Table of Contents

Advertisement

Quick Links

Business Communications
Manager 3.7
Programming Operations
Guide
Part No. N0008589 3.3
December 2006

Advertisement

Table of Contents
loading

Summary of Contents for Nortel BCM 3.7

  • Page 1: Business Communications Manager

    Part No. N0008589 3.3 December 2006 Business Communications Manager 3.7 Programming Operations Guide...
  • Page 2 Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Nortel Networks NA Inc. Trademarks NORTEL NETWORKS is a trademark of Nortel Networks.
  • Page 3: Software Licensing

    Software licensing Software licensing The Apache Software License, Version 1.1 Copyright (c) 2000-2002 The Apache Software Foundation. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 4 Software licensing N0008589 3.3...
  • Page 5: Table Of Contents

    Contents Software licensing ........... . . 3 The Apache Software License, Version 1.1 .
  • Page 6 Contents Business Communications Manager system access ..... . 80 Unified Manager screen display ........80 Understanding the dynamic menu .
  • Page 7 Contents Entering information into the Quick Start Wizard ......108 Changing system identification parameters ....... . 110 Identifying your system and software version .
  • Page 8 Contents E1 parameters (region-specific) ........150 PRI Call-by-Call service selection .
  • Page 9 Contents Assigning lines for voice traffic ........171 Assigning lines for data traffic .
  • Page 10 Contents Planning your telephony services ........200 Three basic system telephony configurations .
  • Page 11 Contents Controlling telephone programming access ....... 236 Special features ........... . . 237 Chapter 9 Configuring lines .
  • Page 12 Contents Provisioning the loop variables ......... 285 Provisioning the Loop .
  • Page 13 Contents Setting up public network dialing ........316 About the Public DN lengths table .
  • Page 14 Contents Setting CbC limits (on U.K. core BCMs) ......353 PRI line pools ..........354 Viewing CbC limit metrics .
  • Page 15 Contents Using remote templates ..........396 Saving wizard pages on your computer .
  • Page 16 Contents 7316 button defaults ..........437 7208 button defaults .
  • Page 17 Contents Transferring calls between SWCA groups ......475 Parking and retrieving calls on SWCA keys ......475 Manually associating a call .
  • Page 18 Contents Other programming that affects public networking ......507 Chapter 19 Configuring private networks ........509 Private network programming parameters .
  • Page 19 Contents Three party service ..........553 Making a conference call .
  • Page 20 Contents Chapter 23 Configuring Hunt groups ........577 How to use Hunt groups .
  • Page 21 Contents Chapter 25 Configuring the music source ........605 Selecting the music source .
  • Page 22 Contents Maximum ........... 628 Viewing the MSC Configuration .
  • Page 23 Contents Configuring Remote Scope Reserved Addresses ......659 Adding a reserved address ........659 Deleting a reserved address .
  • Page 24 Contents Modifying PVC congestion controls ....... . 683 Deleting a PVC congestion control ....... . 683 WAN PPP Parameters .
  • Page 25 Contents Chapter 33 Configuring IP Routing ........709 Routing Information Protocol (RIP) .
  • Page 26 Contents Chapter 37 Configuring NAT (Network Address Translation) ....737 Static NAT ............737 Dynamic NAT .
  • Page 27 Contents Modifying a Destination Network ........763 Deleting a Destination Network .
  • Page 28 Contents Modifying a Remote IP Address Pool ......788 Deleting a Remote IP Address Pool ....... 788 Adding Remote User Accounts .
  • Page 29 Contents Configuring a COPS Client ......... 814 Adding a COPS Client Server entry .
  • Page 30 Contents Appendix B System Features ..........849 Business Communications Manager feature codes .
  • Page 31 Contents Method 1 ........... . 873 Method 2 (North America only) .
  • Page 32 Contents W ..............937 Index .
  • Page 33 Figures Figure 1 Security Alert dialog (JVM) ........68 Figure 2 Main Product Maintenance and Support web page .
  • Page 34 Figures Figure 41 Finding state of port on Bus ........156 Figure 42 Ports on Bus, B1 screen .
  • Page 35 Figures Figure 83 Assigning a target line to a set ........298 Figure 84 Defining a Received number .
  • Page 36 Figures Figure 126 DN General screen for digital and IP telephones ..... . . 401 Figure 127 Line access fields ..........404 Figure 128 Assigning characteristics to each line .
  • Page 37 Figures Figure 167 ONN blocking parameters ........485 Figure 168 Scheduled Services headings .
  • Page 38 Figures Figure 210 Hospitality room settings ......... 594 Figure 211 Hospitality call permissions .
  • Page 39 Tables Table 1 Telephone buttons ..........49 Table 2 Menu bar items .
  • Page 40 Tables Table 41 Combined line settings table ........267 Table 42 Loss package settings .
  • Page 41 Tables Table 83 ATA settings ........... 422 Table 84 Availability of MWI signals .
  • Page 42 Tables Table 125 IP trunking interoperability fields ........543 Table 126 Hardware programming for branch offices .
  • Page 43 Tables Table 167 Remote Scope Excluded Addresses ....... . 655 Table 168 Remote Scope Reserved Addresses .
  • Page 44 Tables Table 209 QoS Monitor Summary attributes ........727 Table 210 Mean Opinion Score descriptions .
  • Page 45 Tables Table 250 QoS Policy parameters ......... . 807 Table 251 Status page items .
  • Page 46 Tables N0008589 3.3...
  • Page 47: Preface

    Preface This guide explains how to program your Business Communications Manager system. For more information about the Business Communications Manager document suite, refer to “Related publications” on page This issue of the document reflects the added functionality built into the Business Communications Manager 3.7 release.
  • Page 48: Before You Begin

    Before you begin Before you begin This guide is intended for these audiences: • the installer who performs the initial configuration of the system • the operator who manages the overall telephony operations of the system • the system administrator who manages the data and network operations of the system This guide assumes the following: •...
  • Page 49: Text Conventions

    The IP telephones display a tag over the far left display key. Table 1 shows the icons that appear for each function on the different types of Nortel Networks digital telephones. Note that the 7316 and 7208 have a separate button for mute functions. The IP telephones and the 7316E have separate buttons for both mute and handsfree.
  • Page 50: Basic Digital Telephones: 7100 And 7000

    The Telephone Feature User Guide can be used with these telephones, as most Business Communications Manager features can be accessed from these telephones. The Nortel IP telephones also have a display menu that provides quick access to listed features.
  • Page 51: Acronyms Used In This Guide

    Acronyms used in this guide Information about configuring IP telephones is contained in the IP Telephony Configuration Guide. The WLAN handsets have a separate installation and configuration document. Acronyms used in this guide This guide uses the following acronyms: Analog Access Lines Automated Call Distribution Authentication Header ANSI...
  • Page 52 Acronyms used in this guide Class of Service CSMA/CD Carrier Sense Multiple Access/Collision Detection Channel Service Unit Connected Telecommunications Equipment Centralized Voice Mail Digital Access Lines DASS2 Digital Access Signaling System Number 2 Data Communications Equipment DCOM Distributed Component Object Model DECT Digital enhanced cordless telecommunications or Digital European cordless telephone...
  • Page 53 Acronyms used in this guide Encapsulated Security Payload Full Double Density FQDN Fully Qualified Domain Name File Transfer Protocol GATM Global Analog Trunk Module HDLC High-level Data Link Control Handsfree Home Location Code (UDP dialing) Hospitality services HTTP Hypertext Transfer Protocol HTTPS Hypertext Transfer Protocol Secured Ingress Border Node...
  • Page 54 Acronyms used in this guide MCDN Meridian Client Defined Network (PRI SL-1) Message Digest algorithm MLPPP Multi-Link Point-to-Point Protocol MPPC Microsoft Point to Point Compression Media Services Card MS-PEC Media Services Processor Expansion Card Message Waiting Indicator Network Address Translation NBMA Non Broadcast Multi-Access NCRI...
  • Page 55 Acronyms used in this guide Routing Information Protocol Receive Loudness Rating Remote Procedure Call Realtime Transport Protocol Service Advertising Protocol SAPS Station Auxiliary Power Supply SDRAM Synchronous Dynamic Random Access Memory Secure Hash Algorithm Service Level Agreement Send Loudness Rating Server Message Block SMDS Switched Multimegabit Data Service...
  • Page 56: Related Publications

    Related publications WINS Windows Internet Name Service WLAN Wireless LAN Related publications In addition to the Programming Operations Guide, the Business Communications Manager documentation suite contains the following documents: • Management User Guide • Telephony Features Handbook • Installation and Maintenance Guide (BCM1000 and BCM400/200) •...
  • Page 57: System Documentation Map

    System documentation map System documentation map The following pages provide a map of the Business Communications Manager documentation CD. The map shows the overall task process of the system, and indicates which documentation deals with each section. All the documents described are included on the documentation CD that came with your system.
  • Page 58: Installation Documentation

    Programming Records Analog Telephone Analog Telephone Configuration Guide User Guide Digital telephony Installing lines Bix Block Wiring Guide Installation manuals Nortel Networks come with telephones digital telephones Digital Mobility Install/ Digital Mobility Configuration Guide Phone Cordless/radio digital handsets * Digital Cordless 7406...
  • Page 59: Operations Documentation

    System documentation map Operations documentation System Management and Maintenance Documentation CD Voice Mail and Call Management Applications Hardware Operations Installation Telephony Configuration Quick Start Wizard Using the telephones and equipment Setting up Lines, Programming Operations Guide Routes and 7000 User Card Access Codes 7100 User Card 7208 User Card...
  • Page 60: Call Management Documentation

    System documentation map Call Management documentation System Management and Maintenance Documentation CD Voice Mail and Call Management Applications Hunt Groups Programming Operations Guide Hospitality Features Card Hospitality Services Call Detail Recording System Administration Guide Reference Guide Call Pilot Manager Set CallPilot Keycoded Applications Up and Operation Guide...
  • Page 61: Unified Manager And Hardware Maintenance Documentation

    System documentation map Unified Manager and hardware maintenance documentation Hardware Installation Documentation CD Operations Voice Mail and Call Management System Management and Maintenance Programming Records (CD only) System configuration records Security and User Administration Programming Operations Guide Backup and Restore Management User Guide Maintenance and Troubleshooting Multi-site Administration: Network Configuration Manager...
  • Page 62: How To Get Help

    How to get help How to get help If you do not see an appropriate number in this list, go to www.Nortelnetworks.com/support. USA and Canada Authorized Distributors - ITAS Technical Support Telephone: 1-800-4NORTEL (1-800-466-7835) If you already have a PIN Code, you can enter Express Routing Code (ERC) 196#. If you do not yet have a PIN Code, or for general questions and first line support, you can enter ERC 338#.
  • Page 63 How to get help India 011-5154-2210 Indonesia 0018-036-1004 Japan 0120-332-533 Malaysia 1800-805-380 New Zealand 0800-449-716 Philippines 1800-1611-0063 Singapore 800-616-2004 South Korea 0079-8611-2001 Taiwan 0800-810-500 Thailand 001-800-611-3007 Service Business Centre & Pre-Sales Help Desk +61-2-8870-5511 Programming Operations Guide...
  • Page 64 How to get help N0008589 3.3...
  • Page 65: Getting Started With Unified Manager

    Chapter 1 Getting started with Unified Manager This section provides you with information about the Unified Manager, the tool you access on the Business Communications Manager from your desktop and use to configure system information. This section describes the Unified Manager interface functions. You access Unified Manager on the Business Communications Manager through the internet, using a web browser.
  • Page 66: Computer Requirements

    Computer requirements Computer requirements To run the Unified Manager, you require: • a 133 MHz Pentium CPU or higher (or compatible) • 64 MB RAM • a minimum of 10 MB of available disk space • a minimum screen resolution of 1024 x 768 •...
  • Page 67: Using A Http Proxy Server

    Logging on to Unified Manager Using a HTTP Proxy server Unified Manager does not work properly if you use a HTTP Proxy server to connect to the Internet. If you use an HTTP Proxy server, you must change your web browser settings so you can bypass the Proxy Server when connecting to Business Communications Manager.
  • Page 68: Understanding Bcm Ssl Certificate Properties

    Understanding BCM SSL certificate properties Figure 1 Security Alert dialog (JVM) Click Yes. The first page of the Unified Manager appears. Refer to “Using the Unified Manager main page buttons” on page Understanding BCM SSL certificate properties When you first run the BCM version 3.7 software, you will note that the default Web access to the Business Communications Manager now utilizes SSL encryption for system security (BCM 3.5 and newer software).
  • Page 69: Uploading A Certificate And A Private Security Key

    Understanding BCM SSL certificate properties Uploading a certificate and a private security key Obtain a site certificate for your Business Communications Manager from a CA (Certificate Authority) vendor. Certificate files must use the .PEM format. You will be provided with a certificate and a private security key.
  • Page 70: Figure 3 Maintenance Tools Dialog Web Page

    Understanding BCM SSL certificate properties Figure 3 Maintenance Tools dialog web page Under Maintenance Tools, Security, click the Upload Certificate and Private Key link. A web page displaying Certificate and Private Key fields appears. Figure 4 Main Product Maintenance and Support web page Use the Browse button beside each field to locate the certificate and private key files.
  • Page 71: Troubleshooting: Restoring The Default Certificate

    Manager and you need to restore the default certificate. Contact your technical support team for assistance. Refer to “How to get help” on page 62 for Nortel Networks support contact numbers. Suppressing the security alert message If you do not want to add a site-specific security certificate, but you want to suppress the security alert message, you can use the Internet Explorer Security options to disable the warning.
  • Page 72: Using The Unified Manager Main Page Buttons

    Using the Unified Manager main page buttons Using the Unified Manager main page buttons On the Business Communications Manager Unified Manager initial page, as shown below, a number of buttons provide access to various parts of the Unified Manager. The purpose of each button is discussed in this section.
  • Page 73: Accessing The Unified Manager Programming Interface

    Using the Unified Manager main page buttons Accessing the Unified Manager programming interface The Configure button accesses the Unified Manager programming interface for all services except those controlled by the CallPilot and IVR services. When you first install your system, you must run the Quick Start Wizard to set up your system parameters.
  • Page 74: Using The Preinstalled Client Home Page Hyperlink

    Using the Unified Manager main page buttons Using the Preinstalled Client Home Page hyperlink You can improve the time it takes to log on to Unified Manager by using the Preinstalled Client Access Home Page. To use this method, you must install the Java class files on your computer before you log into the Unified Manager.
  • Page 75 Using the Unified Manager main page buttons Logging on using the Preinstalled Client Access Home Page After you install the Java class files on you computer, you can use the Preinstalled Client Home Page hyperlink instead of the Configure button. Go to the Business Communications Manager first page.
  • Page 76: Locating Wizards

    Using the Unified Manager main page buttons Locating Wizards The Wizards are self-contained task applications that you can use to speed up some configuration tasks. The access icons for the Wizards are located on the Setup and Management Wizards page, which is accessed through the Wizards button on the start page of the Unified Manager.
  • Page 77: Navigating The Wizards

    Using the Unified Manager main page buttons • DN Renumber Wizard: renumbers a range of DNs. Refer to “Using a wizard to renumber telephone DNs” on page 378. • Network Update Wizard: allows you to update your system data network settings any time after the Quick Start Wizard was run, which sets the initial network setup.
  • Page 78: Locating Optional Features From The Main Page

    Using the Unified Manager main page buttons Locating optional features from the main page After you set up the system and it is operating, you can add the keycodes for any optional features you want to include. You access the optional applications, including those which require keycodes, through the Install Clients button.
  • Page 79: Finding Documentation From The Main Page

    Using the Unified Manager main page buttons Finding documentation from the main page Use the Documentation button to find the information you require to help you understand and configure your system to your specifications. The entire Business Communications Manager documentation suite, plus a number of training panels, are included on your Business Communications Manager computer, as well as on the CD that accompanied your system.
  • Page 80: Using The Unified Manager

    Using the Unified Manager Using the Unified Manager Unified Manager provides a web-based navigation tool that allows you to view and change configurations for the Business Communications Manager system. Most changes made with Unified Manager become part of current Business Communications Manager programming when you select an item from the menu options.
  • Page 81: Figure 7 Main Display Of The Unified Manager

    Using the Unified Manager Figure 7 Main display of the Unified Manager Buttons Headings Navigation Menu bar Navigation frame Navigation tree Tabbed pages Information frame The menu bar contains configuration management options. When you select the different headings in the navigation tree, these options are enabled. If an option appears dimmed, it is not available for the heading you have selected.
  • Page 82: Understanding The Dynamic Menu

    Using the Unified Manager Understanding the dynamic menu You access some of the Business Communications Manager functions using the top menu bar. This menu bar is dynamic. Commands become active or inactive depending on the heading you select from the navigation tree in the left frame. The following table defines the menu bar top-level items.
  • Page 83: Understanding The Navigation Tree Headings

    Using the Unified Manager Understanding the navigation tree headings The Unified Manager navigation tree contains five main headings that allow you to access specific areas of the Business Communications Manager system. These headings are described in the following table. (<IP address>) Table 3 Navigation tree menu functions Heading Programming...
  • Page 84 Using the Unified Manager Table 3 Navigation tree menu functions (Continued) Heading Programming Provides access for configuring telephony and data networking services and Services various other related services. Telephony information is discussed from Chapter 7, “Telephony Services overview,” on page 195 Chapter 31, “Configuring the Dial Up resources,”...
  • Page 85: Understanding Tabbed Pages

    Using Unified Manager Help Understanding tabbed pages Some headings display records that have more than one level. Each level is accessed by clicking the appropriate tab at the top of the screen. Figure 8 Tabbed page example Screen tabs Using Unified Manager Help As noted in “Understanding the dynamic menu”...
  • Page 86: Viewing Help For Tabs

    Logging off Viewing help for tabs Click on the tab to make it the active screen. Alternate-click anywhere in the right pane to get the csHelp button. Note: Some tabs may have other headings as well. Then click normally on the csHelp button to open the help web page. Figure 10 Accessing navigation tree heading help Click the tab, then alternate-click to get...
  • Page 87: Using The Ssh Client To Access The Text-Based Interface

    Using the SSH client to access the text-based interface Using the SSH client to access the text-based interface Some operations for the Business Communications Manager, such as initializing a new hard disk, use a text-based interface. In previous versions, the Telnet application was used to access the Business Communications Manager text menus.
  • Page 88: Using Putty

    Using the SSH client to access the text-based interface Using PuTTY Click the shortcut PuTTY icon. The PuTTY Configuration screen appears. Figure 11 PuTTY Configuration screen Click on the radio box beside SSH. In the Host Name (or IP address) box enter the IP address or the Fully Qualified Domain Name for the Business Communications Manager you want to connect with.
  • Page 89: Manually Activating Telnet

    Manually activating Telnet Figure 12 Business Communications Manager Main Menu 11 Refer to the specific tasks that require this menu for details about using this it. Manually activating Telnet If you choose to continue operating the text-based menus with Telnet, rather than using the PuTTY client, you can manually activate the service from the Unified Manager.
  • Page 90 Manually activating Telnet N0008589 3.3...
  • Page 91: Introduction

    Chapter 2 Introduction The Business Communications Manager includes software and hardware components that provide telephony, voice messaging, interactive voice response (IVR), data networking, and IP telephony. The web-based navigation tool, Unified Manager, provides easy access to all operations and maintenance programming on the Business Communications Manager system at a single site. For more information about Unified Manager, see “Using the Unified Manager”...
  • Page 92: System Configuration Process Maps

    System configuration process maps System configuration process maps The following process maps show you the order in which your system is configured. Each section provides quick reference information about the step, plus a link to the process section. • Initial system configuration •...
  • Page 93: Initial System Configuration

    System configuration process maps Initial system configuration Figure 13 Process for initial system configuration System Refer to the Installation and Maintenance Guides for hardware setup. hardware is installed Refer to the Installation and Maintenance Guides for media bay module settings and connections. To identify the media bay modules to the system Set and and set up their line values, refer to “Configuring resources —...
  • Page 94: Configuring Telephony Components

    System configuration process maps Configuring telephony components Figure 14 Process for configuring the telephony components System Refer to the preceding flow chart. setup is complete When the trunk media bay modules are configured, the system assigns line or loop numbers. You may need to change some of the line attributes. You Set up can also refer to the lines and loops to set up line pools and call routing.
  • Page 95: Optional Keycoded Features

    When you purchase an optional feature, you receive an Authorization Authorization Code for the feature. code Access the Nortel Networks Keycode web site and use the Authorization Get the Code to get a software keycode for the feature. For information about software...
  • Page 96: Data And Ip Telephony Configuration

    System configuration process maps Data and IP telephony configuration Figure 16 Process for configuring the data and IP telephony components System Basic system configuration is complete. Refer to previous flowcharts. setup is complete You configure the data network options, so that Business Communications Manager operates properly on your network.
  • Page 97: Post-System Setup Features

    System configuration process maps Post-system setup features Figure 17 Post-setup processes System is The basic system has been installed and configured. set up Set up Determine how your Business Communications Manager system will alarm report alarms. Refer to the Management User Guide manager Set up Set backup schedules and determine call detail reporting (CDR).
  • Page 98: Finding Your Way Around

    Finding your way around Finding your way around The following sections provides you with quick links to the detailed configuration information: • “Security and User Management” on page 98 • “Telephony programming quick access list” on page 98 • “Data programming sections” on page 99 Security and User Management •...
  • Page 99: Telephony Configuration

    Finding your way around Telephony configuration • Using Wizards to configure telephones: “Configuring DNs using the Wizards” on page • Using DN records to configure telephones: “Configuring DNs for system devices” on page 399 • Setting telephony system features: “Configuring system settings” on page 459 •...
  • Page 100: Business Communications Manager Hardware

    For a detailed description about maintaining these units, refer to the Business Communications Manager BCM1000 Installation and Maintenance Guide. Note: Some of the components described in this section are not available in all areas. Ask your Nortel Networks Business Communications Manager supplier for information about the availability of components. N0008589 3.3...
  • Page 101: Bcm200/Bcm400 Base Units

    Business Communications Manager hardware BCM200/BCM400 base units In conjunction with the BCM version 3.0 system release, Nortel released two new base unit models to provide added flexibility for system planning. These systems come preloaded with the latest version of software. You cannot run versions previous to BCM 3.0 software on these units.
  • Page 102: What Do Media Bay Modules Do

    Additional Business Communications Manager applications What do media bay modules do? Media bay modules are key components of the system. They provide the link between the external lines (trunks), the Business Communications Manager applications, and the internal extensions (DNs), which connect to individual telephones. The type of modules on your system depends on your set requirements and the type of lines available from your service provider.
  • Page 103: Configuring System Parameters

    Chapter 3 Configuring system parameters This section describes how to configure the basic programming information onto your new Business Communications Manager system using the Quick Start Wizard. This wizard allows you to choose the network and default telephony information that you want to use as the basic parameters for your system.
  • Page 104: Wizard Warnings

    Accessing the Wizards Open up the Unified Manager. Refer to “Logging on to Unified Manager” on page 67 if you need instructions. Click the Wizards button. A login dialog box appears. In the Login field, type your login name. The default login name is ee_admin Note: You must have administrator-level privileges to use the wizards.
  • Page 105: What You Need To Know Before You Use The Wizard

    Accessing the Wizards Warning: Wizard timeouts When the message appears, it indicates that the wizard Wizard Instance Timeout was inactive for 30 minutes, the wizard has already been applied, or the Business Communications Manager or the server-side wizard component was restarted. Warning: Operations during Wizard application Do not use Windows NT login sessions while you are using the wizards or while there are wizards being applied.
  • Page 106 Accessing the Wizards Link Protocol WAN 1: WAN 2: • Default Next Hop Router (Next Hop on Primary Link) What is the IP address of the next router or link on the network? • (IP Domain) What is the domain name of the DNS server? What are the IP addresses (primary and secondary) for the server? <xxx.xxx.xxx.xxx>...
  • Page 107 You can also refer to Chapter 26, “Configuring the MSC resources,” on page 613. • Do you want to be able to immediately start registering Nortel IP (Registration) terminals on the system? • Do you want to change the default IP telephone access password?
  • Page 108: Using The Quick Start Wizard

    Accessing the Wizards • Do you want to initialize Auto-attendant? (Auto-attendant Initialize?) • If you choose to initialize Auto-attendant, enter the line and ring information. from line: First line in the range you want to assign to the Auto-attendant. to line: Last line in the range you want to assign to the Auto-attendant.
  • Page 109: Figure 20 Quick Start Wizard Application Warnings

    Accessing the Wizards The General page for the Quick Start wizard appears. Enter your system information on the General page, Network page, Telephony page and CallPilot page. Refer to the information you entered in the table under “What you need to know before you use the wizard”...
  • Page 110: Changing System Identification Parameters

    Changing system identification parameters Changing system identification parameters There are some identification parameters you may choose to change after the Quick Start Wizard has set up your system. Warning: Running the Quick Start Wizard a second time will delete any changes you entered to the default telephony settings, including any telephony data.
  • Page 111: Viewing The System Software Version

    Changing system identification parameters Viewing the system software version The system software version determines which features are available to your system, and, sometimes, how they work. Each version has a number of new features that only work with that version and newer versions. If you are having a problem running a feature, this may be one area where your service technician will ask you to look.
  • Page 112: Changing The System Domain

    Changing system identification parameters Changing the system domain The system domain is the domain in which the Business Communications Manager system resides. If you do not know the domain for the Business Communications Manager system, contact your network administrator. To change the system domain, add the Business Communications Manager system to a new domain.
  • Page 113: Assigning A Windows 2000 Domain

    Changing system identification parameters Assigning a Windows 2000 domain Click the key beside System. Click the Identification heading. The Identification screen appears. Click the Change Domain Membership tab. The Change Domain Membership screen appears. Click the Add To box and click Win2000Domain. Click the Domain User ID box and enter the User ID that the system uses to access this domain.
  • Page 114: Delayed System Restart

    Delayed system restart Delayed system restart There may be times when you perform a procedure that requires a system restart, but you want to delay the restart for a low-activity time. For instance, some keycodes require a cold start to become effective. You can add the keycode at any time, then use this procedure to delay the system restart until early morning, when there is no traffic on your system.
  • Page 115: Figure 22 Job Scheduling Window

    Delayed system restart Figure 22 Job scheduling window Under the first bullet, choose how often you want to schedule a restart. Example: If you are activating a keycode, click the Today Only radio button. Under the next bullet, enter the time you want the restart to occur. Example: for a 3 a.m.
  • Page 116 Delayed system restart N0008589 3.3...
  • Page 117: Managing System And User Security Access Levels

    Chapter 4 Managing system and user security access levels This section provides information about how you can set up and maintain the access security to your system by users and client applications. Security note: This symbol will be used throughout this section to indicate areas of possible security concern, primarily in regard to default settings that could pose a security risk if they are not changed.
  • Page 118: Setting The Interface Timeout

    Setting the interface timeout The figure below displays the Unified Manager headings under which security and user information is configured. The SSH client access application is installed on your desktop. The Install Clients button on the first Unified Manager page provides a download path. Figure 23 Security and user access headings System System...
  • Page 119: Setting System Security Compatibility Levels

    Setting system security compatibility levels Setting system security compatibility levels Use the Security screen to set authentication, signing, encryption, and other security-related settings. Some of these settings depend on the Windows operating system used by client workstations. Security note: The default se tings define a mid-level of security which accommodates Windows 95/98/Me operating systems.
  • Page 120 Setting system security compatibility levels Table 4 Security settings (Continued) Attribute Value Description Clear Page Disabled Default: Disabled File on Enabled If Enabled, this setting prompts the system to clear the virtual memory Shutdown swap file on shutdown. When enabled, this option extends system shutdown by about two minutes.
  • Page 121: Managing Access Passwords

    Managing access passwords Managing access passwords You can grant or restrict specific access within the Unified Manager by assigning new users into user groups using the User Management screens. Core system configuration, such as resources and network management should be restricted to an administrator-level account.
  • Page 122: Viewing The User Manager Tabs

    The ee_admin account cannot be deleted, but the group membership can be modified for both accounts. Remote support: In order for the Nortel Networks support organization to assist you, dial-in access has been granted to both default administrator accounts. If dial-in access is removed, then remote access by support organizations may be impacted.
  • Page 123: Adding Or Modifying A User Profile

    Managing access passwords • The Domain User Group Profile tab lists the domains for all the user group profiles. • The Lockout Policy tab provides settings to determine the parameters for locking users out of the Unified Manager if the lockout policy is enabled. •...
  • Page 124: Figure 26 User Profile Screen To Add Or Modify A User Profile

    Managing access passwords Figure 26 User Profile screen to add or modify a user profile Use the following table to determine what information you need to add or change: Table 5 User Profile settings Attribute Value Description User Name <maximum of 20 Allows you to enter the user name.
  • Page 125 Managing access passwords Table 5 User Profile settings (Continued) Attribute Value Description Password <maximum of 14 Allows you to assign a password for the user. The password is case-sensitive characters long> and can be a maximum of 14 characters long. Note: •...
  • Page 126: Deleting A User Profile

    Managing access passwords Table 5 User Profile settings (Continued) Attribute Value Description Status Unlocked This field indicates the current state of the user’s password. If the password becomes locked and the user does not want to wait the lock-out time, the Unlock Administrator can choose Unlock on the user’s password record to release the password.
  • Page 127: Setting Up Callback For A User

    Managing access passwords Setting up callback for a user If the user will be accessing the system through a dial-up connection, you need to add that group to the user account. As well, in this case, callback will be enabled to ensure that the system security is maintained.
  • Page 128: Adding Or Modifying A Group Profile

    Managing access passwords Adding or modifying a group profile The access privileges inherent in the various predefined group profiles control user access within the Unified Manager interface. The administration group maps to administrator privileges on the Business Communications Manager host system. The other group profiles map to non-administration groups.
  • Page 129: Figure 30 User Group List Add/Modify Screen

    Managing access passwords The User Group List dialog box appears. Figure 30 User Group List add/modify screen Use the following table to determine the user profile information that needs to be added or changed: Table 6 User Group Profile settings Attribute Description UserGroupName...
  • Page 130: Deleting A Group Profile

    Managing access passwords Deleting a Group profile If you want to delete a group profile, follow these steps: Select Management, User Manager. The User Profile screen appears showing the current user profile information. Click the User Group List tab, to view the existing groups. From the Configuration menu, select Delete User Group.
  • Page 131: Adding A Domain User Group Profile

    Managing access passwords Adding a Domain User Group profile The Domain User Group Profile screen displays a table of members of the Windows NT CDR User group. This screen is used to add external domain users into a CDR User group. Members of CDR user group have the sole ability to download CDR files from this Business Communications Manager system.
  • Page 132: Deleting A Domain User Group Profile

    Managing access passwords Click the SAVE button to save your settings. The new user group information is added to the list on the Domain User Group Profile screen. Deleting a Domain User Group profile If you want to delete a Domain user Group, follow these steps: Select Management, User Manager.
  • Page 133: Table 8 Lockout Policy Settings

    Managing access passwords Use the information provided in the following table to determine the lockout policy for your system. The settings are effective as soon as they are entered. Table 8 Lockout policy settings Attribute Value Description Lockout Policy Enabled The Enabled setting allows you to set the following three parameters.
  • Page 134: Setting Password Policy

    Managing access passwords Setting password policy You can define the system parameters for the passwords that you assign to users by determining the length, age and history that the passwords must meet. Select Management, User Manager. The User Profile screen appears showing the current user profile information. Click the Password Policy tab.
  • Page 135: Configuring Resources - Media Bay Modules

    Chapter 5 Configuring resources — media bay modules This chapter describes the Unified Manager headings that define and control the settings for the media bay modules installed on your system. Task: Check settings for the media bay modules installed in the system. Trunk modules: •...
  • Page 136: Explaining The Media Bay Modules Headings

    Explaining the Media Bay Modules headings system supports double density on all six buses. Refer to Chapter 26, “Configuring the MSC resources,” on page 613. Explaining the Media Bay Modules headings The Resources, Media Bay Modules heading allows you to view and change settings for each media bay module installed in Business Communications Manager.
  • Page 137: Media Bay Module Bus Numbers

    Explaining the Media Bay Modules headings Tips: Some modules are region-based. If your system does not have the correct region installed during setup, the modules will not work. Refer to “Media bay module availability by region” on page 837. Note: Dimmed fields are read-only and cannot be changed. Note: If you receive the error message Telephony programming is currently not when you click on one of the headings, this means...
  • Page 138: Figure 36 Confirming The Programmed Bus Type

    Explaining the Media Bay Modules headings Figure 36 Confirming the Programmed Bus Type These fields must agree. Programming tips: If the Actual Bus Type reads None, choose the correct setting in the Programmed Bus Type field. After the system initializes to the module, the Actual Bus Type should change to the correct module type.
  • Page 139 Explaining the Media Bay Modules headings Table 10 Bus XX record settings (Continued) Heading Value Description Trunk module, Analog Station Module or Data Module Number of busy ports <digit> This setting indicates how many ports on the module are currently being used. State Enabled This setting indicates the current state of the module.
  • Page 140: Module Types And Capacities

    Explaining the Media Bay Modules headings Module types and capacities Refer to the following table for a description of the Bus types settings. Table 11 Programmed Bus Types Available line types (some Programmed line types are Bus Type Hardware unit Capacity region-dependent) Station module...
  • Page 141: Gatm (Global Analog Trunk Module)

    Explaining the Media Bay Modules headings Table 11 Programmed Bus Types (Continued) Available line types (some Programmed line types are Bus Type Hardware unit Capacity region-dependent) Trunk module • 4X16 Media Bay Module • 4X16=1 per offset (4 lines) • 4X16s can be set to module (4X16) (counts as one and additional bus (station)
  • Page 142: Ports On Bus

    Defining trunk module types and settings Ports on Bus Both types of modules have a Ports on bus heading. This heading shows the state of the port that connects the module to the trunk line or system device. • Trunk modules, each port maps to an incoming line. Trunk port status is either idle or active. Refer to “Trunk module ports programming”...
  • Page 143: Configuring The Trunk Module To Line Type

    Defining trunk module types and settings Configuring the trunk module to line type Follow these steps to define the modules to the system: Click on the keys beside Resources, Media Bay Modules, Bus <number>, and Modules on Bus. Click on the Module <number> you want to program. The Bus <number>-Module: <number>...
  • Page 144: Table 12 Module Record Values

    Defining trunk module types and settings Check the settings to ensure they reflect the line requirements. Note that only some of the fields appear for all module types. Refer to the following table for a description of each field. Table 12 Module record values Attribute Value Module/line type...
  • Page 145 Defining trunk module types and settings Table 12 Module record values (Continued) Attribute Value Module/line type Protocol NI-2, DMS100, DMS250, AT&T4ESS, SL-1, Euro, ETSI Q-Sig Choose the trunk protocol used by your service provider. The supported protocols are: PRI-T1: NI-2, DMS100, DMS250, AT&T4ESS, SL-1 PRI-E1: ETSI QSIG, Euro, SL-1 Note: SL-1 and ETSI QSIG require an MCDN keycode to display.
  • Page 146 Defining trunk module types and settings Table 12 Module record values (Continued) Attribute Value Module/line type Clock Source Primary, *BRI *BRI *BRI Secondary, Timing DASS2 Master Designates whether the DTM/BRI acts as a primary or secondary timing slave or as a Timing Master.
  • Page 147: Determining Clock Sources For Dtms Or Bris

    Defining trunk module types and settings Determining Clock Sources for DTMs or BRIs Clock Source allows you to designate the DTM or BRI on the system that obtains the timing reference for synchronization from the network. Systems with digital interfaces need to synchronize to the network in order to function. Synchronization follows a hierarchical path.
  • Page 148: Timing Within Networks

    Defining trunk module types and settings Timing within networks In most T1/E1 network configurations, you need one DTM or BRI configured as Primary to act as a primary reference and obtain clocking from the network. The only application where you might not have a DTM/BRI designated as a primary reference is in a private DTM/BRI network where your Business Communications Manager system is connected to other equipment using T1/E1/BRI interface(s) that require a clock source and your system had been designated as the source of clocking for that private network.
  • Page 149: Interface Levels

