Instruction manual

Index
IN-6 Issue 9 May 2003 (draft)
M
maintenance access, 4-7
maintenance port, 4-9
target of abuse, 2-4
Malicious Call Trace, 5-68
Manager I, 7-14
reporting, 5-55, 8-10
Manager III/IV, 4-6
Manual Terminating Line Restriction, 8-4
Measurement Selection
ARS, 5-56, 7-15, 8-11
measurements
BCMS, 5-58
CMS, 5-58
MERLIN Attendant, 8-19, 8-20
MERLIN II Communications System
protecting DISA, 6-5
security checklists, 17-27
security goals and tools, 4-14
security tips, 6-5
voice mail, 7-35
MERLIN LEGEND Communications System
allowed and disallowed lists, 6-9
preventative measures, 6-8
Remote Access, 6-12
security checklists, 17-29
security goals and tools, 4-14
setting facility restriction levels, 6-10
star codes, 6-9
voice mail, 7-38
MERLIN LEGEND Mail Voice Messaging System, 7-45
automated attendant
protecting, 7-45
password
changing, 14-8
protecting, 7-46
MERLIN MAIL R3 Voice Messaging System, 7-45
automated attendant, 8-20
protecting, 7-45
password
changing, 14-8
protecting, 7-46
security checklists, 17-36
security tips, 7-46
MERLIN MAIL Voice Messaging System, 7-45
automated attendant, 8-19, 8-20
protecting, 7-45
password
changing, 14-7
protecting, 7-36, 7-46
ports, 7-35
protecting, 7-35
security checklists, 17-32
security tips, 7-36, 7-46
MERLIN MAIL-ML Voice Messaging System, 7-45
automated attendant, 8-20
protecting, 7-45
password
changing, 14-7
protecting, 7-46
security checklists, 17-34
security tips, 7-46
MERLIN Plus Communications System
protecting Remote Call Forwarding, 6-60
protecting Remote Line Access, 6-59
Remote Line Access, 6-59
security checklists, 17-39
security goals and tools, 4-14
Message Delivery, 7-21, 7-26, 8-15
Miscellaneous Trunk Restrictions, 7-6, 7-7, 8-3, 8-4
modem
flashing switch-hook, 4-3
protecting ports, 4-3
monitor command, 5-46
Monitor I, 5-55, 7-14, 8-10, 8-11, 8-13
monitor security-violations command, 5-59, 5-64
Multimedia Communications Exchange Server
security checklists, 17-40
Multipoint Conferencing Unit
protecting the system, 9-4
security checklists, 17-46
N
NETCON, see Network Control data channel
Network 3, 5-38, 7-11, 8-7
network access
unauthorized, 2-1
Network Control data channel, 4-3, 4-7
Network Corporate Security, 7-4
Network I Toll Access Code, 5-18, 8-5
network, IP, 3-1
night
service, 5-10
shut-down procedure, 5-21
North American Dialing Plan, 5-36, 11-1
NSAC, see National Service Assistance Center
Numbering Plan
area, 5-32, 11-10
defining, 5-50
O
Observe Remotely feature, 5-70
Originating Line Screening, 6-62
Origination Restriction, 8-4
OTTOTT, see Outgoing Trunk to Outgoing Trunk Transfer