Home > ATT > Communications System > ATT DEFINITY Communications System Generic 3 Instructions Manual

ATT DEFINITY Communications System Generic 3 Instructions Manual

    Download as PDF Print this page Share this page

    Have a look at the manual ATT DEFINITY Communications System Generic 3 Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 164 ATT manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 1584
    							Introduction
    1-16Issue  3   March 1996 
    Automated Attendant
    1. Restrict menu options to internal extensions only, by Outward Restricting 
    the automated attendant ports
    2. Restrict calls that transfer off-premises to specific numb ers as defined in 
    the Restricted Call List
    3. Force disconnect or route to an attendant any menu option that is not valid
    NOTE:
    The a bove values may differ in different switches.  Always try to use the 
    maximum value for the feature as defined by the switch documentation. 
    This list is to provide ideas in preventing fraud and does not list all possible 
    ways fraud may occur. AT&T does not g uarantee that the list a bove will stop 
    all fraud.
    Call Forwarding
    Use the list call-forwarding command, available with G3V4 and later releases, 
    to identify unauthorized Call Forwarding feature activation. The command c an be 
    used to list: all stations with Call Forwarding Active; a subset of stations with Call 
    Forwarding active; or the Call Forwarding status of a specified station.
    The list identifies stations with either Call Forward ing All Calls (on-net or off-net) 
    or Call Forwarding Busy/Don’t Answer active. It shows the station extension, the 
    station name and the forwarded-to destination.
    Call Vectoring
    Call vectoring allows processing of incoming and internal calls according to a 
    programmed set of commands. Vector commands can direct calls to 
    on-premises or off-premises destinations, to a hunt group or split, or to a specific 
    call treatment such as an announcement, forc ed disconnect or delay treatment. 
    It is possible for the system to collect digits from the user and route calls to a 
    destination specified by those digits, and/or do conditional processing 
    according to the digits dialed (Call Promp ting feature).
    Calls access vectors using Vector Directory Numbers (VDNs). A VDN is a ‘‘soft’’ 
    switch extension not assigned to a physical equipment location b ut having many 
    of the properties of a normal extension number, including a Class Of Restriction 
    (COR). The VDN, when dialed (or inferred), routes calls to the vector. Calls 
    processed by the vector carry the permissions and restrictions associated with 
    the COR of the Vector Directory Numb er.
    Putting this all to gether, if a vector in the switch is written to collect digits, and 
    then to route to the digits dialed, the restrictions on what calls can be placed are 
    determined by the COR of the VDN. An incoming caller can access Trunk 
    Access Codes, some Feature A c cess Codes, or most other sets of dialed digits.  
    						
    							Security Measures
    Issue  3   March 1996
    1-17
    In order to deny incoming callers access to outgoing facility paths, the COR of 
    the Vector  Directory  Number must be configured to disallow outgoing access. 
    This should include; lowering the Facility Restriction Level in the COR to the 
    lowest acceptable value (FRL=0 provides the most restricte d access to network 
    routing preferences), assigning a Calling Party Restriction of ‘‘Toll’’ or ‘‘Outward’’, 
    denying Facility Test Call capability, and blocking access to specific COR’s 
    assigned to outgoing Trunk Groups using the Calling Permissions section of the 
    Class Of Restriction Screen.
    Action
    Review the Classes of Restriction assigned to your VDNs. If they are not 
    restricted, consider assigning restrictions on the VDN to prevent callers exiting 
    the system via the vector. For assistance, please contact the DEFINITY  Helpline 
    at 800 225-7585.
    Enhanced Call Transfer
    When using AUDIX, DEFINITY  A UDI X,  o r I ntuity, remember to activate the 
    Enhanced Call Transfer (ECT) feature as part of your security plan. While this 
    powerful feature limits transfers to valid extensions, there are some extension 
    numbers that should NOT be made available to AUDIX transfers.
    ECT allows callers to transfer out of AUDIX to valid extension numbers (as 
    determined by the switch’s Dial Plan.) However, there are certain extension 
    numbers, within the Dial Plan, that provide c a pabilities AUDIX transfers should 
    be denied access to. Examp les would include extension numbers used to 
    dial-access system administration c a pabilities within the switch or extension 
    numbers that are associated with features that provide second dial tone (Remote 
    Access Extension).
    To block AUDIX access to these extension numb ers, they should be placed in 
    special Class(es) of Restriction (COR). Using COR-To-COR calling permissions, 
    the COR of the AUDIX analog ports should be denied access to the CORs 
    containing these special extension numbers. To  do this, access the Change - 
    Class Of Restriction screen for the COR assigned to the analog ports that 
    connect to AUDIX.
    NOTE:
    AUDIX ports should always reside in a separate COR designed specifically 
    for them. In the COR-To-COR permissions area at the bottom of the screen,  
    enter  ‘‘no’’ in each COR field corresponding to the CORs assigned to the 
    extensions you want protected. 
    						
    							Introduction
    1-18Issue  3   March 1996 
    Action
    Review the Classes of Restriction assigned to your AUDIX analog p orts and your 
    Remote Access/Netcon (G3vs, G3s, G3i) or system p ort (G3r) d ata extensions. If 
    they are not restricte d, consider assigning restrictions that would prevent callers 
    in AUDIX from b eing transferred to these extensions. For assistance, please 
    contact the DEFI NI TY Helpline at 800 225-7585.
    Remote Access
    1. Use maximum Barrier Code Length (7) 
    G3V3 and later releases provide a 7-digit barrier code with Remote 
    Access Barrier Code Aging. Remote Access Barrier Code Aging limits the 
    length of time a barrier code remains valid, and/or the  number of times a 
    barrier code can b e used. The ability to d efine the life s pan and numb er of 
    times a barrier code can be used reduces the  opportunity for 
    unauthorized use of the Remote Access feature.
    2. Activate Authorization Code Required (Y)
    3. Assign each barrier code a COR and COS that allow only necessary calls
    4. Assign an ap propriate Facility Restriction Level (FRL) and other 
    restrictions for each COR (outward, toll, etc.)
    5. Use maximum Authorization Code Length (7)
    6. If providing attendant coverage, activate Timeout To Attendant (Y)
    7. Change or remove authorization codes when authorized users leave the 
    company
    8. If Time of Day Routing is p rovid e d, raise the FRLs on route p atterns during 
    hours that remote access should not be used.
    9. Suppress dial tone in the Remote Ac c ess Dial Tone field (Y)
    10. If Remote Access is not going to be used, permanently disable the 
    Remote Access feature. This feature is available on RV3, G1, and G3 V1.1 
    and higher.
    Use the status remote-access c omma n d in G3V4 to check the status of the 
    remote access feature and barrier codes. The command displays information 
    that can help in determining why  and when use of the remote access feature or a 
    particular barrier code was denied. 
    If Remote Access is not p ermanently disabled, but is not administered, set Logoff 
    Notification, available with G3V4 and later releases, to notify the system 
    administrator at logoff when the Remote Access feature is enabled. Logoff 
    Notification is administrable on a login ID basis.
    For a  detailed description of the status remote-access command and Logoff 
    Notification, see the 
    GBCS Products Security Handbook, 555-025-600. 
    						
    							Security Measures
    Issue  3   March 1996
    1-19
    Other Features Requiring Security Precautions
    Follow the specific security measures recommended in this chapter when 
    administering the following features:
    — AUDIX Interface
    — Call Vectorin g
    — Facility Test Calls
    — Remote Access
    — Remote Administration
    — Transfer -  Trunk to  Trunk
    — Terminal Translation Initialization
    (See the index under ‘‘Security Measures’’ for the specific page numbers where 
    the security measures are described for each of these features.)
    Consult the 
    GBCS Products Security Handbook, 555-025-600,  for a dditional 
    steps to secure your system and to find out how to regularly obtain information 
    concerning security developments. 
    						
    							Introduction
    1-20Issue  3   March 1996 
    Organization of Features
    The next few chapters describe the DEFI NI TY switch features, functions, and 
    services. Chapter 2 presents these capabilities classified into six categories:
    nVoice Management Overview
    nData Management
    nNetwork Services (including World Class Routing)
    nSystem Management
    nHospitality Services
    nCall Center Services
    NOTE:
    It is useful to consider the features and functions from the perspective of 
    the following functional views: System View, Call Center View, PBX-to-Host 
    View, Voice Processing View, Network View (including World  Class 
    Routing), System  Management View, Deskto p View, Hospitality View, and 
    Supp ort View. Some features and functions support several of these views, 
    so the views should not be seen as discrete categories for listing features 
    and functions. For  a description of the system organized from a functional 
    perspective, see 
    An Introduction to DEFINITY Communications System 
    Generic 3
    , 555-230-020.
    Organization of Each Feature Section
    In Chapter 3 the features are arranged in alphabetical order. The information for 
    each feature is generally presented under six headings with some differences 
    among the sections:
    nFeature Availability 
    Defines in which release(s) the feature is available. (Also see the table 
    later in this chapter for a listing of the G3 feature set.)
    nDescription 
    Defines the feature, tells what it does for the user, or how it serves the 
    system, and briefly desc ribes how it is used.
    nConsiderations 
    Discusses the applications and benefits of the feature, followed by the 
    feature p arameters and any other factors to be considered when the 
    feature is used.
    nInteractions 
    Lists and briefly discusses other features that may significantly affect the 
    feature b eing desc ribed. Interacting features are those that: 
    						
