NEC Neax 2400 Ipx Feature Programming Manual
Have a look at the manual NEC Neax 2400 Ipx Feature Programming Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1168 NEC manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
NEAX2400 IPX Feature Programming ManualPage 28NDA-24297, Issue 1 A-19 Attendant Night Transfer Service Conditions (cont’d) 12. Programmed Night Stations can use CALL HOLD [C-6], CALL TRANSFER [C-10, 11] and THREE- WAY CALLING [T-2], provided these features are programmed into the CLASS OF SERVICE - INDIVIDUAL [C-15]. 13. Operator calls after Consultation Hold is not transferred to the Night Station. 14. Individual Attendant calls are not transferred to the Night Station assigned by ATTENDANT NIGHT TRANSFER. 15. The Night Station can set CALL FORWARDING - ALL CALLS - OUTSIDE [C-28], CALL FORWARDING - BUSY LINE - OUTSIDE [C-60], and CALL FORWARDING - DONT ANSWER - OUTSIDE [C-74]. 16. When a DIT call terminates to a station that has set CALL FORWARDING - ALL CALLS [C-5] to Attendant, the call will be forwarded to a Night Station assigned by this service. 17. In case a station places an incoming call on hold and calls an Attendant, this service is not activated and the station receives reorder tone (including CALL FORWARDING - ALL CALLS [C-5] and CALL FORWARDING - BUSY LINE [C-2]). 18. An incoming call is transferred to a station in the same node that accommodates the calling station/trunk in the FCCS network. 19. A telephone number cannot be used (must be Physical Station Number). Interactions 1. There can be only one ATTENDANT NIGHT TRANSFER station per tenant. 2. The ATTENDANT NIGHT TRANSFER telephone number must be programmed using the MAINTENANCE ADMINISTRATION TERMINAL [M-18] (MAT). This telephone number may be the same number as the NIGHT CONNECTION-FIXED/FLEXIBLE [N-1, N-2] number, but each must be individually assigned. PRIORITY CALL [P-9] and OFF-HOOK ALARM [O-6] calls cannot be answered by the ATTENDANT NIGHT TRANSFER station. 3. Stations CALL FORWARDING [C-2,3,5] calls to the operator (dial 0) will be directed to the ATTENDANT NIGHT TRANSFER station. 4. CALL WAITING [C-12]: This feature cannot be activated at the ATTENDANT NIGHT TRANSFER station for operator directed (dial 0) calls. 5. STATION HUNTING [S-7,8,9]: If the ATTENDANT NIGHT TRANSFER station is in a station hunting group and all stations in the group are busy, the call will wait in queue at the ATTENDANT NIGHT TRANSFER station and will be answered by the first available station in the hunt group. 6. A telephone number cannot be used (must be Physical Station Number). Programming STEP 1:ASID- Assign the Tenant, Group Number (GN) 1-7, and Function (F) = 3, ATTENDANT NIGHT TRANSFER. Assign the point of destination as a station, and assign the station number. STEP 2:ASGD- Assignment is not required. All stations in the tenant group will be affected.
NEAX2400 IPX Feature Programming Manual NDA-24297, Issue 1Page 29 Authorization Code A-20 A-20 Authorization Code General Description An AUTHORIZATION CODE is a numerical code dialed by users (up to 10 digits), which will override the station CLASS OF SERVICE - INDIVIDUAL [C-15] for facility access restriction. The AUTHORIZATION CODE can be masked on the D termdisplay if necessary using the AUTHORIZATION CODE DISPLAY ELIMINATION [A-99]. When a wrong code is received from a station/trunk, detailed information on the unauthorized user is output as System Message [26-M]. This message is Toll Fraud Report. Operating Procedure There are two procedures for entering an AUTHORIZATION CODE in the system database. One of the following choices will be employed: Procedure 1 Without an ACCOUNT CODE [A-18]: 1. Lift the handset and receive dial tone. 2. Enter the feature Access Code and receive service set tone. 3. Enter the AUTHORIZATION CODE (up to 10 digits). 4. Receive dial tone. 5. Enter the number to be called. Note:The feature access code for AUTHORIZATION CODE will be a maximum of three digits. With an ACCOUNT CODE [A-18]: 1. Lift the handset and receive dial tone. 2. Enter the feature Access Code and receive service set tone. 3. Enter the AUTHORIZATION CODE and receive second service set tone. 4. Enter the ACCOUNT CODE [A-18] and receive dial tone. 5. Enter the number to be called. Procedure 2 (only for LEAST COST ROUTING [L-5] calls) Without an ACCOUNT CODE [A-18]: 1. Lift the handset and receive dial tone. 2. Enter the number to be called. 3. If an AUTHORIZATION CODE is required, the caller will receive special dial tone. 4. If special dial tone is received, enter the AUTHORIZATION CODE (up to 10 digits) or the call is denied. With an ACCOUNT CODE [A-18]: 1. Lift the handset and receive dial tone. 2. Enter the feature access code for the ACCOUNT CODE [A-18] and receive service set tone. 3. Enter the ACCOUNT CODE [A-18] and receive dial tone. 4. Enter the number to be called. 5. If AUTHORIZATION CODE is required, the caller will receive special dial tone. 6. If special dial tone is received, enter AUTHORIZATION CODE (up to 10 digits) or the call is denied. Note:The feature access code for ACCOUNT CODE will be a maximum of three digits.
