Home > Lucent Technologies > Communications System > Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual

Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 1718
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Screen reference 
    867 PRI Endpoint 
    17
    Width
    Enter the number of adjacent DS0 ports beginning with the specified Starting 
    Port, that make up the PRI Endpoint.This field cannot be blank.
    Originating Auto Restoration
    Signaling Group
    COR
    COS
    A through EThird character is the carrier
    01 through 20Fourth and fifth characters are the slot number
    01 through 31 (DS1 Interface 
    ports)Sixth and seventh characters are the circuit 
    number
    Valid entries Usage
    1
     to 31A width of 6 defines a PRI Endpoint that can support data rates 
    up to 384 Kbps. 
    Valid entries Usage
    y/n
    Enter y to automatically restore calls originating from this PRI 
    Endpoint (while maintaining endpoint call status) in the case of 
    network failure if the call is over SDDN network facilities.
    Valid entries Usage
    1
     to 30Enter the D-channel or D-channel pair that will provide the 
    signaling information for the set of B-channels that make up 
    the PRI Endpoint.
    Valid entries Usage
    0
     to 95Enter class of restriction (COR) to determine calling and called 
    party privileges
    Valid entries Usage
    0
     to 15Enter the Class of Service (COS) to determine the features that 
    can be activated by, or on behalf of, the endpoint.
    Valid entries Usage 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Screen reference 
    868 PRI Endpoint 
    17
    TN
    Simultaneous Calls
    Maintenance Tests
    H0
    H11
    Valid entries Usage
    1
    –20 Enter the Tenant Partition number.
    Valid entries Usage
    y/n
    Enter y to specify that multiple simultaneous calls can be 
    placed to/from the PRI Endpoint.
    Valid entries Usage
    y/n
    Enter y to run hourly maintenance tests on this PRI Endpoint.
    Valid entries Usage
    y/n
    Enter y to specify the ISDN information transfer rate for 384 
    Kbps of data, which is comprised of six B-channels. When a 
    PRI Endpoint is administered to support H0, the hunt algorithm 
    to satisfy a call requiring 384 Kbps of bandwidth uses a fixed 
    allocation scheme.
    Valid entries Usage
    y/n
    Enter y to specify the ISDN information transfer rate for 1536 
    Kbps of data, which is comprised of 24 B-channels. When a PRI 
    Endpoint is administered to support H11, the hunt algorithm to 
    satisfy a call requiring 1536 Kbps of bandwidth uses a fixed 
    allocation scheme. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Screen reference 
    869 PRI Endpoint 
    17
    H12
    NXDS0
    Contiguous
    Specifies whether to hunt contiguous NXDS0 channels. This field only appears if 
    y is entered in NXDS0. The hunt algorithm to satisfy an NXDS0 call is as follows:
    Valid entries Usage
    y/n
    Enter y to specify the ISDN information transfer rate for 1920 
    Kbps data, which includes 30 B-channels. When a PE is 
    administered to support H12, the hunt algorithm to satisfy a 
    call requiring 1920 Kbps of bandwidth uses a fixed allocation 
    scheme.
    Valid entries Usage
    y/n
    Enter y to specify the NXDS0 multi-rate service.
    Valid entries Usage
    y
     Enter y to specify the “floating” scheme. NXDS0 calls are 
    placed on a contiguous group of B-channels large enough to 
    satisfy the requested bandwidth without constraint on the 
    starting channel (no fixed starting point trunk).
    H0 and NXDS0 “floating” scheme cannot both be 
    y.
    n Enter n to specify the “flexible” scheme. NXDS0 calls are 
    placed on any set of B-channels on the same facility as long as 
    the requested bandwidth is satisfied. There are no constraints, 
    such as contiguity of B-channels or fixed starting points. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Screen reference 
    870 Remote Access 
    17
    Remote Access
    The Remote Access screen is used to implement the Remote Access feature. 
    Remote Access permits a caller located outside the system to access the system 
    through the public or private network and then use the features and services of the 
    system.
    Remote Access users can dial into the system using central office (CO), Foreign 
    Exchange (FX), Wide Area Telecommunications trunks (WATS), and Integrated 
    Services Digital Network Primary Rate Interface (ISDN-PRI) trunks. In addition, 
    a dedicated Remote Access Direct Inward Dialing number can be provided.