    Defining trunk module types and settings Table 13 TI parameters (Continued) Attribute Value Description DSX1 build 000-100, 100-200, Set the distance between Business Communications Manager 200-300, 300-400, and an external channel service unit. This setting only appears 400-500, 500-600, when the Internal CSU is set to Off. Contact your service provider or 600-700 feet for the proper settings.
  • Page 150: E1 Parameters (Region-Specific)

    Defining trunk module types and settings E1 parameters (region-specific) The E1 Parameters command appears for modules that have been configured as PRI in an E1 region. There is only one setting in the E1 Parameters menu - the CRC4 setting. CRC4 checking is enabled at the other end.
  • Page 151: Table 15 Module Record Values

    Defining trunk module types and settings Select the service you want to change. A configuration screen appears in the right frame. The Translation mode default is None. The following table shows the possible settings for the services. Table 15 Module record values Attribute Value Description...
  • Page 152: Provisioning Lines (Pri, T1, Dass2)

    Defining trunk module types and settings Provisioning lines (PRI, T1, DASS2) The Provision lines heading allows you to provision and deprovision lines associated with a T1 PRI, E1 (DASS2), or BRI ST/U interface. Provisioning a line or loop makes it available for system use. A deprovisioned line/loop is not available for use.
  • Page 153: Provisioning Bri Loops/Lines

    Defining trunk module types and settings Provisioning BRI loops/lines In order to provision lines on a BRI module you must first provision the loop on which the lines exist. Click the keys beside Resources and Media Bay Modules. Click the key beside the bus number (Bus 02 to 07) associated with the trunk module you want to provision.
  • Page 154: Pri B-Channel Provisioning

    Defining trunk module types and settings You should only have as many lines provisioned on a T1/PRI as you have B-channels being delivered on the T1/PRI from your service provider. Having more lines provisioned and assigned to users may occasionally result in the attempt to perform calls over a line failing because of a lack of B-channel resources being available.
  • Page 155: Pri Version Information

    Viewing station module information PRI version information DTM modules that are set to PRI and BRI modules display additional PRI information under Ports on bus, Port <number>, Channels, B1/B2, Addons. By clicking on the Addon 01 heading, you can view information about the version of the downloadable firmware component being used in this module.
  • Page 156: Determining Station Port State

    Viewing station module information should change to the correct module type. You may also have to disable, then re-enable the module to force the system to re-initialize (under the Configuration menu). Refer to “Viewing Media Bay Module status” on page 159 for details about enabling and disabling modules.
  • Page 157: Station Module Line Deployment

    Viewing station module information You can enable or disable any port. Refer to “Disabling/enabling a port channel setting” on page 160. Station module line deployment The MSC presents 32 physical ports for each bus number assigned to a station or analog station module.
  • Page 158: Internally-Driven Channels

    Internally-driven channels Internally-driven channels You cannot change headings for buses that are used for internal processing. This section describes how these buses fit into the system. Bus 01 and Bus 08 provide access to telephony operations for internal processing, applications, and IP sets on the Business Communications Manager system.
  • Page 159: Viewing Media Bay Module Status

    Working with the modules Viewing Media Bay Module status Media Bay Modules selection allows you to view the status of all the modules as well as identify any device or lines connected to the system. This allows you to isolate any malfunctioning part of the system.
  • Page 160: Disabling/Enabling A Port Channel Setting

    Working with the modules Click the OK button. Programming reminder: If your system has a 3/5 DS30 split, bus 07 will not have a module assigned to it. Disabling/enabling a port channel setting If you need to isolate a problem or block access from the module, you may need to turn off individual port channels, rather than the entire module.
  • Page 161: Data And Split-Line Configuration

    Chapter 6 Data and split-line configuration This section discusses configuration for modules and applications that require data or combination data/telephony line configuration. • DDI MUX modules require two DS30 bus positions. This module supports combinations of data channels and T1 lines. A DTM (digital trunk module) contained within the module is programmed using normal DTM line configuration.
  • Page 162: Figure 44 Network Overview: Ddi Mux Connected To 2.5 Hardware Internal Router

    Configuring the DDI Mux module • provides end-to-end transparent bit service • supports loopbacks between the DDI Mux and the internal Business Communications Manager components, and between the DDI Mux and digital terminal equipment Note: The DTE cable that connects the Business Communications Manager to the router is ordered separately from the module.
  • Page 163: Figure 45 Network Overview: Ddi Mux Connected To Bcm400 Internal Router

    Configuring the DDI Mux module Figure 45 Network overview: DDI MUX connected to BCM400 internal router Switch/Hub T1 mux service Service Provider/ PSTN DTE cable Figure 46 Overview of network using DDI Mux module with an external router Switch/Hub Router T1 mux service Service Provider/ DTE cable...
  • Page 164: Configuring Ddi Mux Connections

    Configuring the DDI Mux module Configuring DDI Mux connections After you have installed the DDI Mux, configure the module settings in the Unified Manager. To configure the DDI Mux, you need to: • assign the DDI Mux modules under Resources, Media Bay Modules •...
  • Page 165: Assigning Lines For Voice Traffic

    Configuring the DDI Mux module Assigning lines for voice traffic A digital T1 line has up to 24 telephone lines available for use. On the DDI Mux, you can assign some of these lines to telephony traffic and some to data traffic. For the lines that you want to use for telephony traffic, configure the lines in the same manner as you configure lines for a DTM.
  • Page 166: Assigning The Line

    Configuring the DDI Mux module Click the Trunk/line data heading. Click the Trunk type drop list and then click Fixed data channel. Repeat steps 5 to 7 for each line you want to assign to the Data Module. Assigning the line Click the Resources key and then the Media Bay Modules key.
  • Page 167: Configuring The Line For Telephony

    Configuring the DDI Mux module Click the Line assignment heading. Click on the line number you want to remove. Click the Delete button. On the confirmation dialog box, click the Yes button. Configuring the line for telephony Click the keys beside Services and Telephony Services. Click the keys beside Lines, Physical lines and All physical lines.
  • Page 168 Configuring the DDI Mux module Table 18 DDI Mux Configuration settings (Continued) Setting Value Description Transmit clock When the internal DCE signal is used to clock in data, signal delays caused by inversion cable length can cause clocking errors. To adjust for round trip delays between the DDI Mux and DTE, invert the internal clock used by the module to clock in data from the DTE.
  • Page 169: Universal T1 Wan (Utwan)

    UTWAN headings and menu items are not visible on Unified Manager by default. To make the UTWAN headings and menu items visible on Unified Manager, you need to use a utility available from Nortel Networks. To obtain this utility, call the Nortel Networks Technical Support line.
  • Page 170: Utwan Connection

    Universal T1 WAN (UTWAN) UTWAN connection The UTWAN connection supports frame relay or Point-to-Point protocol (PPP) at the link layer. The link protocol you use depends on the existing network or on the service you buy from your Internet service provider. Frame Relay In Frame Relay mode, the UTWAN interface allows up to 50 PVCs (permanent virtual circuits) to be configured.
  • Page 171: Data Compression

    Universal T1 WAN (UTWAN) Data compression Business Communications Manager provides a WAN Data Compression feature. On the UTWAN connection, Business Communications Manager supports the following data compression protocols: • Frame Relay Forum standard FRF.9 data compression protocol with STAC compression algorithm •...
  • Page 172: Assigning Lines For Data Traffic

    Universal T1 WAN (UTWAN) Assigning lines for data traffic The number of lines you assign for data traffic determines the bandwidth of your data networking connection. The following table shows the available bandwidth for data traffic on the UTWAN according to the number of lines assigned. Table 19 Bandwidth available per channel Number of lines Bandwidth (bps)
  • Page 173: Changing The Line Type

    Universal T1 WAN (UTWAN) Changing the line type In the Unified Manager, click the Services key and click the Telephony Services key. Click the Lines key and click the Physical lines key. Click the All physical lines key. Click the key of one of the line numbers you want to assign for data traffic. Click the Trunk/line data heading.
  • Page 174: Removing A Line Assigned For Data Traffic

    Universal T1 WAN (UTWAN) Removing a line assigned for data traffic If you decide you want to stop using a line for data traffic and use it as a telephony line, use the procedures below: Removing the line from the Data Module Click the Resources key and click the Media Bay Modules key.
  • Page 175: Configuring The Utwan Network Interface Parameters

    Universal T1 WAN (UTWAN) Configuring the UTWAN Network Interface parameters The first step to configuring the UTWAN Network Interface parameters is: • “Configuring the UTWAN Summary parameters” on page 175 One of the UTWAN Summary parameters is the link protocol used on the T1 line. When you select the appropriate link protocol, the screen changes to show the parameters required for that link protocol.
  • Page 176 Universal T1 WAN (UTWAN) Table 21 UTWAN Summary parameters (Continued) Attribute Description Status Shows the current resource status of the UTWAN interface. The possible states are: Up: The UTWAN is operational. Down: The UTWAN is not operational. Link Protocol Lets you select a link protocol. The link protocol you choose depends on the existing network or the service you buy from your Internet service provider.
  • Page 177: Configuring The Utwan To Use A Frame Relay Link

    Universal T1 WAN (UTWAN) Configuring the UTWAN to use a Frame Relay link Configuring the UTWAN to use a Frame Relay link consists of the following: • “Configuring the UTWAN Summary parameters” on page 175 • “Configuring the Frame Relay parameters” on page 177 •...
  • Page 178 PVC. The possible values are between 1 and 7. The default value is 6. Note: Nortel Networks highly recommends that you do not change the Low Water Mark from the default value. High Water Mark This is one of the parameters that controls the link layer queuing behavior if the link layer fragmentation is enabled for this PVC.
  • Page 179: Configuring The Pvc Configuration Parameters

    Universal T1 WAN (UTWAN) Configuring the PVC Configuration parameters You must configure the PVC Configuration parameters for each PVC. Adding a PVC Configuration record Follow these steps to add a PVC Configuration record: On the navigation tree, click the Resources key and click the UTWAN key. Click the UTWAN1 heading.
  • Page 180 Universal T1 WAN (UTWAN) Table 23 WAN PVC Configuration parameters (Continued) Column Description DC Retry Time Enter the Data Compression Retry Time is seconds. The possible values are 1 to 15 seconds. The default value is 3 seconds. DC Retry Count Enter the Data Compression Retry Count.
  • Page 181: Configuring The Utwan To Use A Ppp Link

    Universal T1 WAN (UTWAN) Deleting a PVC Configuration record Follow these steps to delete a PVC Configuration record. On the navigation tree, click the Resources key and click the UTWAN Key. Click the UTWAN1 heading. The Summary screen appears. Click the PVC Configuration tab. The PVC Configuration screen appears.
  • Page 182 Possible values are 1 to 7. The default value is 6. Note: Nortel Networks highly recommends that you do not change the Low Water Mark from the default value. High Water Mark This is one of the parameters that Controls the link layer queuing behavior for PPP when link layer fragmentation is enabled.
  • Page 183: Configuring The Lcp Options

    Universal T1 WAN (UTWAN) Configuring the LCP Options On the navigation tree, click the Resources key and click the UTWAN key. Click the UTWAN1 heading. The Summary screen appears. Click the LCP Options tab. The LCP Options screen appears. Configure the LCP Options according to the information in the following table. Table 25 LCP Options Attribute Description...
  • Page 184: Configuring The Ipcp Options

    Universal T1 WAN (UTWAN) Table 25 LCP Options (Continued) Attribute Description LQ Reporting Enter the maximum time in 100th of seconds between the transmission of packets. Period Possible values are 100 to 60000. The default value is 1000. Retry Timer Enter the number of seconds waited before retransmitting LCP Configure-Request packets.
  • Page 185: Configuring The Ppp User List

    Universal T1 WAN (UTWAN) Configuring the PPP User List You can restrict access to the network using the PPP User List. Business Communications Manager uses the information on this list to verify and confirm the identity of the user. Only those users whose names appear on the PPP User List can access the network.
  • Page 186 Universal T1 WAN (UTWAN) Table 27 PPP User parameters (Continued) Attribute Description PPP Remote User Enter the user name associated with the computer you want Business Communications Name Manager to identify as a valid network user. The Remote User Name can be up to 32 characters in length. You must overwrite the default user name User with the user name you want to add to the list.
  • Page 187: Configuring Additional Ip Addresses For The Utwan

    In both of these examples, broadcast traffic destined for one IP address would not be transmitted on the links associated with the other IP address. Restrictions when using multiple IP addresses • Nortel Networks does not recommend using more than two IP address classes. • Multiple IP addresses supports RIP routing. •...
  • Page 188: Modifying An Additional Ip Address

    Universal T1 WAN (UTWAN) Table 28 Additional WAN IP addresses (Continued) Attribute Description Subnet Mask Enter the subnet mask of the WAN interface in the following format: 255.255.255.255. If you do not know your subnet mask address, contact your system administrator or your Internet service provider.
  • Page 189: Viewing The Utwan Performance

    Universal T1 WAN (UTWAN) Viewing the UTWAN performance To access the UTWAN performance graphs and tables: On the navigation tree, click the Resources key and click the UTWAN key. Click the UTWAN1 heading. The Summary screen appears. On the Performance menu, click UTWAN1 Graph. The WAN Graph: Statistic Chart appears.
  • Page 190: Configuring A Data Module

    Configuring a data module Configuring a data module DS30 bus 08 is reserved for configuring circuit switched B-channels as a WAN interface for the Business Communications Manager. This allows the Integrated QoS Routing feature to create one or more dial up ISDN connections via the PSTN network using PRI or BRI trunks. Business Communications Manager automatically configures the Module type as a Data Module and sets the Data module type to Baystack.
  • Page 191: Fixed Access

    Configuring a data module Fixed access Fixed access is supported for the Norstar Data Interface (NDI) only. To assign one or more Fixed lines to the data module: Adding line assignments On the navigation tree, click the Resources key and click the Media Bay Modules key. Click the Bus 08 key and click the Data Module key.
  • Page 192: Line Assignment

    Configuring a data module Line assignment You can assign one or more lines to the BayStack data module for incoming data transmission. Note: The data module will answer data calls only. It will not answer voice calls. Adding line assignments On the navigation tree, click the Resources key and click the Media Bay Modules key.
  • Page 193: Line Pool Access

    Configuring a data module Line pool access You can give the BayStack data module access to a line pool for outgoing data transmission. Adding line pool access On the navigation tree, click the Resources key and click the Media Bay Modules key. Click the Bus 08 key and click the Data Module key.
  • Page 194 Configuring a data module N0008589 3.3...
  • Page 195: Telephony Services Overview

    Chapter 7 Telephony Services overview The following sections provide a general overview of the Unified Manager Telephony Services headings. This group of settings is located under the Services heading on the Unified Manager main navigation tree. The records under this heading allow you to define how the lines and telephones in your system operate.
  • Page 196 Voice mail If you are using the voice mail application for this unit, you can set up mail boxes for system telephones as well as for telephones from other systems on the same private network. Voice mail configuration information is contained in the CallPilot suite of documents.
  • Page 197: Process Map: Creating Telephony Services

    Process map: Creating telephony services Process map: Creating telephony services The figure below lists the tasks involved in creating telephony services on your system. Figure 47 Tasks for installing the telephony components Refer to the Installation and Maintenance Guides for hardware setup System and wiring for peripheral equipment, including the computer you are hardware...
  • Page 198: Telephony Services Headings

    The following two figures show the Telephony Services headings in the Unified Manager. Figure 48 Telephony Services menu options Lines General Settings ..Telephony Services VoIP Lines Nortel IP Terminals System DNs Enabled VoIP Lines Feature labels Active Set DNs IP trunking...
  • Page 199: Typical Dn Record Headings

    Telephony Services headings Typical DN record headings Figure 49 Headings found under typical DN heading DN XXX-XXX Capabilities User Preferences General DND on busy Model Name Handsfree Call log options Model/DN type HF answerback Dialing options Device port Pickup group Language Control set Page zone...
  • Page 200: Planning Your Telephony Services

    485 Planning your telephony services Nortel Networks strongly recommends that you use the planning tables from the Installation and Maintenance Guide or the Programming Records spreadsheets to understand what lines and set numbers (DNs) are available to you. Programming records, which are set up in Microsoft Excel*, provide a reference for your system programming.
  • Page 201: Three Basic System Telephony Configurations

    Planning your telephony services Three basic system telephony configurations This section provides a broad overview of the telephony setup for three of the most common office telephone configurations. Square system This is a typical small-office setup, where all lines are available on any telephone. There may not be a designated attendant.
  • Page 202: Pbx System

    Planning your telephony services PBX system This setup is for a larger offices which have fewer CO lines than there are telephones. In this case the lines are pooled, and the line pool is assigned to all telephones. As well, there is a designated attendant with a telephone that has all lines individually assigned.
  • Page 203: Did System

    Planning your telephony services DID system This setup allows you to assign a dedicated phone number to each telephone. The CO assigns a list of available numbers for each DID (Direct Inward Dial) line. You can change your DN range to match these numbers, or you can use target lines to match each number with a DN.
  • Page 204: Telephony Metrics

    Telephony metrics Telephony metrics The system provides call metrics for Hunt groups (“Monitoring Hunt groups” on page 589), PRI Call-by-Call services limits (“Viewing CbC limit metrics” on page 355), and IP telephony fallback (IP Telephony Configuration Guide). N0008589 3.3...
  • Page 205: Telephony Feature Planning

    Chapter 8 Telephony feature planning This section provides a quick reference to telephony programming basics, which you need to understand before you can decide what defaults you want to change, and how you want to configure your telephones and routing. •...
  • Page 206: Creating Numbering Plans

    Creating numbering plans Creating numbering plans Access to and from and within your system is based on dialing strings and how the system adds or deletes from this sequence to route the call. A dialing string is the numbers that the caller physically enters on a telephone or programs onto a memory key.
  • Page 207 Creating numbering plans Incoming calls: If your system is networked with other systems, you will also need to determine a private access code that tells your system when a call is to be dialed out over the private network instead of over the public network. This access code is also entered under Services, Telephony Services, General settings, Access codes.
  • Page 208 Creating numbering plans Internal feature access: Meanwhile, you need to keep in mind that the leading digit of any of the above dialing codes cannot conflict with the other system access codes that you want to use: Variable Example or default settings Park Prefix 1 (101-125) Direct Dial Digit...
  • Page 209: Outgoing Calls

    Creating numbering plans Outgoing calls Outgoing calls require line pool access codes or destination code (with defined routes) to leave the system. • Access codes provide direct, unscheduled access to an analog, digital (T1), of Voice over IP (VoIP) line pool. Refer to “Programming access codes”...
  • Page 210: Incoming Calls

    Creating numbering plans Incoming calls Incoming call handling also depends on the call type. The system also uses the Public and Private DN # length settings to determine call handling. Refer also to “Defining DN length” on page 294. The system processes a call in the following way: The system receives a call from the public or private network.
  • Page 211: Figure 53 Incoming Public And Private Call Coding

    Creating numbering plans Figure 53 Incoming public and private call coding Call comes in System checks call type Public Private Default incoming MCDN Local/ Unknown/Unknown Private/Subscriber Private/CDP call handling National/Special or Private/Unknown or Private UDP Prepend Prepend private appropriate access code access code Match Dest.
  • Page 212: Name A Telephone, A Line Or A Hunt Group

    Name a telephone, a line or a Hunt group Name a telephone, a line or a Hunt group You can assign names to identify external lines, target lines, and your colleagues’ telephones. During a call, the name (if programmed) appears on the telephone display instead of on the external line number or internal telephone number of the caller.
  • Page 213: Incoming And Outgoing Call Display

    Incoming and outgoing call display Incoming and outgoing call display If you subscribe to Call Display services from your local telephone company, one line of information about an external caller appears on the display after you answer a call. If you answer before the Call Display information appears on your display, press FEATURE 811 to view the line number or line name.
  • Page 214: Programming Line Access

    Programming line access • Outgoing call display, telephones: Determine what number is displayed to a destination telephone when a call is made from a system telephone to a telephone on the private or public network: “Configuring line access” on page 405.
  • Page 215 Programming line access • Even when you use line pools, it is possible that a line pool will be unavailable for outgoing traffic. To alleviate this, you can determine overflow paths for any routes that you designate. Refer to “Using multiple routes and overflow routing” on page 348 for more information about overflow routing.
  • Page 216: Incoming Calls

    Programming line access Incoming calls For incoming calls, you can have a central reception point, or you can specify target lines to one or more telephones to receive directed calling. You can arrange your telephones in Hunt groups, ringing groups, or call groups that use system-wide call appearance (SWCA) assignments to share calls.
  • Page 217: Answering Calls

    Answering calls • If you assign the prime line to a line pool, all the lines in that line pool must be assigned to the telephone. When you pick up the handset, the telephone automatically grabs the first available line from the assigned line pool. In this configuration, you must ensure that the outgoing number is allowed by the line pool.
  • Page 218: Centralized And Group Answering

    Answering calls DRP 2 3rd highest priority DRP 1 (or None) (default) Lowest priority Call Ringing: When more than one call rings at a telephone, highest priority DRP rings first. Hunt groups: If the Hunt Group DRP is higher than the DRP of line of the incoming call and the telephone DRP, all telephones in the group will ring with the ring pattern assigned to the Hunt Group.
  • Page 219: Pick Up Features

    Answering calls and telephones. Telephones with KIMs or CAP modules that are not configured in system programming allow only memory button programming on the modules. In this case, the KIM is known as an OKIM (ordinary KIM). Programming: • “Identifying the telephone (General heading)” on page 403 •...
  • Page 220 Answering calls • Group Pickup: Your system can support nine pickup groups. If a telephone has been assigned as a member of a pickup group, the user can pick up a call that is ringing at any telephone in the pickup group (FEATURE 75). Programming: •...
  • Page 221: Make A Call

    Make a call Make a call You can set up your system in several ways that will determine how users can make calls. This section includes: • “Emergency 911 dialing” on page 222 • “Select how you dial your calls” on page 222 •...
  • Page 222: Emergency 911 Dialing

    Make a call Emergency 911 dialing Emergency 911 dialing is the capability to access a public emergency response system. State and local requirements for support of Emergency 911 dialing service by Customer Premises Equipment vary. Ask your local telecommunications service provider about compliance with applicable laws and regulations.
  • Page 223: Create A Conference Call

    Make a call Create a conference call You can establish calls to two people at the same time, and allow each caller to hear the other two callers. You must have at least two intercom buttons assigned to your telephone to initiate a conference call (FEATURE 3).
  • Page 224: Handling Calls

    Handling calls Programming: • System speed dials: “Configuring system speed dial numbers” on page 482. • Alpha tagging: “Using alpha tagging for name display” on page 463. • User speed dials: “Configuring user speed dialing” on page 444. • Saved Number Redial: This feature allows you to save the number of the current external call, provided that you dialed the call, so that you can call it again later.
  • Page 225: Parking Or Transferring Calls

    Handling calls Parking or transferring calls • Transfer calls (call forward): Allows you to direct a call to another telephone internally or externally. To transfer a call to an external destination, you need to know the line pool or destination code to route the call. (FEATURE 70). You can also set up a telephone to automatically send calls to another telephone or to a voice mail box if the telephone is not answered or if it rings busy.
  • Page 226: Forwarding Calls

    Handling calls You can use SWCA programming to define logical groups of telephones. Each group can be assigned a set of the SWCA codes, which allows them to pass calls within the group. Each telephone in the group also displays the current status of the call, so users can determine which calls are being dealt with.
  • Page 227: Prevent Calls From Ringing At Your Telephone

    Prevent calls from ringing at your telephone — if the voice mail system is on a remote system, ensure that the correct routing codes are added to the voice mail forwarding dial string. — if calls are being forwarded to telephones or voice mail outside the system, ensure that Allow redirect is set for the telephones.
  • Page 228: Communicating In The Office

    Communicating in the office If an external call uses a target line, the call is processed according to the programming of the target line. If the target line is busy, the caller hears a busy tone or routes the call to the prime set for the target line or to the voice mail system, even if there is DND on Busy programming.
  • Page 229: Figure 163 Setting System Timers

    Communicating in the office Programming: • “Configuring the Capabilities features” on page 418 • “Programming Feature settings” on page 465 • “Setting system timers” on page 479 • Messages: This feature allows you to leave a message on the display of another telephone in your system or to analog telephones connected to an Analog Station Module (ASM/GASM).
  • Page 230: Using Handsfree And Mute

    M-series telephones and on the 7208 digital phone. • handsfree-only to the bottom right button for Nortel IP telephones and 7316 digital phones, which have a separate mute button located under the dial pad. •...
  • Page 231 Track your incoming calls Call Log can help you to — keep track of discarded calls or calls not answered — track patterns for your callers (for example volume of calls and geographic area of calls) — record caller information quickly and accurately —...
  • Page 232: Use Alternate Or Scheduled Services

    Use alternate or scheduled services Use alternate or scheduled services There are three types of services for Business Communications Manager to handle calls in a different way on different days, and at different times of the day. These services for scheduling call restrictions, ringing groups, and routing services are controlled through the control telephone.
  • Page 233: Auxiliary Devices

    Special telephones • Direct dial telephone: This is the telephone that system users can dial with one digit (direct dial access code). An example of this would be a receptionist telephone. This telephone is also usually the control telephone for system scheduling. You can create up to five direct dial telephones, however, they all respond to the same direct dial access code.
  • Page 234: Legacy Devices

    Also, the doorphone does not use the user preferences or the Telco features settings. Installation and configuration information is contained in the Nortel Networks Digital Doorphone Installation and Configuration Guide. Legacy devices •...
  • Page 235 Call out to external systems using host system dialing • Link: If you connect the system to a private branch exchange (PBX), you can use a Link signal to access special features. On some telephones, Link is called FLASH. You can include the Link signal as part of a longer stored sequence on an external autodial button or in a speed dial code.
  • Page 236: Call In From Outside The System

    Call in from outside the system • Wait for Dial Tone: This feature (FEATURE 804) causes a sequence of numbers to pause until dial tone is present on the line before continuing to dial. You can use this feature if you must dial a remote system and then wait for dial tone from that system before dialing the remainder of your number.
  • Page 237: Special Features

    Special features Special features This section describes features on the system which serve a specific purpose that is optional to the general function of the system. • Hospitality services: This feature allows small to medium service facilities to provide customer telephone service, as well as administration services through a telephone interface. Programming: Besides the general line and telephone programming required for individual group members, Chapter 24, ”Configuring Hospitality Services”...
  • Page 238 Special features • IVR: The Interactive Voice Response feature allows your customers greater interaction with your call centers. Configuration information is located in Interactive Voice Response Installation and Configuration Guide (IVR) N0008589 3.3...
  • Page 239: Configuring Lines

    Chapter 9 Configuring lines This section describes the information accessed under the Services, Telephony Services, Lines headings. Task: • Configure the lines connected to the system, or call channels configured as Voice over IP (VoIP) trunks or target lines. This section contains: •...
  • Page 240: Understanding The Process Of Line Configuration

    Understanding the process of line configuration Understanding the process of line configuration Refer to the process map below, which leads you through the order for configuring the lines for your system. Figure 54 Process map: Configuring the lines for your system VoIP lines Trunk module lines Modules are...
  • Page 241: Understanding How The System Identifies Lines

    Understanding how the system identifies lines Understanding how the system identifies lines On a new system, lines and loops are numbered and assigned defaults based on the type of media bay modules that have been connected to the system. The exception is the voice over IP (VoIP) trunks, which require a keycode to activate.
  • Page 242: Copying Line Programming

    Understanding how the system identifies lines Copying line programming The Copy command allows you to duplicate programming for a line and apply it to another line. You cannot copy programming between lines on different types of media bay modules. The Received number of a target line is a unique number and cannot be copied.
  • Page 243: Target Lines

    Understanding how the system identifies lines Business Communications Manager systems or Meridian 1-IPT systems. Note: SIP trunks can only be used between Business Communications Managers. You can also create a fallback for the trunk. This is a situation where the system reroutes the call to a PSTN line pool if the primary route is not available or the call quality is not suitable.
  • Page 244: Table 30 Ds30 Number And Offset Line-Loop Default List

    Understanding how the system identifies lines Follow these steps to use the table. For each bus number, circle the module you set to that number. Beside the module name, circle the group of line numbers appropriate for the offset you set on the modules.
  • Page 245 Understanding how the system identifies lines Table 30 DS30 number and offset line-loop default list (Continued) Line/Loop numbers (default) DS30 Offset Line pool Access codes Type of module A-O/PRI and routes Trunk module DTM (T1) 151-174 DTM (NA-PRI) 151-173 DTM (E1 PRI 151-180 DDI MUX DTM 151-174* BRI 181-188 189-196...
  • Page 246: All Lines

    Understanding how the system identifies lines Table 30 DS30 number and offset line-loop default list (Continued) Line/Loop numbers (default) DS30 Offset Line pool Access codes Type of module A-O/PRI and routes Trunk module DTM (T1) 61-84 DTM (NA-PRI) 61-83 DTM (E1 PRI) 61-90 DDI MUX DTM 121-144* BRI 61-68 69-79...
  • Page 247: Using The General Record

    Tips: External lines and telephones must be programmed to use one of the Scheduled Services: Ringing, Restriction, and Routing Services. For maximum flexibility, Nortel Networks recommends that you create two different control telephones, one for the lines and one for the telephones.
  • Page 248: Assigning Trunk/Line Data

    Assigning Trunk/line data Table 31 General record values (Continued) Attribute Value Description Tips: You can program a line pool access code under Telephony Services, General Settings, Access Codes. Refer to “Setting up line pool access codes” on page 328. Assigning Trunk/line data The Trunk/line data heading allows you to program settings for lines that affect how the Business Communications Manager communicates with other switches.
  • Page 249: Loop Start Analog/Digital Fields

    Assigning Trunk/line data • “BRI fields” on page 262 • “DPNSS fields” on page 264 • “VoIP fields” on page 265 • “Lines field cross-reference chart” on page 267 Loop start analog/digital fields Table 32 Loop start analog and digital fields Attribute Value Description...
  • Page 250 Assigning Trunk/line data Table 32 Loop start analog and digital fields (Continued) Attribute Value Description Prime set Assign a telephone to provide backup answering for calls on the line. For an Auto Answer line, calls are redirected if the received number is invalid or the target line is None busy, and if the If busy parameter is set To prime.
  • Page 251 Assigning Trunk/line data Table 32 Loop start analog and digital fields (Continued) Attribute Value Description Answer Manual Define whether a trunk is manual or automatic answer. mode Auto Auto answer mode allows the trunk to be a shared resource by the system telephones.
  • Page 252: Ground Start Fields

    Assigning Trunk/line data Table 32 Loop start analog and digital fields (Continued) Attribute Value Description Redirect to <dial string> Enter a dial string (including routing code) to redirect the line to an external telephone, such as a call attendant on another system. If you want to stop redirection, you need to delete the dial string and allow the record to update.
  • Page 253 Assigning Trunk/line data Table 33 Ground start fields (Continued) Attribute Value Description Prime set Assign a telephone to provide backup answering for calls on the line. For an Auto Answer line, calls are redirected if the received number is invalid or the target line is None busy, and if the If busy parameter is set To prime.
  • Page 254: Did Fields

    Assigning Trunk/line data Table 33 Ground start fields (Continued) Attribute Value Description Redirect to <dial string> Enter a dial string (including routing code) to redirect the line to an external telephone, such as a call attendant on another system. If you want to stop redirection, you need to delete the dial string and allow the record to update.
  • Page 255 Assigning Trunk/line data Table 34 DID line fields (Continued) Attribute Value Description Line type Public Define how the line is used in relation to other lines in the system. Private to: • Public line: can be accessed by more than one telephone. Pool A to O •...
  • Page 256: E&M Fields

    Assigning Trunk/line data Table 34 DID line fields (Continued) Attribute Value Description ANI Number Y or N Define whether the telephone number of the caller will be collected for this line. For T1 E&M and T1 DID trunks connected to a DTM, this setting only appears if Signaling is set to WinkStart.
  • Page 257 Assigning Trunk/line data Table 35 E&M line fields (Continued) Attribute Value Description E&M trunk T1 E&M Line type Public Define how the line is used in relation to other lines in the system. Private to: • Public line: can be accessed by more than one telephone. Pool A to O •...
  • Page 258 Assigning Trunk/line data Table 35 E&M line fields (Continued) Attribute Value Description Distinct ring None Choose the distinctive ring pattern that you want to assign to the line. This allows Pattern 2 you to provide selective service to calls with differing answer priorities. Pattern 3 When more than one line with the distinct ring settings rings at a telephone, the line Pattern 4...
  • Page 259: Target Lines And Dass2 Fields

    Assigning Trunk/line data Table 35 E&M line fields (Continued) Attribute Value Description DNIS Y or N Defines whether the digits dialed by an external caller on this line will be Number collected.For T1 E&M trunks connected to a DTM, this setting only appears if Signaling is set to WinkStart and Answer mode is set to Manual.
  • Page 260 Assigning Trunk/line data Table 36 Target lines and DASS2 line fields (Continued) Attribute Value Description Distinct rings read-only This field shows the Distinct Ring Patterns that have already been assigned to at in use least one line. Distinct ring None Choose the distinctive ring pattern that you want to assign to the line.
  • Page 261: Pri Fields

    Assigning Trunk/line data PRI fields Table 37 PRI line fields Attribute Value Description Line type PRI A to PRI-F Define how the line is used in relation to other lines in the system. • PRI A to PRI F: you must use routes and destination codes to direct PRI lines. Prime set Assign a telephone to provide backup answering for calls on the line.
  • Page 262: Bri Fields

    Assigning Trunk/line data BRI fields Table 38 BRI line fields Attribute Value Description Manual answer line Auto answer line Line type Public Define how the line is used in relation to other lines in the system. Private to: • Public line: can be accessed by more than one telephone. PRI A to PRI-F •...
  • Page 263 Assigning Trunk/line data Table 38 BRI line fields (Continued) Attribute Value Description Warning: If you assign a distinctive ring pattern to a line, and that distinctive ring pattern has already been assigned to a telephone, all telephones with that ring pattern will be reset to pattern 1.
  • Page 264: Dpnss Fields

    Assigning Trunk/line data DPNSS fields Table 39 DPNSS line fields Attribute Value Description Line type Public Define how the line is used in relation to other lines in the system. Private to: • Public line: can be accessed by more than one telephone. PRI A to PRI-F •...
  • Page 265: Voip Fields

    Assigning Trunk/line data Table 39 DPNSS line fields (Continued) Attribute Value Description Use auxiliary Y or N Turn the auxiliary ringer on or off for all telephones using this line. ringer When programmed on a line, the auxiliary ringer will ring every time a call is received.
  • Page 266 Assigning Trunk/line data Table 40 VoIP line data fields (Continued) Attribute Value Description Prime set Assign a telephone to provide backup answering for calls on the line. For an Auto Answer line, calls are redirected if the received number is invalid or the target line is None busy, and if the If busy parameter is set To prime.
  • Page 267: Lines Field Cross-Reference Chart

    Assigning Trunk/line data Lines field cross-reference chart The following table provides a quick cross reference that shows common line fields, noted by trunk type. Table 41 Combined line settings table Trunk types Attribute Value Description Line type Public Define how the line is used in relation to other lines in the system.
  • Page 268 Assigning Trunk/line data Table 41 Combined line settings table (Continued) Trunk types Attribute Value Description Distinct ring None Choose the distinctive ring pattern that you want to assign to Pattern 2 the line. This allows you to provide selective service to calls Pattern 3 with differing answer priorities.
  • Page 269 Assigning Trunk/line data Table 41 Combined line settings table (Continued) Trunk types Attribute Value Description Loop start analog Answer Manual Define whether a trunk is manual or automatic answer. Loop start digital mode Auto Auto answer mode allows the trunk to be a shared resource Ground start digital by the system telephones.
  • Page 270: Turn Privacy On Or Off For A Call

    Assigning Trunk/line data Table 41 Combined line settings table (Continued) Trunk types Attribute Value Description Loop start analog Loss Short CO Select the appropriate loss/gain and impedance settings for Packages Medium CO each line. Long CO For more information refer to “Using loss packages”...
  • Page 271: Received

