Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual
Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual
Have a look at the manual Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1487 Ringer Cutoff 20 A user may not wish to be disturbed by the arrival of incoming calls, yet not want calls to be redirected immediately to coverage. For example, an executive may want a secretary to answer calls before they redirect to coverage. The bridging user (the secretary) is not affected by the executive’s activation of Ringer Cutoff. If a primary extension and all other users with bridged appearances of the primary extension activate Ringer Cutoff, an incoming call silently alerts all of the telephones and then redirects to coverage. Interactions nAutomatic Callback If Ringer Cutoff is active, an Automatic Callback call returns to the user’s telephone with the normal 3-burst ring. nBridging A bridging user is not affected by a primary extension’s activation of Ringer Cutoff. Nor is the primary extension affected by the bridging user’s activation of Ringer Cutoff. nCall Forwarding All Calls If Ringer Cutoff and Call Forwarding All Calls are active, the user receives redirect notification, if you set Redirection Notification to y for the extension. nDistinctive Ringing Ringer Cutoff turns off only the distinctive ringing of internal and external calls. Intercom ringing, priority ringing, redirect notification, and manual signaling are not turned off. nIntercom If Ringer Cutoff is active, intercom calls still ring the user’s telephone. nManual Signaling If Ringer Cutoff is active, Manual Signaling still rings the user’s telephone. nRingback Queuing If Ringer Cutoff is active, the return call for Ringback Queuing still rings the user’s telephone with a 3-burst alerting signal. nPriority Calling If Ringer Cutoff is active, priority calls still ring at the user’s telephone. nSend All Calls When Ringer Cutoff and Send All Calls are both active, the user receives redirect notification, when Redirection Notification is set to y for that extension.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1488 Ringing — Abbreviated and Delayed 20 Ringing — Abbreviated and Delayed Ringing — Abbreviated and Delayed allows you to assign one of four ring types to each call appearance on a telephone. Whatever treatment is assigned to a call appearance is automatically assigned to each of its bridged call appearances. Detailed description Ring types fall into two categories: nThose that alert consistently and don’t change: — Ringing, in which the lamp flashes and audible ringing occurs — Silent ringing, in which the lamp flashes and audible ringing does not occur nThose that transition from one ringing state to another: — Abbreviated ringing, in which ringing continues for as many cycles as specified by the automatic abbreviated/delayed transition interval and then changes to silent alerting — Delayed ringing, in which visual alerting continues for as many cycles as specified by the automatic abbreviated/delayed transition interval and then changes to ringing For a station with call appearances that have either abbreviated or delayed ringing, an abbreviated-ring button associated with that station’s extension can be assigned on a different station. When one of those call appearances is being alerted, pressing the button forces immediate transition of the alerting — that is, from ringing to silence or from silence to ringing. This feature is most useful in bridging situations in which some users want to be: nAudibly alerted to a call immediately upon its arrival nAudibly notified if the call has not been answered within a specified number of rings or if they have indicated. nAble to stop the audible alerting if the call is not being answered by the principal and the user is not able to answer the call. Because ring type can be specified on a per-station basis, mixing ring-type specifications within a station’s access to a particular extension is possible.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1489 Ringing — Abbreviated and Delayed 20 For Ringing — Abbreviated and Delayed, each call appearance must be: nAssigned a ring type nAdministered to transition when the: — Abbreviated/delayed transition interval is reached or when the user presses the abbreviated ring button — user presses the abbreviated ring button, regardless of the abbreviated/delayed transition interval Considerations nYou cannot assign Ringing — Abbreviated and Delayed to an attendant console. nYou can assign Abbreviated and Delayed Ringing to analog stations. However, because analog stations cannot visually alert, a user may unexpectedly answer an incoming call while intending to originate a call. Interactions nCall Coverage If the number-of-rings interval for coverage is shorter than the automatic transition interval, a call redirects to coverage before audibly alerting a call appearance that has delayed ringing. However, timing continues for the automatic transition interval in case no coverage point is available and the call continues to alert at the station. When a call is immediately redirected to coverage, the Abbreviated and Delayed ringing has no effect. nCall Forwarding — Busy/Don’t Answer When a call is forwarded because it is not answered in the specified time, the call stops alerting the station and is not affected by the Ringing — Abbreviated and Delayed feature. However, timing continues for the automatic transition interval in case forwarding fails and the call continues to alert at the station. If the call forward don’t answer interval is shorter than the automatic transition interval, the call redirects to the forwarded-to extension before ringing a station with a ring type of delayed ringing. nCall Vectoring — Expert Agent Selection — Logical Agents Calls routed to a logical agent use the translations for the Ringing — Abbreviated and Delayed feature of the station being used by the agent.