Administrator's Guide

Voice messaging systems
Issue 5 October 2002 1923555-233-506
Assign a restrictive COR, COS, and FRL to the station lines and
trunks serving AUDIX.
Use switch CDR reports to determine if the lines are being used for
calls that are normally not within your sphere of business.
Change default passwords on voice mailboxes immediately after
installation and use random numbers for passwords.
Require passwords with at least 5 digits.
Change system administration passwords to alphanumeric codes.
I
NTUITY AUDIX, AUDIX R1, and embedded AUDIX provide a
maintenance/administration port. A remote port security device
provides an added layer of security to prevent unauthorized access
to this port.
For INTUITY AUDIX and embedded AUDIX
Determine whether to only allow transfers to other AUDIX
subscribers or to any extension of the correct length. The most
secure approach is to only allow transfers to other AUDIX
subscribers. If you decide to allow transfers to any extension,
administer the COR on the AUDIX ports to prevent calls outside the
PBX or immediate Distributed Communications System (DCS) site
network.
For AUDIX only
Activate Enhanced Call Transfer (ECT) to help prevent having
billable calls placed from unauthorized transfers outside of the
system. ECT performs call transfer over the data link between
AUDIX and the Avaya MultiVantage. (The destination extensions
must be administered on the switch dial plan.)
Interactions
Attendant Conference
An attendant who has split a call can conference the call with AUDIX by
dialing the Transfer Into AUDIX access code. The attendant presses
Release to drop out of the conference call.
Automatic Call Distribution (ACD) (external AUDIX only)
You can administer a hunt group as an AUDIX ACD split. You can then
obtain AUDIX traffic measurements with the ACD Call Management
System (CMS). Login occurs when AUDIX signals the switch to make a
voice port available for AUDIX service. Logout occurs when AUDIX
signals the switch to disable the port.