Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual
Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual
Have a look at the manual Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 817 Login Administration 17 Login’s Name This display-only field shows the login name specified with the add command. Login Type Service Level Disable Following a Security Violation This field only appears when the SVN Login Violation Notification field is set to y on the Security-Related System-Parameters screen. Access to INADS Port This field only appears when the Customer Access to INADS Port field is set to y on the Maintenance-Related System-Parameters screen. Valid entries Usage Customer Enter customer to indicate the login belongs to a customer. This is the only valid value for customer logins. Valid entries Usage super-user Enter super-user to indicate the user is a super-user. Super-user logins can use the add, change, display, list, and remove commands for all customer logins and passwords. non-super-userEnter non-super-user to indicate the user is a non-super-user. Non-super-user logins can change their own password, but are otherwise limited to permissions set by super-user. Valid entries Usage y/n Enter y to have the login disabled following a security violation. Valid entries Usage y/n Enter y to allow a user to access the remote administration port.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 818 Login Administration 17 Login’s Password Passwords must be 4 to 11 characters in length and contain at least 1 alphabetic and 1 numeric character. Passwords do not display as you type. Re-enter Login’s Password Passwords do not display as you type. Password Aging Cycle Length (Days) For security, you should assign password aging to all passwords. The system tracks a password from the day the login was created, or the day the user last changed the password. Facility Test Call Notification For security, this field should be set to y for all logins. Facility Test Call Notification — Acknowledgment Required Valid entries Usage A-Z, a-z, 0-9, and ! & * ? ; ’ ^ (),.:- Enter the initial password for login, assigned by the super-user. Valid entries Usage A-Z, a-z, 0-9, and ! & * ? ; ’ ^ () , . : - Re-enter the initial password for the login, assigned by the super-user. Valid entries Usage 1 - 99 Enter the number of days the password remains valid. Valid entries Usage y/n Enter y to have the user receive notification at logoff if Facility Test Notification is still administered. Valid entries Usage y/n Enter y to require the user to acknowledge they want to logoff while Facility Test Notification is still administered.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 819 Login Administration 17 Remote Access Notification For security, this field should be set to y for all logins. Remote Access Notification — Acknowledgment Required Access Security Gateway This field appears only if the Access Security Gateway (ASG) field on the System-Parameters Customer-Options screen is set to y. Field descriptions for page 2 This page only appears if the Access Security Gateway field is set to y on page 1. Screen 159. Access Security Gateway Login AdministrationValid entries Usage y/n Enter y to have the user receive notification at logoff if remote access is still administered. Valid entries Usage y/n Enter y to require the user to acknowledge they want to logoff while remote access is still administered. Valid entries Usage y/n Enter y to have ASG administered for the login ID. add login Page 2 of 2 ACCESS SECURITY GATEWAY LOGIN ADMINISTRATION Blocked?: n System Generated Secret Key?: n Secret Key: ____________________ EXPIRATION CRITERIA Expiration Date: __/__/____ Number of Sessions: __ RESTRICTION CRITERIA Restrict Days of Week Monday? n Tuesday? n Wednesday? n Thursday? n Friday? n Saturday? n Sunday? n Restrict From Time: __:__ Restrict To Time: __:__
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 820 Login Administration 17 Blocked Setting the Blocked field to y does not remove the login ID from the system. System Generated Secret Key Secret Key The value of this field is only displayed during the initial add or change login command to allow it to be programmed into any ASG Site Manager, ASG Mobile, or ASG Pass-Key used to interact with ASG for user authentication. If the System Generated Secret Key field is set to y, the system generates the secret key. If the System Generated Secret Key field is set to n, the administrator is required to enter a 20-digit octal value. It is important to note the value of the secret key so you can enter it into response generation devices. Valid entries Usage y/n Enter y to temporarily disable the login ID from accessing the system through the ASG interface. Valid entries Usage y/n Enter y to generate the secret key by the system and display it to the administrator. Valid entries Usage 20-digit octal string using 0-7 as possible digitsEnter the 20-digit octal value used by both the lock and the key to verify user authenticity. The last digit must be 0 and the second to last digit must be either 0, 2, 4, or 6.