NEAX2400 IPX Feature Programming ManualPage 30NDA-24297, Issue 1 A-20 Authorization Code Service Conditions 1. A maximum of 10 digits for AUTHORIZATION CODE can be dialed, and 8 digits will be registered on STATION MESSAGE DETAIL RECORDING [S-10]. 2. The maximum number of AUTHORIZATION CODES is 4,000. This number is dependent upon system configuration. These specifications are based on the digits being assigned as follows: 1st digit: A (when A equals a unique digit from 0 - 9) 2nd digit: B - C (when b, c equal any two unique digits from 0 - 9) 3rd digit: D-E (when d, e equal any two unique digits from 0 - 9) 4th digit: F-G-H (when f, g, h equal any three unique digits from 0 - 9) 5th - 8th digits: Any combination 0 - 9 9th & 10th digits: Assigned using the checksum. These are for validation purposes only. See ETI: 091 for more details. Note:See ETI: 082 for details on AUTHORIZATION CODE/FORCED ACCOUNT CODE [F-7] assignment. 3. Service set tone is common to AUTHORIZATION CODE, ACCOUNT CODE [A-18] and FORCED ACCOUNT CODE [F-7], but can be eliminated by system data as required. 4. AUTHORIZATION CODE and FORCED ACCOUNT CODE [F-7] cannot be provided simultaneously for the same tenant group. System data determines, on a per-tenant basis, whether AUTHORIZATION CODE or FORCED ACCOUNT CODE [F-7] is used. 5. AUTHORIZATION CODE dialing (Procedure 1) is also effective with CONSULTATION HOLD [C- 17]. Special dial tone is received instead of dial tone after AUTHORIZATION CODE. 6. Procedure 2 is effective only for LEAST-COST ROUTING - 3/6-DIGIT [L-5] calls. 7. Stations must be assigned for Procedure 1 and 2 via CLASS OF SERVICE - INDIVIDUAL [C-5] programming in system data. 8. In Procedure 1, system data can determine, on a per-tenant basis, whether or not an ACCOUNT CODE [A-18] follows the AUTHORIZATION CODE. 9. Assigned AUTHORIZATION CODES can be used for the REMOTE ACCESS TO SYSTEM [R-2] function. 10. OG TRUNK QUEUING [O-2] and OFF-HOOK QUEUING [O-7] can be set according to the Service Feature Class of the user’s AUTHORIZATION CODE. 11. AUTHORIZATION CODE can be recorded in the STATION MESSAGE DETAIL RECORDING [S-10] for Procedure 2. 12. The registered/non-registered condition of the AUTHORIZATION CODE is not included in the information block of Condition B on the SMDR output format. 13. Attendant cannot activate this feature by Procedure 1. 14. When the user goes on-hook or hooking, changed class goes back to normal class. 15. See Service Conditions for the AUTHORIZATION CODE DISPLAY ELIMINATION[A-99]. Interactions 1. If FORCED ACCOUNT CODES [F-7] are used, AUTHORIZATION CODES are not used within the same tenant. 2. AUTHORIZATION CODES may be used in conjunction with ACCOUNT CODES [A-18]. 3. When assigning an AUTHORIZATION CODE Restriction of 1 in AATC, the RSC must be constructed in ARSC. 4. AUTHORIZATION CODES can be unrestricted or assigned one of 15 Route Restriction Classes.
