Instruction manual

Security risks
4-12 Issue 9 May 2003
Limit calling
permissions
COS (G2 and
System 85 only)
Set COS
restrictions
COR (G1, G3,
and System 75
only)
Set FRL
Set calling party
restrictions or
outward
restrictions
Set COR to COR
restrictions
Require account
code before calls
Forced entry of
account code
Set account code
length
Administer as
required
Create
time-dependent
limits on access
to route patterns
Alternate FRL
(G2 and G3r
only)
Set lowest value
possible
Suppress dial
tone after
ARS/WCR
feature access
code
Suppress dial
tone
Turn off
ARS/WCR dial
tone
Screen all
AAR/ARS calls
World class
routing (G2.2 and
G3 only)
Administer all
capabilities
Table 4-1. Security goals: DEFINITY ECS, DEFINITY communications
systems, System 75 and System 85 — Continued
Security Goal Method Security Tool Steps
Continued on next page