User guide
4-12 The thru-dial service
Security issues
Standard 1.0 Voice Services Application Guide January 1998
• Identify the organization’s thru-dial policies.
Make sure the organization understands the advantages and
disadvantages of allowing thru-dial access, especially when
that access allows outbound calling.
• Review the Restriction/Permission Lists screen.
Four sets of restriction/permission codes are defined in the
Restriction/Permission Lists screen (at the system
administration level for multi-customer systems). Their
default names are “On Switch,” “Local,” “Long Distance
1,” and “Long Distance 2.”
Since you must assign a restriction/permission set to every
thru-dial service you create, one of the existing sets may be
adequate. Review what types of calls each set allows before
you begin. If none of the existing restriction/permission
sets are adequate, you can create a custom set of restriction/
permission codes.
Most thru-dial services you use will probably only allow
callers to dial extensions that are on the switch. In this case,
make sure you apply the appropriate restriction/permission
codes to ensure security.
If you are going to use thru-dial services that allow calls off
the PBX (local, long distance, international dialing, or
ESN), the following precautions should be followed:
• Assign an access password to the thru-dial service.
Give out the access password only to authorized personnel.
Without this password, a caller will not be able to gain
access to the service.
For details, see “Identifying passwords” on page 4-21.
• Give out the thru-dial service access number to authorized
personnel only.