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1490 Ringing — Abbreviated and Delayed 20 nData Extension Calls Data Extension calls are not affected by the ring values, but continue to be directed by the bridged call alerting administration. nHospitality Features — Do Not Disturb The Do Not Disturb feature takes precedence over the Ringing — Abbreviated and Delayed feature in blocking ringing to the station. nISDN — World Class Basic Rate Interface Several of the protocol variations supported by the World Class BRI feature do not permit the messaging required for control of the station’s ringer by Ringing — Abbreviated and Delayed. In this case, ring type is forced to a value of ring. nMultiappearance Preselection and Preference The system automatically selects any alerting call on a station whether or not it is ringing if the Per Button Ring Control field is set to n. If the field is set to y, it selects only audibly ringing calls. nOff-Premises Station and Off-Premises Extension Lines You must use ring type of “ring” for OPS and OPX lines. nPCOL Calls PCOL calls are not affected by the ring values, but continue to be directed by the bridged call alerting administration. nRedirection Notification If Redirection Notification is enabled, terminals only receive redirection notification if the alerting button or the first call appearance has an assigned ring value of ring or abbreviated ring. nTerminating Extension Group Calls TEG calls are not affected by the ring values, but continue to be directed by the bridged call alerting administration. nVoice Mail Systems Voice mail systems may look for ringing applied to a port to trigger call answer. Undesirable adjunct operation may result if ring-type translations are inappropriately set for ports serving these adjuncts.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1491 Security violations notification 20 Security violations notification When a security violation occurs, security violations notification (SVN) notifies a designated referral point. This can be an attendant console, a display-equipped phone, or a phone without display for SVN referral calls with announcements. The system monitors and reports on the following types of security violations: nLogin violations nRemote access barrier code violations nAuthorization code violations nStation security code violations DEFINITY ECS provides the option to log a major alarm if a security violation occurs involving a Lucent Technologies services login ID. Lucent Technologies is responsible for retiring the alarm. Refer to DEFINITY ECS Reports for more information on how to run reports, and respond to security violations. To effectively monitor the security of your system, you need to know how often both valid and invalid attempts at system entry are normally made. Then you will know if the number of invalid attempts is unusually high. A significant increase in such attempts can mean the system is being compromised. NOTE: It is recommended that you print and clear the security-violation measurement reports at least once a month. In a busy system, once a week is not too frequent. Security violation thresholds and notification As an example, you may determine that during a forty-hour week, it’s normal for users to submit about 1,000 valid barrier codes and 150 invalid barrier codes; that is, about 3.75 invalid barrier codes are submitted per hour. With this information, you may decide to declare that a security violation occurs during any hour in which 8 invalid barrier codes are submitted. If you know that during an 8-hour period, about 30 invalid codes are submitted, you might set the threshold to count a security violation when 40 invalid codes are submitted within eight hours. You can administer SVN to place a referral call to the location of your choice whenever the established thresholds are reached. All SVN referral calls are priority calls.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1492 Security violations notification 20 Invalid attempts accumulate at different rates in the various security arenas (login, authorization code, remote access, and station security code), depending on feature usage and the number of users on a server. For this reason, you administer thresholds separately for each type of violation. Sequence of events The following is the sequence of events that occur when an SVN is enabled and a detects a security violation: 1. SVN parameters are exceeded (the number of invalid attempts permitted in a specified time interval is exceeded). 2. An SVN referral call (with announcements, if assigned) is placed to a designated point, and SVN provides an audit trail containing information about each attempt to access the switch. 3. SVN disables a login ID or Remote Access following the security violation. 4. The login ID or Remote Access remains disabled until re-enabled by an authorized login ID, with the correct permissions. Reporting The system reports information about security violations in the following ways: nIn real time — you can use the monitor security-violations command to monitor security violations as they may be occurring. Enter this command, followed by the type of security violation you want to monitor (logins, remote-access, authorization-codes, or station-security-codes). nOn an immediate basis — when a security violation occurs, the system sends a priority call to a designated referral point (attendant console or phone). Thus, there is some chance of apprehending the violator during the attempted violation. Upon notification, you can request the Security Violations Status Reports , which show details of the last 16 security violations of each type. The Barrier Code and Authorization Code reports also include the calling party number from which the attempt was made, where available. nOn a historical basis — the number of security violations of each type, as well as other security measurements, are collected and displayed in the Security Violations Summary and Detail reports. These reports show summary information since the counters were reset by the clear measurements security-violations command or since system initialization. They do not show all aspects of the individual security violations.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1493 Security violations notification 20 SVN- halt buttons You can administer buttons for the notification extension to stop notification calls. However, this may pose a security risk. Do not use these buttons if you do not really need them. To find out what svn-halt buttons exist in the system, type display svn-button-location and press RETURN. The SVN Button Locations screen appears. SVN Referral Call With Announcement The SVN Referral Call with Announcement option has the capacity to provide a recorded message identifying the type of violation accompanying the SVN referral call. Using Call Forwarding, Call Coverage, or Call Vector Time-of-Day Routing (to route to an extension or a number off the switch), SVN referral calls with announcements can terminate to a point on or off the switch. Use of other means to route SVN referral calls to alternate destinations are not supported at this time. An attempt to use an alternate method to route SVN referral calls may result in a failure to receive the call or to hear the announcement. SVN BUTTON LOCATIONS LOGIN SECURITY VIOLATIONS Name: Administrator______________ Extension: 81234____ REMOTE ACCESS SECURITY VIOLATIONS Name: Administrator______________ Extension: 81234____ AUTHORIZATION CODE SECURITY VIOLATIONS Name: Administrator II___________ Extension: 81235____ STATION SECURITY CODE VIOLATIONS Name: Administrator II___________ Extension: 81235____ ---------------------------------------------------------------------------- --------------------------------------------------------------------------
