Toshiba Stratagy IVP8 Installation And Maintenance Manual page 166

Voice processing systems
Hide thumbs Also See for Stratagy IVP8:
Table of Contents

Advertisement

Token Programming
Defined Tokens
Table 7-3
Defined Tokens (continued)
Token
Logs caller into User ID.
Note Cannot be used in the Notify Menu.
Syntax
KL( )
where:
uid
Example KL(239)
Logs the caller into User ID 239
Enables a Stratagy Admin PC's modem to communicate with the IVP8 internal modem (2400). This
token is factory programmed in User ID 993.
KM
Example @KM
Access AMIS networking—the KN( ) token enables access to AMIS networking (see
AMIS
Syntax
where:
phone
mbx
KN( )
Example KN(9-1-7145555555,345)
9
-
1
-
7145555555
345
Creates a recording—if the destination is an existing User ID, Stratagy inserts the recording into that
mailbox as a new message. Otherwise, the destination is assumed to be the name of an existing file
and the recording is placed there.
Syntax
KR( )
where:
dest
Example KR(532)
Inserts the recording in User ID 532 as a new message.
7-10
KL(uid)
Valid User ID.
Networking).
KN(phone[,mbx])
DTMF digits representing the telephone number to dial to connect to the AMIS network.
Valid mailbox on remote system or current User ID (Proxy Box). If not defined, Stratagy
uses value defined when AMIS message was addressed via the Gateway Box. See
Chapter 9 – AMIS Networking
Dials for an outside line.
Pauses (0.5 second).
Dials 1 for long distance access.
Pauses (0.5 second).
Dials the telephone number.
Dials the User ID.
KR(dest)
Destination—User ID or file (valid DOS file name). Can be a variable.
Description
for details.
Chapter 9 –
Stratagy I&M
06/02

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Stratagy flashSg-f-2Sg-f-4

Table of Contents