FORCED ACCOUNT CODES
VERIFIED
When set for this option the user must enter an account code for all outgo-
ing calls. The account code entered will be verified from a system list of 500
entries for M version software and from a list of 999 entries for L version soft-
ware. Forced Verified codes can contain the digits 0~9.
NOT VERIFIED
When set for this option the user must enter an account code for all outgo-
ing calls, but the account code is not verified against the system list. Non ver-
ified account codes can contain the digits 0~9, * and #.
USING FORCED ACCOUNT CODES
• Lift the handset and press the
ACCT CODE
key or dial
47
.
• Enter the account code.
• Press the account code button again, press
TRSF
or hookflash (on an
SLT). If a correct code is entered, you will hear a dial tone and you can
make an outside call in the usual manner. If an incorrect code is en-
tered, the station returns error tone.
This code will always print on SMDR reports. For information on entering and
changing forced account codes,
see the system administrator programming
AUTHORIZATION CODES
Authorization codes are used to validate a station user and give permission
to make a call. These four digit authorization codes can be either forced or
optional, but if used, are always verified from a system list of 250 entries.
Each authorization code has an associated class of service. When the code
is entered, the class of service is changed to that of the authorization code.
USING AUTHORIZATION CODES
After going off-hook, the station user must dial
✱
followed by a four digit
authorization code. If you enter a correct code, you will hear confirmation
tone and then receive a dial tone and you can make an outside call in the
usual manner. The station then follows the dialing class for that authorization
code. If you enter an incorrect code, the station returns error tone. This code
may or may not print on SMDR reports depending on SMDR programming.
7
DISA SECURITY
A common practice among hackers is to repeatedly dial a known DISA ac-
cess number (usually with a computer) and try a different passcode each
time. The hacker hopes to eventually chance upon the correct passcode and
thus gain access to your system. The iDCS 500 security feature counts the
number of sequential incorrect passcode attempts. If a certain number is
reached, DISA is disabled and the system sends an alarm to designated dis-
play stations. The number of passcode attempts and the disable duration
are both programmable. In addition, the iDCS 500 system will print an SMDR
record (a customer-provided printer is required) each time an incorrect pass-
code is entered.
The DISA alarm will ring for a programmable time before canceling the ring-
ing; however, the DISA alarm display will remain until the alarm is cleared. To
clear the DISA alarm, follow the following procedure:
• Lift the handset and dial
58
.
• Enter the DISA alarm passcode (see your service company).
• Replace the handset.
WARNING
As it is impossible to prevent unauthorized access to your telephone
system by hackers, we suggest that you do not turn the DISA feature
on unless you intend to use it. If you do use this feature, it is good
practice to frequently change passcodes and periodically review your
telephone records for unauthorized use.
6