Nortel BCM 3.7, Business Communications Manager 3.7 User Manual

Part No. N0008589 3.3 December 2006
Business Communications Manager 3.7
Programming Operations Guide
Copyright © Nortel Networks 2003–2006
All rights reserved. The information in this document is subject to change without notice. The statements, configurations, technical data, and
recommendations in this document are believed to be accurate and reliable, but are presented without express or implied warranty. Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Nortel Networks NA Inc.
Trademarks
NORTEL NETWORKS is a trademark of Nortel Networks. Microsoft, MS, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. All other trademarks and registered trademarks are the property of their respective owners.
N0008589 3.3
Software licensing
The Apache Software License, Version 1.1
Copyright (c) 2000-2002 The Apache Software Foundation. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met: 1 Redistributions of source code must retain the above copyright notice, this list of conditions
and the following disclaimer.
2 Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3 The end-user documentation included with the redistribution, if any, must include the
following acknowledgment: “This product includes software developed by the Apache Software Foundation (http://www.apache.org/).”
Alternately , this acknowledgment may appear in the software itself, if and wherever such third-party acknowledgments normally appear.
Software licensing 3
4 The names “Apache” and “Apache Software Foundation” must not be used to endorse or
promote products derived from this software without prior written permission. For written permission, please contact apache@apache.org.
5 Products derived from this software may not be called “Apache”, nor may “Apache” appear in
their name, without prior written permission of the Apache Software Foundation.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
==================================================================== This software consists of voluntary contributions made by many individuals on behalf of the
Apache Software Foundation. For more information on the Apache Software Foundation, please see <http://www.apache.org/>.
Portions of this software are based upon public domain software originally written at the National Center for Supercomputing Applications, University of Illinois, Urbana-Champaign.
Programming Operations Guide
4 Software licensing
N0008589 3.3
Contents
Software licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
The Apache Software License, Version 1.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Before you begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Symbols used in this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Text conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
About the buttons on your telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Basic digital telephones: 7100 and 7000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Portable handsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
IP telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Acronyms used in this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
System documentation map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Installation documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Operations documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Call Management documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Unified Manager and hardware maintenance documentation . . . . . . . . . . . . . . . . 61
Multi-site Administration: Network Configuration Manager . . . . . . . . . . . . . . . . . . 61
How to get help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Chapter 1
Getting started with Unified Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Computer requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Browser requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Using a HTTP Proxy server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Logging on to Unified Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Understanding BCM SSL certificate properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Uploading a certificate and a private security key . . . . . . . . . . . . . . . . . . . . . . . . . 69
Troubleshooting: Restoring the default certificate . . . . . . . . . . . . . . . . . . . . . . 71
Suppressing the security alert message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Using the non-secure http:6800 port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Using the Unified Manager main page buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Accessing the Unified Manager programming interface . . . . . . . . . . . . . . . . . . . . 73
Using the Preinstalled Client Home Page hyperlink . . . . . . . . . . . . . . . . . . . . 74
Locating Wizards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Navigating the wizards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Locating optional features from the main page . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Finding documentation from the main page . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Using BRU from the main page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Accessing maintenance information from the main page . . . . . . . . . . . . . . . . 79
Using the Unified Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Programming Operations Guide
6 Contents
Using Unified Manager Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Logging off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Using the SSH client to access the text-based interface . . . . . . . . . . . . . . . . . . . . . . . 87
Manually activating Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Chapter 2
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
System configuration process maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Finding your way around . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Business Communications Manager hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Additional Business Communications Manager applications . . . . . . . . . . . . . . . . . . 102
Business Communications Manager system access . . . . . . . . . . . . . . . . . . . . . . 80
Unified Manager screen display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Understanding the dynamic menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Understanding the navigation tree headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Understanding tabbed pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Viewing help for navigation tree headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Viewing help for tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Installing PuTTY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Using PuTTY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Initial system configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Configuring telephony components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Optional keycoded features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Data and IP telephony configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Post-system setup features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Security and User Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Telephony programming quick access list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Configuration overviews and planning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Lines and network configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Telephony configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Special features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Reference material . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Data programming sections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
BCM1000 (legacy equipment) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
BCM200/BCM400 base units . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
What do media bay modules do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
How does the system connect to the network? . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Chapter 3
Configuring system parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Accessing the Wizards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Wizard Warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
What you need to know before you use the wizard . . . . . . . . . . . . . . . . . . . . . . . 105
Using the Quick Start Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
N0008589 3.3
Contents 7
Entering information into the Quick Start Wizard . . . . . . . . . . . . . . . . . . . . . . . . 108
Changing system identification parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Identifying your system and software version . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Changing the system name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Viewing the system software version. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Changing the Business Communications Manager time and date . . . . . . . . . . . 111
Changing the system domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Assigning a workgroup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Assigning a domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Assigning a Windows 2000 domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Changing the CallPilot region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Delayed system restart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Chapter 4
Managing system and user security access levels . . . . . . . . . . . . . . . . . 117
Setting the interface timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Setting system security compatibility levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Managing access passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Viewing the User Manager tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Adding or modifying a user profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Deleting a user profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Setting up callback for a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Adding or modifying a group profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Deleting a Group profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Adding a Domain User Group profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Deleting a Domain User Group profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Setting password lockout policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Setting password policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Chapter 5
Configuring resources — media bay modules . . . . . . . . . . . . . . . . . . . . . 135
Explaining the Media Bay Modules headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Media bay module Bus numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Identifying the module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Module types and capacities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
GATM (Global Analog Trunk module) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Ports on Bus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Defining trunk module types and settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Configuring the trunk module to line type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Determining Clock Sources for DTMs or BRIs . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Timing within networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
T1 interface parameters (region-specific) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Interface levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Internal CSU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Programming Operations Guide
8 Contents
Viewing station module information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Internally-driven channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Working with the modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
E1 parameters (region-specific) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
PRI Call-by-Call service selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Provisioning lines (PRI, T1, DASS2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Provisioning a line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Provisioning BRI loops/lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Deprovisioning a line/loop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
PRI B-channel provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Trunk module ports programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
PRI version information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Determining station port state . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Viewing port device information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Station module line deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Viewing Media Bay Module status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Disabling/enabling a DS30 bus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Disabling/enabling a single module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Disabling/enabling a port channel setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Chapter 6
Data and split-line configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Configuring the DDI Mux module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
DDI Mux features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Configuring DDI Mux connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Assigning the DDI mux modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Assigning lines for voice traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Assigning lines to the data module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Changing the line type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Assigning the line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Removing a line assignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Removing the line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Configuring the line for telephony . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Configuring the DDI Mux to work with the DTE . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Universal T1 WAN (UTWAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Activating the UTWAN feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
UTWAN connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Frame Relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Point-to-Point-Protocol (PPP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Fragmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
RTP Header compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Data compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Configuring the Business Communications Manager to use the UTWAN . . . . . 171
N0008589 3.3
Contents 9
Assigning lines for voice traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Assigning lines for data traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Determining which lines are available to the UTWAN . . . . . . . . . . . . . . . . . 172
Changing the line type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Assigning lines to the Data Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Removing a line assigned for data traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Configuring the UTWAN Network Interface parameters . . . . . . . . . . . . . . . . . . . 175
Configuring the UTWAN Summary parameters . . . . . . . . . . . . . . . . . . . . . . . . . 175
Configuring the UTWAN to use a Frame Relay link . . . . . . . . . . . . . . . . . . . . . . 177
Configuring the Frame Relay parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Configuring the PVC Configuration parameters . . . . . . . . . . . . . . . . . . . . . . 179
Configuring the UTWAN to use a PPP link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Configuring the PPP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Configuring the LCP Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Configuring the IPCP Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Configuring the PPP User List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Configuring additional IP addresses for the UTWAN . . . . . . . . . . . . . . . . . . . . . 187
Examples of uses of multiple IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . 187
Restrictions when using multiple IP addresses . . . . . . . . . . . . . . . . . . . . . . 187
Adding an additional IP address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Modifying an additional IP address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Deleting an additional IP address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Viewing the UTWAN performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Viewing UTWAN resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Configuring a data module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Viewing the data module settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Programming the BayStack settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Fixed access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Adding line assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Deleting line assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Switched access (PRI & BRI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Line assignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Adding line assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Deleting line assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Line pool access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Adding line pool access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Deleting line pool access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Chapter 7
Telephony Services overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Process map: Creating telephony services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Telephony Services headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Typical DN record headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Programming Operations Guide
10 Contents
Planning your telephony services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Three basic system telephony configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Telephony metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Chapter 8
Telephony feature planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Creating numbering plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Outgoing calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Incoming calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Name a telephone, a line or a Hunt group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Incoming and outgoing call display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Programming line access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Making lines available . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Incoming calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Outgoing calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Answering calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Distinctive ring patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Centralized and group answering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Pick up features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Make a call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Emergency 911 dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Select how you dial your calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Receive a busy signal on an internal call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Create a conference call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Time-saving features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Handling calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Holding calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Parking or transferring calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Sharing calls by parking on SWCA buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Forwarding calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Prevent calls from ringing at your telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Communicating in the office . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Using handsfree and mute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Track your incoming calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Use alternate or scheduled services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Special telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Auxiliary devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Call out to external systems using host system dialing . . . . . . . . . . . . . . . . . . . . . . . 234
Call in from outside the system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Square system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
PBX system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
DID system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Legacy devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
N0008589 3.3
Contents 11
Controlling telephone programming access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Special features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Chapter 9
Configuring lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Understanding the process of line configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
Understanding how the system identifies lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Copying line programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Determining which lines you need to program . . . . . . . . . . . . . . . . . . . . . . . . . . 242
VoIP lines (require keycode) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Target lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Physical lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
All lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Using the General record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Assigning Trunk/line data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Loop start analog/digital fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Ground start fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
DID fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
E&M fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Target lines and DASS2 fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
PRI fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
BRI fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
DPNSS fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
VoIP fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Lines field cross-reference chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Turn Privacy on or off for a call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
Received # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Line pool tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Using loss packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
Assigning Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Setting line restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Setting remote restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
Setting line telco features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Chapter 10
Configuring BRI Loops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
BRI configuration process map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Using an NT-1 for BRI U2/BRI U4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Identifying BRI T-loops (T1 profiles) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Adding SPIDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Identifying the SPID B-channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Adding SPID network DNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Identifying BRI T-loops (ETSI, QSIG) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Configuring D-packet service for T loops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Programming Operations Guide
12 Contents
Provisioning the loop variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Setting BRI for ISDN device connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Configuring S-loops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Chapter 11
Controlling access into the system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Defining DN length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Changing the DN length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Using the Received # length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
Changing the received # length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
Assigning target lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Assigning a target line to a telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Configuring the target line received number . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Configuring for remote access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
Creating Direct Inward System Access (DISA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Defining remote access packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
Using COS passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
External access tones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
Provisioning the Loop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Provisioning the lines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
Programming BRI lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Assigning the lines to telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Wiring internal connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Assigning DNs to the S- loop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Configure the ISDN terminal records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Notes about the Public and Private Received Numbers . . . . . . . . . . . . . . . . 300
Remote access line settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Remote access on loop start trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Remote access on T1 DID trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Remote access on PRI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Remote access on DPNSS lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Remote access on a private network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Defining line pool access for remote packages . . . . . . . . . . . . . . . . . . . . . . . 304
Defining remote Page for remote packages . . . . . . . . . . . . . . . . . . . . . . . . . 304
Creating COS parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
Notes about COS passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
COS examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
Chapter 12
Configuring outgoing calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Configuring the public and private dialing plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Setting Dialing timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Using private network dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Setting up the dialing plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Outgoing private calls routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
N0008589 3.3
Contents 13
Setting up public network dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
About the Public DN lengths table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Adding or modifying dialing plan Public DN lengths . . . . . . . . . . . . . . . . . . . 317
Outgoing public calls routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
Determining line access dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
Understanding access codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Programming access codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Call Park codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Creating Direct Dial sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Tips about access codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Using the MCDN access codes (tandem calls) . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Setting up line pool access codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Using Carrier codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
About Carrier access codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Identifying Carrier access codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Configuring call routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Routing configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Defining routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Call by Call service routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
Programming the PRI routing table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Enbloc dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Using destination codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
Why use destination codes? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
Deciding on a code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Grouping destination codes using a wild card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Configuring destination codes with wild cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
Create the destination code. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
Set up the destination code schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Enable/disable wild card digits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
Setting up a destination for local calling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
Setting up a route through a dedicated trunk . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
Notes about the Absorbed length: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
Adding Carrier access codes to destination codes . . . . . . . . . . . . . . . . . . . . . . . 346
Programming for least-cost routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
Using multiple routes and overflow routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
Using dialing restrictions with routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
Configuring Call by Call services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
Supporting protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
Call by Call services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
Switches supporting Call by Call limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
Provisioning for Call by Call limits with PRI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
Other required programming in the Unified Manager . . . . . . . . . . . . . . . . . . 352
Setting CbC limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
Programming Operations Guide
14 Contents
Viewing CbC limit metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
Defining restriction filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
Adding a restriction filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Notes about restriction filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
Adding overrides to restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
Restriction filter examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
Enhanced 911 (E911) configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
Chapter 13
Configuring DN records, an overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
Understanding the configuration process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
DN mapping for digital telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Double Density and DNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
DN chart for upgraded 2.5 systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
DN chart for new 3.0 or newer systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
DN mapping for ISDN and legacy wireless handset devices . . . . . . . . . . . . . . . 370
Defining the System DN headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
The two sides of a DN record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
The System DN headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
DN Registration headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
Moving between the Inactive and Active lists . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Deregistering IP telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Feature DNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Renumbering DNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Using a wizard to renumber telephone DNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Change telephone DNs using the Unified Manager . . . . . . . . . . . . . . . . . . . . . . 379
Setting CbC limits (on U.K. core BCMs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
PRI line pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
Removing restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
Default filters (North America) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
Default filters (other) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
From Active list to the Inactive list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
From Inactive list to Active list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Chapter 14
Configuring DNs using the Wizards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Editing DN Record Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
What you need to know to fill out a template . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Creating telephone records with the Add Users Wizard . . . . . . . . . . . . . . . . . . . . . . 387
