Instruction manual
Index
IN-6 Issue 9 May 2003 (draft)
M 
maintenance access, 4-7 
maintenance port, 4-9 
target of abuse, 2-4 
Malicious Call Trace, 5-68 
Manager I, 7-14 
reporting, 5-55, 8-10 
Manager III/IV, 4-6 
Manual Terminating Line Restriction, 8-4 
Measurement Selection 
ARS, 5-56, 7-15, 8-11 
measurements 
BCMS, 5-58 
CMS, 5-58 
MERLIN Attendant, 8-19, 8-20 
MERLIN II Communications System 
protecting DISA, 6-5 
security checklists, 17-27 
security goals and tools, 4-14 
security tips, 6-5 
voice mail, 7-35 
MERLIN LEGEND Communications System 
allowed and disallowed lists, 6-9 
preventative measures, 6-8 
Remote Access, 6-12 
security checklists, 17-29 
security goals and tools, 4-14 
setting facility restriction levels, 6-10 
star codes, 6-9 
voice mail, 7-38 
MERLIN LEGEND Mail Voice Messaging System, 7-45 
automated attendant 
protecting, 7-45 
password 
changing, 14-8 
protecting, 7-46 
MERLIN MAIL R3 Voice Messaging System, 7-45 
automated attendant, 8-20 
protecting, 7-45 
password 
changing, 14-8 
protecting, 7-46 
security checklists, 17-36 
security tips, 7-46 
MERLIN MAIL Voice Messaging System, 7-45 
automated attendant, 8-19, 8-20 
protecting, 7-45 
password 
changing, 14-7 
protecting, 7-36, 7-46 
ports, 7-35 
protecting, 7-35 
security checklists, 17-32 
security tips, 7-36, 7-46 
MERLIN MAIL-ML Voice Messaging System, 7-45 
automated attendant, 8-20 
protecting, 7-45 
password 
changing, 14-7 
protecting, 7-46 
security checklists, 17-34 
security tips, 7-46 
MERLIN Plus Communications System 
protecting Remote Call Forwarding, 6-60 
protecting Remote Line Access, 6-59 
Remote Line Access, 6-59 
security checklists, 17-39 
security goals and tools, 4-14 
Message Delivery, 7-21, 7-26, 8-15 
Miscellaneous Trunk Restrictions, 7-6, 7-7, 8-3, 8-4 
modem 
flashing switch-hook, 4-3 
protecting ports, 4-3 
monitor command, 5-46 
Monitor I, 5-55, 7-14, 8-10, 8-11, 8-13 
monitor security-violations command, 5-59, 5-64 
Multimedia Communications Exchange Server 
security checklists, 17-40 
Multipoint Conferencing Unit 
protecting the system, 9-4 
security checklists, 17-46 
N 
NETCON, see Network Control data channel 
Network 3, 5-38, 7-11, 8-7 
network access 
unauthorized, 2-1 
Network Control data channel, 4-3, 4-7 
Network Corporate Security, 7-4 
Network I Toll Access Code, 5-18, 8-5 
network, IP, 3-1 
night 
service, 5-10 
shut-down procedure, 5-21 
North American Dialing Plan, 5-36, 11-1 
NSAC, see National Service Assistance Center 
Numbering Plan 
area, 5-32, 11-10 
defining, 5-50 
O 
Observe Remotely feature, 5-70 
Originating Line Screening, 6-62 
Origination Restriction, 8-4 
OTTOTT, see Outgoing Trunk to Outgoing Trunk Transfer 