    Assigning Trunk/line data Note: The Auto privacy setting does not apply to target lines, PRI lines or VoIP trunking lines. Received # Target lines provide an additional record under Trunk/Line Data, and that is the Received number. You can specify received numbers for both private (VoIP and MCDN) and public network connections.
  • Page 272: Using Loss Packages

    Assigning Trunk/line data • A telephone can be administered to search automatically for an idle line from several lines that appear on the telephone. Assign a line pool as the prime line (in Line access) and all the lines in the line pool must appear on that telephone. When the user lifts the receiver or presses Handsfree, any one of the lines, if idle, can be selected by Automatic Outgoing Line selection.
  • Page 273: Assigning Restrictions

    Assigning Restrictions Assigning Restrictions Restrictions prevent you from making certain kinds of calls from specific lines on the telephone. You can also restrict some features. This section describes how to apply restriction filters to lines. You can assign a different restriction filter for normal service and for each of six schedules. Refer to “Defining service schedules”...
  • Page 274: Setting Remote Restrictions

    Assigning Restrictions Note: When a remote user places an external call on a line, any filters used with the line still apply. However, if DND is active on the line, no set or set/line restrictions apply. Setting remote restrictions Specify the restriction filter for the line that remote callers use to call in to Business Communications Manager.
  • Page 275: Setting Line Telco Features

    Setting line telco features Setting line telco features If you subscribe to a voice message service outside your office, you can access it through your Business Communications Manager system. You can specify what voice message center you use for each external line that receives message waiting indication. Click on the keys beside Services, Telephony Services, Lines.
  • Page 276 Setting line telco features N0008589 3.3...
  • Page 277: Configuring Bri Loops

    Chapter 10 Configuring BRI Loops The following sections describe the information accessed under the Services, Telephony Services, Loops headings. The Loops headings allow you to program BRI S, T, U2, and U4 ISDN loop settings. Task: Configure the BRI loops connected to the system through BRI modules. This section includes information about: •...
  • Page 278: Bri Configuration Process Map

    BRI configuration process map BRI configuration process map The following process map shows the steps for configuring loops for T-1 based BRI modules. Figure 62 Process map: Configuring the loops for your BRI module BRI module is installed and system is running. Note the loops that are active.
  • Page 279: Identifying Bri T-Loops (T1 Profiles)

    Identifying BRI T-loops (T1 profiles) Identifying BRI T-loops (T1 profiles) T1-based BRI loops have three parameters that identify loop characteristics. In the Unified Manager, click on the keys beside Services, Telephony Services, Loops. Click on the loop number you want to configure as an ISDN trunk connection. Figure 63 T-loop screen (T1 profiles) Configure the loop settings according to the following table: Table 45 Loop settings...
  • Page 280: Adding Spids

    Identifying BRI T-loops (T1 profiles) Adding SPIDs System running with T1 country profiles (North American) support additional BRI services offered by ISDN service providers and defined by network service profile identifiers (SPIDs). The SPID allows you to enter a network connection that provides a path for voice or data services. Collect the information supplied by your service provider: SPIDs, Network DNs, TEIs.
  • Page 281: Adding Spid Network Dns

    Identifying BRI T-loops (T1 profiles) Adding SPID network DNs Under the SPID # heading, click the Network DNs heading. Click the Add button above the navigation tree. Figure 66 Add Network DN to SPID X Type the ISDN DN number in the DN box for the device you want to use. Click the Save button.
  • Page 282: Identifying Bri T-Loops (Etsi, Qsig)

    Identifying BRI T-loops (ETSI, QSIG) Identifying BRI T-loops (ETSI, QSIG) BRI loops for ETSI and ETSI-QSIG provide some flexibility in defining the T-loop characteristics. Refer to “Core software and regions” on page 834 for a detailed list of countries that use these profiles. Collect the information supplied by your service provider.
  • Page 283 Identifying BRI T-loops (ETSI, QSIG) Table 46 Loop settings (Continued) Attribute Value Description Local number length 0-10 Set the local number length for loops to interfaces that receive overlap rather than enbloc digits. This number is the total length of the called party number received.
  • Page 284: Configuring D-Packet Service For T Loops

    Configuring D-packet service for T loops Configuring D-packet service for T loops This configuration occurs for all profiles. A T-loop can be used in combination with an S-loop to provide D-packet service for a point-of-sale terminal adapter (POSTA) or other D-packet device. To deliver D-packet service, a network connection (T-loop) is programmed to work with a terminal connection (S-loop).
  • Page 285: Provisioning The Loop Variables

    Provisioning the loop variables Figure 71 Add a TEI to the D-packet service Provisioning the loop variables When you assign a BRI loop as a trunk loop, you need to return to the media bay module settings and provision the loop, and the lines assigned to the loop. Once the loop is provisioned, it displays the two line numbers that are assigned to the loop, these also need to be provisioned.
  • Page 286: Provisioning The Lines

    Provisioning the loop variables Provisioning the lines Once you provision the loop, two numbers are assigned to the loop. These also need to be separately provisioned. Click the keys beside Resources, Media Bay Modules, Bus 0X, Modules on bus, Module X, Provision loops, Loop XXX, Lines on Loop.
  • Page 287: Programming Bri Lines

    Provisioning the loop variables Programming BRI lines Once the loops and lines are provisioned (“Provisioning the Loop” on page 285 “Provisioning the lines” on page 286), you program the lines in the same manner as you do for non-BRI lines, under the Services, Telephony Services, Lines heading.
  • Page 288: Assigning The Lines To Telephones

    Provisioning the loop variables Assigning the lines to telephones Once the line records are programmed, assign the BRI lines or target lines and BRI line pools to the DN records for the telephones that will use the line(s) to receive/send calls. Refer to “Determining line assignments”...
  • Page 289: Setting Bri For Isdn Device Connections

    Setting BRI for ISDN device connections Setting BRI for ISDN device connections BRI S-loops support devices that use an ISDN interface. You can assign a single device to a loop, or multiple devices connected through an NT-1 interface (“Using an NT-1 for BRI U2/BRI U4” on page 278).
  • Page 290: Configuring S-Loops

    Setting BRI for ISDN device connections Configuring S-loops Click on the keys beside Services, Telephony Services, Loops. Click on the loop number you want to configure. Figure 77 S-loop screen (North American profile) Configure the loop settings according to the following table: Table 47 Loop settings Attribute Value...
  • Page 291: Assigning Dns To The S- Loop

    Setting BRI for ISDN device connections Assigning DNs to the S- loop You can have a maximum of 58 ISDN DNs on your system. However, there are only 28 default DNs provided. The default ISDN DN range is 597 to 694. To add to the defaults, you need to use DNs from the Companion range: 565 to 597 (change DN type to ISDN and DECT) Companion: If you have either a legacy Companion wireless system, which uses the Companion DNs, or a legacy DECT portable system, which uses the ISDN and DECT DNs,...
  • Page 292: Configure The Isdn Terminal Records

    Setting BRI for ISDN device connections Figure 79 Adding a Loop DN 10 Click outside the right frame to save the entry. Configure the ISDN terminal records You configure the ISDN terminal records in the same way that you do any other DN record. These records are found under the Services, System DNs, All ISDN/DECT DNs heading.
  • Page 293: Controlling Access Into The System

    The following figure highlights the Unified Manager navigation tree headings that will be discussed in this chapter. Figure 80 Process map: Access headings Telephony Services General Settings Feature Settings Nortel IP Terminals Lines IP trunking VoIP Lines Timers Physical Lines...
  • Page 294: Defining Dn Length

    Defining DN length Defining DN length The DN lengths setting allows you to change the number of digits for the Received number length and the DN length, which are used by the system to determine if an incoming call is valid for the system.
  • Page 295: Changing The Dn Length

    Defining DN length Changing the DN length Warning: If your system is running with a PBX telephony template, the Public and Private received # length are hardcoded to 3 (digits) at startup. Increasing the DN length after system startup does not change these digits, so you will need to manually change the Public and Private receive # length.
  • Page 296: Using The Received # Length

    Defining DN length Using the Received # length If you change the DN length of your system, you may need to change the Received # length, which is what the system uses, in conjunction with the dialing table coding, private and public networking, and the access codes to determine a route for an incoming call over an auto-answer trunk.
  • Page 297: Assigning Target Lines

    Assigning target lines The following table provides the possible values for each field. Table 48 Private and Public received numbers Attribute Value Description Private length 1, 2, 3, 4, 5, 6, 7 The number of digits that the system uses to determine if a call tagged as Private fits the system private DN numbering.
  • Page 298: Assigning A Target Line To A Telephone

    Assigning target lines Assigning a target line to a telephone Ensure you have auto-answer lines such as analog DID, T1 lines set to auto answer, PRI, or VoIP trunking lines. Click the keys beside Services, Telephony Services, System DNs, Active Set DNs. Choose the DN of the set where you want the line to be directed.
  • Page 299: Configuring The Target Line Received Number

    Assigning target lines Repeat steps 3 to 7 for all the DNs you want to assign with target lines. Configuring the target line received number Configure the numbers that the system uses to identify the destination for the target line. Click the keys beside Services, Telephony Services, Lines, Target Lines.
  • Page 300: Notes About The Public And Private Received Numbers

    Configuring for remote access Notes about the Public and Private Received Numbers If the received number is different than the regular DN number, enter the number in the Private number and/or Public number field. For instance, in North America, you can enter the 10-digit public number in the Public number field.
  • Page 301: Creating Direct Inward System Access (Disa)

    Creating Direct Inward System Access (DISA) Creating Direct Inward System Access (DISA) To control access from the public or private network, you can configure auto-answer trunks to answer with DISA. Remote callers hear a stuttered dial tone and must then enter a COS password that determines what they are allowed to do in the system.
  • Page 302: Remote Access On Loop Start Trunks

    Creating Direct Inward System Access (DISA) Remote access on loop start trunks Loop start trunks provide remote access to Business Communications Manager from the public network. They must be configured to be auto-answer to provide remote system access. A loop start trunk must have disconnect supervision if it is to operate in the auto-answer mode. T1 E&M trunks always operate in disconnect supervised mode.
  • Page 303: Remote Access On Dpnss Lines

    If Answer mode is set to Auto, Business Communications Manager automatically answers the incoming call. Because most other DPNSS features are extension-specific, Nortel Networks recommends that all DPNSS lines are configured as auto-answer lines. •...
  • Page 304: Defining Remote Access Packages

    Defining remote access packages Defining remote access packages The Remote access packages setting allows you to control the remote use of line pools. Create a remote access package by defining the system line pools remote users can access. You then assign the package to individual lines, (refer to “Defining line pool access for remote packages”), and to a particular Class of Service password (see “Using COS passwords”...
  • Page 305: Using Cos Passwords

    Using COS passwords Figure 85 Setting remote page for a remote access package Using COS passwords COS passwords permit controlled access to the system resources by both internal and remote users. • When an internal user enters a COS password at a telephone, the restriction filters associated with the COS password apply instead of the normal restriction filters.
  • Page 306: Creating Cos Parameters

    Using COS passwords Creating COS parameters Follow these steps to create COS groups and passwords: Click the keys beside Services, Telephony Services, General Settings, and COS Passwords. Click on a COS group (COS 00-99). The COS window appears in the right frame. Figure 86 Assigning COS password and remote access parameters COS 99 Use the information in the following table to determine which values to set for each password.
  • Page 307: Notes About Cos Passwords

    Using COS passwords Notes about COS passwords The COS password can define the set of line pools that may be accessed and whether or not the user has access to the paging feature. The class of service (COS) that applies to an incoming remote access call is determined by: •...
  • Page 308: Cos Examples

    Using COS passwords COS examples Example: Using the COS feature to access a restricted line A sales representative out of the office needs to make long distance calls to the European office. Your system has a leased line to Europe with reduced transatlantic charges. You provide the sales representative with a Class of Service password that gives access to the transatlantic line.
  • Page 309 Using COS passwords Table 51 External access tones (Continued) Fast busy tone You have done one of the following: • Entered an incorrect COS password. Your call disconnects after five seconds. • Taken too long while entering a COS password. Your call disconnects after five seconds.
  • Page 310 Using COS passwords N0008589 3.3...
  • Page 311: Configuring Outgoing Calls

    Figure 87 Unified manager telephony services headings Telephony Services General Settings General Settings ... Feature Settings Access Codes . . . Nortel IP Terminals Park Prefix Restriction Filters IP trunking External code Filter 00-99 Timers Direct Dial Digit...
  • Page 312: Configuring The Public And Private Dialing Plans

    Configuring the public and private dialing plans Configuring the public and private dialing plans The dial plan you choose determines the type of numbering required to access a public and private network by defining the DN lengths for the codes that access the networks. You can define only one private network per system.
  • Page 313: Using Private Network Dialing

    Configuring the public and private dialing plans Using private network dialing If your Business Communications Manager is part of a private network, you have a choice of dialing plans. However, all Business Communications Managers on a network must use the same type of dialing plan and have the same Private DN lengths to ensure proper call direction.
  • Page 314: Figure 88 Configuring Private Network Types

    Configuring the public and private dialing plans Figure 88 Configuring private network types Use the following table to determine which values to set so callers can access a private network. Table 52 Private network values Attribute Values Description Type None, CDP, UDP You can specify if your Private network uses a coordinated dialing plan (CDP) or a universal dialing plan (UDP).
  • Page 315 Configuring the public and private dialing plans Table 52 Private network values Private Network ID 1-127 This is the unique number that identifies the system to the (CDP/UDP networks) Meridian PRI-MCDN network. Both end points must match on a PRI-MCDN network. On a VoIP trunking-MCDN network, this ID must be the same on all nodes.
  • Page 316: Outgoing Private Calls Routing

    Configuring the public and private dialing plans Outgoing private calls routing When you set up routing for private calls, the route is set to Private. Refer to “Configuring call routing” on page 331. How the system identifies the call depends on the type of trunk chosen for the route. Refer to the table below.
  • Page 317: Adding Or Modifying Dialing Plan Public Dn Lengths

    Configuring the public and private dialing plans Adding or modifying dialing plan Public DN lengths To add or modify Public DN lengths, follow these steps: Click the keys beside Services, Telephony Services, General Settings, Dialing Plan and Public network. Click on Public DN lengths. At the top of the column, click Add.
  • Page 318: Outgoing Public Calls Routing

    Configuring the public and private dialing plans Outgoing public calls routing Outgoing public calls from within the system typically have the routes set to Public. Refer to “Configuring call routing” on page 331. The NPI/TON gets sent as Unknown/Unknown. The public called number length is based on the Public DN lengths table in the Public networks dialing plan.
  • Page 319: Determining Line Access Dialing

    Determining line access dialing Determining line access dialing The next two sections, “Understanding access codes” on page 320 “Configuring call routing” on page 331 describe what you do with the lines and loops you previously set up into line pools. By using access codes or call routing, which uses destination codes, you can determine which lines (routes) outgoing calls use.
  • Page 320: Understanding Access Codes

    Understanding access codes Understanding access codes The system uses access codes to direct calls to the correct lines and destinations. If the codes “Creating numbering plans” conflict, some of the features on the system do not work. Refer to on page 206 for a general overview about using access codes within the system dialing plan.
  • Page 321: Programming Access Codes

    Programming access codes Programming access codes Your system requirements will determine which access codes you need to set up. Follow these steps to set up codes found on the Access codes screen: Click on the keys beside Services, Telephony Services, General Settings Click on Access codes.
  • Page 322 Programming access codes Table 56 Access codes values (Continued) * Direct dial digit None The Direct dial digit setting allows you to specify a single system-wide digit to call a direct dial telephone. <one-digit number> Remote dial-in (Also refer to “Configuring for remote access”...
  • Page 323: Call Park Codes

    Programming access codes Table 56 Access codes values (Continued) * Local access <code to access local MCDN connections only. code PSTN> This number is prepended to an incoming M1 local dial string and designates the call as a Local call type (typically 9). Refer to “Using the MCDN access codes (tandem calls)”...
  • Page 324: Creating Direct Dial Sets

    Programming access codes Note: Other programmable settings may affect what numbers appear in the window during programming. Although the numbers 0 to 9 are valid Park prefix settings, some may already be assigned elsewhere by default or by programming changes. If the DN length changes, and the changed DNs conflict with the Park prefix, the setting changes to None.
  • Page 325: Table 57 Direct Dial Values

    Programming access codes 3 Use the following table to determine the settings you want to define direct dial sets. Table 57 Direct dial values Attribute Values Description Type Internal This is the type of number for the direct-dial set. External None Internal/External# The DN number of the telephone to be designated as the direct dial...
  • Page 326: Tips About Access Codes

    Programming access codes Tips about access codes Here are some helpful pointers to assist you in planning the access codes for your system. Table 58 Access/dialing codes: avoiding numbering conflicts XXXXX Numbering cannot conflict with these features Direct Private Public/ Public/ Park External...
  • Page 327: Using The Mcdn Access Codes (Tandem Calls)

    Programming access codes Using the MCDN access codes (tandem calls) Three special codes exist specifically for programming over PRI and VoIP trunks that are using the MCDN protocol, and which connect to a call server systems that use specific call codes for special call types, such as the Meridian 1 (M1).
  • Page 328: Setting Up Line Pool Access Codes

    Setting up line pool access codes This is how the codes relate: Meridian 1 access codes Business Communications Manager access codes Sample code Private access code Network/long distance code National access code Local access code Local code Special access code Calls coming in from the public network need to be translated to their private network destination before routing/tandeming through the private network.
  • Page 329 Setting up line pool access codes Type the Access code (up to four digits). The default Access code is 9 for Line Pool A. There is no default Access code for Line Pools B to O. Note: You cannot assign PRI line pools with a line pool access code. You must define PRI line pools under routing, and create destination codes for the routes.
  • Page 330: Using Carrier Codes

    Using Carrier codes Using Carrier codes A multi-digit Carrier access code contains an Equal Access Identifier Code (CAC) followed by a Carrier Identification Code (CIC). The CIC identifies the carrier that handles the call. The Carrier Access Code table stores the CAC digit pattern that you define for your region. In most cases it is not necessary to change the default values.
  • Page 331: Configuring Call Routing

    Configuring call routing Figure 97 Configuring a carrier code prefix ID length Use the following table for information about the two fields on this screen. Table 59 Carrier access code values Attribute Values Description Code prefix <one to six digits> This value defines the prefix that will be used to access the carrier (Read-only) code.
  • Page 332: Figure 98 Call Routing Headings

    Configuring call routing Figure 98 Call Routing headings Call Routing Routes Route 000 External # Use pool Destination Codes Schedules Call routing decides what path an outgoing call takes using the digits that are dialed. It is sometimes called Automatic Route Selection (ARS). When you select an internal line and dial, the system checks the numbers you enter against the routing tables.
  • Page 333: Routing Configuration

    Defining routes Routing configuration The settings for a call routing include: • a three-digit route number (000-999) • external # digits (up to 24 digits) • a line pool • destination codes (max. of 500 available, up to 12 digits) •...
  • Page 334: Figure 100 Define Route Parameters

    Defining routes Figure 100 Define route parameters Use the information in the following table to configure the route settings. Table 60 Route settings Attribute Value Description External # <a maximum of 24 Enter the external or dial-out number for the route you want the assigned digits>...
  • Page 335 Defining routes Table 60 Route settings (Continued) Attribute Value Description DN type or Public This setting tells the system what type of line protocol the route uses to Service type process the dial string. Private The heading changes between DN type and Service type, depending on Local (Subscriber) the PRI line protocol.
  • Page 336: Call By Call Service Routing

    Defining routes Call by Call service routing The following table provides an example of a Routing Table containing Call by Call programming (available in the North America market profile). Refer also to “Configuring Call by Call services” on page 350. Table 61 Call by Call routing table example Route # Dial Out...
  • Page 337: Programming The Pri Routing Table

    Defining routes Programming the PRI routing table The dialing plan must be thoroughly planned out in advance before programming the information into the Business Communications Manager system. To program the routing table: Click on the keys beside Services, Telephony Services, Call Routing, Routes. Click on the route number record you want to use.
  • Page 338: Using Destination Codes

    Using destination codes Using destination codes Destination codes allow you to control how the system interprets and routes dial strings from internal sources. Destination codes are similar to line pool codes except that by using routes (which attach dial strings and DN type designators to line pools) and schedules you can control what digits the user has to dial and how the system routes the call out of the system, including what numbers from the dial string get added or deleted to the route dialout.
  • Page 339: Why Use Destination Codes

    Using destination codes Why use destination codes? Routes determine path (line or pool) and any required access numbers. Destination codes determine which route to take (i.e. an end node uses one destination code for all other nodes in the system). If you choose to use the destination codes Normal schedule, the call will always go out over the same route.
  • Page 340: Deciding On A Code

    Using destination codes Deciding on a code Note: When configuring a private network, ensure the numbering plan does not conflict with the public telephone network. For example, in North America, using “1” as an access code in a private network, conflicts with the PSTN numbering plan for long distance calls When deciding on which digit(s) to use to start your destination code(s), you need to take into consideration:...
  • Page 341: Grouping Destination Codes Using A Wild Card

    Grouping destination codes using a wild card economical route is being used. Depending on how many exceptions there are, you can use the wild card at the end of the string to save yourself from the necessity of entering a number of destination codes with the same leading digits.
  • Page 342: Configuring Destination Codes With Wild Cards

    Configuring destination codes with wild cards Table 65 Destination codes not using a wild card (Continued) Destination codes Route Absorb Length Dial Out 0623 0162 237 6253 0624 0162 237 6254 0625 0162 237 6255 0626 0162 237 6256 0627 0173 133 2211 0628 0162 237 6258...
  • Page 343: Set Up The Destination Code Schedules

    Configuring destination codes with wild cards Figure 102 Adding a destination code with a wild card Click the Save button to save the destination code. Set up the destination code schedules Click on the key beside Schedules. Click on the schedule name you want to program.
  • Page 344: Enable/Disable Wild Card Digits

    Configuring destination codes with wild cards Enable/disable wild card digits Click on the key beside Wild cards. The valid numbers for the wild card for this code are displayed. Click on the number you want to change. In the Wild card state field, choose Assigned (can be used with this destination code) or Available (can be used as part of another destination code).
  • Page 345: Setting Up A Route Through A Dedicated Trunk

    Configuring destination codes with wild cards Figure 103 Routing Service programming example Routing Service ( Services: Routing Service Route # Dial out (if required) (000-999) (max. 24 digits or characters) Use Pool none A B C D E F G H I J K L M N O none A B C D E F G H I J K L M N O The following figure shows an example of a Destination codes programming record filled out...
  • Page 346: Notes About The Absorbed Length

    Configuring destination codes with wild cards Notes about the Absorbed length: The digit absorption setting (Absorbed Length) applies to a maximum of two schedules. Setting Absorbed Length to 0 minimizes the effort involved in preparing destination codes. When the Absorbed Length is at 0, the actual digits dialed by a caller are preserved in the dialout sequence.
  • Page 347: Programming For Least-Cost Routing

    Configuring destination codes with wild cards Follow these steps to program a long distance carrier access code into a destination code. Create a route that uses a line pool containing local lines only. Program the route to use a line pool containing the lines used to access the long distance carriers.
  • Page 348: Using Multiple Routes And Overflow Routing

    Configuring destination codes with wild cards Using multiple routes and overflow routing If all the lines used by a route specified by a destination code are busy when a call is made, you can program other routes that the system automatically flows the calls to, or you can allow the call to overflow directly to the Normal route schedule (usually the most expensive route).
  • Page 349: Figure 107 Configuring The Normal Schedule For Overflow

    Configuring destination codes with wild cards Assign an overflow route, usually the most expensive route, to the same Destination Code, but for the Normal schedule. Figure 107 Configuring the Normal schedule for overflow Under Scheduled Services, Routing Service, <preferred route schedule>, choose auto for Service Setting, and Y for Overflow.
  • Page 350: Using Dialing Restrictions With Routing

    Configuring Call by Call services Using dialing restrictions with routing You can further customize routing service by adding dialing filters to lines in line pools. Filters restrict the use of the line to specific area codes. To set up restriction filters, refer to “Defining restriction filters”...
  • Page 351: Call By Call Services

    Configuring Call by Call services Call by Call services Business Communications Manager supports the Call by Call Services listed in the following table. Table 67 Call by Call Services available on the system Service Description Public Public calls connect Business Communications Manager and a Central Office (CO).
  • Page 352: Switches Supporting Call By Call Limits

    Configuring Call by Call services Switches supporting Call by Call limits The following table lists the service types and cross-references them with four common switches. Table 68 Switches and service types chart Switches DMS-250 DMS-100 (MCI, Sprint, Service types NI-2 (custom) Generic) AT&T 4ESS...
  • Page 353: Setting Cbc Limits

    Configuring Call by Call services Setting CbC limits PRI pool limits for Call by Call services allows you to configure limits for service types without interacting with the CO. This feature sets the minimum and maximum number of incoming and outgoing calls per service type for the PRI pool.
  • Page 354: Pri Line Pools

    Configuring Call by Call services Figure 109 PRI Overlap Note: If more than one PRI and its channels are in the same PRI Pool, the administrator must change the Maximum outgoing value to reflect the total number of channels available. For example: 1 PRI: Maximum outgoing = 30 2 PRI: Maximum outgoing = 60 3 PRI: Maximum outgoing = 90...
  • Page 355: Viewing Cbc Limit Metrics

    Configuring Call by Call services Viewing CbC limit metrics You can view statistical information about call-by-call limit settings for PRI when the protocol is set to call-by-call routing. Choose Diagnostics, Service Metrics, Telephony Services, CbC limit metrics. The display shows the pools that supports CbC routing. Choose a PRI pool.
  • Page 356: Defining Restriction Filters

    Defining restriction filters Figure 110 Metrics for all CbC options To clear the settings for a selected service, click Clear metrics on the Configuration menu. Defining restriction filters Restriction filters allow you to restrict the numbers that can be dialed on any external line within Business Communications Manager.
  • Page 357: Adding A Restriction Filter

    Defining restriction filters This section includes the following information: • “Adding a restriction filter” on page 357 • “Notes about restriction filters” on page 358 • “Adding overrides to restrictions” on page 360 • “Restriction filter examples” on page 361 The following figure shows the Restriction Filters headings.
  • Page 358: Removing Restrictions

    Defining restriction filters Removing restrictions To remove restrictions that no longer apply, click on the Restriction # you want to remove, then click the Delete button at the top of the column. Exercise caution when removing overrides. If you remove a restriction, the overrides associated with the restriction are also removed. This action also changes the identifying numbers of the subsequent restrictions that you have defined.
  • Page 359: Default Filters (North America)

    Defining restriction filters • When restricting the dialing of a central office feature code, do not forget to create separate restrictions for the codes used for DTMF and pulse lines (for example, *67 and 1167). • Do not string together a central office feature code and a dialing sequence that you want to restrict.
  • Page 360: Default Filters (Other)

    Defining restriction filters Filters 02, 03, and 04, although not preset with restrictions and overrides, are the default filters in these programming headings: Table 71 Default filters for program headings Filter Heading Sub-heading System DNs Set restrictions Lines Line restriction Lines Remote restriction Default filters (other)
  • Page 361: Restriction Filter Examples

    Defining restriction filters To delete an override: Select the override you want to delete, and then click on the Delete button at the top of the column. If you want to delete all overrides for that restriction, click the Delete All button.
  • Page 362: Enhanced 911 (E911) Configuration

    Enhanced 911 (E911) configuration In the following figure, dialed digits must pass both the remote restriction and the line restriction. A remote caller can override these filters by dialing the DISA DN and entering a COS password. Figure 115 Remote line restriction example Line restriction No long Remote restriction...
  • Page 363 Enhanced 911 (E911) configuration • By default, Restriction Filter 02 is assigned to all sets on startup. There are no restrictions applied in Restriction Filters 02-99. Restriction Filter 01 has restrictions, but 911 is an exception for this filter. For information on how to change the Restrictions, refer to “Defining restriction filters”...
  • Page 364 Enhanced 911 (E911) configuration N0008589 3.3...
  • Page 365: Configuring Dn Records, An Overview

    Chapter 13 Configuring DN records, an overview This section provides an overview about the process for programming the records of the telephones and equipment attached to the station modules on the Business Communications Manager. Refer also to the process map on the next page (“Understanding the configuration process”...
  • Page 366: Understanding The Configuration Process

    Understanding the configuration process Understanding the configuration process The following process map provides an over-all view of how to set up telephone configurations. Figure 116 Process map: Configuring DNs for system devices Lines, station modules and base stations are installed, as required. DN number ranges depend on where station modules are set, on the type of telephones, and on the vintage of your system.
  • Page 367: Dn Mapping For Digital Telephones

    DN mapping for digital telephones DN mapping for digital telephones Use the following tables to determine which DNs can be assigned to your telephones if your system administrator did not provide you with a list of available DNs or did not fill out the Programming Record forms.
  • Page 368: Dn Chart For Upgraded 2.5 Systems

    DN mapping for digital telephones DN chart for upgraded 2.5 systems BCM 2.5 systems upgraded to 3.0 or newer software Module type (SD = single density; FDD = full double density; PDD = Partial double density) Module DSM 32 or DSM32+ location DSM16 or DSM 32+...
  • Page 369: Dn Chart For New 3.0 Or Newer Systems

    DN mapping for digital telephones DN chart for new 3.0 or newer systems If your system is a brand new BCM 3.0 or newer system, the DN numbering is consecutive from DS30 02 to 07. New BCM 3.0 or newer systems Module type (SD = single density;...
  • Page 370: Dn Mapping For Isdn And Legacy Wireless Handset Devices

    Defining the System DN headings DN mapping for ISDN and legacy wireless handset devices This equipment has pre-set DNs that are automatically assigned on a default system. Table 72 DN mapping for ISDN and legacy Companion and DECT handsets Default DN Media Bay System version Equipment...
  • Page 371: The Two Sides Of A Dn Record

    Defining the System DN headings The System DN heading provides access to the DN records of telephones that are active on the system, records of all the DNs that are available, and a comprehensive list of all DN possibilities. Use the list that is most convenient for what you want to do. Figure 117 System DNs main headings System DNs System DNs (continued)
  • Page 372 Defining the System DN headings Warning: Changing DN settings after system startup: Changes to the Start DN, DN length or Received # length can affect other applications. Make changes to these settings only at system installation, before you do any other programming.
  • Page 373: The System Dn Headings

    Use this list when you want to change a configuration, or to remove a telephone. Nortel IP telephone configuration records are located under Services, IP Telephony. Although you do not have to assign DNs to configure IP telephony DN records, they will not appear under this listing unless the telephone has been registered to the system.
  • Page 374 Defining the System DN headings This list displays the 7XXX digital phones, 7406 cordless digital phone, Set DNs 20XX IP telephones and WLAN IP telephone DNs that are not assigned or are not active. Use this list to set up new telephones before they are installed in the field.
  • Page 375: Dn Registration Headings

    Defining the System DN headings DN Registration headings The DN records found under this heading indicate whether a device is registered to the system, and, if it is, whether it is active. Figure 118 Registration DNs, main headings All System B2s DN Registration ...
  • Page 376 Defining the System DN headings Following is a brief description of the type of devices found under each heading. This is a list of registered DNs that are currently in contact with the Active DNs reg’d Business Communications Manager. This is a list of DNs that are registered but which are inactive. For Inactive DNs reg’d example, in the case of a portable handset, this might mean that the user has the handset turned off.
  • Page 377: Moving Between The Inactive And Active Lists

    Defining the System DN headings Moving between the Inactive and Active lists DNs move between active and inactive lists based on a number of factors which are described in the two sections below. From Active list to the Inactive list A DN record heading will move from the Active list to the Inactive list in the following circumstances: •...
  • Page 378: Feature Dns

    Renumbering DNs Refer to the IP Telephony Configuration Guide for detailed instructions about installing the 20XX IP telephones and to the WLAN IP telephone documentation for detailed instructions about installing and registering the WLAN handsets. Feature DNs The system also uses DNs to define remote access features and Hunt groups. These DNs do not show up on the System DNs list.
  • Page 379: Change Telephone Dns Using The Unified Manager

    Renumbering DNs Warning: legacy DECT systems, DECT DNs Do not change DECT DNs after the DECT Configuration wizard has run. Doing so will make the DECT handsets inoperable until you reconfigure the DECT module with the DECT Wizard and resubscribe the handsets. Change telephone DNs using the Unified Manager The General Settings heading also provides access to a screen where you can change the DN setting.
  • Page 380 Renumbering DNs N0008589 3.3...
  • Page 381: Configuring Dns Using The Wizards

    Chapter 14 Configuring DNs using the Wizards Wizards are used to make telephone configuration faster and more convenient, especially for sites where most of the telephones have the same programming. Each record still may require some adjustments for individual users, but most of the tedious programming can be done using the Wizards.
  • Page 382 Editing DN Record Templates Refer to “What you need to know to fill out a template” on page 383 for a description of the information required by this Wizard. You can print out this list and insert the data you want to enter.
  • Page 383: What You Need To Know To Fill Out A Template

    Editing DN Record Templates What you need to know to fill out a template Before you fill out a template, look at the following list and determine what entries you want to include in the template. Photocopy the list and fill it out for each template you want to create. Detailed explanations of the fields can be found elsewhere in this chapter.
  • Page 384 Editing DN Record Templates Table 73 Edit DN Record Template information (Continued) Screen 5, Capabilities Refer to “Defining device capabilities” on page 417. • Do you want a second call to ring if the telephone is busy? (DND on busy): No/Yes •...
  • Page 385 Editing DN Record Templates Table 73 Edit DN Record Template information (Continued) • Do you want the telephone to have access to a Hotline (Type) None, Internal/External number? Refer to “Assigning a Hotline” on page 423. If internal . . . What is the internal number for the hotline? (Internal #) If external .
  • Page 386 Editing DN Record Templates Table 73 Edit DN Record Template information (Continued) • Do you want to determine button settings for the (Perform Button Programming) telephones? No/Yes Refer to “Programming telephone buttons” on page 432. If No, — If Set model is set to Multiple, the button programming for the selected DNs does not change.
  • Page 387: Creating Telephone Records With The Add Users Wizard

    Creating telephone records with the Add Users Wizard Creating telephone records with the Add Users Wizard Use the Add Users Wizard to change the telephony settings for DN records. You can change a single DN or a group of DNs that require the same settings. All the DN feature information can be entered when you run this Wizard, or you can indicate a pre-defined template that automatically sets up the DN features.
  • Page 388: What You Need To Know About The User

    Creating telephone records with the Add Users Wizard After you configure the DNs, review each DN record and determine if you need to change any of the other settings. Refer to the detailed programming sections to identify each field under each heading.
  • Page 389 Creating telephone records with the Add Users Wizard Table 74 Add Users wizard information (Continued) Screen 2, Per-DN settings Refer to “Assigning target lines” on page 297. • Enter the Name for each DN you are configuring. (Template Name) • If you want to create a target line, click the Show Target Lines link and fill out the line information.
  • Page 390 Creating telephone records with the Add Users Wizard Table 74 Add Users wizard information (Continued) • Do you want to be able to answer a voice call without (HF Answerback) No/Yes lifting the receiver or pressing the handsfree button on the telephone? •...
  • Page 391 Creating telephone records with the Add Users Wizard Table 74 Add Users wizard information (Continued) What is the external number for the hotline? External # Screen 7, User Preferences Note: Not all of these preferences appear for all models of telephones. Refer to “Defining user preferences”...
  • Page 392: Notes About Add Users Target Lines

    Creating telephone records with the Add Users Wizard Table 74 Add Users wizard information (Continued) If Yes, (Button XX) — The button display for the telephone appears. Blank Lines and intercom buttons will be indicated as Internal Autodial read-only and cannot be changed. Refer to External Autodial “Changing button programming in the wizard”...
  • Page 393: Figure 119 Target Line Assignments In The Wizard

    Creating telephone records with the Add Users Wizard Warning: Before you attempt to change this value, ensure that you are aware of the other settings in your system that might be affected by the change. • If you choose the Auto Assign, the wizard populates the Line field for each DN you have specified.
  • Page 394: Changing Button Programming In The Wizard

