Instruction manual
Index
IN-10 Issue 9 May 2003 (draft)
traffic 
abnormal patterns, 8-10 
measurements, 5-55 
monitoring flow, 5-56 
reports, 7-19, 7-30, 8-13 
Trans Talk 9000 Digital Wireless System 
security tips, 9-9 
Transfer Out of AUDIX, 7-25 
disabling, 7-28 
transfers 
limiting, 8-5 
Traveling Class Mark, 5-46, 5-49 
Trouble Tracker, 4-6 
trunk 
800 service, 4-2 
AAR, 5-8 
administration, 5-9 
ARS, 5-8, 5-47 
CO, 4-2, 5-16, 5-17, 5-20, 8-4, 8-5 
disabling direct access, 5-39 
FX, 4-2, 5-16, 5-17, 8-4, 8-5 
loop-start, 6-62 
monitoring, 5-46 
outgoing, 5-47 
public network, 5-16 
Remote Access, 4-2 
tie, 5-15, 5-22 
WATS, 5-17, 5-19, 5-23, 5-32, 5-43, 8-4, 8-5 
WCR, 5-8, 5-47 
Trunk Access Code, 2-5, 5-16, 5-35, 5-36, 5-45, 5-46, 5-49, 
5-70, 7-2, 7-6, 7-26, 8-3, 8-16 
obtaining outgoing trunk, 5-9 
Trunk Group Report, 7-14, 8-10, 8-13 
trunk groups 
800, 5-3 
attendant control, 5-40 
CO, 4-2 
outgoing, 5-11, 5-16 
Remote Access, 4-2 
two-way, 5-16 
trunk override, 5-23 
trunk test call, 5-40 
Trunk Turnaround 
Distributed Communication System, 5-44 
Trunk Verification, 7-6, 8-3 
Trunk-to-Trunk Transfer 
disallowing, 5-43, 7-60 
restriction override, 17-17 
Trusted server 
definition, 7-18 
overview, 7-18 
TTI, see Terminal Translation Initialization 
U 
UDP, see Uniform Dial Plan 
Unattended Console Service, 5-10, 5-38 
Unauthorized Call Control table, 7-10 
unauthorized calls 
preventing, 7-5 
Uniform Dial Plan, 5-15 
United States Criminal Code, 2-2 
unrestricted call list, 5-19 
usage 
monitoring, 5-56 
V 
VDN, see Vector Directory Number 
Vector Directory Number, 5-10, 5-11 
authorization code, 5-9 
COR, 5-11 
Verify button, 5-70 
Video Conference, see Multipoint Control Unit 
Virtual Nodepoint Identifier, 7-10, 7-11, 8-6, 8-7 
VMAAP 
securing, 4-6 
VNI, see Virtual Nodepoint Identifier 
voice mail, 2-1, 2-5, 2-6, 2-8, 4-4 
cellular phones, 7-3 
DEFINITY Communications System, 7-4 
DEFINITY ECS, 7-4 
detecting toll fraud, 7-12 
limiting, 7-8 
MERLIN II Communications System, 7-35 
MERLIN LEGEND Communications System, 7-38 
PARTNER II Communications System, 7-55 
PARTNER Plus Communications System, 7-57 
protecting, 7-2 
security risks, 4-4 
System 25, 7-60 
System 75, 7-4 
System 85, 7-4 
Voice Session Record, 7-19 
voice mailboxes 
deleting unused, 4-9 
maximum invalid attempts allowed, 4-9 
passwords, 4-8 
unassigned, 4-4, 7-3 
voice messaging systems 
automated attendant, 4-3 
transfer command, 4-4 