NEAX2400 IPX Feature Programming Manual NDA-24297, Issue 1Page 31 Authorization Code A-20 Interactions (cont’d) 5. There are no restrictions regarding the first digit of AUTHORIZATION CODES, except what is programmed in AMND. Tenant 0 does not conflict with the PBX numbering plan. This is true when separate tenant tables are provided. If common tenant tables are used, a conflict between LCR(S) and OGC(A), used with SMDR, will occur. Note:The access code to the service feature AUTHORIZATION CODE must be assigned within the PBX numbering plan. 6. If ASPA, SRV = LCR (Least Cost Route Selection) / LCRS (Register Sender LCR) AH parameter is assigned as data“1”, the request for an AUTHORIZATION CODE is determined by the ARSC assignment of the station in relationship to the chosen route. 7. When a D termuser initiates the LAST NUMBER DIALED [L-6D] feature, the AUTHORIZATION CODE will be recorded if previously dialed. 8. The AMND command determines the length of AUTHORIZATION CODES, based on the first digit of the code. 9. AUTHORIZATION CODES are recorded by STATION MESSAGE DETAIL RECORDING [S-10], Procedure 2. 10. AUTHORIZATION CODES cannot be entered by the Attendant Console. 11. PEG COUNTS [P-7] of invalid AUTHORIZATION CODES are not available. 12. AUTHORIZATION CODES can be dialed by a user when establishing a CONSULTATION HOLD [C- 17] connection. 13. For Procedure 2, LCR(S) must be provided. Programming Note:There are two methods of Authorization Code assignment: Full Implementation and the Checksum methods. In the Full Implementation method, the whole AUTHORIZATION CODE is assigned in the AATC command and SYS1. Indexes 12, 13, & 14 are assigned 00H. In the Checksum method, partial assignment for each AUTHORIZATION CODE is assigned in the AATC command. The last one or two digits (programmable option) are determined by the system according to the data assignments in ASYD, SYS 1, Indexes 12, 13, and 14. STEP 1:ASYD- System Data 1, Index 12. If Index 12 = 0, no Checksum method is used, and Indexes 13 and 14 are ignored, regardless of their assignments. Each Bit in Index 12 directly correlates to a digit in the AUTHORIZATION CODE assigned in AATC, and will determine the first digit of the Checksum method. For this example, 26428 has been assigned as the AUTHORIZATION CODE in AATC. Arbitrarily pick any Bits, 0 - 4, and flag those Bits as data 1. Note:Bit 0 - 7 may be used when 8-digit AUTHORIZATION CODES are assigned in the AATC command. BIT 4BIT 3BIT 2BIT 1BIT 0 AATC 82462 SYS, IN1201001 DESIGNATIONd4 d3 d2 d1 d0
NEAX2400 IPX Feature Programming ManualPage 32NDA-24297, Issue 1 A-20 Authorization Code Programming (cont’d) System Data 1, Index 13. Each Bit in Index 13 directly correlates to a digit in the AUTHORIZATION CODE assigned in AATC, and will determine the second digit of the Checksum method. Pick any Bits 0 - 4, but not the same combination of Bits as picked in Index 12. System Data 1, Index 14 determines the algorithm used to calculate the last two digits of every AUTHORIZATION CODE. (Only decimal numbers may be used in this index, therefore, hexadecimal values A to F may not be assigned). System Data 1, Index 14 = X & Y, where X and Y represent any arbitrarily chosen decimal digit 1- 9, and where Y is used to determine the first digit and X is used to determine the second digit in the Checksum method. The following data, 37H, has been used for the example calculation: Note:If only one digit is to be added via the Checksum method, then Index 13 data will be OOH and Index 14. Example Calculation: In AATC, 26428 has been assigned. In System Data 1, Index 12, Bits 0 and 3 were chosen; 26428 2+2=4. The decimal value of Bits 0 - 3 of Index 14 = 7. 4+N=7.N=3 . 7 is obtained as any whole number greater than 4 that ends with a 7, the decimal value as determined in System Data 1, Index 14, Bits 0 to 3. In AATC, 26428 has been assigned. In System Data 1, Index 13, Bits 4 and 1 were chosen; 26428. 8 + 6 = 14. The decimal value of Index 14, Bits 4 - 7 is 3. 14 + N = 23. N = 9 . 23 is obtained as any whole number greater than 14 that ends with a 3, the decimal value determined in System Data 1, Index 14, Bits 4 - 7. The AUTHORIZATION CODE will be 26428-39 . Note:Digits 39 determined by the Checksum method will be unique to the AUTHORIZATION CODE 26428. 