    Creating telephone records with the Add Users Wizard Changing button programming in the wizard The button programming section of the wizard only appears if a specific type of telephone has been specified in the wizard or template. The changes you make to this table will overwrite any existing programming for these telephones connected to the ports associated with the DN records that you are changing with this wizard.
  • Page 395: Notes About Programming Telephone Buttons

    Creating telephone records with the Add Users Wizard Figure 122 External autodial selection Notes about programming telephone buttons When you choose a telephone model, then choose Perform button programming on the User Preferences page, the button layout for that telephone appears. Each button can be programmed to be empty (Blank), to dial an internal or external number, or to activate a feature code.
  • Page 396: Using Remote Templates

    Using remote templates Using remote templates If you have a group of Business Communications Managers in various locations, and you want to ensure consistency of telephone programming, you can configure DN Record Templates on one system, and then access the templates from the other systems by using the Add Users Wizard. The templates can be stored on the originating Business Communications Manager or you can move the files to any HTTP web server.
  • Page 397: Saving Wizard Pages On Your Computer

    Saving wizard pages on your computer Saving wizard pages on your computer If you want to save a copy of your button settings, or the summary page to your computer as part of your Programming Record files, you can use the View Source heading under the right-click menu.
  • Page 398 Saving wizard pages on your computer N0008589 3.3...
  • Page 399: Configuring Dns For System Devices

    Chapter 15 Configuring DNs for system devices This section describes, in detail, the DN record screens that are used for configuring the telephones and equipment attached to the station modules on the Business Communications Manager screen-by-screen. Refer also to the process map (“Understanding the configuration process”...
  • Page 400: Figure 124 First And Second-Level System Dns Headings And Features

    The Unified Manager navigation tree allows you to refine details about individual telephones. You can also use these DN records instead of the Add Users Wizard (“Configuring DNs using the Wizards” on page 381) to configure telephones. For general information about the DN headings and how to decide which records you need to use, and how to alter the number, refer to the information under “Configuring DN records, an overview”...
  • Page 401: Copying Settings To Other Dns

    Copying settings to other DNs Figure 125 Headings found under typical DNXXX heading Priority call DN XXX-XXX Button programming Auto hold General User speed dial Aux ringer Name External # Allow redirect DN type Facility Redirect ring Device port Restrictions Keep DN alive Control set Set restrictions...
  • Page 402: Table 75 Copy Values

    Copying settings to other DNs The following table describes the fields that appear in the various copy screens. Choose the settings that will set up the system to copy the information you want to the DNs you specify. Table 75 Copy values Attribute Value Description...
  • Page 403: Identifying The Telephone (General Heading)

    Identifying the telephone (General heading) Caution: Caller ID set (DNXXX, Line Access, Line Assignment, Line XXX). You can only enable Caller ID Set (target lines and analog devices attached to an GASM) on a maximum of 30 telephones. If you attempt to copy an enabled setting to more than 30 sets, you will receive an error message.
  • Page 404: Table 76 General Record Values

    Identifying the telephone (General heading) Use the information in the following table to choose the general settings for the telephone. Table 76 General record values Attribute Value Description Name <up to seven alphanumeric Use this field to provide a more specific description of the telephone, characters>...
  • Page 405: Configuring Line Access

    You must program external lines and telephones with a control telephone to use the Scheduled Services: Ringing, Restriction, and Routing Services. • Nortel Networks recommends that the control telephone you assign for all telephones (DNs) is different from the control telephone you assign for the lines. •...
  • Page 406: Assigning Line Access

    Configuring line access Assigning line access The prime line for a telephone is the line that is automatically selected when a call is made from the telephone. The default for all telephones is: • Prime line: I/C (intercom) • Intercom keys: 2 Figure 127 Line access fields ISDN/DECT, 7000 and 7100 digital telephones, 2001 IP telephones do not have intercom keys Digital Doorphone: Ensure this is set to None before you install the Digital Doorphone hardware.
  • Page 407: Rules About Assigning Prime Lines

    Configuring line access Table 77 Telephone line access fields (Continued) Attribute Values Description Intercom (I/C) 0 to 8 Assign the number of intercom buttons to a telephone. keys Intercom buttons provide a telephone with access to internal and external lines, and line pools. Refer to “Assigning intercom (I/C) buttons (keys)”...
  • Page 408: Assigning Intercom (I/C) Buttons (Keys)

    Configuring line access Assigning intercom (I/C) buttons (keys) The Intercom keys attribute assigns the number of intercom buttons that display on a telephone. Intercom buttons provide access to a maximum of eight internal and/or external lines and line pools. The user presses the intercom key to answer internal calls, or to select a line or line pool to make a call.
  • Page 409: Determining Line Assignments

    Determining line assignments Determining line assignments The line assignment setting allows you to assign physical trunks and target lines to each telephone. Target lines are incoming only. Other lines can be used to both make and answer calls if they are configured to do so.
  • Page 410: Assigning Lines To Telephones

    Determining line assignments Assigning lines to telephones Follow these steps to assign lines to telephones: If you are not already in the DN record, click the telephone DN to which you want to assign a trunk or line. Choose Line access. Click on the Line assignment heading. Click the Add button.
  • Page 411: Notes About Assigning Lines To Telephones

    • Nortel Networks recommends a maximum of four line buttons per telephone. You can program more than four line buttons on a telephone by programming less than four on other sets. For example, you might program 20 line buttons on a receptionist telephone equipped as a CAP station and only two lines on all other telephones.
  • Page 412: Figure 129 7316E Display Button Assignment Protocol

    Determining line assignments handsfree buttons. Line programming will not overwrite assigned intercom, Answer DN, handsfree, or Hunt group buttons. Refer to Figure 129. Intercom buttons, on the other hand, will overwrite anything. (Figure 130) Note: You need at least two intercom buttons if you want to use the conference feature. answer DNs will also overwrite line programming, but not Intercom buttons.
  • Page 413: Figure 131 Adding An Answer Dn

    Determining line assignments Figure 131 Adding an Answer DN If you add an Answer DN, the system Line Line Line Line overwrites the button above the last assigned Answer DN. In this case, Line Line Line Line giving you one less line button. HG XX HG XX Line...
  • Page 414: Assigning Line Pool Access

    Assigning line pool access Assigning line pool access The Line pool access heading allows you to define the line pools that the telephone will be able to access. These shared pools of lines allow many users to use fewer lines for connections where dedicated lines are not practical or not desirable.
  • Page 415: Assigning Answer Dns

    Using Answer DNs Assigning Answer DNs Use these steps to assign answer DNs to a telephone: If you are not already in the DN record, click the telephone DN to which you want to assign an answer DN. Click the key beside Line access. Click on the Answer DNs heading.
  • Page 416 Using Answer DNs The portable handsets do not have answer buttons, but you can assign a single Answer DN to each handset. If you want to share a portable telephone among users, use the Call Forward feature to temporarily call forward a desk telephone DN to the handset. Warning: legacy DECT system security notice: Ensure that your DECT handset is set to answer calls manually.
  • Page 417: Defining Device Capabilities

    Defining device capabilities Defining device capabilities The Capabilities headings control how the system interacts with individual telephones, and how the telephones receive calls. The Capability heading itself has a set of feature settings, which determine how much functionality the telephone will have in terms of system features. To configure capabilities settings, refer to “Configuring the Capabilities features”...
  • Page 418: Configuring The Capabilities Features

    Defining device capabilities Configuring the Capabilities features If you are not already in the DN record, click the telephone DN to which you want to assign set capabilities. Click the Capabilities heading. Use the information in the following table to configure the telephone capabilities. Table 79 Capabilities fields Attribute Values...
  • Page 419 Defining device capabilities Table 79 Capabilities fields (Continued) Attribute Values Description Priority call N or Y Defines whether this telephone can interrupt calls or override Do Not Disturb at another telephone. Auto hold Y or N This setting determines if the system will automatically put an active call on hold if you answer or initiate another call.
  • Page 420: Line Redirection Notes

    Defining device capabilities Table 79 Capabilities fields (Continued) Attribute Values Description Auto hold for incoming N or Y N = if the telephone is active when a page comes in, the page will be put on page queue until the user hangs up Y = if the telephone is active when a page comes in, the call is automatically put on hold and the page proceeds.
  • Page 421: Assigning Call Forward

    Assigning Call Forward Assigning Call Forward The Call Forward setting under Capabilities allows you to define how the system handles calls when the call is unanswered or the line is busy. You can enter internal numbers, external numbers, and routing codes to process these calls. For instance, if your voice mail system is on a Meridian system, you would call forward unanswered calls to that number.
  • Page 422: Dpnss Notes

    Assigning Call Forward Use the information in the following table to configure the call forward settings. Table 80 Call forward fields Attribute Values Description Fwd no answer to up to 24 digits Enter the number to which you want to redirect unanswered incoming calls. Fwd no answer 2, 3, 4, 6, 10 Define the number of rings before the system forwards an unanswered call.
  • Page 423: Assigning A Hotline

    Assigning a Hotline Assigning a Hotline The Hotline heading under Capabilities allows you to define a telephone number that automatically dials when you lift the receiver or press the Handsfree button on a telephone. ISDN terminals, and legacy handsets (DECT handsets, NetVision): This feature is not supported for this equipment.
  • Page 424: Determining Analog Settings

    Determining analog settings Determining analog settings The settings for analog devices under Capabilities allow you to define general settings for equipment connected to an analog media bay module or through an Analog Terminal Adaptor (ATA2), which connects an analog device to a digital media bay module (DSM). These settings apply to analog DNs only and are available to telephone DNs in the digital telephone range with Model set to Other.
  • Page 425: Mwi Tone/Lamp Matrix

    Determining analog settings Table 83 ATA settings (Continued) Attribute Values Description ATA Dvc Modem Default: Modem Devices connected to the system through an ATA can have connectivity issues over Telephon BRI/PRI lines. To alleviate this, you can specify the type of device attached to the analog line.
  • Page 426: Setting Intrusion Controls

    Setting intrusion controls Setting intrusion controls If the break-in feature is allowed on any private network MCDN lines (PRI SL-1) assigned to the telephone, you need to define the level of intrusion for each telephone. This determines if the user can use the feature, and to what degree.
  • Page 427: Setting Swca Call Groups

    Setting SWCA call groups Setting SWCA call groups Although System-side Call Appearance (SWCA) assignments are meant to be assigned to buttons with indicators, you can assign SWCA assignments to a telephone without assigning them to buttons using the fields on this screen. This is useful if you want to use the full range of SWCA assignments.
  • Page 428: Defining User Preferences

    Defining user preferences For information about configuring SWCA button controls, refer to “Programming SWCA controls for your system” on page 471. Use button programming to assign SWCA assignments to telephone buttons with indicators. Refer to “Programming telephone buttons” on page 432.
  • Page 429: Configuring User Preferences

    Defining user preferences Configuring user preferences Use these steps to program user preferences for a telephone. If you are not already in the DN record, click the key beside the telephone DN to which you want to assign a user preferences. Click the User preferences heading.
  • Page 430: Call Log Notes

    Defining user preferences Table 86 User preference choices (Continued) Setting Values Description Dialing options Standard dial Determine how the telephone handles dialed information. Pre-dial Standard: Pick up the receiver and dial. Automatic dial Pre-dial: Dial the numbers, then pick up the receiver to allow the telephone to dial the number.
  • Page 431 Defining user preferences • indication if the call was answered and by whom • time and date of the call • number of repeated calls from the same source • name of the line on which the call came Call Log can help to •...
  • Page 432: Programming Telephone Buttons

    Programming telephone buttons Programming telephone buttons Button programming allows you to program the buttons on a telephone with internal and external autodialers and with programmed feature keys. You also can use these screens to remove programming from a button, making it blank. Assigned line, Hunt group designator, answer DNs buttons, intercom buttons, and handsfree buttons cannot be changed through these screens.
  • Page 433: Configuring Buttons From The Dn Record

    Programming telephone buttons Configuring buttons from the DN record Follow these steps to program the buttons on a telephone. If you are not already in the DN record, click the key beside telephone DN where you want to program button features. Click the key beside User preferences.
  • Page 434: Notes About Button Programming

    Programming telephone buttons Notes about button programming: • The number of available button positions, will depend on the model of telephone that you are programming. • New button programming will overwrite any memory button programming performed at the telephone by the user. Conversely, any changes to memory button programming performed by the user at the telephone, after button programming, will overwrite memory keys programmed under Button programming or CAP/KIM button programming.
  • Page 435: Button Labeling

    LAN CTE keycode before it can be used. IP telephones also have soft display labels. These feature labels can be changed under Telephony Services, General Settings, Nortel IP Terminals, Feature labels. The IP Telephony Configuration Guide describes this process in detail.
  • Page 436: 7316E Digital Phone Button Defaults

    Default button assignments 7316E digital phone button defaults The default button assignments for the 7316E depend on the template applied. Refer to your Programming Records to identify the current button programming for each telephone or group of telephones. • This telephone has individual handsfree, mute and headset buttons, located under the dialpad. Handsfree must be set to automatic for these buttons to work.
  • Page 437: 7316 Button Defaults

    Default button assignments 7316 button defaults Button mapping for the 7316 digital phone is unique. Although the button is patterned after the 7310, the 7316 does not have a second level on its upper button group. Because of this, the numbering for the 7316 is not consecutive.
  • Page 438: Button Defaults

    Default button assignments 7208 button defaults The default button assignments for the 7208 digital phones depend on the template applied. Figure 141 The 7208 button mapping 7208 default button mapping Btn # Pick-Up Target line Transfer Transfer Last No. Redial Last No.
  • Page 439: 7000 Button Defaults

    Default button assignments 7000 button defaults* Figure 142 7000 button mapping This basic-function telephone has four programmable memory keys (Figure 142) which default to the features shown in the table below. This telephone has no display and does not support features that require a speaker or a display.
  • Page 440: Ip Telephone Button Defaults

    Default button assignments IP telephone button defaults The 20XX IP telephones have fewer programmable buttons than the 7316 or 7316E digital phone, but they have access to a feature menu through the Services key (FEATURE *900) that greatly expands quick access to call features. Additionally, IP telephones support the hot desking feature, which allows the user to transfer telephone settings from one IP telephone to another to allow mobility without needing to relocate the physical telephone.
  • Page 441: 2002 Ip Telephone Button Defaults

    Default button assignments 2002 IP telephone button defaults The 2002 IP telephone has four memory buttons beside a display that provides soft labels for the buttons. This telephone also has five other programmable buttons with no display. Figure 145 2002 default button assignment 2002 default button mapping Btn #...
  • Page 442 Default button assignments Model 2001 feature buttons: • Four display buttons appear under the telephone display screen. The first button defaults to act as the Feature button (green button). The other buttons provide access to menu commands that appear on the display, as with the other types of telephones on the system. •...
  • Page 443: Wlan Ip Telephone Default Settings

    Default button assignments WLAN IP telephone default settings This handset emulates the 2004 IP telephone in how it functions. However, since it does not have memory keys with indicators, a soft display menu provides the button equivalents. These settings cannot be changed.
  • Page 444: Configuring User Speed Dialing

    Configuring user speed dialing Configuring user speed dialing Speed dial numbers allow users to dial out a number with fewer button presses than dialing out the entire dial string. User speed dial codes can be assigned to telephones using the following procedure. Click the key beside the telephone DN if you are not already in the DN record for the telephone to which you want to assign the user speed dial.
  • Page 445: Entering User Speed Dials At The Telephone

    Configuring user speed dialing Table 89 User speed dial settings Setting Values Description External # <external phone number> Enter the number the telephone will automatically dial when the user speed dial code is entered. Remember to include the access codes for the route you choose. Facility Use prime line Select the route you want the dialed number to take out of your system.
  • Page 446: Setting Up Cap Stations

    Setting up CAP stations Setting up CAP stations A CAP (Central Access Point) station acts as a central answering and monitoring point for a group or a business. You can configure quick dial numbers that allow the person at this station to monitor and answer call traffic into the group.
  • Page 447: Configuring Cap/Kim Assignment

    Setting up CAP stations You can configure a total of 12 CAP stations on a Business Communications Manager using the CAP/KIM assignment setting. Modules that have been configured like this will be referred to as eCAPs and eKIMs. Note: If you do not use CAP/KIM assignment to designate a 7316E +KIM as a CAP station, there is no set limit to the number of these combinations that you can have on your system, resources permitting.
  • Page 448: Cap/Kim Notes

    Setting up CAP stations Figure 150 CAP/KIM assignment, CAP/KIM 1 screen Type the DN for the 7316E telephone that you want to designate as a CAP station. Click on the next CAP/KIM to add another CAP station, or click elsewhere on the navigation tree to save the setting.
  • Page 449: Monitoring Telephones With The Cap Or Kim Module

    Setting up CAP stations • If a CAP/KIM module is relocated with the telephone, the settings are retained. • If you replace a legacy 7324+eCAP with a 7316E+eKIM, only the line assignments will be copied to the new telephone, but not to the eKIM. The telephone programming will revert to the default settings for other buttons.
  • Page 450: Figure 151 Programming A Cap/Kim Button

    Setting up CAP stations Click the key beside CAP/KIM button programming. The following figure shows the programming field for button 01. Figure 151 Programming a CAP/KIM button. Click the button number that you want to program. Use the information in the following table to configure button preferences. Table 90 CAP/KIM feature button programming choices Setting Values...
  • Page 451: Cold Starting The Kim To Erase Programming

    Setting up CAP stations Cold starting the KIM to erase programming If your KIM fails, or if you want to erase programming on the KIM, there are two types of cold start. Note: If you are cold starting an eKIM that has line or Hunt group assignments, the cold start will erase current programming, and insert the line appearances, starting with the top, left button.
  • Page 452: Programming Restrictions For Dns

    Programming restrictions for DNs Programming restrictions for DNs The Restrictions settings prevent callers from making certain kinds of calls from a specific telephone or from lines that are available at the telephone. You can also restrict some features. You can copy the restriction settings you program on one telephone to other telephones. TIPS: Remote access: Users dialing in from an external source are given a COS password to gain access to the system.
  • Page 453: Defining Telephone Dialing Restrictions

    Programming restrictions for DNs Defining telephone dialing restrictions Set restrictions allow you to assign a restriction filter to a telephone to prevent certain numbers from being dialed from that telephone and prevent the use of some features. Follow these steps to create or change set restrictions: If you are not already in the DN record, click the key beside the telephone DN for which you want to assign set restrictions.
  • Page 454: Setting Restriction Schedules For Telephones

    Programming restrictions for DNs ISDN terminals/cordless handsets notes: • Set lock is not supported. • Allowed last number redial is supported on some handsets. Refer to the user manual for your telephone. • Allowed saved number redial is not supported •...
  • Page 455: Defining Line/Set Restrictions

    Programming restrictions for DNs Defining line/set restrictions The Line/set restrictions settings allow you to assign a restriction filter to a specific line for outgoing calls at a specific telephone. This type of filter replaces any line or set restriction filters that can otherwise apply.
  • Page 456: Configuring Telco Features

    Configuring telco features Configuring telco features The Telco features heading allows you to program how the Business Communications Manager works with the public network or other outside features and services to supply Call Display. Figure 156 DN Telco Features fields You can copy the Telco features settings you program on one telephone to other telephones.
  • Page 457: Voice Mail Settings

    Voice Mail settings Table 93 Telco features settings (Continued) Setting Values Description Available log space <total amount of log This setting indicates the total amount of space available for call (read only) space that is logging on the system. available> Legacy DECT system note: DECT handsets display numbers for incoming calls from outside the local network, and displays the telephone name for incoming calls from internal sets.
  • Page 458 Voice Mail settings N0008589 3.3...
  • Page 459: Configuring System Settings

    Chapter 16 Configuring system settings Some settings affect all telephones in the system, which have the specific feature. This section describes the call-related Telephony services settings found under General Settings, System Speed dial and Telco features headings. TASKS: Define system-wide settings (General settings) that affect how all the telephones in the system use certain features, or perform in specific ways.
  • Page 460 (“Maximum System Speed Dials”) • system call log space (“Resetting call log space” on page 478). Nortel IP terminals IP Telephony Configuration Guide IP trunking The fields on the screen are described under “Configuring special IP trunking interoperability” on page 545.
  • Page 461: Network Name Display

    Network Services Business name Silent monitor Feature settings Access codes SWCA control Remote access packages Call log space COS passwords Nortel IP terminals DN lengths IP trunking CbC limits Timers Release reasons Direct Dial Network Services CAP/KIM assignment Silent monitor...
  • Page 462: Receiving And Sending Calling Party Name

    Network name display Table 95 Call features/interface list Interface SL-1 ETSI Euro Feature NI-2-2 PRI Custom PRI (MCDN) NI-2 BRI (PRI/BRI) ETSI QSIG Receiving Connected Name Supported Supported Supported Sending Calling Party Name Supported Supported Supported Supported Sending Connected Name Supported Supported Supported...
  • Page 463: Programming Business Name Display

    Services, General settings, IP Trunking. Programming Business name display Nortel Networks recommends that you use a blank space for the last character of the Business name to act as a separator between the Business name and telephone name.
  • Page 464 Network name display Limitations: • Due to system resource limitations, only 30 telephones can be assigned to provide alpha tagging CLID per line. Refer to table entry: Maximum CLI per Line on page 468. • If the incoming number only partially matches the CLID match length, no name displays. •...
  • Page 465: Programming Feature Settings

    Programming Feature settings Programming Feature settings The Feature settings heading allows you to program a number of features that apply to all telephones connected to Business Communications Manager. Follow these steps to define feature settings on a specific telephone: On the navigation tree, click on the keys beside Services, Telephony services, and General settings.
  • Page 466: Table 96 Set Feature Values

    Programming Feature settings Table 96 Set feature values Attribute Value Description Background music Y or N Allows you to listen to music through your telephone speaker after pressing FEATURE 86 on your telephone. A music source must be connected to Business Communications Manager or IP music must be configured.
  • Page 467 Programming Feature settings Table 96 Set feature values (Continued) Attribute Value Description Alarm set None Allows you to assign a device on which alarm messages appear when a problem has been detected in the system. DN: <number> Alarms are recorded in the Windows NT event log. Set relocation Y or N Activate Set relocation after you perform the telephone...
  • Page 468: Background And On-Hold Music Sourcing

    Society of Composers, Authors and Publishers or a similar organization if radio or TV broadcasts are transmitted through the Background Music feature of this telecommunication system. Nortel Networks hereby disclaims any liability occurring as a result of failure to obtain a license. N0008589 3.3...
  • Page 469: Answer Key Levels

    Programming Feature settings Answer key levels The following table shows what functions are provided by each level of the answer key settings. The Xs indicate the call types which will ring at answer DN telephones. Table 97 Answer keys Answer keys Basic Enhanced* Extended*...
  • Page 470: Configuring System-Wide Call Appearance Groups

    Configuring system-wide call appearance groups Configuring system-wide call appearance groups These sections describe the system wide call appearance (SWCA) feature in detail: • “Programming SWCA controls for your system” on page 471 • “How SWCA works in a call group” on page 474 •...
  • Page 471: Programming Swca Controls For Your System

    Configuring system-wide call appearance groups FEATURE *537 retrieves the oldest SWCA call. The call becomes active on the telephone that invoked the code, and the indicator on all other telephones becomes solid. FEATURE *538 retrieves the most recent SWCA call. The call becomes active on the telephone that invoked the code, and the indicator on all other telephones becomes solid.
  • Page 472: Figure 160 Setting Swca Controls

    Configuring system-wide call appearance groups On the navigation tree, click on the keys beside Services, Telephony Services, General Settings, and Feature settings. Click on SWCA Controls. The SWCA Controls screen appears in the right frame. Figure 160 Setting SWCA controls Use the values in the following table to set the SWCA controls.
  • Page 473 Configuring system-wide call appearance groups Table 98 SWCA controls (Continued) Attribute/Value Description Invoke SWCA parking by Hold Choose whether calls that are put on hold will automatically assign to a SWCA key. Y or N If you choose Y (yes) ... When the user presses Hold, the system attempts to repark the call on the current SWCA key assigned to the call, or on a free SWCA key programmed on the telephone.
  • Page 474: How Swca Works In A Call Group

    Configuring system-wide call appearance groups • 7316E+KIM digital phones can have SWCA codes assigned to the KIM module buttons. The telephone does not have to be designated as an eCAP for this functionality, since the SWCA consignments are considered feature programming, not line programming. How SWCA works in a call group The SWCA feature displays call appearances on any telephones in the system which have buttons with displays assigned for the same SWCA answer keys.
  • Page 475: Transferring Calls Between Swca Groups

    Configuring system-wide call appearance groups Figure 162 SWCA indicators, incoming call from an intercom (auto SWCA association for intercom is on) Call is answered and Call is parked on the SWCA. Call is retrieved. automatically associated to a Intercom indicator disappears and A solid indicator appears beside SWCA.
  • Page 476: Parking A Call To A Swca Key

    Configuring system-wide call appearance groups Parking a call to a SWCA key If a call is manually assigned to an SWCA key, the call automatically goes into park mode. If a call is automatically assigned to an SWCA key when it is answered, you have three choices for parking the call: Press the SWCA key the call is assigned to.
  • Page 477 Configuring system-wide call appearance groups Conference calls A conference call cannot be parked on a SWCA key. You cannot conference a call that is parked on a SWCA key. To conference such a call, you need to retrieve the call, and then put it on hold, and then create the conference.
  • Page 478: Resetting Call Log Space

    Resetting call log space Resetting call log space The Call log space heading allows you to reallocate the Call log space equally to all telephones in your system. Warning: Use this heading only if you want to allocate an equal amount of log space to all the telephones in your system.
  • Page 479: Setting System Timers

    Setting system timers Click OK to reallocate the log space and clear all user logs. Click Cancel if you do not want to clear user logs. In this case, the call log space will not be reallocated. Setting system timers The settings under Timers allows you to define a number of timed features for your Business Communications Manager system.
  • Page 480: Table 100 Timer Values

    Setting system timers The possible settings are described in the following table. Table 100 Timer values Attribute Values Description Camp timeout 30, 45, 60, 90,120, 150 Assign the number of seconds before an unanswered camped call or 180 seconds returns to the telephone that camped the call. Park timeout 30, 45, 60, 90, 120, 150, Assign the number of seconds before a parked call on an external line...
  • Page 481: Define Release Reason Levels

    Define release reason levels Define release reason levels The Release reasons heading allows you to determine the level of system reporting you require for released ISDN calls. You can choose to have no text, a simple explanation, or a detailed explanation.
  • Page 482: Configuring System Speed Dial Numbers

    Configuring system speed dial numbers Configuring system speed dial numbers The System speed dial heading accesses screens that allow you to assign speed dial codes to external numbers that can be dialed from any telephone on the system. Examples of system speed dials might include telephone numbers of regional sales offices within your organization or key customers that you call frequently.
  • Page 483: Assigning Numbers To System Speed Dial Codes

    Configuring system speed dial numbers Assigning numbers to system speed dial codes Follow these steps to create a speed dial code for quick-access to an external number: Click on the keys beside Services, Telephony services, and System speed dial. Click a Speed dial number (Speed dial # XXX). Figure 164 Undefined speed dial screen ..
  • Page 484 Configuring system speed dial numbers Table 102 Release reason values (Continued) Display Digits Y or N Y = the speed dial number displays N = the name defined for the speed dial displays If N is selected: Name <alphanumeric> In the Name field, enter the name you want to display for alpha tagging.
  • Page 485: Setting System Telco Features

    Setting system telco features Setting system telco features The Telco features commands found under the General heading allow you to define settings for voice message center numbers and outgoing name and number blocking (ONN). Task: • Set up voice message access and control strings (“Defining Voice Message Center numbers”...
  • Page 486: Setting Outgoing Name And Number Blocking

    Setting system telco features Table 103 Voice message center settings (Continued) Field Values Description Message wait <string> indicates that the voice messages have been retrieved. cancellation string This is a default NSI string for message waiting. Repeat for each center you want to identify. TIPS: •...
  • Page 487: Configuring Onn Blocking Service Codes

    Setting system telco features Programming note: Ensure that users who have access to this feature have telephones with valid OLI numbers. Refer to “Assigning line access” on page 406. Configuring ONN blocking service codes Follow these steps to configure an ONN setting: Click on the keys beside Services, Telephony services, and Telco features.
  • Page 488 Setting system telco features N0008589 3.3...
  • Page 489: Configuring Schedules

    Chapter 17 Configuring schedules This section describes the headings where you configure system-wide schedules. The information discussed in this chapter is found under the Telephony Services heading Scheduled services. Task: • Understand how to activate and deactivate schedules from a control telephone (“Turn services on and off”...
  • Page 490: Turn Services On And Off

    Turn services on and off Turn services on and off You can manage schedules from a control telephone using the feature codes shown in the table below. This section provides step-by-step instructions for turning services on and off on one-line and two-line display telephones.
  • Page 491: Overriding Services With A Control Telephone

    Defining common schedule settings Overriding services with a Control telephone The control telephone can override services turned on and off according to a schedule by entering a Services feature code, and then by selecting a different schedule. This override remains until canceled.
  • Page 492: Changing Schedule Names

    Defining common schedule settings Changing schedule names Schedules have been given default names. However, if you change the purpose of your schedules, you can also change the name to reflect this. Use these steps if you want to change the name of a schedule. Click on the Common settings key and on the Schedule names key.
  • Page 493: Changing Schedule Times

    Defining common schedule settings Changing schedule times Schedule start and stop times are set at times you are most likely to want each service to be active. Click the keys beside Services, Telephony services, and Scheduled services, and Schedule times. Click the key beside the day you want to program (for example, Monday).
  • Page 494: About Start And Stop Times

    Defining common schedule settings About start and stop times Here are some general rules about setting start and stop times: • It is only necessary to program start and stop times for schedules that are activated automatically. • The time may be entered in either 12 or 24-hour format. If the display is in English, and the hour entered is less than 13, the display prompts you to specify AM or PM.
  • Page 495: Defining Service Schedules

    Defining service schedules Defining service schedules The Scheduled services headings access records that allow you to define service by the time of day and day of week for the following services: • “Configuring ringing service” on page 496 • “Configuring restriction service” on page 499 •...
  • Page 496: Configuring Ringing Service

    Configuring ringing service Configuring ringing service At certain times or in certain situations, you may want additional telephones to ring for incoming lines. The most common use of this feature is when a security desk telephone rings for incoming lines after 5:00 p.m., a practice often called night service. Each non-auto-answer and target line can be assigned a ringing group for each schedule.
  • Page 497: Defining Ringing Service Schedules

    Configuring ringing service TIPS: You can assign any telephone on the Business Communications Manager system to a ring group. The assigned control telephone for each schedule is added to each ring group. A telephone can belong to more than one ring group. Click Save to enter the DN.
  • Page 498: Assigning Ringing Groups To Lines

    Configuring ringing service Table 107 Ringing group schedule values (Continued) Attribute Value Description Trunk answer Y or N Trunk answer allows you to answer, from any telephone, an external call that is ringing at another telephone in your office if the Ringing Service is active on that line at the time of the call.
  • Page 499: Configuring Restriction Service

    Configuring restriction service Table 108 Ringing group schedule line values (Continued) Attribute Value Description Aux ringer Y or N This variable indicates whether the auxiliary ringer (if installed) also rings when Ringing service is on. TIPS: • The default ringing telephone is 221 (Start DN). This means that all lines ring at telephone 221 when Ringing service is on.
  • Page 500: Notes About Restriction Service Filters

    Configuring restriction service Table 109 Restriction schedule values Attribute Value Description Service setting Off Off prevents the service from being activated. Auto Manual Auto allows you to program a stop and start time for a service under the Common Settings heading. These times are then automatically executed when the service is active.
  • Page 501: Configuring Routing Service

    Configuring routing service Configuring routing service Routing service allows you to assign alternate routes to calls. You can take advantage of lower costs available on selected routes for some days and at some times. You can also use this service to set up overflow routing, to allow calls that come into line pools that have no available lines to be answered through an alternate line pool.
  • Page 502 Configuring routing service Table 110 Routing service schedule values (Continued) Attribute Value Description Overflow routing Y or N If all the lines used by a route are busy when a call is made, you can program Routing service to overflow to the route used for normal mode. If this happens, the telephone sounds a warning tone and displays the message Expensive .
  • Page 503: Configuring Public Networks

    Chapter 18 Configuring public networks This section describes the ways of networking Business Communications Managers across a public network. Different countries have different trunk types, therefore, these descriptions are also region based. Refer to “Media bay module availability by region” on page 837 for more information.
  • Page 504: Callers Using Business Communications Manager

    Simple networking Callers using Business Communications Manager These callers can: • call directly to a specific telephone • select an outgoing line to access a private network • select an outgoing line to access features that are available on the private network •...
  • Page 505: Dialing Plans For T1 Lines

    Dialing plans for T1 lines Dialing plans for T1 lines Business Communications Manager has a routing feature that allows you to set up a coordinated dialing plan with other systems in the public network. The goal is to have a network-wide dialing plan where all telephone numbers are unique and of a uniform length.
  • Page 506: Destination Code Numbering In A Network

    Dialing plans for T1 lines Figure 179 Routing service record: Destination code Routing service (continued) Dest code (Services: Routing Services: Dest Codes Service Schedule Normal Schedule DestCode Use route Absorb 1sr route Absorb 2nd route Absorb 3rd route Absorb Length Length Length Length...
  • Page 507: Other Programming That Affects Public Networking

    Other programming that affects public networking Other programming that affects public networking Besides the line programming, these topics cover other areas that affect how calls are sent or received over the public network. • “Controlling access into the system” on page 293 (Public Received Number Length, Target lines and remote access) •...
  • Page 508 Other programming that affects public networking N0008589 3.3...
  • Page 509: Configuring Private Networks

    Chapter 19 Configuring private networks This section describes the basic requirements for private networking Business Communications Managers. As well, four simple private networks are described. Private networking using the MCDN protocol is described in “Configuring private networks with SL-1 MCDN” on page 523 “Configuring ETSI QSIG and DPNSS network services”...
  • Page 510: Private Networking Protocols

    You must purchase and install these keycodes before you can create any of the networks described in this chapter. Consult with your Nortel Networks distributor to ensure you order the correct keycodes for the type of network you want to create.
  • Page 511: Lines Used For Networking

    Private network programming parameters Lines used for networking External (trunk) lines provide the physical connection between Business Communications Manager and other systems in a private or public network. The Business Communications Manager numbers physical lines from 061 to 233/240. Default numbering depends on the trunk module positioning within the Business Communications Manager.
  • Page 512: Using Routing To Create Networking

    Using routing to create networking Using routing to create networking By properly planning and programming routing tables and destination codes, an installer can create a numbering plan where T1 E&M lines between Business Communications Manager systems are available to other systems in the network The following figure shows a network of three Business Communications Manager systems.
  • Page 513: Table 112 E And M Routing For A Business Communications Manager Network

    Using routing to create networking Table 112 E and M routing for a Business Communications Manager network New York office: Parameter Setting Trunk/Line Data Network line (external) Line 061 T1 E&M Answer Mode Auto Line type Pool H Target line (internal) Line 241 Target line Private Received #...
  • Page 514 Using routing to create networking Table 112 E and M routing for a Business Communications Manager network (Continued) Santa Clara office: Parameter Setting Network line (external to New York) Line 091 T1 E&M Answer Mode Auto Line type Pool M Network line (external to Santa Clara) Line 092 T1 E&M...
  • Page 515 Using routing to create networking Table 112 E and M routing for a Business Communications Manager network (Continued) Toronto office: Parameter Setting Trunk/Line Data (external) Line 093 T1 E&M Answer Mode Auto Line type Pool N Target line (internal) Line 300 Target line Private Received # 6221...
  • Page 516: Using Shared Line Pools To Create A Network

    Using shared line pools to create a network Using shared line pools to create a network Using shared line pools is a powerful and efficient way to create a coordinated dialing plan for a small network. If the Business Communications Manager systems are close to each other geographically, you can conserve resources by not duplicating long-distance access.
  • Page 517: Figure 181 Network Example Using Shared Line Pools

