Instruction manual
Index
IN-8 Issue 9 May 2003 (draft)
Remote Access, (continued) 
Status Report, 5-64 
status report, 5-64 
System 25, 6-62 
System 75, 5-2 
System 85, 5-2 
Violations Status Report, 5-65 
Remote Administration Unit, 4-20, 6-61 
Remote Call Forwarding, 6-15, 6-60 
used with loop-start trunks, 6-15 
Remote Home Numbering Plan Area, 5-37 
Remote Line Access, 6-59 
Remote Maintenance Board, 7-33 
Remote Maintenance Device, 6-62 
Remote Port Security Device, 16-1 
remote service observing, 5-70 
Remote System Administration 
System 25, 6-63 
Remote System Programming, 6-14 
Remote User Administration of Call Coverage, 5-27 
reports 
Authorization Code Violations Status, 5-64 
Call Accounting System, 6-6, 6-13, 6-60, 6-63, 7-35, 7-37, 
7-47, 7-56, 7-58 
call traffic, 7-14, 8-10, 8-13 
distributed, 4-9 
G3-MT, 5-55, 8-10 
Manager I, 5-55, 8-10 
Recent Change History, 5-68 
Remote Access status, 5-64 
SAT, 5-55, 8-10 
securing, 4-9 
Security Measurement, 5-52 
Security Violations, 13-18 
Security Violations Measurement, 5-60 
Security Violations Status, 5-59 
sending to attendant, 5-57 
SMDR, 6-13, 6-60, 6-63, 7-13, 7-35, 7-37, 7-47, 7-56, 7-58, 
7-60 
traffic, 8-13 
trunk group, 7-14, 8-10, 8-13 
Restriction Override, 5-50 
restrictions 
calling party and called party, 5-15 
individual and group-controlled, 5-21 
originating station, 5-15 
originating trunk, 5-15 
switch translation, 7-30, 7-35 
RHNPA, see Remote Home Numbering Plan Area 
RMB, see Remote Maintenance Board 
routing 
patterns, 5-56 
Time of Day, 5-24, 5-59 
RPSD, see Remote Port Security Device 
S 
SAT, see System Administrator Tool 
screening 
6-digit, 2-8 
securing the INADS port, 5-51 
Security 
administration and management, 3-3 
administrator passwords, 7-17 
firewall, 3-2 
IP, 3-1 
virus transmission via e-mail, 7-19 
security checklist 
AUDIX Voice Mail System, 17-4 
security checklists 
AUDIX Voice Power System, 17-6 
BasicWorks, 17-8 
Conference Reservation and Control System, 17-46 
CONVERSANT Voice Information System, 17-12 
DEFINITY AUDIX Voice Messaging System, 17-4 
DEFINITY Communications System G1, 17-14 
DEFINITY Communications System G2, 17-20 
DEFINITY Communications System G3, 17-14 
DEFINITY ECS, 17-14 
DIMENSION PBX System, 17-24 
INTUITY AUDIX Voice Messaging System, 17-4 
MERLIN II Communications System, 17-27 
MERLIN LEGEND Communications System, 17-29 
MERLIN MAIL R3 Voice Messaging System, 17-36 
MERLIN MAIL Voice Messaging System, 17-32 
MERLIN MAIL-ML Voice Messaging System, 17-34 
MERLIN Plus Communications System, 17-39 
Multimedia Communications Exchange Server, 17-40 
Multipoint Conferencing Unit, 17-46 
System 75, 17-14 
System 85, 17-20 
Security Measurement reports, 5-52 
security risks 
port, 4-3 
Security Tools for Outgoing Calls, 5-13 
Security Tools for Remote Access, 5-4 
Security Violation Notification feature, 5-59 
referral call, 5-59 
Security Violations 
measurement report, 5-60, 5-62 
report, 13-18 
status report, 5-59 
Security Violations Detail Report, 5-63 
Security Violations Summary Report, 5-62 
sending 
overlapped, 5-49 
service observing, 5-69, 5-70 
shoulder surfing, 2-6 
six-digit screening, 2-8 










