User`s guide

viii Contents
Standard 1.0 System Administration Guide January 1998
Identifying remote site names . . . . . . . . . . . . . . . . . . . . . . . 5-34
Recording a personal verification for the broadcast
mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-37
Recording and sending broadcast messages . . . . . . . . . . . . 5-39
Making Voice Services recordings . . . . . . . . . . . . . . . . . . . 5-43
Section B: VMUIF recordings 5-47
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-48
VMUIF introductory tutorials and the VMUIF
login greeting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-49
Recording the VMUIF login greeting. . . . . . . . . . . . . . . . . 5-52
6 Setting up Meridian Mail security 6-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2
Section A: Telecommunication criminals and the
problems they pose 6-3
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-4
Designing a security system . . . . . . . . . . . . . . . . . . . . . . . . . 6-7
Ongoing security measures . . . . . . . . . . . . . . . . . . . . . . . . . . 6-8
Section B: Using Basic Access Restrictions features 6-9
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10
Trunk Group Access Restrictions . . . . . . . . . . . . . . . . . . . . 6-11
Class of Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-13
TGAR/TARG and CLS interaction. . . . . . . . . . . . . . . . . . . 6-17
Transfer feature on modems . . . . . . . . . . . . . . . . . . . . . . . . 6-19
Section C: Features that modify access restrictions 6-21
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-22
System Speed Call. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-23
Authorization Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-24
Station Specific Authorization Codes . . . . . . . . . . . . . . . . . 6-25
Forced Charge Account. . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-27
Controlled Class of Service. . . . . . . . . . . . . . . . . . . . . . . . . 6-29
Enhanced Controlled Class of Service . . . . . . . . . . . . . . . . 6-32
Flexible Feature Codes—Electronic Lock . . . . . . . . . . . . . 6-33
Code Restriction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-34
New Flexible Code Restriction . . . . . . . . . . . . . . . . . . . . . . 6-36