Instruction manual
MERLIN LEGEND Communications System
Issue 9 May 2003
7-41
Limit transfers out of the system
When you need to allow transfers to people who are not AUDIX Voice Power 
System subscribers, you can add their extension numbers to the AUDIX Voice 
Power System subscriber database, but restrict access to their voice mailboxes. 
■ On the System Parameter Administration screen, enter yes in the 
Transfer to Subscriber Only field.
■ On the Subscriber Administration screen, add each extension number for 
non-AUDIX Voice Power System subscribers.
■ Enter # in the Subscriber Password field to prevent access to the 
corresponding voice mail.
■ Enter yes in the Does the subscriber have switch call 
coverage
 field. On the switch side, do not specify the AUDIX Voice Power 
System extension as a coverage point for any of these added extensions.
NOTE:
Although these restricted voice mailboxes cannot receive call answer 
messages, they do receive broadcast messages and even may receive a 
misdirected message from another subscriber. To save storage space, you 
should periodically clean out these mailboxes by accessing the restricted 
mailboxes and deleting all messages.
NOTE:
On AUDIX Voice Power System 2.1.1, mailboxes can be set individually to 
“1 minute,” reducing the clean-up required to service these mailboxes.
Protecting the INTUITY Voice Messaging System
The INTUITY Voice Messaging System provides automated attendant, call 
answer, and voice mail functionality. The Automated Attendant feature answers 
incoming calls and routes them to the appropriate department, person, or mailbox. 
The Call Answer feature provides call coverage to voice mailboxes. The Voice 
Mail feature provides a variety of voice messaging features.
Voice messaging systems have two areas of weakness:
■ Codes that transfer to inside or outside dial tone
Once thieves transfer to inside dial tone, they have access to any 
unprotected switch features. Preventing this type of abuse requires 
security at both the switch and at the voice messaging system.
■ Mailboxes that can be used as message drops
Once thieves break into a mailbox, they can use it as a message drop for 
untraceable calls for illegal activities. if you have 800 lines that can connect 
to your voice messaging system, they can pass stolen information around 
at your expense using your 800 lines. 