    !SECURITY ALERT:
    Lucent Technologies designed the Remote Access feature incorporated in 
    this product that, when properly administered by the customer, enables the 
    customer to minimize the ability of unauthorized persons to gain access to 
    the network. It is the customer’s responsibility to take the appropriate steps 
    to properly implement the features, evaluate and administer the various 
    restriction levels, protect access codes and distribute them only to 
    individuals who have been advised of the sensitive nature of the access 
    information. Each authorized user should be instructed concerning the 
    proper use and handling of access codes.
    In rare instances, unauthorized individuals make connections to the 
    telecommunications network through use of remote access features. In such 
    an event, applicable tariffs require the customer pay all network charges for 
    traffic. Lucent Technologies cannot be responsible for such charges, and will 
    not make any allowance or give any credit for charges that result from 
    unauthorized access.
    To ensure the security of your system, consider the following:
    nMake all remote access facilities unlisted directory telephone numbers.
    nRequire users to enter a Barrier Code of at least seven random digits AND 
    an Authorization Code of at least 13 random digits to make network calls.
    nMake Authorization Codes nonconsecutive (random) and change them, at 
    least, quarterly.
    nDeactivate Authorization Codes immediately if the user leaves the 
    company or changes assignments.
    nAssign the minimum level of calling permissions required to each 
    Authorization Code.
    nBlock off-hours and weekend remote access calling, when possible. Use 
    Alternative Facility Restriction Levels, if available. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Screen reference 
    871 Remote Access 
    17
    nUse a voice recording, warble tone, or no tone and avoid use of a dial tone 
    as a prompt when the remote access unit answers.
    nAssign the lowest possible FRL to only allow internal switch calls.
    As an additional step to ensure System security, you can permanently disable the 
    Remote Access feature if you do not intend to use it now or in the future. If you do 
    decide to permanently disable the feature, it will require Lucent Services 
    intervention to activate the feature again.
    !CAUTION:
    Your attempt to disable the Remote Access feature will be lost if the switch is 
    rebooted without saving translations. Therefore, execute a “save 
    translation” command after permanently disabling the Remote Access 
    feature.
    To assist you in maintaining the security of your system, DEFINITY ECS 
    provides the status remote access command, which provides status and 
    information on each remote access barrier code and on the remote access feature. 
    A sample Status Remote Access screen follows the Remote Access screen.
    Field descriptions for page 1
    Screen 175. Remote Access 
    change remote-access
                                      REMOTE ACCESS
       Remote Access Extension________              Barrier Code Length:____
    Authorization Code Required? y  Remote Access Dial Tone: n
         Barrier      COR  TN  COS   Expiration    No. of     Calls
          Code        COR  TN  COS      Date       Calls      Used
       1:________     1__  1_ 1__   __/__/__ ______     ______
       2:________  1__  1_ 1__   __/__/__      ______     ______
       3:________  1__  1_ 1__   __/__/__      ______     ______
       4:________  1__  1_ 1__   __/__/__      ______     ______
       5:________  1__  1_ 1__   __/__/__      ______     ______
       6:________  1__  1_ 1__   __/__/__      ______     ______
       7:________  1__  1_ 1__   __/__/__      ______     ______
       8:________  1__  1_ 1__   __/__/__      ______     ______
       9:________  1__  1_ 1__   __/__/__      ______     ______
      10:_______  1__  1_ 1__   __/__/__       ______     ______
    Permanently Disable? __ Disable Following A Security Violation? y
    (NOTE:  You must logoff to effect permanent disabling of Remote Access) 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Screen reference 
    872 Remote Access 
    17
    Screen 176. Remote Access Status 
    Remote Access Extension
    The remote access extension is used as if it was a DID extension. Only one DID 
    extension can be assigned as the remote access extension. Calls to that number are 
    treated the same as calls on the remote access trunk.
    When a trunk group is dedicated to Remote Access, the remote access extension 
    number is administered on the trunk group’s incoming destination field.
    Barrier Code Length
    Assign a barrier code length of 7 to provide maximum security.
    Valid entries Usage
    Extension 
    numberEnter the extension number for Remote Access associated with 
    each trunk that supports the Remote Access feature. You 
    cannot assign a Vector Directory Number (VDN) extension as 
    the remote access extension.