    							Organization of Features
    Issue  3   March 1996
    1-21
    — Depend on each other — one of the features must be provided if 
    the other one is.
    — Cannot coexist — one of the features cannot be provided if the 
    other one is.
    — Affect each other — the normal operation of one feature mo difies, 
    or is modified by, the normal operation of the other feature.
    — Enhance each other — the features, in combination, provide 
    improved service to the user.
    nAdministration 
    States whether or not administration is required, how the feature is 
    administered, who administers the feature, and lists items requiring 
    administration.  See the
     DEFI NI TY Com munications System Generic 3 
    Version 4 Imp lementation
    , 555-230-655, for details.
    nHardware and Software Requirements 
    Lists any a d ditional hardware and/or software requirements needed for 
    the feature.
    Table 1-6 provides a complete list of the Generic G3 features and, for each 
    feature, indicates whether the feature is standard (always part of the offering) or 
    optional (can be purchased separately) with the Ad vantage Business Package, 
    the Premier  Business Package, Generic G3i, and Generic G3r.
    The following notations indicate feature availability:
    NOTE:
    Customers outside of North America should refer to the column marked 
    G3vs PBP for feature availability.
    Standard features may require ad ditional hardware. LEGEND:
    S Standard
    O Optional
    N/A Not Available
    V2 Only available with G3V1.1, G3V2 and later releases.  Not 
    available with G3V1.  Please note that feature availability 
    b etween G3V1.1 is somewhat different.  Any feature identified 
    as V2 is NOT available with G3V1.1 except as an upgrade.
    GD Available with G3i-Global and G3iV2 (and later releases).  Not 
    available with G3iV1.
    V3 Only available with G3V3 and later releases.
    V4 Only available with G3V4 and later releases. 
    						
    							Introduction
    1-22Issue  3   March 1996 
    1. A b breviated Dialing is a standard feature; however, Enhanced A b breviated Dialing is not available
    with the Advantage Business Package.
    2. A b breviated Dialing  is a standard feature; however, Enhanced Abbreviated Dialing is a Premier
    Business Package, G3i, and  G3r op tion.
    3. Available when the Basic Call Center Option is ac tive.
    4. Available when ACD software is active.
    Table 1-6. Feature Availability
    Feature G3vs ABP G3vs PBP G3s ABP G3s PBP G3i G3r
    AAR/ARS Partitioning S S S S S S
    AAR/ARS D i g it Co n ve r si on O O O O S S
    Abandoned Call Search S S S S S S
    A b breviated Dialing S
    1S2S2S2S2S2
    A b breviated Dialing (Enhanced ) N/A O N/A O O O
    A d d /Re mo ve S k i l l s V3 V3 V3 V3 V3 V3
    Administrable Language Displays V2 V2 V2 V2 GD V2
    Administrable Logins V3 V3 V3 V3 V3 V3
    Administered Connections N/A S N/A S S S
    Administration Without Hardware S S S S S S
    Advice of Charge V4 V4 V4 V4 V4 V4
    Agent Call Handling O
    3O4O3O4O4O4
    A g e n t  Si z i n g V3 V3 V3 V3 V3 V3
    Alp ha nu meri c Di al in g S S S S S S
    Alternate Facility Restriction Levels V2 V2 V2 V2 V2 O
    Answer Detection by Call Classifier N/A O N/A O O S
    Attendant Auto-Manual Splitting S S S S S S
    Attendant Call Waiting S S S S S S
    Attendant Control of Trunk Group Ac cess S S S S S S
    Attendant Direct Extension Selection  With 
    Busy Lamp FieldSSSSSS
    Attendant Direct Trunk Group Selection S S S S S S
    Attendant Display S S S S S S
    Attendant Intrusion (Call Offer) V2 V2 V2 V2 GD S
    Attendant Override of Diversion Features V2 V2 V2 V2 GD S
    Attendant Priority Queue V2 V2 V2 V2 GD S
    Attendant Recall S S S S S S
    Attendant Release Loop  Operation S S S S S S 
    						
    							Organization of Features
    Issue  3   March 1996
    1-23
    1. Available with Private Network A c cess (PNA) software.
    2. Available with the Basic Call Center Option.
    Table 1-6. Feature Availability — Continued
    Feature G3vs ABP G3vs PBP G3s ABP G3s PBP G3i G3r
    Attendant Room  Status V3 V3 V3 V3 V3 V3
    Attendant Serial Calling V2 V2 V2 V2 GD V2
    Audi ble Messag e Waiting V2 V2 V2 V2 V2 S
    Audio Information Exchange 
    (AUDIX) InterfaceSSSSSS
    Authorization Codes O O O O O O
    Automatic Alternate Routing  (AAR) N/A O
    1N/A O1O1O1
    Automatic Callback S S S S S S
    Automatic Call Distribution (ACD) O
    2OO2OOO
    ACD Auto-Available Split (AAS) V2 V2 V2 V2 V2 S
    Automatic Circuit Assurance S S S S S S
    Automatic Hold V2 V2 V2 V2 GD S
    Automatic Incoming Call Display S S S S S S
    Automatic Route Selection (ARS) O O O O O O
    Automatic Transmission 
    Measurement SystemV2
    1V21V21V21V21S
    Automatic Wakeup S S S S S S
    Auto-Start/Don’t Split V2 V2 V2 V2 GD V2
    Basic Call Management System 
    (BCMS)O
    2OO2OOO
    Bridged Call Appearance — 
    Multi-Appearance Voice TerminalSSSSSS
    Bridged Call Appearance — 
    Sin g l e-L in e Voi c e  T erm in a lSSSSSS
    Busy Verification of Terminals and 
    Tru nksSSSSSS 
    						
    							Introduction
    1-24Issue  3   March 1996 
    .
    1. Available as an option when ISDN-PRI software is purchased for public and private networking .
    2. Linked Call Coverage Paths are not standard. However, Linked Call Coverage Paths are available
    as p art of the Voic e Mail Application Support Option package.
    3. CMS is o ptionally available as an ad junct.
    Table 1-6. Feature Availability — Continued
    Feature G3vs ABP G3vs PBP G3s ABP G3s PBP G3i G3r
    Call-By-Call Service Selection N/A O
    1N/A O10101
    Call Coverage S2SS2SSS
    Call Detail Recording (CDR) S S S S S S
    Call Forwarding All Calls S S S S S S
    Call Forward Busy/Don’t Answer V4 V4 V4 V4 V4 V4
    Call Manag ement System (CMS) O
    3O3O3O3O3O3
    Call Park S S S S S S
    Call Pickup S S S S S S
    Call Prompting N/A O N/A O O O
    Call Vectoring N/A O N/A O O O
    CallVisor Adjunct/Switch Application 
    Int erf a c e ( ASAI )N/A N/A N/A O O O
    Call Waiting Termination S S S S S S
    Centralized Attendant Service (CAS) N/A O N/A O O O
    Class of Restriction (COR) S S S S S S
    Class of Service (COS) S S S S S S
    CDR Ac count Code Dialing S S S S S S
    Code Calling Ac cess S S S S S S
    Conference — Attendant S S S S S S
    Conference — Terminal S S S S S S
    Constellation Voic e/Data Terminal 
    SupportV3 V3 V3 V3 V3 V3
    Consult S S S S S S
    Coverage Callback S S S S S S
    Coverage Inc oming Call Identification 
    (ICI)SSSSSS
    Customer-Provided Equipment (CPE) 
    AlarmSSSSSS 
    						
    							Organization of Features
    Issue  3   March 1996
    1-25
    1. Available when DCS software is p urchased.
    2. Available when DCS is purchased, but not available with DCS over PRI D-Channel when the PRI
    D-Channel is connected to the public network.
    3. Optional feature with DCS.
    Table 1-6. Feature Availability — Continued
    Feature G3vs ABP G3vs PBP G3s ABP G3s PBP G3i G3r
    Data Call Setup S S S S S S
    Data Hot Line S S S S S S
    Data-Only Off-Premises Extensions S S S S S S
    Data Privacy S S S S S S
    Data Restriction S S S S S S
    DCS Alphanumeric Disp lay for 
    TerminalsN/A O
    1N/A O1O1O1
    DCS Atten dant Control of Trunk 
    Group Ac cessN/A O2N/A O2O2O2
    DCS Attendant Direct Trunk Group 
    SelectionN/A O2N/A O2O2O2
    DCS Attendant Disp lay N/A O2N/A O1N/A O1
    DCS Automatic Callback N/A O2N/A O1O1O1
    DCS Automatic Circuit Assurance 
    (ACA)N/A O1N/A O1O1O1
    DCS Busy Verification of Terminals 
    and TrunksN/A O2N/A O2O2O2
    DCS Call Coverage N/A V4/O3N/A V4/O3V4/ O3V4 / O3
    DCS Call Forwarding All Calls N/A O1N/A O1O1O1
    DCS Call Waiting N/A O1N/A O1O1O1
    DCS Distinctive Ringing N/A O1N/A O1O1O1
    DCS Leave Word Calling N/A O1N/A O1O1O1
    DCS Multi-Appearance 
    Conference/TransferN/A O1N/A O1O1O1 
    						
    All ATT manuals Comments (0)

    Related Manuals for ATT DEFINITY Communications System Generic 3 Instructions Manual