Home > NEC > Communications System > NEC Neax 2400 Ipx Feature Programming Manual

NEC Neax 2400 Ipx Feature Programming Manual

    Download as PDF Print this page Share this page

    Have a look at the manual NEC Neax 2400 Ipx Feature Programming Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1168 NEC manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 1089
    							NEAX2400 IPX Feature Programming ManualPage 28NDA-24297, Issue 1
    A-19 Attendant Night Transfer
    Service Conditions (cont’d)
    12. Programmed Night Stations can use CALL HOLD [C-6], CALL TRANSFER [C-10, 11] and THREE-
    WAY CALLING [T-2], provided these features are programmed into the CLASS OF SERVICE -
    INDIVIDUAL [C-15].
    13. Operator calls after Consultation Hold is not transferred to the Night Station.
    14. Individual Attendant calls are not transferred to the Night Station assigned by ATTENDANT NIGHT
    TRANSFER.
    15. The Night Station can set CALL FORWARDING - ALL CALLS - OUTSIDE [C-28], CALL
    FORWARDING - BUSY LINE - OUTSIDE [C-60], and CALL FORWARDING - DONT ANSWER -
    OUTSIDE [C-74].
    16. When a DIT call terminates to a station that has set CALL FORWARDING - ALL CALLS [C-5] to
    Attendant, the call will be forwarded to a Night Station assigned by this service.
    17. In case a station places an incoming call on hold and calls an Attendant, this service is not activated and
    the station receives reorder tone (including CALL FORWARDING - ALL CALLS [C-5] and CALL
    FORWARDING - BUSY LINE [C-2]).
    18. An incoming call is transferred to a station in the same node that accommodates the calling station/trunk
    in the FCCS network.
    19. A telephone number cannot be used (must be Physical Station Number).
    Interactions
    1. There can be only one ATTENDANT NIGHT TRANSFER station per tenant.
    2. The ATTENDANT NIGHT TRANSFER telephone number must be programmed using the
    MAINTENANCE ADMINISTRATION TERMINAL [M-18] (MAT). This telephone number may be the
    same number as the NIGHT CONNECTION-FIXED/FLEXIBLE [N-1, N-2] number, but each must be
    individually assigned. PRIORITY CALL [P-9] and OFF-HOOK ALARM [O-6] calls cannot be answered
    by the ATTENDANT NIGHT TRANSFER station.
    3. Stations CALL FORWARDING [C-2,3,5] calls to the operator (dial 0) will be directed to the
    ATTENDANT NIGHT TRANSFER station.
    4. CALL WAITING [C-12]: This feature cannot be activated at the ATTENDANT NIGHT TRANSFER
    station for operator directed (dial 0) calls.
    5. STATION HUNTING [S-7,8,9]: If the ATTENDANT NIGHT TRANSFER station is in a station hunting
    group and all stations in the group are busy, the call will wait in queue at the ATTENDANT NIGHT
    TRANSFER station and will be answered by the first available station in the hunt group.
    6. A telephone number cannot be used (must be Physical Station Number).
    Programming
    STEP 1:ASID- Assign the Tenant, Group Number (GN) 1-7, and Function (F) = 3, ATTENDANT NIGHT
    TRANSFER. Assign the point of destination as a station, and assign the station number.
    STEP 2:ASGD- Assignment is not required. All stations in the tenant group will be affected. 
    						
