A. Customer Support Information. Lucent Technologies MERLIN LEGEND, MERLIN LEGEND Release 6.1
Add to My manuals1021 Pages
advertisement
![A. Customer Support Information. Lucent Technologies MERLIN LEGEND, MERLIN LEGEND Release 6.1 | Manualzz A. Customer Support Information. Lucent Technologies MERLIN LEGEND, MERLIN LEGEND Release 6.1 | Manualzz](http://s3.manualzz.com/store/data/055901072_1-317e884da747a7afb55f48ef8ea102da-360x466.png)
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Support Telephone Number
Customer Support Information
Issue 1
August 1998
Page A-1
A
Support Telephone Number
8 4
In the USA only, Lucent Technologies provides a toll-tree customer Helpline
(1 800 628-2888) 24 hours a day. If you need assistance when installing, programming, or using your system, call the Helpline or your Lucent Technologies representative. Consultation charges may apply.
Outside the USA, if you need assistance when installing, programming, or using your system, contact your Lucent Technologies representative.
Federal Communications Commission
(FCC) Electromagnetic
Interference Information
8 4
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user will be required to correct the interference at his or her own expense.
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Canadian Department of Communications (DOC) Interference Information
Issue 1
August 1998
Canadian Department of
Communications (DOC)
Interference Information
8 4
This digital apparatus does not exceed the Class A limits for radio noise emissions set out in the radio interference regulations of the Canadian
Department of Communications.
Page A-2
Le Présent Appareil Numérique n’émet pas de bruits radioélectriques dépassant les limites applicables aux appareils numériques de la classe A préscrites dans le règlement sur le brouillage radioélectrique edicté par le ministère des
Communications du Canada.
FCC Notification and
Repair Information
8 4
This equipment is registered with the FCC in accordance with Part 68 of its rules.
In compliance with those rules, you are advised of the following:
■ Means of Connection. Connection of this equipment to the telephone network shall be through a standard network interface jack, USOC RJ11C,
RJ14C, RJ21X. Connection to E&M tie trunks requires a USOC RJ2GX.
Connection to off-premises extensions requires a USOC RJ11C or RJ14C.
Connection to 1.544-Mbps digital facilities must be through a USOC RJ48C or RJ48X. Connection to DID requires a USOC RJ11C, RJ14C, or RJ21X.
These USOCs must be ordered from your telephone company. Connection to 56-Kbps or 64-Kbps facilities requires a USOC RJ11C, RJ14C, or RJ21.
■
■
Party Lines and Coin Telephones. This equipment may not be used with party lines or coin telephone lines.
Notification to the Telephone Companies. Before connecting this equipment, you or your equipment supplier must notify your local telephone company’s business office of the following:
— The telephone number(s) you will be using with this equipment.
The appropriate registration number and ringer equivalence number
(REN), which can be found on the back or bottom of the control unit, as follows:
If this equipment is to be used as a Key system, report the number
AS593M-72914-KF-E.
If the system provides both manual and automatic selection of incoming/outgoing access to the network, report the number
AS593M-72682-MF-E.
If there are no directly terminated trunks, or if the only directly terminated facilities are personal lines, report the number
AS5USA-65646-PF-E.
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Installation and Operational Procedures
Issue 1
August 1998
Page A-3
■
■
The REN (Ringer Equivalence Number) for all three systems is 1.5A.
— The facility interface code (FIC) and service order code (SOC):
For tie line connection, the FIC is TL31M and the SOC is 9.0F.
For connection to off-premises stations, the FIC is OL13C and the
SOC is 9.0F.
For equipment to be connected to DID facilities, the FIC is 02RV2-T and the SOC is AS.2.
— For equipment to be connected to 1.544-Mbps digital service, the SOC is 6.0P and the FIC is:
— 04DU9-BN for D4 framing format with AMI zero code suppression.
— 04DU9-DN for D4 framing format with bipolar 8 zero code suppression (B8ZS).04DU9-IKN for extended superframe format (ESF) with AMI zero code suppression.
— 04DU9-ISN with ESF and B8ZS.
For equipment to be connected to 56-Kbps or 64-Kbps digital facilities, the FIC is 02B1Q.
— The quantities and USOC numbers of the jacks required.
— For each jack, the sequence in which lines are to be connected, the line types, the FIC, and the REN by position when applicable.
Ringer Equivalence Number (REN). The REN is used to determine the number of devices that may be connected to the telephone line. Excessive
RENs on the line may result in the devices not ringing in response to an incoming call. In most, but not all, areas the sum of the RENs should not exceed five (5.0). To be certain of the number of devices that may be connected to the line, as determined by the total RENs, contact the local telephone company to determine the maximum REN for the calling area.
Disconnection. You must also notify your local telephone company if and when this equipment is permanently disconnected from the line(s).
Installation and
Operational Procedures
8 4
The manuals for your system contain information about installation and operational procedures.
■ Repair Instructions. If you experience trouble because your equipment is malfunctioning, the FCC requires that the equipment not be used and that it be disconnected from the network until the problem has been corrected.
Repairs to this equipment can be made only by the manufacturers, their authorized agents, or others who may be authorized by the FCC. In the
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Installation and Operational Procedures
Issue 1
August 1998
Page A-4
■
■
■
■
■ event repairs are needed on this equipment, contact your authorized
Lucent Technologies dealer or, in the USA only, contact the National
Service Assistance Center (NSAC) at 1 800 628-2888.
Rights of the Local Telephone Company. If this equipment causes harm to the telephone network, the local telephone company may discontinue your service temporarily. If possible, they will notify you in advance. But if advance notice is not practical, you will be notified as soon as possible.
You will also be informed of your right to file a complaint with the FCC.
Changes at Local Telephone Company. Your local telephone company may make changes in its facilities, equipment, operations, or procedures that affect the proper functioning of this equipment. If they do, you will be notified in advance to give you an opportunity to maintain uninterrupted telephone service.
Hearing Aid Compatibility. The custom telephone sets for this system are compatible with inductively coupled hearing aids as prescribed by the FCC.
Automatic Dialers. WHEN PROGRAMMING EMERGENCY NUMBERS
AND/OR MAKING TEST CALLS TO EMERGENCY NUMBERS:
— Remain on the line and briefly explain to the dispatcher the reason for the call.
— Perform such activities in off-peak hours, such as early morning or late evening.
Direct Inward Dialing (DID). This equipment returns answer supervision signals to the PSTN when:
— Answered by the called station
— Answered by the attendant
— Routed to a recorded announcement that can be administered by the customer premises equipment user
— Routed to a dial prompt
This equipment returns answer supervision on all DID calls forwarded back to the PSTN. Permissible exceptions are when:
— A call is unanswered
— A busy tone is received
— A reorder tone is received
Allowing this equipment to be operated in such a manner as not to provide proper answer supervision signaling is in violation of Part 68 rules.
New Network Area and Exchange Codes. The MERLIN LEGEND
Communications System software does not restrict access to any new area codes or exchange codes established by a local telephone company. If the user has established toll restrictions on the system that could restrict access, then the user should check the lists of allowed and disallowed dial codes and modify them as needed.
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
DOC Notification and Repair Information
Issue 1
August 1998
Page A-5
Equal Access Codes. This equipment is capable of providing users access to interstate providers of operator services through the use of access codes.
Modifications of this equipment by call aggregators to block access dialing codes is a violation of the Telephone Operator Consumers Act of 1990.
DOC Notification and
Repair Information
8 4
NOTICE: The Canadian Department of Communications (DOC) label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective, operational, and safety requirements.
The DOC does not guarantee the equipment will operate to the user’s satisfaction.
Before installing this equipment, users should ensure that it is permissible to connect it to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. In some cases, the company’s inside wiring for single-line individual service may be extended by means of a certified connector assembly (telephone extension cord).
The customer should be aware that compliance with the above conditions may not prevent degradation of service in some situations.
Repairs to certified equipment should be made by an authorized Canadian maintenance facility designated by the supplier. Any repairs or alterations made by the user to this equipment, or any equipment malfunctions, may give the telecommunications company cause to request the user to disconnect the equipment.
Users should ensure for their own protection that the electrical ground connections of the power utility, telephone lines, and internal metallic water pipe system, if present, are connected. This precaution may be particularly important in rural areas.
!
CAUTION:
Users should not attempt to make such connections themselves, but should contact the appropriate electrical inspection authority or electrician, as appropriate.
To prevent overloading, the Load Number (LN) assigned to each terminal device denotes the percentage of the total load to be connected to a telephone loop used by the device. The termination on a loop may consist of any combination of devices subject only to the requirement that the total of the Load Numbers of all the devices does not exceed 100.
DOC Certification No.: 230 4095A
CSA Certification No.: LR 56260
Load No.: 6
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Renseignements sur la notification du ministère des Communications
Issue 1
August 1998
Page A-6
Renseignements sur la notification du ministère des Communications
8 4
AVIS: L’étiquette du ministère des Communications du Canada identifie le matériel homologué. Cette étiquette certifie que le matériel est conforme à certaines normes de protection, d’exploitation et de sécurité des réseaux de télécommunications. Le Ministère n’assure toutefois pas que le matériel fonctionnera à la satisfaction de l’utilisateur.
Avant d’installer ce matériel, l’utilisateur doit s’assurer qu’il est permis de le raccorder aux installations de l’entreprise locale de télécommunication. Le matériel doit également être installé en suivant une méthode acceptée de raccordement. Dans certains cas, les fils intérieurs de l’enterprise utilisés pour un service individuel à ligne unique peuvent être prolongés au moyen d’un dispositif homologué de raccordement (cordon prolongateur téléphonique interne).
L’abonné ne doit pas oublier qu’il est possible que la conformité aux conditions
énoncées ci-dessus n’empêchent pas la dégradation du service dans certaines situations. Actuellement, les entreprises de télécommunication ne permettent pas que l’on raccorde leur matériel à des jacks d’abonné, sauf dans les cas précis prévus pas les tarifs particuliers de ces entreprises.
Les réparations de matériel homologué doivent être effectuées par un centre d’entretien canadien autorisé désigné par le fournisseur. La compagnie de télécommunications peut demander à l’utilisateur de débrancher un appareil à la suite de réparations ou de modifications effectuées par l’utilisateur ou à cause de mauvais fonctionnement.
