Home > Lucent Technologies > Communications System > Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual

Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 1718
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1137 AAR/ARS shortcut dialing 
    20
    nAUDIX
    nAUDIX mailboxes allow a maximum of 5 digits when AUDIX is 
    connected to a switch that is not administered as a central office. If 
    an internal extension is 6 or more digits, the corresponding voice 
    mailbox must be set up and accessed with 5 or less digits. AUDIX 
    cannot associate a subscriber’s name with 6- or more digit number.
    NOTE:
    If AUDIX is connected to a switch in a remote location or 
    administered as a central office, mailbox IDs can be up to 10 
    digits and AUDIX can look up a calling party number longer 
    than 5 digits.
    nDCS AUDIX (Centralized Messaging)
    With shortcut dialing, DCS is not used and AUDIX does not 
    associate the name with the calling number. AUDIX associates the 
    name with the calling number only when DCS is used in the 
    network. 
    nISDN - QSIG/AUDIX
    A QSIG/AUDIX network can perform name lookup on 3-, 4-, and 
    5-digit calling numbers, as well as on longer calling numbers that 
    are be truncated to a unique 3-, 4-, or 5-digit mailbox extension.
    nAUDIX transfer
    Shortcut dialing allows AUDIX Enhanced Transfer to a 3-digit 
    extension, but not to a 6- or 7-digit extension.
    nCoverage paths for call coverage
    Use the short, internal extensions on local coverage paths, even when you 
    must dial 6 or more digits for on-switch calls.
    nCall center
    To call an agent, users must dial the agent’s shortcut dialing number. 
    However, the agent must use the agent ID (extension), not the shortcut 
    dialing number, to login.
    nCall Detail Recording (CDR)
    Intra-switch CDR records show the short, internal extensions of the calling 
    and called parties when shortcut dialing is used.
    Because the AAR or ARS access code is not used in shortcut dialing, the 
    Access Code Dialed and Access Code Used fields recorded by CDR are 
    blank for trunk calls made with shortcut dialing. 
    When a caller dials a CDR account code before the shortcut dialing 
    number, the CDR account code is recorded in CDR.  
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1138 AAR/ARS shortcut dialing 
    20
    nCall Management Systems (CMS)
    Because the AAR or ARS access code is not used in shortcut dialing, there 
    is no feature access code on CMS records to indicate outgoing trunk calls. 
    nCall vectoring
    In a 5-digit dialing plan, a message step in a vector cannot be updated to 
    reflect a 6-digit shortcut number.
    nCoverage of Calls Redirected Off Net
    You can use shortcut dialing for an off-net destination on a coverage path. 
    On networks where 6 or more digits are required, you can use the Remote 
    Call Coverage Table even for on-switch coverage points. On a large 
    system, however, you may reach the maximum number of remote coverage 
    points.
    nDistributed Communications System (DCS)
    DCS feature transparency is lost on a shortcut dialing call.
    nDeluxe paging
    Dial the full extension to send a deluxe page. The page may be answered 
    with a shortcut dialing number.
    nInterdigit timers
    The short interdigit timer tracks calls to internal extensions if 
    nAAR/ARS shortcut numbers and internal extensions share the same 
    first digit
    nextensions are shorter than the minimum-length shortcut number
    Related topics
    Refer to ‘‘
    Dial Plan Record’’ on page 607 for information on setting up a dial 
    plan.  
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1139 Abbreviated Dialing 
    20
    Abbreviated Dialing
    Abbreviated Dialing (AD) provides easy access to selected numbers by reducing 
    the number of digits users have to dial to place a call. Instead of dialing the entire 
    number, the user dials a short code to access the number. The system then dials the 
    stored number automatically. You can assign abbreviated dialing buttons to 
    phones, so users can dial frequently-called numbers by pressing a single button. 
    You can also assign privileged numbers to abbreviated dialing lists, so you can 
    allow a user to place calls to numbers that might otherwise be restricted.
    !SECURITY ALERT:
    Privileged group-number, system-number, and enhanced-number lists 
    provide access to numbers that typically would be restricted.
    List types
    You can store phone numbers in 4 different types of abbreviated dialing lists:
    npersonal
    ngroup
    nsystem
    nenhanced
    Your switch type and version determines which lists you have available and how 
    many entries you can have on each list. You can assign up to 3 AD lists to each 
    user (extension). The 3 lists can be made up of any combination of a system list, 
    an enhanced list, up to 3 personal lists, or up to 3 group lists. Each abbreviated 
    dialing entry can have up to 24 characters.
    Personal lists
    You can provide personal lists to phone users who need their own set of 
    stored numbers. You determine which users have access to a personal list 
    and the size of each list. Either you or the user can assign phone numbers to 
    personal lists. A personal list is created automatically when you assign the 
    list to an individual phone. Each user can have up to 3 personal lists. Note 
    that you cannot assign personal list to the attendant. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1140 Abbreviated Dialing 
    20
    Group lists
    You can define group lists for groups or departments, such as purchasing or 
    human resources, where members of the group have the need to frequently 
    dial the same numbers. You determine which users have access to group 
    lists and each user may have access to up to 3 group lists. You can program 
    the list or you can designate a user in each group to program the list. You 
    specify this designated user on the Abbreviated Dialing Group List screen.
    System lists
    You can define one system list for the entire organization. Most 
    administrators assign this list to every phone and allows everyone in the 
    organization to use the list. If you choose to let everyone use the system 
    list, you should only add numbers to the list that anyone in your 
    organization may call. For example, you may want to add an emergency 
    phone number or phone numbers for other office locations to this list. 
    The system list can contain up to 100 entries and can only be changed by a 
    system administrator. 
    Enhanced lists
    Enhanced-number lists are used by telephone users, data-terminal users, 
    and attendants who need more list entries than those allowed in 
    group-number and system-number lists. One enhanced-number list is 
    allowed per system in addition to the system-number list. The 
    enhanced-number list can contain any number or dial-access code. You 
    administer the enhanced-number lists and determine which users can 
    access the list.
    Considerations
    nYou cannot remove a telephone or attendant if it is designated as the 
    extension number that is permitted to program a group-number list.
    nWhen using an AD button to access a messaging system, the user’s login 
    and password should not be assigned to the button. The system ignores 
    button entries after the messaging access number.
    nYou can use an abbreviated dialing list at any time during incoming or 
    outgoing calls. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1141 Abbreviated Dialing 
    20
    Interactions
    nLast Number Dialed
    The Last Number Dialed feature redials the same number a user just dialed, 
    even if the user accessed an abbreviated dialing list for the previous call. 
    However, if the last dialed string includes any special characters (such as 
    indefinite wait, mark, pause, suppress, or wait) these characters are ignored 
    by last-number-dialed call.
    If the previously-called number was in an AD privileged list, and if the user 
    is not normally allowed to dial the number because of his or her class of 
    restriction, they cannot redial the number using Last Number Dialed. To 
    redial the number, the user must again access the AD privileged list.
    Related topics
    Refer to ‘‘
    Adding abbreviated dialing lists’’ on page 92 for instructions on 
    creating abbreviated dialing lists.
    Refer to ‘‘
    Abbreviated Dialing List’’ on page 473 for detailed descriptions of the 
    fields on the abbreviated dialing screens. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1142 Access security gateway 
    20
    Access security gateway
    Access Security Gateway (ASG) prevents unauthorized access by requiring the 
    use of the ASG Key for logging into the system. The ASG Key can be:
    na hand-held device, or
    na software module you load on the PC you use for accessing the system.
    Detailed Description
    Authentication is successful only when DEFINITY ECS and ASG communicate 
    with a compatible key. The challenge/response negotiation starts after establishing 
    an RS-232 session and you enter a valid DEFINITY ECS login ID. The 
    authentication transaction consists of a challenge, issued by DEFINITY ECS and 
    based on the login ID entered by you, followed by the expected response, again 
    entered by you. The core of this transaction is a secret key, which is 
    information-possessed by both the lock (ASG) and the key. Interception of either 
    the challenge or response during transmission does not compromise the security 
    of the system. The relevance of the authentication token used to perform the 
    challenge/response is limited to the current challenge/response exchange 
    (session).
