Lucent Technologies 8.2 User Manual

Page of 1707
DEFINITY ECS Release 8.2
Administrator’s Guide  
555-233-506  
Issue 1
April 2000
Features and technical reference 
1578
Voice Messaging Systems 
20
Centralized Voice Mail
You can use a single voice mail system to support multiple DEFINITY systems in 
a DCS network. In addition, you can use a voice mail system to support multiple 
DEFINITY systems and Merlin Legend in a network via mode code. For more 
information, see Appendix B in DEFINITY ECS R8.2 Administration for Network 
Connectivity
.
Security Measures
!
SECURITY ALERT:
Fraudulent long-distance calls can be placed through I
NTUITY
 
AUDIX, DEFINITY AUDIX, and AUDIX R1 if proper security 
precautions are not implemented.
The following actions help secure your system from unauthorized use.
For I
NTUITY
 AUDIX, DEFINITY AUDIX, and AUDIX R1
— Remove any unused or unassigned mail to help prevent exchange of 
information through unassigned Voice Mail.
— Secure system lines that serve AUDIX and control where calls can 
be placed. 
— Assign a restrictive Class of Restriction (COR), Class of Service 
(COS), and Facilities Restriction Level (FRL) to the station lines 
and trunks serving AUDIX. 
— Use switch Call Detail Recording (CDR) reports to determine if the 
lines are being used for calls that are normally not within your 
sphere of business.
— Change default passwords on voice mailboxes immediately after 
installation and use random numbers for passwords.
— Require passwords with at least 5 digits.
— Change system administration passwords to alphanumeric codes.
— I
NTUITY
 AUDIX, AUDIX R1, and DEFINITY AUDIX provide a 
maintenance/administration port. A remote port security device 
provides an added layer of security to prevent unauthorized access to 
this port.
For I
NTUITY
 AUDIX and DEFINITY AUDIX
— Determine whether to only allow transfers to other AUDIX 
subscribers or to any extension of the correct length. The most 
secure approach is to only allow transfers to other AUDIX