Pour sa propre protection, l’utilisateur doit s’assurer que tous les fils de mise à la terre de la source d’énergie électrique, des lignes téléphoniques et des canalisations d’eau métalliques, s’il y en a, sont raccordés ensemble. Cette précaution est particuliérement importante dans les régions rurales.
AVERTISSEMENT: L’utilisateur ne doit pas tenter de faire ces raccordements lui-même; il doit avoir recours à un service d’inspection des installations
électriques, ou à un électricien, selon le cas.
L’indice de charge (IC) assigné à chaque dispositif terminal indique, pour éviter toute surcharge, le pourcentage de la charge totale qui peut être raccordée à un circuit téléphonique bouclé utilisé par ce dispositif. La terminaison du circuit bouclé peut être constituée de n’importe quelle combinaison de dispositifs, pourvu que la somme des indices de charge de l’ensemble des dispositifs ne dépasse pas 100.
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Renseignements sur la notification du ministère des Communications
No d’homologation: 230 4095A
No de certification: CSA LR 56260
L’indice de charge: 6
MERLIN LEGEND D.O.C.
Location Label Placement
Ministère des Communications du Canada emplacement de l’étiquette
Issue 1
August 1998
Page A-7
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Security of Your System: Preventing Toll Fraud
Issue 1
August 1998
Page A-8
Security of Your System:
Preventing Toll Fraud
8 4
As a customer of a new telephone system, you should be aware that there is an increasing problem of telephone toll fraud. Telephone toll fraud can occur in many forms, despite the numerous efforts of telephone companies and telephone equipment manufacturers to control it. Some individuals use electronic devices to prevent or falsify records of these calls. Others charge calls to someone else’s number by illegally using lost or stolen calling cards, billing innocent parties, clipping on to someone else’s line, and breaking into someone else’s telephone equipment physically or electronically. In certain instances, unauthorized individuals make connections to the telephone network through the use of the
Remote Access features of your system.
The Remote Access features of your system, if you choose to use them, permit off-premises callers to access the system from a remote telephone by using a telephone number with or without a barrier code. The system returns an acknowledgment signaling the user to key in his or her barrier code, which is selected and administered by the system manager. After the barrier code is accepted, the system returns dial tone to the user. In Release 3.1 and later systems, barrier codes are by default restricted from making outside calls. In prior releases, if you do not program specific outward calling restrictions, the user is able to place any call normally dialed from a telephone associated with the system. Such an off-premises network call is originated at, and will be billed from, the system location.
The Remote Access feature, as designed, helps the customer, through proper administration, to minimize the ability of unauthorized persons to gain access to the network. Most commonly, phone numbers and codes are compromised when overheard in a public location, through theft of a wallet or purse containing access information, or through carelessness (for example, writing codes on a piece of paper and improperly discarding it). Additionally, hackers may use a computer to dial an access code and then publish the information to other hackers. Enormous charges can be run up quickly. It is the customer’s responsibility to take the appropriate steps to properly implement the features, evaluate and administer the various restriction levels, protect access codes, and distribute access codes only to individuals who have been fully advised of the sensitive nature of the access information.
Common carriers are required by law to collect their tariffed charges. While these charges are fraudulent charges made by persons with criminal intent, applicable tariffs state that the customer of record is responsible for payment of all long-distance or other network charges. Lucent Technologies cannot be responsible for such charges and will not make any allowance or give any credit for charges that result from unauthorized access.
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Toll Fraud Prevention
Issue 1
August 1998
Page A-9
To minimize the risk of unauthorized access to your communications system:
■ Use an unpublished Remote Access number.
■ Assign access codes randomly to users on a need-to-have basis, keeping a log of all authorized users and assigning one code to one person.
■
■
■
■
■
■
■
■
■
■
Use random-sequence access codes, which are less likely to be easily broken.
Use the longest-length access codes the system will allow.
Deactivate all unassigned codes promptly.
Ensure that Remote Access users are aware of their responsibility to keep the telephone number and any access codes secure.
When possible, restrict the off-network capability of off-premises callers, using calling restrictions, Facility Restriction Levels (FRLs) (Hybrid/PBX mode only), and Disallowed List capabilities. In Release 3.1 and later systems, a prepared Disallowed List (number 7) is provided and is designed to prevent the types of calls that toll-fraud abusers often make.
When possible, block out-of-hours calling.
Frequently monitor system call detail reports for quicker detection of any unauthorized or abnormal calling patterns.
Limit Remote Call Forwarding to persons on a need-to-have basis.
Change access codes every 90 days.
Use the longest-length barrier codes possible, following the guidelines for
passwords. (See “Choosing Passwords.”)
Toll Fraud Prevention
8 4
Toll fraud is the unauthorized use of your telecommunications system by third parties to make long-distance telephone calls. Under the law, you, the customer, are responsible for paying part or all of those unauthorized calls. Thus, the following information is of critical importance.
Unauthorized persons concentrate their activities in two areas with the MERLIN
LEGEND Communications System:
■ They try to transfer out of the MERLIN LEGEND Communications System to gain access to an outgoing trunk and make long-distance calls.
■ They try to locate unused or unprotected mailboxes and use them as drop-off points for their own messages.
The following is a discussion of how toll fraud is often perpetrated and ways to prevent unauthorized access that can lead to toll fraud.
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Toll Fraud Prevention
Issue 1
August 1998
Page A-10
Physical Security, Social Engineering, and
General Security Measures 8 4
Criminals called hackers may attempt to gain unauthorized access to your communications system and voice messaging system in order to use the system features. Hackers often attempt to trick employees into providing them with access to a network facility (line/trunk) or a network operator. This is referred to as social engineering. Hackers may pose as telephone company employees and employees of Lucent Technologies or your authorized dealer. Hackers will go through a company’s trash to find directories, dialing instructions, and other information that will enable them to break into the system. The more knowledgeable they appear to be about the employee names, departments, telephone numbers, and the internal procedures of your company, the more likely it is that they will be able to trick an employee into helping them.
Preventive Measures 8 4
Take the following preventive measures to limit the risk of unauthorized access by hackers:
■
■
■
■
■
Provide good physical security for the room containing your telecommunications equipment and the room with administrative tools, records, and system manager information. These areas should be locked when not attended.
Provide a secure trash disposal for all sensitive information, including telephone directories, call accounting records, or anything that may supply information about your communications system. This trash should be shredded.
Educate employees that hackers may try to trick them into providing them with dial tone or dialing a number for them. All reports of trouble, requests for moving extensions, or any other administrative details associated with the MERLIN LEGEND Communications System should be handled by one person (the system manager) or within a specified department. Anyone claiming to be a telephone company representative should be referred to this person or department.
No one outside of Lucent Technologies needs to use the MERLIN
LEGEND Communications System to test facilities (lines/trunks). If a caller identifies him- or herself as a Lucent Technologies employee, the system manager should ask for a telephone number where the caller can be reached. The system manager should be able to recognize the number as a Lucent Technologies telephone number. Before connecting the caller to the administrative port of the MERLIN LEGEND Communications System, the system manager should feel comfortable that a good reason to do so exists . In any event, it is not advisable to give anyone access to network facilities or operators, or to dial a number at the request of the caller.
Any time a call appears to be suspicious, call the Lucent Technologies BCS
Fraud Intervention Center at 1 800 628-2888 (fraud intervention for System
25, PARTNER
® and MERLIN systems).
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Toll Fraud Prevention
Issue 1
August 1998
Page A-11
■ Customers should also take advantage of Lucent Technologies monitoring services and devices, such as the NetPROTECT
SM
family of fraud-detection services, CAS with HackerTracker
®
, and CAT Terminal with
Watchdog. Call 1 800 638-7233 to get more information on these Lucent
Technologies fraud detection services and products.
Security Risks Associated with Transferring through Voice Messaging Systems 8 4
Toll fraud hackers try to dial into a voice mailbox and then execute a transfer by dialing 7 . The hacker then dials an access code (either for Automatic Route
Selection or a pooled facility code) followed by the appropriate digit string to either direct dial or access a network operator to complete the call.
NOTE:
In Release 3.1 and later systems, all extensions are initially and by default restricted from dial access to pools. In order for an extension to use a pool to access an outside line/trunk, this restriction must be removed.
Preventive Measures 8 4
Take the following preventive measures to limit the risk of unauthorized transfers by hackers:
■
■
Outward restrict all MERLIN LEGEND Communications System voice mail port extension numbers. This denies access to facilities (lines/trunks). In
Release 3.1 and later systems, voice mail ports are by default outward restricted.
As an additional security step, network dialing for all extensions, including voice mail port extensions, should be processed through ARS using dial access code .
!
SECURITY l ALERT:
The MERLIN LEGEND Communications System ships with ARS activated with all extensions set to FRL 3, allowing all international calling. To prevent toll fraud, ARS FRLs should be established using:
■
■
■
■
FRL 0 for restriction to internal dialing only
FRL 2 for restriction to local network calling only
FRL 3 for restriction to domestic long-distance (excluding area code 809 for the Dominican Republic as this is part of the North American Numbering Plan, unless 809 is required)
RL 4 for international calling
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Toll Fraud Prevention
Issue 1
August 1998
Page A-12
In Release 3.1 and later systems, default local and default toll tables are factory-assigned an FRL of 2. This simplifies the task of restricting extensions: the FRL for an extension merely needs to be changed from the default of 3.
■
■
Each extension should be assigned the appropriate FRL to match its calling requirements. All voice mail port extensions not used for
Outcalling should be assigned to FRL 0 (the default setting in
Release 3.1 and later).
Deny access to pooled facility codes by removing pool dial-out codes 70,
890-899, or any others on your system.
Create a Disallowed List or use the pre-prepared Disallowed List number 7
(Release 3.1 and later systems only) to disallow dialing 0, 11, 10, 1700,
1809, 1900, and 976 or 1(wildcard)976. In Release 3.1 and later systems,
Disallowed List number 7 does not include 800 and 1800 and 411 and
1411, but Lucent Technologies recommends that you add them. Assign all voice mail port extensions to this Disallowed List. Lucent
Technologies recommends assigning Disallowed List number 7.