What you need to know about the user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
Notes about Add Users target lines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
Changing button programming in the wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
Notes about programming telephone buttons . . . . . . . . . . . . . . . . . . . . . . . . 395
N0008589 3.3
Contents 15
Using remote templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396
Saving wizard pages on your computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
Chapter 15
Configuring DNs for system devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Copying settings to other DNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
Identifying the telephone (General heading) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Configuring line access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Assigning line access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406
Rules about assigning prime lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Assigning intercom (I/C) buttons (keys). . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
Private OLI notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
Determining line assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Applying target lines (incoming calls only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Assigning lines to telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
Notes about assigning lines to telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
Assigning line pool access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
About PRI line pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Using Answer DNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Assigning Answer DNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
Answer DN notes: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
Defining device capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Configuring the Capabilities features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
Line redirection notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
Assigning Call Forward . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
DPNSS notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
Assigning a Hotline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
Determining analog settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
MWI tone/lamp matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Setting intrusion controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
Setting SWCA call groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
Configuring SWCA call groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
Defining user preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
Configuring user preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Call log notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Programming telephone buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
Configuring buttons from the DN record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Notes about button programming: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
Replacing digital telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
Button labeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
Default button assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
Rules of default button assignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
7316E digital phone button defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Programming Operations Guide
16 Contents
7316 button defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
7208 button defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
7100 button defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
7000 button defaults* . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
7406 cordless digital phone button defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
IP telephone button defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440
WLAN IP telephone default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
Configuring user speed dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
Entering user speed dials at the telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
Setting up CAP stations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
Configuring CAP/KIM assignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
Monitoring telephones with the CAP or KIM module . . . . . . . . . . . . . . . . . . . . . . 449
Configuring a CAP or KIM module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Programming CAP/KIM buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Cold starting the KIM to erase programming . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Programming restrictions for DNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
Defining telephone dialing restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
Setting restriction schedules for telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
Defining line/set restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
Configuring telco features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456
Voice Mail settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
Deleting a mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
2004 IP telephone and 2050 Software Phone button defaults . . . . . . . . . . . 440
2002 IP telephone button defaults. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
2001 IP telephone button defaults. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
CAP/KIM notes: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
Chapter 16
Configuring system settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Network name display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
Receiving and sending calling party name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
Network name display interactions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
Enabling/disabling outgoing name display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
Programming Business name display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463
Using alpha tagging for name display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463
Programming Feature settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Background and on-hold music sourcing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468
Answer key levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Configuring system-wide call appearance groups . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
Finding SWCA calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
Programming SWCA controls for your system . . . . . . . . . . . . . . . . . . . . . . . . . . 471
How SWCA works in a call group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
N0008589 3.3
Phantom DNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Contents 17
Transferring calls between SWCA groups . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Parking and retrieving calls on SWCA keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Manually associating a call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Parking a call to a SWCA key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Retrieving a parked call from a SWCA key . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Call interactions with SWCA controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Resetting call log space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
Setting system timers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Define release reason levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Configuring system speed dial numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Assigning numbers to system speed dial codes . . . . . . . . . . . . . . . . . . . . . . . . . 483
Setting system telco features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485
Defining Voice Message Center numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485
Setting outgoing name and number blocking . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
Configuring ONN blocking service codes . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
Chapter 17
Configuring schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
Turn services on and off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
Overriding services with a Control telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Direct-dial telephone ringing service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Defining common schedule settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Defining the service control password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Changing schedule names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
Changing schedule times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
About start and stop times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
Defining service schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
Configuring ringing service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496
Defining ring groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496
Defining ringing service schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Assigning ringing groups to lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498
Configuring restriction service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499
Notes about restriction service filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
Configuring routing service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Chapter 18
Configuring public networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
Simple networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
Callers using Business Communications Manager . . . . . . . . . . . . . . . . . . . . . . . 504
Callers in the public network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504
Callers in the private network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504
Dialing plans for T1 lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
Dialing plan using public lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
Destination code numbering in a network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
Programming Operations Guide
18 Contents
Other programming that affects public networking . . . . . . . . . . . . . . . . . . . . . . . . . . 507
Chapter 19
Configuring private networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
Private network programming parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
Private networking protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
Keycode requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
Remote access to the network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
Lines used for networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
Other programming that affects private networking . . . . . . . . . . . . . . . . . . . . . . 511
Using routing to create networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512
Using shared line pools to create a network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
PRI networking using Call-by-Call services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
Chapter 20
Configuring private networks with SL-1 MCDN. . . . . . . . . . . . . . . . . . . . . 523
System numbering plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524
Creating tandem private networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524
Calls originating from the public network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
Calls originating in the private network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528
Routing for tandem networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530
Understanding MCDN network features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532
Network Call Redirection Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532
ISDN Call Connection Limitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
Trunk Route Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535
Trunk Anti-tromboning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536
Using SL-1 with MCDN to network with a Meridian system . . . . . . . . . . . . . . . . . . . 537
Meridian system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537
MCDN networking checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538
UDP-specific programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
CDP-specific programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
An example of a private network with Meridian 1 . . . . . . . . . . . . . . . . . . . . . . . . 541
VoIP networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544
Software requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538
Configuring special IP trunking interoperability . . . . . . . . . . . . . . . . . . . . . . . 545
Chapter 21
Configuring ETSI QSIG and DPNSS network services. . . . . . . . . . . . . . . 547
Networking with ETSI QSIG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548
ETSI Euro network services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549
DPNSS 1 services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551
DPNSS 1 capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551
DPNSS to Embark connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552
DPNSS 1 features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552
N0008589 3.3
Contents 19
Three party service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
Making a conference call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
Using the diversion feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
Restrictions by telephone type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554
Setting Diversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554
Using the Redirection feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
Restrictions by telephone type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
Setting redirection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
Executive intrusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
Restrictions by telephone type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
Intrusion levels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
Programming IPL on a telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
Call offer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
Call Offer Displays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
Restrictions by telephone type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
User actions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558
Route optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558
Setting Route Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558
Loop avoidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
Programming loop avoidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
Private networking with DPNSS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
Guidelines for creating a private numbering plan with DPNSS . . . . . . . . . . . . . . 562
Customizing the DPNSS routing service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
Chapter 22
Configuring centralized voice mail. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
Business Communications Manager as host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564
Meridian system as host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564
CallPilot compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564
Meridian Mail compatibility issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564
System set up for host Business Communications Manager . . . . . . . . . . . . . . . . . . 565
System set up for satellite systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566
Configuring the system for centralized voice mail . . . . . . . . . . . . . . . . . . . . . . . . . . . 568
Meridian MCDN call features over PRI SL-1 lines . . . . . . . . . . . . . . . . . . . . . . . . . . . 569
Message Waiting Indication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569
Camp-on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571
Break-in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
Configuring MWI on DPNSS 1 networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
Assigning message centers to a line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
Programming MWI and MWC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575
Selecting a message center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575
Setting Message Waiting Indication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576
Programming Operations Guide
20 Contents
Chapter 23
Configuring Hunt groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
How to use Hunt groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 578
Identifying a Hunt group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
Hunt group modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581
Hunt group members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
Adding a Hunt group member . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
Moving members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
Programming Hunt group lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586
Assigning a line to a hunt group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
Feature operation within Hunt groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588
Monitoring Hunt groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589
Setting up Silent Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589
Using Silent Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 590
Using Hunt group metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
Removing a Hunt group member . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584
Removing all members from a Hunt group . . . . . . . . . . . . . . . . . . . . . . . . . . 584
Unassigning a line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
Unassigning all lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
Chapter 24
Configuring Hospitality Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
About the Hospitality feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
Hospitality telephone definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
Alarm Time (AL) feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
Power failures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
Setting up Hospitality services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
Identifying room telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596
Identifying Call Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597
Setting room restriction filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597
Programming Alarm data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598
Setting alarm parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598
Configuring for expired alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599
Using the Hospitality Services Admin telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . . 600
Hospitality Services admin alarm feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 600
Setting the state of a room at a telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
Setting room condition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
Using the Hospitality services room telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 602
Setting the alarm on a room telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 602
Change or cancel an alarm time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
Turn off an alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
Setting the Room condition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
N0008589 3.3
Contents 21
Chapter 25
Configuring the music source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
Selecting the music source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606
Configuring BcmAmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
Opening the BcmAmp Administration application . . . . . . . . . . . . . . . . . . . . . . . . 607
Loading music onto the Business Communications Manager . . . . . . . . . . . . . . 607
Restrictions on uploading files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608
Deleting music from Business Communications Manager . . . . . . . . . . . . . . . . . 608
Adding music to the Play List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609
Removing music from the Play List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609
Using the BcmAmp Player . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610
Configuring a Network Device to be the IP Music Source . . . . . . . . . . . . . . . . . . . . . 611
Chapter 26
Configuring the MSC resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613
Types of MSC resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613
Signaling channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
Media channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
DSP resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
Voice bus paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
Media gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
Rules for managing the MSC resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
Signaling channel rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
Media channel rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
Example of how to estimate peak media channel usage . . . . . . . . . . . . . . . 616
DSP resources rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617
Voice bus path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617
Media gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 618
Determining the MSC resources you require . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 618
ISDN WAN (Dial-up/Nailed-up) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 618
DECT mobility (legacy system) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
Voice Mail and ACD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
IVR and IVR Fax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620
IP telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620
IP Trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621
Record of required MSC resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623
Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624
Example of a Business Communications Manager configuration . . . . . . . . . 625
Configuring the MSC resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626
Viewing the MSC information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626
Viewing the MS-PEC configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627
Understanding the MSC Minimum and Maximum values . . . . . . . . . . . . . . . . . . 628
Minimum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628
Programming Operations Guide
22 Contents
Viewing the MSC Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
Changing the MSC configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
Creating a custom MSC configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
DTMF Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 632
Changing the DS30 Split . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633
Configuring Double Density . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634
Chapter 27
Using a wizard to change data parameters . . . . . . . . . . . . . . . . . . . . . . . . 637
Viewing Business Communications Manager resources . . . . . . . . . . . . . . . . . . . . . . 637
Using the Network Update Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638
What you need to know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
Chapter 28
Configuring DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641
DHCP configuration overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641
Configuring the DHCP Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 642
Configuring a DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
LAN settings for DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 646
Configuring Address ranges for a Local Scope . . . . . . . . . . . . . . . . . . . . . . . . . . 648
Configuring Excluded addresses for a Local Scope . . . . . . . . . . . . . . . . . . . . . . 649
Configuring Reserved addresses for a Local Scope . . . . . . . . . . . . . . . . . . . . . . 651
Remote Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654
Adding a Remote Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654
Modifying Remote Scope settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
Configuring Remote Scope Address ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
Configuring Remote Scope excluded addresses . . . . . . . . . . . . . . . . . . . . . . . . 657
Maximum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628
Adding an address range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648
Modifying an address range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648
Deleting an address range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
Adding an excluded address range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
Modifying excluded address ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 650
Deleting an excluded address range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 650
Adding a reserved address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
Modifying a reserved address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
Deleting a reserved address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652
Viewing the Lease Information for a Reserved address . . . . . . . . . . . . . . . . 652
Adding an address range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
Modifying address ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 656
Deleting an address range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 656
Adding a excluded address range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657
Modifying excluded address ranges: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 658
Deleting an excluded address range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 658
N0008589 3.3
Contents 23
Configuring Remote Scope Reserved Addresses . . . . . . . . . . . . . . . . . . . . . . . . 659
Adding a reserved address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
Deleting a reserved address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660
Remote Scope Lease Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660
Deleting a Remote Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661
Configuring a DHCP Relay Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 662
Deleting a server from the Server List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 662
LAN settings for DHCP Relay Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663
Importing and Exporting DHCP data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664
Exporting DHCP data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664
Importing DHCP data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665
Reconciling the DHCP data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665
Chapter 29
Configuring the LAN resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667
Viewing the LAN resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667
Configuring LAN resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668
Setting LAN global parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668
Configuring a LAN interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669
Configuring multiple IP addresses for the LAN interface . . . . . . . . . . . . . . . . . . . 671
Adding an additional IP address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671
Modifying an Additional IP Address. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 672
Deleting an Additional IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 672
Viewing LAN performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 672
Chapter 30
Configuring the WAN resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
Permanent WAN connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
Frame Relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
Point-to-Point-Protocol (PPP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674
Multi-link Point-to-Point Protocol (MLPPP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674
WAN data compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674
Viewing WAN resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674
Setting global WAN parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675
Configuring the PPP password list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675
Modifying an existing item on the PPP Password List. . . . . . . . . . . . . . . . . . 676
Deleting an item from the PPP Password List. . . . . . . . . . . . . . . . . . . . . . . . 676
Configuring the WAN interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677
Configuring WAN summary parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677
Setting WAN Line Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679
Setting WAN Sync Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680
Setting WAN Frame Relay Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680
PVC Congestion Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Adding PVC congestion control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Programming Operations Guide
24 Contents
WAN PPP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
Configuring multiple IP addresses for a WAN interface . . . . . . . . . . . . . . . . . . . 685
Configuring the DLCI to IP Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
WAN performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
Chapter 31
Configuring the Dial Up resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 689
Configuring the dial up global parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 689
V.90 modem dial up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
Enabling and disabling the V.90 modem interface . . . . . . . . . . . . . . . . . . . . . . . 690
Changing the Modem Region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
Configuring the V.90 modem interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
ISDN dial up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
Creating an ISDN dial up interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
Configuring an ISDN interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
Configuring the ISDN channel characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
Deleting an ISDN interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
Point to Point Protocol on Ethernet (PPPoE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701
Settings required for PPPoE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701
Installing PPPoE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702
Creating a PPPoE dial up interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
Configuring a PPPoE interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
Connecting to the Internet Service Provider (ISP) . . . . . . . . . . . . . . . . . . . . . . . 705
Deleting a PPPoE interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
Guidelines for using Remote Dial-in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
Modifying PVC congestion controls. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
Deleting a PVC congestion control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
Examples of uses of multiple IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . 685
Restrictions when using multiple IP addresses . . . . . . . . . . . . . . . . . . . . . . 685
Adding an additional IP address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
Modifying an Additional IP Address. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686
Deleting an Additional IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686
Adding DLCI to IP Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
Modifying DLCI to IP Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
Deleting DLCI to IP Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
Assigning an ISDN dial number and IP address . . . . . . . . . . . . . . . . . . . . . . 699
Modifying the characteristics of an existing ISDN channel . . . . . . . . . . . . . . 699
Deleting an ISDN channel from the ISDN Channel Characteristics list . . . . 699
Chapter 32
Configuring DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
Using the Business Communications Manager DNS service . . . . . . . . . . . . . . . 708
N0008589 3.3
Contents 25
Chapter 33
Configuring IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
Routing Information Protocol (RIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
Open Shortest Path First (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710
IP routing protocol precedence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710
Configuring IP Routing global settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711
Setting the RIP Global Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711
Setting the OSPF Global Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 712
Configuring IP routing on an interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
Configuring RIP parameters on a network interface . . . . . . . . . . . . . . . . . . . . . . 713
Enabling the RIP Subnet summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715
Disabling the RIP Subnet summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 716
Configuring OSPF parameters on a network interface . . . . . . . . . . . . . . . . . . . . 716
OSPF NBMA Neighbors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718
Adding OSPF NBMA Neighbors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718
Modifying OSPF NBMA Neighbors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718
Deleting OSPF NBMA Neighbors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
Static routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
Adding a static route to the routing table . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
