
DEFINITY ECS Release 8.2
Administrator’s Guide
555-233-506
Issue 1
April 2000
Features and technical reference
1578Voice Messaging Systems
20
Centralized Voice Mail
You can use a single voice mail system to support multiple DEFINITY systems in
a DCS network. In addition, you can use a voice mail system to support multiple
DEFINITY systems and Merlin Legend in a network via mode code. For more
information, see Appendix B in DEFINITY ECS R8.2 Administration for Network
Connectivity.
Security Measures
!
SECURITY ALERT:
Fraudulent long-distance calls can be placed through I
NTUITY
AUDIX, DEFINITY AUDIX, and AUDIX R1 if proper security
precautions are not implemented.
The following actions help secure your system from unauthorized use.
■ For INTUITY AUDIX, DEFINITY AUDIX, and AUDIX R1
— Remove any unused or unassigned mail to help prevent exchange of
information through unassigned Voice Mail.
— Secure system lines that serve AUDIX and control where calls can
be placed.
— Assign a restrictive Class of Restriction (COR), Class of Service
(COS), and Facilities Restriction Level (FRL) to the station lines
and trunks serving AUDIX.
— Use switch Call Detail Recording (CDR) reports to determine if the
lines are being used for calls that are normally not within your
sphere of business.
— Change default passwords on voice mailboxes immediately after
installation and use random numbers for passwords.
— Require passwords with at least 5 digits.
— Change system administration passwords to alphanumeric codes.
—I
NTUITY AUDIX, AUDIX R1, and DEFINITY AUDIX provide a
maintenance/administration port. A remote port security device
provides an added layer of security to prevent unauthorized access to
this port.
■ For INTUITY AUDIX and DEFINITY AUDIX
— Determine whether to only allow transfers to other AUDIX
subscribers or to any extension of the correct length. The most
secure approach is to only allow transfers to other AUDIX