    Using shared line pools to create a network Figure 181 Network example using shared line pools Network # 5234 Network # 6334 Received # 234 Received # 334 Internal # 234 Internal # 334 System B System A T1 E&M Pool A (5) Pool A (6) Pool B (8)
  • Page 518: Table 113 Creating A Coordinated Dialing Plan Using Line Pools

    Using shared line pools to create a network The following table shows the system coding for each system to set up a line pool-based coordinated dialing plan. Table 113 Creating a coordinated dialing plan using line pools Route from System A to: System Lines, Trunk/Line Data Assign lines that connect with...
  • Page 519: Pri Networking Using Call-By-Call Services

    PRI networking using Call-by-Call services PRI networking using Call-by-Call services The example shown in the following figure highlights the use of PRI Call-by-Call services. It shows two offices of a company, one in New York and one in Toronto. Each office is equipped with a Business Communications Manager system and a PRI line.
  • Page 520: Table 114 Pri Call-By-Call Services Routing Information

    PRI networking using Call-by-Call services two T1 spans. With PRI Call-by-call services, the only limitation is that there are no more than 23 calls in progress at any one time. The dialing plan at each Business Communications Manager site is configured to determine the call type based on the digits dialed by the user.
  • Page 521 PRI networking using Call-by-Call services Table 114 PRI call-by-call services routing information (Continued) New York office: Parameter Home System Settings Hardware Protocol NI-2 Trunk/Line Data Line 245 Target line Private/Public Received # 6221 Line Access DN 6221 L245:Ring only Line pool access Line pool PRI-A Routing Services Private Network...
  • Page 522 PRI networking using Call-by-Call services N0008589 3.3...
  • Page 523: Configuring Private Networks With Sl-1 Mcdn

    Chapter 20 Configuring private networks with SL-1 MCDN This section describes how to network Business Communications Managers together in a private network using PRI SL-1 lines with or without the MCDN protocol. When Business Communications Managers are networked with other call services, such as Meridian 1, using the MCDN protocol, the network can also support centralized voice mail.
  • Page 524: System Numbering Plans

    System numbering plans System numbering plans Both these types of networks require similar setups for dialing plans and routing. Each node must have a way to route external calls to the adjacent node or nodes. To do this, all nodes must have the same Private DN lengths.
  • Page 525: Calls Originating From The Public Network

    Creating tandem private networks In this type of network, you must ensure that each Business Communications Manager system, known as a node of the network, is set up to route calls internally as well as to other nodes on the system.
  • Page 526 Creating tandem private networks Table 115 Call originating from the public network to a tandem network (Continued) Received Destination Description Node A Node E User in Calgary dials a 765-xxxx number. DN type: Public Node A receives it and identifies it as being for B. Uses private trunk to route call to B. Incoming interface: Public Destination: Remote node Outgoing interface: Private...
  • Page 527 Creating tandem private networks Table 115 Call originating from the public network to a tandem network (Continued) Received Destination Description Node A Node D User in Calgary dials a 761-xxxx number which is answered with DISA. Incoming interface: Public DN type: Public Destination: Local (DISA DN) User enters a COS password and a private DN for Node D, i.e.
  • Page 528: Calls Originating In The Private Network

    Creating tandem private networks Calls originating in the private network The following table describes who each node handles calls originated in the public network. Table 116 Calls originating from the private network within a tandem network Received Destination Description Node B Node B DN is internal, therefore no trunk routing is required.
  • Page 529 Creating tandem private networks Table 116 Calls originating from the private network within a tandem network (Continued) Received Destination Description Node B Node C User on Node B dials a private DN for a user on C. DN type: Private Node B recognizes it as being the responsibility of Node A and routes the call over the private trunk to A.
  • Page 530: Routing For Tandem Networks

    Creating tandem private networks Table 116 Calls originating from the private network within a tandem network (Continued) Received Destination Description Node B Node F User on B dials a private DN for node F. DN type: Private Node B identifies it as being for node A and uses private trunk to route the call to A. Incoming interface: Intercom Destination: Remote node Node A receives it and identifies it as being for C.
  • Page 531: Table 118 Node A Destination Code Table, Internal Termination

    Creating tandem private networks Table 118 Node A destination code table, internal termination Route Absorb length Destination code (private DNs) 3 (Node B) 392 (Node B) 3 (Node B) 395 (Node E) 5 (Node C) 393 (Node C) 5 (Node C) 394 (Node D) 5 (Node C) 396 (Node F)
  • Page 532: Understanding Mcdn Network Features

    Understanding MCDN network features Understanding MCDN network features When you connect your Business Communications Manager systems through an SL-1 and use the MCDN protocol, your network provides a number of network call features. You can use this protocol to network other Business Communications Manager systems, such as the tandem system, shown in the previous section, Norstar systems, or Meridian 1 systems.
  • Page 533: Figure 184 Network Call Redirection Path

    Understanding MCDN network features Figure 184 Network call redirection path Meridian 1 with Meridian Mail Business Communications Manager SL-1 MCDN Telephone A Original call Telephone B Call forwarded to Meridian Mail If you are using the centralized voice message system from a Meridian 1 system, you require the following programming on the M1: M1 programming in LD 17 •...
  • Page 534: Isdn Call Connection Limitation

    Understanding MCDN network features ISDN Call Connection Limitation The ICCL feature piggybacks on the call initiation request and acts as a check at transit PBX points to prevent misconfigured routes or calls with errors from blocking channels. This feature adds a transit/tandem counter to a call setup message. This counter is compared at each transit PBX with a value programmed into the transit PBX, in a range from 0 to 31.
  • Page 535: Trunk Route Optimization

    Understanding MCDN network features Trunk Route Optimization TRO finds the most direct route through the network to send a call between nodes. This function occurs during the initial alerting phase of a call. Business Communications Manager configurations: • Under Network Services, MCDN, set TRO to Y(yes). •...
  • Page 536: Trunk Anti-Tromboning

    Understanding MCDN network features Trunk Anti-tromboning TAT is a call-reroute feature that works to find better routes during a transfer of an active call. This feature acts to prevent unnecessary tandeming and tromboning of trunks. TIPS: This feature is not applicable for alerting calls. Business Communications Manager configurations: •...
  • Page 537: Using Sl-1 With Mcdn To Network With A Meridian System

    Using SL-1 with MCDN to network with a Meridian system Using SL-1 with MCDN to network with a Meridian system When you connect your Business Communications Manager systems through the SL-1 MCDN protocol to a Meridian 1, the Meridian system manages several aspects of the network, including voice mail, auto attendant services, and system timing.
  • Page 538: Software Requirements

    Using SL-1 with MCDN to network with a Meridian system Note: For MCDN over VoIP trunks, the Meridian uses the IPT trunk card (introduced in BCM 3.5). Both systems must have remote gateways pointed to correct system types and protocols. Refer to the IP Telephony Configuration Guide for information about Remote Gateways for the Business Communications Manager system.
  • Page 539: Udp-Specific Programming

    Using SL-1 with MCDN to network with a Meridian system Note: If you have public DNs set up for your telephones that are different from the system-assigned DN, each telephone would need two target lines to accommodate both public and private networks. •...
  • Page 540: Cdp-Specific Programming

    Using SL-1 with MCDN to network with a Meridian system CDP-specific programming Business Communications Manager CDP programming • Private Dialing Plan: Private Type=CDP Access Code <unique code>. • Private DN length <system DN length> • <number assigned from M1 LD 16, RDB - PNI in M1 (1-128)>...
  • Page 541: An Example Of A Private Network With Meridian 1

    Using SL-1 with MCDN to network with a Meridian system An example of a private network with Meridian 1 The following figure shows a private network composed of one central Meridian 1, and two sites with Business Communications Manager systems all connected by SL-1, with MCDN activated on all sites.
  • Page 542: Table 122 Module Settings For Mcdn Network

    Using SL-1 with MCDN to network with a Meridian system Note that the Private Network Identifier (PNI) is programmed at each end of the links. The PNI identifies the Business Communications Manager to the Meridian 1 system. Routing is set up such that network calls are made by dialing a four-digit private network DN. For example, if a user in the west end branch wishes to call a user in the east end branch within the private network, they dial 6221.
  • Page 543: Table 124 Network Routing Information

    Using SL-1 with MCDN to network with a Meridian system Table 123 MCDN dialing plan settings (Continued) East End office: Dialing Plan programming Type Private Network ID Location Code <unique three digits> (becomes part of destination code) Private DN Length Public DN Length Business Communications Manager routing information: The following table lists the lines and routing information required to set up the network shown in...
  • Page 544: Voip Networking

    VoIP networking Table 124 Network routing information (Continued) East End office: Trunk/Line Data Line 245 Target line Private Received # 6221 Line Access DN 6221 L245:Ring only Line pool access Line pool PRI-A Routing Services Private Network Public Network Head Office to West End Route Dial out # No number...
  • Page 545: Configuring Special Ip Trunking Interoperability

    VoIP networking Configuring special IP trunking interoperability Under Services, Telephony Services, General settings, IP trunking, there are four fields that may need to be filled out to specify specific parameters of the VoIP trunk between your system and a system such as Meridian 1 or Succession 1000/M, which may have special network requirements, such as Bandwidth Management or zone dialing.
  • Page 546 VoIP networking Table 125 IP trunking interoperability fields (Continued) Field Value Description Virtual Private Network ID <digits> Default:0 This is the VPN ID for a remote system, such as Succession 1000/M. In some applications, such as for the Survivable Remote Gateway (SRG) acting as a Branch Office, this ID is required to ensure that Bandwidth Management is handled correctly for calls coming into the Succession 1000/M from your system.
  • Page 547: Configuring Etsi Qsig And Dpnss Network Services

    Chapter 21 Configuring ETSI QSIG and DPNSS network services This section describes the network services for ETSI QSIG and DPNSS private networks. ETSI-QSIG and DPNSS private networking is configured in the same way as described in “Configuring private networks with SL-1 MCDN” on page 523.
  • Page 548: Networking With Etsi Qsig

    Networking with ETSI QSIG Networking with ETSI QSIG (International systems only) ETSI QSIG is the European standard signaling protocol for multi-vendor peer-to-peer communications between PBX systems and/or central offices. Other information in this section: “ETSI Euro network services” on page 549 The following figure illustrates an ETSI QSIG network.
  • Page 549: Etsi Euro Network Services

    ETSI Euro network services The following table lists the settings for some of the hardware parameters for ETSI QSIG networking example shown above. Table 126 Hardware programming for branch offices West End office: East End office: Hardware DTM/BRIM PRI/BRI Hardware DTM/BRIM PRI/BRI programming...
  • Page 550: Table 127 Etsi Network Values

    ETSI Euro network services Table 127 ETSI network values Attribute Values Description Netwrk Diversion Y or N Allows you to choose if you want to allow calls to be redirected to an outside network. MCID Y or N Malicious Call Identification If you set this feature to Y, the called party can use FEATURE 897 to request the network to record the identity of an incoming call.
  • Page 551: Dpnss 1 Services

    DPNSS 1 services DPNSS 1 services The Digital Private Network Signaling System (DPNSS 1) is a networking protocol enhancement that extends the private networking capabilities of existing Business Communications Manager systems. It is designed to offer greater centralized functionality for operators, giving them access to Business Communications Manager features over multiple combined networks.
  • Page 552: Dpnss To Embark Connections

    DPNSS 1 features • These remote access features are supported on DPNSS: DDI, line pool access code, destination Codes and remote page feature codes. Software Keys are required to enable DPNSS 1. DPNSS to Embark connections DPNSS lines connected to an Embark switch perform call redirection/diversion using the Call Forward feature to create a tandem link back to the switch.
  • Page 553: Three Party Service

    Note: Three Party Service is supported on 7000 digital phones, but in a receive-only fashion. These telephone types cannot initiate Three Party Service. For more information about these telephone types, see the Nortel Networks Digital Phone 7000 User Card. Using the diversion feature Diversion is a DPNSS 1 feature for Business Communications Manager that allows users to forward their calls to a third party on the DPNSS 1 network.
  • Page 554: Restrictions By Telephone Type

    DPNSS 1 features • Diversion On No Reply diverts calls that go unanswered after a specified amount of time. This feature is programmed in the Unified Manager. • Bypass Call Diversion overrides all call forward features active on a telephone over a DPNSS line.
  • Page 555: Using The Redirection Feature

    DPNSS 1 features Using the Redirection feature Redirection is a DPNSS 1 feature similar to Business Communications Manager Transfer Callback. Redirection lets a call awaiting connection, or re-connection, be redirected by the originating party to an alternate destination after a time-out period. Failed calls can also be redirected.
  • Page 556: Restrictions By Telephone Type

    DPNSS 1 features Restrictions by telephone type • ATA2/GASM—supported • ISDN—not supported • Portables—not supported The telephone receiving the intrusion displays Intrusion Call. A warning indication tone will sound after intrusion has taken place, and the standard conference call tone will sound every 20 seconds.
  • Page 557: Call Offer

    DPNSS 1 features Call offer Call Offer over DPNSS 1 allows a calling party to indicate to the wanted party that there is an incoming call available, even though there is no answer button available to present the call on the telephone.
  • Page 558: User Actions

    DPNSS 1 features User actions The party receiving a Call Offer has three choices: • Ignore it. After a programmed time interval, the Offer request is removed. • Reject it. If the user activates Do Not Disturb on Busy (DND) when the Call Offer request is made, the request is removed from the telephone.
  • Page 559: Loop Avoidance

    Private networking with DPNSS Loop avoidance Errors in the configuration of a network may make it possible for a call to be misrouted, and arrive at a PBX system through which it has already passed. This would continue, causing a loop which would eventually use up all of the available channels.
  • Page 560: Table 128 Calling Numbers Required For Dpnss Network Example

    Private networking with DPNSS Calls are dialed and identified to the system as follows: • To reach a telephone inside the Private Network, at the Business Communications Manager site, the user dials the DN of choice. • To reach a telephone inside the Private Network, from another site, the user dials HLC + DN. •...
  • Page 561: Figure 191 Dpnss Networking

    Private networking with DPNSS Figure 191 DPNSS networking Private Network DPNSS DPNSS Terminating Business Communications Business Communications Manager Site C Manager Site A DN # 3333 DN # 111 LOC #496 LOC # 244 DPNSS DPNSS Meridian M1 LOC # 563 Business Communications Business Communications Manager Site B...
  • Page 562: Guidelines For Creating A Private Numbering Plan With Dpnss

    Private networking with DPNSS Guidelines for creating a private numbering plan with DPNSS Use the following guidelines when creating a private numbering plan with DPNSS. • When creating HLCs for the nodes in your system, avoid numbering conflicts between network nodes and internal DNs, Hunt group DNs. •...
  • Page 563: Configuring Centralized Voice Mail

    Chapter 22 Configuring centralized voice mail This section describes how to set up the Business Communications Manager to support centralized voice mail or call attendant over a private network. The Business Communications Manager supports voice mail configuration either from the local source or by accessing a remote voice mail system located on another Business Communications Manager or attached to a Meridian 1 system.
  • Page 564: Business Communications Manager As Host

    Business Communications Manager as host Business Communications Manager as host A Business Communications Manager that acts as a central voice mail location must be running at least BCM version 3.5 or newer software. Other systems on the network can be running older software, as long as that software supports MCDN.
  • Page 565: System Set Up For Host Business Communications Manager

    System set up for host Business Communications Manager Refer also to “System set up for satellite systems” for specific call features available from a Meridian 1-based voice mail system. System set up for host Business Communications Manager The Business Communications Manager that hosts the voice mail needs to ensure that incoming calls are directed to the voice mail service.
  • Page 566: System Set Up For Satellite Systems

    System set up for satellite systems VoIP networking note: If you are using H.323 VoIP trunks for central voice mail, you need to set the following: • Ensure that the local gateway protocol is set to SL-1 or CSE (BCM 3.0 or newer software), based on the version of the satellite systems.
  • Page 567 System set up for satellite systems Configuring the telephone records: Click on the keys beside System DNs, Active set DNs, DN YYY (the telephone you associated with the voice mail target line), Line access, Line assignment. 10 Click on Line XXX (the target line you programmed for the telephone. 11 Set the Vmsg set field to Y (yes).
  • Page 568: Configuring The System For Centralized Voice Mail

    Configuring the system for centralized voice mail Configuring the system for centralized voice mail MCDN is supported over a PRI (SL-1) line or VoIP trunks between your Business Communications Manager and other systems, such as a Meridian 1, Norstar, or other Business Communications Managers.
  • Page 569: Meridian Mcdn Call Features Over Pri Sl-1 Lines

    MIK and MCK message indicators on the Meridian telephones. This feature works for both Nortel and third-party voice mail systems. Messages are received at a centralized location, to a pre-determined telephone, where they are processed and forwarded to the target telephone.
  • Page 570 Meridian MCDN call features over PRI SL-1 lines Programming notes Business Communications Manager programming M1 programming To select Remote Capability for MWI on a per-loop basis for PRI: 1. Disable the PBX D-channel associated with IPT (LD96). Resources, Media Bay Modules, Bus XX, Modules on bus, Module X: 2.
  • Page 571: Camp-On

    Meridian MCDN call features over PRI SL-1 lines Camp-on A call received by the Meridian attendant can be assigned to a telephone anywhere in the MCDN network, when the following situations are valid: • the target telephone rings busy when the attendant calls •...
  • Page 572: Break-In

    Meridian MCDN call features over PRI SL-1 lines Break-in The Meridian attendant can use the break-in feature to interrupt an on-going call from a telephone in the Business Communications Manager system. The following figure demonstrates the call path for a Meridian attendant to break into a call between telephones in the Business Communications Manager system.
  • Page 573: Configuring Mwi On Dpnss 1 Networks

    Configuring MWI on DPNSS 1 networks How the intrusion hierarchy works: — Break-in is allowed if Attendant telephone is High and caller telephone is Medium. — Break-in is not allowed if Attendant telephone is Medium and caller telephone is high. Configuring MWI on DPNSS 1 networks Message Waiting Indication (MWI) is a DPNSS 1 feature for Business Communications Manager Call Services.
  • Page 574: Figure 195 Telco Features Voice Message Center

    Configuring MWI on DPNSS 1 networks To assign a message center: Click the keys beside Services, Telco Features. Figure 195 Telco features Voice message center Click Voice message center numbers. Choose a Voice message center: 1 to 5. The existing telephone (DN) for Message Waiting appears if available, as Tel#:XXXX. Type the new target number, starting with an access code, if required, or None.
  • Page 575: Programming Mwi And Mwc

    Configuring MWI on DPNSS 1 networks Programming MWI and MWC MWI and MWC information is received from the network in the form of NSI strings. The NSI strings in DPNSS are dependent on the supplier of the PBX. Therefore, the strings vary depending on the originating PBX system.
  • Page 576: Setting Message Waiting Indication

    Configuring MWI on DPNSS 1 networks Setting Message Waiting Indication Follow these steps to set the MWI: Ensure that you have programmed a telephone to access target lines for receiving messages. For information on access to target lines, refer to “Assigning message centers to a line”...
  • Page 577: Configuring Hunt Groups

    Chapter 23 Configuring Hunt groups This section explains how to create hunt groups using the Hunt Group headings in the Unified Manager. Hunt groups are designed to provide a service where incoming calls appear on a targeted group of telephones called a Hunt group (“How to use Hunt groups”...
  • Page 578: How To Use Hunt Groups

    How to use Hunt groups How to use Hunt groups You can use hunt groups to route calls to a support service such as a Help Line for a software company. For example, specialists handling Product A can be in one group, and specialists handling Product B can be in another group.
  • Page 579: Identifying A Hunt Group

    Identifying a Hunt group Identifying a Hunt group When you first set up a Hunt group, you need to identify how a call will be handled among the group. Click the keys beside Services, Telephony Services, and Hunt groups. Click on a Hunt group (Hunt group 1-30). The Hung group ## screen appears in the right frame.
  • Page 580 Identifying a Hunt group Table 132 Hunt group settings (Continued) Field Values Description Mode (continued) Refer to “Hunt group modes” Linear—rings the first telephone in the hunt group list. If that on page 581 telephone is busy, the system continues down the hunt group priority list until a non-busy telephone takes the call.
  • Page 581: Hunt Group Modes

    Identifying a Hunt group Table 132 Hunt group settings (Continued) Field Values Description Name <an alpha-numeric string Provides a unique name for the Hunt Group. The default is HGxx, naming the Hunt Group> where xx is the Hunt Group number 01-30. Aux ringer Y or N Defines whether an auxiliary ringer (if installed) rings for incoming...
  • Page 582: Figure 201 Linear Call Mode

    Identifying a Hunt group Figure 201 Linear call mode " " Call A " " Incoming Call B answered Call A call answered Call B (This telephone was busy when Call A came in, but was free when call B came in) Figure 202 Rotary call mode Answers call B Call A...
  • Page 583: Hunt Group Members

    Hunt group members Hunt group members After you determine the hunt group, you then assign members to the group. This section includes information about: • “Adding a Hunt group member” on page 583 • “Moving members” on page 585 The following limitations apply to adding member DNs to a Hunt Group: •...
  • Page 584: Removing A Hunt Group Member

    Hunt group members Figure 203 Hunt group XX screen Choose the Appearance type to define how the call appears on the set. Table 133 Hunt group member settings Field Values Description (read-only) The DN of the telephone designated as this member of the hunt group. Appearance type Appr&Ring Appr&Ring (default): The call number appears on the display and the...
  • Page 585: Moving Members

    Hunt group members Moving members Member order within a Hunt group is important. The member order determines how a call routes through a Hunt group when the group is set to either linear or rotary mode. To move a member within a Hunt group: Click on the keys beside Services, Telephony Services Hunt groups.
  • Page 586: Programming Hunt Group Lines

    Programming Hunt group lines DN 225 moved to Member 001 Programming Hunt group lines Multiple lines can be assigned to Hunt groups. However, a line can only exist in one Hunt group. When you assign lines to Hunt groups, you must ensure that there is no interruptions to the call before the Hunt group DN handles the call.
  • Page 587: Assigning A Line To A Hunt Group

    Programming Hunt group lines Assigning a line to a hunt group Assign the lines that you want calls to come in on: Click on the keys beside Services, Telephony Services Hunt groups. , and Click the key beside the Hunt group (Hunt group 1-30). Click Line Assignment.
  • Page 588: Feature Operation Within Hunt Groups

    Feature operation within Hunt groups Feature operation within Hunt groups The operation of some features varies if the Business Communications Manager telephone is part of a Hunt group. The following table shows the affected features. Table 134 Hunt group feature operation Feature Description Call Forward All Calls...
  • Page 589: Monitoring Hunt Groups

    Monitoring Hunt groups Monitoring Hunt groups The Business Communications Manager system offers two ways to monitor hunt group activity. You can use Silent Monitor (“Setting up Silent Monitoring” on page 589) to actively monitor current calls or you can use the Hunt Metrics tables (“Using Hunt group metrics”...
  • Page 590: Using Silent Monitor

    Monitoring Hunt groups Security Note: Change the password regularly. Using Silent Monitor You can set up a number of two-line telephones on your system to use as supervisory telephones to monitor active hunt group calls from external numbers. Only telephones that have been designated as monitoring devices have access to the FEATURE *550 code, which activates the monitoring session.
  • Page 591: Using Hunt Group Metrics

    Monitoring Hunt groups Using Hunt group metrics The Hunt Group Metrics tables are located under Diagnostics, Service Metrics in the Unified Manager. Each Hunt group has a separate listing of group data that gives you a quick overview of activity and potential trouble spots. To access these screens: Click on the keys beside Diagnostics, Service Metrics, and Hunt Group Metrics.
  • Page 592 Monitoring Hunt groups N0008589 3.3...
  • Page 593: Configuring Hospitality Services

    Chapter 24 Configuring Hospitality Services This section describes the Hospitality headings. These records allow facilities such as hotels, motels, and hospitals to control telephone access to external lines, to provide alarm clock services on internal telephones, and to monitor room serviced status. Tasks: •...
  • Page 594: About The Hospitality Feature

    About the Hospitality feature About the Hospitality feature In a temporary room occupancy setting, such as hotels or hospitals, guests gain improved services through immediate access to basic functions like: • wake-up services or reminders via alarms on the room telephones •...
  • Page 595: Power Failures

    Setting up Hospitality services Power failures If the Business Communications Manager system experiences a power failure, the failure can result in lost Alarm times. When the Business Communications Manager system resumes running, and the system time resets, the missed Alarm times alert. Setting up Hospitality services The Hospitality heading allows you to enter the time when occupied rooms change state from Service done to Service required.
  • Page 596: Identifying Room Telephones

    Identifying room telephones Identifying room telephones The Set/room settings allow you to assign one or more telephones to a room. This menu also enables access control to hospitality administrative features. Under the Hospitality heading, click on the key beside Set/room settings. Click on the key beside Active sets if you are configuring a telephone that has already been set up.
  • Page 597: Identifying Call Permissions

    Identifying Call Permissions Identifying Call Permissions The Call Permissions heading allows you to define dialing filters for room telephones based on the room occupancy status. The dialing filters are standard Business Communications Manager Restriction filters (Filters 00-99). For more information, refer to “Defining restriction filters”...
  • Page 598: Programming Alarm Data

    Programming Alarm data Programming Alarm data The Alarm data heading allows you to program how the system provides alarms to the room telephones. It also allows you to define how to be notified when an alarm expires (“Configuring for expired alarms”...
  • Page 599: Configuring For Expired Alarms

    Programming Alarm data Configuring for expired alarms The Expired alarms setting allows you to program the system to notify a specific telephone whenever a Hospitality alarm expires. This occurs when the maximum number of alarm attempts has occurred and the alarm is cancelled without the user responding. You can also choose to allow a caller to hear a tone when an alarm expires.
  • Page 600: Using The Hospitality Services Admin Telephone

    Using the Hospitality Services Admin telephone Using the Hospitality Services Admin telephone The front desk personnel can control alarms and from a two-line display administration telephone. The following procedures are available to the users on the Hospitality User Card. The following sections describe these processes: •...
  • Page 601: Setting The State Of A Room At A Telephone

    Using the Hospitality Services Admin telephone Setting the state of a room at a telephone To access the Room Occupancy feature and assign the state of a room set: Press FEATURE 879 on a two-line display telephone. If configured, the display shows Password: Enter the Desk admin password.
  • Page 602: Using The Hospitality Services Room Telephone

    Using the Hospitality services room telephone Using the Hospitality services room telephone The room telephones can be used by cleaning staff and guests to set alarms and room states. This section describes these codes and the process for using them. •...
  • Page 603: Change Or Cancel An Alarm Time

    Using the Hospitality services room telephone To program the Alarm time feature on an analog telephone: Press FEATURE 875. A tone sounds. Enter a four-digit alarm time. When using the 24-hour clock format (hour: 00 to 23 and minutes: 00 to 59), a tone sounds. When using the 12-hour format, press * to select am, or # to select pm.
  • Page 604: Setting The Room Condition

    Using the Hospitality services room telephone Setting the Room condition The Room condition (RC) feature allows users to exchange information about the serviced state of a room. Cleaning or maintenance personnel access the system database from a room telephone to: •...
  • Page 605: Configuring The Music Source

    Chapter 25 Configuring the music source The Music on Hold and Background Music features provide music to users. For these features to function properly, a music source must be connected to the Business Communications Manager. There are three ways you can connect the music source to the Business Communications Manager: •...
  • Page 606: Selecting The Music Source

    Selecting the music source Selecting the music source After you have connected the music source, you must select the music source you want to use. On the navigation tree, click the Services key and click the IP Music heading. The Summary screen appears. Configure the IP Music Summary parameters according to the following.
  • Page 607: Configuring Bcmamp

    Configuring BcmAmp Configuring BcmAmp BcmAmp is an audio player that resides on the Business Communications Manager. If you choose to use BcmAmp, you must configure the play list, which is the music available to BcmAmp. Configuring the play list involves: •...
  • Page 608: Restrictions On Uploading Files

    Configuring BcmAmp If you want to assign a name to this sound file, enter the name in the As box. This name appears on the File List to help identify the sound file. Click the Go link. The file is added to the File List. Repeat steps 3 to 7 for each sound file you want to add to Business Communications Manager.
  • Page 609: Adding Music To The Play List

    Configuring BcmAmp Adding music to the Play List The play list is an ordered list of songs that are heard by users of the Background Music and Music On Hold features. To add a sound file to the Play List: Start the BcmAmp Administration application.
  • Page 610: Using The Bcmamp Player

    Configuring BcmAmp Using the BcmAmp Player The BcmAmp Player is a web based interface that allows you to select, play, stop, or pause sound files that appear on the Play List. To access the BcmAmp Player: Start the BcmAmp Administration application. Click the BcmAmp Player link.
  • Page 611: Configuring A Network Device To Be The Ip Music Source

    Configuring a Network Device to be the IP Music Source To play a sound file, click the Play button. To stop a sound file, click the Stop button. To pause a sound file, click the Pause button. Configuring a Network Device to be the IP Music Source To configure a Network Device to be the IP Music source: On the navigation tree, click the Services key and click the IP Music heading.
  • Page 612 Configuring a Network Device to be the IP Music Source Press the Tab key to save your changes. Note: If you make any changes on the Network Device or Advanced Network screens, you must disable and then re-enable the IP Music service for the change to be recognized by Business Communications Manager.
  • Page 613: Configuring The Msc Resources

    Chapter 26 Configuring the MSC resources This section describes how to set up the resources controlled by the Media Services Card (MSC), which is the control center for voice and data traffic in the Business Communications Manager. Warning: Only system administrators should have access to these Unified Manager records.
  • Page 614: Signaling Channels

    Types of MSC resources Signaling channels Signaling channels are the communication channels used to send control signals to and from the MSC. You must have one signaling channel for each device you have connected and feature port you have enabled. The number of signaling channels you have determines how many devices you can have connected and feature ports you can have enabled on your system.
  • Page 615: Rules For Managing The Msc Resources

    Rules for managing the MSC resources Rules for managing the MSC resources The following rules are provided to assist you in configuring your MSC resources. • “Signaling channel rules” on page 615 • “Media channel rules” on page 615 • “DSP resources rules”...
  • Page 616: Example Of How To Estimate Peak Media Channel Usage

    Rules for managing the MSC resources • Voicemail and call center use one media channel for each active session. • A call between an IP telephone and a digital or analog telephone or a PSTN line uses a media channel for the duration of the call. •...
  • Page 617: Dsp Resources Rules

    Rules for managing the MSC resources DSP resources rules The number of DSP resources you have depends of the number of type of MS-PEC you have installed. For information about how to determine the MS-PECs you have, refer to “Viewing the MS-PEC configuration”...
  • Page 618: Media Gateways

    Determining the MSC resources you require Media gateways One media gateway is required for each call: • from an IP telephone to an analog or digital telephone • from an IP telephone using a PSTN line • from an analog or digital telephone using an IP trunk Determining the MSC resources you require The following 20 questions are designed to help determine how many MSC resources you require.
  • Page 619: Dect Mobility (Legacy System)

    Determining the MSC resources you require DECT mobility (legacy system) How many DECT media bay modules are installed? The range is 0 to 1 media bay modules. For each DECT media bay module: • add 1 to the media channel count Note: If your system also has Dial-on-Demand WAN, DECT uses one of the 27 WAN media channels, so an additional channel is not required.
  • Page 620: Ivr And Ivr Fax

    Determining the MSC resources you require IVR and IVR Fax What is the maximum number of IVR ports required? IVR ports are used for interactive voice response applications. The range is 0 to 24 ports. For each voicemail port: • add 1 to the signaling channel count •...
  • Page 621: Ip Trunks

    Determining the MSC resources you require 12 How many IP telephones specified in question 10 will be using the G.711 codec? The range is 0 to the maximum number of IP telephones selected in question 11. For each IP telephone: •...
  • Page 622 Determining the MSC resources you require 18 How many IP trunks specified in question 15 will be using the G.729 codec? The range is 0 to the maximum number of IP trunks selected in question 16. For each IP trunk: •...
  • Page 623: Record Of Required Msc Resources

    Determining the MSC resources you require Record of required MSC resources Use the following table to record the MSC resources you require for your Business Communications Manager system. To determine the resources that you require, answer the questions in “Determining the MSC resources you require” on page 618.
  • Page 624: Evaluation

    Determining the MSC resources you require Evaluation After you have answered the questions and calculated the four totals, use the following rules to determine the required Business Communications Manager configuration. Table 146 Evaluation of required Business Communications Manager configuration Resource Number required Required configuration 58 or less 2/6 DS30 split...
  • Page 625: Example Of A Business Communications Manager Configuration

    Determining the MSC resources you require Example of a Business Communications Manager configuration The following two tables provide examples of required configurations. Table 147 Example of required configuration Signaling Media Voice bus DSP resource Answer Question channels channels paths units 512 kbit/s (8) 1.
  • Page 626: Configuring The Msc Resources

    Configuring the MSC resources Configuring the MSC resources After you have determined what MSC resource you need, you can start configuring your MSC resources. This includes: • “Viewing the MSC information” on page 626 • “Viewing the MS-PEC configuration” on page 627 •...
  • Page 627: Viewing The Ms-Pec Configuration

    Out of Service: Indicates there is a hardware failure on the MS-PEC. Replace the MS-PEC with a Business Communications Manager compatible MS-PEC. • Unsupported: Indicates that the MS-PEC installed is for a different Nortel Networks product and is not compatible with Business Communications Manager. Replace the MS-PEC with a Business Communications Manager compatible MS-PEC.
  • Page 628: Understanding The Msc Minimum And Maximum Values

    Configuring the MSC resources Understanding the MSC Minimum and Maximum values The MSC Configuration allows you to determine how the resources are assigned on your Business Communications Manager. In some Business Communications Manager systems, the total number of features and devices that require resources exceeds the number of resources that are available.
  • Page 629: Viewing The Msc Configuration

    Configuring the MSC resources Viewing the MSC Configuration To view the MSC Configuration: On the navigation tree, click the Resources key and click the Media Services Card key. Click the MSC Configuration heading. The Configurations screen appears. Click the Current tab. The Current screen appears.
  • Page 630: Creating A Custom Msc Configuration

    Trunks you can use on your system. Media Gateways Media Gateways provide the connection between IP telephony devices (IP trunks, Nortel IP telephones, and H.323 terminals) and normal telephony devices (PSTN lines; 7316E, 7316, 7208s, 7100, 7000 digital phones; analog telephones etc.).
  • Page 631: Table 154 Msc Component Parameters

    Configuring the MSC resources Table 153 MSC custom configuration parameters (Continued) Component Description Voice Mail and Voice Mail and Call Center Ports are communication channels that connect users to the CallPilot ACD Ports Voicemail and Call Center Software. DSP resources are required only when a user connects to voicemail or call center. This includes callers hearing greetings, callers leaving messages, and users accessing their mailboxes.
  • Page 632: Dtmf Configuration

    You can increase the License limit of a component by entering keycodes. For information about how to obtain a keycode, contact your Nortel Networks sales representative. Hardware Limit Shows the maximum number of resources that are allowed for this component based on the hardware installed in this system.
  • Page 633: Changing The Ds30 Split

    Changing the DS30 Split Changing the DS30 Split A DS30 bus is a group of 32 signaling channel and 32 media channels. The DS30 split determines how these channels are assigned on Business Communications Manager. You have a choice of a 2/6 or a 3/5 split. If you choose a 2/6 split, two DS30 buses are assigned to the MSC and six are assigned to the Media Bay Modules.
  • Page 634: Configuring Double Density

    Configuring Double Density To change the DS30 split setting: On the navigation tree, click the Diagnostics key. Click on MSC. On the top menu, click Configuration, and select DS30 split from the list. A dialog box appears. The DS30 Split field displays the current setting for your system. If you want to change the setting, choose the other option from the list.
  • Page 635: Figure 215 Double Density Mode Choices

    Configuring Double Density On the screen, click the arrow beside the Double Density Mode field and select Full Double Density. Figure 215 Double Density Mode choices Click OK to update your system to Full Double Density. Programming Operations Guide...
  • Page 636 Configuring Double Density N0008589 3.3...
  • Page 637: Using A Wizard To Change Data Parameters

    Chapter 27 Using a wizard to change data parameters This section provides information about viewing and changing Business Communications Manager LAN, WAN, and dialup networking resources settings. • “Viewing Business Communications Manager resources” on page 637 • “Using the Network Update Wizard” on page 638 The following figure shows the programming map for Business Communications Manager networking resources.
  • Page 638: Using The Network Update Wizard

    Using the Network Update Wizard Using the Network Update Wizard When your system is first installed, the data resources are set up when the Quick Start Wizard is run. Refer to “Using the Quick Start Wizard” on page 108. If you need to change any of your system name, LAN, WAN, or dialup settings after your system has been configured, you can use the Network Update Wizard.
  • Page 639: What You Need To Know

    Using the Network Update Wizard What you need to know Use the following chart to gather the information you need to make the data resource changes that you require. Not all of these fields will appear if your system does not support the specified hardware.
  • Page 640 Using the Network Update Wizard N0008589 3.3...
  • Page 641: Configuring Dhcp

    Chapter 28 Configuring DHCP Business Communications Manager provides DHCP (Dynamic Host Configuration Protocol) service to branch office clients. DHCP allows a network administrator to supervise and distribute IP addresses from a central location. This service dynamically assigns IP addresses to branch office computers or IP telephones, so you do not need to manually assign an IP address.
  • Page 642: Configuring The Dhcp Mode

    Configuring the DHCP Mode If you must modify the DHCP default configuration on Business Communications Manager, make sure configuration settings are consistent throughout the network and take the following into consideration: • If a change in the DHCP configuration resulted in a change in the IP addresses of a scope, perform one of the following actions to ensure good system operation: —...
  • Page 643: Configuring A Dhcp Server

    Configuring a DHCP Server Configuring a DHCP Server If you chose DHCPServer as the DHCP mode, configure the DHCP Server settings in the Global Options and Summary screen. On the navigation tree, click the Services key and click the DHCP heading. The Summary screen appears.
  • Page 644: Table 157 Dhcp Global Options

    The default value is: Nortel-i2004-A,10.10.10.1:7000,1,1;10.10.10.1:7000,1,1. where: Information • Nortel-i2004-A — is the identification name for the IP telephone • 10.10.10.1 — is the IP address for the primary Terminal Proxy Server (TPS). This is normally the Published IP address of the Business Communications Manager.
  • Page 645: Table 158 Dhcp Summary Settings

    If you do not want DHCP to automatically assign VLAN IDs to the IP telephones, enter VLAN-A:none. in this text box. Note1: The NORTEL IP Terminal VLAN Id string must be terminated with a period (.). Note2: If you do not know the VLAN ID, contact your network administrator.
  • Page 646: Lan Settings For Dhcp Server

    LAN settings for DHCP Server LAN settings for DHCP Server This section describes configuring the DHCP server, as well as: • “Configuring Address ranges for a Local Scope” on page 648 • “Configuring Excluded addresses for a Local Scope” on page 649 •...
  • Page 647: Table 159 Lan Scope Specific Options

    LAN settings for DHCP Server Configure the scope-specific settings according to the following table. Table 159 LAN Scope Specific Options Attribute Description Name Allows you to specify the name of the LAN scope. Description Allows you to specify a description for the LAN scope. DNS Server Allows you to specify the IP addresses of the primary DNS server and the secondary DNS server in a valid dot format.
  • Page 648: Configuring Address Ranges For A Local Scope

    LAN settings for DHCP Server Configuring Address ranges for a Local Scope Address ranges allow you to specify the valid IP addresses for the DHCP clients. Note: You must add at least one Address range to use DHCP server. Adding an address range On the navigation tree, click the Services key and click the DHCP key.
  • Page 649: Deleting An Address Range

    LAN settings for DHCP Server On the Configuration menu, click Modify Address Range. The Address Range dialog box appears. Modify the Address Range settings. Click the Save button. Deleting an address range On the navigation tree, click the Services key and click the DHCP key. Click the Local Scope key and click the LAN1 heading.
  • Page 650: Modifying Excluded Address Ranges

    LAN settings for DHCP Server Configure the Excluded Address attributes according to the following table. Table 161 Excluded Addresses Attribute Description Range (E#) Allows you to specify the Range identifier. The range setting uniquely identifies an excluded range in the scope. The value for this setting must follow certain conventions.
  • Page 651: Configuring Reserved Addresses For A Local Scope

    LAN settings for DHCP Server Click an excluded address range in the Excluded Address Range table. On the Configuration menu, click Delete Excluded Address Range. A message prompts you to confirm the deletion. Click the Yes button. Configuring Reserved addresses for a Local Scope Reserved addresses allow you to assign IP addresses to specific DHCP clients.
  • Page 652: Deleting A Reserved Address

    LAN settings for DHCP Server Click the Local Scope key and click the LAN1 heading. The LAN Scope Specific Options screen appears. Click the Reserved Address tab. The Reserved Address screen appears. Click a reserved address in the Reserved Address table. On the Configuration menu, click Modify Reserved Address.
  • Page 653 LAN settings for DHCP Server Table 163 Reserved Addresses Lease Information (Continued) Setting Definition Client Description Shows the description that will help to identify the DHCP client this IP address is assigned to. Lease Expiration Shows the date when this IP address is no longer reserved for the DHCP client. Date Lease Expiration Shows the time when this IP address is no longer reserved for the DHCP client.
  • Page 654: Remote Scope

    Remote Scope Remote Scope A remote scope is a remote network (not LAN1 or LAN2) that uses the DHCP Server to get IP addresses through a DHCP relay agent. This section describes: • “Adding a Remote Scope” on page 654 •...
  • Page 655: Modifying Remote Scope Settings

    Remote Scope Modifying Remote Scope settings On the navigation tree, click the Services key and click the DHCP key. Click the Remote Scope key. Click the remote scope you want to modify. The Scope Specific Options screen appears. Configure the remote scope-specific settings according to the following table. Table 165 Remote Scope specific settings Attribute Description...
  • Page 656: Modifying Address Ranges

    Remote Scope Configure the Address Range attributes according to the following table. Table 166 Remote Scope Address Range attributes Attribute Description Range (R#) Allows you to specify the Range identifier. The range box uniquely identifies an Address range in the scope. The value for this setting must follow certain conventions.
  • Page 657: Configuring Remote Scope Excluded Addresses

    Remote Scope On the Configuration menu, click Delete Address Range. A dialog box appears asking you to confirm the deletion. Click the Yes button. Note: When you delete or modify an IP Address range it removes any excluded addresses that are in the original address range value. Configuring Remote Scope excluded addresses Excluded addresses allow you to specify the IP addresses that are not available to DHCP clients.
  • Page 658: Modifying Excluded Address Ranges

    Remote Scope Click the Save button. Modifying excluded address ranges: On the navigation tree, click the Services key and click the DHCP key. Click the Remote Scope key. Click the remote scope you want to modify. The Scope Specific Options screen appears. Click the Excluded Address tab.
  • Page 659: Configuring Remote Scope Reserved Addresses

    Remote Scope Configuring Remote Scope Reserved Addresses Reserved addresses allow you to assign IP addresses to specific DHCP clients. Adding a reserved address On the navigation tree, click the Services key and click the DHCP key. Click the Remote Scope key. Click the remote scope you want to modify.
  • Page 660: Deleting A Reserved Address

    Remote Scope Deleting a reserved address On the navigation tree, click the Services key and click the DHCP key. Click the Remote Scope key. Click the remote scope you want to modify. The Scope Specific Options screen appears. Click the Reserved Address tab. The Reserved Address screen appears.
  • Page 661: Deleting A Remote Scope

    Remote Scope Deleting a Remote Scope On the navigation tree, click the Services key and click the DHCP key. Click the Remote Scope key. Click the remote scope you want to delete. The Remote Scope Specific Options screen appears. Click the Delete button. Or, right click the remote scope you want to delete and click Delete.
  • Page 662: Configuring A Dhcp Relay Agent

    Configuring a DHCP Relay Agent Configuring a DHCP Relay Agent If you chose DHCPRelayAgent as the mode, configure the DHCP Relay Agent settings in the Global Options and Server List screens with the following process. On the navigation tree, click the Services key and click the DHCP heading. The DHCP Mode screen appears.
  • Page 663: Lan Settings For Dhcp Relay Agent

    LAN settings for DHCP Relay Agent LAN settings for DHCP Relay Agent If you configured the DHCP mode as DHCPRelayAgent (refer to “Configuring the DHCP Mode” on page 642), then configure the LAN scope attributes as follows. If the mode is DHCPServer refer to “LAN settings for DHCP Server”...
  • Page 664: Importing And Exporting Dhcp Data

    • Scope options The DHCP data is stored on the Business Communications Manager in the directory D:\Data Files\Nortel Networks\Unified Manger. The file is named ScopeName.dat where ScopeName is the name of the DHCP scope. To export the DHCP data: On the navigation tree, click the Services key and click the DHCP key.
  • Page 665: Importing Dhcp Data

    Importing and Exporting DHCP data Importing DHCP data When you import the DHCP data, the DHCP programming from a previous export replaces the current DHCP programming for the scope. To import the DHCP data: On the navigation tree, click the Services key and click the DHCP key. Click the Local Scope key to import data for a local scope.
  • Page 666 Importing and Exporting DHCP data N0008589 3.3...
  • Page 667: Configuring The Lan Resources

    Chapter 29 Configuring the LAN resources Business Communications Manager is equipped with an Ethernet/802.3 network interface card which supports the IEEE 802.3 Ethernet frame format. The Ethernet connection uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) to manage the access to the physical media.
  • Page 668: Configuring Lan Resources

    Configuring LAN resources Configuring LAN resources The following section describes how to set up the LAN card on your Business Communications Manager. The information in this section includes: • “Setting LAN global parameters” on page 668 • “Configuring a LAN interface” on page 669 •...
  • Page 669: Configuring A Lan Interface

    Configuring LAN resources Note: The settings in the table above ensure data routing uses a maximum of 60 to 70 percent CPU cycles. If the LAN to WAN link speed is 10 mbps, selecting higher traffic smoothing parameters has no impact on packet forwarding, which the system still performs at a link speed of 10 mbps.
  • Page 670 The default Admin Status is Up. The routing table entries for unused network interfaces can cause routing issues. For this reason, Nortel Networks recommends you disable the Admin Status on any LAN interface that is not connected to the network.
  • Page 671: Configuring Multiple Ip Addresses For The Lan Interface

    Configuring LAN resources Note: Setting the LAN connection speed to 100 Mbit/s does not reduce performance. However, the CPU is more efficient if you limit your incoming traffic to 10 Mbit/s. To increase your CPU performance, set the connected external LAN hub or switch to 10 Mbit/s or to Auto Sense.
  • Page 672: Modifying An Additional Ip Address

    Configuring LAN resources Modifying an Additional IP Address On the navigation tree, click the Resources key and click the LAN key. Click the heading of the LAN resource you want to modify (for example, LAN1). The LAN Summary screen appears. Click the Additional IP Address tab.
  • Page 673: Configuring The Wan Resources

    Chapter 30 Configuring the WAN resources A WAN (wide area network) is a geographically dispersed data communication network. The term WAN distinguishes a broader data communication structure from a local area network (LAN). This section includes information about: • “Permanent WAN connection” on page 673 •...
  • Page 674: Point-To-Point-Protocol (Ppp)

    Viewing WAN resources The available Data Link Control interface numbers are 0-1023. Of the 1023 PVCs, 16 are reserved. The maximum number of PVCs allowed is 1008. Point-to-Point-Protocol (PPP) Point-to-Point Protocol (PPP) is a full-duplex transmission protocol for communication between two computers using a serial interface.
  • Page 675: Setting Global Wan Parameters

    Setting global WAN parameters Note: If you disconnect the WAN cable from the WAN card, the Status does not update immediately. It can take more than two minutes before the Status updates to show the new Status of the WAN card. Setting global WAN parameters If PPP is the link protocol for a WAN interface (WAN1 or WAN2), you can restrict access to the network using the PPP Password List.
  • Page 676: Modifying An Existing Item On The Ppp Password List

    Setting global WAN parameters Modifying an existing item on the PPP Password List On the navigation tree, click the Resources key and click the WAN heading. The Resources screen appears. Click the PPP Password List tab. The PPP Password List screen appears. Click the PPP Password you want to modify.
  • Page 677: Configuring The Wan Interfaces

    Configuring the WAN interfaces Configuring the WAN interfaces The following sections describe how to configure the WAN interfaces on the Business Communications Manager system. This section includes: • “Configuring WAN summary parameters” on page 677 • “Setting WAN Line Parameters” on page 679 •...
  • Page 678 The default Admin Status is Up. The routing table entries for unused network interfaces can cause routing issues. For this reason, Nortel Networks recommends you disable the Admin Status on any WAN interface that is not connected to the network.
  • Page 679: Setting Wan Line Parameters

    Configuring the WAN interfaces Setting WAN Line Parameters The WAN Line Parameters screen is displayed when configuring a T1 port (North America only). Business Communications Manager supports T1 and fractional T1. Refer to the Port box on the WAN Summary Parameters screen to see which type of port your are configuring. Note: The WAN Line Parameters screen is only available on the WAN1 interface.
  • Page 680: Setting Wan Sync Parameters

    Configuring the WAN interfaces Note: Always use the same frame type and line coding method as your service provider. Press the Tab key to save the settings. Setting WAN Sync Parameters The WAN Sync Parameters screen is only available on the WAN2 interface. On the navigation tree, click the Resources key and click the WAN Key.
  • Page 681: Table 179 Wan Frame Relay Parameters

    Configuring the WAN interfaces Configure the WAN Frame Relay Parameters by referring to the following table. Table 179 WAN frame relay parameters Attribute Description LMI Type Select the type of local management protocol used on this link. The link management type must be the same as the one used by the frame relay service provider.
  • Page 682: Pvc Congestion Control

    Configuring the WAN interfaces PVC Congestion Control If frame relay is your link protocol, you must configure PVC Congestion Control. If PPP is your link protocol, there are no PVC Congestion Control settings to configure. Adding PVC congestion control Follow these steps to add a PVC congestion control: On the navigation tree, click the Resources key and click the WAN Key.
  • Page 683: Modifying Pvc Congestion Controls

    Configuring the WAN interfaces Modifying PVC congestion controls Follow these steps to modify a PVC congestion control setting: On the navigation tree, click the Resources key and click the WAN Key. Click the WAN1 or WAN2 heading. The WAN Summary screen appears. Click the PVC Congestion Control tab.
  • Page 684: Table 181 Wan Ppp Parameters

    Configuring the WAN interfaces Configure the WAN PPP Parameters according to the information in the following table. Table 181 WAN PPP parameters Attribute Description LCP Keep Alive Interval This parameter determines the how long the Business Communications Manager waits before determining that the WAN link is not functioning. When there is no regular traffic on the WAN link, the Business Communications Manager sends an echo packet out on the link.
  • Page 685: Configuring Multiple Ip Addresses For A Wan Interface

    In both of these examples, broadcast traffic destined for one IP address would not be transmitted on the links associated with the other IP address. Restrictions when using multiple IP addresses • Nortel Networks does not recommend using more than two IP address classes. • Multiple IP addresses supports RIP routing. •...
  • Page 686: Modifying An Additional Ip Address

    Configuring the WAN interfaces Configure the Additional IP Address parameters with the information in the following table. Table 182 Additional WAN IP addresses Attribute Description Range (A#) View the Additional IP Address identifier. The Range number uniquely identifies an Additional IP Address. The value for this setting must follow certain conventions.
  • Page 687: Configuring The Dlci To Ip Mapping

    Configuring the WAN interfaces Configuring the DLCI to IP Mapping When connected to a Frame Relay network, Business Communications Manager uses Frame Relay INARP (Inverse Address Resolution Protocol) messaging to request the next hop protocol address for a given DLCI. If the other end of the connection does not support INARP messaging, there can be a communication failure because the mapping of which DLCI to use to reach a particular IP address is not known.
  • Page 688: Modifying Dlci To Ip Mapping

    Configuring the WAN interfaces Modifying DLCI to IP Mapping On the navigation tree, click the Resources key and click the WAN key. Click the WAN1 or WAN2 heading. The WAN Summary screen appears. Click the DLCI to IP Mapping tab. The DLCI to IP Mapping screen appears.
  • Page 689: Configuring The Dial Up Resources

    Chapter 31 Configuring the Dial Up resources Business Communications Manager allows you to create and use dial up connections for Remote Access Service (RAS) or dial-on-demand network access. RAS allows you to access Business Communications Managers remotely by making an IP connection using PPPoE, an ISDN BRI/PRI line, PPTP or the V.90 modem.
  • Page 690: V.90 Modem Dial Up

    SNMP traps to the SNMP Manager, you must enable the V.90 modem interface. If you are not using the V.90 modem interface for WAN backup or SNMP traps, Nortel Networks recommends that you disable the modem to help prevent unauthorized access to the Business Communications Manager.
  • Page 691: Changing The Modem Region

    V.90 modem dial up To disable the V.90 modem interface: On the navigation tree, click the Resources key and click the Dial Up key. Click the V.90 heading. Click the Modem Status drop list and click Disabled. Press the TAB key to save the settings. Changing the Modem Region There are several internal modem settings that vary depending on the country in which the modem is operating.
  • Page 692: Table 185 V.90 Modem Summary Parameters

    V.90 modem dial up To configure the V.90 modem interface: On the navigation tree, click the Resources key and click the Dial Up key. Click the V.90 key to see available modem interfaces. Click the ModemBackup heading if you want to configure the interface used for the backup WAN connection.
  • Page 693 V.90 modem dial up Table 186 Modem link parameters (Continued) Attribute Description Connect Rate Lets you specify the initial speed (in bits per second) for the modem to connect. Set to the maximum permissible value for best results. Permitted values: 57600, 38400, 19200, 9600, 4800.
  • Page 694: Table 187 V.90 Modem Access Parameters

    V.90 modem dial up 10 Configure the V.90 Modem Access Parameters according to the information in the following table. Table 187 V.90 modem access parameters Attribute Description Authentication Lets you select the authentication type for the link. The options are AllowClearText or EncryptedOnly.
  • Page 695: Isdn Dial Up

    ISDN dial up ISDN dial up Business Communications Manager supports ISDN dial up for dial-on-demand WAN access. You have the choice to use ISDN BRI/PRI as a persistent or dial-on-demand WAN connection or as a backup for your permanent WAN connection. Tips To use an ISDN dial-up connection, you must first configure your system for ISDN.
  • Page 696: Configuring An Isdn Interface

    ISDN dial up In the Confirm Password box, type the password again. In the Channel list, select the channel the connection must use. Click Save to save your settings. The newly created ISDN interface appears under ISDN. Configuring an ISDN interface To configure an ISDN interface: On the navigation tree, click the Resources key and click the Dial Up key.
  • Page 697: Table 189 Isdn Link Parameters

    ISDN dial up Configure the ISDN Link Parameters according to the information in the following table. Table 189 ISDN link parameters Attribute Description Dial Retries Enter the number of times the systems attempts to connect before considering the connection non operational. The default value is 3.
  • Page 698: Configuring The Isdn Channel Characteristics

    ISDN dial up 10 Press the TAB key to save the settings. 11 Click the ISDN Dial-Out User tab. The ISDN Dial-out User screen appears. 12 On the Configuration menu, click Modify ISDN Dial-out User. 13 Configure the ISDN Dial-out User parameters using the information in the following table. Table 191 ISDN dial-out user parameters Attribute Description...
  • Page 699: Assigning An Isdn Dial Number And Ip Address

    ISDN dial up Table 192 ISDN channel characteristics (Continued) Attribute Description Line Type Select either a 64K Digital or 56K Digital line. Business Communications Manager ISDN supports two types of Unrestricted Digital Information (UDI) bit streams: UDI, and UDI-56. With UDI, data is transmitted at 64kbps (64K Digital).
  • Page 700: Deleting An Isdn Interface

    ISDN dial up Deleting an ISDN interface On the navigation tree, click the Resources key and click the Dial Up key. Click the ISDN key. Click the heading of the ISDN interface you want to delete. Click the Delete button. Or, right click the ISDN interface heading and click Delete. A confirmation dialog box appears.
  • Page 701: Point To Point Protocol On Ethernet (Pppoe)

    You must purchase and install the PPPoE Software keycode before you can install PPPoE. For Keycode information about purchasing the PPPoE Software Keycode, contact your Nortel Networks representative. For information about how to install the PPPoE Software Keycode, refer to the Software Keycode Installation Guide that comes with your Software Keycode.
  • Page 702: Installing Pppoe

    Point to Point Protocol on Ethernet (PPPoE) Installing PPPoE You must install PPPoE before you can add or configure a PPPoE interface. Note: To install PPPoE, the computer you are using to access the PPPoE Install Wizard must be connected to the LAN1 interface of Business Communications Manager. To install PPPoE: Launch your web browser.
  • Page 703: Creating A Pppoe Dial Up Interface

    Point to Point Protocol on Ethernet (PPPoE) Creating a PPPoE dial up interface On the navigation tree, click the Resources key, and click the Dial Up key. Click the PPPoE heading. Click the Add button. Or, right click the PPPoE heading and click Add. The Add PPPoE dialog box appears.
  • Page 704: Table 195 Pppoe Link Parameters

    Point to Point Protocol on Ethernet (PPPoE) Configure the PPPoE Link Parameters according to the information in the following table. Table 195 PPPoE link parameters Attribute Description Dial Retries Enter the number of times the system attempts to connect before considering the connection non operational.
  • Page 705: Connecting To The Internet Service Provider (Isp)

    Point to Point Protocol on Ethernet (PPPoE) 10 Press the TAB key to save the settings. 11 Click the PPPoE Dial-Out User tab. The PPPoE Dial-out User screen appears. 12 Click the PPPoE Dial-out User you want to modify. 13 On the Configuration menu, click Modify PPPoE Dial-out User. 14 Configure the PPPoE Dial-out User parameters according to the information in the following table.
  • Page 706: Deleting A Pppoe Interface

    Communications Manager does not answer an incoming call from a router on the V.90 interface. • If you are using the remote dial-in for maintenance, Nortel Networks recommends that you use the Preinstall Client Access Home Page to access Business Communications Manager. N0008589 3.3...
  • Page 707: Configuring Dns

    Chapter 32 Configuring DNS Business Communications Manager functions as both a gateway to the Internet and as a DNS proxy. Note: If your PC is a DHCP client under Business Communications Manager, you do not have to let your workstations know that Business Communications Manager is your Internet gateway.
  • Page 708: Using The Business Communications Manager Dns Service

    Using the Business Communications Manager DNS service Consider the following guidelines when using DNS: • If you enable the Business Communications Manager DNS service, ensure that you configure each workstation on the network to use Business Communications Manager as DNS server. •...
  • Page 709: Configuring Ip Routing

    Chapter 33 Configuring IP Routing The IP Routing service setting allows you to select, add or delete routing protocol on specific interfaces, choose routing protocol options, and add or delete static routes. Note: If you change the IP address or subnet mask of any interface (LAN or WAN), you must reboot Business Communications Manager before you configure IP routing.
  • Page 710: Open Shortest Path First (Ospf)

    Open Shortest Path First (OSPF) Open Shortest Path First protocol bases its path descriptions on “link states” that take into account additional network information. OSPF also lets the user assign cost metrics to a given host router so that some paths are given preference. OSPF supports a variable network subnet mask so that a network can be subdivided into areas.
  • Page 711: Configuring Ip Routing Global Settings

    Configuring IP Routing global settings Configuring IP Routing global settings This section describes how to configure global settings for the IP Routing. It also includes information about: • “Setting the RIP Global Settings” on page 711 • “Setting the OSPF Global Settings” on page 712 To configure global settings for IP Routing: On the navigation tree, click the Services key and click the IP Routing heading.
  • Page 712: Setting The Ospf Global Settings

    Configuring IP Routing global settings Press the TAB key to save your settings. Setting the OSPF Global Settings If OSPF is the routing protocol of your choice, configure the OSPF Global Settings as described below. Click the OSPF Global Settings tab. The OSPF Global Settings screen appears.
  • Page 713: Configuring Ip Routing On An Interface

    Configuring IP routing on an interface Configuring IP routing on an interface After you configured the IP Routing global settings, you must configure each available network interface to use the routing protocol of your choice or static routes. Note: You must use the same routing protocol on all interfaces. For example, you can not configure your LAN1 interface to use RIP and your WAN1 interface to use OSPF.
  • Page 714: Table 204 Ip Rip Parameters

    Configuring IP routing on an interface Configure the RIP Parameters according to the following table. Table 204 IP RIP Parameters Attribute Description Metric Allows you to assign a cumulative value (in terms of hop count or associated cost [if applicable]) to routes passing through this interface.
  • Page 715: Enabling The Rip Subnet Summary

    Configuring IP routing on an interface Table 204 IP RIP Parameters (Continued) Attribute Description Route Tag Allows you to create a special tag which identifies routes announced over the interface. The route tag helps identify route packets when debugging routing problems using a network sniffer. Poisoned Allows you to enable or disable options designed to avoid routing problems such as loops or Reverse...
  • Page 716: Disabling The Rip Subnet Summary

    Configuring IP routing on an interface Disabling the RIP Subnet summary On the navigation tree, click the Services key and click the IP Routing key. The available interfaces for IP routing are listed under the IP Routing heading. Click the interface you want to configure. The Summary window appears.
  • Page 717: Table 205 Ip Ospf Parameters

    Configuring IP routing on an interface Configure the OSPF parameters according to the following table. Table 205 IP OSPF Parameters Attribute Description Metric This field allows you to assign the link cost for this interface that advertised in the router’s link state advertisement for this interface.
  • Page 718: Ospf Nbma Neighbors

    Configuring IP routing on an interface OSPF NBMA Neighbors Frame Relay on Business Communications Manager is a Non Broadcast Multiple Access (NBMA) network. NBMA is a network that can connect two or more routers, but has no hardware broadcast capability. For OSPF function properly on a NBMA network, you must configure OSPF to unicast to the IP addresses of the routers on the network.
  • Page 719: Deleting Ospf Nbma Neighbors

    Configuring IP routing on an interface Deleting OSPF NBMA Neighbors Click the OSPF NBMA Neighbor you want to delete. On the Configuration menu, click Delete OSPF Neighbor. A confirmation dialog box appears. Click the Yes button. Static routes You can add static routes to the Business Communications Manager routing table. Static routes added to the routing table take precedence over dynamic routes.
  • Page 720: Modifying The Static Route Configuration

    Configuring IP routing on an interface Modifying the static route configuration Click a static route you want to modify in the Static Route table. On the Configuration menu, click Modify Static Route. The Static Route dialog box appears. Modify the static route attributes. Click the Save button.
  • Page 721: Restarting The Router

    Restarting the router Restarting the router When you make OSPF changes to the router, you need to restart the Routing and Remote Access Service for the changes to take place. Warning: This procedure will affect any service that requires access across the LAN or WAN, including IP telephone service.
  • Page 722 Restarting the router N0008589 3.3...
  • Page 723: Configuring Web Cache

    Chapter 34 Configuring Web Cache When you use Business Communications Manager as a web proxy, Business Communications Manager can store, or cache, information downloaded from the Internet. A proxy is a server that acts on behalf of another. Web caching allows LAN workstations to share common information downloaded from the Internet.
  • Page 724: Table 208 Web Cache Attributes

    Guidelines for using Web caching/Proxy Consider the following guidelines when using web caching/proxy: • You cannot use the web server installed on Business Communications Manager as a general purpose HTTP server. It is only used by the Business Communications Manager web-based management client and Web Cache services.
  • Page 725: Important Web Cache Considerations

    Important Web Cache considerations Table 208 Web Cache attributes (Continued) Attribute Description Cache Maximum Allows you to specify the maximum life, in hours, on the proxy server for cached HTTP pages. Life Values are 1 to 24. The default value is 24 hours. Maximum Server Allows you to specify the number of threads ready to serve HTTP requests in the proxy server.
  • Page 726 Important Web Cache considerations N0008589 3.3...
  • Page 727: Configuring Qos Monitor

    Chapter 35 Configuring QoS monitor The IP telephony Quality-of-Service (QoS) Monitor periodically monitors the delay and packet-loss of IP networks between two peer gateways. The Business Communications Manager QoS Monitor uses the same method as the Meridian 1 IPT. These monitoring packets are delivered at UDP port 5000.
  • Page 728 QoS Monitor patch to upgrade QoS Monitor on those systems. If you do not upgrade QoS Monitor on these earlier Business Communications Manager systems, IP telephony calls to those systems will not operate correctly. To obtain the QoS Monitor patch, contact your Nortel Networks support personal. N0008589 3.3...
  • Page 729: Setting The Qos Monitor

    Setting the QoS monitor Setting the QoS monitor On the navigation tree, click the Services key and click the QoS Monitor heading. The QoS Monitor Summary screen appears. Configure the QoS Monitor Summary attributes according to the following table. Table 209 QoS Monitor Summary attributes Attribute Description Description...
  • Page 730: Table 210 Mean Opinion Score Descriptions

    Viewing the QoS Monitor Mean Opinion Score Table 210 Mean Opinion Score descriptions Attribute Description Name Displays the name of the Remote Gateway. Destination IP Displays the IP address of the Remote Gateway. QoS Monitor Displays the status of QoS Monitor for this Remote Gateway. If Enabled is displayed, QoS Monitor is currently collecting QoS information for this Remote Gateway.
  • Page 731: Configuring The Logging Options

    Viewing the QoS Monitor Mean Opinion Score Table 210 Mean Opinion Score descriptions Attribute Description G.729 Trans Displays the current MOS value calculated when using a G.729 codec to transmit VoIP packets to this Remote Gateway. The MOS can be a value from 0.00 to 5.00, where 0.00 is the worst score (Poor) and 5.00 is best score (Excellent).
  • Page 732: Figure 217 Example Mean Opinion Score Log File

    Viewing the QoS Monitor Mean Opinion Score Figure 217 Example Mean Opinion Score Log File Mon Sep 08 08:55:44 2003, EastBranch, 10.10.10.2, Enabled, Poor, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00 Mon Sep 08 08:55:44 2003, WestBranch, 10.10.10.5, Enabled, Poor, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00 Mon Sep 08 08:55:44 2003, MainBranch, 10.10.10.15, Enabled, Poor, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00 Mon Sep 08 09:00:54 2003, EastBranch, 10.10.10.2, Enabled, Poor, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00 Mon Sep 08 09:00:54 2003, WestBranch, 10.10.10.5, Enabled, Poor, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00...
  • Page 733: Configuring Net Link Manager

    Chapter 36 Configuring Net Link Manager Net Link Manager is a Business Communications Manager service that provides constant primary link status monitoring. Net Link Manager is also where you select your WAN primary and backup interfaces. This section contains information about enabling/disabling Net Link Manager, as well as how to select WAN links: •...
  • Page 734: Enabling Or Disabling Net Link Manager

    Selecting a permanent WAN link as the primary WAN connection Enabling or Disabling Net Link Manager On the navigation tree, click the Services key and click the Net Link Mgr heading. The Net Link Manager Summary screen appears. Configure the Net Link Manager attributes according to the following table. Table 212 Net Link Manager attributes Attribute Description...
  • Page 735 Selecting a permanent WAN link as the primary WAN connection Table 213 Permanent WAN Connections settings (Continued) Attribute Description Down Poll Allows you to set the polling interval on the Primary WAN Link, in seconds, when the primary Interval WAN link is down, and the backup (dial-up) WAN link is operational. A short interval provides faster recovery.
  • Page 736: Selecting A Dial-Up Link As The Primary Wan Connection

    Selecting a dial-up link as the primary WAN connection Selecting a dial-up link as the primary WAN connection The dial-up WAN connection supports PPP only. Business Communications Manager supports ISDN dial-up PPPoE dial-up WAN connections. Setting a dial-up connection as the primary WAN connection means that the Business Communications Manager default route is to the dial-up connection.
  • Page 737: Configuring Nat (Network Address Translation)

    Chapter 37 Configuring NAT (Network Address Translation) Business Communications Manager provides security and firewall features to protect your private data resources from outsiders. This section includes information about the different types of NAT, as well as: • “Enabling and disabling NAT” on page 738 •...
  • Page 738: Nat And Ip Firewall Filters

    Enabling and disabling NAT NAT and IP Firewall filters When you use NAT and IP Firewall filters, there are two interactions you need to be aware of. • On inbound traffic, the NAT rules are applied before the IP Firewall Filter rules. •...
  • Page 739: Configuring An Interface With Nat

    Configuring an Interface with NAT Configuring an Interface with NAT This section describes how to configure an interface with NAT. It also includes information about: • “Adding Default rules” on page 739 • “Adding a Rule to an interface” on page 740 •...
  • Page 740: Adding A Rule To An Interface

    Configuring an Interface with NAT Note: Before you can specify the Rule Order you must first add the Rules. Press the Tab key to save the settings. Adding a Rule to an interface The maximum number of Rules you can add is 32. Click the Rule Setting tab.
  • Page 741: Modifying A Rule To An Interface

    Configuring an Interface with NAT Table 215 NAT Rule Settings (Continued) Attribute Description Public IP Type Allows you to specify if the IP type is Fixed or Dynamic. Use Dynamic when the IP is assigned by an outside source. For example, your Internet Service Provider (ISP) assigns your IP address.
  • Page 742: Configuring Nat To Change The Source Ip Address Used For Wan Traffic

    Configuring an Interface with NAT Configuring NAT to change the source IP address used for WAN traffic Normally, when traffic originates from the Business Communications Manager, the source IP address of the data packets is the IP address of interface that is on the edge. For example, if the traffic is sent out of the WAN1 interface, the source IP address of the data packets is the IP address of WAN1.
  • Page 743: Examples Of Common Nat Configurations

    Configuring an Interface with NAT Examples of common NAT configurations Example 1: Using a static Public IP address A Business Communications Manager has two LANs and a WAN. The WAN connects to the outside and has one public IP address. The LANs are part of a private network. The system maps all outgoing traffic.
  • Page 744: Example 2: Using Dynamic Public Ip Address

    Configuring an Interface with NAT Example 2: Using dynamic Public IP address A Business Communications Manager has two LANs and a WAN. The WAN connects to an Internet Service Provider that assigns the IP address. The LANs are part of a private network. The system maps all outgoing traffic.
  • Page 745: Example 3: Changing The Source Ip Address Of Wan Traffic

    Configuring an Interface with NAT Example 3: Changing the source IP address of WAN traffic A Business Communications Manager has a WAN and two LANs. The WAN1 interface connects to the outside and has an IP address of 192.168.12.90. The Business Communications Manager also has an ISDN WAN backup interface that gets it IP address dynamically.
  • Page 746 Configuring an Interface with NAT Rule name Direction Protocol TCP/UDP Private IP Type Fixed Private IP 192.168.12.90 Private Range Mask 255.255.255.255 Private Port Range Public IP Type Fixed Public IP 10.255.5.86 Public Rang Mask 255.255.255.255 Public Port Range The three rules required for the ISDN interface are: Rule name Direction Protocol...
  • Page 747 Configuring an Interface with NAT Rule name Direction Protocol TCP/UDP Private IP Type Fixed Private IP 192.168.12.90 Private Range Mask 255.255.255.255 Private Port Range Public IP Type Dynamic Public IP <leave blank> Public Rang Mask <leave blank> Public Port Range Programming Operations Guide...
  • Page 748 Configuring an Interface with NAT N0008589 3.3...
  • Page 749: Configuring Ntp Client

    Chapter 38 Configuring NTP Client Network Time Protocol (NTP) is an IP protocol that allows you to synchronize the time on your network devices. The NTP Client allows you to synchronize the time on your Business Communications Manager system with the NTP Server on your network. This ensures that your Business Communications Manager is using the same time as the other Business Communications Manager systems and servers on your network.
  • Page 750: Configuring The Ntp Client Settings

    Configuring the NTP Client settings Configuring the NTP Client settings Configure the NTP client settings: On the navigation tree, click the Services key and click the NTP Client Settings heading. The NTP Client Settings screen appears. Configure the NTP Client settings according to the following table. Table 216 NTP Client settings Attribute Description...
  • Page 751: Starting The Ntp Client Service