Modifying the static route configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720
Deleting a static route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720
Restarting the router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721
Chapter 34
Configuring Web Cache. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723
Guidelines for using Web caching/Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723
Important Web Cache considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725
Web Cache page update required . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725
DIALUP interfaces blocking condition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725
Additional IP addresses are not blocked . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725
Chapter 35
Configuring QoS monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727
How QoS monitoring works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727
Setting the QoS monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729
Viewing the QoS Monitor Mean Opinion Score . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729
Configuring the logging options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731
Viewing the Mean Opinion Score log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731
Chapter 36
Configuring Net Link Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733
Enabling or Disabling Net Link Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734
Selecting a permanent WAN link as the primary WAN connection . . . . . . . . . . . . . . 734
Selecting a dial-up link as the primary WAN connection . . . . . . . . . . . . . . . . . . . . . . 736
Programming Operations Guide
26 Contents
Chapter 37
Configuring NAT (Network Address Translation) . . . . . . . . . . . . . . . . . . . 737
Static NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
Dynamic NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
NAT and IP Firewall filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738
Managing Business Communications Manager . . . . . . . . . . . . . . . . . . . . . . . . . 738
Enabling and disabling NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738
Configuring an Interface with NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 739
Adding Default rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 739
Adding a Rule to an interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 740
Modifying a Rule to an Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 741
Configuring NAT to change the source IP address used for WAN traffic . . . . . . 742
Deleting a Rule to an Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 742
Configuring the Rule order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 742
Examples of common NAT configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743
Example 1: Using a static Public IP address . . . . . . . . . . . . . . . . . . . . . . . . 743
Example 2: Using dynamic Public IP address . . . . . . . . . . . . . . . . . . . . . . . 744
Example 3: Changing the source IP address of WAN traffic . . . . . . . . . . . . 745
Chapter 38
Configuring NTP Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
Configuring the NTP Client settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 750
Starting the NTP Client Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 751
Manually updating the Business Communications Manager time . . . . . . . . . . . . . . . 752
Chapter 39
Virtual Private Networks (VPN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753
PPTP tunnel notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753
IPSec tunnel modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 754
PPTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 754
Settings required for PPTP tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755
NAT (Network Address Translation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755
QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755
IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755
Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755
IP Addresses and DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756
DNS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756
Changing the PPTP settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756
Adding a PPTP client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757
Deleting a PPTP client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758
Adding a PPTP tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758
Configuring a PPTP tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 759
Add a Destination Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 762
N0008589 3.3
Contents 27
Modifying a Destination Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763
Deleting a Destination Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764
Deleting a PPTP tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764
IPSec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765
Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 766
Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
Encryption method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
Authentication method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
IPSec capacity restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768
Settings required for IPSec tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768
NAT (Network Address Translation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768
Dialup ISDN connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 769
Compatibility with Contivity Extranet Switch and Shasta 5000 . . . . . . . . . . . 769
IPSec and PPTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 769
Multiple IP Address restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 769
Firewall rules for IPSec Branch Office and Remote User Tunnels . . . . . . . . 769
Changing the IPSec global settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 773
IPSec Branch Office configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 774
Adding a Branch Office IPSec Tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 774
Adding Local Accessible Networks to the Branch Office IPSec tunnel . . . . . 777
Adding Remote Accessible Networks to the Branch Office IPSec tunnel . . . 777
Sending all traffic from Local Accessible Networks through the IPSec tunnel 778
Modifying a Branch Office IPSec Tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 779
Modifying Local Accessible Networks to the Branch Office IPSec tunnel . . . 779
Modifying Remote Accessible Networks to the Branch Office IPSec tunnel . 779
Deleting a Branch Office IPSec tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 780
Deleting Local Accessible Networks to the Branch Office IPSec tunnel . . . . 780
Deleting Remote Accessible Networks to the Branch Office IPSec tunnel . . 780
Creating a tunnel between two Business Communications Managers . . . . . . . . 781
Configuring the first Business Communications Manager . . . . . . . . . . . . . . 781
Configuring the second Business Communications Manager . . . . . . . . . . . 781
Creating a tunnel between a Business Communications Manager and a Contivity Extranet
Switch v02_61 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 782
Configuring the Business Communications Manager . . . . . . . . . . . . . . . . . . 782
Configuring the Contivity Extranet Switch . . . . . . . . . . . . . . . . . . . . . . . . . . 782
Configuring the Business Communications Manager . . . . . . . . . . . . . . . . . . 783
Configuring the Contivity Extranet Switch . . . . . . . . . . . . . . . . . . . . . . . . . . 783
IPSec Remote User configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 784
IPSec Remote User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 784
Split Tunneling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 784
Adding a Remote User IPSec Tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 786
Assigning an IP Address to a Remote User Account . . . . . . . . . . . . . . . . . . 786
Adding a Remote IP Address Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 787
Programming Operations Guide
28 Contents
Adding Remote User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 789
Configuring Remote User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 791
Deleting a Remote User Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 793
Creating Banner Text for a remote user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 793
Chapter 40
Policy-enabled networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795
Policy configuration overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795
Differentiated Services (DiffServ) overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795
COPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 800
Policy overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 800
Implementing Quality of Service (QoS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801
Configuring the QoS Summary parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801
Configuring Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 802
Configuring Policy Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 804
Configuring Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807
Configuring QoS policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809
Implementing Common Open Policy Services (COPS) . . . . . . . . . . . . . . . . . . . . . . . 811
Viewing COPS statistics and capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 811
Modifying a Remote IP Address Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 788
Deleting a Remote IP Address Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 788
Configuring the DNS/WINS setting for the Remote User Account . . . . . . . . 791
Adding a Split Tunnel Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 792
Modifying a Split Tunnel Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 792
Deleting a Split Tunnel Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 793
DiffServ IP Quality of Service (QoS) architecture . . . . . . . . . . . . . . . . . . . . . 796
DiffServ components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 797
IP service classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 798
Packet classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 799
Creating an interface group configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 802
Modifying an interface group configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 803
Deleting an interface group configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 803
Creating an IP filter configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 804
Modifying an IP filter configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 805
Deleting an IP filter configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 806
Creating an IP filter group entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 806
Modifying an IP filter group configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 807
Deleting an IP filter group entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807
Creating an Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807
Modifying an Action entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 808
Deleting an Action entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 808
Adding a policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809
Modifying a policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 810
Deleting a policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 810
N0008589 3.3
Contents 29
Configuring a COPS Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 814
Adding a COPS Client Server entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 814
Modifying a COPS Client Server entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 814
Modifying the COPS Client Server Retry Data . . . . . . . . . . . . . . . . . . . . . . . 815
Configuring the Policy Agent characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 816
Chapter 41
Configuring IP Firewall Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 819
Packet filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 819
Basic (stateless) Packet Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 819
Stateful Packet Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 820
IP Firewall filters and NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 820
Viewing and changing the status of Firewall Filters . . . . . . . . . . . . . . . . . . . . . . . . . . 820
Configuring IP Firewall Filters for an interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821
Adding Default Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 822
Adding an Input Filter for a Firewall Filter Interface . . . . . . . . . . . . . . . . . . . . . . . 823
Modifying an Input Filter for a Firewall Filter Interface . . . . . . . . . . . . . . . . . . . . . 825
Deleting an Input Filter for a Firewall Filter Interface . . . . . . . . . . . . . . . . . . . . . . 825
Configuring the order of the input filters for an interface . . . . . . . . . . . . . . . . . . . 826
Adding an Output Filter for a Firewall Filter Interface . . . . . . . . . . . . . . . . . . . . . 827
Modifying an Output Filter for a Firewall Filter Interface . . . . . . . . . . . . . . . . . . . 827
Deleting an Output Filter for a Firewall Filter Interface . . . . . . . . . . . . . . . . . . . . 827
Configuring the order of the Output Filters for an interface . . . . . . . . . . . . . . . . . 828
Accessing Unified Manager through the Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . 829
Firewall rules for Business Communications Manager with Dialup interfaces . . . . . . 831
Appendix A
Defining region-based defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833
Region-based system settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833
Core software and regions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834
Languages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834
Caller ID displays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835
Companding Law by region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836
Mobility services by region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836
Media bay module availability by region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 837
FEM-trunk module combinations by region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 838
PRI line protocol support, by region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839
Supported ISDN line services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 840
Defining time zones by country and language . . . . . . . . . . . . . . . . . . . . . . . . . . 841
System feature defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 841
Dialing plan defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 844
BRI and PRI line types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 845
CallPilot regions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847
Programming Operations Guide
30 Contents
Appendix B
System Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849
Business Communications Manager feature codes . . . . . . . . . . . . . . . . . . . . . . . . . 849
Button programming features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853
Appendix C
ISDN overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 857
Welcome to ISDN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 857
Services and features for ISDN BRI and PRI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 860
PRI services and features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 860
BRI services and features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 860
ISDN hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864
PRI hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864
BRI hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864
Clock Source for ISDN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 866
ISDN BRI NT1 equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 867
ISDN standards compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 867
Planning your ISDN network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 867
Ordering ISDN PRI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 868
Ordering ISDN PRI Service in Canada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 868
Ordering ISDN PRI Service in United States . . . . . . . . . . . . . . . . . . . . . . . . . . . 868
Ordering ISDN PRI Service Outside of Canada and the United States . . . . . . . 868
Ordering ISDN BRI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 868
Ordering ISDN BRI Service in Canada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 868
Ordering ISDN BRI Service in the United States . . . . . . . . . . . . . . . . . . . . . . . . 869
Ordering ISDN BRI Service Outside Canada and the United States . . . . . . . . . 869
Supported ISDN Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 869
ISDN Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 870
Program PRI Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 870
Programming ISDN BRI Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 871
Program PRI Lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 872
Program ISDN BRI Lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 872
Program Direct Inward System Access (DISA) on PRI Lines . . . . . . . . . . . . . . . 873
Analog versus ISDN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 858
Types of ISDN service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 858
ISDN Layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 859
ISDN bearer capability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 859
Network name display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 861
Name and number blocking (ONN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 862
Call by Call Service Selection for PRI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 862
Emergency 911 dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863
2-way DID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863
Dialing plan and PRI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863
S Reference Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 865
T Reference Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 865
N0008589 3.3
Contents 31
Method 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 873
Method 2 (North America only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 873
Program ISDN Equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 874
Terminal equipment for BRI Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 874
Devices on an S loop (BRI cards only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 874
S or LT Loop DN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 874
D-packet Service (BRI only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 875
Appendix D
Configuring an analog device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 877
Configuring an analog device DN record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 878
General heading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 879
Line access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 880
To assign lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 880
To assign line pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881
To assign a prime line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881
Defining device capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 882
Assigning an external Hotline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 884
Determining analog device settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 885
Reviewing Set restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 886
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 887
Numerical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 887
A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 887
B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 890
C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 892
D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 897
E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 903
F . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 904
G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905
H . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 906
J . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 911
K . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 912
L . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 912
M . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 914
N . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 916
O . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 917
P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 918
Q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 923
R . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 923
S . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 927
T . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 932
U . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 935
V . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 936
Programming Operations Guide
32 Contents
W . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 937
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 939
N0008589 3.3
Figures
Figure 1 Security Alert dialog (JVM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Figure 2 Main Product Maintenance and Support web page . . . . . . . . . . . . . . . . . . . . . . 69
Figure 3 Maintenance Tools dialog web page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Figure 4 Main Product Maintenance and Support web page . . . . . . . . . . . . . . . . . . . . . . 70
Figure 5 Unified Manager first-page buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Figure 6 Wizards icon page, accessed through the Wizards button . . . . . . . . . . . . . . . . 76
Figure 7 Main display of the Unified Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Figure 8 Tabbed page example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Figure 9 Accessing navigation tree heading help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Figure 10 Accessing navigation tree heading help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Figure 11 PuTTY Configuration screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Figure 12 Business Communications Manager Main Menu . . . . . . . . . . . . . . . . . . . . . . . . 89
Figure 13 Process for initial system configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Figure 14 Process for configuring the telephony components . . . . . . . . . . . . . . . . . . . . . 94
Figure 15 Process for activating optional keycoded features . . . . . . . . . . . . . . . . . . . . . . . 95
Figure 16 Process for configuring the data and IP telephony components . . . . . . . . . . . . 96
Figure 17 Post-setup processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Figure 18 Upgradeable BCM1000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Figure 19 BCM200 and BCM400 hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Figure 20 Quick Start Wizard application warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Figure 21 Maintenance Tools screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Figure 22 Job scheduling window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Figure 23 Security and user access headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Figure 24 Unified Manager Timeout setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Figure 25 System security level settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Figure 26 User Profile screen to add or modify a user profile . . . . . . . . . . . . . . . . . . . . . 124
Figure 27 User Manager delete confirmation dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Figure 28 User profile for dial-up user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Figure 29 Default user groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Figure 30 User Group List add/modify screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Figure 31 User Manager delete confirmation dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Figure 32 Domain User Group Profile add/modify screen . . . . . . . . . . . . . . . . . . . . . . . . 131
Figure 33 Lockout Policy screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Figure 34 Password Policy tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Figure 35 Resources, Media Bay Modules menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Figure 36 Confirming the Programmed Bus Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Figure 37 Example of PRI module settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Figure 38 Finding state of port on Bus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Figure 39 Station media bay module Bus headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Figure 40 Bus assigned to a station module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
33
Programming Operations Guide
34 Figures
Figure 41 Finding state of port on Bus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Figure 42 Ports on Bus, B1 screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Figure 43 Warning: This will disable the port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Figure 44 Network overview: DDI MUX connected to 2.5 hardware internal router . . . . . 162
Figure 45 Network overview: DDI MUX connected to BCM400 internal router . . . . . . . . 163
Figure 46 Overview of network using DDI Mux module with an external router . . . . . . . . 163
Figure 47 Tasks for installing the telephony components . . . . . . . . . . . . . . . . . . . . . . . . . 197
Figure 48 Telephony Services menu options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Figure 49 Headings found under typical DN heading . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Figure 50 Square system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Figure 51 PBX system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Figure 52 DID system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Figure 53 Incoming public and private call coding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Figure 54 Process map: Configuring the lines for your system . . . . . . . . . . . . . . . . . . . . 240
Figure 55 Lines menus and fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Figure 56 Using the Lines General screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Figure 57 Target line Private and Public received numbers . . . . . . . . . . . . . . . . . . . . . . . 271
Figure 58 Entering a line restriction filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Figure 59 Enter remote restriction filters for a line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
Figure 60 Choosing a remote voice message center . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Figure 61 Loops headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Figure 62 Process map: Configuring the loops for your BRI module . . . . . . . . . . . . . . . . 278
Figure 63 T-loop screen (T1 profiles) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Figure 64 Adding a SPID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Figure 65 Assign number of B-channels per SPID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Figure 66 Add Network DN to SPID X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Figure 67 Specifying a Network DN call type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Figure 68 T-loop screen (UK profile) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Figure 69 Enable/disable D-packet service, and associate a loop . . . . . . . . . . . . . . . . . . 284
Figure 70 Add a D-packet service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Figure 71 Add a TEI to the D-packet service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Figure 72 Provisioning BRI loops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Figure 73 Provisioning BRI loop lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
Figure 74 Configuring an auto-answer BRI line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Figure 75 Assigning the BRI line to a DN record. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Figure 76 BRI RJ45 wiring array . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Figure 77 S-loop screen (North American profile) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Figure 78 Adding a DN to the Loop DN group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Figure 79 Adding a Loop DN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Figure 80 Process map: Access headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Figure 81 DN length screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Figure 82 Received # length, (PBX template default) . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
N0008589 3.3
Figures 35
Figure 83 Assigning a target line to a set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Figure 84 Defining a Received number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Figure 85 Setting remote page for a remote access package . . . . . . . . . . . . . . . . . . . . . 305
Figure 86 Assigning COS password and remote access parameters . . . . . . . . . . . . . . . 306
Figure 87 Unified manager telephony services headings . . . . . . . . . . . . . . . . . . . . . . . . 311
Figure 88 Configuring private network types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Figure 89 Adding a Public DN length prefix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Figure 90 Defining the prefix DN length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Figure 91 Line management diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
Figure 92 Defining access codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Figure 93 Direct dial menu and screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Figure 94 Local call tandemed through Business Communications Manager nodes . . . . 326
Figure 95 Defining line pool access codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Figure 96 Adding Carrier code prefix records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Figure 97 Configuring a carrier code prefix ID length . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Figure 98 Call Routing headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Figure 99 Add a route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Figure 100 Define route parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Figure 101 Using destination codes to access another system . . . . . . . . . . . . . . . . . . . . . 337
Figure 102 Adding a destination code with a wild card . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Figure 103 Routing Service programming example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
Figure 104 Destination codes for call routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
Figure 105 Carrier code call numbering sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
Figure 106 Multiple routing with destination schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
Figure 107 Configuring the Normal schedule for overflow . . . . . . . . . . . . . . . . . . . . . . . . . 347
Figure 108 Setting CbC limits parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
Figure 109 PRI Overlap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
Figure 110 Metrics for all CbC options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
Figure 111 Restriction Filters headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
Figure 112 Adding restriction filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
Figure 113 Adding overrides to restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
Figure 114 Line restriction example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
Figure 115 Remote line restriction example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
Figure 116 Process map: Configuring DNs for system devices . . . . . . . . . . . . . . . . . . . . . 364
Figure 117 System DNs main headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
Figure 118 Registration DNs, main headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Figure 119 Target line assignments in the Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
Figure 120 Feature selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
Figure 121 Internal autodial selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
Figure 122 External autodial selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Figure 123 Add Users first page, choosing remote template . . . . . . . . . . . . . . . . . . . . . . . 394
Figure 124 First and second-level System DNs headings and features . . . . . . . . . . . . . . . 398
Figure 125 Headings found under typical DNXXX heading . . . . . . . . . . . . . . . . . . . . . . . . 399
Programming Operations Guide
36 Figures
Figure 126 DN General screen for digital and IP telephones . . . . . . . . . . . . . . . . . . . . . . . 401
Figure 127 Line access fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
Figure 128 Assigning characteristics to each line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Figure 129 7316E display button assignment protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
Figure 130 Adding an intercom button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
Figure 131 Adding an Answer DN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
Figure 132 Answer condition for Answer DN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
Figure 133 Features that define telephone feature capabilities . . . . . . . . . . . . . . . . . . . . . 415
Figure 134 Configuring call forward . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
Figure 135 ATA settings for a DN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
Figure 136 SWCA call groups screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Figure 137 User preference telephone settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
Figure 138 Button programming options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Figure 139 7316E lower button mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
