You could use Dial Rules, restricting these to the subzones you want to allow searches. For external participant you can add a search rule witch replaces the alias with do-not-route, target the search rule to the local zone and select stop if the rule matches.
You have two ways to allow multiway only be reached from your endpoints: 1. allow only authenticated enpoints to call multiway@%localdomains% 2. allow only endpoints with the Named Source Local Zone
If you authenticate your endpoints correctly you have to set up a search rule which has set "Request must be authenticated" to yes and as regex alias multiway@%localdomains%. As target use Local Zone. So this would be the search rule for your authenticated enpoints. To block all other participants from reaching the conference factory you can add a second rule after the authenticated users: Requests must be authenticated to no, alias patter match regex "multiway@%localdomains%" and replace to "--do-not-route-this-call--" with target Local zone and On successfull match Stop.
So the first rule would match all authenticated users and route your call to the conference factory. For all other users the second rule would match and try to route the call to a non existent alias. The result will be a 404 not found and the VCS will stop procesing call rules.
If you didn't configure authentication you can also use Source Named: Local Zone instead of "Request must be authenticated" yes.
SIP traces provide key information in troubleshooting SIP Trunks, SIP
endpoints and other SIP related issues. Even though these traces are in
clear text, these texts can be gibberish unless you understand fully
what they mean. This document attempts to br...
Please find the attached HTML document, download and open it on your PC.
This provides an easy to use form where you simply answer a few
questions and it will render the proper jabber-config.xml file for you
to copy/paste. There is built in logic to verif...
CUCM Database Replication is an area in which Cisco customers and
partners have asked for more in-depth training in being able to properly
assess a replication problem and potentially resolve an issue without
involving TAC. This document discusses the bas...