All rights reserved. September, 2003.
The information in this document is subject to change without noti ce. The statements, configurati ons, technical data, and
recommendations in this document are believed to be accurate and reliable, but are presented without express or implied
warranty. Users must take full responsibility for their applications of any products specified in this document. The
information in this document is proprietary to Nortel Networks NA Inc.
Trademarks
NORT EL NETWORKS is a trademark of Nortel Networks.
Microsoft, MS, MS-DOS, Windows, and W indows NT are re gistered tr ademarks of Mi crosoft Corporation.
Symbol, Spe ctrum24, and NetVision are re gistered trademarks of Sym bol Technologie s, Inc.
All other trademarks and registered trademarks are the property of th eir respective owners.
P0604629 03
Software licensing
The Apache Software License, Version 1.1
Copyright (c) 2000-2002 The Apache Software Foundation. All rights reserved.
Redistribution an d use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1Redistributions of source code must retain the above copyright notice, this list of conditions
and the following disclaim er.
2Redistributions in bina ry form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials provided
with the distribution.
3The end-user documentation inc luded with the redistributi on, if any, must include the
following acknowledgment: “This product includes software developed by the Apache
Software Foundation (ht tp://www.apache.org/).”
Alternately, this acknowledgment may appear in the software itse lf, if and wherever such
third-party ackn owledgments normally appear.
3
4The names “Apache” and “Apache Software Foundation” must not be used to endorse or
promote products derived from this software without prior written permission. For written
permission, please contact apache@apache.org.
5Products derived fr om this software may not be called “Apache” , nor may “Apache” appea r in
their name, without prior written permission of the Apache Software Foun dation.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTIC ULAR PURPOSE AR E DISCLAIMED.
IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
====================================================================
This software consists of voluntary contributions made by many individuals on behalf of the
Apache Software Foundatio n. For more information on the Apache Software Foundation , ple ase
see <http://www.apache.org/>.
Portions of this soft ware are based upon public domain software originally written at the National
Center for Supercomputing Applications, University of Illinois, Urbana-Champaign.
Business Communications Manager 3.5 Programming Operations Guide
Figure 139 SWCA indicators, incoming call from a line (auto SWCA association is on) . . 409
Figure 140 SWCA indicators, incoming call from an intercom (auto SWCA association for
This guide explains how to program your Business Communications Manager system. For more
information about the Business Communications Manager document suite, refer to “Related
publications” on page 56.
This issue of the document reflects the added functionality built into the Business
Communications Manager 3.5 release. The hardware, and new and updated features described in
this and other documentation f rom this suite requires that your Busine ss Communica tions
Manager system is running release 3.5.
This section includes the following general information:
•“Before you begin” on page 48
•“Symbols used in this guide” on page 48
•“Text conventions ” on page 49
•“About the buttons on your telephone s” on page 49
•“Acronyms used in this guide” on page 51
•“Related publications” on page 56
•“System documentation map” on page 57
•“How to get help” on page 62
47
Warning: Ensure that you make a complete backup of your data before attempting to
upgrade your sys tem. R efer to the upgrade guide that comes with the upgrade package for
instructions about upgrading the Business Communications Manager software from one
version to another.
Note: The section “Software lice nsing” on page 3 contains software licensi ng
information.
Note: Hardware: BCM200 and BCM400 hardware is shippe d wi th 3.0 or lat er s oftware,
only.
Note: Network: All the Business Communicati ons Manag ers in your private network
must be running the same level of software to ensure that remote gateways and other
networking protocols are compatible. Meridian 1 systems connected to your network
must be running t he ITG softwa re that is coordinat ed with this release . Ask your Meridi an
distributor for details.
After you perform an upgrade, always check that your gateways are still correctly
configured for local and remote connections.
Business Communications Manager 3.5 Programming Operations Guide
48Preface
Before you begi n
This gu i de is in t e n ded for two m ain au dien c es:
•the operator who manages the overall telephony operations of the syst em
•the system administ rator who manages the data and network operations of the system
This guide assumes the following:
•There is an existing plan outlining the telephony and data requirements for your Business
Communications Manager syst em.
•The Business Communications Manager is installed and initialized, and all hardware appears
to be working. External lines and wiring for terminals a nd sets is connected to the appropr iate
media bay modules on the Business Communicati ons Manager.
•That all operators ha ve a working knowledge of the Windows operating system and graphical
user interfaces .
•That operator s managin g the data portion of the syst em are famili ar wit h networ k management
and applications.
Symbols used in this guide
This guide uses symbols to draw your attention to import ant information. The following symbols
appear in this guide:
Caution: Caution Symbol
Alerts you to conditions where you can damage the equipm ent.
Danger: Electrical Shock Hazar d Symbol
Alerts you to conditions where you can get an elect rical shock.
Warning: Warnin g Sy mbo l
Alerts you to conditions where you can cause the system to fail or work improperly.
Note: Note Symbol
A Note alerts you to important information.
Tip: Tip Symbol
Alerts you to additional information that can help you perform a task.
!
P0604629 03
Security N o te: This symbol indicates a point of system security where a default shoul d
be changed, or where the administrator needs to make a decision about the level of
security required for the system.
Text conventions
This guide uses the following text conventions:
angle brackets (< >)Indicates that you choose the text to enter based on the description
Preface49
inside the brackets. Do not type the brac kets when entering the
command.
Example: If the command syntax is:
ping<ip_address>
you enter: ping 192.32.10.12
bold Courier text
Indicates command names and options and text that you need to enter.
Example: Use the
dinfo command.
Example: Enter show ip {alerts|routes}.
italic textIndicates book titles
plain Courier
text
FEATURE
HOLD
RELEASE
Indicates command syntax and system output, for example, prompts
and system messages.
Example:
Set Trap Monitor Filters
Indicates that you press the button with the coordinating icon on
whichever set you are using. (Refer to “About the buttons on your
telephones” .)
About the buttons on your telephones
This guide uses text designator s to indicate key pad feature buttons, such as Feature, Hold and
Release. The Business Terminal Series (BST) telephones and the IP telephones all use icons to
label these butto ns. Ta ble 1 shows the icons that appear f or each function on the differ ent types of
Nortel Networks digital te lephones. Note that the T7316 and T7208 have a separate button for
mute functions. The IP telephones and the T7316E have separate buttons for both mute and
handsfree.
Table 1 Telephone buttons
Button Name
Feature
Handsfree
Mute
Hold
Release
1
2
3
4
T7000,T7100, T7208, T7316, T7316E
i2004, i2002
, Feature (i2004, i2002)
(i2004, i2002); (T7316E)
T7208/T7316 use assigned button.
(i2004, i2002)
(T7208, T7316, T7316E)
, ,
Business Communications Manager 3.5 Programming Operations Guide
M7000, M7100(N), M7208(N), M7310(N), M7324(N)
(N)=European Norion sets
50Preface
Table 1 Telephone buttons (Continued)
1
This document uses FEATURE to indicate the acti on of pressing the feature button.
2
This document uses HANDSFREE to indicate the action of pressing the handsfree or mute button.
3
This document uses HOLD to indicate the acti on of pressing the hold button.
4
This document uses RELEASE to indicate the action of pressing the release button.
You press the FEATURE key and then the feature code to use a feature.
For exampl e: Pres s FEATURE 70 to tr ans fer a cal l.
M7100/T7100 and M7000/T7000 telephones
The 7100 and 7000 telephones work differ ently from other telephones on your system becaus e
they do not have lin e buttons. Where oth er tele phones c an requ ire t hat you sele ct a line or int ercom
button to answer a call, wit h these telephone s you jus t pick up t he hands et. Where oth er tele phones
require you to select a line butto n to take a call on th at line off hold, on these telephones, you press
HOLD.
You answer a second call by pressing HOLD. Your active call is put on hold and you connect to
the waiting call. You only can have two active calls at one time.
The 7100 and 7000 telephones do not have speakers, therefore, cannot use the handsfr ee feature.
Portable handsets
Compani on, DEC T , and the T 7 406 p or tab le hands ets all acce s s syst em feat ures in dif fere n t way s.
Each of these han ds ets comes with a user guid e tha t exp lai ns the spec if ic featu re inf or ma tio n for
the handsets.