    							NEAX2400 IPX Feature Programming Manual
    NDA-24297, Issue 1Page 29
    Authorization Code A-20
    A-20 Authorization Code
    General Description
    An AUTHORIZATION CODE is a numerical code dialed by users (up to 10 digits), which will override the station
    CLASS OF SERVICE - INDIVIDUAL [C-15] for facility access restriction.
    The AUTHORIZATION CODE can be masked on the D
    termdisplay if necessary using the AUTHORIZATION
    CODE DISPLAY ELIMINATION [A-99].
    When a wrong code is received from a station/trunk, detailed information on the unauthorized user is output as
    System Message [26-M]. This message is Toll Fraud Report.
    Operating Procedure
    There are two procedures for entering an AUTHORIZATION CODE in the system database. One of the following
    choices will be employed:
    Procedure 1
    Without an ACCOUNT CODE [A-18]:
    1. Lift the handset and receive dial tone.
    2. Enter the feature Access Code and receive service set tone.
    3. Enter the AUTHORIZATION CODE (up to 10 digits).
    4. Receive dial tone.
    5. Enter the number to be called.
    Note:The feature access code for AUTHORIZATION CODE will be a maximum of three digits.
    With an ACCOUNT CODE [A-18]:
    1. Lift the handset and receive dial tone.
    2. Enter the feature Access Code and receive service set tone.
    3. Enter the AUTHORIZATION CODE and receive second service set tone.
    4. Enter the ACCOUNT CODE [A-18] and receive dial tone.
    5. Enter the number to be called.
    Procedure 2 (only for LEAST COST ROUTING [L-5] calls)
    Without an ACCOUNT CODE [A-18]:
    1. Lift the handset and receive dial tone.
    2. Enter the number to be called.
    3. If an AUTHORIZATION CODE is required, the caller will receive special dial tone.
    4. If special dial tone is received, enter the AUTHORIZATION CODE (up to 10 digits) or the call is denied.
    With an ACCOUNT CODE [A-18]:
    1. Lift the handset and receive dial tone.
    2. Enter the feature access code for the ACCOUNT CODE [A-18] and receive service set tone.
    3. Enter the ACCOUNT CODE [A-18] and receive dial tone.
    4. Enter the number to be called.
    5. If AUTHORIZATION CODE is required, the caller will receive special dial tone.
    6. If special dial tone is received, enter AUTHORIZATION CODE (up to 10 digits) or the call is denied.
    Note:The feature access code for ACCOUNT CODE will be a maximum of three digits. 
    						
    							NEAX2400 IPX Feature Programming ManualPage 30NDA-24297, Issue 1
    A-20 Authorization Code
    Service Conditions
    1. A maximum of 10 digits for AUTHORIZATION CODE can be dialed, and 8 digits will be registered on
    STATION MESSAGE DETAIL RECORDING [S-10].
    2. The maximum number of AUTHORIZATION CODES is 4,000. This number is dependent upon system
    configuration.
    These specifications are based on the digits being assigned as follows:
    1st digit: A (when A equals a unique digit from 0 - 9)
    2nd digit: B - C (when b, c equal any two unique digits from 0 - 9)
    3rd digit: D-E (when d, e equal any two unique digits from 0 - 9)
    4th digit: F-G-H (when f, g, h equal any three unique digits from 0 - 9)
    5th - 8th digits: Any combination 0 - 9
    9th & 10th digits: Assigned using the checksum. These are for validation purposes only.
    See ETI: 091 for more details.
    Note:See ETI: 082 for details on AUTHORIZATION CODE/FORCED ACCOUNT CODE [F-7] assignment.
    3. Service set tone is common to AUTHORIZATION CODE, ACCOUNT CODE [A-18] and FORCED
    ACCOUNT CODE [F-7], but can be eliminated by system data as required.
    4. AUTHORIZATION CODE and FORCED ACCOUNT CODE [F-7] cannot be provided simultaneously
    for the same tenant group. System data determines, on a per-tenant basis, whether AUTHORIZATION
    CODE or FORCED ACCOUNT CODE [F-7] is used.
    5. AUTHORIZATION CODE dialing (Procedure 1) is also effective with CONSULTATION HOLD [C-
    17]. Special dial tone is received instead of dial tone after AUTHORIZATION CODE.
    6. Procedure 2 is effective only for LEAST-COST ROUTING - 3/6-DIGIT [L-5] calls.
    7. Stations must be assigned for Procedure 1 and 2 via CLASS OF SERVICE - INDIVIDUAL [C-5]
    programming in system data.
    8. In Procedure 1, system data can determine, on a per-tenant basis, whether or not an ACCOUNT CODE
    [A-18] follows the AUTHORIZATION CODE.
    9. Assigned AUTHORIZATION CODES can be used for the REMOTE ACCESS TO SYSTEM [R-2]
    function.
    10. OG TRUNK QUEUING [O-2] and OFF-HOOK QUEUING [O-7] can be set according to the Service
    Feature Class of the user’s AUTHORIZATION CODE.
    11. AUTHORIZATION CODE can be recorded in the STATION MESSAGE DETAIL RECORDING [S-10]
    for Procedure 2.
    12. The registered/non-registered condition of the AUTHORIZATION CODE is not included in the
    information block of Condition B on the SMDR output format.
    13. Attendant cannot activate this feature by Procedure 1.
    14. When the user goes on-hook or hooking, changed class goes back to normal class.
    15. See Service Conditions for the AUTHORIZATION CODE DISPLAY ELIMINATION[A-99].
    Interactions
    1. If FORCED ACCOUNT CODES [F-7] are used, AUTHORIZATION CODES are not used within the
    same tenant.
    2. AUTHORIZATION CODES may be used in conjunction with ACCOUNT CODES [A-18].
    3. When assigning an AUTHORIZATION CODE Restriction of 1 in AATC, the RSC must be constructed
    in ARSC.
    4. AUTHORIZATION CODES can be unrestricted or assigned one of 15 Route Restriction Classes. 
    						
    							NEAX2400 IPX Feature Programming Manual
    NDA-24297, Issue 1Page 31
    Authorization Code A-20
    Interactions (cont’d)
    5. There are no restrictions regarding the first digit of AUTHORIZATION CODES, except what is
    programmed in AMND. Tenant 0 does not conflict with the PBX numbering plan. This is true when
    separate tenant tables are provided. If common tenant tables are used, a conflict between LCR(S) and
    OGC(A), used with SMDR, will occur.
    Note:The access code to the service feature AUTHORIZATION CODE must be assigned within the PBX
    numbering plan.
    6. If ASPA, SRV = LCR (Least Cost Route Selection) / LCRS (Register Sender LCR) AH parameter is
    assigned as data“1”, the request for an AUTHORIZATION CODE is determined by the ARSC
    assignment of the station in relationship to the chosen route.
    7. When a D
    termuser initiates the LAST NUMBER DIALED [L-6D] feature, the AUTHORIZATION
    CODE will be recorded if previously dialed.
    8. The AMND command determines the length of AUTHORIZATION CODES, based on the first digit of
    the code.
    9. AUTHORIZATION CODES are recorded by STATION MESSAGE DETAIL RECORDING [S-10],
    Procedure 2.
    10. AUTHORIZATION CODES cannot be entered by the Attendant Console.
    11. PEG COUNTS [P-7] of invalid AUTHORIZATION CODES are not available.
    12. AUTHORIZATION CODES can be dialed by a user when establishing a CONSULTATION HOLD [C-
    17] connection.
    13. For Procedure 2, LCR(S) must be provided.
    Programming
    Note:There are two methods of Authorization Code assignment: Full Implementation and the Checksum methods.
    In the Full Implementation method, the whole AUTHORIZATION CODE is assigned in the AATC command
    and SYS1. Indexes 12, 13, & 14 are assigned 00H. In the Checksum method, partial assignment for each
    AUTHORIZATION CODE is assigned in the AATC command. The last one or two digits (programmable
    option) are determined by the system according to the data assignments in ASYD, SYS 1, Indexes 12, 13,
    and 14.
    STEP 1:ASYD- System Data 1, Index 12. If Index 12 = 0, no Checksum method is used, and Indexes 13 and
    14 are ignored, regardless of their assignments. Each Bit in Index 12 directly correlates to a digit in the
    AUTHORIZATION CODE assigned in AATC, and will determine the first digit of the Checksum
    method. For this example, 26428 has been assigned as the AUTHORIZATION CODE in AATC.
    Arbitrarily pick any Bits, 0 - 4, and flag those Bits as data 1.
    Note:Bit 0 - 7 may be used when 8-digit AUTHORIZATION CODES are assigned in the AATC command.
    BIT 4BIT 3BIT 2BIT 1BIT 0
    AATC
    82462
    SYS, IN1201001
    DESIGNATIONd4 d3 d2 d1 d0 
    						
    							NEAX2400 IPX Feature Programming ManualPage 32NDA-24297, Issue 1
    A-20 Authorization Code
    Programming (cont’d)
    System Data 1, Index 13. Each Bit in Index 13 directly correlates to a digit in the AUTHORIZATION
    CODE assigned in AATC, and will determine the second digit of the Checksum method. Pick any Bits
    0 - 4, but not the same combination of Bits as picked in Index 12.
    System Data 1, Index 14 determines the algorithm used to calculate the last two digits of every
    AUTHORIZATION CODE. (Only decimal numbers may be used in this index, therefore, hexadecimal
    values A to F may not be assigned). System Data 1, Index 14 = X & Y, where X and Y represent any
    arbitrarily chosen decimal digit 1- 9, and where Y is used to determine the first digit and X is used to
    determine the second digit in the Checksum method. The following data, 37H, has been used for the
    example calculation:
    Note:If only one digit is to be added via the Checksum method, then Index 13 data will be OOH and Index 14.
    Example Calculation:
    In AATC, 26428 has been assigned. In System Data 1, Index 12, Bits 0 and 3 were chosen; 26428
    2+2=4.
    The decimal value of Bits 0 - 3 of Index 14 = 7.
    4+N=7.N=3
    .
    7 is obtained as any whole number greater than 4 that ends with a 7, the decimal value as determined in
    System Data 1, Index 14, Bits 0 to 3. In AATC, 26428 has been assigned. In System Data 1, Index 13,
    Bits 4 and 1 were chosen; 26428.
    8 + 6 = 14.
    The decimal value of Index 14, Bits 4 - 7 is 3.
    14 + N = 23. N = 9
    .
    23 is obtained as any whole number greater than 14 that ends with a 3, the decimal value determined in
    System Data 1, Index 14, Bits 4 - 7. The AUTHORIZATION CODE will be 26428-39
    .
    Note:Digits 39 determined by the Checksum method will be unique to the AUTHORIZATION CODE 26428.
    26428 will not be followed by any digits other than 39.
    ASYD- System Data 1, Index 43, Bit 2, is service set tone sent after AUTHORIZATION CODE.
    ASPA access code? 0/1: No/Yes. Assign data“1”.
    System Data 1, Index 43, bit 0, is AUTHORIZATION CODE required for DISA? 0/1: required/not
    required. Normally assign data“0.”
    System Data 1, Index 93, Bit 6. Are the AMND tables Separate or Common for tenants in the system?
    0/1: Separate/Common. Assign data“0”for separate tables.
    System Data 2, Index 3, Bit 4: Is Account Code used with AUTHORIZATION CODE? 0/1: No/Yes.
    System Data 2, Index 3, Bit 5: Type of code? 0/1: AUTHORIZATION CODE/ Forced Account Code;
    assign data“0”.
    BIT 4BIT 3BIT 2BIT 1BIT 0
    AATC
    82462
    SYS1, IN1310010
    DESIGNATIONd4 d3 d2 d1 d0
    SYS1, INDEX 
    14XY
    BIT 76543210
    DATA
    00110111 
    						
    							NEAX2400 IPX Feature Programming Manual
    NDA-24297, Issue 1Page 33
    Authorization Code A-20
    Programming (cont’d)
    STEP 2:ANPD- Reserve a number level for feature access. Assign for Normal (N), Hooking (H), and Busy
    (B) (if applicable to any feature in this level). Assign NND in accordance with a predetermined
    numbering plan.
    STEP 3:ASPA- For SRV = SSC (Service Code), SID = 42, assign the access code. For the NND parameter, no
    assignment is required when AUTHORIZATION CODE operates by itself. When Account Code
    operates with AUTHORIZATION CODE, assign for SRV = SSC (Service Code), SID = 42. The NND
    value will include the number of digits in the AUTHORIZATION CODE access code, and Account
    Code. For example:
    45–26428–623423–9-1-617-555-2323
    (ACC) (Auth Code) (Account Code) (Destination Code)
    ASPA ACC=45 NND=8 (ACC + Account Code)
    ASPA- For SRV = LCR (Least Cost Route Selection) / LCRS (Register Sender LCR), if operating
    Procedure 2 is to be used, (dialing the AUTHORIZATION CODE after the number dialed), then
    assign data“1”to the AH parameter when programming the LCR(S) access code. Therefore, operating
    Procedure 2 is only available with LEAST-COST ROUTING - 3/6 DIGIT [L-5].
    STEP 4:ASFC- For stations allowed AUTHORIZATION CODE, assign a Class of Service that allows SFI
    27.
    STEP 5:AMND- For Tenant 0, assign the Destination Code (DC) as the first digit of all AUTHORIZATION
    CODES and the Maximum Necessary Digits (MND) of the AUTHORIZATION CODE. For the above
    example, a DC of 2 is assigned with an MND of 7. The MND value will include the digits added by the
    Checksum method.
    STEP 6:AATC- Assign the TN, Digit Code (DC) (the actual code itself), the AUTHORIZATION CODE
    RESTRICTION (ACR) as data“1”and Service Feature Class (SFC) and Route Restriction Class
    (RSC). If ACR is assigned as data 2. Allowed: RSC and SFC parameters are not programmed. (SFC
    parameters are not operational.)
    STEP 7:LATC- List up all the AUTHORIZATION CODES. This is the simplest way to determine what digits
    have been added to the system with the Checksum method. This is not required if the Checksum
    method is not used.
    FCCS Programming 
    This data setting describes only the additional or replacement commands used to activate FCCS
    services. When used as an FCCS feature, these commands replace the non-network commands (for
    example, AAED is replaced by AAEDN). Note that the data setting for FCCS service varies depending
    on the node.
    Note
    STEP 1:ANPDL- Reserve a number level for feature access. Assign for Normal (N), Hooking (H), and Busy
    (B) (if applicable to any feature in this level). Assign NND in accordance with a predetermined
    numbering plan.
    STEP 2:ASPAL- For SRV = SSC (Service Code), SID = 42, assign the access code. For the NND parameter,
    no assignment is required when AUTHORIZATION CODE operates by itself. When Account Code
    operates with AUTHORIZATION CODE, assign for SRV = SSC (Service Code), SID = 42. The NND
    value will include the number of digits in the AUTHORIZATION CODE access code, and Account
    Code.
    For SRV = LCR (Least Cost Route Selection) / LCRS (Register Sender LCR), if operating Procedure 2
    is to be used, (dialing the AUTHORIZATION CODE after the number dialed), then assign data“1”to
    the AH parameter when programming the LCR(S) access code. Therefore, operating Procedure 2 is
    only available with LEAST-COST ROUTING - 3/6 DIGIT [L-5]. 
    						
    							NEAX2400 IPX Feature Programming ManualPage 34NDA-24297, Issue 1
    A-20 Authorization Code
    FCCS Programming (cont’d)
    STEP 3:LATCL- List up all the AUTHORIZATION CODES. This is the simplest way to determine what
    digits have been added to the system with the Checksum method. This is not required if the Checksum
    method is not used.
    Note:When using ASYDL or ASYDN to program an FCCS feature, the basic programming of ASYD is required
    in addition to ASYDL or ASYDN. 
    						
    							NEAX2400 IPX Feature Programming Manual
    NDA-24297, Issue 1Page 35
    Automatic Trunk Test A-21
    A-21  Automatic Trunk Test
    General Description
    The AUTOMATIC TRUNK TEST capability provides a functional test on a large number of trunks at a prearranged
    time. The results of the test are reported at the MAINTENANCE ADMINISTRATION TERMINAL (MAT) [M-
    18]. The test can include: Ringback Tone Test, 1 KHz Test Tone and Trunk Selection Test, by having the proper test
    trunk termination at the distant office.
    Operating Procedure
    Input the route and trunk number to be tested by using the TTLC command
    1. Input the TTLC and ATTD command.
    2. The system will prompt for either Immediate or Scheduled Execution of this feature. If Scheduled
    execution is chosen, the time when the test begins is entered via the MAT.
    3. The system will ask for the route number to be tested as RT on CRT.
    4. Input a route number from 1 - 255.
    5. The system will ask for the trunk number(s) to be tested as TK on CRT.
    6. Input the trunk number from 1 through 255. Input the trunk number(s) to be tested as the test goes from
    TRK NUMBER to TRK NUMBER.
    7. The system will execute the trunk test based on the data input above. Test results will be printed out after
    all trunks have been tested.
    Service Conditions
    1. Additional hardware required consists of one LTST (PH-M16) card, one 8TLT card, and one line circuit
    and LTST cable.
    2. Trunks are tested in conjunction with the connecting office through the selected trunk, on a one-at-a-time
    basis. The following different trunk functions can be tested on all trunks in a specified group:
    a.) trunk selection,
    b.) detection of ringback tone sent back from the connecting office after test number outpulsing,
    c.) detection of test tone (1 kHz) returned from AUTOMATIC TRUNK TEST facility if provided at
    the connecting office.
    3. As part of the AUTOMATIC TRUNK TEST facility, an AUTOMATIC TRUNK TEST is provided at the
    NEAX2400 IPX to answer incoming test calls. Upon terminating the incoming test call from the
    originating office through a selected test trunk, the AUTOMATIC TRUNK TEST generates a 1 kHz tone
    to the originating office as an acknowledgment signal.
    4. If scheduled execution is chosen, the time when the test begins is entered via the MAT. The MAT is
    dedicated to the AUTOMATIC TRUNK TEST function from the time the test is ordered until the
    completion of the test.
    Interactions
    1. A four-wire TIE Line must be provided with the AUTOMATIC TRUNK TEST. See TIE LINE ACCESS
    [T-3]for details of the required programming.
    2. The test station must be located in the same LP as the PH-LTST circuit card. 
    						
    							NEAX2400 IPX Feature Programming ManualPage 36NDA-24297, Issue 1
    A-21 Automatic Trunk Test
    Programming
    STEP 1:ANPD- Reserve a number level for service feature access. Assign for Normal (N), Assign NND in
    accordance with a predetermined numbering plan.
    STEP 2:ASPA- The access code for INDIVIDUAL TRUNK ACCESS must be assigned, SID = 17. Assign
    Connection Index, CI = (N) Normal. NND is assigned in accordance with a predetermined numbering
    plan.
    STEP 3:ARSC- A Route Restriction Class (RSC) must be constructed to meet the requirements of the ATT.
    These requirements are to allow all outgoing and both way routes*.
    STEP 4:ASFC- A Service Feature Class (SFC) must be constructed to allow SFI 39, Individual Trunk
    Selection.
    STEP 5:ASDT- A Test Station must be assigned using the RSC and SFC previously constructed. This station
    will be a TEC = 3.
    STEP 6:ATTD- Assignment of Trunk Test Data is used to order the ATT.
    STEP 7:TTLC- This command will designate the Start route and the End route and trunk numbers. It will be
    these trunks that will be tested. Assign the following:
    TEST: TEST TYPE
    1. IMMEDIATE EXECUTION
    2. SCHEDULE EXECUTION
    RT: [a] TO [b]: Route Range
    a: Start Route Number
    b: Last Route Number
    TK: [c] TO [d]: Trunk Range
    c: Start Trunk Number
    d: Last Trunk Number
    RESULT:[e] - [f]:Tested Route & Trunk
    e: RT at end of test
    f: TK at end of test
    START TIME: 15:10
    PRESENT TIME: 15:13
    Note:Routes that are used as incoming only, such as DDD or DIT, should be programmed as bothway. Allow only
    the RSC of the Test station access to these routes on an outgoing basis for test purposes only. 
    						
    							NEAX2400 IPX Feature Programming Manual
    NDA-24297, Issue 1Page 37
    Authorization Code - Tie Line Incoming Routes A-29
    A-29  Authorization Code - Tie Line Incoming Routes
    General Description
    This service feature offers an outside party the ability to enter an AUTHORIZATION CODE [A- 20] through an
    incoming TIE Line trunk.
    Operating Procedure
    When the incoming route is restricted or when an AUTHORIZATION CODE [A-20] is always required
    1. The called number, office code, and terminal number are received by the TIE Line trunk.
    2. The outside calling party hears a special dial tone.
    3. Dial the AUTHORIZATION CODE [A-20].
    a.) The connection is established when the AUTHORIZATION CODE [A-20] is valid.
    b.) Busy tone is sent to the calling party when the AUTHORIZATION CODE [A-20] is invalid.
    Service Conditions
    1. The outside calling party must be able to generate DTMF signals to the NEAX2400 IPX when entering
    AUTHORIZATION CODE [A-20].
    2. An AUTHORIZATION CODE [A-20] can be used for incoming calls to a uniform station or for LEAST-
    COST ROUTING [L-5] tandem connections.
    3. CALL WAITING - TERMINATING [C-12] is available when the called station is busy, after the
    AUTHORIZATION CODE [A-20] is entered and validated.
    4. INTER-OFFICE OFF-HOOK QUEUING [I-11] is available if the called route is busy, after the
    AUTHORIZATION CODE is entered and validated.
    5. Through programming, the system defines the AUTHORIZATION CODE [A-20] to be required for all
    TIE Line incoming calls or when a restriction is encountered. This is assigned on a per-tenant basis.
    Note:There are two methods of AUTHORIZATION CODE assignment - Full Implementation and the Checksum.
    In the Full Implementation method, the whole AUTHORIZATION CODE is assigned in the AATC
    command, and System Data 1, Indexes 12, 13,& 14 are assigned 00H. In the Checksum method, partial
    assignment for each AUTHORIZATION CODE is assigned in the AATC command. The last one or two
    digits (programmable option) are determined by the system according to the data assignments in ASYD,
    System Data 1, Indexes 12, 13, and 14.
    Interactions
    1. If FORCED ACCOUNT CODES [F-7] are used, AUTHORIZATION CODES-TIE LINE INCOMING
    ROUTES are not allowed within the same tenant.
    2. AUTHORIZATION CODES-TIE LINE INCOMING ROUTES may be used in conjunction with
    ACCOUNT CODES [A-18].
    3. When assigning an AUTHORIZATION CODE Restriction of 1 in AATC, the RSC must be constructed
    in ARSC.
    4. AUTHORIZATION CODEs can be unrestricted or assigned one of 15 Route Restriction Classes.
    5. There are no restrictions regarding the first digit of AUTHORIZATION CODEs, except what is
    programmed in AMND. Tenant 0 does not conflict with the PBX numbering plan.
    Note:The access code to the feature AUTHORIZATION CODE - TIE LINE INCOMING ROUTES must be
    assigned within the PBX numbering plan. 
    						
    All NEC manuals Comments (0)

    Related Manuals for NEC Neax 2400 Ipx Feature Programming Manual