Technical information

System 25
Issue 7 June 2001
6-59
System 25
System 25 may be used with the AUDIX Voice Power System. (For information on
this system, see ‘‘Protecting the AUDIX Voice Power System’’ on page 6-59.)
Also see ‘‘Related Documentation’’ in the ‘‘About This Document’’ section for a list
of manuals on this product.
Follow the steps listed below for securing a voice processing system on the
System 25.
Outward restrict the voice processing ports whenever possible.
Use the voice processing systems maximum extension length, valid
extension range, and transfer to subscriber only feature, if available.
Tightly control system administration access to these systems.
Program the System 25 to:
Block direct access to outgoing lines and force the use of account
codes and/or authorization codes.
Disallow trunk-to-trunk transfer unless it is required.
NOTE:
This parameter only applies to loop start lines.
Do not administer the voice mail/coverage ports for remote call forwarding.
Monitor SMDR reports and/or Call Accounting System reports for outgoing
calls that might be originated by internal and external abusers.
Protecting the AUDIX Voice Power System
The AUDIX Voice Power System provides both automated attendant and voice
mail functionality. The automated attendant feature answers incoming calls and
routes them to the appropriate department or person. The voice mail feature
provides call coverage to voice mailboxes along with a variety of voice messaging
features.
Unauthorized persons concentrate their activities in two areas with the AUDIX
Voice Power System:
They try to transfer out of the AUDIX Voice Power System to gain access to
an outgoing trunk and make long distance calls.
They try to locate unused or unprotected mailboxes and use them as
dropoff points for their own messages.