Technical information

Issue 7 June 2001 6-1
6
Voice Messaging Systems
The information in this chapter helps prevent unauthorized users from finding
pathways through the voice messaging system and out of the switch. This chapter
presents each communications system, and the voice mail systems it may host.
DEFINITY ECS (page 6-4)
DEFINITY Communications Systems (page 6-4)
MERLIN II Communications System (page 6-34)
MERLIN LEGEND Communications System (page 6-37)
PARTNER II Communications System (page 6-54)
PARTNER Plus Communications System (page 6-56)
System 25 (page 6-59)
System 75 (page 6-4)
System 85 (page 6-4)
NOTE:
The tools and measures in this chapter fall into two categories; those that
are implemented in the switch, and those that are implemented in the voice
messaging adjunct. It is recommended that security measures related to
voice adjuncts be implemented in both the switch and the voice adjunct. If
you are using a non-Avaya adjunct with a Avaya switch, the switch security
measures described here should be implemented as well as adjunct security
measures described in the adjunct documentation supplied by the
non-Avaya vendor.