    Valid entries Usage
    4 
    to 7 Enter a number to indicate the length of the barrier code. 
    status remote-access
    REMOTE ACCESS STATUS
    Remote Access Status: enabled
    Date/Time Modified: 01/30/95 17:00
    Barrier  Date  Expiration No. of Calls Status Date/Time Expired Cause
    Code Modified Date Calls Used
    1:2374745 01/30/95 03/31/95 50 50 expired 02/15/95 20:43 calls
    2:3374837 01/30/95 / / 20 4 active / /
    3:3285038 01/30/95 01/31/96 13 expired 02/10/95 09:32 date
    4:5738557 01/30/95 07/31/95 20 20 expired 02/03/95 10:14 calls
    5:7764884 01/30/95 05/20/95 0 active / / :
    6: // // // :
    7: // // // :
    8: // // // :
    9: // // // :
    10: // // // : 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Screen reference 
    873 Remote Access 
    17
    Authorization Code Required
    When you use an authorization code in conjunction with a barrier codes it 
    increases the security of the Remote Access feature.
    Remote Access Dial Tone
    Set this field to 
    n for maximum security. This field appears when the 
    Authorization Code Required field is set to y.
    Barrier Code
    You must assign a barrier code that conforms to the number entered in the Barrier 
    Code Length field. You may enter up to 10 barrier codes per system. Duplicate 
    entries are not allowed. You must keep your own records regarding the 
    distribution of these barrier codes to your personnel.
    COR
    Assign the most restrictive class of restriction (COR), that provides only the level 
    of service required, to provide the maximum security.
    Valid entries Usage
    y/n
    Enter y to require an authorization code be dialed by Remote 
    Access users to access the system’s Remote Access facilities.
    Valid entries Usage
    y/n
    Enter n so that there is no Remote Access Dial Tone prompt.
    Valid entries Usage
    0 
    to 9Enter a 4- to 7-digit number in any combination of digits.
    noneMust be specified in the first Barrier Code field, if the Barrier 
    Code Length field is blank.
    Valid entries Usage
    0 
    through 95Enter the COR number associated with the barrier code that 
    defines the call restriction features.  
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Screen reference 
    874 Remote Access 
    17
    TN
    COS
    Assign the most restrictive class of service (COS), that provides only the level of 
    service required to provide the maximum security.
    Expiration Date
    Assign an expiration date based on the expected length of time the barrier code 
    will be needed. If it is expected the barrier code is to be used for a 2-week period, 
    assign a date two weeks from the current date. If the Expiration Date is assigned, a 
    warning message is displayed on the system copyright screen seven days prior to 
    the expiration date. The system administer can modify the expiration date to 
    extend the time interval if needed.
    No. of Calls
    The Expiration Date and No. of Calls fields can be used independently or in 
    conjunction to provide the maximum security. If both the Expiration Date and No. 
    of Calls fields are assigned, the corresponding barrier code expires when the first 
    of these criteria is satisfied.
    Calls Used
    This display-only field shows the number of calls placed using the corresponding 
    barrier code. This field is incremented each time a barrier code is successfully 
    used to access the Remote Access feature. A usage that exceeds the expected rate 
    indicates improper use.
    Valid entries Usage
    1
     to 20 (G3si)
    1 to 100 (G3r)Enter the appropriate Tenant Partition number.
    Valid entries Usage
    0
     to 15Enter the COS number, associated with the barrier code, that 
    defines access permissions for Call Processing features. 
    Valid entries Usage
    A date greater than the 
    current date Enter the date you want the barrier code to expire. 
    Valid 
    entries Usage
    1
     to 9999  Enter the number of Remote Access calls that can be placed 
    using the associated barrier code.  
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Screen reference 
    875 Remote Call Coverage Table 
    17
    Permanently Disable
    Reactivation of remote access to the interface requires Lucent Services 
    intervention.
    Disable Following a Security Violation
    This field appears on the screen when the SVN Authorization Code Violation 
    Notification Enabled field on the Security-Related System Parameters screen is 
    set to y. 
    Related Topics
    Refer to ‘‘
    Setting up remote access’’ on page 310 for step-by-step instructions for 
    configuring remote access.