Figure 140 7316 telephone button assignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
Figure 141 The 7208 button mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Figure 142 7000 button mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
Figure 143 7406 button defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
Figure 144 2004/2050 default button programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
Figure 145 2002 default button assignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
Figure 146 2001 default button formatting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
Figure 147 Add a user speed dial code to a telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . 442
Figure 148 Entering call parameters for a user speed dial . . . . . . . . . . . . . . . . . . . . . . . . . 442
Figure 149 7316E with KIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
Figure 150 CAP/KIM assignment, CAP/KIM 1 screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
Figure 151 Programming a CAP/KIM button. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
Figure 152 Telephone-based dialing restrictions, menu . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
Figure 153 General restrictions for telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Figure 154 Defining set restrictions for the Night schedule . . . . . . . . . . . . . . . . . . . . . . . . 452
Figure 155 Defining Line/set restrictions for line 001, Night schedule . . . . . . . . . . . . . . . . 453
Figure 156 DN Telco Features fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
Figure 157 General Settings headings and fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Figure 158 Feature settings screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463
Figure 159 Checking for Park prefix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Figure 160 Setting SWCA controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
Figure 161 SWCA indicators, incoming call from a line (auto SWCA association is on) . . 472 Figure 162 SWCA indicators, incoming call from an intercom
Figure 163 Setting system timers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Figure 164 Undefined speed dial screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Figure 165 Expanded speed dial screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Figure 166 Voice message center programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
(auto SWCA association for intercom is on) . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
N0008589 3.3
Figures 37
Figure 167 ONN blocking parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485
Figure 168 Scheduled Services headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
Figure 169 Entering the Service control password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
Figure 170 Entering schedule names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
Figure 171 Entering schedule time parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Figure 172 Adding a telephone to a ring group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
Figure 173 Defining ring schedule parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
Figure 174 Defining ring service schedule line settings . . . . . . . . . . . . . . . . . . . . . . . . . . . 496
Figure 175 Defining restriction service setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Figure 176 Defining routing service settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499
Figure 177 Connection to a private network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Figure 178 Routing service record: use pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
Figure 179 Routing service record: Destination code . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504
Figure 180 Dialing plan for T1 E and M routing network . . . . . . . . . . . . . . . . . . . . . . . . . . 510
Figure 181 Network example using shared line pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515
Figure 182 PRI networking using Call-by Call Services . . . . . . . . . . . . . . . . . . . . . . . . . . . 517
Figure 183 Private tandem network of Business Communications Managers . . . . . . . . . . 522
Figure 184 Network call redirection path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
Figure 185 Call loop on system without ICCL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532
Figure 186 Call paths with and without TRO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
Figure 187 Call paths with and without TAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
Figure 188 MCDN networking, with a common public network connection . . . . . . . . . . . . 539
Figure 189 IP trunking interoperability fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543
Figure 190 ETSI QSIG networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546
Figure 191 DPNSS networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
Figure 192 Message waiting indication message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
Figure 193 Camping a call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569
Figure 194 Breaking into a Business Communications Manager call path . . . . . . . . . . . . 570
Figure 195 Telco features Voice message center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
Figure 196 Target line Telco features voice message center . . . . . . . . . . . . . . . . . . . . . . . 573
Figure 197 Setting Target line voice mail settings for the telephone . . . . . . . . . . . . . . . . . 574
Figure 198 Hunt groups menus and fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575
Figure 199 Hunt group XX screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
Figure 200 Broadcast call mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
Figure 201 Linear call mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580
Figure 202 Rotary call mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580
Figure 203 Hunt group XX screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582
Figure 204 Moving hunt group members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
Figure 205 Adding lines to hunt groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
Figure 206 Silent Monitoring system settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
Figure 207 Hunt Group Metrics screen for Hunt group 01 . . . . . . . . . . . . . . . . . . . . . . . . . 589
Figure 208 Hospitality commands and settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
Figure 209 Hospitality service times and passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
Programming Operations Guide
38 Figures
Figure 210 Hospitality room settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
Figure 211 Hospitality call permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
Figure 212 Alarm data fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596
Figure 213 Expired alarms fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597
Figure 214 BcmAmp Player . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608
Figure 215 Double Density Mode choices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633
Figure 216 LAN, WAN and Dialup headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
Figure 217 Example Mean Opinion Score Log File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 730
Figure 218 Example of a Split Tunneling environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . 783
Figure 219 DiffServ bandwidth brokers and nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795
Figure 220 S reference point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863
Figure 221 T reference point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864
Figure 222 Active set DN screen example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 877
Figure 223 General screen example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 877
Figure 224 Line access screen example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 878
Figure 225 Line access screen example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 879
Figure 226 Capabilities screen example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 880
Figure 227 Capabilities fields screen example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881
Figure 228 External Hotline screen example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 882
Figure 229 ATA settings example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 883
Figure 230 Set restriction example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 884
N0008589 3.3
Tables
Table 1 Telephone buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Table 2 Menu bar items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Table 3 Navigation tree menu functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Table 4 Security settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Table 5 User Profile settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Table 6 User Group Profile settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Table 7 Domain User Group Profile settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Table 8 Lockout policy settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Table 9 Password policy settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Table 10 Bus XX record settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Table 11 Programmed Bus Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Table 12 Module record values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Table 13 TI parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Table 14 Services available for each PRI protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Table 15 Module record values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Table 16 Configuring DDI Mux connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Table 17 List of all the multiples of 56000 and 64000 bits/s . . . . . . . . . . . . . . . . . . . . . . 165
Table 18 DDI Mux Configuration settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Table 19 Bandwidth available per channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Table 20 Line numbers for the UTWAN based on the DS30 bus of the DTM . . . . . . . . . 172
Table 21 UTWAN Summary parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Table 22 UTWAN frame relay parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Table 23 WAN PVC Configuration parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Table 24 PPP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Table 25 LCP Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Table 26 IPCP Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Table 27 PPP User parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Table 28 Additional WAN IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Table 29 Telephony Services subheadings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Table 30 DS30 number and offset line-loop default list . . . . . . . . . . . . . . . . . . . . . . . . . . 244
Table 31 General record values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Table 32 Loop start analog and digital fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Table 33 Ground start fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Table 34 DID line fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
Table 35 E&M line fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Table 36 Target lines and DASS2 line fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
Table 37 PRI line fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Table 38 BRI line fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
Table 39 DPNSS line fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
Table 40 VoIP line data fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
39
Programming Operations Guide
40 Tables
Table 41 Combined line settings table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Table 42 Loss package settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
Table 43 Default restriction filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Table 44 Default remote restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
Table 45 Loop settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Table 46 Loop settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Table 47 Loop settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Table 48 Private and Public received numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Table 49 General record values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Table 50 COS password values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
Table 51 External access tones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
Table 52 Private network values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
Table 53 Outgoing private calls routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Table 54 Outgoing public calls routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
Table 55 Default codes table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
Table 56 Access codes values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Table 57 Direct dial values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Table 58 Access/dialing codes: avoiding numbering conflicts . . . . . . . . . . . . . . . . . . . . 324
Table 59 Carrier access code values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Table 60 Route settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Table 61 Call by Call routing table example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Table 62 PRI Service type/DN type values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Table 63 Destination codes: avoiding numbering conflicts . . . . . . . . . . . . . . . . . . . . . . . 336
Table 64 Establishing routes and dialout requirements . . . . . . . . . . . . . . . . . . . . . . . . . 339
Table 65 Destination codes not using a wild card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
Table 66 Destination codes using the ANY character . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Table 67 Call by Call Services available on the system . . . . . . . . . . . . . . . . . . . . . . . . . 349
Table 68 Switches and service types chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
Table 69 DN length values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
Table 70 Default restriction filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Table 71 Default filters for program headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
Table 72 DN mapping for ISDN and legacy Companion and DECT handsets . . . . . . . . 368
Table 73 Edit DN Record Template information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Table 74 Add Users wizard information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
Table 75 Copy values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
Table 76 General record values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Table 77 Telephone line access fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
Table 78 Telephone line assignment fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
Table 79 Capabilities fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
Table 80 Call forward fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
Table 81 Embark validation error messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
Table 82 Hotline values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
N0008589 3.3
Tables 41
Table 83 ATA settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
Table 84 Availability of MWI signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
Table 85 User preference choices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Table 86 User preference choices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
Table 87 Button programming choices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
Table 88 WLAN IP telephone button menu equivalents . . . . . . . . . . . . . . . . . . . . . . . . . 441
Table 89 User speed dial settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
Table 90 CAP/KIM feature button programming choices . . . . . . . . . . . . . . . . . . . . . . . . 448
Table 91 Telephone restriction fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Table 92 Schedule filter defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
Table 93 Telco features settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
Table 94 DN voice mail settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
Table 95 Call features/interface list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Table 96 Set feature values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464
Table 97 Answer keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Table 98 SWCA controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
Table 99 Call log options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Table 100 Timer values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
Table 101 Release reason values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Table 102 Release reason values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Table 103 Voice message center settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
Table 104 ONN blocking settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485
Table 105 Turning services on and off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488
Table 106 Default schedule times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Table 107 Ringing group schedule values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
Table 108 Ringing group schedule line values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496
Table 109 Restriction schedule values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498
Table 110 Routing service schedule values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499
Table 111 Destination code leading digits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504
Table 112 E and M routing for a Business Communications Manager network . . . . . . . . 511
Table 113 Creating a coordinated dialing plan using line pools . . . . . . . . . . . . . . . . . . . . 516
Table 114 PRI call-by-call services routing information . . . . . . . . . . . . . . . . . . . . . . . . . . 518
Table 115 Call originating from the public network to a tandem network . . . . . . . . . . . . . 523
Table 116 Calls originating from the private network within a tandem network . . . . . . . . 526
Table 117 Node A destination code table, external termination . . . . . . . . . . . . . . . . . . . . 528
Table 118 Node A destination code table, internal termination . . . . . . . . . . . . . . . . . . . . . 529
Table 119 Node C destination code table, external termination . . . . . . . . . . . . . . . . . . . . 529
Table 120 Node C destination code table, internal termination . . . . . . . . . . . . . . . . . . . . 529
Table 121 MCDN network features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530
Table 122 Module settings for MCDN network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
Table 123 MCDN dialing plan settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
Table 124 Network routing information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
Programming Operations Guide
42 Tables
Table 125 IP trunking interoperability fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543
Table 126 Hardware programming for branch offices . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547
Table 127 ETSI network values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548
Table 128 Calling numbers required for DPNSS network example . . . . . . . . . . . . . . . . . 558
Table 129 Routing for DPNSS network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
Table 130 MCDN feature enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
Table 131 Parts of the NSI string . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
Table 132 Hunt group settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
Table 133 Hunt group member settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582
Table 134 Hunt group feature operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586
Table 135 Silent monitor system settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
Table 136 Hospitality main settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
Table 137 Room settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
Table 138 Call permission settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
Table 139 Alarm data settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596
Table 140 Alarm data settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597
Table 141 IP Music Summary parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
Table 142 Networks Device parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609
Table 143 Advanced Networks parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609
Table 144 DSP resource requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
Table 145 Required MSC resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621
Table 146 Evaluation of required Business Communications Manager configuration . . . 622
Table 147 Example of required configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623
Table 148 Evaluation for the example of required configuration . . . . . . . . . . . . . . . . . . . . 623
Table 149 MSC information parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624
Table 150 MS-PEC information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625
Table 151 Advantages and Disadvantages of Minimum and Maximum values . . . . . . . . 626
Table 152 MSC configuration parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627
Table 153 MSC custom configuration parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628
Table 154 MSC component parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
Table 155 Business Communications Manager resources . . . . . . . . . . . . . . . . . . . . . . . . 635
Table 156 DHCP Server Summary attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641
Table 157 DHCP Global Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 642
Table 158 DHCP Summary settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
Table 159 LAN Scope Specific Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
Table 160 Address Range attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 646
Table 161 Excluded Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648
Table 162 Reserved Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
Table 163 Reserved Addresses Lease Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 650
Table 164 Remote Scope settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652
Table 165 Remote Scope specific settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 653
Table 166 Remote Scope Address Range attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654
N0008589 3.3
Tables 43
Table 167 Remote Scope Excluded Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
Table 168 Remote Scope Reserved Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657
Table 169 Lease Information for a Remote Scope Reserved Addresses . . . . . . . . . . . . . 658
Table 170 Relay Agent Interface parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661
Table 171 LAN global parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666
Table 172 Guidelines to configure LAN to LAN traffic smoothing . . . . . . . . . . . . . . . . . . . 666
Table 173 LAN Summary attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667
Table 174 Additional LAN IP address parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669
Table 175 PPP password parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
Table 176 WAN summary parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675
Table 177 WAN line parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677
Table 178 WAN sync parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 678
Table 179 WAN frame relay parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679
Table 180 WAN PVC congestion control parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680
Table 181 WAN PPP parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Table 182 Additional WAN IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
Table 183 DLCI to IP Mapping parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
Table 184 RAS server TCP/IP parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
Table 185 V.90 modem summary parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
Table 186 Modem link parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
Table 187 V.90 modem access parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
Table 188 ISDN summary settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694
Table 189 ISDN link parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
Table 190 ISDN access parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
Table 191 ISDN dial-out user parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
Table 192 ISDN channel characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
Table 193 Features that interact with PPPoE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
Table 194 PPPoE summary settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701
Table 195 PPPoE link parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702
Table 196 PPPoE access parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702
Table 197 PPPoE dial-out user parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
Table 198 PPPoE channel characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
Table 199 DNS Summary attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
Table 200 IP routing protocol precedence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 708
Table 201 IP Routing Summary attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
Table 202 IP RIP Global Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
Table 203 IP OSPF Global Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710
Table 204 IP RIP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 712
Table 205 IP OSPF Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715
Table 206 IP OSPF NBMA Neighbor parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 716
Table 207 IP Static Route attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717
Table 208 Web Cache attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 722
Programming Operations Guide
44 Tables
Table 209 QoS Monitor Summary attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727
Table 210 Mean Opinion Score descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 728
Table 211 QoS Monitor Logging attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729
Table 212 Net Link Manager attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732
Table 213 Permanent WAN Connections settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732
Table 214 NAT Summary attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736
Table 215 NAT Rule Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738
Table 216 NTP Client settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 748
Table 217 NTP Client Service settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
Table 218 PPTP Summary settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 754
Table 219 PPTP Client attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756
Table 220 PPTP Tunnel attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757
Table 221 PPTP Tunnel Summary attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758
Table 222 PPTP Tunnel Link parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758
Table 223 PPTP Tunnel Authentication parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 759
Table 224 PPTP Destination Networks attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 760
Table 225 Comparing Encryption and Authentication Methods . . . . . . . . . . . . . . . . . . . . 764
Table 226 Firewall rules for IKE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768
Table 227 Firewall rules for ESP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768
Table 228 Firewall rules for AH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768
Table 229 Firewall rules for the QOTD server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 769
Table 230 Firewall filter for the Password server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 769
Table 231 Firewall filter for the ICMP that the Client sends to the tunnel endpoint . . . . . . 769
Table 232 Firewall filter for Private Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 769
Table 233 IPSec Global settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772
Table 234 IPSec Branch Office Tunnel settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 773
Table 235 IPSec Local Accessible Network parameters . . . . . . . . . . . . . . . . . . . . . . . . . . 775
Table 236 IPSec Remote Accessible Network parameters . . . . . . . . . . . . . . . . . . . . . . . . 776
Table 237 Remote Accessible Networks used to route all traffic through
Table 238 IPSec Remote IP Address Pool settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 786
Table 239 IPSec Remote User Account settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 787
Table 240 DNS/WINS Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 789
Table 241 Split Tunnel Network settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 790
Table 242 Service classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796
Table 243 Default Queue mapping for Business Communications Manager . . . . . . . . . . 797
Table 244 QoS Summary parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 799
Table 245 QoS Advanced parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 800
Table 246 QoS Interface Group Table parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 800
Table 247 QoS IP Filter parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 802
Table 248 QoS IP Filter Group parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 804
Table 249 QoS Action parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 806
the IPSec tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 776
N0008589 3.3
Tables 45
Table 250 QoS Policy parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807
Table 251 Status page items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809
Table 252 COPS Client Server parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 812
Table 253 COPS Client Retry data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 813
Table 254 Policy Agent settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 814
Table 255 Policy Server settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 814
Table 256 Policy Class Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 815
Table 257 Policy Device Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 815
Table 258 IP Firewall Filters Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 818
Table 259 Firewall Input Filter Rule settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821
Table 260 Input Rule Configuration for Unified Manager — RPC . . . . . . . . . . . . . . . . . . . 827
Table 261 Input Rule Configuration for Unified Manager — DCOM . . . . . . . . . . . . . . . . . 827
Table 262 Input Rule Configuration for Unified Manager — port 443 . . . . . . . . . . . . . . . . 827
Table 263 Input Rule Configuration for systems with dialup interfaces . . . . . . . . . . . . . . . 829
Table 264 Core software, defined by region and carrier profile . . . . . . . . . . . . . . . . . . . . 832
Table 265 Languages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832
Table 266 South/Central America language breakout . . . . . . . . . . . . . . . . . . . . . . . . . . . 833
Table 267 Companding law . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834
Table 268 Mobility services, by region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834
Table 269 Module availability, by profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835
Table 270 Trunk availability, by region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836
Table 271 PRI line protocol supported, by region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 837
Table 272 ISDN line services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 838
Table 273 ISDN services, by Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 838
Table 274 Time/date formats based on language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839
Table 275 Region defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839
Table 276 Default dialing restrictions, by profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 842
Table 277 BRI and PRI line types (DTM and BRI modules) . . . . . . . . . . . . . . . . . . . . . . . 843
Table 278 CallPilot region default languages by country . . . . . . . . . . . . . . . . . . . . . . . . . 845
Table 279 CallPilot feature default anomalies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 846
Table 280 Features sorted by feature name and by activation code . . . . . . . . . . . . . . . . . 847
Table 281 Button Programming Feature settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 851
Table 282 Analog devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 875
Table 283 Feature matrix for analog devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 875
Table 284 DN Record headings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 876
Table 285 General record fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 877
Table 286 Line assignment fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 878
Table 287 Prime line field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 880
Table 288 Capabilities fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881
Table 289 Hotline values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 883
Table 290 ATA settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 883
Programming Operations Guide
46 Tables
N0008589 3.3
Preface
This guide explains how to program your Business Communications Manager system. For more information about the Business Communications Manager document suite, refer to “Related
publications” on page 56.
This issue of the document reflects the added functionality built into the Business Communications Manager 3.7 release. The hardware, and new and updated features described in this and other documentation from this suite requires that your Business Communications Manager system is running release 3.7.
This section includes the following general information:
“Before you begin” on page 48
“Symbols used in this guide” on page 48
“Text conventions” on page 49
“About the buttons on your telephones” on page 49
“Acronyms used in this guide” on page 51
“Related publications” on page 56
“System documentation map” on page 57
“How to get help” on page 62
47
Warning: Ensure that you make a complete backup of your data before attempting to
upgrade your system. Refer to the upgrade guide that comes with the upgrade package for
instructions about upgrading the Business Communications Manager software from one
version to another.
Note: The section “Software licensing” on page 3 contains software licensing
information.
Note: Hardware: BCM200 and BCM400 hardware is shipped with 3.0 or newer
software, only.
Note: Network: All the Business Communications Managers in your private network
should be running the same level of software to ensure that remote gateways and other
networking protocols are compatible. Meridian 1 systems connected to your network
using Voice Over IP (VoIP) trunks must be running the ITP software. Ask your Meridian
distributor for details.
After you perform an upgrade, always check that your gateways are still correctly
configured for local and remote connections.
Programming Operations Guide
48 Before you begin
Before you begin
This guide is intended for these audiences:
the installer who performs the initial configuration of the system
the operator who manages the overall telephony operations of the system
the system administrator who manages the data and network operations of the system
This guide assumes the following:
There is an existing plan outlining the telephony and data requirements for your Business Communications Manager system.
The Business Communications Manager is installed and initialized, and all hardware appears to be working. External lines and wiring for terminals and sets are connected to the appropriate media bay modules on the Business Communications Manager. All required keycodes have been entered.
That all operators have a working knowledge of the Windows operating system and graphical user interfaces.
That operators managing the data portion of the system are familiar with network management and applications.
Symbols used in this guide
This guide uses symbols to draw your attention to important information. The following symbols appear in this guide:
Caution: Caution Symbol Alerts you to conditions where you can damage the equipment.
Danger: Electrical Shock Hazard Symbol Alerts you to conditions where you can get an electrical shock.
Warning: Warning Symbol Alerts you to conditions where you can cause the system to fail or work improperly.
Note: Note Symbol A Note alerts you to important information.
Tip: Tip Symbol Alerts you to additional information that can help you perform a task.
N0008589 3.3
Security Note: This symbol indicates a point of system security where a default should be changed, or where the administrator needs to make a decision about the level of
!
security required for the system.
Text conventions
This guide uses the following text conventions:
angle brackets (< >) Indicates that you choose the text to enter based on the description
Text conventions 49
inside the brackets. Do not type the brackets when entering the command.
Example: If the command syntax is:
ping <ip_address>
you enter: ping 192.32.10.12
bold Courier text
Indicates command names and options and text that you need to enter. Example: Use the Example: Enter
dinfo command.
show ip {alerts|routes}.
italic text Indicates book titles
plain Courier text
FEATURE HOLD RELEASE
Indicates command syntax and system output, for example, prompts and system messages.
Example:
Set Trap Monitor Filters
Indicates that you press the button with the coordinating icon on whichever set you are using. (Refer to About the buttons on your
telephones.)
About the buttons on your telephones
This guide uses text designators to indicate key pad feature buttons, such as Feature, Hold and Release. The digital phones (7000, 7100, 7208, 7316, 7316E, 7208, and the Digital Mobility) all use icons to label these buttons. The IP telephones display a tag over the far left display key. Table 1 shows the icons that appear for each function on the different types of Nortel Networks digital telephones. Note that the 7316 and 7208 have a separate button for mute functions. The IP telephones and the 7316E have separate buttons for both mute and handsfree.
Table 1 Telephone buttons
Button Name Digital phones: 7XXX and IP telephones: 20XX Legacy telephones
Feature
Handsfree
Mute
Hold
1
2
3
4
, Feature (20XX)
(2004, 2002); (7316E)
7208/7316 use assigned memory button.
(20XX), (7208, 7316, 7316E)
,
, , ,
Programming Operations Guide
50 About the buttons on your telephones
Table 1 Telephone buttons (Continued)
Release
Call button
1
This document uses FEATURE to indicate the action of pressing the feature button.
2
This document uses HANDSFREE to indicate the action of pressing the handsfree or handsfree/mute button for
handsfree functionality.
3
This document uses MUTE to indicate the action of pressing the mute or handsfree/mute button for mute functionality.
4
5
5
This document uses HOLD to indicate the action of pressing the hold button. This document uses RELEASE to indicate the action of pressing the release button.
, (2001 has a Goodbye button
(2001)
N/A
,
You press the FEATURE key and then the feature code to use a feature. For example: Press FEATURE 70 to transfer a call.
Basic digital telephones: 7100 and 7000
The 7100 and 7000 digital phones work differently from other telephones on your system be cause they do not have line buttons. Where other telephones can require that you select a line or intercom button to answer a call, with these telephones you just pick up the handset. Where other telephones require you to select a line button to take a call on that line off hold, on these telephones, you press HOLD.
You answer a second call by pressing HOLD. Your active call is put on hold and you connect to the waiting call. You only can have two active calls at one time.
The 7100 and 7000 digital phones do not have speakers, therefore, cannot use the handsfree feature.
Portable handsets
The Wireless LAN IP telephone (WLAN), and the 7406 cordless telephone access system features in different ways. Each of these handsets comes with a user guide that explains the specific feature access for the handsets.
Note: Legacy portable equipment: DECT installation and configuration documents are included on the documentation CD for this release. Companion installation and configuration documents are included on the documentation CD of previous releases of BCM software.
IP telephones
Nortel Networks IP telephones (2001, 2002, 2004, 2050) and the WLAN IP telephones have user cards that explain the buttons on each device, including the located under the display on these telephones. The Telephone Feature User Guide can be used with these telephones, as most Business Communications Manager features can be accessed from these telephones. The Nortel IP telephones also have a display menu that provides quick access to listed features.
Feature button, which is a softkey
N0008589 3.3
Information about configuring IP telephones is contained in the IP Telephony Configuration Guide. The WLAN handsets have a separate installation and configuration document.
Acronyms used in this guide
This guide uses the following acronyms:
AAL Analog Access Lines ACD Automated Call Distribution AH Authentication Header ANSI American National Standards Institute API Application Program Interface ARP Address Resolution Protocol ASM Analog station module ATA (or ATA2) Analog Terminal Adapter
Acronyms used in this guide 51
AUI Attachment Unit Interface AWG American Wire Gauge BERT Bit Error Rate Test BC committed burst BE excess burst BIOS Basic Input Output System BKI Break-in BLF Busy Lamp Field BootP Bootstrap Protocol BRI Basic Rate Interface BRU Backup and Restore Utility CAA Centralized Auto Attendant CAC Equal Access Identifier Code (carrier code) CAP Central Answering Position (7316E+KIM or legacy 7324+CAP modules) CDP Coordinated Dialing Plan CHAP Challenge-Handshake Authentication Protocol CIC Carrier Identification Code CIR Committed Information Rate CLID Calling Line Identification COPS Common Open Policy Service
Programming Operations Guide
52 Acronyms used in this guide
COS Class of Service CSMA/CD Carrier Sense Multiple Access/Collision Detection CSU Channel Service Unit CTE Connected Telecommunications Equipment CVM Centralized Voice Mail DAL Digital Access Lines DASS2 Digital Access Signaling System Number 2 DCE Data Communications Equipment DCOM Distributed Component Object Model DECT Digital enhanced cordless telecommunications or Digital European cordless
telephone DES Data Encryption Standard DHCP Dynamic Host Configuration Protocol. DID Direct Inward Dial DiffServ Differentiated Services DIMM Dual In-line Memory Module DISA Direct Inward System Access DLCI Data Link Connection Indentifier DLCMI Data Link Control Management Interface DN Directory Number DNS Domain Name Service (DNS) DPNSS Digital Private Network Signalling System DRT Delayed Ring Transfer DSCP Diff-Serv Code Point DSP Digital Signal Processor DSS Direct Station Set (also referred to as an auto dial key) DTE Data Terminal Equipment DTM Digital Trunk Module DTMF Dual Tone Multifrequency. EBN Egress Border Node EDO Extended Data-Out EF Expedited Forwarding eKIM enhanced Key Ind icato r Modul e EN Edge Node ES End Station
N0008589 3.3
ESP Encapsulated Security Payload FDD Full Double Density FQDN Fully Qualified Domain Name FTP File Transfer Protocol GATM Global Analog Trunk Module HDLC High-level Data Link Control HF Handsfree HLC Home Location Code (UDP dialing) HS Hospitality services HTTP Hypertext Transfer Protocol HTTPS Hypertext Transfer Protocol Secured IBN Ingress Border Node I/C Intercom feat ure button ICCL ISDN Call Connection Limitation
Acronyms used in this guide 53
ICMP Internet Control Message Protocol IETF Internet Engineering Task Force. IP Internet Protocol IF Input Filter IPCP IP Control Protocol IPSec Internet Protocol Security IRQ Interrupt Request ISDN Integrated Services Digital Network ISO International Organization for Standardization ISP Internet Service Provider ITU-T International Telecommunication Union-Telecommunication
Standardization Sector (formerly CCITT) IVR Interactive Voice Response KIM Key Indicator Module LAN Local Area Network LCD Liquid Crystal Display LCP Link Control Protocol LM LAN Manager LQR Link Quality Rate MAC Media Access Control MAU Media Access Unit
Programming Operations Guide
54 Acronyms used in this guide
MCDN Meridian Client Defined Network (PRI SL-1) MD5 Message Digest algorithm MLPPP Multi-Link Point-to-Point Protocol MPPC Microsoft Point to Point Compression MSC M edia Services Card MS-PEC Media Services Processor Expansion Card MWI Message Waiting Indicator NAT Network Address Translation NBMA Non Broadcast Multi-Access NCRI Network Call Redirection Information NIC Network Interface Card NTLM NT LAN Manager NNTP Network News Transfer Protocol OPX Off Premises Extension. OSI Open Service Interconnection OSPF Open Shortest Path First PAP Password Authentication Procedure PBX Private Branch Exchange. PCI Peripheral Component Interconnect Slot PDD Partial Double Density PDN Public Data Network PFS Perfect Forward Secrecy PHB Per Hop Behavior POF Packet Output Filter POP3 Post Office Protocol PPP Point-to-Point Protocol PPPoE Point-to-Point Protocol over Ethernet PPTP Point-to-Point Tunneling Protocol PRI Primary Rate Interface PSTN Public Switched Telephone Network PVC Permanent Virtual Circuit QoS Quality of Service QOTD Quote of the day server QSIG Q reference point signalling RAS Remote access service
N0008589 3.3
Acronyms used in this guide 55
RIP Routing Information Protocol RLR Receive Loudness Rating RPC Remote Procedure Call RTP Realtime Transport Protocol SAP Service Advertising Protocol SAPS Station Auxiliary Power Supply SDRAM Synchronous Dynamic Random Access Memory SHA Secure Hash Algorithm SLA Service Level Agreement SLR Send Loudness Rating SMB Server Message Block SMDS Switched Multimegabit Data Service SMTP Simple Mail Transfer Protocol SNMP Simple Network Man a gement Proto col SPID Service Profile Identifier SR Static Route SS Static Service SSL Secure Sockets Layer STP Shielded Twisted Pair SUNNFS SUN Network File System TAPI Telephony Application Program Interface TCP/IP Transmission Control Protocol/Internet Protocol TE Terminal Equipment TEI Terminal Endpoint Identifier TFTP Trivial File Transfer Protocol TOS Type of Service. TPE Twisted Pair Ethernet TTL time-to-live UNISTIM Unified Networks IP Stimulus UDP User Datagram Protocol or Universal Dialing Plan VLAN Virtual Local Area Network VoIP Voice over IP VPN Virtual Private Networks WAN Wide Area Network WFQ Weighted Fair Queuing
Programming Operations Guide
56 Related publications
WINS Windows Internet Name Service WLAN Wireless LAN
Related publications
In addition to the Programming Operations Guide, the Business Communications Manager documentation suite contains the following documents:
Management User Guide
Telephony Features Handbook
Installation and Maintenance Guide (BCM1000 and BCM400/200)
IP Telephony Configuration Guide
CallPilot Manager Set Up and Operation Guide
CallPilot Reference Guide
CallPilot Quick Reference Guide
CallPilot Programming Record
CallPilot Message Networking Set Up and Operation Guide
CallPilot Message Networking User Guide
CallPilot Unified Messaging Installation and Maintenance Guide
CallPilot Desktop (Unified) Messaging Quick Reference Guide
Software Keycode Installation Guide
Call Center Set Up and Operation Guide
Call Center Agent Guide
Call Center Supervisor Guide
Call Center Reporting Set Up and Operation Guide
LAN CTE Configuration Guide
Personal Call Manager User Guide
Call Detail Recording System Administrator Guide
Analog Telephone User Guide
CallPilot Fax Set Up and Operation Guide
CallPilot Fax User Guide
Interactive Voice Response Installation and Configuration Guide (IVR) From the Business Communications Manager 3.7 Documentation CD, you can also access a
number of telephone and accessory quick reference cards. If you operate a multi-site Business Communications Manager network, you can use the Network
Configuration Manager to provide centralized configuration and management operations. The documentation for this tool can be found on the Network Configuration Manager CD, which includes the software and the following documentation.
Network Configuration Manager Installation Guide
Network Configuration Manager Administration Guide
Network Configuration Manager Client Software User Guide
Network Configuration Manager Reference Guide
N0008589 3.3
System documentation map
The following pages provide a map of the Business Communications Manager documentation CD. The map shows the overall task process of the system, and indicates which documentation deals with each section. All the documents described are included on the documentation CD that came with your system.
“Installation documentation” on page 58
“Operations documentation” on page 59
“Call Management documentation” on page 60
“Unified Manager and hardware maintenance documentation” on page 61
“Multi-site Administration: Network Configuration Manager” on page 61
System documentation map 57
Programming Operations Guide
58 System documentation map
Installation documentation
Remove your Business Communications Manager components from the box
Documentation CD
Voice Mail and Call Management Applications
Operations
Business Communications Manager base and expansion unit hardware installation
Data cards
Setting up media bay modules
Analog telephones
Analog Telephone
Configuration Guide
Digital telephony
Installing lines
Nortel Networks digital telephones
Digital Mobility Phone
Cordless/radio digital handsets *
* Legacy equipment: Companion and DECT
7406
Installation and Maintenance Guide
System planning and configuration records
Programming Records
Analog Telephone User Guide
Bix Block Wiring Guide
Installation manuals
come with telephones
Digital Mobility Install/ Configuration Guide
Digital Cordless 7406 Installation Guide
IP Telephones*
* Legacy equipment: NetVision handsets
20XX IP telephones
Wireless LAN IP telephones
N0008589 3.3
IP Telephony Configuration Guide
WLAN Installation and Configuration Guide
Operations documentation
Documentation CD
System documentation map 59
System Management and Maintenance
Voice Mail and Call Management Applications
Hardware Installation
Telephony Configuration
Using the telephones and equipment
7000 User Card 7100 User Card 7208 User Card 7316 User Card 7316E User Card 7406 User Card 2004 User Card 2002 User Card 2001 User Card Digital Mobility User Cards Wireless LAN User Cards
Central Answering
Position (CAP) User Card
Telephone Features
User Guide SWCA User Card ATA User Guide
Operations
Quick Start Wizard
Setting up Lines, Routes and Access Codes
Controlling calls
Setting up Telephone records and features
Data Configurations
Telephony Networking
Registering
Programming Operations Guide
Software Keycode Installation Guide
Land
VoIP
CallPilot Quick Reference card, NVM interface
CallPilot Quick Reference card, CP interface
Using the telephones
and equipment
IP Telephones
Wireless LAN handsets
Digital Mobility Phones
Using Telephone Features, and finding prompt descriptions.
IP Telephony Configuration Guide
Wireless LAN Install/ Configuration Guide
Digital Mobility Install/ Configuration Guide
Telephony Features Handbook
Programming Operations Guide
60 System documentation map
Call Management documentation
Documentation CD
Keycoded Applications
Software Keycode Installation Guide
System Management and Maintenance
Voice Mail and Call Management Applications
Hunt Groups
Programming Operations Guide
Hospitality Services
CDR
CallPilot
CallPilot Message Networking
CallPilot Fax
CallPilot Message Networking Set Up and Operation Guide
Call Detail Recording System Administration Guide
Call Pilot Manager Set Up and Operation Guide
CallPilot Fax Set Up and Operations Guide
Hospitality Features Card
Reference Guide
Programming Record
User Guide
User Guide
LAN CTE
IVR
N0008589 3.3
CallPilot Desktop (Unified) Messaging
Call Center
Professional Call Center
Multimedia Call Center
Personal Call Manager
Interactive Voice Response Installation and Configuration Guide
CallPilot Unified Messaging Installation and Maintenance
Call Center Set Up and Operation Guide
Reporting Set Up and Operation Guide
Multimedia Call Center Set Up and Operation Guide
LAN CTE Configuration Guide
Personal Call Manager User Guide
User Guide
Supervisor and Agent Guides
Multimedia Call Center Web Developer Guide
System documentation map 61
Unified Manager and hardware maintenance documentation
Hardware Installation
Operations
Voice Mail and Call Management
Documentation CD
System Management and Maintenance
System configuration records
Security and User Administration
Backup and Restore
Maintenance and Troubleshooting
Programming Records (CD only)
Programming Operations Guide
Management User Guide
Multi-site Administration: Network Configuration Manager
Network Configuration Manager CD
Installation Guide
Administration Guide
Software
Client Software User Guide
Reference Guide
Programming Operations Guide
62 How to get help
How to get help
If you do not see an appropriate number in this list, go to www.Nortelnetworks.com/support.
USA and Canada
Authorized Distributors - ITAS Technical Support
Telephone: 1-800-4NORTEL (1-800-466-7835) If you already have a PIN Code, you can enter Express Routing Code (ERC) 196#. If you do not yet have a PIN Code, or for general questions and first line support, you can enter ERC 338#.
Website: http://www.nortelnetworks.com/support
Presales Support (CSAN)
Telephone: 1-800-4NORTEL (1-800-466-7835) Use Express Routing Code (ERC) 1063#
EMEA (Europe, Middle East, Africa)
Technical Support - CTAS
Telephone:
*European Freephone 00800 800 89009
European Alternative/ United Kingdom +44 (0)870-907-9009 Africa +27-11-808-4000 Israel 800-945-9779
*Note: Calls are not free from all countries in Europe, Middle East or Africa
Fax: 44-191-555-7980 email: emeahelp@nortelnetworks.com
CALA (Caribbean & Latin America)
Technical Support - CTAS
Telephone: 1-954-858-7777 email: csrmgmt@nortelnetworks.com
APAC (Asia Pacific)
Technical Support - CTAS
Telephone: +61-2-870-8800 Fax: +61 388664644 email: asia_support@nortelnetworks.com
In-country toll free numbers
Australia 1800NORTEL (1800-667-835) China 010-6510-7770
N0008589 3.3
India 011-5154-2210 Indonesia 0018-036-1004 Japan 0120-332-533 Malaysia 1800-805-380 New Zealand 0800-449-716 Philippines 1800-1611-0063 Singapore 800-616-2004 South Korea 0079-8611-2001 Taiwan 0800-810-500 Thailand 001-800-611-3007 Service Business Centre & Pre-Sales Help Desk +61-2-8870-5511
How to get help 63
Programming Operations Guide
64 How to get help
N0008589 3.3
Chapter 1 Getting started with Unified Manager
This section provides you with information about the Unified Manager, the tool you access on the Business Communications Manager from your desktop and use to configure system information. This section describes the Unified Manager interface functions.
You access Unified Manager on the Business Communications Manager through the internet, using a web browser. To access Unified Manager you require the IP address of the Business Communications Manager, as well as a user name and password. If you do not have this information, ask the person who installed your system.
Warning: If the installer did not change the access password to the Unified Manager, you should do so at the earliest opportunity. Refer to “Managing access passwords” on
page 121 for procedures for changing passwords and adding new users.
This section includes information about:
“Computer requirements” on page 66
“Logging on to Unified Manager” on page 67
“Understanding BCM SSL certificate properties” on page 68
“Using the Unified Manager main page buttons” on page 72
“Using the Unified Manager” on page 80
“Using Unified Manager Help” on page 85
“Logging off” on page 86
“Using the SSH client to access the text-based interface” on page 87
“Manually activating Telnet” on page 89
65
Security note: Multiple users logging on to the Business Communications Manager
with the administrator account, from different client stations, can cause inconsistent or
!
wrong configuration. Therefore, it is advisable to limit the number and distribution of administrator accounts.
Security note: The configuration section in the Unified Manager is not secured through SSL encryption. To provide security for this section, establish a VPN client tunnel. Refer to “IPSec Remote User configuration” on page 784.
Programming Operations Guide
66 Computer requirements
Computer requirements
To run the Unified Manager, you require:
a 133 MHz Pentium CPU or higher (or compatible)
•64 MB RAM
a minimum of 10 MB of available disk space
a minimum screen resolution of 1024 x 768
a web browser (refer to Browser requirements)
Browser requirements
To use Unified Manager, you require:
Java Virtual Machine (JVM) 5.0 (build 5.00.3805 or greater), or Sun Java JRE 1.4.1_02 or greater (for Windows versions that do not have JVM installed)
Microsoft Internet Explorer 5.X (excluding 5.00) or 6.X, or Netscape Communicator 4.8, 6.X or 7.X.
Note: Browser restrictions and limitations:
— BRU and upgrades: Only Internet Explorer will work when using the backup/restore
utility (BRU) or when performing an upgrade procedure.
— The Business Communications Manager upgrade wizard will not work with IE 5.00.
If you are using Netscape Communicator, set the following parameters:
Enable Java: On
Cached document comparison: Every time
If you are using Microsoft Internet Explorer, set the following parameters:
Check for newer versions: Every visit to the page
Java JIT compiler enabled: On
For information about setting these parameters, check the help information on your web browser.
You can access the Business Communications Manager system from another computer through a WAN/Internet connection or a dialup connection. The dialup connection uses either the internal V.90 modem or an ISDN dialup. Both access methods create an IP connection that enables all IP-based management tools. For more information on remote connections, refer to “Configuring
the Dial Up resources” on page 689.
N0008589 3.3
Using a HTTP Proxy server
Unified Manager does not work properly if you use a HTTP Proxy server to connect to the Internet. If you use an HTTP Proxy server, you must change your web browser settings so you can bypass the Proxy Server when connecting to Business Communications Manager. Proxy information is located under the internet options/preferences area of your browser.
Note: If the Business Communications Manager system is located outside of your network, or you have to use a proxy as a gateway proxy to communicate with Business Communications Manager, this process may not work. To bypass the proxy through the browser, the gateway proxy must be able to understand and pass distributed component object model (DCOM) calls between Business Communications Manager and the computer you are using to access Unified Manager.
Logging on to Unified Manager
Use the following procedure to log on to Business Communications Manager using the web browser:
1 Launch your web browser.
Logging on to Unified Manager 67
2 BCM 3.7 software provides two ways to access the Unified Manager:
If you updated from a previous version of software, and you have the Business
Communications Manager address (http://<IP address>:6800) bookmarked, you will find that the login is redirected to an https:// entry.
If you have a new system, enter https//:<IP Address>.
Note: You must include https:// with the address to access Unified Manager when you are using Internet Explorer as your browser.
Note: If your Business Communications Manager has a network Fully Qualified Domain Name (FQDN), you can access your system by pointing your browser to that name.
3 If the browser does not automatically launch, click on the Go tab beside the URL address
field. A security dialog appears.
Security note: The default security certificate that comes with BCM 3.7 version software is a self-signed certificate that enables SSL encryption functionality. The default
!
certificate does not address site authentication since site authentication requires site and system-specific information such as IP address, company name, and so on. Refer to
“Understanding BCM SSL certificate properties” on page 68 for more information.
Programming Operations Guide
68 Understanding BCM SSL certificate properties
Figure 1 Security Alert dialog (JVM)
4 Click Yes.
The first page of the Unified Manager appears. Refer to “Using the Unified Manager main
page buttons” on page 72.
Understanding BCM SSL certificate properties
When you first run the BCM version 3.7 software, you will note that the default Web access to the Business Communications Manager now utilizes SSL encryption for system security (BCM 3.5 and newer software). This includes the appearance of a security alert when you initiate a connection to the Unified Manager using SSL, which indicates site validation of the default certificate.
This security alert does not appear if you:
add a site-specific certificate (“Uploading a certificate and a private security key” on page 69)
suppress the message on your client browser (“Suppressing the security alert message” on
page 71)
use the non-SSL port (http:6800) (“Using the non-secure http:6800 port” on page 71)
The self-signed certificate that is included in the BCM version 3.7 software enables SSL encryption functionality, providing the necessary encryption keys. However, it does not address site authentication. Site authentication requires system-specific information such as an IP address, company name, and so on.
Note: Client applications do not need to install the certificate. The Business Communications Manager sends the certificate when it accesses the client application.
N0008589 3.3
Understanding BCM SSL certificate properties 69
Uploading a certificate and a private security key
Obtain a site certificate for your Business Communications Manager from a CA (Certificate Authority) vendor. Certificate files must use the .PEM format. You will be provided with a certificate and a private security key. These are what need to be installed on the Unified Manager.
Security note: Ensure that you maintain a copy of your certificate and private security keys in a secure place, preferably offsite. This provides you with a backup if your system
!
ever requires data re-entry.
1 Log on to the Business Communications Manager main screen. 2 Click on the Maintenance button. 3 You will be prompted to enter a system user name and password. 4 Click on OK.
The main Business Communications Manager Product Maintenance and Support page appears.
Figure 2 Main Product Maintenance and Support web page
Click on the Maintenance Tools link
5 On the left menu, click on the Maintenance Tools link.
A web page showing a list of Maintenance Tools appears.
Programming Operations Guide
70 Understanding BCM SSL certificate properties
Figure 3 Maintenance Tools dialog web page
6 Under Maintenance Tools, Security, click the Upload Certificate and Private Key link.
A web page displaying Certificate and Private Key fields appears.
Figure 4 Main Product Maintenance and Support web page
7 Use the Browse button beside each field to locate the certificate and private key files.
Both files must be uploaded at the same time.
N0008589 3.3
Understanding BCM SSL certificate properties 71
8 Click the Upload button.
Upload messages:
If the upload is successful:
Certificate and Private Key Upload Was Successful! You must restart the Apache Service or Restart the BCM before the Settings will take Effect.
If the upload is unsuccessful:
Certificate and Private Key Upload Was NOT Successful! The Certificate and Private Key do not match. Please upload a VALID Certificate and Private Key Combination!
9 Click on the BCM link beside Your Location to exit the maintenance pages. 10 To replace the default certificate with the new certificate and private key:
a Exit the Unified Manager. b Log back into the Unified Manager.
Troubleshooting: Restoring the default certificate
If something happens to your private security certificate file, you cannot access the Unified Manager and you need to restore the default certificate. Contact your technical support team for assistance. Refer to “How to get help” on page 62 for Nortel Networks support contact numbers.
Suppressing the security alert message
If you do not want to add a site-specific security certificate, but you want to suppress the security alert message, you can use the Internet Explorer Security options to disable the warning.
