DEFINITY Enterprise Communications Server Release 8.2
Overview
555-233-002
Issue 1
April 2000
System Management Features
67
Security
Calling/Connected Party Number (CPN)
Restriction
Per Line CPN Restriction
Users may block the Calling Party Number when originating calls. For ISDN calls, the
CPN Presentation Indicator is encoded accordingly. For non-ISDN calls, going to a public
network that supports the CPN Restriction feature, the network specific Feature
Activation Code gets passed to the network for interpretation and activation.
If Per Line CPN Restriction is administered for a station, it will override any ISDN Trunk
Group administration for sending Calling Party Number.
Per Call CPN Restriction
Users may indicate Calling Number privacy information. For ISDN calls, the CPN
Presentation Indicator is encoded accordingly. For non-ISDN calls going to a public
network that supports the CPN Restriction feature, the network specific Feature
Activation Code gets passed to the network for interpretation and activation of the desired
feature.
If Per Call CPN Restriction is activated for an outgoing call, it will override any Per Line
CPN Restriction administration for the calling station, and will override any ISDN Trunk
Group administration for sending Calling Number.
Restriction — Controlled
Allows an Attendant or telephone user, with console permission, to activate and
deactivate for an individual telephone or a group of telephones, the following restrictions:
outward, total, station-to-station, and termination restrictions.
Malicious Call Trace
Allows you to trace malicious calls. You define a group of terminal users who can notify
others in the group when they receive a malicious call. These users can then retrieve
information related to the call. Using this information, you can identify the malicious call
source or provide information to personnel at an adjacent system to complete the trace. It
also allows you to record the malicious call.
233002_1.book Page 67 Monday, February 21, 2000 8:28 AM