Instruction manual
Security risks
4-12 Issue 9 May 2003
Limit calling 
permissions
COS (G2 and 
System 85 only)
Set COS 
restrictions
COR (G1, G3, 
and System 75 
only)
Set FRL
Set calling party 
restrictions or 
outward 
restrictions
Set COR to COR 
restrictions
Require account 
code before calls
Forced entry of 
account code
Set account code 
length
Administer as 
required
Create 
time-dependent 
limits on access 
to route patterns
Alternate FRL 
(G2 and G3r 
only)
Set lowest value 
possible
Suppress dial 
tone after 
ARS/WCR 
feature access 
code
Suppress dial 
tone
Turn off 
ARS/WCR dial 
tone
Screen all 
AAR/ARS calls
World class 
routing (G2.2 and 
G3 only)
Administer all 
capabilities
Table 4-1. Security goals: DEFINITY ECS, DEFINITY communications 
systems, System 75 and System 85 — Continued 
Security Goal Method Security Tool Steps
Continued on next page










