Instruction manual
Voice messaging systems
7-60 Issue 9 May 2003
System 25
System 25 may be used with the AUDIX Voice Power System. (For information on 
this system, see ‘‘Protecting the AUDIX Voice Power System’’ on page 7-60
.)
Also see ‘‘Related documentation’’ in the ‘‘About this document’’ section
 for a list 
of manuals on this product.
Follow the steps listed below for securing a voice processing system on the 
System 25.
■ Outward restrict the voice processing ports whenever possible.
■ Use the voice processing system’s maximum extension length, valid 
extension range, and transfer to subscriber only feature, if available.
■ Tightly control system administration access to these systems.
■ Program the System 25 to:
— Block direct access to outgoing lines and force the use of account 
codes and/or authorization codes.
— Disallow trunk-to-trunk transfer unless it is required.
NOTE:
This parameter only applies to loop start lines.
■ Do not administer the voice mail/coverage ports for remote call forwarding.
■ Monitor SMDR reports and/or Call Accounting System reports for outgoing 
calls that might be originated by internal and external abusers.
Protecting the AUDIX Voice Power System
The AUDIX Voice Power System provides both automated attendant and voice 
mail functionality. The Automated Attendant feature answers incoming calls and 
routes them to the appropriate department or person. The Voice Mail feature 
provides call coverage to voice mailboxes along with a variety of voice messaging 
features.
Unauthorized persons concentrate their activities in two areas with the AUDIX 
Voice Power System:
■ They try to transfer out of the AUDIX Voice Power System to gain access to 
an outgoing trunk and make long distance calls.
■ They try to locate unused or unprotected mailboxes and use them as 
dropoff points for their own messages.










