Instruction manual

Contents
Issue 9 May 2003 9
5 Large business communications systems 5-1
Keeping unauthorized third parties
from entering the system 5-2
Protecting the Remote Access feature 5-2
Security tips 5-2
Disabling/removing the Remote Access feature 5-3
Tools to protect the Remote Access feature 5-3
Barrier codes 5-5
Authorization codes 5-8
Feature access code administration 5-9
Trunk administration 5-9
Remote access dial tone 5-10
Night service 5-10
Call vectoring (Communication Manager,
MultiVantage Software, DEFINITY ECS
and DEFINITY G3) 5-10
Protecting vectors that contain call prompting 5-11
Command: status remote-access 5-12
Logoff screen notification 5-12
Tools that restrict unauthorized outgoing calls 5-13
Class of restriction 5-14
Calling party and called party restrictions 5-15
COR-to-COR restrictions/calling permissions 5-16
Restriction override (3-way COR check) 5-17
Class of service 5-17
Facility restriction level 5-19
Alternate facility restriction levels 5-19
Toll analysis (G3 only) 5-19
Free call list 5-20
AAR/ARS analysis 5-20
ARS dial tone 5-20
Station restrictions 5-20
Recall signaling (switchhook flash) 5-21
Attendant - controlled voice terminals 5-21