Instruction manual

MERLIN LEGEND Communications System
Issue 9 May 2003
7-41
Limit transfers out of the system
When you need to allow transfers to people who are not AUDIX Voice Power
System subscribers, you can add their extension numbers to the AUDIX Voice
Power System subscriber database, but restrict access to their voice mailboxes.
On the System Parameter Administration screen, enter yes in the
Transfer to Subscriber Only field.
On the Subscriber Administration screen, add each extension number for
non-AUDIX Voice Power System subscribers.
Enter # in the Subscriber Password field to prevent access to the
corresponding voice mail.
Enter yes in the Does the subscriber have switch call
coverage
field. On the switch side, do not specify the AUDIX Voice Power
System extension as a coverage point for any of these added extensions.
NOTE:
Although these restricted voice mailboxes cannot receive call answer
messages, they do receive broadcast messages and even may receive a
misdirected message from another subscriber. To save storage space, you
should periodically clean out these mailboxes by accessing the restricted
mailboxes and deleting all messages.
NOTE:
On AUDIX Voice Power System 2.1.1, mailboxes can be set individually to
“1 minute,” reducing the clean-up required to service these mailboxes.
Protecting the INTUITY Voice Messaging System
The INTUITY Voice Messaging System provides automated attendant, call
answer, and voice mail functionality. The Automated Attendant feature answers
incoming calls and routes them to the appropriate department, person, or mailbox.
The Call Answer feature provides call coverage to voice mailboxes. The Voice
Mail feature provides a variety of voice messaging features.
Voice messaging systems have two areas of weakness:
Codes that transfer to inside or outside dial tone
Once thieves transfer to inside dial tone, they have access to any
unprotected switch features. Preventing this type of abuse requires
security at both the switch and at the voice messaging system.
Mailboxes that can be used as message drops
Once thieves break into a mailbox, they can use it as a message drop for
untraceable calls for illegal activities. if you have 800 lines that can connect
to your voice messaging system, they can pass stolen information around
at your expense using your 800 lines.