DEFINITY ECS Release 8.2
Administrator’s Guide
555-233-506 Issue 1
April 2000
Features and technical reference
1578Voice Messaging Systems
20
Centralized Voice Mail
You can use a single voice mail system to su pport mul tipl e DEFINITY sys tems in
a DCS network. In addition, you can use a voice mail system to support multiple
DEFINITY systems and Merlin Legend in a network via mode code. For more
information, see Appendix B in DEFINITY ECS R8.2 Administration for Network
Connectivity.
Security Measures
!SECURITY ALERT:
Fraudulent long-distance calls can be placed through INTUITY
AUDIX, DEFINITY AUDIX, and AUDIX R1 if proper security
precautions are not implemented.
The following actions help secure your system from unauthorized use.
For INTUITY AUDIX, DEFINITY AUDIX, and AUDIX R1
Remove any unused or unassigned mail to help prevent e x change of
information through unassigned Voice Mail.
Secure system lines that serve AUDIX and control where calls can
be placed.
Assign a restrictive Class of Restriction (COR), Class of Service
(COS), and Facilities Restriction Level (FRL) to the station lines
and trunks serving AUDIX.
Use switch Call Detail Recording (CDR) reports to determine if the
lines are being used for calls that are normally not within your
sphere of business.
Change default passwords on voice mailboxes immediately after
installation and use random numbers for passwords.
Require passwords with at least 5 digits.
Change system administration passwords to alphanumeric codes.
—I
NTUITY AUDIX, AUDIX R1, and DEFINITY AUDIX provide a
maintenance/administration port. A remote port security device
provides an added layer of security to prevent unau thorized access to
this port.
For INTUITY AUDIX and DEFINITY AUDIX
Determine whether to only allow transfers to other AUDIX
subscribers or to any extension of the correct length. The most
secure approach is to only allow transfers to other AUDIX