    Refer to ‘‘
    Remote Access’’ on page 1479 for a description of this feature.
    Remote Call Coverage Table
    The Remote Call Coverage Table allows you to provide automatic redirection of 
    certain calls to alternate non-local answering positions in a coverage path.
    Non-local numbers may be any ARS or AAR number, any number on the public 
    network, any international number, or a UDP/DCS extension up to 16 digits, 
    which includes any ARS/AAR facility access code, any trunk dial access code 
    (TAC), long distance dialing code, or international dial code. Up to 999 remote 
    call coverage points can be entered on the 23 pages of this screen.
    Valid entries Usage
    y/n
    Enter y to permanently block remote access to the 
    administration interface. 
    Valid 
    entries Usage
    y/n
    Enter y to disable the remote access feature following detection of a 
    remote access security violation. The system administrator can 
    re-enable Remote Access using the enable remote access command. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Screen reference 
    876 RHNPA Table 
    17
    Field descriptions for page 1
    Screen 177. Remote Call Coverage Table 
    RHNPA Table
    The RHNPA Table defines route patterns for specific 3-digit codes, usually direct 
    distance dialing (DDD) prefix numbers. 
    Screen 178. RHNPA Table
    change coverage remote
    REMOTE CALL COVERAGE TABLE
    01: ________________      16: ________________      31: ________________        
    02: ________________      17: ________________      32: ________________        
    03: ________________      18: ________________      33: ________________        
    04: ________________      19: ________________      34: ________________        
    05: ________________      20: ________________      35: ________________        
    06: ________________      21: ________________      36: ________________        
    07: ________________      22: ________________      37: ________________        
    08: ________________      23: ________________      38: ________________        
    09: ________________      24: ________________      39: ________________        
    10: ________________      25: ________________      40: ________________        
    11: ________________      26: ________________      41: ________________        
    12: ________________      27: ________________      42: ________________        
    13: ________________      28: ________________      43: ________________        
    14: ________________      29: ________________      44: ________________        
    15: _____________ 30: _____________ 45: _____________
    change rhnpa table  Page 1 of X
    RHNPA TABLE: __ 
                            CODE:  x00 - x99
                                  Pattern Choices
               1: ___   3: ___   5: ___   7: ___   9: ___   11: ___
               2: ___   4: ___   6: ___   8: ___  10: ___   12: ___
           Code-Pattern Choice Assignments (from 1 - 12 above)
    00: 1__ 10: 1__ 20: 1__ 30: 1__ 40: 1__ 50: 1__ 60: 1__ 70: 1__ 80: 1__ 90: 1__
    01: 1__ 11: 1__ 21: 1__ 31: 1__ 41: 1__ 51: 1__ 61: 1__ 71: 1__ 81: 1__ 91: 1__
    02: 1__ 12: 1__ 22: 1__ 32: 1__ 42: 1__ 52: 1__ 62: 1__ 72: 1__ 82: 1__ 92: 1__
    03: 1__ 13: 1__ 23: 1__ 33: 1__ 43: 1__ 53: 1__ 63: 1__ 73: 1__ 83: 1__ 93: 1__
    04: 1__ 14: 1__ 24: 1__ 34: 1__ 44: 1__ 54: 1__ 64: 1__ 74: 1__ 84: 1__ 94: 1__
    05: 1__ 15: 1__ 25: 1__ 35: 1__ 45: 1__ 55: 1__ 65: 1__ 75: 1__ 85: 1__ 95: 1__
    06: 1__ 16: 1__ 26: 1__ 36: 1__ 46: 1__ 56: 1__ 66: 1__ 76: 1__ 86: 1__ 96: 1__
    07: 1__ 17: 1__ 27: 1__ 37: 1__ 47: 1__ 57: 1__ 67: 1__ 77: 1__ 87: 1__ 97: 1__
    08: 1__ 18: 1__ 28: 1__ 38: 1__ 48: 1__ 58: 1__ 68: 1__ 78: 1__ 88: 1__ 98: 1__
    09: 1__ 19: 1__ 29: 1__ 39: 1__ 49: 1__ 59: 1__ 69: 1__ 79: 1__ 89: 1__ 99: 1__ 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual