Copyright 1997, Lucent Technologies555-230-796
All Rights ReservedIssue 2
Printed in USAJuly 1997
Notice
Every effort was made to ensure that the in formation in this book was complet e a nd accurate at
the time of printing. However, information is subject to change.
Your Responsibility for Your System’s Security
Toll fraud is the unauthorized use of your telecomm unications system by an unauthori z ed pa rty,
for example, persons other than your c om pany’s employees, agents, subcontractors, or persons
working on your company’s behalf. Note that there may be a risk of toll fraud associate d with
your telecommunic ations system and, if toll fraud occ urs, it can resul t i n subst antial additional
charges for your telecomm uni cations services.
You and your system manager are respo nsible for the security of your system , such as programming and configuring your equipment to prevent unauthorized use. The system manager is also
responsible for reading al l i nstallation, instruction , an d syste m administration docu ments provided with this produc t in order to fully understand the fea tures that can introduce risk of t oll
fraud and the steps that ca n be t aken to reduce that risk. Lucent Technologies does not warrant
that this product is immune from or will prevent unauthorized use of common-carrier telecommunication services or facili ti es accessed through or connec te d to i t. Luc ent Technologies will not
be responsible for any charges that resul t fro m such unauthorized use.
Lucent Technologies Fraud Intervention
If you suspect that you are being victimized by toll fraud and you need technical support or assis-
tance, call the Natio na l Cust omer Care Center at 1 800 643 -2353.
Federal Communications Commission Statement
This equipment has bee n tested and found to comply with the limits for a Class A digital device,
pursuant to Part 15 of the FCC Rules. These limits ar e de signed to provide reasonab le protection
against harmful interference when the equipment is operated in a commercial environment. This
equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in
accordance with the inst ruc tion manual, may cause harmful interference to radio communications. However, there is no guarantee that inte rference will not occur in a particular installation.
For further FCC information, see "Cust om er Support Information" below.
Industry Canada (IC) Interference Information
This digital apparatus does not exceed the Class B limits for radio noise e missions set out in the
radio interference regulations of the Canadian Depa rt ment of Communications.
Le Présent Appareil Numérique n'émet pas de bruits radioélectr iqu es dé passant les limites applicables aux appareils nu mériques de la class B préscrites dans le reglement sur le brouil la ge
radioélectrique é d ic té par le ministère le m ini stè r e des Industrie Canada.
Trademarks
DEFINITY is a registered tradema rk of Lucent Technologies in the US and other countries.
For more information about Lucent Technologies documents, refer to the section entitled “Related
Documents” in “About This Book ”
Support Telephone Number
In the continental US, Lucent Technologies provides a toll-free customer helpline 24 hours a day.
Call the Lucent Technologies Helpline at 1 800 242-2121 or your Lucent Technologies authorized
dealer if you need assistance when installing programming, or using your system. Outside the
continental US, c ont act your local Lucen t Technologies re pre sentative.
Warranty
Lucent Technologies provides a limited warranty on this product. Refer to “Limited Warranty” in
“Customer Support Info rm ation.”
Contents
Customer Support Information
■
Support Telephone Number.....................................ix
The exclamation point in an equilateral triangle
is intended to alert the user to the presence of
important operating and maintenance
(servicing) instructions in the literature
accompanying the product.
IMPORTANT SAFETY INSTRUCTIONS
When installing telephone equipment, always follow basic safety
precautions to reduce the risk of fire, electrical shock, and injury to
persons, including:
■
Read and understand all instructions.
■
Follow all warnings and instructions marked on or packed with
the product.
■
Never install this unit or telephone wiring for it during a lightning
storm.
■
Never install a telephone jack in a wet location unless the jack
is specifically designed for wet locations.
■
Never touch uninsulated telephone wires or terminals unless
the telephone wiring has been disconnected at the network
interface.
■
Use caution when installing or modifying telephone lines.
■
Use only Lucent Technologies-manufactured DEFINITY
Enterprise Communications Server (ECS) circuit packs, carrier
assemblies, and power units in the DEFINITY ECS control unit.
■
Use only Lucent Technologies-recommended/approved
DEFINITY ECS accessories.
Issue 2 July 1997
vii
Important Safety Instructions
■
Do not install this product near water, for example, in a wet
basement location.
■
Do not overload wall outlets, as this can result in the risk of fire
or electrical shock.
■
Do not attach the power supply cord to building surfaces. Do
not allow anything to rest on the power cord. Do not locate this
product where the cord will be abused by persons walking on it.
■
Unplug the product from the wall outlet before cleaning. Use a
damp cloth for cleaning. Do not use cleaners or aerosol
cleaners.
■
Do not operate the system if chemical gas leakage is suspected
in the area. Use telephones located in some other safe area to
report the trouble.
WARNING:
SAVE THESE INSTRUCTIONS
viii
Issue 2 July 1997
DO NOT open the Remote Module. There are no
user serviceable parts inside the unit. Only an
authorized technician should open the unit for
required maintenance or upgrading purposes.
Customer Support Information
Support Telephone Number
In the USA only, Lucent Technologies provides a toll-tree
customer Helpline (1 800 242-2121) 24 hours a day. If you need
assistance when installing, programming, or using your system, call
the Helpline, or your Lucent Technologies authorized
representative.
Outside the USA, if you need assistance when installing,
programming, or using your system, contact your Lucent
Technologies authorized representative.
Issue 2 July 1997
ix
Customer Support Information
Security of Your System:
Preventing Toll Fraud
As a customer of a new telephone system, you should be aware
that there is an increasing problem of telephone toll fraud.
Telephone toll fraud can occur in many forms, despite the
numerous efforts of telephone companies and telephone
equipment manufacturers to control it. Some individuals use
electronic devices to prevent or falsify records of these calls.
Others charge calls to someone else’s number by illegally using
lost or stolen calling cards, billing innocent parties, clipping on to
someone else’s line, or breaking into someone else’s telephone
equipment physically or electronically. In certain instances,
unauthorized individuals make connections to the telephone
network through the use of remote access features.
Common carriers are required by law to collect their tariffed
charges. While these charges are fraudulent charges made by
persons with criminal intent, applicable tariffs state that the
customer of record is responsible for payment of all long-distance
or other network charges. Lucent Technologies cannot be
responsible for such charges and will not make any allowance or
give any credit for charges that result from unauthorized access.
To minimize the risk of unauthorized access to your DEFINITY
ECS:
■
When possible, restrict the off-network capability of offpremises callers, using calling restrictions, Facility Restriction
Levels, and Disallowed List capabilities.
■
When possible, block out-of-hours calling.
■
Frequently monitor system call detail reports for quicker
detection of any unauthorized or abnormal calling patterns.
x
Issue 2 July 1997
Customer Support Information
■
Limit Outcalling to persons on a need-to-have basis.
The DEFINITY ECS, through proper administration, can help you
reduce the risk of unauthorized persons gaining access to the
network. However, phone numbers and authorization codes can be
compromised when overheard in a public location, lost through
theft of a wallet or purse containing access information, or when
treated carelessly (writing codes on a piece of paper and
improperly discarding them).
Additionally, hackers may use a computer to dial an access code
and then publish the information to other hackers. Substantial
charges can accumulate quickly. It is your responsibility to take
appropriate steps to implement the features properly, to evaluate
and administer the various restriction levels, and to protect and
carefully distribute access codes.
Under applicable tariffs, you will be responsible for payment of toll
charges. Lucent Technologies cannot be responsible for such
charges and will not make any allowance or give any credit
resulting from unauthorized access.
Lucent Technologies Fraud
Intervention
If you
suspect you are being victimized
technical support or assistance, call the National Customer Service
Center at 1 800 242-2121.
by toll fraud and you need
Issue 2 July 1997
xi
Customer Support Information
Limited Warranty
Lucent Technologies Inc. warrants this equipment to be free of
defects in materials and workmanship for a period of one year from
date of shipment. All defects within this time will be repaired without
charge upon return of the unit to the factory.
This warranty is null and void if the manufacturer determines that
any modifications have been made to the unit or the unit has been
subjected to physical or electrical stress.
This warranty covers parts and labor only and does not include
shipping costs, travel expenses, or travel time.
Installation of the equipment is the sole responsibility of the
purchaser. The manufacturer, its agents, or its distributors accept
no responsibility for malfunction or damage caused by improper
treatment or connection of the unit.
The manufacturer, its agents, or its distributors are not liable for
any losses incurred through use or malfunction of the equipment or
any losses or damages incurred by the use of the equipment in any
means whatsoever.
This warranty is limited to the repair of the equipment to its normal
functioning capability.
This warranty is complete as stated and all other warranties,
expressed or implied, are invalid.
The DEFINITY Extender System should be installed only by
qualified personnel. No user-serviceable parts are contained within
the units. Installation or programming should not begin prior to
review of all sections of this manual.
xii
Issue 2 July 1997
Customer Support Information
FCC Notification
and Repair Information
This equipment is registered with the FCC in accordance with Part
68 of its rules. In compliance with those rules, you are advised of
the following:
■
Means of Connection. Connection of this equipment to the
telephone network shall be through a standard network
interface jack, USOC RJ11C. These USOCs must be ordered
from your telephone company.
■
Party Lines and Coin Telephones. This equipment can not be
used with party lines or coin telephone lines.
■
Notification to the Telephone Companies. Before connecting
this equipment, you or your equipment supplier must notify your
local telephone company’s business office of the following:
— The telephone number(s) you will be using with this
equipment.
— The appropriate registration number and ringer equivalence
number (REN), which can be found on the back or bottom
of the control unit.
— For each jack, the sequence in which lines are to be
connected, the line types, the Facility Interface Code (FIC),
and the Ringer Equivalence Number (REN) by position
when applicable.
Issue 2 July 1997
xiii
Customer Support Information
■
Ringer Equivalence Number (REN). The REN is used to
determine the number of devices that can be connected to the
telephone line. Excessive RENs on the line can result in the
devices not ringing in response to an incoming call. In most, but
not all, areas the sum of the RENs should not exceed five (5.0).
To be certain of the number of devices that can be connected
to the line, as determined by the total RENs, contact the local
telephone company to determine the maximum REN for the
calling area.
■
Disconnection. You must also notify your local telephone
company if and when this equipment is permanently
disconnected from the line(s).
Installation and Operational
Procedures
This manual contains information about installation and operational
procedures.
■
Repair Instructions. If you experience trouble because your
equipment is malfunctioning, the FCC requires that the
equipment not be used and that it be disconnected from the
network until the problem has been corrected. Repairs to this
equipment can be made only by the manufacturers, their
authorized agents, or others who may be authorized by the
FCC. In the event repairs are needed on this equipment,
contact your authorized Lucent Technologies dealer or, in theUSA only, contact the National Service Assistance Center
(NSAC) at 1 800 242-2121.
xiv
Issue 2 July 1997
Customer Support Information
■
Rights of the Local Telephone Company. If this equipment
causes harm to the telephone network, the local telephone
company may discontinue your service temporarily. If possible,
they will notify you in advance. But if advance notice is not
practical, you will be notified as soon as possible. You will also
be informed of your right to file a complaint with the FCC.
■
Changes at Local Telephone Company. Your local telephone
company may make changes in its facilities, equipment,
operations, or procedures that affect the proper functioning of
this equipment. If they do, you will be notified in advance to give
you an opportunity to maintain uninterrupted telephone service.
■
New Network Area and Exchange Codes. The DEFINITY
ECS software does not restrict access to any new area codes
or exchange codes established by a local telephone company.
If the user has established toll restrictions on the system that
could restrict access, then the user should check the lists of
allowed and disallowed dial codes and modify them as needed.
■
Equal Access Codes. This equipment is capable of providing
users access to interstate providers of operator services
through the use of access codes. Modifications of this
equipment by call aggregators to block access dialing codes is
a violation of the Telephone Operator Consumers Act of 1990.
Issue 2 July 1997
xv
Customer Support Information
Federal Communications
Commission (FCC)
Electromagnetic Interference
Information
This equipment has been tested and found to comply with the limits
for a Class B digital device, pursuant to Part 15 of the FCC Rules.
These limits are designed to provide reasonable protection against
harmful interference when the equipment is operated in a
residential environment. This equipment generates, uses, and can
radiate radio frequency energy and, if not installed and used in
accordance with the instruction manual, may cause harmful
interference to radio communications.
xvi
Issue 2 July 1997
About This Book
Intended Audience
This book is intended to help in the installation, system
administration, and maintenance of the DEFINITY Extender
Remote Module. It is intended for use as a reference by anyone
needing such information, including system managers, support
personnel, sales representatives, and account executives. It is also
intended for technicians who are responsible for system
installation, maintenance, and troubleshooting.
Issue 2 July 1997
xvii
About This Book
Terms and Conventions
The DEFINITY Extender Remote Module will henceforth be
referred to as the Remote Module.
The DEFINITY Extender Switch Module will henceforth be referred
to as the Switch Module.
Throughout this document, toll fraud security hazards are indicated
by an exclamation point inside a triangle and the words Security
Alert.
Security Alert:
Security Alert indicates the presence of toll fraud
security hazard. Toll fraud is the unauthorized use of
your telecommunications system by an unauthorized
party (e.g., persons other than your company’s
employees, agents, subcontractors, or persons
working on your company’s behalf). Be sure to read
“Your Responsibility for Your System’s Security” on
the inside front cover of this book and “Security of
Your System: Preventing Toll Fraud” in About This
Book.
xviii
Issue 2 July 1997
About This Book
Typographical Conventions
Certain type fonts and styles act as visual cues to help you rapidly
understand the information presented:
ExamplePurpose
Do
recycle old passwords.Italics indicate emphasis.
not
If you do not want to disconnect,
go to Step 3.
At the "Go Online" screen, press
until the following screen
3
appears:
Press the Drop button four
times.
2:OK 3:Next
Italics also tell you instructions
about what to do next in a
procedure.
A number in a shaded box is used
to designate a key on your
telephone.
The names of fixed-feature,
factory-imprinted buttons on a
telephone appear in bold.
Plain constant-width type in a
shaded box indicates text that
appears on the telephone display.
How to Use This Book
This book is organized into chapters that give information on
procedures necessary for the proper installation and administration
of your DEFINITY Extender Remote Module.
“Related Documents,” later in this section, provides a complete list
of system documentation, together with ordering information.
Issue 2 July 1997
xix
Loading...
+ 49 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.