Home > Toshiba > Communications System > Toshiba Stratagy 4/6/24 Installation And Maintenance Manual

Toshiba Stratagy 4/6/24 Installation And Maintenance Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Toshiba Stratagy 4/6/24 Installation And Maintenance Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 566 Toshiba manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    USERS FORM Copy as needed. 
    User ID: 
    Comment 
    Extension: 
    Dir Name 1: 
    Dir Name 2: 
    Basic Options 
    Chains 
    Maximum Rings: 
    (default is 4) Done: 
    Do Not Disturb: 
    Lock: RNA: 
    Screem Calls? 
    Lock: Busy: 
    Store Messages? Max: set Delay: 
    Copy Messages To: 
    Menus 
    Message Volume: 
    Guests: 1: 
    Curent Greeting: 
    Max: set 4: 
    Busy Message? 
    Max: set 7: 
    ID Call? 
    D/T? Name/Ext? Security Code: 
    Read Only: 
    Groups 
    1: 
    2: 
    3: 
    4: 
    2: 3: 
    5: 6: 
    8: 9: 
    . 
    0: 
    Does this User ID also have: 
    AUTO FORM: YES - NO- 
    NOTIFY FORM: YES - NO- 
    GREETING SCRIPTS FORM: YES - 
    NO- 
    CUSTOMIZATION FORM-1  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    AUTO (SCHEDULING) FORM Copy as needed. 
    User ID 
    Enabled 
    Change On: At : Restrict To: MTWTFSS 
    And Every:- 
    month(s)- day(s) ------- 
    hour(s) - minute(s) Next Change E 
    Extension: 
    Rings: 
    Do Not Disturb: Call Screening: Greeting #: - 
    Enabled Change On: 
    At : Restrict To: MTWTFSS 
    And Every:- 
    month(s)- 
    day(s) ------- 
    hour(s) - minute(s) NexC Change : 
    Extension: 
    Rings: 
    Do Not Disturb: Call Screening: Greeting .#:- 
    Enabled 
    Change On: At : Restrict To: MTWTFSS 
    And Every:- month(s)- 
    day(s) -----__ 
    hour(s) - minute(s) Xext Change : 
    Extension: 
    Rings: 
    Do Not Disturb: Call Screening: Greeting #: - 
    Enabled Change On: At : Restrict To: MTWTFSS 
    And Every:- month(s)- 
    day(s) ------- 
    hour(s) - minute(s) Next 
    Change : 
    Extension: 
    Rings: 
    Do Not Disturb: Call Screening: Greeting #:- 
    Enabled 
    Change On: At : Restrict To: MTWTFSS 
    And Every:- month(s)- 
    day(s) ------- 
    hour(s) - minute(s) :lYexc Chaage : 
    Extension: 
    Rings: 
    Do Not Disturb: Call Screening: Greeting #:- 
    , 
    CUSTOMIZATION FORM-2  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL 
    SEPTEMBER 1994 
    NOTIFY FORM 
    User ID 
    Copy as needed. 
    Enabled M T W T F S s 
    From To 
    Notify After Continue Every 
    Max Times 
    ------_ - - 
    min min 
    Title: 
    Type : Variable: 
    Method: 
    Enabled M T W T F S s 
    From To 
    Notify After Continue Every 
    Max Times 
    ------- - - 
    min min 
    Title: 
    Type : Variable: 
    Method: 
    Enabled 
    MTWTFSS From To 
    Notify After Continue Every Max Times 
    -----__ - - 
    min min 
    Title: 
    Type : Variable: 
    Method: 
    Enabled M T W T F S S 
    From To Notify After Continue Every 
    Max Times 
    ------- - - 
    min min 
    Title: 
    Type : Variable: 
    Method: 
    Enabled 
    MTWTFSS From To 
    Notify After Continue Every 
    Max Times 
    ------_ - - 
    min min 
    Title: 
    Type : Variable: 
    Method: 
    , 
    CUSTOMIZATION FORM-3  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL 
    SEPTEMBER 1994 
    GREETING SCRIPTS FORM 
    User ID 
    Cogy as needed. 
    Greeting 1 
    Greeting 2 
    Greeting 3 
    . 
    Greeting 4 
    Greeting 5 
    Greeting 6 
    Greeting 7 
    . 
    CUSTOMIZATION FORM-4  
    						
    							STRATAGY 4/6/24 INSTALLATION  AND MAINTENANCE  MANUAL  SEPTEMBER 
    1994 
    Stratagykg 
    PROGRAMMING  SECTION 
    Chapter 1 _ _ _ _ _ _ _  _ _  - 
    Chapter  2 - _ _ -  - -  -  - -  - 
    Chapter  3 _ _ _ _  _ _  -  - -  - 
    Chapter  4 _ _ _ _  _ _  _  - - - 
    Chapter  5 _ _ _ _  - -  -  - - - 
    Chapter  6 >- - - -  - - -  - - - 
    Chapter  7 _ _  _ _  _ _ -  - - - 
    Chapter  8 _ _  _ _  _ _ _  _ _ _ 
    Chapter  9 _ _  _ _ _ - - - - - 
    Appendix  A - - - - - - - - - 
    Appendix  B _ _._  _ _ _ _ _ - 
    Introduction 
    How  Stratagy  Operates 
    Accessing  and Using  Stratagy 
    Customizing  User ID Mailboxes 
    Special  Greeting  User ID Mailboxes 
    Token  Programming  Language 
    Generating  Reports 
    Backup  and Filecopy 
    System  Administrator’s  User ID 
    Customization  Forms 
    Customization  Examples  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    PROGRAMMING SECTION 
    CHAPTER 1 
    INTRODUCTION  
    						
    							, STRATAGY 4/6/24 
    INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    TABLE OF CONTENTS 
    Chapter 1 - Introduction 
    PARAGRAPH 
    SUBjECT PAGE 
    1 Purpose ________________________________________----- _________________________________r______------------------------ 
    2 Organization _______________r_ ____________________------------------- ____________________---------------------------- 
    3 Reference Documentation ____________________---------------------------------- -------------------------------- 
    3.1 
    Sections of This Manual ____________________------------------------------------------------------------------ 
    3.2 Additional Reference Documentation ____________________------------------ ____________________----------- 
    4 
    About the System Administrator ______-_____________----------- ____________________--------------------------- 
    5 
    System Mnemonics/Terms ____________________------------------ -- ------ --------------------------------------- 
    6 
    Use of Notes, Cautions, and Warnings--------------------- ____________________----------------------------- l-1 
    l-1 
    1-I 
    l-1 
    l-1 
    l-l 
    l-2 
    l-2 
    l-i  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    CHAPTER 1 
    INTRODUCTION 
    1 PURPOSE 
    The Programming section of the Stratagy installation and 
    Maintenance A.&W/ provides detailed instructions for 
    operating, customizing, and administrating the Stratagy 
    automated attendant and voice messaging systems. 
    This chapter provides an overview of the organization of 
    the Programming section; a list of reference 
    documentation that supports the system; the functions of 
    the System Administrator; a list of system mnemonics 
    and terms; and the use of notes, cautions, and warnings. 
    2 ORGANIZATION 
    This manual is organized in modular chapters for easy 
    removal and replacement of updated materials. The 
    chapters are as follows: 
    Chapter 1 
    Chapter 2 
    Chapter 3 
    Chapter 4 
    Chapter 5 
    Chapter 6 
    Chapter 7 
    Chapter 8 
    Chapter 9 
    Appendix A 
    Appendix B Introduction 
    How Stratagy Operates 
    Accessing and Using Stratagy 
    Customizing User ID Mailboxes 
    Special Greeting User ID 
    Mailboxes 
    Token Programming Language 
    Generating Reports 
    Backup and Filecopy 
    System Administrator’s User ID 
    Forms 
    Customization Examples 
    3 REFERENCE DOCUMENTATION 
    Reference documentation for the Programming section 
    consists of the remaining sections of the installation and 
    Maintenance Manual and additional Stratagy 
    documentation. 
    3.1 SECTIONS OF THIS MANUAL 
    The installation and Maintenance Manual consists of the 
    following sections. 
    General Description: Reference document that provides 
    an overview of the Stratagy systems. Describes their hardware and features. Available as a stand-alone 
    document. 
    Installation: Designed for the installer, this section 
    provides detailed step-by-step instructions for 
    installing and configuring Stratagy systems. 
    Programming: Provides detailed instructions for 
    operating, customizing, and administrating Stratagy 
    systems (this section). 
    Fault Finding: Describes the procedures used to 
    diagnose and correct faults. 
    Maintenance and Upgrades: Provides instructions on 
    maintaining and upgrading Stratagy systems. 
    Operating Procedures: Consists of the User Guide 
    reference document. Describes the telephone 
    operating procedures for the telephone user. 
    Incorporates the Quick Reference Guide, a concise 
    guide for Stratagy users. 
    Technical Bulletins: Provide important updates to the 
    Stratagy documentation. 
    3.2 ADDITIONAL REFERENCE 
    DOCUMENTATION 
    In addition, the Stratagy systems are supported by the 
    following complement of reference documentation. 
    Feature Description: A brief description of the features 
    of the Stratagy systems. 
    User Guide: Describes the telephone operating 
    procedures for the telephone user. 
    Quick Reference Guide: A concise guide for Stratagy 
    users. 
    4 ABOUT THE SYSTEM 
    ADMINISTRATOR 
    System Administrator functions may include: 
    n Initial setup (assisting the Installer with defining your 
    company’s configuration and customization 
    requirements) 
    n Customizing User ID mailboxes 
    n Customizing special User ID mailboxes 
    n Generating reports 
    n Performing system shutdown and restart 
    n Backing up the system * 
    n Using Stratagy’s filecopy utility 
    H Using the system User ID mailbox 
    l-1  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL 
    SEPTEMBER 1994 
    Your company will assign all or some of these functions 
    to an employee who knows your phone system, 
    organizational structure, and the needs of your 
    customers and employees. The Technical Service 
    Representative will perform the remaining functions. 
    5 SYSTEM MNEMONICS/TERMS 
    The following mnemonics and terms identify 
    nomenclature used when operating, customizing, and 
    administrating Stratagy. 
    BPS: Bits Per Second - Unit of measure that refers to 
    the transmission speed (baud rate) of electronic 
    signals. Used when describing modem operation. 
    Caller: Someone who calls into Stratagy. A caller often 
    will obtain information, leave a message for 
    someone, and/or provide information. 
    Called Party: The telephone user the caller reached. 
    See “User”. 
    Chains: Stratagy control structure that allows for more 
    complex programming. Program chains to tell 
    Stratagy what to do when one of three conditions 
    apply: Done (if caller remains on the line after leaving 
    a message or listening to an announcement), RNA 
    (Ring No Answer - there is no answer at the 
    extension), or Busy (the extension is busy). 
    CO: Central Office - Facility which houses switching 
    equipment that provides telephone service (CO lines, 
    Centrex lines, etc.) for the immediate geographical 
    area. 
    DTMF: Dual tone Multi-frequency - Push-button tone 
    dialing. 
    Groups: Stratagy control structure that allows for more 
    complex programming. Groups control which User 
    IDS a call may access. Each User ID mailbox user 
    may be a member of up to four groups. To be able to 
    access another User ID, the caller User ID must 
    share at least one group number with the currently 
    accessed User ID. 
    Menus: Stratagy control structure that allows for more 
    complex programming. Program menus to define the 
    destination a caller will be sent when he presses one 
    of ten possible single-digit menu options while 
    listening to the greeting of this mailbox. Menus can 
    accommodate an unlimited number of special 
    applications. 
    Modem: Modulator-Demodulator - Device used primarily 
    for converting digital signals into quasi-analog 
    signals for transmission, and reconverting upon 
    reception. PBX: Private Branch Exchange - Industry-standard term 
    which refers to a telephone switch, usually on- 
    premises, which serves an individual company, and 
    is connected to a public telephone exchange through 
    the CO. 
    Port: There are two types of ports: physical and logical. 
    A physical port is an actual station circuit location; a 
    logical port is the set of characteristics - features, 
    station intercom number, etc. - assigned to the 
    physical port. Logical ports are mobile; they can be 
    moved from one physical port to another. 
    IVR: Interactive Voice Response - An application that will 
    prompt the user for input (using a custom prompt), 
    wait for the user to enter a DTMF response, which 
    will be stored into a variable, and then use that 
    information to access a database to formulate a 
    response. Databases may be on the hard disk of the 
    Stratagy system, accessed remotely over a network, 
    or accessed through the serial ports of the Stratagy 
    system, possibly connecting to a mainframe or other 
    data server. 
    Once a response has been determined from the 
    database, the Stratagy system may be programmed 
    to play this data back to the caller in a number of 
    different ways: as a date, time, monetary value (in 
    dollars and cents), or simply as a number. The value 
    may be combined with other custom-recorded 
    prompts, so that the system could, for example, 
    respond to a caller with the message “Your order for 
    6 items will be shipped on July 17, 1994.” The 
    number six and the date in this example would be 
    provided by the database, while the phrases “Your 
    order for” and “items will be shipped on” would be 
    recordings that the System Administrator would 
    make. 
    PC: Personal Computer. 
    Token Programming Language: Stratagy control 
    structure that allows for more complex programming. 
    Stratagy’s programming language gives versatility to 
    obtain additional features, such as fax on demand, 
    message waiting light control, and confirming digits 
    entered by a caller. A series of tokens instruct 
    Stratagy what actions to perform. 
    User: A telephone user is someone who has access to 
    one or more User IDS in the system by knowing their 
    security codes. Once a user accesses his User ID, 
    he can play back messages which have been left for 
    him, delete those messages, send them to other 
    User IDS, etc. 
    User ID/User ID Mailbox: Unique Stratagy record that 
    provides call processing control - records messages 
    from callers, provides information to callers, or 
    controls the flow of a call. 
    l-2  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    6 USE OF NOTES, CAUTIONS, 
    AND WARNINGS 
    Notes: Elaborate specific items, or reference other 
    information. 
    Important Notes: Call attention to important instructions 
    or other information. 
    Cautions: Advise you that the equipment could be 
    damaged if the instructions are not followed closely. 
    Warnings: Alert you when the given tasks could cause 
    the technician personal injury or death. 
    l-3  
    						
    All Toshiba manuals Comments (0)

    Related Manuals for Toshiba Stratagy 4/6/24 Installation And Maintenance Manual