This is an added layer of security, in case outward restriction is inadvertently removed.
(In Release 3.1 and later systems, voice messaging ports are assigned by default to Disallowed List number 7.)
If Outcalling is required by voice messaging system extensions:
■
Program an ARS FRL of 2 on voice mail port extension(s) used for
Outcalling.
■
■
If 800 and 411 numbers are used, remove 1800, 800, 411, and 1411 from
Disallowed List number 7.
If Outcalling is allowed to long-distance numbers, build an Allowed List for the voice mail port extension(s) used for Outcalling. This list should contain the area code and the first three digits of the local exchange telephone numbers to be allowed.
Additional general security for voice messaging systems:
■
Use a secure password for the General Mailboxes.
■
■
The default administration mailbox, 9997, must be reassigned to the system manager’s mailbox/extension number and securely password protected.
All voice messaging system users must use secure passwords known only to the user.
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Toll Fraud Prevention
Issue 1
August 1998
Page A-13
Security Risks Associated with the Automated
Attendant Feature of Voice Messaging Systems 8 4
Two areas of toll fraud risk associated with the Automated Attendant feature of voice messaging systems are the following:
■ Pooled facility (line/trunk) access codes are translated to a menu prompt to allow Remote Access. If a hacker finds this prompt, the hacker has immediate access. (In Release 3.1 and later systems, dial access to pools is initially factory-set to restrict all extensions: to allow pool access, this restriction must be removed by the system manager.)
■ If the Automated Attendant prompts callers to use Remote Call Forwarding
(RCF) to reach an outside telephone number, the system may be susceptible to toll fraud. An example of this application is a menu or
Submenu that says, “To reach our answering service, select prompt number 5,” and transfers a caller to an external telephone number.
Remote Call Forwarding can be used securely only when the central office provides “reliable disconnect” (sometimes referred to as forward disconnect or disconnect supervision), which guarantees that the central office does not return a dial tone after the called party hangs up. In most cases, the central office facility is a loop-start line/trunk which does not provide reliable disconnect. When loop-start lines/trunks are used, if the calling party stays on the line, the central office does return a dial tone at the conclusion of the call, enabling the caller to place another call as if it were being placed from your company. Ground-start trunks provide reliable disconnect and should be used whenever possible.
Preventive Measures 8 4
Take the following preventive measures to limit the risk of unauthorized use of the
Automated Attendant feature by hackers:
■
■
■
Do not use Automated Attendant prompts for Automatic Route Selection
(ARS) Codes or Pooled Facility Codes.
Assign all unused Automated Attendant Selector Codes to zero, so that attempts to dial these are routed to the system attendant.
If Remote Call Forwarding (RCF) is required, MERLIN LEGEND
Communications System owners should coordinate with their Lucent
Technologies Account Team or authorized dealer to verify the type of central office facility used for RCF. If it is a ground-start line/trunk, or if it is a loop-start line/trunk and central office reliable disconnect can be ensured, then nothing else needs to be done.
NOTE:
In most cases these are loop-start lines/trunks without reliable disconnect.
The local telephone company must be involved in order to change the facilities used for RCF to ground start lines/trunks. Usually a charge applies for this change. Also, hardware and software changes may be necessary in
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Toll Fraud Prevention
Issue 1
August 1998
Page A-14 the MERLIN LEGEND Communications System. The MERLIN MAIL
MERLIN and MERLIN LEGEND MAIL Automated Attendant feature merely accesses the RCF feature in the MERLIN LEGEND
Communications System. Without these changes being made, this feature is highly susceptible to toll fraud. These same preventive measures must be taken if the RCF feature is active for MERLIN LEGEND
Communications System extensions whether or not it is accessed by an
Automated Attendant menu.
Security Risks Associated with the Remote
Access Feature 8 4
Remote Access allows the MERLIN LEGEND Communications System owner to access the system from a remote telephone and make an outgoing call or perform system administration, using the network facilities (lines/trunks) connected to the
MERLIN LEGEND Communications System. Hackers, scanning the public switched network by randomly dialing numbers with war dialers (a device that randomly dials telephone numbers, including 800 numbers, until a modem or dial tone is obtained), can find this feature, which will return a dial tone to them. They can even employ war dialers to attempt to discover barrier codes.
Preventive Measures 8 4
Take the following preventive measures to limit the risk of unauthorized use of the
MERLIN LEGEND Communications System Remote Access feature by hackers:
■
■
■
■
The Remote Access feature can be abused by criminal toll fraud hackers, if it is not properly administered. Therefore, this feature should not be used unless there is a strong business need.
It is strongly recommended that customers invest in security adjuncts, which typically use one-time passcode algorithms. These security adjuncts discourage hackers. Since a secure use of the Remote Access feature generally offers savings over credit-card calling, the break-even period can make the investment in security adjuncts worthwhile.
If a customer chooses to use the Remote Access feature without a security adjunct, then multiple barrier codes should be employed, with one per user if the system permits. The MERLIN LEGEND Communications System permits a maximum of 16 barrier codes.
The maximum length should be used for each barrier code, and should be changed periodically. Barrier codes, like passwords, should consist of a random, hard-to-guess sequence of digits. While MERLIN LEGEND
Communications System Release 3.0 permits a barrier code of up to 11 digits, systems prior to Release 3.0 permit barrier codes of up to only four digits.
If Remote Access is used, an upgrade to MERLIN LEGEND Communications
System Release 3.0 is encouraged to take advantage of the longer barrier code.
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Other Security Hints
Issue 1
August 1998
Page A-15
Other Security Hints
8 4
Make sure that the Automated Attendant Selector Codes do not permit outside line selection.
Following are a number of measures and guidelines that can help you ensure the security of your communications system and voice messaging system.
Multiple layers of security are always recommended to keep your system secure.
Educating Users 8 4
Everyone in your company who uses the telephone system is responsible for system security. Users and attendants/operators need to be aware of how to recognize and react to potential hacker activity. Informed people are more likely to cooperate with security measures that often make the system less flexible and more difficult to use.
■ Never program passwords or authorization codes onto Auto Dial buttons.
Display telephones reveal the programmed numbers and internal abusers can use the Auto Dial buttons to originate unauthorized calls.
■
■
■
Discourage the practice of writing down barrier codes or passwords. If a barrier code or password needs to be written down, keep it in a secure place and never discard it while it is active.
Operators or attendants should tell their system manager if they answer a series of calls where there is silence on the other end or the caller hangs up.
Users who are assigned voice mailboxes should frequently change personal passwords and should not choose obvious passwords.
■
■
■
■
■
The system manager should advise users with special telephone privileges
(such as Remote Access, Outcalling, and Remote Call Forwarding) of the potential risks and responsibilities.
Be suspicious of any caller who claims to be with the telephone company and wants to check an outside line. Ask for a callback number, hang up and confirm the caller’s identity.
Never distribute the office telephone directory to anyone outside the company; be careful when discarding it (shred the directory).
Never accept collect telephone calls.
Never discuss your telephone system’s numbering plan with anyone outside the company.
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Other Security Hints
Issue 1
August 1998
Page A-16
Educating Operators 8 4
Operators or attendants need to be especially aware of how to recognize and react to potential hacker activity. To defend against toll fraud, operators should follow the guidelines below:
■ Establish procedures to counter social engineering . Social engineering is a con game that hackers frequently use to obtain information that may help them gain access to your communications system or voice messaging system.
■ When callers ask for assistance in placing outside or long-distance calls, ask for a callback extension.
■
■
Verify the source. Ask callers claiming to be maintenance or service personnel for a callback number. Never transfer to * 10 without this verification. Never transfer to extension 900.
Remove the headset and/or handset when the console is not in use.
Detecting Toll Fraud 8 4
To detect toll fraud, users and operators should look for the following:
■ Lost voice mail messages, mailbox lockout, or altered greetings
■
■
Inability to log into voice mail
Inability to get an outside line
■
■
■
■
■
Foreign language callers
Frequent hang-ups
Touch-tone sounds
Caller or employee complaints that the lines are busy
Increases in internal requests for assistance in making outbound calls
(particularly international calls or requests for dial tone)
■
■
■
Outsiders trying to obtain sensitive information
Callers claiming to be the “phone” company
Sudden increase in wrong numbers
Establishing a Policy 8 4
As a safeguard against toll fraud, follow these guidelines for your MERLIN
LEGEND Communications System and voice messaging system:
■
■
Change passwords frequently (at least quarterly). Changing passwords routinely on a specific date (such as the first of the month) helps users to remember to do so.
Always use the longest-length password allowed.
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Other Security Hints
Issue 1
August 1998
Page A-17
■
■
■
■
■
■
■
■
■
Establish well-controlled procedures for resetting passwords.
Limit the number of invalid attempts to access a voice mailbox to five or less.
Monitor access to the MERLIN LEGEND Communications System dial-up maintenance port. Change the access password regularly and issue it only to authorized personnel. Disconnect the maintenance port when not in use.
(However, this eliminates Lucent Technologies’ 24-hour maintenance surveillance capability and may result in additional maintenance costs.)
Create a communications system management policy concerning employee turnover and include these suggestions:
— Delete all unused voice mailboxes in the voice mail system.
— If a terminated employee had Remote Access calling privileges and a personal authorization code, remove the authorization code immediately.
— If barrier codes and/or authorization codes were shared by the terminated employee, these should be changed immediately.
Regularly back up your MERLIN LEGEND Communications System files to ensure a timely recovery should it be required. Schedule regular, off-site backups.
Keep the Remote Maintenance Device turned off when not in use by
Lucent Technologies or your authorized dealer.
Limit transfers to registered subscribers only.
Use the Security Violations Notification options (Mailbox Lock or Warning
Message) to alert you of any mailbox break-in attempts. Investigate all incidents.
Review security policies and procedures and keep them up to date.
Choosing Passwords 8 4
Passwords should be the maximum length allowed by the system.
Passwords should be hard to guess and should
not
contain:
■
■
■
■
All the same numbers (for example, 1111, 666666)
Sequential characters (for example 123456)
Numbers that can be associated with you or your business, such as your name, birthday, business name, business address, telephone number, or social security number.
Words and commonly used names.
Passwords should be changed regularly, at least on a quarterly basis. Recycling old passwords is not recommended. Never program passwords (or authorization codes or barrier codes) onto a speed dial button.