26428 will not be followed by any digits other than 39. ASYD- System Data 1, Index 43, Bit 2, is service set tone sent after AUTHORIZATION CODE. ASPA access code? 0/1: No/Yes. Assign data“1”. System Data 1, Index 43, bit 0, is AUTHORIZATION CODE required for DISA? 0/1: required/not required. Normally assign data“0.” System Data 1, Index 93, Bit 6. Are the AMND tables Separate or Common for tenants in the system? 0/1: Separate/Common. Assign data“0”for separate tables. System Data 2, Index 3, Bit 4: Is Account Code used with AUTHORIZATION CODE? 0/1: No/Yes. System Data 2, Index 3, Bit 5: Type of code? 0/1: AUTHORIZATION CODE/ Forced Account Code; assign data“0”. BIT 4BIT 3BIT 2BIT 1BIT 0 AATC 82462 SYS1, IN1310010 DESIGNATIONd4 d3 d2 d1 d0 SYS1, INDEX 14XY BIT 76543210 DATA 00110111
NEAX2400 IPX Feature Programming Manual NDA-24297, Issue 1Page 33 Authorization Code A-20 Programming (cont’d) STEP 2:ANPD- Reserve a number level for feature access. Assign for Normal (N), Hooking (H), and Busy (B) (if applicable to any feature in this level). Assign NND in accordance with a predetermined numbering plan. STEP 3:ASPA- For SRV = SSC (Service Code), SID = 42, assign the access code. For the NND parameter, no assignment is required when AUTHORIZATION CODE operates by itself. When Account Code operates with AUTHORIZATION CODE, assign for SRV = SSC (Service Code), SID = 42. The NND value will include the number of digits in the AUTHORIZATION CODE access code, and Account Code. For example: 45–26428–623423–9-1-617-555-2323 (ACC) (Auth Code) (Account Code) (Destination Code) ASPA ACC=45 NND=8 (ACC + Account Code) ASPA- For SRV = LCR (Least Cost Route Selection) / LCRS (Register Sender LCR), if operating Procedure 2 is to be used, (dialing the AUTHORIZATION CODE after the number dialed), then assign data“1”to the AH parameter when programming the LCR(S) access code. Therefore, operating Procedure 2 is only available with LEAST-COST ROUTING - 3/6 DIGIT [L-5]. STEP 4:ASFC- For stations allowed AUTHORIZATION CODE, assign a Class of Service that allows SFI 27. STEP 5:AMND- For Tenant 0, assign the Destination Code (DC) as the first digit of all AUTHORIZATION CODES and the Maximum Necessary Digits (MND) of the AUTHORIZATION CODE. For the above example, a DC of 2 is assigned with an MND of 7. The MND value will include the digits added by the Checksum method. STEP 6:AATC- Assign the TN, Digit Code (DC) (the actual code itself), the AUTHORIZATION CODE RESTRICTION (ACR) as data“1”and Service Feature Class (SFC) and Route Restriction Class (RSC). If ACR is assigned as data 2. Allowed: RSC and SFC parameters are not programmed. (SFC parameters are not operational.) STEP 7:LATC- List up all the AUTHORIZATION CODES. This is the simplest way to determine what digits have been added to the system with the Checksum method. This is not required if the Checksum method is not used. FCCS Programming This data setting describes only the additional or replacement commands used to activate FCCS services. When used as an FCCS feature, these commands replace the non-network commands (for example, AAED is replaced by AAEDN). Note that the data setting for FCCS service varies depending on the node. Note STEP 1:ANPDL- Reserve a number level for feature access. Assign for Normal (N), Hooking (H), and Busy (B) (if applicable to any feature in this level). Assign NND in accordance with a predetermined numbering plan. STEP 2:ASPAL- For SRV = SSC (Service Code), SID = 42, assign the access code. For the NND parameter, no assignment is required when AUTHORIZATION CODE operates by itself. When Account Code operates with AUTHORIZATION CODE, assign for SRV = SSC (Service Code), SID = 42. The NND value will include the number of digits in the AUTHORIZATION CODE access code, and Account Code. For SRV = LCR (Least Cost Route Selection) / LCRS (Register Sender LCR), if operating Procedure 2 is to be used, (dialing the AUTHORIZATION CODE after the number dialed), then assign data“1”to the AH parameter when programming the LCR(S) access code. Therefore, operating Procedure 2 is only available with LEAST-COST ROUTING - 3/6 DIGIT [L-5].
