Lucent Technologies MERLIN LEGEND Release 5.0 System Programming Manual page 310

Communications system
Hide thumbs Also See for MERLIN LEGEND Release 5.0:
Table of Contents

Advertisement

MERLIN LEGEND Communications System Release 5.0
System Programming 555-650-111
3
Common Administrative Procedures
Optional Group Calling Features
Console/Display Instructions
Save your entry.
 
Select
.
Enter
or
Next.
Return to the System Programming menu.
 
Select
two times.
Exit
Group Type
Use this procedure to determine whether or not the system automatically logs in
members of a calling group after a power failure. This setting also determines the
type of voice messaging interface when the calling group is used to connect voice
messaging or automated attendant applications. The settings are listed below.
Automatic Log Out. Used for calling groups to specify that the system
does not automatically log in calling group members after a power failure.
Calling group members must manually log themselves into the group.
Automatic Log In. Used for calling groups that consist of fax machines or
data stations (also called data hunt groups) to specify that the system
automatically logs in calling group members after a power failure. This
setting can also be used for calling groups consisting of telephones.
Integrated VMI. Used when a voice messaging system that requires
special signaling for integrated operation (for example, AUDIX Voice
Power, IS II/III, or MERLIN MAIL Voice Messaging System) is connected
to one or more extension jacks assigned to a calling group. The system
automatically logs in the group members after a power failure.
Generic VM. Used when a voice messaging system that does not need
special signaling is connected to one or more extension jacks assigned to a
calling group. The system automatically logs in the group members after a
power failure.
NOTE:
NOTE:
NOTE:
In Release 3.1 and later, any port programmed as a VMI port is
programmed with:
outward restriction on
a default FRL of 0 (the most restrictive)
a default Disallowed List (List 7) that includes the numbers frequently
associated with fraud
Additional Information
to program the next calling group.
Use
Next
Return to Step 7.
3
Issue 1
June 1997
Page 3-156
PC

Advertisement

Table of Contents
loading

Table of Contents