Instruction manual
Index
IN-10 Issue 9 May 2003 (draft)
traffic
abnormal patterns, 8-10
measurements, 5-55
monitoring flow, 5-56
reports, 7-19, 7-30, 8-13
Trans Talk 9000 Digital Wireless System
security tips, 9-9
Transfer Out of AUDIX, 7-25
disabling, 7-28
transfers
limiting, 8-5
Traveling Class Mark, 5-46, 5-49
Trouble Tracker, 4-6
trunk
800 service, 4-2
AAR, 5-8
administration, 5-9
ARS, 5-8, 5-47
CO, 4-2, 5-16, 5-17, 5-20, 8-4, 8-5
disabling direct access, 5-39
FX, 4-2, 5-16, 5-17, 8-4, 8-5
loop-start, 6-62
monitoring, 5-46
outgoing, 5-47
public network, 5-16
Remote Access, 4-2
tie, 5-15, 5-22
WATS, 5-17, 5-19, 5-23, 5-32, 5-43, 8-4, 8-5
WCR, 5-8, 5-47
Trunk Access Code, 2-5, 5-16, 5-35, 5-36, 5-45, 5-46, 5-49,
5-70, 7-2, 7-6, 7-26, 8-3, 8-16
obtaining outgoing trunk, 5-9
Trunk Group Report, 7-14, 8-10, 8-13
trunk groups
800, 5-3
attendant control, 5-40
CO, 4-2
outgoing, 5-11, 5-16
Remote Access, 4-2
two-way, 5-16
trunk override, 5-23
trunk test call, 5-40
Trunk Turnaround
Distributed Communication System, 5-44
Trunk Verification, 7-6, 8-3
Trunk-to-Trunk Transfer
disallowing, 5-43, 7-60
restriction override, 17-17
Trusted server
definition, 7-18
overview, 7-18
TTI, see Terminal Translation Initialization
U
UDP, see Uniform Dial Plan
Unattended Console Service, 5-10, 5-38
Unauthorized Call Control table, 7-10
unauthorized calls
preventing, 7-5
Uniform Dial Plan, 5-15
United States Criminal Code, 2-2
unrestricted call list, 5-19
usage
monitoring, 5-56
V
VDN, see Vector Directory Number
Vector Directory Number, 5-10, 5-11
authorization code, 5-9
COR, 5-11
Verify button, 5-70
Video Conference, see Multipoint Control Unit
Virtual Nodepoint Identifier, 7-10, 7-11, 8-6, 8-7
VMAAP
securing, 4-6
VNI, see Virtual Nodepoint Identifier
voice mail, 2-1, 2-5, 2-6, 2-8, 4-4
cellular phones, 7-3
DEFINITY Communications System, 7-4
DEFINITY ECS, 7-4
detecting toll fraud, 7-12
limiting, 7-8
MERLIN II Communications System, 7-35
MERLIN LEGEND Communications System, 7-38
PARTNER II Communications System, 7-55
PARTNER Plus Communications System, 7-57
protecting, 7-2
security risks, 4-4
System 25, 7-60
System 75, 7-4
System 85, 7-4
Voice Session Record, 7-19
voice mailboxes
deleting unused, 4-9
maximum invalid attempts allowed, 4-9
passwords, 4-8
unassigned, 4-4, 7-3
voice messaging systems
automated attendant, 4-3
transfer command, 4-4