1 Open Internet Explorer. 2 On the top menu bar, click Tools and select Internet Options. 3 Select the Advanced tab.
Note: Location of the following prompt may vary, depending on the version of Internet Explorer.
4 Scroll to the item “Warn about invalid site certificates.” 5 If the check box has a check mark, click on the box to remove it. This disables this option. 6 Restart the browser.
Using the non-secure http:6800 port
If you choose not to use SSL on your system, you can disable the system prompt that forces secure web access. Refer to “Setting system security compatibility levels” on page 119. On the Security screen described in that section, choose Disabled for the Force Secure Web Access field.
Programming Operations Guide
72 Using the Unified Manager main page buttons
Using the Unified Manager main page buttons
On the Business Communications Manager Unified Manager initial page, as shown below, a number of buttons provide access to various parts of the Unified Manager. The purpose of each button is discussed in this section.
“Accessing the Unified Manager programming interface” on page 73
“Locating Wizards” on page 76
“Locating optional features from the main page” on page 78
Figure 5 Unified Manager first-page buttons
N0008589 3.3
Using the Unified Manager main page buttons 73
Accessing the Unified Manager programming interface
The Configure button accesses the Unified Manager programming interface for all services except those controlled by the CallPilot and IVR services.
When you first install your system, you must run the Quick Start Wizard to set up your system parameters. This wizard is described in Chapter 3, “Configuring system parameters,” on page 103 or use the Wizard help, that can be accessed once you enter the wizards section of the Unified Manager.
Once your system is initialized, you can access the configuration screens of the Unified Manager using the Configure button. If you choose to preinstall the Java class files, you can use the
Preinstalled Client Access Home Page
sections describe how to use these two logon methods. The screens that appear when you click the Configure button on the main page allow you to
program your system data settings and your telephony requirements.
The data networking parameters are accessed using the Services heading on Unified Manager. For information about how to set up the data networking, refer to Chapter 27, “Using a wizard
to change data parameters to Chapter 40, “Policy-enabled networking.
The media bay module information is managed under the R esources menu.
Most of the telephony components are managed through records located under the Services menu.
hyperlink for the same purpose. The following two
Refer to “Finding your way around” on page 98. 1 From the Business Communications Manager main page, click the Configure button.
The Unified Manager login screen appears.
2 In the Login box, type your login name.
The default login name is ee_admin.
3 In the Password box, type your password.
The default password is PlsChgMe!.
Security note: Ensure that you change the password after you first log on to Business Communications Manager. For information about changing passwords, and defining user
!
profiles, refer to “Managing system and user security access levels” on page 117. If you are logging into an upgraded system, the administrator password may be different.
4 Click the Login button.
The Unified Manager software starts. Depending on your system, Unified Manager software can take several minutes to initialize.
Programming Operations Guide
74 Using the Unified Manager main page buttons
Using the Preinstalled Client Home Page hyperlink
You can improve the time it takes to log on to Unified Manager by using the Preinstalled Client Access Home Page. To use this method, you must install the Java class files on your computer before you log into the Unified Manager. This method of logging in is faster because you do not have to download the Java class files each time you log on to Unified Manager.
Note: To use dialup maintenance, you must use the Preinstalled Client Home Page to access Unified Manager.
Installing the Java Class files on your computer
To install the Java class files on your computer, follow these steps:
1 Go to the Business Communications Manager Unified Manager first page.
Refer to “Logging on to Unified Manager” on page 67, if necessary.
2 Click the Install Clients button. 3 Find the Toolkits heading on the left menu list. 4 Click on the Unified Manager Java Class Library
link.
5 If you are using Microsoft Internet Explorer, click the button beside the Unified Manager
Internet Explorer Java Class link. If you are using Netscape Communicator, click the button beside the Unified Manager Netscape Java Class link. If you have a Windows version that did not come with JVM, click the button beside the SUN JRE Java Class for IE and Netscape Browser link.
6 On the download wizard, click the Run this program from its current location option. 7 Click the OK button. 8 If your browser security is turned on, a Security Warning dialog box appears.
Click the Yes button to allow the install program to run.
9 Click the Finish button. 10 Close the browser window.
Note: You install the Java class files on your computer once. You do not need to install the Java class files each time you use the Preinstalled Client Access Home Page.
N0008589 3.3
Using the Unified Manager main page buttons 75
Logging on using the Preinstalled Client Access Home Page
After you install the Java class files on you computer, you can use the Preinstalled Client Home Page hyperlink instead of the Configure button.
1 Go to the Business Communications Manager first page.
Refer to “Logging on to Unified Manager” on page 67, if necessary.
2 Click the Preinstalled Client Access Home Page hyperlink. 3 In the Login box, type your login name.
The default login name is ee_admin.
4 In the Password box, type your password.
The default password is PlsChgMe!.
5 Click the Login button.
The Unified Manager software starts.
Security note: Ensure that you change the password after you first log on to Business Communications Manager. For information about how to change passwords, and how to
!
define user profiles, refer to “Managing system and user security access levels” on page
117.
Programming Operations Guide
76 Using the Unified Manager main page buttons
Locating Wizards
The Wizards are self-contained task applications that you can use to speed up some configuration tasks. The access icons for the Wizards are located on the Setup and Management Wizards page, which is accessed through the Wizards button on the start page of the Unified Manager.
Figure 6 Wizards icon page, accessed through the Wizards button
These are the wizards that are available from this page:
Quick Start Wizard: initializes the system and sets up your basic system information. This wizard is only run once, when your system is first set up. Refer to “Using the Quick Start
Wizard” on page 108.
Add Users Wizard: allows you to change the telephony settings for a set of DNs or for a single DN. You can define the settings in this Wizard, or you can use a pre-defined template, from a local site or from a remote site, created with the Edit DN Record Template wizard. Refer to “Creating telephone records with the Add Users Wizard” on page 387.
Edit DN Record Template Wizard: allows you to select Telephony User Templates and change and define the user settings for telephones. The Telephony Template is stored in a file for use with the Add Users Wizard. Refer to “Editing DN Record Templates” on page 381.
N0008589 3.3
Using the Unified Manager main page buttons 77
DN Renumber Wizard: renumbers a range of DNs. Refer to “Using a wizard to renumber
telephone DNs” on page 378.
Network Update Wizard: allows you to update your system data network settings any time after the Quick Start Wi zard was run, which sets the initial network setup. Refer to “Using the
Network Update Wizard” on page 638.
DECT Mobile Recording Wizard: allows you to enable/disable mobile recording for one of the legacy DECT base station ports.
DECT Configuration Wizard: allows you to easily configure a DECT module for the legacy DECT system. It also turns on one of the base station ports to allow mobile recording (handset registration).
Note: The DECT Wizards only appear on th e Wizards page if there is a legacy DECT module installed and identified to the system. These wizards are discussed in the DECT Installation and Maintenance Guide, which can be found on the documentation CD.
Navigating the wizards
These are some helpful hints about how the wizards work, and how to use them.
To open the online help, from the Programming Wizards screen click the Programming Wizards Help link.
You can move back and forth between screens in the wizards by clicking the Back and Next buttons.
You can revise your choices and entries on any of the wizard pages until you click the Apply button. Once you click the Apply button, the system proceeds to apply the selected configurations. The user is presented with a confirmation box that provides the approximate timing of the process. T o check the status of the configuration, press the Refresh button. When the process is complete, the title of the page has the word completed as part of the title.
Programming Operations Guide
78 Using the Unified Manager main page buttons
Locating optional features from the main page
After you set up the system and it is operating, you can add the keycodes for any optional features you want to include.
You access the optional applications, including those which require keycodes, through the Install Clients button.
The program that manages CallPilot is accessed through the Call Pilot button.
Access optional applications
Access CallPilot application
For information about how to set up these optional features, refer to the documentation for each application.
Note: Basic CallPilot functions are standard on the Business Communications Manager and you define your region and basic settings when you run the Quick Start Wizard. Refer to “What you
need to know before you use the wizard” on page 105. If you are using this call pilot as the voice
mail host to other systems, you may need to set up areas of the Unified Manager, as well. Refer to
“Configuring centralized voice mail” on page 563.
N0008589 3.3
Using the Unified Manager main page buttons 79
Finding documentation from the main page
Use the Documentation button to find the information you require to help you understand and configure your system to your specifications. The entire Business Communications Manager documentation suite, plus a number of training panels, are included on your Bu siness Communications Manager computer, as well as on the CD that accompanied your system.
The Programming Records are on the CD only.
Refer to “System documentation map” on page 57 to view a map of th e information contained on the CD in relation to the tasks required to install, operate and maintain the Business Communications Manager system.
Using BRU from the main page
The BRU (Backup and Restore Utility) button, allows you to ensure the integrity of your system data by providing a way to back up your system data and configurations in the way that is most useful for your purposes. Backed up data can be restored to the Business Communications Manager should a system failure occur, such as a prolonged power outage. The Management User Guide describes how to use this feature.
Accessing maintenance information from the main page
The Maintenance button accesses a number of maintenance tools that allow you to determine the current status of the various aspects of your Business Communications Manager system. The Management User Guide describes how to use these tools.
Programming Operations Guide
80 Using the Unified Manager
Using the Unified Manager
Unified Manager provides a web-based navigation tool that allows you to view and change configurations for the Business Communications Manager system.
Most changes made with Unified Manager become part of current Business Communications Manager programming when you select an item from the menu options. Howe ver, some changes take effect after you exit the screen. If a programming error occurs, you must reenter the original programming.
This section describes the various parts of the configuration main screen:
Business Communications Manager system access
Unified Manager screen display
“Understanding the dynamic menu” on page 82
“Understanding the navigation tree headings” on page 83
“Understanding tabbed pages” on page 85
Business Communications Manager system access
You must control system access by providing one user id, the administrator, with read-write privileges. Give all other users selected access privileges to control the possibility of concurrent configuration of the Business Communications Manager system. For information about defining user profiles and passwords, see “Managing system and user security access levels” on page 117.
Unified Manager screen display
The Unified Manager screen display, shown in the figure below, consists of:
a menu bar, where users access configuration commands
a navigation frame that displays the navigation tree you use to navigate through Business Communications Manager programming headings
an information frame that displays the windows related to the headings you select in the navigation frame
N0008589 3.3
Figure 7 Main display of the Unified Manager
Using the Unified Manager 81
Navigation key
Navigation frame
The menu bar contains configuration management options. When you select the different headings in the navigation tree, these options are enabled. If an option appears dimmed, it is not available for the heading you have selected.
The navigation tree contains headings that allow you to access specific areas of the Business Communications Manager system. The key symbol ( ) beside each heading indicates that the heading can be expanded to show sub-headings. To display sub-headings, double-click the item or just click on the key itself. As you select various headings in the navigation tree, the heading changes color and Unified Manager displays the appropriate information frame.
Note: If you receive the error message
available. Please try again later.
that the part of the system that handles MSC is doing a reset. Wait about one-and-a-half minutes and try again.
The information frame can contain configuration windows or dialog boxes indicating the appropriate action or showing system messages or warnings.
Buttons
Headings
Menu bar
Tabbed pag e s Information frameNavigation tree
Telephony programming is currently not
when you click on one of the headings, this means
Programming Operations Guide
82 Using the Unified Manager
Understanding the dynamic menu
You access some of the Business Communications Manager functions using the top menu bar. This menu bar is dynamic. Commands become active or inactive depending on the heading you select from the navigation tree in the left frame. The following table defines the menu bar top-level items.
Table 2 Menu bar items
Menu item Description Group View the system, resources, services, and management. Edit Edit parameters. Configuration Access configuration dialog boxes and screens. Performance Access performance graphs and tables. Fault Access fault management settings. Report Generate a report. Tools Use Business Communications Manager tools. Logoff Log off, reboot or shutdown the Business Communications Manager base
unit.
View Refresh the information window to reflect configuration changes. Help Access online help.
Refer to the figure in “Unified Manager screen display” on page 80.
N0008589 3.3
Using the Unified Manager 83
Understanding the navigation tree headings
The Unified Manager navigation tree contains five main headings that allow you to access specific areas of the Business Communications Manager system. These headings are described in the following table.
(<IP address>)
Table 3 Navigation tree menu functions
Heading Programming System
Resources
Provides access to Licensing, Identification and Security subheadings. This includes a form to enter keycodes, and a list of current supported services.
The Security heading provides screens that allow you to determine the level of security within and entering the system. Refer to “Managing system and user
security access levels” on page 117.
When you select the System heading, you can view system information such as your system name and a description about which resources and services are available.
Selecting the System heading also enables the following menu options: Configuration, Performance, Fault, Logoff, View and Help. These menu options provide access for you to:
enable/disable services
access CPU and memory status
access to the alarm banner, which displays totals of alarms
access or refresh a system inventory list
perform system reboot or shutdown operations Also refer to the Management User Guide.
Provides access for configuring data and telephony resources for Business Communications Manager hardware setup. This information is included in
“Configuring resources — media bay modules” on page 135, “Data and split-line configuration” on page 161, “Configuring the LAN resources” on page 667, “Configuring the WAN resources” on page 673, “Configuring the Dial Up resources” on page 689, and “Configuring the MSC resources” on page 613.
Programming Operations Guide
84 Using the Unified Manager
Table 3 Navigation tree menu functions (Continued)
Heading Programming Services
Management
Diagnostics
Provides access for configuring telephony and data networking services and various other related services. Telephony information is discussed from Chapter
7, “Telephony Services overview,” on page 195 to Chapter 31, “Configuring the Dial Up resources,” on page 689 and in the IP Telephony Configuration Guide. /
Doorphone configuration is located in separate documentation. System data configuration is discussed from Chapter 32, “Configuring DNS,” on page 707 to
Chapter 41, “Configuring IP Firewall Filters,” on page 819.
This section also supports the information found in the CallPilot documentation, and the documents for CDR Recording, LAN CTE, IVR, Doorphone, Network administration, universal power supply, UPS) document.
The Management User Guide provides information about SNMP, Alarm Service, and NetIQ.
To manually enable or disable the Telnet service, refer to “Manually activating
Telnet” on page 89.
Provides access to the User Manager, which you use to manage the users who have access to the Unified Manage (“Managing system and user security
access levels” on page 117), and to the Alarm Manager, which is used to define
why types of alarms get reported by the system. The latter information is discussed in the Management User Guide.
Provides access to items that allow you to generate and access statistics on different system components. Business Communications Manager provides statistics, metrics and event logs on resources and services to help you carry out system maintenance activities. For more information about using diagnostics tools, refer to the Management User Guide.
System metrics information is contained in the programming section to which they apply. Refer to “Viewing CbC limit metrics” on page 355, “Using Hunt group
metrics” on page 591, and the IP Telephony Guide.
Split DS30 configuration and double density configuration are located under the Configuration menu of the MSC heading. These system features are discussed in the section that discusses MSC configuration. Refer to “Changing the DS30
Split” on page 633 and “Configuring Double Density” on page 634.
N0008589 3.3
Understanding tabbed pages
Some headings display records that have more than one level. Each level is accessed by clicking the appropriate tab at the top of the screen.
Figure 8 Tabbed page example
Using Unified Manager Help 85
Screen tabs
Using Unified Manager Help
As noted in “Understanding the dynamic menu” on page 82, the dynamic menu has a Help heading. This heading allows you to access help topics relevant to active navigation tree headings and screens. Each navigation tree heading and tab also has an alternate-click help link.
The help pages open in a new web-based window. Each help page also have navigation tools that allow you to move back or forward to find other help topics.
Viewing help for navigation tree headings
1 Highlight the heading for which you want to view help. 2 Alternate-click anywhere in the left pane to get the csHelp button. 3 Then click normally on the csHelp button to open the help web page.
Figure 9 Accessing navigation tree heading help
Select heading, then alternate-click to get csHelp button.
Programming Operations Guide
86 Logging off
Viewing help for tabs
1 Click on the tab to make it the active screen. 2 Alternate-click anywhere in the right pane to get the csHelp button.
Note: Some tabs may have other headings as well.
3 Then click normally on the csHelp button to open the help web page.
Figure 10 Accessing navigation tree heading help
Click the tab, then alternate-click to get csHelp button
Logging off
When you have finished a session on the Unified Manager, you need to log off correctly to protect the integrity of the information you entered.
1 Choose BCM (<IP address>) at the top of the navigation tree.
The Logoff menu is enabled.
2 Click Logoff, then select Logoff.
A message appears that asks you to confirm your request to log off.
3 Click Yes to continue. 4 A second message appears reminding you to close your browser window after the system has
logged out. Click Yes to continue. A Logoff progress bar appears. When it the logoff is complete, the browser display will revert
to the Login screen.
5 Click the Windows exit icon (top, right corner). 6 Click the Windows exit icon on the browser window displaying the Business Communications
Manager main menu. Note: Exit both Unified Manager browser windows, even if you want to re-log on to the
Configuration area. Once you have exited both windows, you can re-establish a connection with the Business Communications Manager and log on as usual. Failure to log out of both browser windows could result in a failed attempt to re-enter the Unified Manager Configuration section.
N0008589 3.3
Using the SSH client to access the text-based interface 87
Using the SSH client to access the text-based interface
Some operations for the Business Communications Manager, such as initializing a new hard disk, use a text-based interface. In previous versions, the Telnet application was used to access the Business Communications Manager text menus. BCM version 3.6 software introduced the ability to securely access the Business Communications Manager through a network connection using SSH server software. SSH service software is from SSH Communications Security (www.ssh.com). The SSH client application, called PuTTY, can be downloaded from a link under the Install Clients button on the Business Communications Manager first page. Refer to Installing
PuTTY. Refer to “Using PuTTY” on page 88 for detailed information about using the client to
access the Unified Manager text-based menus.
Users require an administrator-level password to use either PuTTY or Telnet.
Security note: You can still use Telnet for direct connections through a crossover cable, since network security is not an issue in this case.
!
If you want to use Telnet over the network, you need to manually start the service. Refer to “Manually activating Telnet” on page 89.
Installing PuTTY
The PuTTY application resides on your computer. It provides an access interface that allows you to connect to the text interface used by the Business Communications Manager.
1 On the Unified Manager front page, click the Install Clients button.
2 On the resulting web page, go to the bottom of the left column. 3 Under Administrative Tools, click SSH client. 4 On the SSH Client page, click the button beside Download SSH Client, at the bottom of the
right pane. The application downloads to your computer.
5 On your computer desktop, double click Putty.exe. 6 Follow the steps in the install Wizard to install the application.
Programming Operations Guide
88 Using the SSH client to access the text-based interface
Using PuTTY
1 Click the shortcut PuTTY icon.
The PuTTY Configuration screen appears.
Figure 11 PuTTY Configuration screen
2 Click on the radio box beside SSH. 3 In the Host Name (or IP address) box enter the IP address or the Fully Qualified Domain
Name for the Business Communications Manager you want to connect with.
4 Click Open. 5 The first time you enter the application you may receive a security notice. Click OK.
The PuTTY text screen appears.
6 At the login prompt, enter an administrator-level user name. 7 Press <Enter>. 8 At the next prompt, enter the corresponding password. 9 Press <Enter>. 10 The Business Communications Manager Main Menu appears.
N0008589 3.3
Figure 12 Business Communications Manager Main Menu
Manually activating Telnet 89
11 Refer to the specific tasks that require this menu for details about using this it.
Manually activating Telnet
If you choose to continue operating the text-based menus with Telnet, rather than using the PuTTY client, you can manually activate the service from the Unified Manager.
Security note: Using the Telnet interface poses a security risk since the Telnet protocol
!
is not encrypted.
Note: If you are using a cross-over cable to make a direct connection, Hyperterminal is still enabled, regardless of the status of Telnet on the system.
1 Click the key beside Services. 2 Click on Telnet. 3 On the Telnet screen, change Status to Enabled.
Programming Operations Guide
90 Manually activating Telnet
N0008589 3.3
Chapter 2 Introduction
The Business Communications Manager includes software and hardware components that provide telephony, voice messaging, interactive voice response (IVR), data networking, and IP telephony.
The web-based navigation tool, Unified Manager, provides easy access to all operations and maintenance programming on the Business Communications Manager system at a single site. For more information about Unified Manager, see “Using the Unified Manager” on page 80.
This section includes the following topics:
“System configuration process maps” on page 92
“Finding your way around” on page 98
“Business Communications Manager hardware” on page 100
“What do media bay modules do?” on page 102
“How does the system connect to the network?” on page 102
“Additional Business Communications Manager applications” on page 102
91
With the introduction of BCM version 3.5 software, there was an increase in the awareness of security in regards to access to the Unified Manager, both by administrative users and by
!
client applications. The icon shown to the left, when used within this document, denotes
points of security that you need to consider when setting up or using your system.
This software includes a generic security certificate that provides an increased level of encryption ability. You can replace this certificate with a site-specific certificate. Since encryption levels have some dependencies to the version of Windows operating systems, the defaults are set at a mid-range level to allow for clients using earlier versions that do not support strict encryption requirements. You can reset these levels higher or lower.
This version also provides more control over password policies, that allow you to determine the complexity of the passwords you want to assign to the users who do programming in the Unified Manager. You can also determine if you want the system to lockout users who have entered an incorrect password after a specified of times.
Finally , a more secure front end application to the text-based interface is being introduced. The PuTTY application uses SSH to provide a secure connection to the text-based interface. The application is downloaded to a user’s computer, rather than being resident on the Business Communications Manager, like Telnet.
The Network Configuration Manager provides multi-site network management. This process is described in a separate set of user guides.
Figure 13 on page 93, Figure 14 on page 94, Figure 15 on page 95, Figure 16 on page 96, and Figure 17 on page 97 provide an overview of the processes for operating the Business
Communications Manager system.
Programming Operations Guide
92 System configuration process maps
System configuration process maps
The following process maps show you the order in which your system is configured. Each section provides quick reference information about the step, plus a link to the process section.
Initial system configuration
“Configuring telephony components” on page 94
“Optional keycoded features” on page 95
“Data and IP telephony configuration” on page 96
“Post-system setup features” on page 97
Caution: Programming affects system operation. Only a qualified system administrator should perform startup, installation and maintenance programming. Many of the settings affect correct system operation.
N0008589 3.3
Initial system configuration
Figure 13 Process for initial system configuration
System hardware is installed
Set and
install
modules
Refer to the Installation and Maintenance Guides for hardware setup.
Refer to the Installation and Maintenance Guides for media bay module settings and connections. To identify the media bay modules to the system and set up their line values, refer to “Configuring resources — media bay
modules” on page 135.
System configuration process maps 93
Run
startup Wizard
Set up
security
levels
Set up
user
access
Set up your system for correct network connection and basic telephony and CallPilot properties. Refer to “Using the Quick Start Wizard” on page 108.
There are a number of points at which you can enhance the security of access to your system: You can install a site-specific security certificate (“Understanding BCM SSL
certificate properties” on page 68).
You can determine the encryption level required between the system and clients (“Setting system security compatibility levels” on page 119).
To maintain user access security, you can define different levels of password security and user access. At a minimum, change the default administration default passwords (ee_admin and supervisor). Refer to
“Managing system and user security access levels” on page 117.
Programming Operations Guide
94 System configuration process maps
Configuring telephony components
Figure 14 Process for configuring the telephony components
System setup is complete
Set up
lines/loops
Set up
access
Set up
telephones
Refer to the preceding flow chart.
When the trunk media bay modules are configured, the system assigns line or loop numbers. You may need to change some of the line attributes. You can also refer to the lines and loops to set up line pools and call routing. Refer to “Configuring lines” on page 239.
See also “Data and split-line configuration” on page 161
When your lines are configured, you can set up system access configurations. Refer to “Configuring outgoing calls” on page 311 and
“Controlling access into the system” on page 293.
When the station media bay modules are configured, the system assigns extension numbers (DNs) for each telephone connection. DNs define each device connected to the system. Within the System DN headings, you can define how individual devices will interact in the system. Refer to “Configuring DNs for system devices” on page 399. Cordless/wireless telephones (WLAN IP telephones, the 7406) have separate installation and configuration guides and feature cards.
Confirm
system
settings
Set up
special
features
Set up
call
management
features
N0008589 3.3
A number of settings affect all lines or telephones. Most of these settings are default. Confirm that they suit your purposes. Refer to “Configuring system settings” on page 459.
After you set the basic telephony information, you can configure the special features such as:
Hunt groups (“Configuring Hunt groups” on page 577)
Hospitality (“Configuring Hospitality Services” on page 593)
IP music (“Configuring the music source” on page 605)
The Business Communications Manager has built-in call management applications. Basic CallPilot features can be accessed from the CallPilot button on the first page of the Unified Manager. CallPilot documentation describes how to install and use the available features. CallPilot also has enhanced features, which require a keycode to activate (refer to the CD contents flowchart: “System documentation map” on page 57).
Remote voice mail: If your system is not the voice mail host, set up remote access to the network voice mail system. Refer to “Configuring centralized
voice mail” on page 563
Optional keycoded features
Figure 15 Process for activating optional keycoded features
System configuration process maps 95
System is
set up
Purchase
the optional
feature
Get an
Authorization
code
Get the software keycode
The basic system has been installed and configured.
Keycoded applications:
Call Center/Call Center Reporting Fax Suite LAN CTE (TSP) (required for Personal Call Manager) Message Networking (VPIM/AMIS) Multimedia Call Center Networking DPNSS/MCDN (region-specific) Professional Call Center (upgrade) and Professional Call Center Agents Unified Messaging and Voice Mailbox Expansion VoIP Gateway and IP telephony and IP trunks Interactive Voice Response (IVR) Legacy Companion (US UTAM code)
When you purchase an optional feature, you receive an Authorization Code for the feature.
Access the Nortel Networks Keycode web site and use the Authorization Code to get a software keycode for the feature. For information about how to get the software keycode, refer to the Software Keycode Installation Guide.
Enter software keycode
Program
the feature
Use Unified Manager to enter the software keycode. For information about how to enter the software keycode, refer to the Software Keycode Installation Guide.
For information about how to program the new optional feature, refer to the documentation for that feature.
Also refer to “Using a wizard to change data parameters” on page 637.
Programming Operations Guide
96 System configuration process maps
Data and IP telephony configuration
Figure 16 Process for configuring the data and IP telephony components
System setup is complete
Set up
data
network
Set up network Policies
Set up
firewalls
Basic system configuration is complete. Refer to previous flowcharts.
You configure the data network options, so that Business Communications Manager operates properly on your network. For information about how to configure the data networking options, refer to:
“Configuring DHCP” on page 641
“Configuring DNS” on page 707
“Configuring IP Routing” on page 709
“Configuring QoS monitor” on page 727
“Configuring Web Cache” on page 723
“Configuring Net Link Manager” on page 733
“Configuring NAT (Network Address Translation)” on page 737
“Configuring NTP Client” on page 749
Policies allow you to control the data traffic on your network so more bandwidth is available to delay sensitive data such as IP telephony. For information about how to configure Policies, refer to “Policy-enabled
networking” on page 795.
To control access to your system, you can use firewalls to block or allow specific ports and IP addresses. Refer to “Configuring IP Firewall Filters”
on page 819.
Set up
VPN
Tunnels
Set up IP
telephony
N0008589 3.3
Virtual Private Networks (VPN) tunnels allow you to create secure connections over the public data network. You can also use VPN to ensure a secure connection to the Business Communications Manager. For more information about VPN Tunnels, refer to “Virtual Private Networks (VPN)”
on page 753.
Set up any voice over IP (VoIP) trunks and/or IP telephones. Refer to the IP Telephony Configuration Guide and the WLAN IP telephone documentation for details. The DNs for these telephones are configured within the digital range of DNs.
Post-system setup features
Figure 17 Post-setup processes
System configuration process maps 97
System is
set up
Set up
alarm
manager
Set up
BRU and
CDR
The basic system has been installed and configured.
Determine how your Business Communications Manager system will report alarms. Refer to the Management User Guide
Set backup schedules and determine call detail reporting (CDR). Refer to the Management User Guide and the CDR User Guide.
Programming Operations Guide
98 Finding your way around
Finding your way around
The following sections provides you with quick links to the detailed configuration information:
“Security and User Management” on page 98
“Telephony programming quick access list” on page 98
“Data programming sections” on page 99
Security and User Management
Unified Manager access: “Getting started with Unified Manager” on page 65
Security and user management: “Managing system and user security access levels” on page
117
Telephony programming quick access list
Configuration overviews and planning
System configuration process overview: “System configuration process maps” on page 92
Application overview: Getting started with Unified Manager on page 65
Telephony Services overview: “Planning your telephony services” on page 200
Quick reference section to telephony programming: “Telephony feature planning” on page
205
Lines and network configuration
Configuring media bay modules: “Configuring resources — media bay modules” on page
135
Configuring the PSTN lines: “Configuring lines” on page 239 and “Configuring BRI
Loops” on page 277
Configuring outgoing call programming: “Configuring outgoing calls” on page 311
Configuring incoming and internal access: “Controlling access into the system” on page
293
Configuring the public network access: “Configuring public networks” on page 503
Configuring private network access: “Configuring private networks” on page 509, and
“Configuring private networks with SL-1 MCDN” on page 523, or “Configuring ETSI QSIG and DPNSS network services” on page 547.
Centralized Voice Mail (host or remote system and telephony settings): “Configuring
centralized voice mail” on page 563
ISDN general information: “ISDN overview” on page 857
N0008589 3.3
Finding your way around 99
Telephony configuration
Using Wizards to configure telephones: “Configuring DNs using the Wizards” on page
381
Using DN records to configure telephones: “Configuring DNs for system devices” on
page 399
Setting telephony system features: “Configuring system settings” on page 459
Define telephony schedules: “Configuring schedules” on page 489
Telephony features list: System Features on page 849
Special features
Hunt groups: “Configuring Hunt groups” on page 577
Hospitality Services: “Configuring Hospitality Services” on page 593
Reference material
System profile tables: “Defining region-based defaults” on page 833
Features available for programming on the telephone memory buttons: “Button
programming features” on page 853
Data programming sections
“Configuring the MSC resources” on page 613
“Using a wizard to change data parameters” on page 637
“Configuring DHCP” on page 641
“Configuring the LAN resources” on page 667
“Configuring the WAN resources” on page 673
“Configuring the Dial Up resources” on page 689
“Configuring DNS” on page 707
“Configuring IP Routing” on page 709
“Configuring QoS monitor” on page 727
“Configuring Web Cache” on page 723
“Configuring Net Link Manager” on page 733
“Configuring NAT (Network Address Translation)” on page 737
“Configuring NTP Client” on page 749
“Virtual Private Networks (VPN)” on page 753 (tunnels)
“Policy-enabled networking” on page 795
“Configuring IP Firewall Filters” on page 819
Programming Operations Guide
100 Business Communications Manager hardware
Business Communications Manager hardware
The main component of the Business Communications Manager system is the Business Communications Manager base unit. The Business Communications Manager base unit controls all tasks such as call processing, voice messaging, and data routing.
BCM1000 (legacy equipment)
If you have existing equipment, like the unit shown in the figure below (BCM1000), you can update the operating system with new Business Communications Manager software.
Figure 18 Upgradeable BCM1000
Media bay module (MBM) slots
Ethernet ports
For a detailed description about maintaining these units, refer to the Business Communications Manager BCM1000 Installation and Maintenance Guide.
Note: Some of the components described in this section are not available in all areas. Ask your Nortel Networks Business Communications Manager supplier for information about the availability of components.
N0008589 3.3
Loading...