This chapter covers the following topics:
Explaining how legitimate devices can be exploited for fraudulent use of the IP PBX system to make toll calls
Using partitions and calling search spaces, restricting call forwarding based on user classes, and restricting voice-mail transfers to internal destinations
Explaining the usage of blocking commonly exploited area codes
Configuring Cisco CallManager to route calls to different locations based on the time of day when a call is made
Designing and implementing FAC to require user authorization for different classes of calls
Providing external call ...