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Limited Warranty and Limitation of Liability
Issue 1
August 1998
Page A-18
Physical Security 8 4
You should always limit access to the system console (or attendant console) and supporting documentation. The following are some recommendations:
■ Keep the system console and supporting documentation in an office that is secured with a changeable combination lock. Provide the combination only to those individuals having a real need to enter the office.
■
■
■
■
Keep telephone wiring closets and equipment rooms locked.
Keep telephone logs and printed reports in locations that only authorized personnel can enter.
Design distributed reports so they do not reveal password or trunk access code information.
Keep the voice messaging system Remote Maintenance Device turned off.
Limiting Outcalling 8 4
When Outcalling is used to contact subscribers who are off-site, use the MERLIN
LEGEND Communications System Allowed Lists and Disallowed Lists or
Automatic Route Selection features to minimize toll fraud.
If the Outcalling feature will not be used, outward restrict all voice messaging system ports. If Outcalling will be used, ports not used for Outcalling should be
Outward Restricted (for MERLIN MAIL Voice Messaging Systems, port 2 on a
2-port system, port 4 on a 4-port system, ports 5 and 6 on a 6-port system; for
MERLIN LEGEND MAIL Voice Messaging Systems, port 7 of the system’s module). Use Outward Restriction, Toll Restrictions, Allowed Lists, Disallowed
Lists and Facility Restrictions Levels, as appropriate, to minimize the possibility of toll fraud.
Limited Warranty and
Limitation of Liability
8 4
Lucent Technologies warrants to you, the customer, that your MERLIN LEGEND
Communications System will be in good working order on the date Lucent
Technologies or its authorized reseller delivers or installs the system, whichever is later (“Warranty Date”). If you notify Lucent Technologies or its authorized reseller within one year of the Warranty Date that your system is not in good working order, Lucent Technologies will without charge to you repair or replace, at its option, the system components that are not in good working order. Repair or replacement parts may be new or refurbished and will be provided on an exchange basis. If Lucent Technologies determines that your system cannot be repaired or replaced, Lucent Technologies will remove the system and, at your option, refund the purchase price of your system, or apply the purchase price towards the purchase of another Lucent Technologies system.
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Limited Warranty and Limitation of Liability
Issue 1
August 1998
Page A-19
If you purchased your system directly from Lucent Technologies, Lucent
Technologies will perform warranty repair in accordance with the terms and conditions of the specific type of Lucent Technologies maintenance coverage you selected. If you purchased your system from an a Lucent
Technologies-authorized reseller, contact your reseller for the details of the maintenance plan applicable to your system.
This Lucent Technologies limited warranty covers damage to the system caused by power surges, including power surges due to lightning.
The following will not be deemed to impair the good working order of the system, and Lucent Technologies will not be responsible under the limited warranty for damages resulting from:
■
■
Failure to follow Lucent Technologies’ installation, operation, or maintenance instructions
Unauthorized system modification, movement, or alteration
■
■
■
Unauthorized use of common carrier communications services accessed through the system
Abuse, misuse, or negligent acts or omissions of the customer and persons under the customer’s control
Acts of third parties and acts of God
LUCENT TECHNOLOGIES’ OBLIGATION TO REPAIR, REPLACE, OR REFUND
AS SET FORTH ABOVE IS YOUR EXCLUSIVE REMEDY.
EXCEPT AS SPECIFICALLY SET FORTH ABOVE, LUCENT TECHNOLOGIES,
ITS AFFILIATES, SUPPLIERS, AND AUTHORIZED RESELLERS MAKE NO
WARRANTIES, EXPRESS OR IMPLIED, AND SPECIFICALLY DISCLAIM ANY
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE.
Limitation of Liability 8 4
Except as provided below, the liability of Lucent Technologies and its affiliates and suppliers for any claims, losses, damages, or expenses from any cause whatsoever (including acts or omissions of third parties), regardless of the form of action, whether in contract, tort, or otherwise, shall not exceed the lesser of:
(1) the direct damages proven; or (2) the repair cost, replacement cost, license fee, annual rental charge, or purchase price, as the case may be, of the equipment that gives rise to the claim. Except as provided below, Lucent
Technologies and its affiliates and suppliers shall not be liable for any incidental, special, reliance, consequential, or indirect loss or damage incurred in connection with the equipment. As used in this paragraph, consequential damages include, but are not limited to, the following: lost profits, lost revenues, and losses arising out of unauthorized use (or charges for such use) of common carrier telecommunications services or facilities accessed through or connected to the equipment. For personal injury caused by Lucent Technologies’s negligence,
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Remote Administration and Maintenance
Issue 1
August 1998
Page A-20
Lucent Technologies’s liability shall be limited to proven damages to person. No action or proceeding against Lucent Technologies or its affiliates or suppliers may be commenced more than twenty-four (24) months after the
cause of action accrues. THIS PARAGRAPH SHALL SURVIVE FAILURE OF
AN EXCLUSIVE REMEDY.
Remote Administration and Maintenance
8 4
The Remote Administration and Maintenance feature of your telecommunications system, if you choose to use it, permits users to change the system features and capabilities from a remote location.
The Remote Administration and Maintenance feature, through proper administration, can help you reduce the risk of unauthorized persons gaining access to the network. However, telephone numbers and access codes can be compromised when overheard in a public location, or lost through theft of a wallet or purse containing access information or through carelessness (for example, writing codes on a piece of paper and improperly discarding them). Additionally, hackers may use a computer to dial an access code and then publish the information to other hackers. Substantial charges can accumulate quickly. It is your responsibility to take appropriate steps to implement the features properly, evaluate and administer the various restriction levels, and protect and carefully distribute access codes.
Under applicable tariffs, you will be responsible for payment of toll charges.
Lucent Technologies cannot be responsible for such charges and will not make any allowance or give any credit resulting from unauthorized access.
To reduce the risk of unauthorized access through Remote Administration and
Maintenance, please observe the following procedures:
■ The System Administration and Maintenance capability of a Hybrid/PBX or
Key system is protected by a password.
— Change the default password immediately.
— Continue to change the password regularly.
■
— Give the password only to people who need it and impress upon them the need to keep it secret.
— If anyone who knows the password leaves the company, change the password immediately.
If you have a special telephone line connected to your Hybrid/PBX or Key system for Remote Administration and Maintenance, you should do one of the following:
— Unplug the line when it is not being used.
— Install a switch in the line to turn it off when it is not being used.
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Remote Administration and Maintenance
Issue 1
August 1998
Page A-21
— Keep the Remote Administration and Maintenance telephone number secret. Give it only to people who need to know it, and impress upon them the need to keep it a secret. Do not write the telephone number on the Hybrid/PBX or Key system, the connecting equipment, or anywhere else in the system room.
If your Remote Administration and Maintenance feature requires that someone in your office transfer the caller to the Remote Administration and Maintenance extension, you should impress upon your employees the importance of transferring only authorized individuals to that extension.
MERLIN LEGEND Communications System Release 6.1
Feature Reference 555-661-110
A Customer Support Information
Remote Administration and Maintenance
Issue 1
August 1998
Page A-22
advertisement
Related manuals
advertisement
Table of contents
- 3 Table of Contents
- 18 IMPORTANT SAFETY INSTRUCTIONS
- 20 New Features and Enhancements
- 20 Release 6.1 Enhancements (August 1998)
- 20 Private Networking
- 21 Centralized Voice Messaging
- 21 Group Calling Enhancements
- 22 Transfer Redirect
- 22 Direct Station Selector
- 22 Call Forwarding
- 22 SMDR
- 22 Decrease in Call Set-Up Time
- 23 PRI Switch Type Test
- 23 Service Observing
- 23 Win SPM
- 23 Windows NT Driver
- 24 Prior Releases: Features and Enhancements
- 24 Release 6.0 Enhancements (February 1998)
- 24 Private Networks
- 26 Group Calling Enhancements
- 26 Queue Control
- 27 Prompt-Based Overflow
- 27 Centrex Transfer via Remote Call Forwarding
- 28 Authorization Codes and RemoteCallForwarding
- 28 Release 5.0 Enhancements (June 1997)
- 28 Computer Telephony Integration (CTI)
- 28 Basic Call Control
- 29 Screen Pop
- 30 HotLine Feature
- 30 Group Calling Enhancements
- 31 Most Idle Hunt Type
- 31 Delay Announcement Devices
- 31 Enhanced Calls-in-Queue Alarm Thresholds
- 32 MLX-5 and MLX-5D Telephones
- 33 Release 4.2 Enhancements (June 1997)
- 33 Additional Network Switch and Services Options for...
- 34 Improvements to Station Message Detail Recording (...
