Lucent Technologies Definity Enterprise Communication Server 8.2 Manuale Utente

Pagina di 1707
DEFINITY ECS Release 8.2
Administrator’s Guide  
555-233-506  
Issue 1
April 2000
Enhancing system security 
313
System security checklist 
11
Tip:
You can use the 
list route-pattern print
 command to print a copy of 
your facility restriction levels (FRL) and check their status.
11. On all trunk group screens, set the Dial Access field to 
n
. If set to 
y
, it 
allows users to dial Trunk Access Codes, thus bypassing all the ARS call 
screening functions.
Refer to 
‘‘Trunk Group’’ on page 967
 for more information.
12. On the 
‘‘AAR and ARS Digit Analysis Table’’ on page 451
, set all dial 
strings not required to conduct business to 
den
 (deny).
13. If you require international calling, on the 
‘‘AAR and ARS Digit 
Conversion Table’’ on page 455
, use only the 011+ country codes/city 
codes or specific dial strings.
14. Assign all trunk groups or same trunk group types a unique Class of 
Restriction. If the trunk group does not require networking through your 
switch, administer the Class of Restriction of the trunk group where the 
FRL is 
0
, the Calling Party Restriction field is 
outward
, and all unique 
Class of Restriction assigned to your outgoing trunk groups are 
n
. Refer to 
‘‘Class of Restriction’’ on page 520
 for more information.
Tip:
You can use the 
list trunk-group print
 command to have a printout of 
all your trunks groups. Then, you can use the 
display trunk-group x
 
command (where x is the trunk group) to check the Class of 
Restriction (COR) of each trunk group.
15. For your AUDIX, on the System Appearance screen, set:
the Enhanced Call Transfer field to 
y
.
the Transfer Type field to 
enhanced
. If set to 
basic
, set the Transfer 
Restriction field to 
subscribers
. Refer to 
‘‘Feature-Related System 
Parameters’’ on page 632
 for more information.
NOTE:
The Class of Restriction of the voice mail ports dictates the calling 
restrictions of the voice mail. If the above settings are not 
administered correctly, the possibility exists to complete a transfer to 
trunk access codes or ARS/AAR feature codes for fraudulent 
purposes. Never assign mailboxes that begin with the digits or trunk 
access codes of ARS/AAR feature access codes. Require your users 
to use a mailbox password length greater than the amount of digits in 
the extension number.