Administrator's Guide

Enhancing system security
555-233-506386 Issue 5 October 2002
14. Assign all trunk groups or same trunk group types a unique Class of
Restriction. If the trunk group does not require networking through your
switch, administer the Class of Restriction of the trunk group where the
FRL is
0, the Calling Party Restriction field is outward, and all unique
Class of Restriction assigned to your outgoing trunk groups are
n. See
‘‘Class of Restriction’’ on page 658 for more information.
Tip:
You can use the list trunk-group print command to have a printout of
all your trunks groups. Then, you can use the
display trunk-group x
command (where x is the trunk group) to check the COR of each trunk
group.
15. For your AUDIX, on the System Appearance screen, set:
the Enhanced Call Transfer field to y.
the Transfer Type field to enhanced. If set to basic, set the Transfer
Restriction field to
subscribers. See ‘‘Feature-Related System
Parameters’’ on page 795 for more information.
NOTE:
The COR of the voice mail ports dictates the calling restrictions of
the voice mail. If the above settings are not administered correctly,
the possibility exists to complete a transfer to trunk access codes or
ARS/AAR feature codes for fraudulent purposes. Never assign
mailboxes that begin with the digits or trunk access codes of
ARS/AAR feature access codes. Require your users to use a mailbox
password length greater than the amount of digits in the extension
number.
16. Avaya recommends you administer the following on all voice mail ports:
Assign all voice mail ports a unique COR. See ‘‘Class of
Restriction’’ on page 658 for more information.
If you are not using outcalling, fax attendant, or networking,
administer the unique COR where the FRL is
0, the Calling Party
Restriction field is
outward, and all unique trunk group COR on the
Calling Permissions are
n. See ‘‘Class of Restriction’’ on page 658
for more information.
NOTE:
Avaya recommends you administer as many layers of security as
possible. You can implement steps 9 and 16 as a double layer of
security. In the event that the voice mail becomes unsecured for any
reason, the layer of security on the switch takes over, and vice versa.