- 35 MERLIN LEGEND Reporter
- 35 Maintenance Enhancements
- 35 Change to Permanent Error Alarm
- 35 Enhanced Extension Information Report
- 36 Release 4.1 Enhancements (June 1997)
- 36 Coverage Timers Programmed for Individual Extensions
- 36 Night Service with Coverage Control
- 37 Night Service Group Line Assignment
- 37 Forward on Busy
- 37 Maintenance Testing for BRI Facilities that Are Part of Multiline Hunt Groups (MLHGs)
- 38 Release 4.0 Enhancements (March 1996)
- 38 Support for Up to 200 Extensions
- 38 Support for National ISDN BRI Service
- 38 New Control Unit Modules
- 38 800 NI-BRI Module
- 38 016 Tip/Ring Module
- 38 Downloadable Firmware for the 016 and NI BRI Modules
- 39 Support for 2B Data Applications
- 39 Support for T1 Switched 56 Digital Data Transmission
- 39 Forwarding Delay Option
- 39 Voice Announce on Queued Call Console
- 40 Time-Based Option for OverflowonCallingGroup
- 40 Single-Line Telephone Enhancements
- 40 Seven-Digit Password for SPM
- 41 Release 3.1 Enhancements (March 1996)
- 41 Call Restriction Checking for Star Codes
- 41 Trunk-to-Trunk Transfer Set for Each Extension
- 41 Programmable Second Dial Tone Timer
- 41 Security Enhancements
- 42 Disallowed List Including Numbers Often Associated with Toll Fraud
- 42 Default Pool Dial-Out Code Restriction for All Extensions
- 42 Default Outward Restrictions for VMI Ports
- 42 Default Facility Restriction Level (FRL) for VMI Ports
- 42 Default for the Default Local Table
- 42 New Maintenance Procedure for Testing Outgoing Trunks
- 44 About This Book
- 44 Intended Audience
- 44 How to Use This Book
- 46 Terms and Conventions Used
- 47 Typographical Conventions
- 47 Product Safety Labels
- 47 Security
- 48 Related Documents
- 49 How to Comment on This Book
- 50 Features
- 51 Index of Feature Names
- 64 Index to Features by Activity
- 76 Abbreviated Ring
- 76 Account Code Entry/Forced Account Code Entry
- 76 At a Glance
- 76 Description
- 77 Considerations and Constraints
- 78 Mode Differences
- 78 Behind Switch Mode
- 78 Telephone Differences
- 78 Queued Call Consoles
- 78 Other Multiline Telephones
- 79 SingleLine Telephones
- 79 Feature Interactions
- 80 Administration
- 81 Alarm
- 81 At a Glance
- 81 Description
- 81 Considerations and Constraints
- 82 Telephone Differences
- 82 DirectLine Consoles
- 82 Queued Call Consoles
- 82 Feature Interactions
- 83 Alarm Clock
- 83 At a Glance
- 83 Description
- 83 To Set the Alarm
- 84 To Cancel the Alarm
- 84 Feature Interactions
- 85 Allowed/Disallowed Lists
- 85 At a Glance
- 86 Description
- 87 Star Codes and Allowed/Disallowed Lists
- 88 Default Disallowed Lists
- 88 Disallowed Lists and VMI Ports
- 88 Considerations and Constraints
- 89 Feature Interactions
- 92 Authorization Code
- 92 At a Glance
- 92 Description
- 93 Activating an Authorization Code
- 94 Entering an Authorization Code
- 94 Deactivating an Authorization Code
- 94 Considerations and Constraints
- 95 Telephone Differences
- 95 Queued Call Console
- 95 Analog Multiline Telephones
- 95 SingleLine Telephones
- 96 Feature Interactions
- 98 Auto Answer All
- 98 At a Glance
- 98 Description
- 98 Considerations and Constraints
- 99 Telephone Differences
- 99 Queued Call Consoles
- 99 Other Multiline Telephones
- 99 SingleLine Telephones
- 99 Feature Interactions
- 101 Auto Answer Intercom
- 101 At a Glance
- 101 Description
- 101 Considerations and Constraints
- 102 Mode Differences
- 102 Telephone Differences
- 102 Queued Call Consoles
- 102 Other Multiline Telephones
- 102 SingleLine Telephones
- 102 Feature Interactions
- 103 Auto Dial
- 103 At a Glance
- 103 Description
- 103 Considerations and Constraints
- 105 Mode Differences
- 105 Hybrid/PBX Mode
- 105 Key Mode
- 105 Behind Switch Mode
- 105 Telephone Differences
- 105 DirectLine Consoles
- 105 Queued Call Consoles
- 105 Other Multiline Telephones
- 106 SingleLine Telephones
- 106 Feature Interactions
- 109 Automatic Line Selection and Ringing/Idle Line Preference
- 109 At a Glance
- 109 Description
- 109 Ringing/Idle Line Preference
- 110 Automatic Line Selection
- 111 Considerations and Constraints
- 112 Mode Differences
- 112 Hybrid/PBX Mode
- 112 Key Mode
- 112 Behind Switch Mode
- 112 Telephone Differences
- 112 Queued Call Consoles
- 112 Other Multiline Telephones
- 113 SingleLine Telephones
- 113 Feature Interactions
- 115 Automatic Maintenance Busy
- 115 At a Glance
- 115 Description
- 115 Considerations and Constraints
- 116 Mode Differences
- 116 Hybrid/PBX Mode
- 116 Key and Behind Switch Modes
- 116 Feature Interactions
- 117 Automatic Route Selection
- 117 At a Glance
- 118 Description
- 122 Star Codes and Automatic Route Selection
- 122 ARS Restrictions for VMI Ports
- 123 How ARS Works
- 123 Table Selection
- 123 411, 611, 811, 911, or 10xx/101xxxxx (Equal Access Codes)
- 123 First Digit Not a 1, N11, or Equal Access Code
- 124 First Digit a 1 (Not an Equal Access Code)
- 126 Route Selection within the Table
- 126 Subpatterns
- 127 Restrictions
- 128 Considerations and Constraints
- 129 Mode Differences
- 129 Feature Interactions
- 133 BargeIn
- 133 At a Glance
- 133 Description
- 133 Considerations and Constraints
- 134 Telephone Differences
- 134 DirectLine Consoles
- 134 Queued Call Consoles
- 134 SingleLine Telephones
- 134 Feature Interactions
- 137 Basic Rate Interface (BRI)
- 137 At a Glance
- 138 Description
- 139 Terminology
- 139 Lines/Trunks
- 139 Digital Subscriber Line
- 139 Directory Number
- 139 ISDN Ordering Code
- 139 Multiline Hunt Group
- 140 Called Party Number
- 140 Calling Party Number
- 141 Service Profile
- 141 Service Profile Identifier
- 141 Clock Synchronization
- 142 Clock Switching
- 142 Timers and Counters
- 143 Call Processing
- 143 Incoming Calls
- 143 Display Operation
- 144 Outgoing Calls
- 145 Considerations and Constraints
- 145 Feature Interactions
- 147 Call Waiting
- 147 At a Glance
- 147 Description
- 148 Considerations and Constraints
- 149 Telephone Differences
- 149 Queued Call Consoles
- 149 Other Multiline Telephones
- 149 SingleLine Telephones
- 149 Feature Interactions
- 152 Callback
- 152 At a Glance
- 152 Description
- 153 Considerations and Constraints
- 154 Mode Differences
- 154 Hybrid/PBX Mode
- 154 Key and Behind Switch Modes
- 154 Telephone Differences
- 154 Queued Call Consoles
- 154 Other Multiline Telephones
- 154 SingleLine Telephones
- 155 Feature Interactions
- 160 Caller ID
- 160 At a Glance
- 160 Description
- 160 800 GS/LSID Module
- 161 LSID Delay Option
- 161 Facilities
- 162 Display Operation
- 162 Normal Incoming Call
- 162 Group Calling
- 162 Transferring a Call
- 162 Considerations and Constraints
- 162 General
- 163 Caller ID/PRI ANI Comparison
- 163 Mode Differences
- 163 Behind Switch Mode
- 163 Feature Interactions
- 166 Calling Restrictions
- 166 At a Glance
- 167 Description
- 167 Outward and Toll Restrictions
- 168 Outward Restriction for VMI Ports
- 168 Pool DialOut Code Restriction (Hybrid/PBXOnly)
- 168 Facility Restriction Level (Hybrid/PBX Only)
- 168 Restrictions for VMI Ports
- 169 Remote Access
- 169 Night Service
- 170 Considerations and Constraints
- 170 Mode Differences
- 170 Hybrid/PBX Mode
- 170 Key and Behind Switch Modes
- 171 Feature Interactions
- 173 CampOn
- 173 At a Glance
- 173 Description
- 173 Considerations and Constraints
- 174 Telephone Differences
- 174 DirectLine Consoles
- 174 Queued Call Consoles
- 174 Other Multiline Telephones
- 175 SingleLine Telephones
- 175 Feature Interactions
- 177 Centralized Voice Messaging
- 177 At a Glance
- 177 Description
- 178 Centrex Operation
- 178 At a Glance
- 178 Description
- 179 Full Centrex
- 180 Limited Centrex
- 181 Differences between Full and Limited Centrex
- 182 Centrex Transfer via Remote Call Forwarding
- 183 Considerations and Constraints
- 185 Mode Differences
- 185 Hybrid/PBX Mode
- 185 Key Mode
- 186 Behind Switch Mode
- 186 Telephone Differences
- 186 Multiline Telephones
- 186 MLX Telephones
- 187 Analog Multiline Telephones
- 187 SingleLine Telephones
- 188 Feature Interactions
- 190 Conference
- 190 At a Glance
- 190 Description
- 190 Adding Conference Participants
- 190 Dropping Conference Participants
- 191 Leaving a Conference
- 191 Considerations and Constraints
- 192 Mode Differences
- 192 Behind Switch Mode
- 193 Telephone Differences
- 193 Queued Call Consoles
- 193 Other Multiline Telephones
- 194 SingleLine Telephones
- 195 Feature Interactions
- 201 Coverage
- 201 At a Glance
- 203 Description
- 204 Individual Coverage
- 207 Group Coverage
- 209 Selective Coverage
- 210 Eligibility for Coverage
- 211 Interaction of Individual and Group Coverage
- 220 Cover to Voice Mail with Escape to System Operator
- 220 Cover to System Operator before Voice Mail
- 221 Primary Coverage
- 222 Phantom Calling Groups
- 223 Phantom Extensions
- 225 Cover to Personal Secretary before Voice Mail
- 226 Considerations and Constraints
- 228 Telephone Differences
- 228 DirectLine Consoles
- 228 Queued Call Consoles
- 228 Other Multiline Telephones
- 229 SingleLine Telephones
- 229 Feature Interactions
- 236 CTI (Computer Telephony Integration)Link
- 236 At a Glance
- 236 Description
- 237 Platform Requirements
- 238 Screen Pop
- 240 Collected Digits
- 241 Power Dial
- 241 Basic Call Control
- 242 Programming a CTI Link
- 243 Considerations and Constraints
- 244 Private Network Operation (Release 6.0 and Later Systems Only)
- 245 Mode Differences
- 245 Key and Behind Switch Modes
- 246 Telephone Differences
- 246 Queued Call Consoles
- 246 Direct-Line Consoles
- 246 SingleLine Telephones
- 246 Feature Interactions
- 249 Digital Data Calls
- 249 At a Glance
- 249 Description
- 250 Primary Rate Interface
- 250 T1 Switched 56 Lines
- 250 Basic Rate Interface
- 250 2B Data
- 251 Considerations and Constraints
- 252 Applications
- 252 Telephone Differences
- 252 Queued Call Consoles
- 252 Feature Interactions
- 257 DirectLine Console
- 257 At a Glance
- 258 Description
- 259 Considerations and Constraints
- 260 Mode Differences
- 260 Hybrid/PBX Mode
- 260 Key and Behind Switch Modes
- 260 Telephone Differences
- 260 MLX Telephones
- 261 Analog Multiline Telephones
- 261 Feature Interactions
- 266 Direct Station Selector
- 266 At a Glance
- 266 Description
- 269 Normal CallHandling Operation
- 275 Calling Group or CMS Supervisory Operation
- 276 Extension Status Operation (Hotel Configuration)
- 276 Message Status Operation
- 278 Considerations and Constraints
- 279 Mode Differences
- 279 Behind Switch Mode
- 279 Feature Interactions
- 286 Direct Voice Mail
- 286 At a Glance
- 286 Description
- 287 Considerations and Constraints
- 287 Mode Differences
- 287 Behind Switch Mode
- 287 Telephone Differences
- 287 Queued Call Consoles
- 287 Single-Line Telephones
- 288 Feature Interactions
- 289 Directories
- 289 At a Glance
- 290 Description
- 290 System Directory
- 291 Extension Directory
- 291 Personal Directory
- 291 Considerations and Constraints
- 292 Telephone Differences
- 292 DirectLine Consoles
- 292 Queued Call Consoles
- 292 Other Multiline Telephones
- 292 Analog Multiline, MLX-10, or MLX5 Telephones
- 292 MLX20L Telephones
- 293 MLX 28D, MLX 16DP, MLX 10DP, MLX 10D, and MLX 5-D Telephones)
- 293 SingleLine Telephones
- 294 Feature Interactions
- 296 Display
- 296 At a Glance
- 296 Description
- 300 Considerations and Constraints
- 300 MLX Display Telephones
- 300 Home Screen
- 301 Menu Screen
- 302 Feature Screen
- 304 Inspect Screens
- 305 Analog Multiline Display Telephones
- 306 Feature Interactions
- 324 Do Not Disturb
- 324 At a Glance
- 324 Description
- 325 Considerations and Constraints
- 325 Telephone Differences
- 325 DirectLine Consoles
- 325 Queued Call Consoles
- 325 Other Multiline Telephones
- 325 SingleLine Telephones
- 326 Feature Interactions
- 328 Drop
- 329 Extension Status
- 329 At a Glance
- 330 Description
- 331 Considerations and Constraints
- 332 Telephone Differences
- 332 DirectLine Consoles
- 332 Queued Call Consoles
- 332 Multiline Telephones
- 333 SingleLine Telephones
- 333 Feature Interactions
- 335 Fax Extension
- 335 At a Glance
- 335 Description
- 336 Considerations and Constraints
- 337 Feature Interactions
- 337 Forced Account Code Entry
- 338 Forward and FollowMe
- 338 At a Glance
- 339 Description
- 340 Forwarding in a Private Network
- 341 Centrex Transfer via Remote Call Forwarding
- 343 Use of Forward or Follow Me
- 344 Call Eligibility for Forwarding Features
- 345 Forwarded Call Ringing
- 346 Delayed Forwarding
- 347 Considerations and Constraints
- 349 Telephone Differences
- 349 DirectLine Consoles
- 350 Queued Call Consoles
- 350 Other Multiline Telephones
- 351 SingleLine Telephones
- 352 Feature Interactions
- 361 Group Calling
- 361 At a Glance
- 364 Description
- 366 Calling Group Options
- 366 Queue Control
- 368 Calling Group Supervisor Position
- 369 Hunt Type
- 370 Delay Announcements
- 372 MessageWaiting Receiver
- 372 CallsinQueue Alarm Threshold
- 374 Overflow Threshold
- 374 Overflow Threshold Time
- 375 Prompt-Based Overflow
- 375 Overflow Receiver
- 376 Calling Group Overflow Receiver
- 376 QCC Queue Overflow Receiver
- 377 Calling Group Type
- 378 Using Alarm Thresholds to Monitor the Effectiveness of Delay Announcements
- 380 Considerations and Constraints
- 382 Mode Differences
- 382 Behind Switch Mode
- 382 Telephone Differences
- 383 Direct Station Selector
- 383 Queued Call Consoles
- 383 Other Multiline Telephones
- 383 SingleLine Telephones
- 384 Feature Interactions
- 392 Headset Options
- 392 At a Glance
- 392 Description
- 392 Headset Hang Up
- 393 Headset Status
- 394 Headset Auto Answer
- 395 Headset/Handset Mute
- 395 Considerations and Constraints
- 396 Telephone Differences
- 396 Queued Call Consoles
- 396 Other Multiline Telephones
- 397 Feature Interactions
- 399 Hold
- 399 At a Glance
- 399 Description
- 401 Considerations and Constraints
- 401 Telephone Differences
- 401 DirectLine Consoles
- 402 Queued Call Consoles
- 403 Other Multiline Telephones
- 403 SingleLine Telephones
- 404 Feature Interactions
- 408 HotLine
- 408 At a Glance
- 408 Description
- 409 Considerations and Constraints
- 410 Telephone Differences
- 410 Feature Interactions
- 411 Idle Line Preference
- 412 Inside Dial Tone
- 412 At a Glance
- 412 Description
- 413 Inspect
- 413 At a Glance
- 413 Description
- 413 Considerations and Constraints
- 414 Telephone Differences
- 414 DirectLine Consoles
- 414 Queued Call Consoles
- 414 Other Multiline Telephones
- 414 SingleLine Telephones
- 414 Feature Interactions
- 416 Integrated Administration
- 416 At a Glance
- 416 Description
- 418 Integrated Administration in Release 4.1 and Later Systems
- 419 Application Switch Defaults
- 420 Automatic Reconciliation
- 420 Installation Overview
- 423 Operation
- 424 Application Switch Defaults Screen
- 426 Calling Groups
- 426 Coverage Group
- 427 Reliable Disconnect
- 427 Delay Ring and Coverage Delay Ring
- 427 VMS Transfer Return Interval and Transfer Return Time
- 428 System Programming Results
- 428 Screen Results
- 428 Extension Directory Setup
- 428 System Programming Results
- 428 Screen Results
- 429 Extension Directory
- 430 System Programming Results
- 430 Screen Results
- 430 AUDIX Voice Power/Fax Attendant User
- 432 System Programming Results
- 432 Screen Results
- 432 System Programming/Switch Admin
- 434 System Programming Results
- 437 Screen Results
- 438 Automated Attendant
- 438 System Programming Results
- 439 Screen Results
- 439 Automated Attendant: Immediate Call-Handling
- 439 System Programming Results
- 440 Screen Results
- 440 Automated Attendant: Delayed Call-Handling
- 440 System Programming Results
- 440 Screen Results
- 441 Automated Attendant: Night Service
- 441 System Programming Results
- 441 Screen Results
- 441 Call Answer
- 442 System Programming Results
- 442 Screen Results
- 442 Fax Response
- 443 System Programming Results
- 443 Screen Results
- 443 Information Service
- 444 System Programming Results
- 444 Screen Results
- 444 Message Drop
- 445 System Programming Results
- 445 Screen Results
- 445 Voice Mail
- 446 System Programming Results
- 446 Screen Results
- 446 Considerations and Constraints
- 447 Mode Differences
- 447 Feature Interactions
- 449 Labeling
- 449 At a Glance
- 449 Description
- 451 Considerations and Constraints
- 452 Telephone Differences
- 452 Multiline Telephones
- 452 Feature Interactions
- 454 Language Choice
- 454 At a Glance
- 454 Description
- 455 System Language
- 455 Extension Language
- 455 SMDR Report Language
- 456 Programming Report Language
- 456 SPM Language
- 456 PC Language
- 456 Console Window Language
- 457 Considerations and Constraints
- 457 Telephone Differences
- 457 Multiline Telephones
- 457 Feature Interactions
- 458 Last Number Dial
- 458 At a Glance
- 458 Description
- 458 Considerations and Constraints
- 459 Mode Differences
- 459 Behind Switch
- 459 Key Mode
- 459 Telephone Differences
- 459 Queued Call Consoles
- 459 Other Multiline Telephones
- 460 SingleLine Telephones
- 460 Feature Interactions
- 462 Line Request
- 462 At a Glance
- 462 Description
- 462 Considerations and Constraints
- 463 Mode Differences
- 463 Hybrid/PBX Mode
- 463 Key and Behind Switch Modes
- 463 Telephone Differences
- 463 Queued Call Consoles
- 463 Other Multiline Telephones
- 463 SingleLine Telephones
- 463 Feature Interactions
- 464 Messaging
- 464 At a Glance
- 465 Description
- 465 Sending Messages
- 465 Send/Remove Message
- 466 Leave Message
- 468 Receiving Messages
- 469 Fax MessageWaiting Receivers
- 470 Calling Group MessageWaiting Receivers
- 470 Posted Messages
- 472 Considerations and Constraints
- 473 Telephone Differences
- 473 DirectLine Consoles
- 473 Queued Call Consoles
- 473 Other Multiline Telephones
- 473 SingleLine Telephones
- 474 Feature Interactions
- 478 Microphone Disable
- 478 At a Glance
- 478 Description
- 478 Considerations and Constraints
- 479 Telephone Differences
- 479 Queued Call Consoles
- 479 Other Telephones
- 479 Feature Interactions
- 480 MultiFunction Module
- 480 At a Glance
- 480 Description
- 481 Tip/Ring Interface
- 481 Supplemental Alert Adapter
- 482 Programming Requirements
- 483 Considerations and Constraints
- 484 Mode Differences
- 484 Hybrid/PBX Mode
- 484 Key and Behind Switch Modes
- 484 Telephone Differences
- 484 DirectLine Consoles
- 484 Queued Call Consoles
- 485 Other Telephones
- 485 SingleLine Telephones
- 485 Feature Interactions
- 487 Music On Hold
- 487 At a Glance
- 487 Description
- 489 Considerations and Constraints
- 489 Feature Interactions
- 491 Night Service
- 491 At a Glance
- 492 Description
- 493 Night Service Group Assignment
- 494 Night Service with Outward Restriction
- 495 Night Service with Time Set
- 495 Night Service with Coverage Control
- 496 Considerations and Constraints
- 497 Telephone Differences
- 497 DirectLine Consoles
- 498 Queued Call Consoles
- 498 Other Multiline Telephones
- 498 SingleLine Telephones
- 498 Feature Interactions
- 501 Notify
- 502 Paging
- 502 At a Glance
- 502 Description
- 502 Speakerphone Paging
- 503 Individual Paging
- 503 Group Paging
- 504 Loudspeaker Paging
- 504 Considerations and Constraints
- 506 Telephone Differences
- 506 DirectLine Consoles
- 506 Queued Call Consoles
- 506 Cordless and Cordless/Wireless Telephones
- 506 All Other Multiline Telephones
- 507 SingleLine Telephones
- 507 Feature Interactions
- 510 Park
- 510 At a Glance
- 510 Description
- 511 Considerations and Constraints
- 511 Telephone Differences
- 511 DirectLine Consoles
- 511 Queued Call Consoles
- 512 Other Multiline Telephones
- 512 SingleLine Telephones
- 512 Feature Interactions
- 515 Personal Lines
- 515 At a Glance
- 515 Description
- 516 Considerations and Constraints
- 517 Mode Differences
- 517 Hybrid/PBX Mode
- 517 Key and Behind Switch Modes
- 518 Telephone Differences
- 518 DirectLine Consoles
- 518 Queued Call Consoles
- 518 Other Multiline Telephones
- 518 SingleLine Telephones
- 518 Feature Interactions
- 523 Personalized Ringing
- 524 Pickup
- 524 At a Glance
- 524 Description
- 525 Individual Pickup
- 525 Group Pickup
- 526 Considerations and Constraints
- 526 Telephone Differences
- 526 DirectLine Consoles
- 526 Queued Call Consoles
- 526 Individual Pickup
- 526 Group Pickup
- 526 Other Multiline Telephones
- 526 Individual Pickup
- 527 Group Pickup
- 527 SingleLine Telephones
- 527 Individual Pickup
- 527 Group Pickup
- 527 Feature Interactions
- 530 Pools
- 530 At a Glance
- 530 Description
- 532 Considerations and Constraints
- 533 Mode Differences
- 534 Telephone Differences
- 534 DirectLine Consoles
- 534 Queued Call Consoles
- 534 Feature Interactions
- 537 Power-Failure Transfer
- 537 At a Glance
- 537 Description
- 537 Considerations and Constraints
- 537 Telephone Differences
- 537 Multiline Telephones
- 537 SingleLine Telephones
- 537 Feature Interactions
- 538 Primary Rate Interface (PRI) and T1
- 538 At a Glance
- 542 Description
- 543 Terminology
- 543 Called Party Number (CdPN)
- 544 Calling Party Number (CPN)
- 544 Lines/Trunks
- 544 PRI
- 548 T1
- 550 DS1 Facility Options
- 551 Type of Service
- 552 Framing Format
- 553 Line Coding
- 554 Channel Service Unit
- 554 Line Compensation
- 555 Signaling Mode
- 556 Tandem PRI Trunks
- 557 Tandem PRI Trunk Programming
- 558 PRI Programming Options
- 558 PRI Telephone Number
- 558 Network Services Supported
- 559 Copy Telephone Number to Send
- 559 Telephone Number to Send
- 560 Test Telephone Number
- 560 Timers and Counters
- 561 Terminal Equipment Identifier (TEI)
- 561 PRI Call Processing
- 561 Incoming Calls
- 563 Routing by Dial Plan (Hybrid/PBX Only)
- 563 PRI Routing by Dial Plan
- 565 Display Operation
- 566 Outgoing Calls
- 567 Network Selection Table
- 568 CallbyCall Services Table
- 569 Restriction Code Handling for FTS2000 Network
- 569 Station Identification Automatic Number Identification (SID-ANI) as Calling Party Number
- 570 T1 Programming Options
- 570 T1 Tie Trunk Connections
- 571 Direction
- 571 Trunk Seizure Type
- 571 Dial Mode
- 571 Dial Tone
- 571 Answer Supervision Timing
- 572 Disconnect Timing
- 572 T1 Routing by Dial Plan
- 573 Systemwide Programming Options
- 573 Clock Synchronization
- 574 Clock Switching
- 575 Mode Differences
- 575 Key Mode
- 575 Behind Switch Mode
- 575 Considerations and Constraints
- 575 General
- 576 Incoming Calls
- 576 PRI
- 576 Outgoing Calls
- 576 PRI
- 577 Feature Interactions
- 581 Privacy
- 581 At a Glance
- 581 Description
- 581 Considerations and Constraints
- 582 Telephone Differences
- 582 Queued Call Consoles
- 582 Other Multiline Telephones
- 582 SingleLine Telephones
- 583 Feature Interactions
- 584 Programming
- 584 At a Glance
- 585 Description
- 585 System Programming
- 586 Programming at an MLX20L Telephone
- 588 Direct Station Selector
- 588 Programming with SPM on a PC
- 589 Onsite and Remote Programming
- 590 System Programming Screens
- 590 System Programming Reports
- 590 Centralized Telephone Programming
- 591 Extension Programming
- 592 Queued Call Console (QCC)
- 592 At a Glance
- 594 Description
- 594 QCC Operation
- 594 Call Delivery
- 595 Operator Availability
- 595 Extending Calls
- 596 QCC Features
- 600 QCC Options
- 600 Trunk Routing
- 601 Call Types
- 602 QCC Queue Priority
- 603 Elevate Priority
- 603 Extended Call Completion
- 604 Message Center Operation
- 604 Position Busy Backup
- 605 Operator Hold Timer
- 605 Hold Return
- 605 Automatic Hold or Release
- 605 Return Ring Interval
- 605 QCC Voice Announce
- 606 CallsinQueue Alert
- 606 Queue Over Threshold
- 606 Considerations and Constraints
- 607 Mode Differences
- 607 Telephone Differences
- 607 DirectLine Consoles
- 608 Feature Interactions
- 616 Recall/Timed Flash
- 616 At a Glance
- 616 Description
- 617 Release Differences
- 617 Release 1.0 and Release 1.1
- 617 Release 2.0 and Later
- 617 Considerations and Constraints
- 618 Mode Differences
- 618 Hybrid/PBX Mode
- 618 Key Mode
- 618 Behind Switch Mode
- 619 Telephone Differences
- 619 Queued Call Consoles
- 619 Other Multiline Telephones
- 619 SingleLine Telephones
- 620 Feature Interactions
- 623 Reminder Service
- 623 At a Glance
- 623 Description
- 624 Considerations and Constraints
- 625 Telephone Differences
- 625 DirectLine Consoles
- 625 Queued Call Consoles
- 625 Other Multiline Telephones
- 626 SingleLine Telephones
- 626 Feature Interactions
- 627 Remote Access
- 627 At a Glance
- 630 Description
- 631 Lines and Trunks
- 634 User Interaction
- 635 Class of Restrictions (COR)
- 636 Considerations and Constraints
- 637 Mode Differences
- 637 Hybrid/PBX Mode
- 638 Feature Interactions
- 641 Ringing Line Preference
- 642 Ringing Options
- 642 At a Glance
- 643 Description
- 643 Ring Timing Options
- 644 Abbreviated Ring Options
- 645 Personalized Ringing Options
- 645 Distinctive Ringing
- 645 Considerations and Constraints
- 646 Telephone Differences
- 646 Queued Call Consoles
- 646 Other Multiline Telephones
- 646 SingleLine Telephones
- 646 Feature Interactions
- 650 Saved Number Dial
- 650 At a Glance
- 650 Description
- 650 Considerations and Constraints
- 651 Mode Differences
- 651 Behind Switch
- 651 Key Mode
- 652 Telephone Differences
- 652 Queued Call Consoles
- 652 Other Multiline Telephones
- 652 SingleLine Telephones
- 652 Feature Interactions
- 654 Second Dial Tone Timer
- 654 At a Glance
- 654 Description
- 655 Considerations and Constraints
- 655 Feature Interactions
- 656 Service Observing
- 656 At a Glance
- 656 Description
- 659 Programming a Service Observing Station/Group
- 660 Warning Tone
- 660 Considerations and Constraints
- 662 Telephone Differences
- 662 Direct-Line Console (DLC)
- 662 Queued Call Console (QCC)
- 662 Other Multiline Telephones
- 662 Single-Line Telephones
- 662 MLX Adjuncts
- 662 In Range Out of Building
- 662 Video Endpoint
- 662 Feature Interactions
- 670 Signal/Notify
- 670 At a Glance
- 670 Description
- 670 Signal
- 671 Notify
- 671 Considerations and Constraints
- 671 Telephone Differences
- 671 Queued Call Consoles
- 671 Other Multiline Telephones
- 671 SingleLine Telephones
- 672 Feature Interactions
- 673 Speed Dial
- 673 At a Glance
- 673 Description
- 673 System Speed Dial
- 674 Personal Speed Dial
- 675 Considerations and Constraints
- 676 Mode Differences
- 676 Hybrid/PBX Mode
- 676 Behind Switch Mode
- 676 Telephone Differences
- 676 DirectLine Consoles
- 676 Queued Call Consoles
- 676 Other Multiline Telephones
- 676 System Speed Dial
- 677 Personal Speed Dial
- 677 SingleLine Telephones
- 677 Feature Interactions
- 680 Station Message Detail Recording(SMDR)
- 680 At a Glance
- 681 Description
- 683 SMDR Report Fields
- 683 CALL TYPE (Column 1)
- 684 DATE (Column 2)
- 684 TIME (Column 3)
- 685 CALLED NUMBER (Column 4)
- 685 CALL TAG (Column 5)
- 686 Asterisk (*).
- 686 Question Mark (?)
- 686 Ampersand (&).
- 686 Exclamation Point (!)
- 687 Blank Field
- 687 DUR. (Column 6)
- 688 LINE (Column 7)
- 688 STN. (Column 8)
- 688 ACCOUNT (Column 9)
- 689 TALK (Column 10)
- 689 Considerations and Constraints
- 691 Telephone Differences
- 691 Queued Call Consoles
- 692 Feature Interactions
- 697 System Access/Intercom Buttons
- 697 At a Glance
- 698 Description
- 698 SA Buttons: Hybrid/PBX Mode
- 699 Shared SA Buttons: Hybrid/PBX Mode
- 700 ICOM Buttons: Key and Behind Switch Modes
- 701 Considerations and Constraints
- 702 Mode Differences
- 702 Hybrid/PBX Mode
- 702 Key and Behind Switch Modes
- 702 Telephone Differences
- 702 DirectLine Consoles
- 702 Queued Call Consoles
- 702 Other Multiline Telephones
- 702 SingleLine Telephones
- 703 Data/Video Workstations
- 703 Feature Interactions
- 708 System Renumbering
- 708 At a Glance
- 709 Description
- 710 2-Digit Numbering Plan
- 712 3-Digit Numbering Plan
- 713 Set Up Space Numbering Plan
- 715 Renumbering Extensions and Lines/Trunks
- 715 Single Renumbering
- 716 Block Renumbering
- 716 DSS Renumbering
- 717 Remote Access Renumbering
- 717 Logical IDs
- 718 Considerations and Constraints
- 718 Feature Interactions
- 719 Timed Flash
- 720 Tandem Switching
- 720 At a Glance
- 721 Description
- 723 Switch Identifiers
- 724 Automatic Route Selection (ARS), Uniform Dial Plan Routing, and Remote Access
- 725 Local Calls Routed to Other Systems
- 727 Network Calls Routed via the Local System
- 729 Feature Interactions
- 733 Timer
- 733 At a Glance
- 733 Description
- 733 MLX Display Telephones
- 733 Analog Multiline Display Telephones
- 734 Toll Type
- 734 At a Glance
- 734 Description
- 734 Considerations and Constraints
- 734 Mode Differences
- 734 Hybrid/PBX Mode
- 734 Feature Interactions
- 736 Touch-Tone or Rotary Signaling
- 736 At a Glance
- 736 Description
- 740 TTR Settings
- 741 Considerations and Constraints
- 741 Mode Differences
- 742 Transfer
- 742 At a Glance
- 743 Description
- 743 Transfer Options
- 744 Transfer Return Time
- 744 One-Touch Transfer
- 745 One-Touch Hold
- 745 Type of Transfer
- 746 Transfer to Busy Extension
- 747 Trunk-to-Trunk Transfer
- 748 Disable Transfer on Single-Line Telephones
- 748 Considerations and Constraints
- 750 Mode Differences
- 750 Behind Switch Mode
- 750 Telephone Differences
- 750 Queued Call Consoles
- 750 Single-Line Telephones
- 751 Feature Interactions
- 759 Uniform Dial Plan Features
- 759 At a Glance
- 760 Description
- 761 Intersystem Calling
- 761 Extension Ranges
- 764 Call Handling for Non-Local Dial Plan Extensions
- 765 Considerations and Constraints
- 766 Telephone Differences
- 766 Queued Call Consoles
- 766 Direct-Line Consoles
- 766 Direct Station Selectors
- 766 Single-Line Telephones
- 767 Feature Interactions
- 774 Voice Announce to Busy
- 774 At a Glance
- 774 Description
- 775 QCC Voice Announce
- 775 Considerations and Constraints
- 775 Telephone Differences
- 775 Queued Call Consoles
- 776 Other Multiline Telephones
- 776 Single-Line Telephones
- 776 Feature Interactions
- 777 Volume
- 777 At a Glance
- 777 Description
- 777 Telephone Differences
- 778 A. Customer Support Information
- 778 Support Telephone Number
- 778 Federal Communications Commission (FCC) Electromagnetic Interference Information
- 779 Canadian Department of Communications (DOC) Interference Information
- 779 FCC Notification and RepairInformation
- 780 Installationand OperationalProcedures
- 782 DOC Notification and RepairInformation
- 783 Renseignements sur la notification du ministère des Communications
- 785 Security of Your System: PreventingToll Fraud
- 786 Toll Fraud Prevention
- 787 Physical Security, Social Engineering, and General Security Measures
- 787 Preventive Measures
- 788 Security Risks Associated with Transferring through Voice Messaging Systems
- 788 Preventive Measures
- 790 Security Risks Associated with the Automated Attendant Feature of Voice Messaging Systems
- 790 Preventive Measures
- 791 Security Risks Associated with the Remote Access Feature
- 791 Preventive Measures
- 792 Other Security Hints
- 792 Educating Users
- 793 Educating Operators
- 793 Detecting Toll Fraud
- 793 Establishing a Policy
- 794 Choosing Passwords
- 795 Physical Security
- 795 Limiting Outcalling
- 795 Limited Warranty and LimitationofLiability
- 796 Limitation of Liability
- 797 Remote Administration andMaintenance
- 800 B. Features and Planning Forms
- 810 C. System Features
- 814 D. General Feature Use and Telephone Programming
- 814 General Feature Use Information
- 814 Fixed Features
- 814 Programmed Buttons
- 815 Feature Codes
- 816 Telephone and Operator Features
- 825 Telephone Programming
- 825 Programming Methods
- 830 E. System Programming Menu Hierarchy
- 832 F. Sample Reports
- 837 System Information Report
- 838 Dial Plan Report
- 841 Non-Local Dial Plan Report
- 842 Label Information Report
- 843 Tie Trunk Information Report
- 843 DID Trunk Information Report
- 844 GS/LS Trunk Information Report
- 844 General Trunk Information Report
- 845 DS1 Information Report
- 845 PRI Information Report
- 849 Remote Access (DISA) InformationReport
- 850 Operator Information Report
- 852 Allowed Lists Report
- 853 Access to Allowed Lists Report
- 853 Disallowed Lists Report
- 854 Access to Disallowed Lists Report
- 854 Automatic Route Selection Report
- 855 Extension Directory Report
- 856 System Directory Report
- 856 Group Paging Report
- 856 Extension Information Report
- 858 Group Coverage Information Report
- 859 Direct Group Calling InformationReport
- 860 Night Service Information Report
- 861 Group Call Pickup Report
- 861 Error Log Report
- 862 Authorization Code InformationReport
- 862 BRI Information Report
- 863 Switch 56 Data Information Report
- 864 G. Button Diagrams
- 870 H. Programming Special Characters
- 870 Single-Line Telephones
- 871 Analog Multiline Telephones
- 872 MLX-10 and MLX-5 NondisplayTelephones
- 873 MLX Display Telephones
- 874 I. Applications
- 876 Organization of Descriptions
- 876 System Support for Applications
- 878 Supported Printers
- 879 PassageWay Direct ConnectionSolution
- 879 Considerations and Constraints
- 880 Feature Interactions
- 880 Platform Requirements
- 881 Voice Messaging Systems
- 882 Voice Messaging Interface (VMI) PortCapabilities
- 883 Far-End Disconnect
- 884 Ports In/Out of Service
- 884 MERLIN MAIL and MERLINLEGEND Mail
- 885 Automated Attendant Service
- 886 Call Answer Service
- 886 Voice Mail Service
- 887 Collected Digits
- 887 Mode Differences
- 888 Considerations and Constraints
- 888 Feature Interactions
- 890 System Programming
- 891 Platform Requirements
- 891 MERLIN MAIL Voice Messaging System
- 891 MERLIN LEGEND Mail VoiceMessagingSystem
- 892 Required Voice Messaging Interface (VMI) Ports
- 892 Messaging 2000
- 893 Automated Attendant
- 893 Voice Mail
- 893 Fax Mail
- 893 Lucent Technologies Attendant
- 894 Mode Differences
- 894 Considerations and Constraints
- 895 Feature Interactions
- 895 System Programming
- 896 Platform Requirements
- 897 MERLIN LEGEND Enhanced Service Center
- 897 How the Enhanced Service Center Works
- 898 Call Accounting System
- 899 CAS Plus V3
- 900 Considerations and Constraints
- 900 Feature Interactions
- 900 Platform Requirements
- 901 Call Accounting Terminal
- 904 Considerations and Constraints
- 904 System Programming
- 904 Feature Interactions
- 904 Platform Requirements
- 905 Call Management System
- 906 Mode Differences
- 906 Considerations and Constraints
- 907 Feature Interactions
- 907 System Programming
- 908 Platform Requirements
- 908 MERLIN LEGEND Reporter
- 910 Mode Differences
- 910 Considerations and Constraints
- 911 Feature Interactions
- 913 Platform Requirements
- 914 System Programming and Maintenance
- 915 Considerations and Constraints
- 915 Platform Requirements
- 916 Integrated Solution II
- 918 Mode Differences
- 918 Considerations and Constraints
- 919 Feature Interactions
- 920 System Programming
- 921 Platform Requirements
- 922 Integrated Solution III
- 924 Mode Differences
- 924 Considerations and Constraints
- 925 Feature Interactions
- 926 System Programming
- 929 Platform Requirements
- 930 Intuity
- 931 Group IV Fax
- 932 MERLIN PFC Telephone
- 933 Mode Differences
- 933 Hybrid/PBX and Key Modes
- 934 Behind Switch Mode
- 934 Considerations and Constraints
- 934 Feature Interactions
- 935 Intuity CONVERSANT
- 936 Considerations and Constraints
- 936 Platform Requirements
- 936 Picasso Still-Image Phone
- 937 Considerations and Constraints
- 937 Platform Requirements
- 938 Videoconferencing
- 939 Group Videoconferencing
- 940 Desktop Videoconferencing
- 940 Mode Differences
- 940 Key Mode
- 941 Hybrid/PBX Mode
- 942 Considerations and Constraints
- 942 Feature Interactions
- 945 System Programming
- 945 Platform Requirements
- 946 ExpressRoute 1000
- 947 Feature Interactions
- 948 Ascend Pipeline 25Px/75Px
- 949 Considerations and Constraints
- 950 Feature Interactions
- 951 System Programming
- 952 Platform Requirements
- 954 Glossary
- 982 Index
- 982 Numerics
- 982 A
- 986 B
- 986 C
- 991 D
- 996 E
- 996 F
- 997 G
- 999 H
- 1001 I
- 1002 L
- 1003 M
- 1005 N
- 1006 O
- 1006 P
- 1010 Q
- 1011 R
- 1013 S
- 1017 T
- 1019 U
- 1020 V