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 821 Login Administration 17 Expiration Date Expiration of the login ID occurs at 23:59:59 of the entered date. This field consists of three fields separated by forward slashes (for example, 01/01/1999). Expiration of a login ID does not remove the login ID from the system. The system accepts administration of year 2000 dates. If an login ID requiring ASG authentication has expired, the login ID for the standard login is not available. If an login ID not requiring ASG login has expired, the login ID still may be active for the standard login as long as expiration criteria associated with that component of the login has not been satisfied. Number of Sessions Expiration of a login ID administered with both Expiration Date and Number of Sessions expiration criteria is based on whichever criteria is satisfied first. Restrict Days of Week This field consists of seven subfields that correspond to the seven days of the week. Each subfield specifies whether the corresponding login ID is restricted from accessing the system via ASG on the day indicated. Access restrictions imposed by this field apply to the entire day unless limited by time restrictions. Valid entries Usage mm = month, dd = day, and yyyy = year (later than the current date)Enter the date when the associated login ID expires. Valid entries Usage 1 to 999 Enter the number of times the login ID can be used to access the system via the ASG interface. Valid entries Usage y/n Enter y to restrict the login from accessing the system on the associated day of the week.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 822 Loudspeaker Paging 17 Restrict From Time and Restrict to Time These two fields are separated by colons, for example, hh:mm where hh = hour and mm = minute. Periods that span an interval that crosses a day boundary are specified by setting the Restrict From Time field greater than the Restrict To Time field. For example, a Restriction From Time of 17:00 and a Restrict To Time of 08:00 limits access to the traditional working hours, 8 to 5. When used with the Restrict Days of Week field, overnight periods start on the days where access is not restricted by the Restrict Day of Week field. If the Restrict Days of Week field is not specified, the restricted time interval specified by the Restrict From Time to Restrict To Time fields applies to every day of the week. Loudspeaker Paging The Loudspeaker Paging screen administers voice paging, deluxe voice paging, and chime paging. Screen 160. Loudspeaker Paging Valid entries Usage 00:00 to 23:59Enter the time interval each day the login ID is blocked from accessing the system via the ASG interface. change paging loudspeaker Page 1 of 1 LOUDSPEAKER PAGING CDR? _ Voice Paging Timeout (sec): ___ Code Calling Playing Cycles: _ PAGING PORT ASSIGNMENTS Voice Paging Code Calling Zone Port TAC COR TN TAC COR TN Location: 1: _______ ____ __ _ ____ __ _ ___________________________ 2: _______ ____ __ _ ____ __ _ ___________________________ 3: _______ ____ __ _ ____ __ _ ___________________________ 4: _______ ____ __ _ ____ __ _ ___________________________ 5: _______ ____ __ _ ____ __ _ ___________________________ 6: _______ ____ __ _ ____ __ _ ___________________________ 7: _______ ____ __ _ ____ __ _ ___________________________ 8: _______ ____ __ _ ____ __ _ ___________________________ 9: _______ ____ __ _ ____ __ _ ___________________________ ALL: _______ ____ __ _ ____ __ _
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 823 Loudspeaker Paging 17 CDR This field determines whether CDR data is collected for the paging ports. Voice Paging Timeout (sec) This field limits the duration of voice pages. When this interval ends, calls are disconnected. To determine the best setting, time the typical pages you expect to broadcast and then add another 4 to 5 seconds. Code Calling Playing Cycles This field sets the number of times a chime code will play when a user makes a chime page. To determine the best setting, consider who your code calling users are and whether they are likely to hear the code chime the first time. Port This field assigns a port on an auxiliary trunk circuit pack to a paging zone. NOTE: To use a port that has no hardware associated with it, place an ’X’ in this field. Valid entries Usage y/n Enter y if you want the switch to collect CDR data on the paging ports. Valid entries Usage 10 to 600 seconds. Enter the maximum number of seconds you want any page to last. blank The field may not be blank when you administer voice paging. Valid entries Usage 1 to 3Enter the number of times you want the chime code to play when a user makes a page. blank The field may not be blank when you administer chime paging (code calling). Valid entries Usage a port ID Assign an available port to each zone you want to use. You cannot assign the same port to different zones. blank Leave this field blank for unused paging zones.