NEAX2400 IPX Feature Programming ManualPage 34NDA-24297, Issue 1 A-20 Authorization Code FCCS Programming (cont’d) STEP 3:LATCL- List up all the AUTHORIZATION CODES. This is the simplest way to determine what digits have been added to the system with the Checksum method. This is not required if the Checksum method is not used. Note:When using ASYDL or ASYDN to program an FCCS feature, the basic programming of ASYD is required in addition to ASYDL or ASYDN.
NEAX2400 IPX Feature Programming Manual NDA-24297, Issue 1Page 35 Automatic Trunk Test A-21 A-21 Automatic Trunk Test General Description The AUTOMATIC TRUNK TEST capability provides a functional test on a large number of trunks at a prearranged time. The results of the test are reported at the MAINTENANCE ADMINISTRATION TERMINAL (MAT) [M- 18]. The test can include: Ringback Tone Test, 1 KHz Test Tone and Trunk Selection Test, by having the proper test trunk termination at the distant office. Operating Procedure Input the route and trunk number to be tested by using the TTLC command 1. Input the TTLC and ATTD command. 2. The system will prompt for either Immediate or Scheduled Execution of this feature. If Scheduled execution is chosen, the time when the test begins is entered via the MAT. 3. The system will ask for the route number to be tested as RT on CRT. 4. Input a route number from 1 - 255. 5. The system will ask for the trunk number(s) to be tested as TK on CRT. 6. Input the trunk number from 1 through 255. Input the trunk number(s) to be tested as the test goes from TRK NUMBER to TRK NUMBER. 7. The system will execute the trunk test based on the data input above. Test results will be printed out after all trunks have been tested. Service Conditions 1. Additional hardware required consists of one LTST (PH-M16) card, one 8TLT card, and one line circuit and LTST cable. 2. Trunks are tested in conjunction with the connecting office through the selected trunk, on a one-at-a-time basis. The following different trunk functions can be tested on all trunks in a specified group: a.) trunk selection, b.) detection of ringback tone sent back from the connecting office after test number outpulsing, c.) detection of test tone (1 kHz) returned from AUTOMATIC TRUNK TEST facility if provided at the connecting office. 3. As part of the AUTOMATIC TRUNK TEST facility, an AUTOMATIC TRUNK TEST is provided at the NEAX2400 IPX to answer incoming test calls. Upon terminating the incoming test call from the originating office through a selected test trunk, the AUTOMATIC TRUNK TEST generates a 1 kHz tone to the originating office as an acknowledgment signal. 4. If scheduled execution is chosen, the time when the test begins is entered via the MAT. The MAT is dedicated to the AUTOMATIC TRUNK TEST function from the time the test is ordered until the completion of the test. Interactions 1. A four-wire TIE Line must be provided with the AUTOMATIC TRUNK TEST. See TIE LINE ACCESS [T-3]for details of the required programming. 2. The test station must be located in the same LP as the PH-LTST circuit card.
