Home
>
Toshiba
>
Telephone
>
Toshiba Perception E Ex Digital Pbx Installation And Maintenance Manual
Toshiba Perception E Ex Digital Pbx Installation And Maintenance Manual
Here you can view all the pages of manual Toshiba Perception E Ex Digital Pbx Installation And Maintenance Manual. The Toshiba manuals for Telephone are available online for free. You can easily download all the documents as PDF.
Page 121
CHAPTER 3 DATA INPUT/OUTPUT PROCEDURES 1. General 1.01 Prior to actual system programming, cus- tomer data is recorded on special System Record Sheets which correspond with the prompts outlined in the data block tables contained in this manual (see Appendix 1). Afterthese sheets arecompleted and after the PERCEPTION, or PERCEPTlONe, system is connected to the data terminal (see Chapter 2), data can be entered into the system via the Data Input Utility Programs. Once the informa- tion is...
Page 122
t-cays- PROGRAMMINGPROCEDURES SECTION 200-255-303 --: 7-w I( JANUARY1993 ., ~~ .,@23 -I&L -7. c. TABLE3-1 UTILITYPROGRAMREFERENCEGUIDE DATAINPUTANDOUTPUTPROCEDURES TABLE 1 NAME I MNEM.I PAGE 11-2 1 Print DDIU DB I PDIU 11-6 11-3 I Modem Poolina DB I DMDMI 1 l-8 I Print Modem Poolina DB I PMDMI 11-9 .:.12-l p Least Cost Routing DB DLC 1 12-1 12i;2 - &east Cost Routine DB 1 IDLCl 1 12-3 I26 - &east Cost Routing DB 2 1 DLC2 12-8 - 12-7 1 Print Least Cost Routing DB 1 PLCR I 12-l 3...
Page 123
PRQGRAMMING PROCEDURES SECTION 200-255-304 FEBRUARY 1992 CHAPTER 4 AUTHORIZATION PROCEDURES/UTILITY PROGRAM USE 1. Authorization Procedure 1 .Ol Before any Utility Program can be called up, PERCEPTlONe and PERCEPTlONe, systems require an authorization code to be entered. This prevents unauthorized tampering with the Cus- tomer Database. 1.02 There are four levels of authorization (each of which has a unique 4-digit code that is assigned in the system memory). Each authorization level al-...
Page 124
PROGRAMMINGPROCEDURES SECTION 200-255-304 FEBRUARY1992 5. Execution of Authorization Procedure 5.01 To perform the Authorization Procedure: 1) 2) 3) Plug in and power up the data terminal. The system will respond with a copyright and then greater than sign (>). Press the carriage return [9 key. l The system will respond by printing COD and will print several characters in the spaces to be occupied by your next entry (this is done to mask the authorization code). This masking measure is...
Page 125
CHAPTER 5 SYSTEM DATA 1. Authorization Code Change (Table 5-1) 1 .Ol The DCHG Program changes the authoriza- tion codes which are used in the Authorization Procedure. 2. 1.02 To use the DCHG Program: Complete the Authorization Procedure (Level 1 or 2). Enter: Enter: DCHGm (in response to the OK prompt). The next prompt will be: LiXXXX (Level 1 au- thorization code). (XXXX = present code.) New L2 code (4 digits) q . j L3XXXX (Level 3 authorization code). Enter: (XXXX = present code.)...
Page 126
PROGRAMMINGPROCEDURES SECTION 200-255-305 JANUARY1993 2. System Data Block (Table 5-2) 2.01 The System Data Block (DSYS Program) contains miscellaneous data entries that apply to the system as a whole rather than to any individual station or trunk. Data is entered as follows: REQ (Request)-Indicates that the program has loaded. Since data is always present, only the CHG response is possible. EXP (Expansion Cabinet)-Indicates whether or not an expansion cabinet is installed. Enter: Y: if an...
Page 127
PROGRAMMING PROCEDURES SECTION 200-255-305 JANUARY 1993 AAT (Not Used): Enter: m. APX (Not Used): Enter: (9. LNl (Listed Directory Number #l)-Defines the LDN #l , which is used with the DID feature when routing a call to the attendant console (maxi- mum: 4 digits). Enter: 1, 2, 3, or 4 digits or NONE. LN2 (Listed Directory Number #2-Defines the LDN #2, which is used with the DID feature when routing a call to the attendant console (maxi- mum: 4 digits). Enter: 1, 2, 3, or 4 digits or...
Page 128
PROGRAMMING PROCEDURES SECTION 200-255-305 JANUARY 1993 ACC# (# Access Code)-Defines the digit that is that are released due to the DPT timer will hear to be used by a rotary dial telephone in place of overflow tone. This timeout is used with the line the 1 button. lockout feature. Enter: 1 digit or NONE. Enter: Time in seconds. NOTE: AAC# must not conflict with either the DN or other access codes-it is not checked by the software. NOTES: 1. The Dial Pause Timeout also controls the release of...
Page 129
PROGRAMMINGPROCEDURES SECTION 200-255-305 FEBRUARY1992 account code that has not been entered before or during the call. Enter: Time in seconds (0 M 255). HFS (Handsfree Answerback Station)-A ‘Y” response allows calls from any station to voice- announce to an electronic/digital telephone that is equipped with Handsfree Answerback. Enter: Y or N. HFA (Handsfree AnswerbackAttendant)-A Y” response allows calls from the attendant to voice- announce to an electronic/digital telephone that is...
Page 130
PROGRAMMING PROCEDURES SECTION 200-255-305 FEBRUARY 1992 TABLE 5-2 Procedure - System Data Block Authorization Procedure must be completed. If an OK response is received, proceed as follows: Meet-me Page Access Code Remote Access DN Remote Access to Services Change Code “*‘I Access Code ‘W Access Code Camp-on (or CWT) Timeout Ring No Answer Timeout REM RAC ACC* ACC# COT RNA 1 - 4 digits or NONE (NONE) 1 - 3 digits (#*2) 1 digit or NONE (NONE) 1 digit or NONE (NONE) 0 - 255 seconds...