Home > Lucent Technologies > Communications System > Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide

Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 1707
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    517 CDR System Parameters 
    17
    Record Call-Assoc TSC
    Digits to Record for Outgoing Calls
    Privacy — Digits to Hide
    If you enable CDR Privacy on the Station screen for a given phone, use this field 
    to indicate how much of the dialed number to hide on the CDR record.
    CDR Account Code Length
    Valid entries Usage
    y
    /nEnter y to create records for call-associated temporary signaling 
    connections. If you have a lot of data connections this could 
    increase the number of records. You may want to consider the 
    capacity of your call collection device. 
    Valid entries Usage
    dialed
     Use dialed to record the digits a user actually dials. 
    outpulsed Use outpulsed to record the digits that the switch actually 
    sends out over the trunk, including any additions or deletions 
    that take place during routing.
    Valid entries Usage
    0
    –7Enter the number of digits to hide, counting from the end (right 
    to left). For example, if you enter 
    4 in this field and the user 
    dials 555-1234, only 555 would appear in the Dialed Number 
    field of the CDR record. 
    Valid entries Usage
    1
    –15Enter the number of digits to record when a user enters an 
    account code. For some record formats, a long account code 
    overwrites spaces on the record that are usually assigned to 
    other fields. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    518 CDR System Parameters 
    17
    Field descriptions for page 2
    Screen 48. CDR System Parameters 
    This page appears only if Primary Record Format is customized.
    Data Item 
    Enter the data items in the order they should appear on the customized record. 
    Only use this screen if you have arranged with your vendor to customize your call 
    accounting system to receive these records. 
    You must include at least one field in order to have a record. See the table below 
    for valid entries. The last two data items in a the record must be 
    line-feed and 
    return, in that order.
    For more information, see ‘‘
    Call detail record field descriptions’’ on page 1254.
    Table 6. Valid Data Item entries
    Data Item Length Data Item Length
    acct-code 15 ins 3
    attd-console 2 isdn-cc 11
    auth-code 7 ixc-code 4
    Continued on next page
    change system-parameters cdr  
                                  CDR SYSTEM PARAMETERS              Page 2 of 2
           Data Item - Length         Data Item - Length         Data Item - Length
       1: time____________ - 4_  17: ________________ - __  33: ________________ - __
       2: space___________ - 1_  18: ________________ - __  34: ________________ - __
       3: duration________ - 4_  19: ________________ - __  35: ________________ - __
       4: return__________ - 1_  20: ________________ - __  36: ________________ - __
       5: line-feed_______ - 1_  21: ________________ - __  37: ________________ - __
       6: ________________ - __  22: ________________ - __  38: ________________ - __
       7: ________________ - __  23: ________________ - __  39: ________________ - __
       8: ________________ - __  24: ________________ - __  40: ________________ - __
       9: ________________ - __  25: ________________ - __  41: ________________ - __
      10: ________________ - __  26: ________________ - __  42: ________________ - __
      11: ________________ - __  27: ________________ - __  43: ________________ - __
      12: ________________ - __  28: ________________ - __  44: ________________ - __
      13: ________________ - __  29: ________________ - __  45: ________________ - __
      14: ________________ - __  30: ________________ - __  46: ________________ - __
      15: ________________ - __  31: ________________ - __  47: ________________ - __
      16: ________________ - __  32: ________________ - __  48: ________________ - __
                                    Record length = 11 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    519 CDR System Parameters 
    17
    Length 
    Enter the length of each data item, if different from the default.
    Record Length 
    Displays the accumulated total length of the customized record, updated each time 
    the length of a data item changes.bandwidth 2 line-feed 1
    bcc 1 ma-uui 1
    calling-num 15 node-num 2
    clg-num-in-tac 10 null 1
    code-dial 4 out-crt-id 3
    code-used 4 ppm 5
    cond-code 1 res-flag 1
    date 6 return 1
    dialed-num 23 sec-dur 5
    duration 4 space 1
    feat-flag 1 time 4
    frl 1tsc_ct 4
    in-crt-id 3 tsc_flag 1
    in-trk-code 4 vdn 5
    Valid entries Usage
    The maximum record length 
    depends on the call accounting 
    system you use. Check with your 
    vendor.The date field should be six-digits to ensure 
    proper output. Certain fields default to the 
    required length. 
    Table 6. Valid Data Item entries — Continued
    Data Item Length Data Item Length
    Continued on next page 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    520 Class of Restriction 
    17
    Class of Restriction
    Use this screen to establish classes of restriction (COR). Classes of restriction 
    control call origination and termination. Your system may use only one COR or as 
    many as necessary to control calling privileges. You can assign up to 96 different 
    CORs (0 – 95). 
    Consider the following to enhance your system security:
    1. Assign a separate COR to incoming and outgoing trunk groups, then 
    restrict calling between the two groups.
    2. Limit the calling permissions as much as possible by setting appropriate 
    Calling Party Restrictions and Facility Restriction Levels (FRLs).
    Field descriptions for page 1
    Screen 49. Class of Restriction
    COR Number
    This is a display-only field when the screen is accessed via an administration 
    command such as 
    change or display.
    change cor 10 Page 1 of 4
    CLASS OF RESTRICTION
                   COR Number: 10
              COR Description: supervisor
    FRL: 0     APLT? y
      Can Be Service Observed? n               Calling Party Restriction: none
    Can Be A Service Observer? y     Called Party Restriction: none
    Time of Day Chart: 1      Forced Entry of Account Codes? n
             Priority Queuing? n                    Direct Agent Calling? y
         Restriction Override: none    Facility Access Trunk Test? n
         Restricted Call List? n     Can Change Coverage? n
    Unrestricted Call List? __ __ __ __ __ __ __ __ __ __
                Access to MCT? y     Fully Restricted Service? n
       Category For MFC ANI: 7      Hear VDN of Origin Annc.? n
             Send ANI for MFE? n_      Add/Remove Agent Skills? y
                MF ANI Prefix: ______           Automatic Charge Display? n
    Hear System Music on Hold? y    PASTE(Display PBX Data on telephone)? n
    Automatic Charge Display? n Can Be Picked Up By Directed Call Pickup? n
       Can Use Directed Call Pickup? n
        Group Controlled Restriction: inactive 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    521 Class of Restriction 
    17
    COR Description
    FRL
    APLT
    Can Be Service Observed
    Note that this field allows or denies service observing for not only physical 
    extensions, but also for logical agent IDs and VDNs. If you want an observer to 
    observe users, set the users’ CORs to 
    y on the observer’s COR Service Observing 
    Permission table.
    Valid entries Usage
    Up to 35 
    characters Enter a description of the COR that indicates how you use it. If 
    you make this as clear as possible (for example, Customer 
    Service, Legal Department), it will be easier to remember 
    which COR to assign when you add users. 
    Valid entries Usage
    0
     to 7Enter an originating FRL number. AAR and/or ARS features 
    use this entry to determine call access to an outgoing trunk 
    group. Outgoing call routing is determined by a comparison of 
    the FRLs in the AAR/ARS Routing Pattern and the FRL 
    associated with the COR of the call originator (typically, a 
    telephone user). An originating FRL of 0 has the least calling 
    privileges.
    To enhance system security, assign the lowest possible FRL.
    Valid entries Usage
    y/n
    Enter n to allow access to APLT trunk group Enhanced Private 
    Switched Communications System (EPSCS) or Common Control 
    Switched Arrangement (CCSA) off-net facilities.
    If fully restricted service is enabled, set this field to 
    n.
    Valid entries Usage
    y/n
    Enter y if users with this COR can be service observed. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    522 Class of Restriction 
    17
    Calling Party Restriction
    This field determines the level of calling restriction associated with this COR.
    NOTE:
    To enhance system security, limit calling permissions as much as possible. 