    NOTE:
    ASG does not protect login access to a Multiple Application Platform for 
    DEFINITY (MAPD).      
    The supported key consists of a hand-held encryption-generating device (ASG 
    Key). The key (response generator) device is pre-programmed with the 
    appropriate secret key to communicate with corresponding ASG protected login 
    IDs on DEFINITY ECS.
    The BCS Products Security Handbook contains information about:
    ntoll fraud and what you can do to prevent it.
    nmethods people use to gain access to your system, how to detect toll fraud, 
    and what to do if you suspect that your system has been compromised.
    nsecurity information for many Lucent Technologies products, so you can be 
    sure that all of your telecommunications equipment is secure.
    nsecurity checklists for each of these products. You should go through these 
    with your Lucent representative for each piece of equipment you use. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1143 Access security gateway 
    20
    Interactions
    nCustomer Access to INADS Port
    If access to the INADS port is disabled on a system-wide basis, 
    administering access to the SYSAM-RMT or INADS port, through ASG, 
    does not override the INADS port restriction. Administration does not 
    prohibit assignment of ASG to the SYSAM-RMT or INADS port. 
    However, in a configuration where this method of access is blocked, you 
    will be denied access to the system through the SYSAM-RMT or INADS 
    port even if you attempt to access the port using a valid ASG login ID.
    If access to the INADS port has been disabled on a login basis, 
    administering access to the SYSAM-RMT or INADS port, via ASG, will 
    not override the INADS port restriction.
    nLogin Administration
    The standard user interface for DEFINITY ECS login administration has 
    not been modified by ASG. Also, the standard DEFINITY ECS login user 
    interface is maintained in cases where ASG parameters have not been 
    administered for the login and/or port.
    nSecurity Violation Notification
    ASG does not support an interface to SVN. Session rejection events do not 
    appear in the monitor security-violations login report and referral calls are 
    not spawned in the event that the number of rejected ASG sessions exceeds 
    the threshold/time interval criteria imposed by SVN.
    nSecurity Measurements
    ASG session establishment or reject events do not increment the Successful 
    Logins, Invalid Attempts, Invalid IDs, Forced Disconnects, Login Security 
    Violations or Trivial Attempts counters maintained for the list 
    measurements security-violations detail report. Additionally, login specific 
    information maintained by the measurements security-violations summary 
    report does not include ASG related data.
    Related topics
    Refer to ‘‘
    Using access security gateway’’ on page 333 for instructions. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1144 Administered Connections 
    20
    Administered Connections
    An Administered Connection (AC) is a connection between 2 access or data 
    endpoints. DEFINITY ECS automatically establishes the connection based on the 
    attributes you administer. An AC provides the following capabilities:
    nSupport of both permanent and scheduled connections
    nAuto Restoration (preserving the active session) for connections routed 
    over Software Defined Data Network (SDDN) trunks
    nAdministrable retry interval (from 1 to 60 minutes) per AC
    nAdministrable alarm strategy per AC
    nEstablishment/retry/auto restoration order based on administered priority
    Detailed description
    The SDDN provides virtual private-line connectivity using the AT&T Switched 
    Network. Access to the service is provided via an Integrated Services Digital 
    Network (ISDN) trunk group whose Service Type field is 
    SDDN. The system uses 
    the Destination field on the Administered Connection screen to route calls when 
    AC is active, based on associated authorized time-of-day fields. 
    Establish an AC between the following:
    nTwo endpoints on the same switch
    nTwo endpoints in the same private network, but on different switches
    nOne endpoint on the controlling switch and another endpoint off the private 
    network
    In all configurations, administer the AC on the switch that has the originating 
    endpoint. For an AC in a private network, if the two endpoints are on two different 
    switches, normally the connection routes via Automatic Alternate Routing (AAR) 
    through tie trunks (ISDN, DS1, or analog tie trunks) and intermediate switches. If 
    required, route the connection via Automatic Route Selection (ARS) and 
    Generalized Route Selection (GRS) through the public network. The call routes 
    over associated ISDN trunks. When the far-end answers, a connection occurs 
    between the far-end and the near-end extension in the Originator field on the 
    Administered Connection screen.
    Access endpoints
    Access endpoints are non-signaling trunk ports. They neither generate signaling to 
    the far-end of the trunk nor respond to signaling from the far-end. Designate an 
    access endpoint as the originating endpoint or destination endpoint in an AC.  
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1145 Administered Connections 
    20
    Typical AC applications
    The following are typical AC applications:
    nA local data endpoint connection to a local or remote-access endpoint. 
    Examples: a modular processor data module (MPDM) ACCUNET digital 
    service connecting to SDDN via an ISDN trunk-group DS1 port; an 
    MPDM ACCUNET digital service connecting to an ACCUNET Switched 
    56 Service via a DS1 port.
    nA local-access endpoint connecting to a local or remote-access endpoint. 
    Examples: a DSO cross-connect and a 4-wire leased-line modem to a 
    4-wire modem connection via an analog tie trunk.
    nA local data endpoint connecting to a local or remote data endpoint such as 
    a connection between two 3270 data modules.
    NOTE:
    The following guidelines do not include AAR and ARS, or GRS 
    administration information for routing AC calls over trunk groups. 
    See the respective feature elsewhere in this book for that information.
    Establishing Administered Connections
    The originating switch attempts to establish an AC only if one of the following 
    conditions exist:
    nAC is active.
    nAC is due to be active (either a permanent AC or time-of-day requirements 
    are satisfied if it is a scheduled AC).
    nOriginating endpoint is in-service or idle state.
    If the originating endpoint is not in service or is idle, no activity takes place for the 
    AC until the endpoint transitions to the desired state. The originating switch uses 
    the destination address to route the call to the desired endpoint. When the switch 
    establishes 2 or more ACs at the same time, the switch arranges the connections in 
    order of priority.
    AC attempts can fail for the following reasons:
    nResources are unavailable to route to the destination.
    nA required conversion resource is not available.
    nAccess is denied by Class of Restriction (COR), Facilities Restriction 
    Level (FRL), or Bearer Capability Class (BCC). Or, an attempt is made to 
    route voice-band-data over SDDN trunks in the public switch network.
    nDestination address is incorrect.
    nDestination endpoint is busy.
    nOther network or signaling failures occur. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1146 Administered Connections 
    20
    In the event of a failure, an error is entered into the error log, which generates an 
    alarm, if it is warranted by your alarming strategy. You can display AC failures via 
    the
     status administered-connection command.
    As long as an AC is due to be active, the originating switch continues to establish 
    an AC unless the attempt fails because of an administrative error (for example, a 
    wrong number) or service-blocking condition (for example, outgoing calls 
    barred).
    nThe frequency with which failed attempts are retried is determined by the 
    administered retry interval (1 to 60 minutes) for each AC.
    nRetries are made after the retry interval has elapsed regardless of the 
    restorable attribute of the AC.
    nACs are retried in priority order.
    nWhen you change the time of day on the switch, an attempt is made to 
    establish all ACs in the waiting-for-retry state.
    Dropping Administered Connections
    An AC remains active until one of the following occurs:
    nThe AC is changed, disabled, or removed.
    nThe time-of-day requirements of a scheduled AC are no longer satisfied.
    nOne of the endpoints drops the connection. This could be because of user 
    action (in the case of a data endpoint), maintenance activity resulting from 
    an endpoint failure, busying out of the endpoint, or handshake failure. If 
    the endpoints are incompatible, the connection is successful until 
    handshake failure occurs.
    NOTE:
    An AC between access endpoints remains connected even if the 
    attached access equipment fails to handshake.
    nAn interruption (for example, facility failure) occurs between the 
    endpoints.
    If an AC drops because it was disabled/removed or is no longer due to be active, 
    no action is taken. If an AC drops because of changed AC attributes, an immediate 
    attempt is made to establish the connection with the changed attributes if it is still 
    due to be active. Existing entries in the error/alarm log are resolved if they no 
    longer apply. If handshake failure resulted in the dropping of the connection, in 
    the case of an AC involving at least one data endpoint, no action is taken for that 
    AC until the change administered-connection
     command is executed. 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual