptions, 5-58 
login 
invalid attempts, 5-59 
Login Violations Status Report, 5-64, 5-65 
logins, 5-52 
assigned during installation, 5-29 
bcms, 5-28, 5-46 
browse, 5-28, 5-46 
cust, 5-28, 5-46 
invalid attempts, 5-60, 5-62 
NMS, 5-28 
rcust, 5-28, 5-46 
storing, 4-6 
logoff screen, 5-12 
looping, 2-3, 2-7 
loop-start trunks, 6-15, 6-62 
trunk to trunk transfers, 6-62 
Lowest Extension, 8-19 










