Lucent Technologies MERLIN LEGEND Release 5.0 Feature Reference page 765

Communications system
Hide thumbs Also See for MERLIN LEGEND Release 5.0:
Table of Contents

Advertisement

MERLIN LEGEND Communications System Release 5.0
Feature Reference 555-650-110
I
Applications
Voice Messaging Systems
Under applicable tariffs, you are responsible for payment of toll charges.
Lucent Technologies cannot be responsible for such charges and will not
make any allowance or give any credit resulting from unauthorized access.
To reduce the risk of unauthorized access through your voice messaging
system, please observe the following procedures:
A voice messaging system (VMS) provides call-answering services and may
provide voice mail services. Each of the following VMS applications connects to
an enhanced T/R port, called a voice messaging interface (VMI) port:
MERLIN MAIL Voice Messaging System
MERLIN LEGEND MAIL Voice Messaging System (supplies its own ports
with its own module)
Lucent Technologies Attendant
AUDIX Voice Power
Integrated Voice Power (IVP) Automated Attendant
You can program T/R ports on a 012, MERLIN LEGEND MAIL, or 016 module as
either generic VMI ports or integrated VMI ports. MERLIN MAIL, MERLIN
LEGEND MAIL, and AUDIX Voice Power use streams of touch-tone codes, called
mode codes , to communicate with the control unit. Because these applications
use mode codes, you must connect the hardware to integrated VMI ports. You
can connect Lucent Technologies Attendant and IVP Automated Attendant, which
do not use mode codes, to generic VMI ports. See
!
SECURITYlALERT:
Beginning with Release 2.1, a 012 or 016 port that is programmed as a
generic VMI port can transfer an outside call to an outside number.
Previously, only VMI ports programmed as integrated VMI ports could do a
trunk-to-trunk transfer. A single-line telephone connected to an integrated
VMI port can complete trunk-to-trunk transfers. In Release 3.1 and later
systems, the default setting disables trunk-to-trunk transfers from these
ports.
Calling restrictions (for example, Disallowed Lists, Toll Restriction, Facility
Restriction Levels) should be programmed, as appropriate, to minimize toll
fraud abuse, especially if a single-line telephone is connected to an
Employees who have voice mailboxes should be required to use
passwords to protect their mailboxes.
The administrator should remove any unneeded voice mailboxes
from the system immediately.
AUDIX Voice Power has the ability to limit transfers to subscribers
only. You are strongly urged to limit transfers in this manner.
Monitor SMDR reports or Call Accounting System reports for
outgoing calls that might be originated by voice messaging ports.
Table I–6 on page
I-21.
Issue 1
June 1997
Page I-8

Advertisement

Table of Contents
loading

Table of Contents