NEAX2400 IPX Feature Programming ManualPage 36NDA-24297, Issue 1 A-21 Automatic Trunk Test Programming STEP 1:ANPD- Reserve a number level for service feature access. Assign for Normal (N), Assign NND in accordance with a predetermined numbering plan. STEP 2:ASPA- The access code for INDIVIDUAL TRUNK ACCESS must be assigned, SID = 17. Assign Connection Index, CI = (N) Normal. NND is assigned in accordance with a predetermined numbering plan. STEP 3:ARSC- A Route Restriction Class (RSC) must be constructed to meet the requirements of the ATT. These requirements are to allow all outgoing and both way routes*. STEP 4:ASFC- A Service Feature Class (SFC) must be constructed to allow SFI 39, Individual Trunk Selection. STEP 5:ASDT- A Test Station must be assigned using the RSC and SFC previously constructed. This station will be a TEC = 3. STEP 6:ATTD- Assignment of Trunk Test Data is used to order the ATT. STEP 7:TTLC- This command will designate the Start route and the End route and trunk numbers. It will be these trunks that will be tested. Assign the following: TEST: TEST TYPE 1. IMMEDIATE EXECUTION 2. SCHEDULE EXECUTION RT: [a] TO [b]: Route Range a: Start Route Number b: Last Route Number TK: [c] TO [d]: Trunk Range c: Start Trunk Number d: Last Trunk Number RESULT:[e] - [f]:Tested Route & Trunk e: RT at end of test f: TK at end of test START TIME: 15:10 PRESENT TIME: 15:13 Note:Routes that are used as incoming only, such as DDD or DIT, should be programmed as bothway. Allow only the RSC of the Test station access to these routes on an outgoing basis for test purposes only.
NEAX2400 IPX Feature Programming Manual NDA-24297, Issue 1Page 37 Authorization Code - Tie Line Incoming Routes A-29 A-29 Authorization Code - Tie Line Incoming Routes General Description This service feature offers an outside party the ability to enter an AUTHORIZATION CODE [A- 20] through an incoming TIE Line trunk. Operating Procedure When the incoming route is restricted or when an AUTHORIZATION CODE [A-20] is always required 1. The called number, office code, and terminal number are received by the TIE Line trunk. 2. The outside calling party hears a special dial tone. 3. Dial the AUTHORIZATION CODE [A-20]. a.) The connection is established when the AUTHORIZATION CODE [A-20] is valid. b.) Busy tone is sent to the calling party when the AUTHORIZATION CODE [A-20] is invalid. Service Conditions 1. The outside calling party must be able to generate DTMF signals to the NEAX2400 IPX when entering AUTHORIZATION CODE [A-20]. 2. An AUTHORIZATION CODE [A-20] can be used for incoming calls to a uniform station or for LEAST- COST ROUTING [L-5] tandem connections. 3. CALL WAITING - TERMINATING [C-12] is available when the called station is busy, after the AUTHORIZATION CODE [A-20] is entered and validated. 4. INTER-OFFICE OFF-HOOK QUEUING [I-11] is available if the called route is busy, after the AUTHORIZATION CODE is entered and validated. 5. Through programming, the system defines the AUTHORIZATION CODE [A-20] to be required for all TIE Line incoming calls or when a restriction is encountered. This is assigned on a per-tenant basis. Note:There are two methods of AUTHORIZATION CODE assignment - Full Implementation and the Checksum. In the Full Implementation method, the whole AUTHORIZATION CODE is assigned in the AATC command, and System Data 1, Indexes 12, 13,& 14 are assigned 00H. In the Checksum method, partial assignment for each AUTHORIZATION CODE is assigned in the AATC command. The last one or two digits (programmable option) are determined by the system according to the data assignments in ASYD, System Data 1, Indexes 12, 13, and 14. Interactions 1. If FORCED ACCOUNT CODES [F-7] are used, AUTHORIZATION CODES-TIE LINE INCOMING ROUTES are not allowed within the same tenant. 2. AUTHORIZATION CODES-TIE LINE INCOMING ROUTES may be used in conjunction with ACCOUNT CODES [A-18]. 3. When assigning an AUTHORIZATION CODE Restriction of 1 in AATC, the RSC must be constructed in ARSC. 4. AUTHORIZATION CODEs can be unrestricted or assigned one of 15 Route Restriction Classes. 5. There are no restrictions regarding the first digit of AUTHORIZATION CODEs, except what is programmed in AMND. Tenant 0 does not conflict with the PBX numbering plan. Note:The access code to the feature AUTHORIZATION CODE - TIE LINE INCOMING ROUTES must be assigned within the PBX numbering plan.