Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual
Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual
Have a look at the manual Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1137 AAR/ARS shortcut dialing 20 nAUDIX nAUDIX mailboxes allow a maximum of 5 digits when AUDIX is connected to a switch that is not administered as a central office. If an internal extension is 6 or more digits, the corresponding voice mailbox must be set up and accessed with 5 or less digits. AUDIX cannot associate a subscriber’s name with 6- or more digit number. NOTE: If AUDIX is connected to a switch in a remote location or administered as a central office, mailbox IDs can be up to 10 digits and AUDIX can look up a calling party number longer than 5 digits. nDCS AUDIX (Centralized Messaging) With shortcut dialing, DCS is not used and AUDIX does not associate the name with the calling number. AUDIX associates the name with the calling number only when DCS is used in the network. nISDN - QSIG/AUDIX A QSIG/AUDIX network can perform name lookup on 3-, 4-, and 5-digit calling numbers, as well as on longer calling numbers that are be truncated to a unique 3-, 4-, or 5-digit mailbox extension. nAUDIX transfer Shortcut dialing allows AUDIX Enhanced Transfer to a 3-digit extension, but not to a 6- or 7-digit extension. nCoverage paths for call coverage Use the short, internal extensions on local coverage paths, even when you must dial 6 or more digits for on-switch calls. nCall center To call an agent, users must dial the agent’s shortcut dialing number. However, the agent must use the agent ID (extension), not the shortcut dialing number, to login. nCall Detail Recording (CDR) Intra-switch CDR records show the short, internal extensions of the calling and called parties when shortcut dialing is used. Because the AAR or ARS access code is not used in shortcut dialing, the Access Code Dialed and Access Code Used fields recorded by CDR are blank for trunk calls made with shortcut dialing. When a caller dials a CDR account code before the shortcut dialing number, the CDR account code is recorded in CDR.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1138 AAR/ARS shortcut dialing 20 nCall Management Systems (CMS) Because the AAR or ARS access code is not used in shortcut dialing, there is no feature access code on CMS records to indicate outgoing trunk calls. nCall vectoring In a 5-digit dialing plan, a message step in a vector cannot be updated to reflect a 6-digit shortcut number. nCoverage of Calls Redirected Off Net You can use shortcut dialing for an off-net destination on a coverage path. On networks where 6 or more digits are required, you can use the Remote Call Coverage Table even for on-switch coverage points. On a large system, however, you may reach the maximum number of remote coverage points. nDistributed Communications System (DCS) DCS feature transparency is lost on a shortcut dialing call. nDeluxe paging Dial the full extension to send a deluxe page. The page may be answered with a shortcut dialing number. nInterdigit timers The short interdigit timer tracks calls to internal extensions if nAAR/ARS shortcut numbers and internal extensions share the same first digit nextensions are shorter than the minimum-length shortcut number Related topics Refer to ‘‘ Dial Plan Record’’ on page 607 for information on setting up a dial plan.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1139 Abbreviated Dialing 20 Abbreviated Dialing Abbreviated Dialing (AD) provides easy access to selected numbers by reducing the number of digits users have to dial to place a call. Instead of dialing the entire number, the user dials a short code to access the number. The system then dials the stored number automatically. You can assign abbreviated dialing buttons to phones, so users can dial frequently-called numbers by pressing a single button. You can also assign privileged numbers to abbreviated dialing lists, so you can allow a user to place calls to numbers that might otherwise be restricted. !SECURITY ALERT: Privileged group-number, system-number, and enhanced-number lists provide access to numbers that typically would be restricted. List types You can store phone numbers in 4 different types of abbreviated dialing lists: npersonal ngroup nsystem nenhanced Your switch type and version determines which lists you have available and how many entries you can have on each list. You can assign up to 3 AD lists to each user (extension). The 3 lists can be made up of any combination of a system list, an enhanced list, up to 3 personal lists, or up to 3 group lists. Each abbreviated dialing entry can have up to 24 characters. Personal lists You can provide personal lists to phone users who need their own set of stored numbers. You determine which users have access to a personal list and the size of each list. Either you or the user can assign phone numbers to personal lists. A personal list is created automatically when you assign the list to an individual phone. Each user can have up to 3 personal lists. Note that you cannot assign personal list to the attendant.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1140 Abbreviated Dialing 20 Group lists You can define group lists for groups or departments, such as purchasing or human resources, where members of the group have the need to frequently dial the same numbers. You determine which users have access to group lists and each user may have access to up to 3 group lists. You can program the list or you can designate a user in each group to program the list. You specify this designated user on the Abbreviated Dialing Group List screen. System lists You can define one system list for the entire organization. Most administrators assign this list to every phone and allows everyone in the organization to use the list. If you choose to let everyone use the system list, you should only add numbers to the list that anyone in your organization may call. For example, you may want to add an emergency phone number or phone numbers for other office locations to this list. The system list can contain up to 100 entries and can only be changed by a system administrator. Enhanced lists Enhanced-number lists are used by telephone users, data-terminal users, and attendants who need more list entries than those allowed in group-number and system-number lists. One enhanced-number list is allowed per system in addition to the system-number list. The enhanced-number list can contain any number or dial-access code. You administer the enhanced-number lists and determine which users can access the list. Considerations nYou cannot remove a telephone or attendant if it is designated as the extension number that is permitted to program a group-number list. nWhen using an AD button to access a messaging system, the user’s login and password should not be assigned to the button. The system ignores button entries after the messaging access number. nYou can use an abbreviated dialing list at any time during incoming or outgoing calls.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1141 Abbreviated Dialing 20 Interactions nLast Number Dialed The Last Number Dialed feature redials the same number a user just dialed, even if the user accessed an abbreviated dialing list for the previous call. However, if the last dialed string includes any special characters (such as indefinite wait, mark, pause, suppress, or wait) these characters are ignored by last-number-dialed call. If the previously-called number was in an AD privileged list, and if the user is not normally allowed to dial the number because of his or her class of restriction, they cannot redial the number using Last Number Dialed. To redial the number, the user must again access the AD privileged list. Related topics Refer to ‘‘ Adding abbreviated dialing lists’’ on page 92 for instructions on creating abbreviated dialing lists. Refer to ‘‘ Abbreviated Dialing List’’ on page 473 for detailed descriptions of the fields on the abbreviated dialing screens.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1142 Access security gateway 20 Access security gateway Access Security Gateway (ASG) prevents unauthorized access by requiring the use of the ASG Key for logging into the system. The ASG Key can be: na hand-held device, or na software module you load on the PC you use for accessing the system. Detailed Description Authentication is successful only when DEFINITY ECS and ASG communicate with a compatible key. The challenge/response negotiation starts after establishing an RS-232 session and you enter a valid DEFINITY ECS login ID. The authentication transaction consists of a challenge, issued by DEFINITY ECS and based on the login ID entered by you, followed by the expected response, again entered by you. The core of this transaction is a secret key, which is information-possessed by both the lock (ASG) and the key. Interception of either the challenge or response during transmission does not compromise the security of the system. The relevance of the authentication token used to perform the challenge/response is limited to the current challenge/response exchange (session). NOTE: ASG does not protect login access to a Multiple Application Platform for DEFINITY (MAPD). The supported key consists of a hand-held encryption-generating device (ASG Key). The key (response generator) device is pre-programmed with the appropriate secret key to communicate with corresponding ASG protected login IDs on DEFINITY ECS. The BCS Products Security Handbook contains information about: ntoll fraud and what you can do to prevent it. nmethods people use to gain access to your system, how to detect toll fraud, and what to do if you suspect that your system has been compromised. nsecurity information for many Lucent Technologies products, so you can be sure that all of your telecommunications equipment is secure. nsecurity checklists for each of these products. You should go through these with your Lucent representative for each piece of equipment you use.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1143 Access security gateway 20 Interactions nCustomer Access to INADS Port If access to the INADS port is disabled on a system-wide basis, administering access to the SYSAM-RMT or INADS port, through ASG, does not override the INADS port restriction. Administration does not prohibit assignment of ASG to the SYSAM-RMT or INADS port. However, in a configuration where this method of access is blocked, you will be denied access to the system through the SYSAM-RMT or INADS port even if you attempt to access the port using a valid ASG login ID. If access to the INADS port has been disabled on a login basis, administering access to the SYSAM-RMT or INADS port, via ASG, will not override the INADS port restriction. nLogin Administration The standard user interface for DEFINITY ECS login administration has not been modified by ASG. Also, the standard DEFINITY ECS login user interface is maintained in cases where ASG parameters have not been administered for the login and/or port. nSecurity Violation Notification ASG does not support an interface to SVN. Session rejection events do not appear in the monitor security-violations login report and referral calls are not spawned in the event that the number of rejected ASG sessions exceeds the threshold/time interval criteria imposed by SVN. nSecurity Measurements ASG session establishment or reject events do not increment the Successful Logins, Invalid Attempts, Invalid IDs, Forced Disconnects, Login Security Violations or Trivial Attempts counters maintained for the list measurements security-violations detail report. Additionally, login specific information maintained by the measurements security-violations summary report does not include ASG related data. Related topics Refer to ‘‘ Using access security gateway’’ on page 333 for instructions.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1144 Administered Connections 20 Administered Connections An Administered Connection (AC) is a connection between 2 access or data endpoints. DEFINITY ECS automatically establishes the connection based on the attributes you administer. An AC provides the following capabilities: nSupport of both permanent and scheduled connections nAuto Restoration (preserving the active session) for connections routed over Software Defined Data Network (SDDN) trunks nAdministrable retry interval (from 1 to 60 minutes) per AC nAdministrable alarm strategy per AC nEstablishment/retry/auto restoration order based on administered priority Detailed description The SDDN provides virtual private-line connectivity using the AT&T Switched Network. Access to the service is provided via an Integrated Services Digital Network (ISDN) trunk group whose Service Type field is SDDN. The system uses the Destination field on the Administered Connection screen to route calls when AC is active, based on associated authorized time-of-day fields. Establish an AC between the following: nTwo endpoints on the same switch nTwo endpoints in the same private network, but on different switches nOne endpoint on the controlling switch and another endpoint off the private network In all configurations, administer the AC on the switch that has the originating endpoint. For an AC in a private network, if the two endpoints are on two different switches, normally the connection routes via Automatic Alternate Routing (AAR) through tie trunks (ISDN, DS1, or analog tie trunks) and intermediate switches. If required, route the connection via Automatic Route Selection (ARS) and Generalized Route Selection (GRS) through the public network. The call routes over associated ISDN trunks. When the far-end answers, a connection occurs between the far-end and the near-end extension in the Originator field on the Administered Connection screen. Access endpoints Access endpoints are non-signaling trunk ports. They neither generate signaling to the far-end of the trunk nor respond to signaling from the far-end. Designate an access endpoint as the originating endpoint or destination endpoint in an AC.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1145 Administered Connections 20 Typical AC applications The following are typical AC applications: nA local data endpoint connection to a local or remote-access endpoint. Examples: a modular processor data module (MPDM) ACCUNET digital service connecting to SDDN via an ISDN trunk-group DS1 port; an MPDM ACCUNET digital service connecting to an ACCUNET Switched 56 Service via a DS1 port. nA local-access endpoint connecting to a local or remote-access endpoint. Examples: a DSO cross-connect and a 4-wire leased-line modem to a 4-wire modem connection via an analog tie trunk. nA local data endpoint connecting to a local or remote data endpoint such as a connection between two 3270 data modules. NOTE: The following guidelines do not include AAR and ARS, or GRS administration information for routing AC calls over trunk groups. See the respective feature elsewhere in this book for that information. Establishing Administered Connections The originating switch attempts to establish an AC only if one of the following conditions exist: nAC is active. nAC is due to be active (either a permanent AC or time-of-day requirements are satisfied if it is a scheduled AC). nOriginating endpoint is in-service or idle state. If the originating endpoint is not in service or is idle, no activity takes place for the AC until the endpoint transitions to the desired state. The originating switch uses the destination address to route the call to the desired endpoint. When the switch establishes 2 or more ACs at the same time, the switch arranges the connections in order of priority. AC attempts can fail for the following reasons: nResources are unavailable to route to the destination. nA required conversion resource is not available. nAccess is denied by Class of Restriction (COR), Facilities Restriction Level (FRL), or Bearer Capability Class (BCC). Or, an attempt is made to route voice-band-data over SDDN trunks in the public switch network. nDestination address is incorrect. nDestination endpoint is busy. nOther network or signaling failures occur.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1146 Administered Connections 20 In the event of a failure, an error is entered into the error log, which generates an alarm, if it is warranted by your alarming strategy. You can display AC failures via the status administered-connection command. As long as an AC is due to be active, the originating switch continues to establish an AC unless the attempt fails because of an administrative error (for example, a wrong number) or service-blocking condition (for example, outgoing calls barred). nThe frequency with which failed attempts are retried is determined by the administered retry interval (1 to 60 minutes) for each AC. nRetries are made after the retry interval has elapsed regardless of the restorable attribute of the AC. nACs are retried in priority order. nWhen you change the time of day on the switch, an attempt is made to establish all ACs in the waiting-for-retry state. Dropping Administered Connections An AC remains active until one of the following occurs: nThe AC is changed, disabled, or removed. nThe time-of-day requirements of a scheduled AC are no longer satisfied. nOne of the endpoints drops the connection. This could be because of user action (in the case of a data endpoint), maintenance activity resulting from an endpoint failure, busying out of the endpoint, or handshake failure. If the endpoints are incompatible, the connection is successful until handshake failure occurs. NOTE: An AC between access endpoints remains connected even if the attached access equipment fails to handshake. nAn interruption (for example, facility failure) occurs between the endpoints. If an AC drops because it was disabled/removed or is no longer due to be active, no action is taken. If an AC drops because of changed AC attributes, an immediate attempt is made to establish the connection with the changed attributes if it is still due to be active. Existing entries in the error/alarm log are resolved if they no longer apply. If handshake failure resulted in the dropping of the connection, in the case of an AC involving at least one data endpoint, no action is taken for that AC until the change administered-connection command is executed.