IP teleph one s
Nortel Networks IP telephones (i2002, i2004, i2050) have user c ards that explai n the keys on each
device, including the Feature key, which is a softkey located under the display on these
telephones. The Telephone Feature Card can be used with these telephones, as most Business
Communications Manager featur es can be accessed from these telephones. Thes e telephones also
have a display menu that provides quic k access to listed features.
The Symbol NetVision wireless IP handsets have a separate feature card which provides a quick
reference for accessing the system through the handset. The card also explains how to access the
Business Communications Manag er fea tures allowed by the system. Features can be accessed
either by entering the code on the dialpa d or by usi ng the menu on the handset display.
P0604629 03
Acronyms used in thi s guide
This guide uses the following acronyms:
ACDAutomated Call Distri bution
AHAuthentication He ader
ANSIAmerican National Standards Institute
APIApplication Progra m Interface
ARPAddress Resolutio n Protocol
ASMAnalog station module
ATA (or ATA2)Analog Terminal Adapter
AUIAttachment Unit Interface
A WGAmerican Wire Gauge
BERTBit Error Rate Tes t
BCcommitted burst
Preface51
BEexcess burst
BIOSBasic Input Output System
BKIBreak-in
BLFBusy Lamp Field
BootPBootstrap Protocol
BRIBas ic Rate Interface
BRUBackup and Restore Utility
CAACentralized Auto Att endant
CAPCentral Answering Position (T7316E+KIM or M7324+CAP modules)
CDPCoordinated Dialing Pl an
CHAPChallenge-Hands hake Authentication Protocol
CIRCommitted Information Rate
CLIDCalling Line Identification
COPSCommon Open Policy Service
COSClass of Service
CSMA/CDCarrier Sense Multiple Access/Collision Detection
CSUChannel Service Unit
CTEConnected Telecommunications Equipment
CVMCentralized Voice Mail
DASS2Digital Access Signa ling System Number 2
Business Communications Manager 3.5 Programming Operations Guide
52Preface
DCEData Communications Equipment
DCOMDistributed Component Obje ct Model
DECTDigital enhanced cordless telecommunications or Digital European
DESData Encryption Standard
DHCPDynamic Host Configuration Protocol.
DIDDirect Inward Dial
DiffServDifferentiated Services
DIMMDual In-line Memory Module
DISADirect Inward System Access
DLCIData Link Connection Indentif ier
DLCMIData Link Control Management Inte rface
DNDirectory Number
DNSDomain Name Service (DNS)
DPNSSDigital Private Network Signalling System
cordless telephone
DRTDelayed Ring Transfer
DSCPDiff-Serv Code Po in t
DSPDigital Signal Process or
DSSDirect Station Set (also referred to as an auto dial key)
DTEData Terminal Equipment
DTMDigital Trunk Module
DTMFDual Tone Multifrequency.
EBNEgress Border Node
EDOExtended Data-Out
EFExpedited Forwarding
eKIMenhanced Key Indicator Module
ENEdge Node
ESEnd Station
ESPEncapsulated Security Payload
FDDFull Double Density
FQDNFully Qualified Domain Name
FTPFile Transfer Protocol
GATMGlobal Analog Trunk Module
HDLCHigh-level Data Link Control
HFHandsfree
P0604629 03
HSHospitality services
HTTPHypertext Transfer Protocol
HTTPSHypertext Transfer Protocol Secured
IBNIngress Border Node
I/CIntercom feature button
ICCLISDN Call Connection Limitation
ICMPInternet Control Message Protocol
IETFInternet Engineering Task Force.
IPInternet Protocol
IFInput Filter
IPCPIP Control Protocol
IPSecInternet Protoc ol Security
IPXInternetwork Pac ket Exchange
IRQInterrupt Request
Preface53
ISDNIntegrated Services Digital Network
ISOInternational Organization for Standardization
ISPInternet Ser vice Provider
ITU-TInternational Telecommunication Union-Telecommunication
Standardization Sector (formerly CCITT)
IVRInteractive Voice Response
KIMKey Indicator Module
LANLocal Area Network
LCDLiquid Crystal Display
LCPLink Control Protocol
LMLAN Manager
LQRLink Quality Rate
MACMedia Access Control
MAUMedia Access Unit
MCDNMeridian Client Defined Network (PRI SL-1)
MD5Message Digest algorithm
MLPPPMulti-Link Point-to-Point Protocol
MPPCMicrosoft Point to Point Compression
MSCMedia Services Card
MS-PECMedia Services Processor Expansion Card
MWIM essage Waiting Indicato r
Business Communications Manager 3.5 Programming Operations Guide
54Preface
NATNetwork Address Translation
NBMANon Broadcast Multi-Access
NCRINetwork Call Redirection Information
NICNetwork Interface Card
NTLMNT LAN Manager
NNTPNetwork News Transfer Protocol
OPXOff Premises Extension.
OSIOpen Service Interconnection
OSPFOpen Shortest Path First
PAPPassword Authentication P rocedure
PBXPrivat e Bra n ch Exch a n ge .
PCIPeripheral Component Interconnect Slot
PDDPartial Double Density
PDNP ublic Data Network
PFSPer fect Fo rward Secrecy
PHBPer Hop Behavior
POFPacket Output Filter
POP3Post Office Protocol
PPPPoint-to-Point Protocol
PPPoEPoint-to-Point Protocol over Etherne t
PPTPPoint-to-Point Tunneling Protocol
PRIPrimary Rate Interface
PSTNPublic Switched Telephon e Network
PVCPermanent Virtual Circuit
QoSQuality of Service
QOTDQuote of the day server
QSIGQ reference point signalling
RASRemote access service
RIPRouting Information Protocol
RPCRemote Procedure Call
RTPRealtime Tra nsport Protocol
SAPService Advertising Protocol
SAPSStation Auxiliary Power Supply
SDRAMSynchronous Dynamic Random Access Memory
SHASecure Hash Algorithm
P0604629 03
SLAService Level Agreement
SMBServer Message Block
SMDSS witched Multimegabit Data Service
SMTPSimple Mail Transfer Protocol
SNMPSimple Network Management Protocol
SPIDService Profile Id entifier
SRStatic Route
SSStatic Service
SSLSecure Socket s La y er
STPShielded Twist ed Pair
SUNNFSSUN Network File System
T APITelephony Application Program Interface
TCP/IPTransmission Control Protoc ol/Internet Protoco l
TETerminal Equipment
Preface55
TEITerminal Endpoint Identifier
TFTPTrivial File Transfer Protocol
TOSType of Service.
TPETwisted Pair Ethern et
TTLtime-to-live
UNISTIMUnified Networks IP Stimulus
UDPUser Datagram Protocol or Univers al Dialing Plan
VLANVirtual Local Area Network
VoIPVoice o ver IP
VPNVirtual Private Networks
WANWide Area Network
WFQWeighted Fair Queuing
WINSWindows Internet Name Service
Business Communications Manager 3.5 Programming Operations Guide
56Preface
Related publications
In addition to the Programming Operations Guide, the Business Communication s Manager
documentation suit e contains the following documents:
•Telephony Features Handbook
•Installation and Mainte nance Guide (BCM1000 and BCM400/200)
•Management User Guide
New!
•IP Telephony Conf iguration Guide
•CallPilot Manager Set Up and Operation Guide
•CallPilot Reference Guide
•CallPilot Quick Reference Guide
•CallPilot Programming Record
•CallPilot Message Networking Set Up and Operation Guide
•CallPilot Message Networking User Guide
•CallPilot Unified Messaging Installation and Maintenance Guide
•Call Detail Recor ding System Administrator Guide
•ATA 2 User Guide
•CallPilot Fax Set Up and Operation Guide
•CallPilot Fax User Guide
•Interacti ve Voice Response Installation and Con figuration Guide (IVR)
From the Business Communications Manag er 3.5 Doc umenta tion CD, you can also access a
number of telephone and accesso ry quick r eference cards.
If you operate a multi-site Business Communications Manager network, you can use the Network
Configuration Manager to pr ovide centralized configura tion and management operations. The
documentation for thi s tool can be found on the Network Configuration Manager CD, which
includes the softwar e and the following documentation.
•Network Configurat ion Manager Installation Guide
•Network Configurat ion Manager Administration Guide
•Network Configurat ion Manager Client Software User Guide
•Network Configurat ion Manager Reference Guide
P0604629 03
System documentation map
The following page s provi de a map of the Bus iness C ommunications Manager documentati on CD.
The map shows the overall task process of the syste m, and indicates which documentation deal s
with each section. All the document s describes are included on the documentation CD that c ame
with your system.
•“Installation documentation” on page 58
•“Operations documenta tion” on page 59
•“Call Management documentation” on page 60
•“Unified Manager and hardware maintenance documentation” on page 61
•“Multi-site Administr ation: Network Configuration Manager” on page 61
Preface57
Business Communications Manager 3.5 Programming Operations Guide
58Preface
Installation documentation
Remove your Business
Communications Manager
components from the box
Documentation CD
Voice Mail and
Call Management
Applications
Operations
Business Communications Manager base
and expansion unit hardware installation
Data cards
Setting up media bay modules
Installation
Analog telephones
Portable handsets
(Region-specific)
manuals come
with telephones
Companion
DECT
T7406
Installation and
Maintenance Guide
System planning
and configuration
records
Programming Records
ATA 2
installation
DECT Deployment Tool
and Provisioning Guide
DECT Installation and
Maintenance Guide
T7406 Cordless Telephone
Installation Guide
IP Telephones
Digital telephony
P0604629 03
Nortel Networks
IP telephones
Symbol NetVision
wireless IP telephones
Installing lines
Nortel Networks
digital telephones
Three-port Switch Installation Guide
IP Telephony Configuration Guide
NetVision Phone Administrator
Guide
Bix Block Wiring Guide
Installation manuals
come with telephones
Operations documentation
Documentation CD
Preface59
System Management and Maintenance
Voice Mail and Call Management Applications
Hardware
Installation
Using the telephones
and equipment
T7000 User Card
T7100 User Card
T7208 User Card
T7316 User Card
T7316E User Card
T7406 User Card
M7324 User Card
i2004 User Card
i2002 User Card
NetVision Feature Card
Central Answering
Position (CAP) User Card
Telephone Features
User Guide
SWCA User Card
ATA User Guide
CallPilot Quick Reference
card, NVM interface
Operations
Telephony Configuration
Quick Start Wizard
Setting up Lines,
Routes and
Access Codes
Controlling calls
Setting up
Tele ph one r ecord s
and features
Data Configurations
Telephony Networking
Registering Telephones
IP Telephones
Programming Operations Guide
Software Key code
Installation Guide
Land
VoIP
IP Telephony
Configuration Guide
CallPilot Quick Reference
card, CP interface
Using the telephones
and equipment
Symbol NetVision
Companion
DECT
Using Telephone Features, and
finding prompt descriptions.
Business Communications Manager 3.5 Programming Operations Guide
Companion
Configuration Guide
DECT Installation and
Maintenance Guide
Telephony Features Handbook
60Preface
Call Management documentation
Documentation CD
Keycoded Applications
Software Keycode
Installation Guide
System Management and Maintenance
Voice Mail and Call Management Applications
Hunt Groups
Programming
Operations Guide
Hospitality Services
CDR
CallPilot
CallPilot Message
Networking
CallPilot Fax
CallPilot Message Networking
Set Up and Operation Guide
Call Detail Recording
System Administration Guide
Call Pilot Manager Set Up
and Operation Guide
CallPilot Fax Set Up and
Operations Guide
Hospitality
Features Card
Reference
Guide
Programming
Record
User Guide
User Guide
LAN CTE
IVR
P0604629 03
CallPilot Desktop
(Unified) Messaging
Call Center
Professional Call
Center
Multimedia Call Center
Personal Call Manager
Interactive Voice Response Installation and Configuration Guide
CallPilot Unified Messaging
Installation and Maintenance
Call Center Set Up
and Operation Guide
Reporting Set Up and
Operation Guide
Multimedia Call Center
Set Up and Operation Guide
LAN CTE Configuration Guide
Personal Call Manager User Guide
User Guide
Supervisor and
Agent Guides
Multimedia Call Center
Web Developer Guide
Unified Manager and hardware maintenance documentation
Business Communications Manager 3.5 Programming Operations Guide
62Preface
How to ge t h e lp
USA and Canada
Authorized Dist ributors - ITAS Technical Support
Telephone:
1-800-4NORTEL (1-800-466-7835)
If you already have a PIN Code, you can enter Express Routing Code (ERC) 196#.
If you do not yet have a PIN Code, or for general questions and fir st line support, you can enter
ERC 338#.
Website:
http://www. nortelnetworks.com/support
Presales Support (CSAN)
Telephone:
1-800-4NORTEL (1-800-466-7835)
Use Express Routing Code (ERC) 1063#
EMEA (Europe, Middle East, Africa)
Technical Support - CTAS
Telephone:
*European Freephone00800 800 89009
European A lter n ative /
United Kingdom+44 (0)870-907-9009
Africa+27-11-808-4000
Israel800-945-9779
*Not e: Calls are not free from all countries in Europe , Middl e East or Africa
Fax:
44-191-555-7980
email:
emeahelp@nortelnetworks.com
CALA (Caribbean & Latin America)
Technical Support - CTAS
Telephone: 1-954-858-7777
email: csrmgmt@nortelnetworks.com
The Business C ommunications Manager includes software and ha rdware components t hat provide
telephony, voice messaging, interactive voice response (IVR), data networking, and IP telephony.
The web-based navigation tool, Unified Manager, provides easy access to all operations and
maintenance programming on the Business Communications Manager system at a single sit e. For
more information about Unifie d Manag er, see “Using the Unified Manager” on page 90.
This section includes the following topics:
•“System configurati on process maps” on page 64
•“Finding your way around” on page 69
•“Business Communications Manager hardware” on page 71
•“What do media bay modules do?” on page 73
•“How does the system connect to the network?” on page 73
•“Additional Busines s Communications Manager application s” on page 73
63
With the introduction of BCM version 3.5 software, you will note an increase in the
awareness of security in regards to access to the Unified Manager, both by administrative
!
users and by client applicat ions. The icon shown to the left, when used within this
document, denotes points of security that you need to consider when setting up or using your
system.
•This softwa re inc ludes a ge neri c se curi t y cert ific at e that pr o vides an increased level of
encryptio n abil ity. Yo u can rep lace this certifica te wit h a site-s peci fi c certi fi ca te . Since
encryption levels ha ve some depend encies to the version of Wind ows operating systems, the
defaults are set at a mid-range level to allow for clients using earlie r versions that do not
support strict encr yption requirements. You can reset these levels higher or lower.
•This version also provides more control over password policies, that allow you to determine
the complexity of the password s you want to assign to the users who do programming in the
Unified Manager. You can also determine if you want the system to lockout users who have
entered an inc orrect password after a specified of times .
•Finally, a m ore s ecure front end a pplica tion to t he text-ba sed inter face is bei ng in troduced. The
PuTTY application uses SSH to provide a secure connection to the text-based interf ace. The
application is downloaded to a user’s computer, rather than being resident on the Business
Communications Manager, like Telnet.
The Network Configuration Manag er provides multi-site network manage ment. This process is
described in a separate set of user guides.
Figure 2 on page 65, F igure 4 on page 67, Figure 5 on page 68, a nd Figure 3 on page 66 pr ovide an
overview of the processes for operating the Business Communications Manager system.
Business Communications Manager 3.5 Programming Operations Guide
64Chapter 1 Introduction
System configuration process maps
The following process m aps show you the order in which your syst em is configured. Each section
provides quick reference information about the step, plus a link to the process section.
Figure 1 Process for initial system configuration
System
hardware is
installed
Set and
install
modules
Refer to the Installation and Maintenance Guides for hardware setup.
Refer to the Installation and Maintenance Guides for media bay module
settings and connections. To identify the media bay modules to the system
and set up their line values, refer to “Configuring resources — media bay
modules” on page 133.
Run
startup
Wizard
Set up
security
levels
Set up
user
access
Set up your system for correct network connection and basic telephony and
CallPilot properties. Refer to “Using the Quick Start Wizard” on page 103.
There are a number of points at which you can enhance the security of
access to your system:
You can install a site-specific security certificate (“Understanding BCM SSL
certificate properties” on page 78).
You can determine the encryption level required between the system and
clients (“Setting system security compatibility levels” on page 115).
To maintain user access security, you can define different levels of
password security and user access. At a minimum, change the default
administration default passwords (ee_admin and supervisor). Refer to
“Managing system and user security access levels” on page 113.
P0604629 03
Figure 2 Process for configuring the telephony components
Chapter 1 Introduction65
System
setup is
complete
Set up
lines/loops
Set up
access
Set up
telephones
Refer to the preceding flow chart in Figure 1.
When the trunk media bay modules are configured, the system assigns line
or loop numbers. You may need to change some of the line attributes. You
can also refer to the lines and loops to set up line pools and call routing.
Refer to “Configuring Lines and Loops” on page 199.
See also “Data and split-line configuration” on page 545
When your lines are configured, you can set up system access
configurations. Refer to “Configuring outgoing traffic” on page 239and
“Controlling access within and into the system” on page 287.
When the station media bay modules are configured, the system assigns
extension numbers (DNs) for each telephone connection.
DNs define each set or piece of equipment connected to the system. Within
the System DN headings, you can define how individual sets will interact in
the system. Refer to “Configuring DNs for system devices” on page 305.
Cordless/wireless telephones (NetVision, T7406, DECT, Companion) all
have their own installation and configuration guides and feature cards.
Confirm
system
settings
Set up
special
features
Set up
call
management
features
A number of settings affect all lines or telephones. Most of these settings
are default. Confirm that they suit your purposes.
Refer to “Configuring system settings” on page 395.
After you set the basic telephony information, you can configure the special
features such as:
•Hunt groups (“Configuring Hunt groups” on page 509)
•Hospitality (“Configuring Hospitality Services” on page 525)
•IP music (“Configuring the music source” on page 533)
The Business Communications Manager has built-in call management
applications. Basic CallPilot features can be accessed from the CallPilot
button on the first page of the Unified Manager. CallPilot documentation
describes how to install and use the available features. CallPilot also has
enhanced features, which require a keycode to activate (refer to the CD
contents flowchart: “System documentation map” on page 57).
Remote voice mail: If your system is not the voice mail host, set up remote
access to the network voice mail system. Refer to “Central voice mail or
call attendant” on page 472
Business Communications Manager 3.5 Programming Operations Guide
66Chapter 1 Introduction
Caution: Programming affects system operation.
Only a qualified system administrator should perform startup, installation and
maintenance programming. Many of the settings affect correct system operation.
Figure 3 Process for activating optional keycoded features
System is
setup
Purchase
the optional
feature
Get an
Authorization
code
Get the
software
keycode
The basic system has been installed and configured.
Keycoded applications:
Call Center/Call Center Reporting
Companion (US UTAM code)
Fax Suit e
LAN CTE (TSP) (required for Personal Call Manager)
Message Networking (VPIM/AMIS)
Multimedia Call Center
Networking DPNSS/MCDN (region-specific)
Professional Call Center (upgrade) and Professional Call Center Agents
Unified Messaging and Voice Mailbox Expansion
VoIP Gateway and IP telephony and IP trunks
Interactive Voice Response (IVR)
When you purchase an optional feature, you receive an Authorization
Code for the feature.
Access the Nortel Networks Keycode web site and use the Authorization
Code to get a software keycode for the feature. For information about
how to get the software keycode, refer to the Software Keyc ode Installation Guide.
Enter
software
keycode
Program
the feature
P0604629 03
Use Unified Manager to enter the software keycode. For information
about how to enter the software keycode, refer to the Software Keycode Installation Guide.
For information about how to program the new optional feature, refer
to the documentation for that feature.
Also efer to “Configuring data networking resources for the Business
Communications Manager” on page 597.
Figure 4 Process for configuring the data and IP telephony components
Chapter 1 Introduction67
System
setup is
complete
Set up
data
network
Set up
network
Policies
Set up
firewalls
Refer to the first flow chart in Figure 1.
You configure the data network options, so that Business Communications
Manager operates properly on your network. For information about how to
configure the data networking options, refer to:
“Configuring DHCP” on page 641
“Configuring DNS” on page 665
“Configuring IP Routing” on page 667
“Configuring IPX Routing” on page 681
“Configuring QoS monitor” on page 703
“Configuring Web Cache” on page 709
“Configuring Net Link Manager” on page 711
“Configuring NAT (Network Address Translation)” on page 715
“Configuring NTP Client” on page 723
Policies allow you to control the data traffic on your network so more
bandwidth is available to delay sensitive data such as IP telephony. For
information about how to configure Policies, refer to “Policy-enabled
networking” on page 767.
To control access to your system, you can use firewalls to block or allow
specific ports and IP addresses. Refer to “Configuring IP Firewall Filters”
on page 785.
Set up
VPN
Tunnels
Set up IP
telephony
Virtual Private Networks (VPN) tunnels allow you to create secure
connections over the public data network. You can also use VPN to ensure
a secure connection to the Business Communications Manager. For more
information about VPN Tunnels, refer to “Virtual Private Networks (VPN)”
on page 727.
Set up any voice over IP (VoIP) trunks and/or IP telephones and Netvision
telephones. Refer to the IP Telephony Configuration Guide for details. The
DNs for these telephones are configured within the digital range of DNs.
Business Communications Manager 3.5 Programming Operations Guide
68Chapter 1 Introduction
Figure 5 Post-setup processes
System is
setup
Set up
alarm
manager
Set up
BRU and
CDR
The basic system has been installed and configured.
Determine how your Business Communications Manager system will
report alarms. Refer to the Management Use r Guide
Set backup schedules and determine call detail reporting (CDR). Refer to
the Management User Guide and the CDR User Guide.
P0604629 03
Finding your way around
The following sections provides you with quick links to the detailed configuration information:
•“Telephony programmin g quick acce ss list” on page 69
•“Data programming sectio ns” on page 70
•“Security and User Management” on page 69
Teleph on y pr og r am m in g qu i ck acce ss list
Overviews and hardware configuration
•System configuration process overview on page 64
•Application overvi ew (Unified Manager) on page 75
•Telephony services planning on page 165
•T elephony feature planning on page 171 (quick reference section to telephony
programming)
Chapter 1 Introduction69
Securit y and User Man agement
•Unified Manager access on page 75
•Managing system and user security access levels on page 113
Hardware and network configuration
•Configure media bay modules on page 133
•Configuring public networks on page 441
•Configuring private networks on page 445
Lines
•Configuring the externa l lines on page 199
•Configuring system access on pa ge 239
•Configuring call controls and remote call-ins on page 287
Telephony configuration
•Using Wizards to configure telephones on page 311
•Configuring telephone s with Unified Manager on page 326
•Configuring system sett ings on page 395
•Configuring schedule s on page 425
•System Features on page 819
Business Communications Manager 3.5 Programming Operations Guide
70Chapter 1 Introduction
Special features
•Configuring Hunt groups on page 509
•Configuring Hospita lity services on page 525
Reference material
•Profile references on page 803
•Button programming feature codes on page 819
Data programming sections
•Configuring the MSC resources on page 577
•Configuring data networking resources on page 601
•Configuring DHCP on page 641
•Configuring DNS on page 665
•Configuring IP Routing on page 667
•Configuring IPX Routing on page 681
•Configuring QoS monitor on page 703
•Configuring Web Cache on page 709
•Configuring Net Link Manager on page 711
•Configuring NAT (Network Address Translation) on page 715
•Configuring NTP Client on page 723
•V irtual Private Networks (VPN) on page 727 (tunne ls)
•Policy-enabled networking on page 767
•Configuring IP Firewall Fi lters on page 791
P0604629 03
Chapter 1 Introduction71
Business Communications Manager hardware
The main component of the Business Communications Manager system is the Business
Communications Manager base uni t. The Business Communications Manager base unit controls
all tasks such as call processing, voice messaging, and data routing .
BCM1000 (legacy equipment)
If you have existing equipment, like the unit shown in the figure below (BCM1000), you can
update the operating sys tem with new Business Communications Manager software .
Figure 6 Upgradeable BCM1000
Media bay module (MBM) slots
Ethernet ports
For a detailed description about maintaining these units, refer to the Business Communications
Manager BCM1000 Installation and Mainte nance Guide.
Note: Some of the components desc ribed in this section are not availabl e in all areas. Ask
your Nortel Networks Business Co mmunications Manager supplier for infor mation about
the availabilit y of components.
Business Communications Manager 3.5 Programming Operations Guide
72Chapter 1 Introduction
BCM200/BCM400 base units
In conjunction with the BCM version 3.0 system release, Nortel released two new base unit
models to provide added flexibility for system planning. These systems come preloaded with the
latest version of software. You cannot run versions previous to BCM 3.0 software on these units.
However, you can reuse modules from previous versions of the system, if you are replacing old
system hardware with the new BCM200 or BCM400 hardware (shown below). For a deta iled
description of this hardware, and how it is installed and maintained, refer to the Business Communications Manager BCM200/BCM400 Ins tallation and Maintenance Guide.
Figure 7 BCM200 and BCM400 hardware
BCM400
Media bay module (MBM) slots
BCM200
Primary
Mirror
Master
Buzzer Off
Modem port
Modem port
Ethernet portsWAN card
Media services
card (MSC)
Media bay module (MBM) slots
Ethernet portsWAN card
Media services
card (MSC)
P0604629 03
Chapter 1 Introduction73
What do media bay modules do?
Media bay module s are key componen ts of the system. They provide the link between the external
lines (trunks), the Business Communications Manager applications, and the internal extensions
(DNs), which connect to individual telephones.
The type of modules on your system depends on your set requi rements and the type of lines
available fr om your service provi der. You need to determine this information before you or der the
system. For a detailed descript ion of this hardware, and how it is installed and maintained, refer to
the Hardware Installation and Maintenance Guide.
How does the system connect to the network?
The Business Communications Manager is designed to connect to your business network on a
LAN and/or a WAN.
For data networking, the Business Communications Manager acts as a policy enabled router that
optimizes data t raff ic an d ensures consist ent ba ndwidth f or IP te lephon y, VoIP tr unks, a nd missi on
critical data.
For telephony applications, the Business Communications Manager base unit acts as a switch and
feature contro ll er fo r the ext ernal lines and the inter na l extens io ns at tach ed to the sets.
The IP telephone uses bot h data and tele phony feature s to prov ide an network- based t elephone that
provides the call features of the telephony-based digital telephones.
Additional Business Communications Manager applications
The Business Communications Manager provides a number of software applications. Some
applications work immedia tely after you install the Busines s Communications Manager system
and access the Unified Manager. Refe r to Chapter 2, “Getting started with Unified Manager”, on
page 75 for a description of the Unified Manager interface.
To use other application s, you enable the application by entering software keycodes.
Keycodes are based on you r system identif i cation and an e ncrypted code that you obta in when you
purchase the r ights to an option. Refer to the Software Keycode Installation Guide fo r in for m at io n
about how to acquire a keycode and how to enter it. Each of these optional features has separate
documentation which incl udes information keycodes and how to set up the application.
Refer to “Related publications” on page 56 for a list of the documentation for each of these
applications. Also refer to “System documentation map” on page 57 for an overview of how these
applications fi t into the overall system.
Business Communications Manager 3.5 Programming Operations Guide
74Chapter 1 Introduction
P0604629 03
Chapter 2
Getting started with Unified Manager
This section provide s you with information about the Unified Manager, the tool you access on the
Business Communications mana ger from your desktop and use to configure system informa tion.
This section d escri bes the U ni fi ed Man ager interface fun ct io ns.
You access Unified Manager on the Business Communications Manager through the interne t,
using a web browser. To access Unified Manager you requir e the IP address of the Business
Communications Manager, as well as a user name and password. If you do not have this
information, ask the person who installed your system.
Warning: If the installer did not change the access password to the Unified Manager,
you should do so at the earliest opportunity. Refer to “Managing acc ess passwords” on
page 117 for procedures for changing passwords and adding new users.
This section includes information about:
•“Computer requirements” on page 76
•“Logging on to Unified Manager” on page 77
•“Understanding BCM SSL certific ate properties” on page 78
•“Using the Unified Manager main page buttons” on page 82
•“Using the Unified Manager” on page 90
•“Using Unified Manager Help” on page 95
•“Logging off” on page 96
•“Using the SSH client to access the text-based interface” on page 96
•“Manually activating Telnet” on page 99
75
Security note: Multiple users logging on to the Business Communica tions Manager
with the administrator account, from different client stations, can cause inconsistent or
!
wrong configuration. Therefore, it is advisable to limit the number and distribution of
administrator acc ounts.
Security note: The configuratio n section in t he Uni fied Manager is not se cured thr ough
SSL encryption. To provide security for this section, establish a VPN client tunnel. Refer
to “IPSec Remote User configuration” on page 757.
Business Communications Manager 3.5 Programming Operations Guide
76Chapter 2 Getting started with Unified Manager
Computer requirements
To run the Unified Manager, you require:
•a 133 MHz Pentium CPU or higher (or compatible)
•64 MB RAM
•a minimum of 10 MB of available disk space
•a minimum screen resolution of 1024 x 768
•a web browser (refer to “Browser requirements” on page 76
Browser requirements
To use Unified Manager, you require:
•Java Virtual Machine (JVM) 5.0 (build 5.00.3805 or greater), or Sun Java JRE 1.4.1_02 or
greater (for Windows versions that do not have JVM installed)
•Microsoft Internet Explorer 5.X (excluding 5.00) or 6.X, or Netscape Communicator 4.8, 6.X
or 7.X.
Note: Browser restrictions and limitations
•BRU and upgrades: Only Inter net Explorer will work when using the
backup/restore util ity (BRU) or when performing an upgrade procedure.
•The Business Communications Mana ger upgrade wizard will not work wit h
IE 5.00.
If you are using Netscape Communicator, set the following parameters:
•Enable Java: On
•Cached document comparis on: Eve ry time
If you are using Microsoft Internet Explorer, set the following parameters:
•Check for newer versions: Eve ry visit to the page
•Java JIT compiler enabled: On
For informati on about setting these parameter s, check the documentation that came with your web
browser.
You can access the Business Communicati ons Manager system from another computer through a
WAN/Internet connection or a dialup connection. The dialup connection uses either the internal
V.90 modem (North America only) or an ISDN dialup. Both access methods create an IP
connection that enabl es all IP-based management tools. For more informat ion on remote
connections, refer to “Dial Up” on page 625.
P0604629 03
Using a HTTP Proxy server
Unified Manager does not work properl y if you use a HTTP Proxy server to con nect to the
Internet. If you use an HTTP Proxy server, you must change your web browser settin gs so you can
bypass the Proxy Server when connecting to Business Communications Manager. Proxy
information is locat ed under the internet options/pre ferences area of your browser.
Note: If the Business Communications Manag er system is located outside of your
network, or you have to use a proxy as a gateway proxy to communicate with Busi ness
Communications Manager, this process may not work. To bypass the proxy through the
browser, the gateway proxy must be able to understand and pass distributed component
object model (DCOM) calls between Business Communications Manager and the
computer you are using to access Unifi ed Manager.
Logging on to Un ified Manager
Use the following procedure to log on to Business Communications Manager using the web
browser:
Chapter 2 Getting started with Unified Manager77
1Launch your web browser.
2BCM 3.5 software provide s tw o ways to acce s s the Uni fi ed Manager:
•If you updated from a previous version of software, and you have the Business
Communications Manager address (http://<IP address>:6800) bookmarked, you will find
that the login is redirecte d to an htt ps:// entry.
•If you have a new system, enter https//:<IP Address>.
Note: You must include https:// with the address to access Unified Manager
when you are using Internet Explore r as your browser.
Note: If your Business Communications Manag er has a network Fully Qualified
Domain Name (FQDN), you can access your system by pointing your browser to
that name.
3If the br owser does not automatically launch, click on the Go tab beside t he URL address field.
A security dialog appears.
Security note: The defa ult security certifica te that comes with BCM 3.5 version
software is a se lf-signed certif icate that enable s SSL encryption functionality. The default
!
certificat e does not addre ss site authentication since site authentication requir e s site and
system-specific information such as IP address, company name, and so on. Refer to
“Understanding BCM SSL certific ate properties” on page 78 for more information.
Business Communications Manager 3.5 Programming Operations Guide
78Chapter 2 Getting started with Unified Manager
Figure 8 Security Alert dialog
4Click Yes.
The first page of the Unified Manager appears. Refer to “Using the Unified Manager main
page buttons” on page 82.
Understanding BCM SSL certificate properties
When you first r un the BCM version 3.5 software, y ou will note that the default Web access to the
Business Communications Manag er now utilizes SSL encryption for system security. This
includes the appearan ce of a secur ity alert when you initiate a connection to the Unified Mana ger
using SSL, which indicates site validation of the default certificate.
This security alert does not appear if you:
•add a site-specific certificate (“Uploading a certificate and a private security key” on page 79)
•suppress the message on your client browser (“Suppressing the security alert message” on
page 81)
•use the non-SSL port (http: 6800) (“Using the non-secure http: 6800 port” on page 81)
The self-signed cert ificate that is included in the BCM version 3.5 software enables SSL
encryption functiona lity, providing the necessary encryption keys. However, it does not addr ess
site authentic ation. Site authentication requires system-specific infor mation such as an IP addr ess,
company name, and so on.
P0604629 03
Note: Client appl icat ions do n ot need to inst al l the cert i ficat e. The Bus i nes s
Communications Manager sends the certificate when it accesses the client application.
Chapter 2 Getting started with Unified Manager79
Uploading a certificate and a private security key
Obtain a site certificate for your Business Communications Manager from a CA (Certificate
Authority) vendor. Certificate files must use the .PEM format.
You will be provided with a certificate and a private security key. These are what need to be
installed on the Unified Mana ger.
Security note: Ensure that you maintain a copy of your certificate and private security
keys in a secure place, preferably offs ite. This provides you with a backup if your system
!
ever require s data re-entry.
1Log on to the Business Communications Manager main screen.
2Click on the Maintenance button.
3You will be prompted to enter a system user name and password.
4Click on OK.
The main Business Communications Manager Product Maintenance and Support page
appears.
Figure 9 Main Product Maintenance and Support web page
Click on the Maintenance Tools link
5On the left menu, click on the Maintenance Tools link.
A web page showing a list of Maintenance Tools appears.
Business Communications Manager 3.5 Programming Operations Guide
80Chapter 2 Getting started with Unified Manager
Figure 10 Maintenance Tools dialog web page
6Under Maintenance Tool s, Security, click on the Upload Certificate and Private Keylink.
A web page displaying Certificate and Private Key fields appears.
Figure 11 Main Product Maintenance and Support web page
7Use the Browse button beside each field to locate the certificate and private key files.
Both files must be uploaded at the same time.
P0604629 03
Chapter 2 Getting started with Unified Manager81
8Click the Upload button.
Upload messages:
•If the upload is success ful:
Certificate and Private Key Upload Was Successful!
You must restart the Apache Service or Restart the BCM before the
Settings will take Effect.
•If the upload is unsucces sful:
Certificate and Private Key Upload Was NOT Successful!
The Certificate and Private Key do not match.
Please upload a VALID Certificate and Private Key Combination!
9Click on the BCM link beside Your Location to exit the maintenance pages.
10 To replace the default certificate with the new certificate and private key:
aExit the Unified Manager.
bLog back into the Unified Manager.
Troubleshooting: Restoring the default certificate
If something happens to your private se curity certificate file , you cannot access the Unified
Manager and you need to restore the default certificate. Contact your technical support team for
assistance. Refer to “How to get help” on page 62 for Nortel Networks support contact numbers.
Suppressing the security alert message
If you do not want to add a site-specific security certificate, but you want to suppress the security
alert message, you can use the Interne t Explorer Security options to disable the warning.
1Open Internet Explorer.
2On the top menu bar, click Tools and select Internet Optio ns.
3Select the Advanced tab .
Note: Location of the following prompt may vary, depending on the version of Internet
Explorer.
4Scroll to the item “Warn about invalid site certificates.”
5If the check box has a check mark, click on the box to remove it. This disables this option.
6Restart the brow ser.
Using the non-secure http:6800 port
If you choose not to use SSL on your system, you can disabl e the syst em prompt that force s secure
web access. Refer to “Setting system security compatibility levels” on page 115. On the Sec u ri ty
screen described in that section, choose Disabled for the Force Secu re Web Access field.
Business Communications Manager 3.5 Programming Operations Guide
82Chapter 2 Getting started with Unified Manager
Using t he U n if i e d Mana ge r m a in page but t on s
On the Business Communications Manager Unified Manager initial page, as shown below, a
number of buttons provide access to various parts of the Unified Manager. The purpose of each
button is discussed in this section.
•“Accessing the Unified Manager programming interface” on page 83
•“Locating Wizards” on page 86
•“Locating optional features from the main page” on page 88
•“Finding documentati on from the main page” on page 89
•“Using BRU from the main page” on page 89
•“Accessing maintenan ce inf ormation from the main page” on page 89
Figure 12 Unified Manager first-page buttons
P0604629 03
Chapter 2 Getting started with Unified Manager83
Accessing the Unified Manager programming interface
The Configure Butt on accesse s the Unifie d Manage r programming i nte rface for all ser vices except
those controlled by the CallPilot and IVR services.
When you first install your system, you must run the Quick Start Wizard to set up your system
parameters. This wizard is described in Chapter 3, “Configuring system parameters” on page 101
or use the Wizard help, that can be accessed once you ent er the wizards section of the Unified
Manager.
Once your system is initiali zed you can acc ess the configuration screens of the Unif ied Manager
using the Configure button. If you choose to preinstall the Java class files, you can use the
Preinstalled Client Access Home Page
sections describe how to use these two logon methods.
The screens that appear when you click the Configure button on the main page allow you to
program your system data setti ngs and your telephony requirements.
•The data networ king parameters ar e accessed using the Services heading on Unified Manager.
For information about how to set up the data networking, refer to Chapter 21 to Chapter 32.
•The media bay module informati on is managed under the Resources menu.
•Most of the telephony components a re mana ged through records located under the Servi ces
menu.
hyperlink for the same purpose. The following two
Refer to “Finding your way around” on page 69.
1From the Business Communications Manag er main page, click the Configure button.
The Unified Manager login screen appears.
2In the Login box, type your login name.
The default login name is ee-edge.
3In the Password box, type your password.
The default password is PlsChgMe!.
Security note: Ensure that you change the password after you first log on to Business
Communications Manager. For information about how to change passwords, and how to
!
define user profile s, r efer to “Managing system and user security access levels” on page
113.
4Click the Login button.
The Unified Manager software starts. Depending on your system, Unified Manager software
can take several minutes to ini tia lize.
Business Communications Manager 3.5 Programming Operations Guide
84Chapter 2 Getting started with Unified Manager
Using the Preinstalled Client Home Page hyperlink
You can improve the time it takes to log on to Unified Manager by using the Preinstalled Client
Access Home Page. To use this method, you must install the Java class files on your computer
before you log into the Unified Manager. This method of logging in is faster because you do not
have to download the Java class files each time you log on to Unified Manager.
Note: To use dialup maintenance, you must use the Preinstalled Client Home Page to
access Unified Manager.
Installing the Java Class files on your computer
To install the Java class files on your computer, follow these steps:
1Go to the Business Communications Manager Unified Manager first page.
Refer to “Logging on to Unified Manager” on page 77, if neces s ar y.
2Click the Install Clients button.
3Find the Toolkits heading on the left menu list.
4Click on the Unified Manager Java Class Library
5If you are using Microsoft Internet Explorer, click the button beside the Unified Manager
Internet Explorer Java Class link.
If you are using Netscape Communicator, click the button beside the Unified Manager Netscape Java Class link.
If you have a Windows version that did not come with JVM, click the button beside the SUN JRE Java Class for IE and Netscape Browser link.
6On the download wizard, click the Run this program from its current location option.
7Click the OK button.
8If your browser security is tur ned on, a Security Warning dialog box appears.
Click the Yes button to allow the install program to run.
9Click the Finish button.
10 Close the browser window.
Note: You install the Java class files on your computer once. You do not need to install
the Java class files each time you use the Preinstalled Client Access Home Page.
link.
P0604629 03
Chapter 2 Getting started with Unified Manager85
Logging on using the Preinstalled Client Access Home Page
After you install the Java class files on you computer, you can use the Preinstalled Client Home
Page hyperlink instead of the Configure button.
1Go to the Business Communications Manager fi rst page.
Refer to “Logging on to Unified Manager” on page 77, if necess ary .
2Click the Preinstalled Client Access Home Page hyperlink.
3In the Login box, type your login name.
The default login name is ee_admin.
4In the Password box, type your password.
The default password is PlsChgMe!.
Security note: Ensure that you change the password after you first log on to Business
Communications Manager. For information about how to change passwords, and how to
!
define user profile s, r efer to “Managing system and user security access levels” on page
113.
5Click the Login button.
The Unified Manager software starts.
Business Communications Manager 3.5 Programming Operations Guide
86Chapter 2 Getting started with Unified Manager
Locating Wizards
The Wizards are self-contai ne d task applications that you can use to speed up some configur ation
tasks. The access icons for the Wizar ds are located on the Setup and Management Wizards page,
which is accessed through the Wizards button on the first page of the Unified Manager.
Figure 13 Wizards icon page, accessed through the Wizards button
These are the wizards that are available from this page:
•Quick Start Wizard: initializes the system and sets up your basic system information. This
wizard is only run once, when your system is first se t up. Ref er to “Us ing the Quick Start
Wizard” on page 103.
•Add Users Wizard: allows you to change the telephony sett ings for a set of DNs or for a
single DN. You can define the settings in this Wizard, or you can use a pre-defined template,
from a local site or from a remote site, created with the Edit DN Record Template wizard.
Refer to “Creating telephone records wit h the Add Users W izard” on page 316.
•Edit DN Recor d Template Wizard: allows you to select Tele phony User Te mplates and
change and define the user settings for telephones. The Telephony Template is stored in a file
for use with the Add Users Wizard. Refer to “Editing DN Record Templates” on page 311.
P0604629 03
Chapter 2 Getting started with Unified Manager87
•DN Renumber Wizard: renumbers a range of DNs. Refer to “Renumbering DNs” on page
389.
•Network Update Wizard: allows you to update your syst em data netwo rk settings any time
after the Quick Start W izard was run, which set s the initial network setup. Refer to “Using the
Network Update Wizard” on page 603.
•DECT Mobile Recording Wizard: allows you to enable/disable mobile recording for one of
the base station ports.
DECT Configuration Wizard: allows you to easily configure a DECT module. It also turns
on one of the base station ports to allow mobile recording (handset registration).
The DECT Wizards only a ppear on the Wizards page if there is a DECT module installed and
identified to the system. These wizards are discussed in the D ECT Installation and Maintenance Guide.
Navigating the wizards
These are some helpful hints about how the wizards wor k, a nd how to use them.
•To open the online help, from the Progra mming Wizards screen click the Programming
Wiz ards Hel p link.
•You can move back and forth between screens in the wizards by clicking the Back and Next
buttons.
•You can revise your choices and entries on any of the wizard pages until you click the Apply
button. Once you click the Apply button, the system proceeds to apply the selected
configuration s. The user is prese nted with a confirmation box that provides the approximate
timing of the process. To check the status of the config urati on, press the Refresh butto n. When
the process is complete, the title of the page has the word completed as part of the title.
Business Communications Manager 3.5 Programming Operations Guide
88Chapter 2 Getting started with Unified Manager
Locating optional features from the main page
After you set up th e system and it is operating, you can add the keycodes for any optional features
you want to include.
You access the optional applic at ions, including those which requi re key codes, through the Install Clients button.
The program that manages CallPilot is accessed through the Call Pilot button.
Access optional applications
Access CallPilot application
For information about how to set up these opt iona l features, refer to the documentation for each
application.
P0604629 03
Note: Basic CallPilot functions are standard on the Business Communications Manager
and you define your region and basic settings when you run the Quick Start Wizard. Refer
to “What you need to know” on page 105.
Chapter 2 Getting started with Unified Manager89
Finding documentation from the main page
Use the Documentation button to find the information you require to help you underst and and
configure your system to your spec ifications. The entire Business Communications Manager
documentation suit e, plus a number of training panels, are included on your Business
Communications Manager computer , a s well as on the CD that accompanied your system.
Refer to “System documentation map” on page 57 to vie w a map of the informa tion contained on
the CD in relation to the tasks required to install, operate and maintain the Business
Communications Manager syst em.
Using BRU from the main page
The BRU (Backup and Restore Utility) button, allows you to ensure the integrity of your system
data by providing a way to back up your system data and configurations in the way that is most
useful for your purposes. Backed up data can be restored to the Business Communications
Manager should a system failure occur, such as a prolonged power outage. The Management User Guide describes how to use this feature.
Accessing maintenance information from the main page
The Maintenance button acces ses a number of maintenance tools that allow you to de termine the
current status of the various aspects of your Business Communications Manager system. This
book contains a section about diagnosing your system activity and alarms, which includes
information about using som e of these tools.
Business Communications Manager 3.5 Programming Operations Guide
90Chapter 2 Getting started with Unified Manager
Using the Unified Manager
Unified Manager provides a web-based navigation tool that allows you to view and change
configuration s for the Business Communications Manager system.
Most changes made with Unified Manager become part of current Business Communications
Manager programming when you select an ite m from the menu option s. Howe ver, some changes
take effect after you exi t the scr een. If a programming error occurs, you must reente r the original
programming.
This section describes the various parts of the configuration main screen:
•“Business Communicatio ns Manager system access” on page 90
•“Unified Manager screen display” on page 90
•“Understanding the dyna mic menu” on page 92
•“Understanding the navi gation tree headings” on page 93
•“Understanding tabbed pages” on page 94
Business Communications Manager system access
You must control system access by providing one user id, the administrator, with read-write
privileges. Give all other users selected access privileges to control the possibility of concurrent
configuration of the Business Communications Manager system. For information about defining
user profiles and passwor ds, see “Managing system and user security access levels” on page 113.
Unifie d Ma na ger scree n di sp lay
The Unified Manager screen displ ay, shown in the figure below, consists of:
•a menu bar , whe re users access configuration commands
•a navigation frame tha t displays the navigation tree you use to navigate through Business
Communications Manager progr amming headings
•an information fram e that displays the windows related to the headings you select in the
navigation frame
P0604629 03
Figure 14 Main display of the Unified Manager
Chapter 2 Getting started with Unified Manager91
Navigation keyButtonsHeadings
Navigation frame
The menu bar contains c onfigura tion man agement options . When you se lect the diff erent head ings
in the navigation tree, these options are enabled. If an option appears dim med, it is not available
for the heading you have selected.
The navigation tree conta ins headings that allow you to access specifi c areas of the Business
Communications Manager syst em. The key symbol ( ) beside each heading indicates that the
heading can be expanded to show sub-headings. To display sub-headings , double- clic k the item or
just click on the key itself. As you selec t various headings in the navigation tree, the heading
changes color and Unified Manager displays the appropriate information frame.
Note: If you receive the error message Telephony programming is currently
not available. Please try again later.
headings, this means that the part of the system that handles MSC is doing a reset. Wait
about one-and-a-half minutes and try again.
The information frame can conta in configuration windows or dialog boxes ind icating the
appropriate action or showing system messages or warnings.
Menu bar
Tabbed pagesInformation frameNavigation tree
when you click on one of the
Business Communications Manager 3.5 Programming Operations Guide
92Chapter 2 Getting started with Unified Manager
Understanding the dynamic menu
You access some of the Business Communications Manager functions using the top menu bar.
This menu bar is dynamic. Commands become active or inactive depending on the heading you
select from th e navigati on tre e in the le ft fr ame. The f ollowi ng table de fines the menu bar top-leve l
items.
Table 2 Menu bar items
Menu itemDescription
GroupView the system, resources, services, and management.
EditEdit parameters.
ConfigurationAccess configuration dialog boxes and screens.
PerformanceAccess performance graphs and tables.
FaultAccess fault management se ttings.
ReportGenerate a report.
ToolsUse Business Communication s Manager tools.
LogoffLog off, reboot or shutdown the Business Communications Manager base
unit.
ViewRefresh the information window to reflect configura tion changes.
HelpAcce ss onli ne he lp.
Refer to the figure in “Unified Manager screen display” on page 90.
P0604629 03
Chapter 2 Getting started with Unified Manager93
Understanding the nav igation tree headings
The Unified Manager naviga tion tree conta ins five main he adings tha t allo w you to access spe cifi c
areas of the Business Communications Manager system. These headings are described in the
following table.
(<IP address>)
Table 3 Navigation tree menu functions
HeadingProgramming
SystemProvides access to Licensing, Identification and Security subheadings. This includes
a form to enter keycodes, and a list of current supported services.
The Security heading provides screens that allow you to determine the level of security
within and entering the system. Refer to “Managing system and user security access
levels” on page 113.
When you select the System heading, you can view system information such as your
system name and a description about which resources and services are available.
Selecting the System heading also enables the following menu options: Configuration, Performance, Fault, Logoff, View and Help. These menu options provide access for
you to:
•enable/disable services
•access CPU and memory status
•access to the alarm banner, which displays totals of alarms
•access or refresh a system inventory list
•perform system reboot or shutdown operations
ResourcesProvides access for configuring data and telephony resources for Business
Communications Manager hardware setup. This information is included in “Configuring
resources — media bay modules” on page 133, “Data and split-line configuration” on
page 545, “Configuring data networking resources for the Business Communications
Manager” on page 601, and “Configuring the MSC resources” on page 577, as well as in
the DECT Installation and Maintenance Guide.
ServicesProvides access for configuring telephony and data networking services and various
other related services. Telephony information is discussed from Chapter 6 to Chapter 18
and in the IP Telephony Configuration Guide. System data configuration is discussed
from Chapter 22 to Chapter 33. This section also supports the information found in the
the CallPilot documentation, and the documents for CDR Recording, LAN CTE, IVR,
Doorphone, Network administration, universal power supply document, and DECT Installation and Configuration Guide. To manually enable or disable the Telnet service,
refer to “Manually activating Telnet” on page 99.
Business Communications Manager 3.5 Programming Operations Guide
94Chapter 2 Getting started with Unified Manager
Table 3 Navigation tree menu functions (Continued)
HeadingProgramming
ManagementProvides access to the User Manager, which you use to manage the users who have
access to the Unified Manage (“Managing system and user security access levels” on
page 113), and to the Alarm Manager, which is used to define why types of alarms get
reported by the system. The latter information is discussed in the Management User Guide.
DiagnosticsProvides access to items that allow you to generate and access statistics on different
system components. Business Communications Manager provides statistics, metrics
and event logs on resources and services to help you carry out system maintenance
activities. For more information about using diagnostics tools, refer to the Management User Guide.
System metrics information is contained in the programming section to which they apply.
Refer to “Viewing CbC limit metrics” on page 249, “Using Hunt group metrics” on page
523, and the IP Telephony Guid e.
Split DS30 configuration and double density configuration are located under the
Configuration menu of the MSC heading. These system features are discussed in the
section that discusses MSC configuration. Refer to “Changing the DS30 Split” on page
597 and “Configuring Double Density” on page 598.
Understanding tabbed pages
Some headings display records that have more than one level. Each level is accessed by clicking
the appropriate tab at the top of the screen.
Figure 15 Tabbed page example
Screen tabs
P0604629 03
Using Unifi e d Manage r He lp
As noted in “Understanding the dynamic menu” on page 92, the dynamic menu has a Help
heading. This heading allows you to access help topics relevant to active navigation tree headings
and screens. Each navigation tree heading and tab also has an alternate-click help link.
The help pages open in a new web-based window. Each help page also have navigation tools that
allow you to move back or forward to find other help topi cs .
Viewing help for navigation tree headings
1Highlight the heading for whic h you want to view help.
2Alternate-cl ick anywhere in the left pane to get the csHelp button.
3Then click normally on the csHelp button to open the help web page.
Figure 16 Accessing navigation tree heading help
Chapter 2 Getting started with Unified Manager95
Viewing help for tabs
1Click on the tab to make it the active screen.
2Alternate-cl ick anywhere in the right pane to get the csHelp button.
Note: Some tabs may have other headings as well.
3Then click normally on the csHelp button to open the help web page.
Figure 17 Accessing navigation tree heading help
Click the tab, then
alternate-click to get
csHelp button.
Select heading, then alternate-click
to get csHelp button.
Business Communications Manager 3.5 Programming Operations Guide
96Chapter 2 Getting started with Unified Manager
Logging off
When you have f inished a session on the Unified M anager, you need to log off correctly to protect
the integrity of the info rmation you entered.
1Choose BCM (<IP address>) at the top of the navigation tree.
The Logoff menu is enabled.
2Click Logoff, then se lect Logoff.
A message appears that asks you to confirm your request to log off.
3Click Yes to continue.
4A second message appears reminding you to cl ose your br owser window after the system has
logged out. Click Yes to continue.
A Logoff progr ess bar appears. When it the logoff is complete, the browser display will revert
to the Login screen.
5Click the Windows exit icon (top, right corner).
6Click the Windows e xit ic on on t he browser win dow disp laying t he Busi ness Communi cations
Manager main menu.
Note: Exit both Unified Manager browser windows, even if you want to re-log on to the
Configuration area . Onc e you have exite d both windows, you can re-establish a
connection with the Business Communications Manager and log on as usual.
Failure to log out of both browser windows could re sult in a failed attempt to re-enter the
Unified Manager Configuration section.
Using the SSH client to access the text-based interface
Some operations for the Business C ommunications Manager, such as initializing a new hard disk,
use a text-based interface. In previous versions, the Telne t application was used to access the
Business Communications Manag er text menus. BCM version 3.5 software introduces the abil ity
to securely access the Business Communications Manager through a network connection using
SSH server software. S SH service software is from SSH Communi cations Security
(www.ssh.com). The SSH client application, called PuTTY, can be downloaded from a link under
the Install Clients button on the Business Communications Manager first page.
Users require an administr ator-level password to use either PuTTY or Telnet.
Security note: You can still use Telnet for direct c onnections through a crossover
cable, since network security is not an issue in this case.
!
If you want to use T elnet over the network, you need to manually start the service.
Refer to “Manually activating Telnet” on page 99 .
Installing PuTTY
P0604629 03
Chapter 2 Getting started with Unified Manager97
The PuTTY application reside s on your computer. It provides an access interfac e that allows you
to connect to the text interf ace used by the Business Communications Manager.
1On the Unified Manager front page, click the Install Clients button.
2On the resulting web page, go to the bottom of the left column.
3Under Administrative Tools, click SSH client
.
4On the SSH Client page, click the button beside Download SSH Client , at the bottom of the
right pane.
The application downloads to your computer.
5On your computer desktop, double click Putty.exe.
6Follow the steps in the install Wiz ard to install the application.
Using Pu TT Y
Business Communications Manager 3.5 Programming Operations Guide
98Chapter 2 Getting started with Unified Manager
1Click the shortcut PuTTY icon.
The PuTTY Configuration screen appears.
Figure 18 PuTTY Configuration screen
2Click on the radio box beside SSH.
3In the Host Name (or IP address) box enter the IP address or the Fully Qualified Domain
Name for the Business Communications Manag er you want to connect with.
4Click Open.
5The first time you enter the application you may receive a security notice. Click OK.
The PuTTY text screen appears.
6At the login prompt, enter an administrator-level user name.
7Press <Enter>.
8At the next prompt, enter the corresponding password.
9Press <Enter>.
10 The Business Communications Manager Main Menu appears.
P0604629 03
Chapter 2 Getting started with Unified Manager99
Figure 19 Business Communications Manager Main Menu
11 Refer to the specific tasks that require this menu for details about using this it.
Manually activating Telnet
If you choose to conti nue ope rating th e text-bas ed menus wi th Telne t, r ather t han usin g the P uTTY
client, you can manually activate the service from the Unified Manager.
Security note: Using the Telnet interface poses a security risk since the Telnet protocol
!
is not encrypted.
Note: If you are using a cross-over cable to make a direct connection, Hyperterminal i s
still enabled, regardless of the status of Te lnet on the system.
1Click the key beside Services.
2Click on Telnet.
3On the Telnet screen, change Status to Enabled.
Business Communications Manager 3.5 Programming Operations Guide
100Chapter 2 Getting started with Unified Manager
P0604629 03
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.