NOT VERIFIED
When set for this option the user must enter an account code for all outgo-
ing calls, but the account code is not verified against the system list. Non ver-
ified account codes can contain the digits 0~9, * and #.
USING FORCED ACCOUNT CODES
• Lift the handset and press the
ACCT CODE
key or dial
47
.
• Enter the account code.
• Press the account code button again, press
TRSF
or hookflash (on an
SLT). If a correct code is entered, you will hear a dial tone and you can
make an outside call in the usual manner. If an incorrect code is en-
tered, the station returns error tone.
This code will always print on SMDR reports. For information on entering and
changing forced account codes, see the system administrator programming
section of this book.
AUTHORIZATION CODES
Authorization codes are used to validate a station user and give permission
to make a call. These four digit authorization codes can be either forced or
optional, but if used, are always verified from a system list of
250
entries for
an
iDCS 100
or
iDCS 500 M
system, and
500
entries for an
iDCS 500 L/LE
system. Each authorization code has an associated class of service. When
the code is entered, the class of service is changed to that of the authoriza-
tion code.
USING AUTHORIZATION CODES
After going off-hook, the station user must dial
✱
followed by a four digit
authorization code. If you enter a correct code, you will hear confirmation
tone and then receive a dial tone and you can make an outside call in the
usual manner. The station then follows the dialing class for that authorization
code. If you enter an incorrect code, the station returns error tone. This code
may or may not print on SMDR reports depending on SMDR programming.
7
NOTE: Outgoing DISA calls are controlled by the dialing class of the station
identified by the security code. The DISA line must have disconnect supervi-
sion from the central office. Insist that this service is verified by your installa-
tion/service company.
DISA SECURITY
A common practice among hackers is to repeatedly dial a known DISA ac-
cess number (usually with a computer) and try a different passcode each
time. The hacker hopes to eventually chance upon the correct passcode and
thus gain access to your system. The iDCS security feature counts the num-
ber of sequential incorrect passcode attempts. If a certain number is
reached, DISA is disabled and the system sends an alarm to designated dis-
play stations. The number of passcode attempts and the disable duration
are both programmable. In addition, the iDCS system will print an SMDR
record (a customer-provided printer is required) each time an incorrect pass-
code is entered.
The DISA alarm will ring for a programmable time before canceling the ring-
ing; however, the DISA alarm display will remain until the alarm is cleared. To
clear the DISA alarm, follow the following procedure:
• Lift the handset and dial
58
.
• Enter the DISA alarm passcode (see your service company).
• Replace the handset.
WARNING
As it is impossible to prevent unauthorized access to your telephone
system by hackers, we suggest that you do not turn the DISA feature
on unless you intend to use it. If you do use this feature, it is good
practice to frequently change passcodes and periodically review your
telephone records for unauthorized use.
FORCED ACCOUNT CODES
VERIFIED
When set for this option the user must enter an account code for all outgo-
ing calls. The account code entered will be verified from a system list of
500
entries for the
iDCS 500 M
version software and
iDCS 100
software or from
a list of
999
entries for the
iDCS 500 L/LE
version software. Forced verified
codes can contain the digits 0~9.
6
HOME PAGE
Table of Contents
Guide-Contents