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1494 Security violations notification 20 Considerations nYou may only administer one referral destination per system for each type of violation. nExercise caution when administering bridged appearances for stations that are used as SVN referral destinations. SVN referral calls terminating to bridged appearances must be accompanied by an announcement message or must route to bridge appearances equipped with a display module. SVN referral calls that do not have an announcement and terminate to a bridged appearance not having a display will not provide an indication of the nature of the call. nAn authorization code violation with remote access generates two SVNs -- one displaying “authorization code violation” and one displaying “barrier code violation,” even though the correct barrier code was input. These two displays help you determine that the violation took place in the context of a remote access attempt, not an attempt to place an outgoing call to an ARS trunk. Interactions nCall Coverage, Call Forwarding, and Call Pickup These items are supported for SVN only if you use recorded announcements. nCentralized Attendant Services (CAS) CAS attendants cannot receive referral calls from branch locations. nDistributed Communications System (DCS) SVN does not support referral calls across a DCS network. Related topics ‘‘ Monitoring the Access Security Gateway history log’’ on page 336 Refer to ‘‘Login Administration’’ on page 816 to disable a login following a security violation. Refer to ‘‘ Setting up security violations notification’’ on page 341 for instructions. Refer to ‘‘ Recording announcements’’ on page 382 to record announcements.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1495 Service observing 20 Service observing Designated users, normally supervisors, can listen to other users’ calls. This capability is often used to train agents and monitor service quality in call centers and other environments where employees serve customers over the phone. On DEFINITY, this is called “service observing” and the user observing calls is the “observer.” This section describes service observing in environments without Automatic Call Distribution (ACD) or call vectoring. Refer to DEFINITY ECS Guide to ACD Call Centers to use service observing in those environments. Brief description Observers can monitor calls to any of the following: nan extension na vector directory number (VDN) (on systems with call vectoring) na logical agent ID (on systems with Expert Agent Selection) Note that service observing allows you to observe calls to one particular extension, not all calls to all extensions at a terminal. Observers can monitor calls in one of two modes: “listen-only” or “listen-and-talk.” The latter permits an observer to hear and speak with all parties on a call. The person being monitored doesn’t know an observer is listening to the call unless you administer DEFINITY ECS to provide a monitoring tone. !WARNING: Listening to someone else’s calls may be subject to federal, state, or local laws, rules, or regulations. It may require the consent of one or both of the parties on the call. Familiarize yourself with all applicable laws, rules, and regulations and comply with them when you use this feature. Observers can use remote access to monitor calls when they’re off-site. In systems with call vectoring, a vector can control access to service observing.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1496 Service observing 20 How to observe calls Observers press the service observing button on their phone or dial a feature access code, and then dial the extension they want to observe. When using a service observing button, observers start in listen-only mode and can toggle between listen-only and listen/talk mode by pressing the button. The button lamp indicates which mode the observer is in. By contrast, there are different feature access codes for listen-only and listen-and-talk modes. When observers initiate sessions with a feature access code, they must choose one of the two modes at the start of the session. They cannot switch to the other mode without ending the session and beginning another. The feature access codes for service observing are: nService Observing Listen Only Access Code nService Observing Listen/Talk Access Code NOTE: Feature access codes are required for remote observing. An observer can observe an agent who is not active on a call. The observer is in wait state until the agent receives a call, and then the observer is bridged onto the call. To deactivate Service Observing, the observer hangs up, selects another call appearance, or presses the disconnect or release button. Restrictions Two observers can’t monitor the same extension or the same call simultaneously. If user A is observing an extension and user B tries to observe it, B gets a busy signal. If 2 extensions are being observed independently and one calls the other, only the observer of the calling extension observes the call. The observer of the called extension goes into wait state until the call is over. Phone displays A local observer’s phone display shows exactly what is displayed on the observed phone’s display, followed by the letters “so”. Trunk calls If a user makes a trunk-call, observation starts after the user finishes dialing. On central office (CO) trunks, dialing is considered complete when answer supervision is returned or when answer supervision timeout occurs. Service observing cannot be activated over trunks without disconnect supervision. Any attempt is denied.