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 824 Loudspeaker Paging 17 Voice Paging — TAC This field assigns a Trunk Access Code (TAC) to a paging zone. Users dial this code to make a page to a specific zone. One TAC must be assigned to each zone you want to use. Two zones cannot have the same TAC. If you enter a TAC in the ALL field, users may activate speakers in all the zones by dialing that code. Voice Paging — COR This field assigns a Class of Restriction to a paging zone. Voice Paging — TN Code Calling — TAC This field assigns a Trunk Access Code (TAC) to a paging zone. Users dial this code to make a page to a specific zone. One TAC must be assigned to each zone you want to use. Two zones cannot have the same TAC. If you enter a TAC in the ALL field, users may activate speakers in all the zones by dialing that code. Valid entries Usage 1- to 4-digits Enter a Trunk Access Code (TAC) allowed by your dial plan. *May be used as first digit. #May be used as first digit. blank Leave this field blank for unused paging zones. Valid entries Usage 0 through 95. You can assign different classes of restriction to different zones. blank Leave this field blank for unused paging zones. Valid entries Usage 1 to 20 (G3si/csi)If your system uses Tenant Partitioning, you may use this field to assign a paging zone to a specific tenant partition. 1 to 100 (G3r) Valid entries Usage 1- to 4-digits Enter a Trunk Access Code (TAC) allowed by your dial plan. *May be used as first digit. #May be used as first digit. blank Leave this field blank for unused paging zones.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 825 Mode Code Related System Parameters 17 Code Calling — COR This field assigns a Class of Restriction to a paging zone. Code Calling — TN Location Related topics Refer to ‘‘ Setting up voice paging over loudspeakers’’ on page 389 or ‘‘Setting up chime paging over loudspeakers’’ on page 392 for instructions. Refer to ‘‘ Loudspeaker paging’’ on page 1426 for a description of the feature. Mode Code Related System Parameters This screen establishes parameters associated with the Mode Code Voice Mail System Interface. NOTE: You can only administer this screen if the Mode Code Interface field on the System Parameters Customer Options screen is set to y. Valid entries Usage 0 through 95. You can assign different classes of restriction to different zones. blank Leave this field blank for unused paging zones. Valid entries Usage 1 to 20 (G3si/csi)If your system uses Tenant Partitioning, you may use this field to assign a paging zone to a specific tenant partition. 1 to 100 (G3r) Valid entries Usage 1 to 27 characters Assign a descriptive name for the physical location corresponding to each zone. Typical entries might be “conference room A,” “warehouse,” or “storeroom.”
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Screen reference 826 Mode Code Related System Parameters 17 Field descriptions for page 1 Screen 161. Mode Code Related System Parameters Direct Inside Access This value defines a mode code that the switch sends when a caller at an internal extension dials the Voice Mail System (VMS) access number. Direct Dial Access - Trunk This value defines a mode code that the switch sends when an external caller dials the VMS access number. Internal Coverage This value defines a mode code that the switch sends when an internal caller tries to reach a user at another extension and the call goes to the user’s voice mail coverage. Valid entries Usage 0 to 9, #, *, #00Up to six digits that may include these characters Valid entries Usage 0 to 9, #, *, #00Up to six digits that may include these characters Valid entries Usage 0 to 9, #, *, #00Up to six digits that may include these characters Page 1 MODE CODE RELATED SYSTEM PARAMETERS MODE CODES (FROM SWITCH TO VMS) Direct Inside Access: __ Direct Dial Access - Trunk: __ Internal Coverage: __ External Coverage: __ Refresh MW Lamp: __ System In Day Service: __ System In Night Service: __ OTHER RELATED PARAMETERS DTMF Duration On (msec): __ Off (msec): __ Sending Delay (msec):__ VMS Hunt Group Extension : ____ Remote VMS Extensions - First: Second: