Nortel Modular Ics 6.0 Installer Guide
Have a look at the manual Nortel Modular Ics 6.0 Installer Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 211 Nortel manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Private networking using PRI SL-1 / 141 P0992638 03Modular ICS 6. 0 Installer Guide The diagram below shows how TAT reduces the line requirements. The solid line shows Telephone A calling Telephone B and being transferred over an additional PRI line to Telephone C. With TAT active, the same call is transferred to Telephone C over the same PRI line. Call paths with and without TAT MCDN voice mail/auto attendant call features Besides the general MCDN features described in MCDN trunk call features on page 133, an MCDN connection with a Meridian 1 with attached voice mail system, also provides some special call features, as described below. Note: Although these features have the same functions as Camp-on and Priority calls within each Norstar system, MCDN camp-on and break-in from M1 can access all network telephones connected to the centralized voice mail system. MCDN Meridian 1 attendant MCDN features Meridian attendant featurescamp-on break-in Norstar Te l e p h o n e A Te l e p h o n e B Te l e p h o n e C For warded call (using TAT) For warded call (no TAT) Norstar
142 / Private networking using PRI SL-1 Modular ICS 6.0 Installer GuideP0992638 03 To all Norstar systems on the private network, the centralized voice mail system is viewed as an external call by each system, even though the dialing plan configurations makes it seem like callers are making local calls. Camp-on A call received by the Meridian attendant can be assigned to a telephone anywhere in the MCDN network, when the following situations are valid: the target telephone rings busy when the attendant calls no free keys on target telephone DND regular feature is inactive DND on busy feature is inactive The target user sees that there is a call camped on the telephone. The called user can then clear a busy lines and take the call, or the user can choose to reject the call, using F814, or the user can indicate Do Not Disturb, using F85. The diagram below demonstrates the call path for a Meridian attendant to camp a call on a telephone in the Norstar system.
Private networking using PRI SL-1 / 143 P0992638 03Modular ICS 6. 0 Installer Guide Camping a call on a network telephone Break-in The Meridian attendant can break into an on-going call from a telephone in the Norstar system, if these situations are valid: Target Norstar telephone is busy but still has a free intercom or line key. DND busy is turned on, although the attendant can override a busy signal, if it is turned off, by pressing the BKI key. Prime set also should be busy, with no free key, and with DND turned on. Attendant capability is high (2), and higher than either the target telephone or the caller the target telephone owner is busy with. A warning tone occurs for both parties on the call before the actual break-in occurs. Norstar Meridian-based central attendant Te l e p h o n e A (rings busy)Attendant Call forwarded and camped on Te l e p h o n e A Line XXX Waiting Incoming call for Telephone AMeridian 1
144 / Private networking using PRI SL-1 Modular ICS 6.0 Installer GuideP0992638 03 The diagram below demonstrates the call path for a Meridian attendant to break into a call between telephones in the Norstar system. Breaking into a Norstar call path Break-in can be accomplished using two methods: Pre-dial BKI: 1. Attendant presses BKI button on telephone. 2. Attendant dials the destination number. 3. On receiving a busy signal, the Attendant presses BKI again. The attendant is given access to the conversation. Post-dial BKI: Attendant: 1. Attendant dials destination number. 2. If a camp-on or busy tone is heard, the attendant presses the BKI button on the telephone. The attendant is given access to the conversation. NorstarMeridian 1 Te l e p h o n e A (rings busy) Attendant Incoming call for Telephone ATe l e p h o n e B Break-in path
Private networking using PRI SL-1 / 145 P0992638 03Modular ICS 6. 0 Installer Guide You can set a level of priority that will determine if a telephone will allow an attendant to break in. This is referred to as setting the Intrusion level. How the intrusion hierarchy works: Break-in allowed if Attendant telephone is High and caller telephone is Medium. Break-in is not allowed if Attendant telephone is Medium and caller telephone is high. Set the Intrusion level for each telephone under Capabilities. 1. At Terminals&Sets, press ≠ and enter the DN number for the telephone to which you want to add intrusion levels. The telephone displays : or . 2. Press ≠. The display shows Line Access. 3. Press ‘ until you reach Capabilities. 4. Press ≠. The display shows Fwd no answer. 5. Press ‘ until you reach Intrusion. 6. Press ≠. The display shows Protect lvl. 7. Press CHANGE to select None, Low, Med, or High.
146 / Private networking using PRI SL-1 Modular ICS 6.0 Installer Guide P0992638 03 Central voice mail and Auto Attendant with Norstar You can use Norstar voice mail (NVM) and Auto Attendant running on a Norstar Application module (NAM) platform as the central voice mail/auto attendant node for your MCDN network. However, this configuration does not allow centralized camp-on or break-in, since these are Meridian- voice-mail-based features. Using NVM requires that all nodes on the network are set up with the CDP dialing rules. You can have a maximum of 10 nodes on a Norstar-based network if you use all three DTI cartridges. Note: Ensure you have the latest version of NVM if you want to set up this type of centralized system. Configuring centralized voice mail System configuration for centralized voice mail depends on where the NAM is connected. The system with the NAM is configured using the voicemail DN and a target line. The systems that are remote to the NAM are configured through the Telco features sections. Installation instructions about installing Norstar voice mail as a centralized voice mail system, are explained in the addendum titled: Installing Norstar Voice Mail as a Centralized Voice Mail System . This addendum includes details about voice mail configuration as well as the Norstar M odular I C S con figu ration that is included in the following sections.
Private networking using PRI SL-1 / 147 P0992638 03Modular ICS 6. 0 Installer Guide Local system To set up the local system, you need to assign a target line to the DN for the voice mail system, then enter that DN into the target line record. 1. After you enter your password, at the Terminals&Sets prompt, press ≠. The prompt displays: Show set: 2. Enter the DN number for the voice mail system. 3. Press ≠. The prompt displays Line access. 4. Press ≠. The prompt displays Line assignment. 5. Enter the target line number for your voice mail system. 6. Press CHANGE to change the setting for each line to one of the following: Unassigned, Ring only, Appr&Ring, and Appr only. 7. Press – until you reach the top level, then press ‘. The prompt displays Lines. 8. Press ≠. The prompt displays Show line. 9. Enter the target line number you entered in step 5. 10. Press ≠. The prompt displays Trunk/line data. 11. Press ≠. The prompt displays Line Type. 12. Press ‘. The prompt displays Rec'd #. 13. Enter the DN for the voice mail system. 14. Exit programming.
148 / Private networking using PRI SL-1 Modular ICS 6.0 Installer GuideP0992638 03 Remote system On the nodes that are not directly connected to the central voice mail system, you need to use the Telco Features headings to identify the route to the voice mail system. 1. After you enter your password, press ‘ until the prompt displays Telco Features: 2. Press ≠. The prompt displays VMsg Center tel#s. 3. Press ≠. The prompt displays VMsg Center 1. 4. Press ≠. The prompt displays Use:. 5. Press CHANGE to until you reach Routing tbl. 6. Press ‘. The prompt displays Tel #:. 7. Enter the number to access the external voice mail system. Set Telco features for the VM DN 1. Press – until you reach the top level, then press ‘ until the prompt displays Terminals&Sets. 2. Press ≠. The prompt displays: Show set: 3. Enter the DN for the voice mail system. 4. Press ≠. The prompt displays Line access. 5. Press ‘ until the prompt displays Telco features. 6. Press ≠. The prompt displays Feature Assign. 7. Press ≠. The prompt displays Show line. 8. Enter the line number that connects to the system for the central voice mail system. 9. Press ≠. The prompt displays Caller ID Set.
Private networking using PRI SL-1 / 149 P0992638 03Modular ICS 6. 0 Installer Guide 10. Press ‘ until the prompt displays Extl VMsg set. 11. Press CHANGE to select Y (yes). Set Telco features for the target line 1. Press “ until you reach the top level, then press ‘ until the prompt displays Lines. 2. Press ≠. The prompt displays: Show line: 3. Enter the target line number for the voice mail system. 4. Press ≠. The prompt displays: Trunk/line data: 5. Press ‘ until the prompt displays Telco features. 6. Press ≠. The prompt displays VMsg Center 1. 7. Press ≠. The prompt displays Use:. 8. Press CHANGE to until you reach Routing tbl. 9. Press ‘. The prompt displays Tel #:. 10. Enter the number to access the external voice mail system. 11. Exit programming. Using centralized voice mail If you use NVM, ensure that you provide the correct user cards for system access. Users with telephones connected to the Meridian or Norstar unit on which NVM is installed, use internal voice mail feature codes to use the system (F981, and so on). Users on other nodes of the system, use the remote access codes, which are similar to the codes they would use if the central voice mail system was the Meridian-based system.
150 / Private networking using PRI SL-1 Modular ICS 6.0 Installer GuideP0992638 03 Note: Meridian mail and Norstar voice mail can co-exist on the same Meridian, however, users can only be configured for one of the systems. Configuring Centralized Auto Attendant (CAA) System configuration for centralized Auto Attendant depends on where the NAM is connected. The system with the NAM is configured using the CAA DN and a target line. The systems that are remote to the NAM are configured through the Telco features sections. All nodes must have a unique Private Network Identifier (PNI), which is defined under Dialing Plan. On each node, as well, the PNIs of adjacent nodes are programmed under Hardware. Assigning PNIs 1. After you enter your password, press ‘ until the prompt displays System Prgrming: 2. Press ≠. The prompt displays Hunt groups. 3. Press ‘ until the prompt displays Dialing Plan. 4. Press ≠. The prompt displays Private Network. 5. Press ≠. The prompt displays Type. 6. Press CHANGE to until you reach CDP. 7. Press ‘. The prompt displays PrivNetID. 8. Enter the private network ID for your system.