Preventing Toll Fraud

Table of contents:

This chapter covers the following topics:

  • Explaining how legitimate devices can be exploited for fraudulent use of the IP PBX system to make toll calls
  • Using partitions and calling search spaces, restricting call forwarding based on user classes, and restricting voice-mail transfers to internal destinations
  • Explaining the usage of blocking commonly exploited area codes
  • Configuring Cisco CallManager to route calls to different locations based on the time of day when a call is made
  • Designing and implementing FAC to require user authorization for different classes of calls
  • Providing external call transfer blocking by setting service parameters and configuring gateways, trunks, and route patterns as OffNet devices
  • Configuring Cisco CallManager Administration to drop a conference call when the conference creator leaves the call or when the last OnNet party leaves

Business consumers have more control over their telecommunications services than ever before. New technologies provide more information and more flexibility in how businesses use their telecommunications services. Unfortunately, the shift in control has made businesses and telephone companies more susceptible to toll fraud and led to an increase in fraud. This chapter discusses ways to prevent toll fraud in a company.

Toll Fraud Exploits

Part I: Cisco CallManager Fundamentals

Introduction to Cisco Unified Communications and Cisco Unified CallManager

Cisco Unified CallManager Clustering and Deployment Options

Cisco Unified CallManager Installation and Upgrades

Part II: IPT Devices and Users

Cisco IP Phones and Other User Devices

Configuring Cisco Unified CallManager to Support IP Phones

Cisco IP Telephony Users

Cisco Bulk Administration Tool

Part III: IPT Network Integration and Route Plan

Cisco Catalyst Switches

Configuring Cisco Gateways and Trunks

Cisco Unified CallManager Route Plan Basics

Cisco Unified CallManager Advanced Route Plans

Configuring Hunt Groups and Call Coverage

Implementing Telephony Call Restrictions and Control

Implementing Multiple-Site Deployments

Part IV: VoIP Features

Media Resources

Configuring User Features, Part 1

Configuring User Features, Part 2

Configuring Cisco Unified CallManager Attendant Console

Configuring Cisco IP Manager Assistant

Part V: IPT Security

Securing the Windows Operating System

Securing Cisco Unified CallManager Administration

Preventing Toll Fraud

Hardening the IP Phone

Understanding Cryptographic Fundamentals

Understanding the Public Key Infrastructure

Understanding Cisco IP Telephony Authentication and Encryption Fundamentals

Configuring Cisco IP Telephony Authentication and Encryption

Part VI: IP Video

Introducing IP Video Telephony

Configuring Cisco VT Advantage

Part VII: IPT Management

Introducing Database Tools and Cisco Unified CallManager Serviceability

Monitoring Performance

Configuring Alarms and Traces

Configuring CAR

Using Additional Management and Monitoring Tools

Part VIII: Appendix

Appendix A. Answers to Review Questions


Authorized Self-Study Guide Cisco IP Telephony (CIPT)
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
ISBN: 158705261X
EAN: 2147483647
Year: 2004
Pages: 329 © 2008-2020.
If you may any questions please contact us: