Home > Toshiba > Telephone > Toshiba Perception E Ex Digital Pbx Installation And Maintenance Manual

Toshiba Perception E Ex Digital Pbx Installation And Maintenance Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Toshiba Perception E Ex Digital Pbx Installation And Maintenance Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 566 Toshiba manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							CHAPTER 3 
    DATA INPUT/OUTPUT PROCEDURES 
    1. General 
    1.01 
    Prior to actual system programming, cus- 
    tomer data is recorded on special System Record 
    Sheets which correspond with the prompts outlined 
    in the data block tables contained in this manual 
    (see Appendix 1). Afterthese sheets arecompleted 
    and after the PERCEPTION, or PERCEPTlONe, 
    system is connected to the data terminal (see 
    Chapter 2), data can be entered into the system via 
    the Data Input Utility Programs. Once the informa- 
    tion is input, it can be printed out via Data Output 
    Procedures and tested via special Maintenance 
    Procedures. The Utility Programs used to program 
    and maintain customer data are summarized as 
    follows: 
    1) Data Input Procedures-used when entering 
    or making changes to Customer Data. 
    2) Data Output Procedures-used for obtaining 
    printouts of the contents of the Customer Data 
    memory. 
    3) Maintenance Procedures-used when test- 
    ing the system. The System FD contains only 
    the 
    DSYS, DTRF, and TPER maintenance 
    programs, while the maintenance FD con- 
    tains all other maintenance programs. 
    1.02 Within this manual, tables dealing with Data 
    input and Data Output Procedures are presented 
    collectively under each chapter category of data 
    (e.g., System Data, Station Data, etc.). This pro- 
    vides a convenient reference to all information that 
    deals with a specific type of data. Maintenance 
    Procedures, consisting of the Data Dump and 
    various test procedures, are grouped into their own 
    chapter at the end of this manual. For convenient 
    reference, each Utility Program’s location within 
    this manual is listed in Table 3-l. 
    1.03 Each Utility Program has a4-letter mnemonic 
    name that is used to identify it and to call it up from 
    the disk on which it is contained. Each program’s 
    PROGRAMMING PROCEDURES 
    SECTION 200-255-303 
    JANUARY 1993 
    mnemonic name is included in the listing in Table 3- 
    1. Before a Utility Program can be called up, an 
    Authorization Procedure must be performed. 
    2. Data Input 
    2.01 
    Before PERCEPTION,~,, system data can 
    be input, option selections must be made and then 
    listed on the System Record Sheets (see Appendix 
    1). The System Record will then serve as a pro- 
    gramming guide and installation record. 
    2.02 The System Record contains a form for each 
    Data Input Utility Program. Each form is identified 
    by the Utility Program name and by the program’s 
    corresponding mnemonic that is requested by the 
    system (for example: System Data Block = 
    DSYS 
    Program). 
    2.03 Data input via a Utility Program is accom- 
    plished by responding to the program’s prompts. 
    These prompts are listed in their proper order in the 
    System Record Sheets. Space is provided to rec- 
    ord a response to each prompt. 
    2.04 Refer to each Utility Program’s specific in- 
    structions for an explanation of the possible re- 
    sponses to each prompt. Record each selected 
    response on the program’s corresponding System 
    Record Sheet. 
    2.05 To input new customer data or to change an 
    established database, perform the Authorization 
    Procedure and then enter the mnemonic name of 
    the desired Data Input Utility Program (see Chapter 
    4). Refer to the completed System Record Sheets 
    and input the required information. 
    3. Data Output 
    3.01 
    To print. out data that is contained in the 
    various data blocks of the customer database, 
    perform the Authorization Procedure and then en- 
    ter the mnemonic name of the desired Data Output 
    Utility Program. Within this manual, Data Output 
    programs are grouped next to their related Data 
    Input Program. For detailed instructions on how to 
    print out data, refer to each specific program and 
    program table. 
    3-I  
    						
    							t-cays- 
    PROGRAMMINGPROCEDURES 
    SECTION 200-255-303 
    --: 
    7-w I( 
    JANUARY1993 ., 
    ~~ .,@23 -I&L -7. 
    c. 
    TABLE3-1 
    UTILITYPROGRAMREFERENCEGUIDE 
    DATAINPUTANDOUTPUTPROCEDURES 
    TABLE 1 NAME I MNEM.I PAGE 
    11-2 1 Print DDIU DB I PDIU 11-6 
    11-3 
    I Modem Poolina DB I DMDMI 1 l-8 
    I Print Modem Poolina DB I PMDMI 11-9 
    .:.12-l p Least Cost Routing DB DLC 1 12-1 
    12i;2 - &east Cost Routine DB 1 IDLCl 1 12-3 
    I26 - &east Cost Routing DB 2 1 DLC2 12-8 
    - 12-7 1 Print Least Cost Routing DB 1 PLCR I 12-l 3 
    Lodging/Health Care 
    Features DB 
    I I DHMF 13-2 
    13-2 Print Lodging/Health Care 
    Features DB PHMF 13-3 
    13-3 Message Registration DB DMRD 13-5 
    13-4 Print Message Registration DB PMRD 13-7 
    14-1 I Speed Dial List DB 1 DSDL 1 14-2 
    14-2 I Print Speed Dial List DB 1 PSDL 14-3 
    15-1 1 Traffic Measurement DB 1 DTRF 1 15-2 
    16-l I Alphanumeric Message DB IDMSG I 16-1 
    16-2 
    I rnt Alphanumeric Message PMSC 1 6-2 
    I I 
    I I I 
    3%1 @I ACD/MIS DB I DACM I 17-4. 
    17-2 I Print ACD/MIS DB 1 PACM 1 17-7 
    l&l@ 1 Verifiable Account Codes DB I DVAC I 18-2 
    18-2 
    I Print Verifiable Account 
    Codes DB I I  PVAC 18-4 
    IURES 
    HNEM.  MAINTENANCEPROCE 
    TABLE I NAME 
    19-l Backup Memory Check 
    Entry Proc. 
    19-2 I Data Dump Program 
    Ill 
    I 
    I 
    Electronic and Digital 
    19-3 - 4 Telephone/Attendant Console 
    Test Proc. 
    19-5 Peripheral Equipment 
    Diagnostic Proc. PAGE 
    DMYC 19-1 
    DDMP 19-2 
    lTRM 
    19-4 
    TPER 19-11 
    NOTE: 
    Error codes associated with each data block are listed after each data block table. 
    3-2  
    						
    							PRQGRAMMING PROCEDURES 
    SECTION 200-255-304 
    FEBRUARY 1992 
    CHAPTER 4 
    AUTHORIZATION PROCEDURES/UTILITY 
    PROGRAM USE 
    1. Authorization Procedure 
    1 .Ol Before any Utility Program can be called up, 
    PERCEPTlONe and PERCEPTlONe, systems 
    require an authorization code to be entered. This 
    prevents unauthorized tampering with the Cus- 
    tomer Database. 
    1.02 There are four levels of authorization (each of 
    which has a unique 4-digit code that is assigned in 
    the system memory). Each authorization level al- 
    lows certain input, output, and maintenance proce- 
    dures to be performed. When shipped from the 
    factory, all levels are assigned 0000. Codes are 
    changed with the Authorization Code Change pro- 
    cedure (DCHG). 
    2. Authorization Level Allowances-Data input 
    Procedures 
    2.01 The data input activities that are allowed to 
    each of the four authorization levels are as follows: 
    Level 1: Can do all activities of Levels 2 and 3. 
    Can change the 4-digit codes of Levels 1, 2, 3, 
    and 4. 
    Level 2: Can do all Level 1 activities except change 
    or read out codes for Level 1. 
    Can change Level 2,3, and 4 codes. 
    Level 3: Normally assigned for end user use. 
    Can change: 
    System Data Block 2 
    Class of Service Data Block 
    Station Data Block 
    Attendant Data Block 
    DSS Console Data Block 
    Station Message Detail Recording Data Block 
    Speed Dial List Data 
    Digital Data Interface Unit Data Block 
    Modem Pooling Data Block 
    Alphanumeric Message Data Block 
    Level 4: Normally assigned for ACD Supervisor 
    use. 
    Can change ACD/MIS Data Block. NOTE: 
    No otherauthorization level can access ACD/ 
    MIS Data Block. 
    3. Authorization Level Allowances-Data Out- 
    put Procedures 
    3.01 The entrance of the different authorization 
    codes permits specific customer data to be$nted. 
    The data output activities that are allowed to three 
    of the four authorization levels are as follows: 
    Levels 1, 2, or 3: Print System Data Block 
    Print System Data Block 2 
    Print Class Service Data Block 
    Print Station Data Block 
    Print DSS Console Data Block 
    Print SMDR Data Block 
    Print Digital Data Interface Data Block 
    Print Modem Pooling Data Block 
    Print Speed Dial List Data Block 
    Print Call Pickup Groups 
    Print Hunting Arrangements 
    Print Alphanumeric Message Data Block 
    Levels 2 or 3 only: Print System Data Block 
    Print Access Code Data Block 
    Print Message Center Data Block 
    Print Trunk Group Data Block 
    Print Trunk Data Block 
    Print Toll Restriction Data Block 
    Print Least Cost Routing Data Block 
    Print Lodging/Health Care Features Data Block 
    Print Message Registration Data Block 
    Pri?t Paging Group Data 
    4. Authorization Level Allowances-Mainte- 
    nance Procedures 
    4.01 The maintenance activities that are allowed 
    to three of the four authorization levels are as 
    follows: 
    Levels 1, 2, or 3: Data Dump Program 
    Electronic and Digital Telephone/Attendant 
    Console Test 
    Levels 1 or 2 only: Backup Memory Check Entry 
    Procedure 
    Peripheral Equipment Test 
    4-1  
    						
    							PROGRAMMINGPROCEDURES 
    SECTION 200-255-304 
    FEBRUARY1992 
    5. Execution of Authorization Procedure 
    5.01 To perform the Authorization Procedure: 
    1) 
    2) 
    3) Plug in and power up the data terminal. 
    The system will respond with a copyright and 
    then greater than sign (>). 
    Press the carriage return [9 key. 
    l The system will respond by printing COD 
    and will print several characters in the 
    spaces to be occupied by your next entry 
    (this is done to mask the authorization 
    code). 
    This masking measure is not effective when  IMPORTANT! 
    a CRT is used. Be careful not to leave the 
    authorization code displayed on the screen. 
    4) Enter the 4-digit authorization code (0000 
    default value), followed by a 
    q . 
    l The system will print: 
    ERROR if an invalid code is entered 
    (return to Step 2). 
    OK if a valid code is entered (proceed to 
    request Utility Program). 
    6. Utility Program Use 
    6.01 After performing the Authorization Procedure 
    and receiving an OK response, enter the mne- 
    monic of the required Utility Program. 
    6.02 After the Utility Program name is entered, the 
    program will be loaded from the disk. When the 
    loading is complete, the system will prompt REQ for 
    Request. 
    6.03 Entering data via a Utility Program is a matter 
    of responding to the prompts given by the system 
    via the data terminal. The prompts and the required 
    responses are mnemonics that are usually abbre- 
    viations of the actual English word required. 
    6.04 If an improper response is made to a prompt, 
    the system will respond with an error message. The 
    error message will be a “?,, when the error is obvious, but in most cases it will be an alphanu- . . 
    mericcode. The alphanumeric code consists of five . . . 
    letters (identifying the program) and two numbers 
    (identifying the error). Error code lists are provided 
    in this manual to explain each error code. 
    6.05 Boxes are used to indicate keys on the pro- 
    gramming terminal. The m (control) key must 
    be held down while simultaneously pressing either 
    key. Press the carriage return key 
    appears. The following keys are 
    available when using Utility Programs (press the 
    5 - pycegr each.code): 
    I nore lrne entered-the same prompt 
    will be repeated. 
    mEBackspace will allow you to overwrite the 
    W-May be entered at anytime-the system will  previous character(s). 
    stoo execution and return to the REQ oromot. 
    F-Exits the program-ends the u.se of bne 
    utility. The system will respond with SAVE. A ‘Y” 
    entry will cause the system to copy all present 
    data onto the disk. If more changes are to be 
    made, enter “N.” 
    NOTE: 
    The above key indications are for Texas ln- 
    struments Silent 700 series terminals. Other *. 
    6.06 When data already exists for a given prompt 
    and a change is not required, entering a 
    q will 
    advance the system to the next prompt without 
    changing existing data. 
    6.07 Tables 5-1 through 19-5 show the format of 
    each Utility Program. Programs are grouped into 
    general categorical areas (e.g., System Data, Fea- 
    ture Data, etc.). Each Data Output program is 
    grouped with its related Data Input program(s). If 
    applicable, each data table is followed by a list 
    explaining the error codes which pertain to that 
    program. Using the appropriate tables as guides, 
    enter data that has been previously recorded in the 
    System Record Sheets. 
    4-2  
    						
    							CHAPTER 5 
    SYSTEM DATA 
    1. Authorization Code Change (Table 5-1) 
    1 .Ol The DCHG Program changes the authoriza- 
    tion codes which are used in the Authorization 
    Procedure. 2. 
    1.02 To use the DCHG Program: 
    Complete the Authorization Procedure (Level 1 
    or 2). Enter: 
    Enter: DCHGm (in response to the OK prompt). 
    The next prompt will be: LiXXXX (Level 1 au- 
    thorization code). (XXXX = present code.) 
    New L2 code (4 digits) 
    q . j 
    L3XXXX (Level 3 authorization 
    code). 
    Enter: 
    (XXXX = present code.) (XXXX = present code.) 
    New L3 code (4 digits) 
    q , 
    L4XXXX (Level 4 authorization 
    code). 
    NOTES: Enter: New L4 code (4 digits) 
    q , 
    I. If a Level 2 authorization code was given En ten m m (to exit the program). 
    PROGRAMMING PROCEDURES 
    SECTION 200-255-305 
    JANUARY 1993 
    above, L 1 willnotbe output. Go to the next 
    prompt (L2). 
    If a Level 3 authorization code was en- 
    tered above, an error message will be 
    given, Level 3 cannot change the authori- 
    zation codes. 
    Enter: New L 1 code (4 digits) a. 
    L2XXXX (Level 2 authorization 
    code). 
    TABLE 5-l 
    Procedure - Authorization Code Change 
    Authorization Procedure must be completed. If an OK response is received, proceed as follows: 
    NOTES: 
    1. 
    2. a. An error message will be received if Level3 or Level4 was given in the Authorization Procedure. 
    6. If Level2 was given in the Authorization Procedure, L 1 will be omitted and the response to CHG 
    will be: L2 = XXXX. 
    c. XXXX = Present code of the designated level 1 - 4. 
    The possible responses are: 
    YYYY = 
    (9 This new access code will replace the existing XXXX. 
    = Carriage Return - the code will not be changed and the system will issue the next 
    prompt. 
    = 
    Ignore line entered. 
    = Backspace. 
    - Stop printing and return to REQ. 
    = Exit program. 
    3. Enter: Y or N. 
    5-I  
    						
    							PROGRAMMINGPROCEDURES 
    SECTION 200-255-305 
    JANUARY1993 
    2. System Data Block (Table 5-2) 
    2.01 The System Data Block (DSYS Program) 
    contains miscellaneous data entries that apply to 
    the system as a whole rather than to any individual 
    station or trunk. Data is entered as follows: 
    REQ (Request)-Indicates that the program has 
    loaded. Since data is always present, only the 
    CHG response is possible. 
    EXP (Expansion Cabinet)-Indicates whether or 
    not an expansion cabinet is installed. 
    Enter: Y: if an expansion cabinet is installed. 
    N: if only the basic cabinet is installed. 
    NOTES: 
    1. Y must be entered to enable the system to 
    provide up to 20 simultaneous confer- 
    ences in a cabinet using a second NPRU 
    PCB. 
    2. If N is entered, then only ten simultaneous 
    conferences will be supported. 
    NOD (Number of Drives)--Indicates whether one 
    or two disk drives are being used. (Two drives 
    are used only with D.02 or later software ver- 
    sions.) 
    Enter: 1: 
    ;$s& ..q: 
    M%LwzG if only a single drive (FDDO) is used. 
    if two drives (FDDO and FDDl) are 
    used. (The system will not access 
    maintenance programs in FDDl if 1 is 
    entered, unless the Maintenance FD 
    is used in place of the System FD.) 
    TOR (Time of Daily Routine)-Specifies the time 
    of day that the daily routine task (System Dump) 
    will run (listed after the next prompt). 
    Enter: 24-hour clock time. 
    (For example: 1315 = 1:15 pm.) 
    DRT (Daily Routine Task)-Specifies whether or 
    not a System Data Dump is to be performed at 
    the time specified in response to TOR. 
    Enter: DDMP (Data Dump) or NONE. 
    TEN (Tenant Service)-Specifies whether or not 
    tenant service is to be used. If “Y” is entered, 
    incoming trunk calls, dial calls, intercepts, etc. 
    will be routed to the proper attendant console 
    (Att. #O for Tenant #0, and Att. #l for Tenant #l). 
    Tenant designation for each telephone and trunk 
    is selected in response to the TEN prompt in the 
    5-2 following Data Blocks: Electronic/Digital Tele- 
    phone (DEKT Program), Standard Telephone 
    (DSTT Program), and Trunk Group (DTGP Pro- 
    gram). If “N” is entered, then the attendant 
    consoles will operate in the load sharing mode. 
    Enter: Y or N. 
    NOTE: 
    In tenant service, when the Attendant console 
    transfers a call to a station, if the call RNAs and 
    recalls back to the Attendant, it will recall to the 
    original Attendant that transferred the call. In 
    some cases this may mean the call will recall 
    to the Attendant that the station is not as- 
    signed to. 
    ICPl (Intercept #l)--If the attendant takes control 
    of a trunk group by using the trunk group access 
    control feature, then stations that place calls to 
    that trunk group will be routed to Intercept #Il. 
    This entry defines ICPl as being either overflow 
    tone (OFL) or the attendant (ATT). 
    Enter: ATT or OFL. 
    ICP2 (Intercept #2)-An incoming call from a DID, 
    TIE, or CCSA trunk to a non-existing DN will be 
    routed to Intercept #2 when the system is in day 
    service and to overflow tone when night service 
    is active. This entry defines ICP2 as being either 
    overflow tone (OFL), the attendant (An), a 
    standard station, or an answering device con- 
    nected to a trunk or a standard station pdrt 
    (TNNX, LNNX). 
    Enter: AlT, OFL, TNNX, or LNNX. 
    ICP3 (Intercept #3)-A call that is’violating trunk 
    access restrictions will be routed to Intercept #3 
    when the system is in day service and to overflow 
    tone when night service is active. This entry 
    defines ICP3 as being either ovetflow tone or the 
    attendant. 
    Enter: AIT or OFL. 
    LCR (Least Cost Routing)-A 7 response en- 
    ables Least Cost Routing in the system. Refer to 
    the Least Cost Routing Data Block DLCI and 
    DLC2 Programs. 
    Enter: Y or N. 
    APG (All Page Access Code)-Defines the All 
    Page access code. The use of this code will 
    simultaneously access Internal Group 0 Paging  
    						
    							PROGRAMMING PROCEDURES 
    SECTION 200-255-305 
    JANUARY 1993 
    AAT (Not Used): 
    Enter: m. 
    APX (Not Used): 
    Enter: (9. 
    LNl (Listed Directory Number #l)-Defines the 
    LDN #l , which is used with the DID feature when 
    routing a call to the attendant console (maxi- 
    mum: 4 digits). 
    Enter: 1, 2, 3, or 4 digits or NONE. 
    LN2 (Listed Directory Number #2-Defines the 
    LDN #2, which is used with the DID feature when 
    routing a call to the attendant console (maxi- 
    mum: 4 digits). 
    Enter: 1, 2, 3, or 4 digits or NONE. 
    NT1 (LDN #1 Night Number)-Defines the desti- 
    nation to which LDN #l calls will be routed when 
    the system is in night service (DN or Universal 
    Night Answer). 
    Enter: 1,2, 3, or 4 digits or UNA. 
    NT2 (LDN #2 Night Number)- The response to 
    this prompt defines the destination to which LDN 
    #2 calls will be routed when the system is in night 
    service (DN or UNA). 
    Enter: 1, 2, 3, or 4 digits or UNA. 
    BLFl (Busy Lamp Field #l)-Defines one of the 
    hundreds groups that is to be displayed by the 
    console BLF. 
    Enter: 1 digit (1 - 9). 
    BLF2 (Busy Lamp Field #P)-Defines one of the 
    hundreds groups that is to be displayed by the 
    console BLF. 
    Enter: 1 digit (1 - 9). 
    OFLl (Overflow DN-Attendant Console #IO)- 
    Defines the destination for calls that are rerouted 
    from attendant console #0 during an overflow 
    condition. 
    Enter: 1, 2, 3, or 4 digits or NONE (UNA). 
    NOTE: 
    This data may also be changed via the atten- 
    dant console. 
    OFL2 (Overflow DN-Attendant Console #l)- 
    Defines the destination for calls that are rerouted 
    from attendant console #l during an overflow 
    condition. 
    Enter: 1, 2, 3, or 4 digits, or NONE (UNA). 
    NOTES: 
    1. The overfiow destination can also be 
    changed at the attendant console. 
    2. OF1 2 applies to tenant 1 and wiiinotprint 
    out when the system is not in tenant ser- 
    vice. -. 
    MMP (Meet-me Page Access Code)-Defines 
    the access code that is used by the attendant or 
    attendant-position electronic/digital telephone to 
    “park” a call for the Meet-me Page feature (maxi- 
    mum: 3 digits; the system default is 10). 
    Enter: 1,2, or 3 digits. 
    REM (Remote Access DN)-Defines the DN that 
    is used to assign a trunk for “Remote Access to 
    Services” operation (maximum: 4 digits). The 
    DN must be the same as an assigned station DN. 
    Refer to the note at the NIT prompt in the DTRK 
    Program . 
    Enter: 1,2, 3, or 4 digits, or NONE. 
    RAC (Remote Access to Services Change 
    Code)-Defines the access code that must be 
    entered before the system’s remote access code 
    can be changed. The remote access code can 
    be changed from either an attendant console or 
    an attendant-position electronic telephone after 
    entering the change code. The remote access 
    code is used by outside callers who want to 
    access the system’s remote access feature. 
    Enter: 1, 2, or 3 digits. 
    ACC* (*Access Code)-Defines the digit that is to 
    be used by a rotary dial telephone in place of the 
    a button. 
    Enter: 1 digit or NONE. 
    NOTE: 
    AAC * must not conflict with either the DN or 
    other access codes-it is not checked by 
    software. 
    5-3  
    						
    							PROGRAMMING PROCEDURES 
    SECTION 200-255-305 
    JANUARY 1993 
    ACC# (# Access Code)-Defines the digit that is that are released due to the DPT timer will hear 
    to be used by a rotary dial telephone in place of overflow tone. This timeout is used with the line 
    the 1 button. lockout feature. 
    Enter: 1 digit or NONE. Enter: Time in seconds. 
    NOTE: 
    AAC# must not conflict with either the DN or 
    other access codes-it is not checked by the 
    software. NOTES: 
    1. The Dial Pause Timeout also controls the 
    release of an idle attendant console m 
    button. 
    COT (Camp-on or Call Waiting Timeout)-De- 
    fines the Camp-on and Call Waiting feature 
    timeout period. 
    Enter: Time in seconds. 
    For example: 30. 2. Outbound calls can send DTMF tones 
    until the DPTtimerexpires. Once the timer 
    expires, it changes to the transfer mode. 
    RNA (Ring No Answer Timeout)-Defines the 
    Ring No Answer timeout period for attendant- 
    handled calls, 
    Enter: Time in seconds. 
    NOTE: PBT (Pushbutton Timeout)-Defines the maxi- 
    mum pause that is allowed between digits that 
    are dialed on a trunk from a DTMF telephone. 
    The transmit voice path from a DTMF telephone 
    to a trunk is broken during dialing. The PBT timer 
    determines how quickly the path is restored 
    and therefore, should be set as short as 
    possible. 
    Enter: Time in seconds. 
    See Note following TEN prompt on page 5-2. 
    AOF (Attendant Overflow Timeout)-Defines the 
    timeout period for the attendant overflow facility. 
    Enter: Time in seconds, 
    CFD (Call Forward No Answer Timeout)-De- 
    fines the Call Forward No Answer timeout 
    period. 