    Can Be a Service Observer
    If you want an observer to observe users, set the users’ CORs to 
    y on the 
    observer’s COR Service Observing Permission table.
    !SECURITY ALERT:
    The use of Service Observing features may be subject to federal, state, or 
    local laws, rules, or regulations; or require the consent of one or both of the 
    parties to the conversation. Customers should familiarize themselves with 
    and comply with all applicable laws, rules, and regulations before using 
    these features.
    Valid entries Usage
    Origination
    Blocks the calling party from originating a call from the facility 
    at any time. The party can only receive calls. A phone with this 
    COR may initiate Remote Access calls, if the COR of the barrier 
    code allows it. 
    OutwardBlocks the calling party from calling outside the private network. 
    Users can dial other users on the same switch or within a private 
    network. To enhance security, Lucent recommends that you use 
    outward restrictions when practical. 
    All-tollBlocks the calling party from making ARS and trunk access calls 
    from a facility assigned the COR to certain toll areas as defined 
    in the Dialed String field on the Toll Analysis screen. The Dialed 
    String field must be marked as being associated with the 
    system’s Toll List. The call completes if the facility’s COR also 
    is associated with an Unrestricted Call List and whose Dialed 
    String field also matches the dialed number.
    Tac-tollBlocks the calling party from making trunk access calls from the 
    facility assigned the COR to certain toll areas as defined in the 
    Dialed String field on the Toll Analysis screen. The Dialed 
    String field must be marked as being associated with the 
    system’s Toll List. The call completes if the facility’s COR also 
    is associated with an Unrestricted Call List and whose Dialed 
    String field also matches the dialed number. See ‘‘
    Toll 
    Analysis’’ on page 964 for additional information.
    None No calling party restrictions. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    523 Class of Restriction 
    17
    NOTE:
    You cannot enter y in the previous two fields unless Service Observing 
    (Basic) is enabled on the System-Parameters Customer-Options screen.
    Called Party Restriction
    Partitioned Group Number
    This field appears only if AAR/ARS Partitioning is 
    y and Time of Day Routing is 
    n on the System Parameters Customer-Options screen. 
    Time of Day Chart
    Appears only if Time of Day field is enabled on the System Parameters 
    Customer-Options screen. Refer to ‘‘
    Setting up time of day routing’’ on page 194 
    for more information. 
    Valid entries Usage
    y/n
     Enter y if users with this COR can service observe other users.
    Valid entries Usage
    Inward
    Blocks the calling party from receiving incoming exchange 
    network calls, attendant originated calls, and attendant 
    completed calls.
    ManualBlocks the called party from receiving all calls except for those 
    originated or extended by the attendant.
    PublicBlocks the called party from receiving public network calls. 
    Attendant calls are allowed to go through to the called party as 
    well as attendant-assisted calls if the Restriction Override field 
    in the public restricted station’s COR is 
    attd or all.
    TerminationBlocks the called party from receiving any calls at any time.
    None  No called party restrictions.
    Valid entries Usage
    1
    –8Enter the AAR/ARS partitioned group number associated with 
    this COR.
    Valid entries Usage
    1
    –8Enter the AAR/ARS time-of-day-chart number associated with 
    this COR. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    524 Class of Restriction 
    17
    Forced Entry of Account Codes
    FEAC must be enabled on the System Parameters Customer-Options screen and 
    on the CDR System Parameters screen. 
    Refer to ‘‘
    Forced Entry of Account Codes’’ on page 1222 and ‘‘Forcing users to 
    enter account codes’’ on page 444 for more information. 
    NOTE:
    If a COR requiring entry of account codes is assigned a VDN, the route to 
    commands executed by the associated vector will not be successful.
    Priority Queuing
    Direct Agent Calling
    Valid entries Usage
    y/n
    Enter y to indicate that an account code must be dialed when 
    making outgoing trunk calls.
    If this is 
    y, any telephone assigned the associated COR must 
    dial an account code before making an outgoing call. If you set 
    this to y for a COR assigned to a trunk group, users must dial 
    account codes before calling out over that trunk group. This 
    may be useful for trunks used in international calls, and those 
    that are more expensive. If a call is being routed by ARS, 
    account code checking is not done on the COR. 
    Valid entries Usage
    y
     Enter y to allow the telephone user’s calls to be placed ahead of 
    non-priority calls in a hunt group queue
    n  If you do not use Automatic Call Distribution (ACD is not 
    enabled on the System-Parameters Customer-Options screen), 
    this field must be 
    n.
    Valid entries Usage
    y/n
    If this is y, users may dial an ACD agent’s extension directly, 
    rather than anyone in the agent pool. If the system is in Night 
    Service, the call routes to the Night Service extension. If the 
    extension with this COR belongs to an agent, the agent may 
    receive calls directly. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    525 Class of Restriction 
    17
    Restriction Override
    Allows the specified users to bypass restriction on conference, transfer or call 
    forwarding operations.
    Facility Access Trunk Test
    An associated feature button (trk-ac-alm) status lamp lights when a successful 
    test attempt occurs. Pressing one of the alarm buttons (ten maximum) when its 
    associated status lamp is lit turns off all lamps on all buttons whether the access is 
    still in progress or has completed.
    Restricted Call List
    This list can be used whether the COR is toll restricted. The Restricted Call List 
    (RCL) has priority over the Toll Analysis Unrestricted Call List (UCL). A call 
    attempt from a facility assigned a COR (with RCL field set to 
    y), whose dialed 
    digit string is on the Toll Analysis screen and is marked as being associated with 
    the RCL, will be denied.
    Valid entries Usage
    attendant
    A telephone with a COR that is inward restricted cannot 
    receive public network, attendant-originated, or 
    attendant-extended calls. Enter 
    attendant to give your 
    attendants the ability to override this restriction.
    allEnter all if you want all of the users with this COR to override 
    inward restrictions.
    noneEnter none if you do not want any users of this COR to bypass 
    the restrictions.
    Valid entries Usage
    y/n
     Enter y to allow users with this COR to perform Facility 
    Access Trunk Tests.
    Valid entries Usage
    y/n
    Enter y to specify that this COR will have access to the system’s 
    Restricted Call List (see ‘‘
    Toll Analysis’’ on page 964). 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1
    April 2000
    Screen reference 
    526 Class of Restriction 
    17
    Can Change Coverage
    Unrestricted Call List
    Any entry on the Toll Analysis screen with an “X” in the Toll List column is 
    restricted, meaning that the system blocks any attempt to complete a call 
    containing the Dialed String. However, this field overrides that restriction.
    For example, if the Toll Analysis screen shows a Dialed String entry of 538 and 
    there is an “X” in the Toll List column, the 538 number is restricted. To override 
    this restriction, in the Toll Analysis screen, enter 
    X in the “5” column under the 
    Unrestricted Call List heading. In the Class of Restriction screen, in this field, 
    enter 
    5 to complete the restriction override.
    Access to MCT?
    This field refers to Malicious Call Trace. 
    Valid entries Usage
    y/n
     Enter y to allow station users with this COR to select one of 
    two previously administered coverage paths or to activate, 
    change, or deactivate call forward all calls or call forward 
    busy/don’t answer from any on-site or off-site location.
    Valid entries Usage
    1–10
    Appears when Calling Party Restriction is all-toll or tac-toll. 
    This field allows a user to complete a toll call with “restricted” 
    dialed digits. This field is associated with the Dialed String 
    field on the Toll Analysis screen. An Unrestricted Call List 
    number is denoted on that screen.
    Valid entries Usage
    y
     Enter y to allow permissions to activate a request to trace a 
    malicious call. 
    nEntering n prohibits this user from requesting a malicious call 
    trace, but does not prevent this extension from appearing in 
    the MCT History report, should this extension be the subject 
    of a malicious call trace. 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies DEFINITY Enterprise Communication Server Release 8.2 Administrators Guide