    Enter: Time in seconds. LLO (Line Lockout Time)-Defines the length of 
    time that overflow tone is applied to a station 
    after having been released due to the DPT timer. 
    After this timeout occurs,’ the station will hear 
    silence. When Emergency Ringdown is used, a 
    transfer to the Emergency Ringdown destination 
    will not occur until the LLO timeout period has 
    elapsed. 
    Enter: Time in seconds. 
    NOTE: 
    The CFD timeout period must be less than 
    RNA time or else RNA time will be in effect. ACB (Automatic Callback Reserve Time)-De- 
    fines the length of time that the called station or 
    trunk in an AC6 call is reserved for the caller. 
    Enter: Time in seconds. 
    HLD (2500 Hold/Electronic/Digital Telephone 
    Park Timeout)-Defines the timeout period for 
    the recall of a held call to a single line telephone 
    or of a parked call to an electronic/digital 
    telephone. 
    Enter: Time in seconds or NONE. 
    DPT (Dial Pause Timeout)-Defines the maxi- 
    mum pause that is allowed before the first digit is 
    dialed or between other digits that are dialed 
    from an electronic/digital telephone. Stations DLY (Delay Ring Timer)-Defines the time period 
    between the ringing of Direct-in Line day an- 
    swering stations programmed to ring immedi- 
    ately, and stations set for delayed ringing. For 
    example, if stations 200 and 201 are set for 
    immediate ringing, and station 202 is set for 
    delayed ringing, then when a call rings in, the 
    delayed ring-time period must elapse before 
    station 202 will ring. 
    Enter: Time in seconds (0 - 99). 
    5-4  
    						
    							PROGRAMMINGPROCEDURES 
    SECTION 200-255-305 
    FEBRUARY1992 
    account code that has not been entered before 
    or during the call. 
    Enter: Time in seconds (0 M 255). 
    HFS (Handsfree Answerback Station)-A ‘Y” 
    response allows calls from any station to voice- 
    announce to an electronic/digital telephone that 
    is equipped with Handsfree Answerback. 
    Enter: Y or N. 
    HFA (Handsfree AnswerbackAttendant)-A Y” 
    response allows calls from the attendant to voice- 
    announce to an electronic/digital telephone that 
    is equipped with Handsfree Answerback. 
    Enter: Y or N. 
    MDR (SMDR Equipped)-A”Y” response enables 
    SMDR and activates the MDR alarm on the 
    console. 
    Enter: Y or N. 
    UNAO (Universal Night Answer Zone 0)-A re- 
    sponse of 0 assigns UNA Zone 0 to Tenant 0. A 
    response of 1 assigns UNA Zone 0 to Tenant 1. 
    (This prompt will only appear if TEN was an- 
    swered Y.) 
    Enter: TEN0 or TENl. 
    UNAI (Universal Night Answer Zone 1)-A re- 
    sponse of 0 assigns UNA Zone 1 to Tenant 0. A 
    response of 1 assigns UNA Zone 1 to Tenant 1. 
    (This prompt will only appear if TEN was an- 
    swered Y.) 
    Enter: TEN0 or TENl. 
    5-5  
    						
    							PROGRAMMING PROCEDURES 
    SECTION 200-255-305 
    FEBRUARY 1992 
    TABLE 5-2 
    Procedure - System Data Block 
    Authorization Procedure must be completed. If an OK response is received, proceed as follows: 
    Meet-me Page Access Code 
    Remote Access DN 
    Remote Access to Services Change Code 
    “*‘I Access Code 
    ‘W Access Code 
    Camp-on (or CWT) Timeout 
    Ring No Answer Timeout REM 
    RAC 
    ACC* 
    ACC# 
    COT 
    RNA 1 - 4 digits or NONE (NONE) 
    1 - 3 digits (#*2) 
    1 digit or NONE (NONE) 
    1 digit or NONE (NONE) 
    0 - 255 seconds (50) 
    0 - 255 seconds (31) 5&6 
    5&6 
    Default values are noted in parentheses (). (continued) 
    5-6  
    						
    All Toshiba manuals Comments (0)

    Related Manuals for Toshiba Perception E Ex Digital Pbx Installation And Maintenance Manual