    Starting the NTP Client Service Starting the NTP Client Service If you set the NTPClient Service Start Type option to Automatic, the NTP Client service starts automatically and will automatically start whenever Business Communications Manager is started up or rebooted. If you set the NTPClient Service Start Type option to Manual, you must start the NTP Client Service the first time you configure the NTP Client settings.
  • Page 752: Manually Updating The Business Communications Manager Time

    Manually updating the Business Communications Manager time Manually updating the Business Communications Manager time You can force the NTP Client to update the Business Communications Manager time by manually updating the time. To manually update the time: On the navigation tree, click the Services key and click the NTP Client Settings heading. The NTP Client Settings screen appears.
  • Page 753: Virtual Private Networks (Vpn)

    Chapter 39 Virtual Private Networks (VPN) Business Communications Manager uses the Internet and tunneling protocols to create secure extranets. These secure extranets require a protocol for safe transport from the Business Communications Manager to another device through the Public Data Network (PDN). Business Communications Manager uses the PPTP (“PPTP”...
  • Page 754: Ipsec Tunnel Modes

    Manager using PPTP or IPSec. PPTP PPTP is a tunneling protocol supported by Nortel Networks, Microsoft, and other vendors. The PPTP client is available for Windows 95 (www.microsoft.com) and is built-in to Windows 98 and later. Third-party vendors have developed PPTP clients for Windows 3.1 and the Macintosh operating system.
  • Page 755: Settings Required For Pptp Tunnels

    PPTP PPTP offers the following features: • Support for multiple authentication schemes: MS-CHAP, CHAP, or PAP. • Support for IP address translation via encapsulation. • Support for RC4 encryption. • Support for compression of data packets. Settings required for PPTP tunnels The data packets that pass through PPTP tunnels interact with other routing features in Business Communications Manager.
  • Page 756: Ip Addresses And Dhcp Server

    PPTP IP Addresses and DHCP Server Ensure that the IP addresses for the LAN interfaces, WAN interfaces, dial up links, and PPTP tunnels are unique across all sites. This simplifies configuration, eliminates conflicts due to NAT, and prevents the addresses assigned by the DHCP server from conflicting with the IP addresses of subnets in remote sites.
  • Page 757: Adding A Pptp Client

    PPTP Table 218 PPTP Summary settings (Continued) Attribute Description Keep Alive Interval Allows you to specify the amount of time Business Communications Manager waits without any data traffic on the tunnel before it sends an Echo Request message. When the far end of the tunnel receives an Echo Request, the system at the far end must send an Echo Response message.
  • Page 758: Deleting A Pptp Client

    PPTP Click the Clients IP List tab. The Clients IP List screen appears. On the Configuration menu, click Add to Client IP List. The Client IP dialog box appears. Configure the PPTP Client attributes according to the following table. Table 219 PPTP Client attributes Attribute Description Client...
  • Page 759: Configuring A Pptp Tunnel

    PPTP To add a PPTP tunnel: On the navigation tree, click the Services key and click the VPN key. Click the PPTP heading. The PPTP Summary screen appears. Click the Add menu. Or, right click the PPTP heading and click Add. The Add PPTP dialog box appears.
  • Page 760: Table 221 Pptp Tunnel Summary Attributes

    689. You can also use a static IP address, but this requires coordinating this address on both ends of the tunnel. Nortel Networks recommends that you use the RemoteAssigned option whenever possible. Description Allows you to enter a brief description of the PPTP tunnel.
  • Page 761: Table 223 Pptp Tunnel Authentication Parameters

    PPTP Table 222 PPTP Tunnel Link parameters (Continued) Attribute Description Connect retries Allows you to specify the maximum number of times this tunnel attempts to connect to the primary PPTP server. If a connection is not made after the specified number of retries, this tunnel attempts to connect to the secondary PPTP server.
  • Page 762: Add A Destination Network

    PPTP Table 223 PPTP Tunnel Authentication parameters (Continued) Attribute Description User ID Allows you to specify the User ID that this end of the tunnel sends to the far end of the tunnel for authentication during tunnel establishment. If you are using another Business Communications Manager on the far side of the tunnel, this User ID needs to match the tunnel name or interface name specified on the far side of the tunnel.
  • Page 763: Modifying A Destination Network

    PPTP Table 224 PPTP Destination Networks attributes (Continued) Attribute Description Subnet Mask Allows you to specify the subnet mask for the destination network. You require Subnet Mask only if you have entered a value in the Destination Network box. Always use a valid subnet address and mask pair. If you are using a mask that contains more than 1 host address, then always specify the subnet number that corresponds to that subnet and not any other address.
  • Page 764: Deleting A Destination Network

    PPTP Deleting a Destination Network Click the Destination Network to delete. On the Configuration menu, click Delete Destination Network. A message prompts you to confirm the deletion. Click the Yes button to confirm the deletion. Deleting a PPTP tunnel Note: Before you delete a PPTP tunnel, delete any destination networks assigned to the tunnel.
  • Page 765: Ipsec

    IPSec IPSec The IPsec tunneling protocol is supported by Nortel Networks and other third-party vendors. IPsec is an emerging standard that offers a strong level of encryption (DES and Triple DES), integrity protection (MD5 and SHA), and the IETF-recommended Internet Security Association & Key Management Protocol (ISAKMP) and Oakley Key Determination Protocols.
  • Page 766: Encryption

    IPSec Encryption All of the following encryption methods ensure that the packets have come from the original source at the secure end of the tunnel. Note that some of the encryption types will not appear on some non-US models that are restricted by US Domestic export laws. The following table shows a comparison of the security provided by the available encryption and authentication methods.
  • Page 767: Protocol

    IPSec Protocol The protocol can be ESP or AH. • Encapsulating Security Payload (ESP) provides data integrity, source authentication and confidentiality for IP datagrams by encrypting the payload data to be protected. ESP uses the Data Encryption Standard (DES) and Triple DES algorithms. •...
  • Page 768: Ipsec Capacity Restrictions

    IPSec Both SHA1 and MD5 use Hashed Message Authentication Code (HMAC) to improve authentication. HMAC is a technique that uses a secret key and a message digest function to create a secret message authentication code. IPSec capacity restrictions The Business Communications Manager performs all IPSec processing using software. To prevent overloading the Business Communications Manager processor with IPSec traffic processing, the network traffic that requires IPSec processing should not exceed 6Mbps.
  • Page 769: Dialup Isdn Connections

    IPSec Networks would have two networks configured as 10.10.10.0 with a mask 255.255.255.0 and 10.10.11.0 with a mask 255.255.255.0 and the Remote Accessible Networks would be 12.12.12.0 with a mask of 255.255.255.0. All packets that do not match these rules will be NATed and sent out the interface and not through the tunnel.
  • Page 770: Table 226 Firewall Rules For Ike

    IPSec You can create these rules automatically when creating or modifying Branch Office and Remote Tunnels by selecting Yes for the Create Firewall Rules for this tunnel on the Parameters page for a particular tunnel. The three firewall rules required by the Branch Office tunnels are then created.
  • Page 771: Table 229 Firewall Rules For The Qotd Server

    IPSec In addition to the above rules, Remote User tunnels need extra rules. These are extra rules are for the QOTD (Quote of the Day) server, Password server and ICMP that the IPSec client issues. Table 229, Table 230 Table 231 show the rules required.
  • Page 772 IPSec Example Business Communications Manager 1 has been configured with a WAN1 address of 10.200.40.12 and a LAN 1 address of 10.10.10.1. Your computer at home has the address of 207.44.126.81. You have setup the Business Communications Manager to use the address range 10.10.10.100 - 10.10.10.200 with a mask of 255.255.255.0 for the IPSec Address Pool.
  • Page 773: Changing The Ipsec Global Settings

    IPSec Protocol ICMP Source IP 207.44.126.81 Source mask 255.255.255.255 Destination IP 10.200.40.12 Destination mask 255.255.255.255 Protocol Source IP 10.10.10.0 Source Mask 255.255.255.0 Source Port Destination IP 10.10.10.0 Destination Mask 255.255.255.0 Destination Port For information about how to add or change Filters, refer to “Configuring IP Firewall Filters”...
  • Page 774: Ipsec Branch Office Configuration

    IPSec Configure the IPSec global settings according to the following table. Table 233 IPSec Global settings Attribute Description Description Displays the name of the IPSec service. This is a read only attribute. Version Displays the version number of the IPSec service. This is a read only attribute.
  • Page 775: Table 234 Ipsec Branch Office Tunnel Settings

    IPSec Click the Add button. Or, right click the Branch Office Accounts heading and click Add. The Add Branch Office Accounts dialog box appears. Configure the Branch Office Tunnel Settings according to the following table. Table 234 IPSec Branch Office Tunnel settings Attribute Description Tunnel Number...
  • Page 776 Select No if you do not want Business Communications Manager to create Firewall rules for this tunnel. If you are using the Business Communications Manager Firewall, Nortel Networks recommends that you select Yes for this option. The default setting is No.
  • Page 777: Adding Local Accessible Networks To The Branch Office Ipsec Tunnel

    IPSec Adding Local Accessible Networks to the Branch Office IPSec tunnel The maximum number of Local Accessible Networks you can add is 16. On the navigation tree, click the Services key and click the VPN key. Click the IPSec key and click the Branch Office Accounts key. Click the tunnel you want to modify.
  • Page 778: Sending All Traffic From Local Accessible Networks Through The Ipsec Tunnel

    IPSec Configure the Remote Accessible Network parameters according to the following table. Table 236 IPSec Remote Accessible Network parameters Attribute Description Network Number Allows you to specify the Network identifier. (R#) The Network Number uniquely identifies a Remote Accessible Network. The value for this setting must follow certain conventions.
  • Page 779: Modifying A Branch Office Ipsec Tunnel

    IPSec Modifying a Branch Office IPSec Tunnel On the navigation tree, click the Services key and click the VPN key. Click the IPSec key and click the Branch Office Accounts key. Click the tunnel you want to modify. The Tunnel Parameters screen appears. Change the required IPSec Tunnel settings.
  • Page 780: Deleting A Branch Office Ipsec Tunnel

    IPSec Deleting a Branch Office IPSec tunnel On the navigation tree, click the Services key and click the VPN key. Click the IPSec key and click the Branch Office Accounts key. Click the tunnel you want to delete. Click the Delete button. Or, right click the tunnel you want to delete and click Delete.
  • Page 781: Creating A Tunnel Between Two Business Communications Managers

    IPSec Creating a tunnel between two Business Communications Managers The following is an example of a how to connect two Business Communications Manager systems together using an IPSec tunnel. In this example, the IPSec tunnel connects a Business Communications Manager with a LAN 2 IP address of 10.10.11.1 and another Business Communications Manager with a LAN 2 IP address of 10.10.11.2.
  • Page 782: Creating A Tunnel Between A Business Communications Manager And A Contivity Extranet

    IPSec Creating a tunnel between a Business Communications Manager and a Contivity Extranet Switch v02_61 The following are an examples of a how to connect a Business Communications Manager to a Contivity Extranet Switch using an IPSec tunnel. In this example, the IPSec tunnel connects a Business Communications Manager with a LAN 2 IP address of 47.81.20.50 and a Contivity Extranet Switch with a Public IP address of 47.82.30.60.
  • Page 783: Configuring The Business Communications Manager

    IPSec The following example describes how to configure a Business Communications Manager with a Contivity Extranet Switch when NAT is required on the Business Communications Manager and external access is required on the same interface as the tunnel (split tunneling). Configuring the Business Communications Manager Using the same systems from the previous example, we will now enable NAT and turn on Default Rules on the Business Communications Manager.
  • Page 784: Ipsec Remote User Configuration

    IPSec IPSec Remote User configuration The IPSec Remote User feature allows remote users to dial in to an Internet Service Provider (ISP) anywhere in the world and connect to the corporate network in a secure way. All the remote user requires is an IPSec VPN client installed on their computer.
  • Page 785: Figure 218 Example Of A Split Tunneling Environment

    IPSec Figure 218 Example of a Split Tunneling environment 20.20.20.7 20.20.20.5 ISP Internet Address: 200.x.x.x VPN Client IP Address: 10.2.3.30/24 IPSec Tunnel Internet 300.x.x.x Business Communications Manager 10.2.3.1/24 10.2.3.2/24 In the example in the figure above, PC1 and PC2 are on a home IP network (20.20.20.0/ 255.255.255.0).
  • Page 786: Adding A Remote User Ipsec Tunnel

    IPSec Split Tunneling security considerations Business Communications Manager takes precautions against violators potentially hacking tunneled information when the Business Communications Manager is operating in Split Tunnel mode. The primary precaution is to drop packets that do not have the IP address that is assigned to the tunnel connection as its source address.
  • Page 787: Adding A Remote Ip Address Pool

    IPSec Dynamic IP address from an IP Address Pool To assign a dynamic IP address, you must configure a Remote IP Address Pool and assign the Remote IP Address Pool to the Remote User Account. For information about how to configure a Remote IP Address Pool, refer to “Adding a Remote IP Address Pool”...
  • Page 788: Modifying A Remote Ip Address Pool

    IPSec Configure the Remote IP Address Pool List settings according to the following table. Table 238 IPSec Remote IP Address Pool settings Attribute Description Pool Number Allows you to specify the Remote IP Address Pool List identifier. The Pool Number uniquely identifies a Remote IP Address Pool List. The value for this setting must follow certain conventions.
  • Page 789: Adding Remote User Accounts

    IPSec Adding Remote User Accounts On the navigation tree, click the Services key and click the VPN key. Click the IPSec key and click the Remote User Accounts heading. Click the Remote User Summary tab. The Remote User Summary screen appears. Click the Add button.
  • Page 790 IPSec Table 239 IPSec Remote User Account settings (Continued) Attribute Description PFS Enabled Allows you to enable Perfect Forward Secrecy (PFS). With PFS, keys are not derived from previous keys. This ensures that one key being compromised cannot result in the compromise of subsequent keys. You can choose Yes or No.
  • Page 791: Configuring Remote User Accounts

    IPSec Configuring Remote User Accounts On the navigation tree, click the Services key and click the VPN key. Click the IPSec key and click the Remote User Accounts key. Click the Remote User Account you want to modify. The Remote User Settings screen appears. Change the required Remote User Account settings.
  • Page 792: Adding A Split Tunnel Network

    IPSec Adding a Split Tunnel Network On the navigation tree, click the Services key and click the VPN key. Click the IPSec key and click the Remote User Accounts key. Click the Remote User Account you want to modify. The Remote User Settings screen appears. Click the Split Tunnel Networks tab.
  • Page 793: Deleting A Split Tunnel Network

    IPSec Deleting a Split Tunnel Network On the navigation tree, click the Services key and click the VPN key. Click the IPSec key and click the Remote User Accounts key. Click the Remote User Account you want to modify. The Remote User Settings screen appears. Click the Split Tunnel Networks tab.
  • Page 794 IPSec N0008589 3.3...
  • Page 795: Policy-Enabled Networking

    Chapter 40 Policy-enabled networking This section discusses the Policy services you can configure to enhance your data network. Included is the following information: • “Policy configuration overview” on page 795 • “Implementing Quality of Service (QoS)” on page 801 • “Implementing Common Open Policy Services (COPS)”...
  • Page 796: Diffserv Ip Quality Of Service (Qos) Architecture

    Policy configuration overview Business Communications Manager uses DiffServ to manage network traffic and resources. The information that is required to support DiffServ and multi-field classification is transferred using the Common Open Policy Services (COPS) protocol. COPS is a query and response protocol that exchanges policy information messages using the Transmission Control Protocol (TCP).
  • Page 797: Diffserv Components

    Policy configuration overview Figure 219 DiffServ bandwidth brokers and nodes DiffServ domain Interior Interior Node Node Boundary Link End-to-End QoS 9927EA DiffServ components The DiffServ architecture is comprised of the following components: • Traffic conditioners — These components include classifiers, DiffServ-byte markers, shapers, policiers and profilers.
  • Page 798: Ip Service Classes

    Policy configuration overview IP service classes Business Communications Manager supports the following services classes: • Critical and Network classes have the highest priority over all other traffic. • Premium class is an end-to-end service functioning similarly to a virtual leased line. Traffic in this service class is guaranteed an agreed upon peak bandwidth.
  • Page 799: Packet Classifiers

    Policy configuration overview These Required treatments (or service class behaviors) for these Service classes are implemented using nine queues and a scheduler for these queues. Queue 1 has the highest priority, referred to as Strict Priority. Queues 2 to 9 are scheduled according to a Weighted Fair Queuing (WFQ) scheme. The following table summarizes the mappings between service classes, queues and DSCP codes.
  • Page 800: Cops

    These edge devices police traffic flows by marking packets and applying forwarding behaviors to the packets at the network node. For further information about Optivity products, contact your Nortel Networks sales representative. Policy overview Use Unified Manager to configure policies and filters to control the behavior of network traffic.
  • Page 801: Implementing Quality Of Service (Qos)

    Implementing Quality of Service (QoS) Implementing Quality of Service (QoS) The QoS application delivers a set of tools that, when optimally configured, combat escalating bandwidth costs and optimize application performance in your network. QoS tools allow you to prioritize your critical applications and sensitive traffic. You can tailor appropriate services to support this traffic over the wide area, thus maintaining the necessary performance levels on an end-to-end basis.
  • Page 802: Configuring Devices

    Implementing Quality of Service (QoS) Click the network adapter you want to modify. On the Configuration menu, click Modify Adapter Water Mark. The Advanced property sheet appears. Configure the Advanced parameters according to the following table. Table 245 QoS Advanced parameters Setting Definition Adapter Name...
  • Page 803: Modifying An Interface Group Configuration

    Implementing Quality of Service (QoS) Table 246 QoS Interface Group Table parameters (Continued) Attribute Description Queue Set Id This is a read only attribute. Role Combination Select the interfaces that you want to include in this interface group. Capabilities This is a read only attribute. Click the Save button.
  • Page 804: Configuring Policy Rules

    Implementing Quality of Service (QoS) Configuring Policy Rules Policy Rules are IP filters that are defined as part of a QoS Policy. You can create an IP filter, which enables Business Communications Manager to classify traffic. In turn, you can create an access control list from a series of defined filters to create an IP filter group.
  • Page 805: Modifying An Ip Filter Configuration

    Implementing Quality of Service (QoS) Table 247 QoS IP Filter parameters (Continued) Attribute Description DSCP Enter the DSCP value to match the inbound DSCP. You can enter any decimal value from 0 to 63. If you choose the default (-1), the DSCP value in the packet will be ignored. Protocol Select a protocol to match the filter.
  • Page 806: Deleting An Ip Filter Configuration

    Implementing Quality of Service (QoS) Deleting an IP filter configuration To delete an IP filter configuration: On the navigation tree, click the Services key and click the Policy Management key. Click the QoS key and click the Rules heading. Click the entry you want to delete. On the Configuration menu, click Delete IP Filter Entry.
  • Page 807: Modifying An Ip Filter Group Configuration

    Implementing Quality of Service (QoS) Modifying an IP filter group configuration To modify an IP filter group configuration: On the navigation tree, click the Services key and click the Policy Management key. Click the QoS key and click the Rules heading. Click the IP Filter Group Table tab.
  • Page 808: Modifying An Action Entry

    Implementing Quality of Service (QoS) On the Configuration menu, click Add Entry. The Actions dialog box opens. Configure the Action parameters according to the following table. Refer to the table “Default Queue mapping for Business Communications Manager” on page for the mapping of DSCP codes, queues and service classes. Table 249 QoS Action parameters Attribute Description...
  • Page 809: Configuring Qos Policies

    Enter the number used to determine the order of precedence for this policy. Nortel Networks recommends that you consider an order numbering strategy (for the values in the Order field) as you configure policies. The policies in the Policy Table are arranged in ascending order according to value in the Order column.
  • Page 810: Modifying A Policy

    Implementing Quality of Service (QoS) Modifying a policy To modify a policy: On the navigation tree, click the Services key and click the Policy Management key. Click the QoS key and click the Policies key. Click the heading of the policy you want to modify. Click the policy you want to modify.
  • Page 811: Implementing Common Open Policy Services (Cops)

    Implementing Common Open Policy Services (COPS) Implementing Common Open Policy Services (COPS) COPS in your networks allows Business Communications Manager to: • Gather all relevant Policy information from a policy server (COPS). • Make a decision based on your (as network administrator) set policies and network resources, •...
  • Page 812 Implementing Common Open Policy Services (COPS) Table 251 Status page items (Continued) Item Descriptions Client Type The protocol client type for this entry. Note: Multiple client types can be served by a single COPS server. Note: The value 0 (zero) indicates that this entry contains information about the underlying connection.
  • Page 813 Implementing Common Open Policy Services (COPS) Table 251 Status page items (Continued) Item Descriptions Open Failures The number of times that the COPS client failed to perform a COPS Client-Open to a COPS server for the selected client type. Note: This is a cumulative value and is not zeroed on new connections. Unsupported Client The total number of COPS packets that this client has received from COPS servers that Type...
  • Page 814: Configuring A Cops Client

    Implementing Common Open Policy Services (COPS) Configuring a COPS Client To configure a COPS client, you enter the information the COPS Client needs to connect to a COPS Server. Adding a COPS Client Server entry On the navigation tree, click the Services key and click the Policy Management key. Click the COPS Client key and the Configuration heading.
  • Page 815: Modifying The Cops Client Server Retry Data

    Implementing Common Open Policy Services (COPS) Modifying the COPS Client Server Retry Data If Business Communications Manager cannot connect to the COPS Client Server on its first attempt, Business Communications Manager will wait and then try to connect again. On the COPS Client Server Retry Data screen, you can enter the number of times that Business Communications Manager attempts to connect again and time it waits between attempts.
  • Page 816: Configuring The Policy Agent Characteristics

    Configuring the Policy Agent characteristics Configuring the Policy Agent characteristics You can configure the Policy Agent operational parameters. To configure a Policy Agent. On the navigation tree, click the Services key and click the Policy Management key. Click the Policy Agent tab. The Policy Agent screen appears.
  • Page 817: Table 256 Policy Class Support

    Configuring the Policy Agent characteristics This screen displays read only information. This information is described in the following table. Table 256 Policy Class Support Attribute Description Policy Name Shows the name of the policy. Current Instances Shows the current class entries. Maximum Shows the maximum number of allowed class entries.
  • Page 818 Configuring the Policy Agent characteristics N0008589 3.3...
  • Page 819: Configuring Ip Firewall Filters

    Chapter 41 Configuring IP Firewall Filters The Business Communications Manager IP Firewall Filters feature is one of the security features Business Communications Manager offers to protect your network against intruders. The security and firewall features are also used for controlling what outside resources your users will be able to access.
  • Page 820: Stateful Packet Filters

    Viewing and changing the status of Firewall Filters Stateful Packet Filters Business Communications Manager supports stateful packet filtering for IP protocols. Stateful packet filters monitor active sessions and record session information such as IP addresses and port numbers. They maintain state information for each flow (TCP, UDP or ICMP). Stateful filters use the state information to determine if a packet is responding to an earlier request that has been validated by the rule set.
  • Page 821: Configuring Ip Firewall Filters For An Interface

    Configuring IP Firewall Filters for an interface Configuring IP Firewall Filters for an interface This section describes configuring IP Firewall Filters for a single interface. Follow the same instructions to configure the parameters for each of the other interfaces. This section also includes information about: •...
  • Page 822: Adding Default Rules

    Note: You must still specify an H.323 rule to allow IP call voice traffic. This setting only allows the IP telephone to contact the system to register. Also, Registration must be turned on in the Services, IP Telephony, Nortel IP Telephone, General page, before the telephone can access the system to register.
  • Page 823: Adding An Input Filter For A Firewall Filter Interface

    Configuring IP Firewall Filters for an interface Adding an Input Filter for a Firewall Filter Interface Before you can specify a Rule Order, you must add Filter Rules. The maximum number of Input Filter Rules you can add is 32. Click the Input Filters’...
  • Page 824 Configuring IP Firewall Filters for an interface Table 259 Firewall Input Filter Rule settings (Continued) Attribute Description Destination IP Allows you to specify if the Destination IP Type is Fixed or Dynamic. Type Use Dynamic when the IP is assigned by an outside source. For example, your Internet Service Provider (ISP) assigns your IP address.
  • Page 825: Modifying An Input Filter For A Firewall Filter Interface

    Configuring IP Firewall Filters for an interface Note: When you set filters, make sure you allow the flow of packets going to the RPC port (port 135 TCP or UDP), DCOM ports, and the Unified Manager port (port 443 TCP) for correct Unified Manager operation.
  • Page 826: Configuring The Order Of The Input Filters For An Interface

    Configuring IP Firewall Filters for an interface Configuring the order of the input filters for an interface After you enter all of the input filters, you need to set the order in which the filters are used. The order of the input filter rules is very important. The more specific rules, such as rules for specific port numbers and addresses, should be placed first.
  • Page 827: Adding An Output Filter For A Firewall Filter Interface

    Configuring IP Firewall Filters for an interface Adding an Output Filter for a Firewall Filter Interface Before you can specify a rule order, you must add filters. The maximum number of output filter rules you can add is 32. Click the Output Filter Rules’ Setting tab. The Output Filter Rules’...
  • Page 828: Configuring The Order Of The Output Filters For An Interface

    Configuring IP Firewall Filters for an interface Configuring the order of the Output Filters for an interface After you enter all of the Output filters, you need to set the order in which the filters are used. The order of the Output Filter Rules is very important. The more specific rules, such as rules for specific port numbers and addresses, should be placed first.
  • Page 829: Accessing Unified Manager Through The Firewall

    Accessing Unified Manager through the Firewall Accessing Unified Manager through the Firewall • Do not set any blocking input rules on the interface that you use to connect to Business Communications Manager using Unified Manager. This includes enabling the default rules. •...
  • Page 830: Table 262 Input Rule Configuration For Unified Manager - Port 443

    Accessing Unified Manager through the Firewall Table 262 Input Rule Configuration for Unified Manager — port 443 (Continued) Destination Range Mask Appropriate mask (or blank if IP Type is Dynamic) Destination Port Range Note: The order of these three rules does not matter, as long as these rules come before more general rules.
  • Page 831: Firewall Rules For Business Communications Manager With Dialup Interfaces

    Firewall rules for Business Communications Manager with Dialup interfaces Firewall rules for Business Communications Manager with Dialup interfaces For systems with dialup interfaces (ISDN, V.90), we recommend that you add Firewall filters to all interfaces except the dialup interface that blocks NetBIOS traffic. This prevents any NetBIOS packets from getting into the Business Communications Manager and bringing up the dialup interface link.
  • Page 832 Firewall rules for Business Communications Manager with Dialup interfaces N0008589 3.3...
  • Page 833: Defining Region-Based Defaults

    Appendix A Defining region-based defaults This section describes some of the differences in the system defaults. These defaults are set based on the region or telephony or CallPilot template that you select in the Quick Start wizard when the system is first configured. Each region is designed using a set of system defaults that provide specific functionality for the geographical area in which the system is deployed.
  • Page 834: Core Software And Regions

    Region-based system settings Core software and regions Each Region setting requires a specific core software to perform correctly. The following table shows the core software available. Table 264 Core software, defined by region and carrier profile Core Software (Carrier s/w ID) T1 CT2 Plus T1 Etiquette E1 Euro...
  • Page 835: Caller Id Displays

    Region-based system settings Table 265 Languages (Continued) Region Language Sweden Swedish, Norwegian, Danish, NA English Switzerland German, Euro French, Italian, NA English The following table shows a breakdown of the language support for South American and Central American countries. Table 266 South/Central America language breakout Language Spanish English...
  • Page 836: Companding Law By Region

    Region-based system settings Companding Law by region The following table shows the companding law used for each region. Legacy DECT systems: You must ensure that DECT systems that require mu-law have the correct region setup before you install the DECT system. Refer to the DECT documentation for details.
  • Page 837: Media Bay Module Availability By Region

    Region-based system settings Media bay module availability by region Some of the media bay modules are customized for a specific type of line and are not available to all regions. The following table lists a cross-reference between regions and the type of modules that can be used within the related area.
  • Page 838: Fem-Trunk Module Combinations By Region

    Region-based system settings FEM-trunk module combinations by region Trunk Modules may be connected to the Business Communications Manager system using the Fiber Expansion Module (FEM). The following table provides a cross-reference between regions and the Trunk Modules you can connect to the FEM. Table 270 Trunk availability, by region Analog Country- specific...
  • Page 839: Pri Line Protocol Support, By Region

    Region-based system settings PRI line protocol support, by region Table 271 PRI line protocol supported, by region Region BRI T side BRI S side Australia ISDN ETSI 300 403 ISDN ETSI 300 102 DASS2 DPNSS MCDN ISDN ETSI 300 403, ETSI QSIG 300 239, Brazil ISDN ETSI 300 403,...
  • Page 840: Supported Isdn Line Services

    Region-based system settings Supported ISDN line services The following table shows the ISDN private network services that are supported by the Business Communications Manager. Table 272 ISDN line services MCDN over PRI (SL-1) DPNSS DASS2 ETSI QSIG Basic Call Basic Call Basic Call Basic Call Name display...
  • Page 841: Defining Time Zones By Country And Language

    Region-based system settings Defining time zones by country and language Time zones are based on the actual time zone where the Business Communications Manager server is located. The Time Zone dropdown list on the initialization screen, allows you to be very specific in choosing a compatible time zone. If your exact location is not on the list, choose the one with the time zone closest to you.
  • Page 842 Region-based system settings Table 275 Region defaults (Continued) Functionality Attribute North American Global United Kingdom Call Back Kill time 180 sec 180 sec 360 sec PCM Companding Law mu-law a-law EBI a-law EBI Race Integration disabled disabled disabled OLI digits fixed 10 digits fixed 10 digits variable length a...
  • Page 843 Region-based system settings Table 275 Region defaults (Continued) Functionality Attribute North American Global United Kingdom Handsfree none none none Pickup Group none none none Remind Delay 60 secs 60 secs 60 secs Allow SLR disabled disabled disabled Transfer Callback Show in second disabled disabled disabled...
  • Page 844: Dialing Plan Defaults

    Region-based system settings Dialing plan defaults Some profiles have default restriction dialing filters. The table below lists the filters for these profiles. Table 276 Default dialing restrictions, by profile Restriction Restriction/ Restriction/ Restriction/ Restriction/ Restriction/ Restriction/ Profile filter # override override override override...
  • Page 845: Bri And Pri Line Types

    BRI and PRI line types BRI and PRI line types The following table provides a description of the types of lines that BRI and PRI trunks can provide. These are set under Resources, Media Bay Modules, Bus XX, Module X on the Unified Manager.
  • Page 846: Table 277 Bri And Pri Line Types (Dtm And Bri Modules)

    BRI and PRI line types Table 277 BRI and PRI line types (DTM and BRI modules) (Continued) Digital trunk types Description DPNSS (international term: Q.Sig or Q.931) a digital private network signaling system which allows phone systems from different manufacturers to be tied together over E1 lines, offering significant enhancements to Business Communications Manager networking capabilities.
  • Page 847: Callpilot Regions

    CallPilot regions CallPilot regions The CallPilot portion of the Business Communications Manager application also has a region setting that defines some call-management-related system defaults. The CallPilot region is specified at system initialization and start up when you run the Quick Start Wizard. You can also change this setting under System, Identification. The following table lists the default prime language for the countries (regions) where the voice mail application is supported.
  • Page 848: Table 279 Callpilot Feature Default Anomalies

    CallPilot regions The following table lists the feature default settings that differ among the CallPilot regions. Table 279 CallPilot feature default anomalies Mail box Alternate QZ Max local National Number login mapping number length Length Maximum CLID display Regions False True Australia CALA Caribbean...
  • Page 849: System Features

    Appendix B System Features This section contains two lists: • “Business Communications Manager feature codes” on page 849 which contains a complete list of the feature codes that can be accessed from digital and IP telephones. • “Button programming features” on page 853 contains a list of the features that are programmable under the DN record Button Programming heading.
  • Page 850 Business Communications Manager feature codes Table 280 Features sorted by feature name and by activation code (Continued) Sorted by feature name Sorted by activation code FEATURE FEATURE Feature name <code> <code> Description Call Forward - Cancel *503 Language - Alternate 2 Call Forward to Voice Mail *504 Language - Alternate 3...
  • Page 851 Business Communications Manager feature codes Table 280 Features sorted by feature name and by activation code (Continued) Sorted by feature name Sorted by activation code FEATURE FEATURE Feature name <code> <code> Description Line Redirection - Cancel Privacy (on/off) Link Line Redirection Long tones Line Redirection - Cancel Malicious call identification (MCID)
  • Page 852 Business Communications Manager feature codes Table 280 Features sorted by feature name and by activation code (Continued) Sorted by feature name Sorted by activation code FEATURE FEATURE Feature name <code> <code> Description Find available SWCA *520 #873 Turning Routing service off Find oldest SWCA *537 Alarm time...
  • Page 853: Button Programming Features

    Button programming features Button programming features This section describes the features available for Button Programming on the telephone records. Refer to the Business Communications Manager Telephone Features User Guide for information about using these features. Note that some of these features need other system settings in order to work. •...
  • Page 854 Button programming features Table 281 Button Programming Feature settings (Continued) Set command (FEATURE Feature Description <code>) Restriction override Allows the user to override any restrictions for the call they are trying to dial. Priority Call Allows the user to access a telephone that is currently busy. Transfer Allows the user to transfer an existing call to another telephone.
  • Page 855 Button programming features Table 281 Button Programming Feature settings (Continued) Set command (FEATURE Feature Description <code>) Call Information Allows the user to view information about a current call. Call Log - View Allows the user to view call log information. Information Call Log - Manual Allows the user to manually active call logging.
  • Page 856 Button programming features Table 281 Button Programming Feature settings (Continued) Set command (FEATURE Feature Description <code>) Display voice mail DN Displays the voice mail, skill set, or IVR extension number. Transfer to mailbox Transfers calls to a mailbox on the CallPilot system. Voice mail interrupt Intercepts a caller who is listening to your mailbox greeting or leaving a message.
  • Page 857: Isdn Overview

    Nortel Networks endeavours to test all variations of ISDN PRI on Business Communications Manager; however, due to the number of variations, this is not always possible.
  • Page 858: Analog Versus Isdn

    Welcome to ISDN Analog versus ISDN ISDN offers significantly higher bandwidth and speed than analog transmission because of its end-to-end digital connectivity on all transmission circuits. Being digital allows ISDN lines to provide better quality signaling than analog POTS lines, and ISDN out-of band data channel signaling offers faster call set up and tear down.
  • Page 859: Isdn Layers

    Welcome to ISDN ISDN Layers ISDN layers refer to the standards established to guide the manufacturers of ISDN equipment and are based on the OSI (Open Systems Interconnection) model. The layers include both physical connections, such as wiring, and logical connections, which are programmed in computer software.
  • Page 860: Services And Features For Isdn Bri And Pri

    Services and features for ISDN BRI and PRI Services and features for ISDN BRI and PRI As part of an ISDN digital network, your system supports enhanced capabilities and features, including: • faster call set up and tear down • high quality voice transmission •...
  • Page 861: Network Name Display

    Services and features for ISDN BRI and PRI Business Communications Manager supports the following ISDN services and features offered by ISDN service providers: • D-channel packet service (BRI only) to support devices such as transaction terminals. Transaction terminals are used to swipe credit or debit cards and transmit the information to a financial institution in data packets.
  • Page 862: Name And Number Blocking (Onn)

    Services and features for ISDN BRI and PRI For more information, see “Network name display” on page 461. Consult your customer service representative to determine which of these features is compatible with your service provider. Name and number blocking (ONN) (North America only) When activated FEATURE 819 allows you to block the outgoing name and/or number on a per-call basis.
  • Page 863: Emergency 911 Dialing

    Services and features for ISDN BRI and PRI Emergency 911 dialing (North America only) The ISDN PRI feature is capable of transmitting the telephone number and internal extension number of a calling station dialing 911 to the Public Switched Telephone Network (PSTN). State and local requirements for support of Emergency 911 dialing service by Customer Premises Equipment vary.
  • Page 864: Isdn Hardware

    ISDN hardware • allows long distance carrier selection through user-dialed Carrier Access Codes Consult your customer service representative to determine how your dialing plan is configured. ISDN hardware To support connections to an ISDN network and ISDN terminal equipment, your Business Communications Manager must be equipped with a BRI S/T Media Bay Module (BRIM) or a Digital Trunk Media Bay Module (DTM) card configured for PRI.
  • Page 865: S Reference Point

    ISDN hardware S Reference Point The S reference point connection provides either a point-to-point or point-to-multipoint digital connection between Business Communications Manager and ISDN terminal equipment (TE) that uses an S interface. Refer to the figure below. S loops support up to seven ISDN DNs, which identify TE to the Business Communications Manager system.
  • Page 866: Clock Source For Isdn

    ISDN hardware Figure 221 T reference point network connection ISDN Business Communications Manager A T loop can be used in combination with an S loop to provide D-packet service for a point-of-sale terminal adapter (POSTA) or other D-packet device. D-packet service is a 16 kbps data transmission service that uses the D-channel of an ISDN line.
  • Page 867: Isdn Bri Nt1 Equipment

    NT1, and between the NT1 and the Business Communications Manager system. The NT1 from Nortel Networks is packaged two ways: • a stand alone package which contains one NT1 card (NTBX80XX) and a power supply (NTBX81XX) •...
  • Page 868: Ordering Isdn Pri

    Ordering ISDN PRI Ordering ISDN PRI This section provides information about how to order ISDN PRI service for your Business Communications Manager. Ordering ISDN PRI Service in Canada In Canada, order Megalink™ service, the trade name for standard PRI service and set the Business Communications Manager equipment to the supported protocol that is identified by your service provider, either DMS-100 or NI-2.
  • Page 869: Ordering Isdn Bri Service In The United States

    Supported ISDN Protocols Ordering ISDN BRI Service in the United States In the U.S., regardless of the CO (Central Office) type, order National ISDN BRI-NI-1 with EKTS (Electronic Key Telephone System) turned off. Use the following packages as a guideline for ordering your National ISDN BRI-NI-1.
  • Page 870: Isdn Programming

    ISDN Programming ISDN Programming Most of the programming for PRI and BRI lines, and ISDN terminals is performed under the Resources, Media Bay Modules heading in the Unified Manager. This section gives you an overview of programming for PRI and BRI lines, ISDN terminals and devices, and D-packet services.
  • Page 871: Programming Isdn Bri Resources

    ISDN Programming Programming ISDN BRI Resources Some steps may not be necessary depending on the service you are providing. For more detailed programming information, see “Configuring resources — media bay modules” on page 135 “Configuring lines” on page 239. For complete module installation instructions and safety precautions, see the Business Communications Manager Installation and Maintenance Guide.
  • Page 872: Program Pri Lines

    ISDN Programming If you are configuring auto-answer BRI trunks to map to target lines, program the received number for the target line (see “Assigning target lines” on page 297) to be the same as the Network DN supplied by your service provider (Loops, Loop XXX, SPIDs, SPID 1, Network DN).
  • Page 873: Program Direct Inward System Access (Disa) On Pri Lines

    ISDN Programming Program Direct Inward System Access (DISA) on PRI Lines (North America) When a DTM is configured for PRI, all lines on that module are set to Auto Answer without DISA. DISA, however, can be accessed by one of two methods. Method 1 Define the DISA DN to match the trailing digits of the Called Party Number (CDN).
  • Page 874: Program Isdn Equipment

    ISDN Programming Program ISDN Equipment PRI modules support various applications that are enabled by PRI. Terminal equipment for BRI Cards ISDN devices and terminals connected to the Business Communications Manager system must be configured under Services, Telephony Services, Loops. You choose directory numbers for ISDN equipment from a predetermined range of DNs (597 to 694).
  • Page 875: D-Packet Service (Bri Only)

    ISDN Programming D-packet Service (BRI only) The D-packet service supplied by the Business Communications Manager system supports a point-of-sale terminal adapter (POSTA). Connecting a POSTA allows transaction terminals (devices where you swipe credit or debit cards) to transmit information using the D channel of the BRI line, while the B channels of the BRI line remain available for voice and data calls.
  • Page 876 ISDN Programming N0008589 3.3...
  • Page 877: Configuring An Analog Device

    Appendix D Configuring an analog device Analog device DNs are programmed in the same way as digital telephone DNs. However, programming settings will vary, depending on the type of analog device and how it is connected to the Business Communications Manager system. There are two types of analog devices: voice and data communications.
  • Page 878: Configuring An Analog Device Dn Record

    Configuring an analog device DN record Configuring an analog device DN record This section describes the areas of DN record programming that are required or which differ from a default setting. For general information about DN record programming, refer to “Configuring DNs for system devices”...
  • Page 879: General Heading

    Configuring an analog device DN record General heading The General heading allows you to assign a name to the analog device and to view the physical port number assigned to the DN. From Unified Manager, click on the keys beside Services, Telephony Services, System DNs, and Active set DNs.
  • Page 880: Line Access

    Configuring an analog device DN record Table 285 General record fields (Continued) Attribute Values Description Device port <port number> This read-only setting shows the port number for the DN. Line access Line access settings allows you to assign lines or line pools to an analog device. After lines and line pools are assigned, you can choose a prime line for the analog device.
  • Page 881: To Assign Line Pools

    Configuring an analog device DN record Table 286 Line assignment fields (Continued) Attribute Values Description Caller ID set Y or N This setting only appears for analog lines that provide CLID. This setting is for analog display telephones connected to an ASM 8+ module using the North American profile.
  • Page 882: Defining Device Capabilities

    Configuring an analog device DN record Use the table below to select a prime line. The prime line is the line that is automatically selected when a call is made from an analog device. Table 287 Prime line field Attribute Values Description Prime line...
  • Page 883: Figure 227 Capabilities Fields Screen Example

    Configuring an analog device DN record Figure 227 Capabilities fields screen example Use the information in the following table to configure seven specific capabilities fields (if required) for an analog device. Table 288 Capabilities fields Attribute Values Description Handsfree Auto Set this value to None for analog devices.
  • Page 884: Assigning An External Hotline

    Configuring an analog device DN record Table 288 Capabilities fields (Continued) Attribute Values Description Paging Y or N This setting is for analog telephones. Defines whether paging announcements can be make from the analog telephone. Set this value to N for modems and fax machines.
  • Page 885: Determining Analog Device Settings

    Configuring an analog device DN record Use the information in the following table to configure an external hotline setting. Table 289 Hotline values Attribute Values Description External External # Use this setting for modems credit card verifiers and fax machines. Facility Value: Enter pause (F78) for the external number.
  • Page 886: Reviewing Set Restrictions

    Configuring an analog device DN record Table 290 ATA settings (Continued) Attribute Values Description ATA use On site Select the location of the analog device. Off site The Off site value is supported on analog devices connected to an ASM 8+ module. ATA tones Y or N Defines whether the analog device receives system tones.
  • Page 887: Glossary

    Glossary The following sections provide brief explanations of the terms used in this documentation. ABCDEFGHIKLMNOPQRSTUVW Numerical 7000 digital phone This telephone has four programmable buttons, but no display, and is not available in all markets. 7100 digital phone This telephone has a single line display and one programmable button without an indicator.
  • Page 888 access codes A digit or group of digits that provide direction to the system as to how to route a call or access a feature, such as call park. The Access Codes heading also provides access to the line pool codes and carrier codes. (Services, Telephony Services, General Settings, Access Codes).
  • Page 889 asynchronous A method of transmission where the time intervals between characters are not required to be equal. Signals are sourced from independent clocks with different frequencies and phase relationships. Start and stop bits may be added to coordinate character transfer. ATA2 The Analog Terminal Adapter (ATA2) connects analog telecommunication devices, such as fax machines, answering machines, and single line telephones, to a digital media bay...
  • Page 890 Automatic Daylight Savings Time A feature that switches the system to standard or daylight savings time at programmed times. This feature is set when you run the Quick Install Wizard and specify a time zone setting. An IP telephone that is in a different time zone than the system to which it is registered, must be configured manually to the local time, and then manually changed when Daylight Savings Time occurs.
  • Page 891 base station This device is part of the wireless/portable handset systems that can be used with the Business Communications Manager. It contains radio equipment that receives and sends signals to a cordless handset used within a specific radius of the base station. The base station connects to a media bay module installed in your Business Communications Manager System.
  • Page 892 transferred call was assigned a higher intrusion level. Also, the user at the other end has the option of refusing the call by entering the Do Not Disturb feature code. The Basic Rate Interface (BRI) ISDN interface uses two B-channels and a D-channel (2B+D).
  • Page 893 • active call: set displays elapsed time of call (not dynamic) call forward A feature that forwards all the calls arriving at your telephone to another telephone in your system, or, if you are using ISDN lines to forward the call, to external systems. To have calls forwarded outside the system on other types of lines, use the line redirection feature.
  • Page 894 The retrieval code appears on the display of your telephone when you park the call. You can park up to 25 calls on the system at one time. (FEATURE 74) You can also specify a prefix to the retrieval under Access codes. (Services, Telephony Services, General Settings) You also need to specify a timeout for parked calls (Services, Telephony Services, General settings, Timers) call park callback...
  • Page 895 A central answering position (CAP) consists of a 7316E digital phone connected to one or more key indicators modules (KIM). Without system configuration, the modules support extra memory buttons (CAP module, 48; KIM, 24). The system can support as many of these CAPs as the telephony resources support 7316E digital phone.
  • Page 896 centralized voice mail You can use the Business Communications Manager auto attendant and voice mail applications on one Business Communications Manager system within a private MCDN network to support all the systems connected on the private network. The Business Communications Manager can also be set up to access voice mail systems attached to other systems, such as a Meridian 1.
  • Page 897 clock sources This is a feature of DTM and BRI modules that allows you to determine where these modules receive their synchronization timing for the network. coldstart A coldstart occurs when you lose all system programming. You can lose system programming after a major event such as an extended power failure.
  • Page 898 DASS2 Digital Access Signaling System Number 2 (DASS2) is a UK proprietary standard for signaling on ISDN connections between customer premises and the public network. DASS2 is used between the customer equipment and ISDN local exchange and is suitable for multiple access. Data link connection identifier See DLCI.
  • Page 899 dialing plan This is the overall numbering plan for your system that determines what numbers need to be dialed to reach specific destinations, and what numbers need to be received to be directed into the system, or through the system, in the case where the Business Communications Manager is acting as a node on a tandem network.
  • Page 900 directory number See DNs. DISA Directed Inward System Access (DISA) is a feature that is assigned to lines to allow the system to answer calls from users from outside the system, who want to access the system and use system features. When this feature is active, the external user hears a stuttered dial tone and must enter a valid class of service (COS) password to proceed.
  • Page 901 A Domain Name Service (DNS) proxy translates alphabetic domain names into computer-readable IP addresses. For example, the domain name www.nortelnetworks.com for the Nortel Networks web site can translate to the IP address 192.177.5.18. After a domain name is translated into an IP address, the workstations on your network can communicate with the web site.
  • Page 902 double density Double density for station modules is a function of Business Communications Manager 3.0 and later software. This functionality uses the B2 portions of the line to provide an additional 16 possible telephone connections on each MSC bus. Only station modules that support this feature provide this access, including the ASM8, DSM16+ and the DSM32+ media bay modules.
  • Page 903 dynamic IP address Dynamic IP addresses are assigned to computers by an IP address server, as the computer needs it. Usually there is a particular range or scope of IP addresses that your network uses. With dynamic IP addressing, a computer can have a different IP address every time it connects to the network.
  • Page 904 ETSI European Telecommunications Standards Institute. ETSI defines the protocol defined by the institute that provides telecommunications standards in Europe. See also ANSI and QSIG. event message The system stores event messages in the system log and displays these messages during a maintenance session.
  • Page 905 filtering Filtering is the process of examining a data packet on the network to determine the destination of the data and whether the packet should be passed along on the local LAN, copied to another LAN, or dropped. FQDN A Fully Qualified Domain Name (FQDN) consists of a combination of host name and domain name.
  • Page 906 system (local gateway) and remote system (remote gateway) so the system can correctly receive and send information over the trunk. If the network has a Gatekeeper application, this application determines where data packets go, and it is not necessary to configure the remote gateway in this case.
  • Page 907 hard disk A data storage device that uses rigid magnetic disks permanently installed inside the computer CPU or a portable unit. HDLC High-level Data Link Control (HDLC) is a group of protocols or rules for transmitting data between network points or nodes. Data is organized into a unit, called a frame, and sent across a network to a destination that verifies its successful arrival.
  • Page 908 host system signaling Also referred to as end-to-end signaling. Telephones can access a remote system or dial a number on an different carrier by using host feature activation codes, such as Link, Pause and Run/Stop. hot desking This is an IP telephone feature that allows a user to forward complete IP functionality from one IP telephone to another one, even at a remote location until the feature is deactivated.
  • Page 909 in-band In-band is a method of device access that utilizes a network interface component within the device. Install Client button This button, located on the Unified Manager front page, provides access to Business Communications Manager supplementary management programs, such as the Java class files.
  • Page 910 internal user A person using a telephone connected to the Business Communications Manager telephone. Internet A global TCP/IP network linking millions of computers for communications purposes. Internet Engineering Task Force See IETF. Internet-standard Network Management Framework Device configuration and monitoring via SNMP. Interrupt Request See IRQ.
  • Page 911 IRQ is a signal that is sent by a hardware device to the microprocessor, requesting its immediate attention. For example, every communications port has an interrupt request line for telling the microprocessor when data is received or transmitted. IRQ conflict An IRQ conflict occurs when two hardware devices have the same IRQ.
  • Page 912 Kbyte The abbreviation for kilobyte. A kilobyte is equal to 1024 bytes. keycode This code is used to enable application options on the Business Communications Manager. These codes are entered by the installer or system administrator. Keycodes are a combination of access codes that are encrypted to open a single application on a specific Business Communications Manager.
  • Page 913 line number A number that identifies an external line connected to the Business Communications Manager. The total number of lines depends on the number and type of trunk media bay modules installed. Voice over IP (VoIP) trunks and target lines are also defined as line numbers, although they do not connect to the system through physical lines.
  • Page 914 Long Tones This feature allows you to control the length of a tone so that you can signal devices such as fax or answering machines. These devices require tones longer than the standard 120 milliseconds. (FEATURE 808) MAC address The Media Access Control is a physical address that is the portion of the data-link layer in 802.x networks.It controls addressing information of the packet and enables data to be sent and received across a local area network.
  • Page 915 See MSC. Meridian 1 ISDN Primary Rate Interface A protocol used between members of the Nortel Networks Meridian family of Private Telecommunication Network Exchanges. The signaling information is carried via time slot 16 of a 2.048 Mbit/s digital transmission system.
  • Page 916 music source You can connect a radio or other source of music to the system to provide music for the Music on Hold and Background Music features. A music source is customer-supplied. The source is connected through a jack on the MSC on the Business Communications Manager.
  • Page 917 network Two or more computers linked electronically to share programs and exchange data. This process requires both hardware devices and software to coordinate the connection and data exchange. Network Call Redirection Information See NCRI. network device A network device is a hardware device used as a communications component within a network.
  • Page 918 out-of-band Out-of-band is a method of device access which circumvents the network interface components within the device. overflow For digital and IP telephones, turn this setting on to allow the system to choose a fallback path for an outgoing call. The feature is turned on under Routing Service, <schedule>.
  • Page 919 • Page Time out is defined under Timers (Services, Telephony Services, General Settings). This setting controls how long a Page Announcement can last. • Page zone defines An area in the office that receives internal page announcements that other areas of the office do not hear. This feature is defined for each telephone under Capabilities.
  • Page 920 Peripheral Component Interconnect (PCI) slots are hardware sockets on a circuit board. For instance, the Business Communications Manager has four PCI slots on the MSC board. Each slot contains one PEC III card, which handles call processing for the system. Peripheral Component Interconnect Slot See PCI.
  • Page 921 power cable A cable that connects the Business Communications Manager base unit to a power source. Point-to-point protocol (PPP) is a protocol for communication between two computers using a serial interface, typically a personal computer connected to a server by a telephone line.
  • Page 922 private access code A one-digit number that identifies the systems on a private network that is using the a Universal Dialing Plan (UDP). This number is assigned in front of the Home Local Code (HLC) that is unique to each node. Dial string: (<priv.access.code>+<HLC>+<DN>) Private branch exchange See PBX system.
  • Page 923 pulse/tone dialing An external line setting for pulse or tone dialing. Pulse is the traditional method of dialing used by rotary-dial or push-button single-line telephones. Tone dialing allows telephones to communicate with other devices such as answering machines. You require tone dialing to access the features that PBX systems can provide or to use another system remotely.
  • Page 924 recall See Link. receiver In this document, this term can refer to the handset of a telephone. regression code This feature restores the previous system security number so that previously applied UTAM Activation Codes and Portable Credit Codes can be re-entered to restore full system operation for Companion components.
  • Page 925 remote device A remote device is any network device that is accessible only by means of communication over a digital or analog (dial-up) network. remote monitoring A feature that allows an off-site technician with a computer to call in and troubleshoot your system through the built-in modem.
  • Page 926 ring type A feature that allows you to select one of four distinctive rings for your telephone. See also distinctive ring. This feature is set under User Preferences, but can be changed at a telephone. (Services, Telephony Services, System DNs) ring volume A feature that allows you to set the volume at which your telephone rings.
  • Page 927 Routing Information Protocol See RIP. routing service Routing services defines schedules that allow you to change the route of a call without changing the destination code. This provides a way of shifting from one service provider to another at different times of the day if the rates are better. The system determines the routing;...
  • Page 928 Server Message Block See SMB. service control password This is the password that you enter when you want to start or change routing and restriction service settings. Service modes See services. Service Profile Identifiers See SPIDs. services You can define service schedules for ringing services, restriction services and routing services.
  • Page 929 Manager uses to provide secure access to the system, including the Unified Manager. The access application recommended by Nortel is PuTTY SSH (by SSH inc.). This application replaces the Telnet access used on BCM 3.0 and previous versions of the Business Communications Manager.
  • Page 930 Start DN This is the first directory number (DN) in the DN range on the system. This number is specified during system setup (Quick Start Wizard). Changing this number causes the system to perform a cold boot and all telephony programming would be lost. This number is assigned by default to DS30 02 first port.
  • Page 931 Symbol See NetVision. synchronous A synchronous signal is sourced from the same timing reference. A synchronous signal causes the interval between successive bits, characters, or events to remain constant or locked in to a specific clock frequency. Synchronous Dynamic Random Access Memory (SDRAM) Computer memory that stores data temporarily.
  • Page 932 Digital carrier system or line that carries data at 1.544 Mb/s. These lines can be used to connect systems on a private network. See also universal T1 Wide Area Network (UTWAN). tandem calling On a private network, a node can pass a call to one or more nodes on the private network, and then out to the PSTN of the appropriate remote node.
  • Page 933 TCP checks packets of information for errors, sends requests for re-transmission in the event of errors and returns multiple packets of a message into the original sequence when the message reaches its destination. IP controls how packets are sent out over networks and has a packet addressing method that lets any computer on the Internet forward a packet to another computer that is a step or more nearer to the packet target.
  • Page 934 The trunk route optimization MCDN feature allows the call to find the most direct route through the private network to send a call between nodes. This function occurs during the initial alerting phase of a call. tromboning Tromboning refers to the way a transferred call uses lines on a network. If TAT is not present (no MCDN protocol is applied), a call made from a telephone on another system, and then transferred from the telephone to a third telephone on the first system can consume two network lines.
  • Page 935 Type of Service See TOS. Telephony dialing plan: Networked systems that connects using a Universal Dialing Plan (UDP) have system identification numbers and a location code that are unique to each system. Also, the Private DN length is the same on all systems. The system identification numbers and location codes are entered as a unique destination code that gets dialed out with whatever extension is being dialed.
  • Page 936 user data User Data is an option in the Set Copy feature. User Data refers to the personal settings which are unique to a telephone, and which are not programmed for the system. You program User Data for each telephone. These settings, for example, include Personal Speed Dial and the assignment of programmable memory buttons.
  • Page 937 voice call deny Use this feature to prevent your telephone from receiving voice call. voice message center A maximum of five external voice message centers can be programmed onto a Business Communications Manager. However, each telephone can only access one system. If the Business Communications Manager is hosting voice messaging for other systems, remote call-in must be set up to accommodate external callers, even over a private MCDN network.
  • Page 938 web proxy A web proxy, or HTTP proxy, is a server that acts on behalf of the requester of pages from an HTTP server and the Internet. You must bypass this server to correctly use the Business Communications Manager. Weighted Fair Queuing (WFQ) is a queuing method that allows low volume traffic such as Telnet to be given priority and interactive traffic receives higher priority than batch transfers.
  • Page 939 Index Symbols 7406 overview 234 # of lines/loops 144 78, 1.5-second pause 332 *89, programmed release 332 804, wait for dial tone code 332 *9, Run/Stop code 332 808, long tones 332 Numbers dialing 901 2001 emergency dialing 222 default button programming 439 enhanced configuration 360 deregistering 375 line redirection 418...
  • Page 940 Index queue status (909) 853 agent busy/ready (908) 847, 853 acronyms 51 agent login/log out, ACD (904) 853 action agent login-log out (904) 847 configuring 805 policy parameters 807 encryption protocol 765 activation code, features 847 firewall rules 768 NAT restriction 765 active application DNs 371 alarm active Companion DNs 371...
  • Page 941 Index first (*502) 848 Answer with DISA, trunk mode 250, 268 second (*503) 848 answering calls third (*504) 848 Answer other telephones 220 alternate services, overview 232 Call Display services 213 Call Pickup 219 alternate telephone number, WAN modem link Conference Calls 223 parameters 690 distinctive ring patterns 217...
  • Page 942 Index ATA use (site) 422 full 903 Call Park prefix 323 per telephone 887 external code 322, 902 Auto Hold (73) 847 glossary 887 auto hold for incoming page 418 hospitality 592 auto hold, allow/disallow 417 line redirection 418 message indicator 422 auto log 891 options 887 attempts, alarm 596...
  • Page 943 Index CAP/KIM 446 basic packet filters, see also stateless 817 auxiliary ringer 888 basic rate interface, see also BRI 890 Add Users wizard 388 baud rate 889 Directed Pickup 219 BayStack Edit DN Record Template Wizard 382 data module 190 hunt groups 579 module programming 190 overview 233...
  • Page 944 Index ISDN 909 creating IPSec tunnel 779, 780 line types 843 dial-up support 687 Low line loop 144 frame relay 716 mapping to target lines 260, 267, 870 hardware overview 100 module function 862 identifying software version 110 network DN 281 IP Routing global protocols 709 ONN blocking 485 logging off 86...
  • Page 945 Index button programming agent login-log out (904) 847 Add Users wizard 390 Answer DN warning 465 answer keys 465, 467 DN length change 294 changing, Add Users wizard 392 DSP resources 615 Edit DN Record Template wizard 384 MSC custom 629 features list 851 queue request (909) 847 features, Add Users wizard 392...
  • Page 946 Index call forward no answer Call Pickup overview 226 Directed Pickup 219 Group Pickup 220 Call forward on busy overview 226 call pickup directed (Feature 76) 892 call handling overview 224 Call Queuing at telephone (801) 852 Call information accessing (811) 848 call queuing Feature 801 892 call information...
  • Page 947 Index messaging DN, Add Users wizard 388 CAP/KIM assignment 893, 901 messaging DN, Edit DN Record Template Wizard CAP/KIM button programming internal autodial 448 programming overview 237 capabilities Quick Start Wizard 105, 107 Add Users wizard 387 region, Quick Start Wizard 105 auto hold for incoming page 418 transfer to mail box (986) 854 Edit DN Record Template Wizard 382...
  • Page 948 Index remote access 922 Clid Match Length 466 voice mail 894 CLID name display 461 certificate client 894 private security key 69 COPS, configuration 812 security, logon 67 PPTP client 756 uploading a security certificate 69 client description Challenge-Handshake Authentication Protocol, see also lease information 651, 658 CHAP 894 reserved addresses 649, 657...
  • Page 949 Index sending messages, overview 229 DHCP Remote Scope 653 DHCP, LAN 644, 652 communicating with other switches 248 DHCP, overview 639 communication channels, MSC resources 612 DNS, overview 705 companding laws, by region 834 NetLink manager, overview 731 Companion QoS mean opinion score 727 active DNs 371 QoS monitor, overview 725 routing, overview 707...
  • Page 950 Index line programming 242 exporting DHCP 662 telephone settings 399 fixed channel, DDI Mux 165 importing DHCP 663 copyright 2 network wizard 636 core software, regions 832 Policy (DiffServ) 793 reconciling DHCP 663 auto DN 321 data channel 895 calls answered with DISA 321 data compression password (68) 848 PPTP tunnel link 759...
  • Page 951 Index decreasing maximum value, MSC 626 delay Camp timeout 478 decreasing minimum value, MSC 626 dial, signaling programming 255, 258, 270 decrement TTL, LAN setting 666 host delay timer 478 DECT link timer 478 auto answer issue 414 Park timeout 478 call display 455 ring transfer 464 DECT Configuration Wizard 370...
  • Page 952 Index DHCP summary 643 wild cards 340, 341 DNS summary 706 destination IP IP firewall summary 818 AH firewall 768 IP routing summary 709 DCOM rules 827 IPSec global 772 ESP firewall 768 ISDN summary 694 ICMP 769 LAN DHCP scope 645 IKE firewall 768 LAN interface 667 IP firewall 822...
  • Page 953 Index exporting data 662 dial-in importing data 663 setting up callback 127 LAN 644, 652, 661 dial-in access 122 PPTP 754 dialing reconciling data 663 automatic dial 222 relay agent 640 enbloc 901 relay agent configuration 660 insert pause (78) 852 Remote Scope 653 link code (F71) 332 remote scope excluded addresses 655...
  • Page 954 Index overrides 356 QoS overview 799 remote callers 274 QoS summary parameters 799 remote restrictions 359 queue managers 795 routing 348 traffic conditioners 795 telephone 450 Diffserv wild card character 358 TOS 931 dialing timeout 312 DiffServ Code Point (DSCP) 794 dialling Digital pre-dial 222...
  • Page 955 Index direct-dial telephone display Add Users wizard 388 voice mail DN (985) 854 Edit DN Record Template Wizard 382 display buttons 898 sending messages 465 display network name 859 Directed Inward System Access, see also DISA 898 Display Voice Mail DN (985) 848 Directed Pickup disposition, IP firewall 821 answering from any telephone (76) 852...
  • Page 956 Index DN length DECT DNs, wizard 370 call by call service defaults 351 DECT feature non-support 416 changing 294 dialing restrictions 450 client application requirements 294 disable-enable module port 160 numbering plan overview 206 display voice mail DN (985) 854 overview 206 DN mapping for double density 365 programming 295...
  • Page 957 Index documentation terminating node 549 accessing 78 three party service 551 CD map 57 DPNSS lines, Embark switch 420 finding your way around 98 DRP, see distinctive ring pattern 217 related documentation 56 Domain Name Server, see also DNS 899 unanswered call transfer 900 Domain Name System, see also DNS 899 DS/CLID, module mode 144...
  • Page 958 Index ground start trunks 904 echo timeout, PPTP summary 755 ISDN hardware 862 edge devices, DiffServ 794 DTMF 900 edge note (EN) 794 configuration 630 edge router 708 dial mode 249, 252, 255, 257, 267 Edit 82 setting ANI/DNIS 256, 258, 270 edit DN record template wizard 76 duplicate system DNs 399 Edit DN Record Templates Wizard 379...
  • Page 959 Index IPSec global 772 ETSI QSIG IPSec levels 763 advice of charge- end of call (AOCE) 547 logon security certificate 67 hardware settings 547 methods 764 malicious call identification (MCID) 548 minimum web encryption 120 network diversion 548 security levels 119 network services 547 VPN protocols 751 networking 546...
  • Page 960 Index external code, access codes 322 Camp-on 82 225 camp-on 82 225 external lines, access code conflicts 325 change user speed dial *4 223 external paging 902 Class of Service (COS) 68 308 equipment 228 Do Not Disturb (85) 227 external routing feature codes 332 Do Not Disturb on Busy (85) 227 external voice mail...
  • Page 961 Index DND on Busy 227 clock source 864 forward timeout, DNS summary 706 File Transfer Protocol, see also FTP 903 forwarding calls filter group name, IP filters 804 Call Forward No Answer 226 Do Not Disturb on Busy 227 filter order, IP filters 804 Forward no answer delay, overview 226 filter type, policy 807 Line Redirection 418...
  • Page 962 Index gateways disconnect supervision for digital loops 904 DNS 705 redirect to 254 ISDN restrictions 694 use auxiliary ringer 251, 253, 255, 258, 260, 263, MSC media 612, 616 265, 266, 269 QoS monitor 725 ground start trunks GATM line settings 252 impedance 270 Group 82 module mode 144...
  • Page 963 Index hardware on hold settings 915 BCM200/400 889 home location code, DPNSS 557 overview 100 Home Location Code, see also HLC 905 station media bay module 928 hop-count threshold, relay agent 661 hardware compression, WAN modem link parameters hospitality (alarm) attempts 596 hardware ID 625 admin set 592 hardware limit, MSC component 630...
  • Page 964 Index Add Users wizard 388 Edit DN Record Template Wizard 383 ICMP facility 421 firewall filter settings 769 numbers 421 message control and error reporting 906 overview 232 ID length, carrier access codes 329 HTTP proxy ID, policy server 814 web proxy 936 ID, system parameters 110 hunt delay 578...
  • Page 965 Index Install Clients 87 internal user 908 SSH 927 Internal/External #, direct dial programming 324 install clients 78 international (special) access code 322 Integrated Services Digital Network (see ISDN) 857 international 800 890 interactive auto attendant, IVR 909 International INWATS, call by call services 349 Interactive Voice Response, see also IVR 909 internet intercom...
  • Page 966 Index dynamic 901 output filter 825 fixed, IPSec 767 output filter order 826 IPSec local network 775 packet filtering 817 IPSec remote network 776 summary 818 IPSec restrictions 767 IP header compression IPSec split tunnel 790 ISDN link parameters 695 ISDN summary 694 PPPoE link parameters 702 LAN address 669...
  • Page 967 Index static routes 717 remote IP pool 785 remote protocol firewall rules 768 IP service classes 796 remote user 782 IP Services list (900) 848 remote user tunnel rules 769 IP set DNs reg’d 374 restriction 666 IP telephones restrictions 187, 683 2001 buttons 439 sending all traffic 776 settings 766...
  • Page 968 Index ETSI 902 voice bus path 615 hardware 862 IVR, overview 238 installation programming 868 interface configuration 694 IP address assignment 697 IPSec dialup connection 767 Java layers 857 class files 909 line services, by region 838 Java Class, preinstalled 74 link parameters 695 loss plan setting 148, 149 java class files 909...
  • Page 969 Index lease information configuring resources 666 remote scope 658 description 910 reviewing 650 DHCP restrictions 639 lease time DHCP scopes 644 LAN DHCP scope 645 DHCP server settings 644, 652 remote scope 653 DHCP settings 661 least cost routing 345 ethernet 901 see also routing service 910 interface configuration 667...
  • Page 970 Index description 911 use remote package 247 external autodial 431, 448 line protocol, by region 837 line pool network 516 Line redirection network sharing 514 activate (84) 848 PRI line pools 412 Call Forward on busy 226 remote access packages 304 cancel (#84) 848 setting line type 249, 252, 255, 257, 259, 261, 262, hunt groups 586...
  • Page 971 Index link lockout at CO, loop start analog lines 251, 269 user 123 code (F71) 332 Lockout duration 133 initiating code at telephone (71) 852 lockout policy 132 insert into dial sequence (71) 849 failed logon attempts before lockout 133 protocol, Network Wizard 637 lockout duration 133 protocol, Quick Start Wizard 106...
  • Page 972 Index High line loop 144 low water mark, QoS advanced 800 Low line loop 144 Low/line loop 144 Loop avoidance, programming 557 LQR interval, PPP parameters 682 loop programming lunch schedule 491 clock source 279, 282 local number length 283 network DNS 281 ONN blocking (ETSI lines) 283 ONN blocking state 279, 290...
  • Page 973 Index maximum length, dialing restrictions 356 MCID overview 231 maximum link speed, WAN summary 175, 675 MCID (897) 849, 853 maximum message size, policy device 815 MD5 894 maximum server threads, web cache 723 MD5, encryption authentication 765 Maximum system speed dials 466 mean opinion score, QoS monitor 727 maximum time adjustment, NTP client 748 Media Access Control, see also MAC address 912...
  • Page 974 Index moving, Hunt group 583 cancel code (#1) 851 cancel send (#1) 849 memory button direct-dial telephones (F1) 465 activate programming (*3) 849 express messaging into voice mail (980) 853 autodial 223 message reply enhancement 465 program defaults 433 network features 567 menu overview 229 help topics 85...
  • Page 975 Index disabled/enabling a module 159 voice bus path 615 ports on bus 142 station 155 OSPF parameters 715 station ports 156 PPPoE internet 699 trunk ports programming 154 multi-line hunt 859, 867 viewing status 159 multi-link point-to-point protocol (MLPPP) 672 monitored events, WAN frame relay 679 Multilink PPP 913 monitoring...
  • Page 976 Index selective line redirection 460 network autodial access 504 name display, alpha tagging 461 configuration samples 501 name display, outgoing 543 DDI Mux overviews 162 name, blocking outgoing, service codes 485 dialout digits 504 naming services 489 overview 102 private systems to Business Communications Manager 502 adding default rules 737 public network to Business Communications...
  • Page 977 Index choosing link protocol 176, 676 received # 510 clock sources 895 received #, shared line pools 515 coordinated dialing using line pools 516 restriction filters 513 DASS2 896 RIP parameters 711 destination code 512 system callers 502 dialing plan 897 tandem network 523 DiffServ 793 tandem network originating calls 526...
  • Page 978 796 On hold (see hold) 464 Nortel IP terminal information, DHCP global options one button dialing (see Autodial) 223 Nortel IP terminal VLAN id, DHCP Global options cancel (#819) 849 initiating (819) 849 North America ONN blocking...
  • Page 979 Index routing protocol 915 NAT supported 735 routing protocol list 714 page OSPF log level, global settings 710 Add Users Wizard 388 auto hold for incoming page 418 OSPF neighbor, OSPF NBMA 716 combined (63) 849 out packets, COPS status 810 description of page features 916 outgoing Edit DN Record Template Wizard 382...
  • Page 980 Index complexity 134 PEC cards 615 COS 305 per hop behavior (PHB) 794 COS programming 306 Performance 82 default 122 performance graphs and tables, UTWAN 189 default log-on 67 default system admin. 73 performance graphs and tables, WAN 686 desk 593 performance, LAN 670 ee_admin 122 performance, menu 83...
  • Page 981 Index policy agent state 814 PPP User, UTWAN parameters 181 policy name, policy class 815 PPPoE Access Parameters 702 policy-enabled networking Channel Characteristics 703 actions 798 deleting an interface 704 configuration overview 793 dial-out user parameters 703 DiffServ Code Point (DSCP) 793 dial-up interface 701 filters 798 DSL 699...
  • Page 982 Index hardware 862 priority call 919 High line loop 144 (69) 849, 852 ISDN 856, 909 Add Users wizard 388 limits, call-by-call programming 351 allow/disallow 417 line pools 352, 412 Edit DN Record Template Wizard 382 line types 843 hunt groups 586 Low line loop 144 overview 222 MCDN network dialing 314...
  • Page 983 Index DPNSS 1 three party service 551 private/public, lines overview 215, 217 ETSI QSIG 546 process map ETSI QSIG services 547 access headings 293 forwarding to voice mail 420 configuring lines 240 integrating into 507 configuring loops 277 MCDN 521 configuring telephone records 364 MCDN break-in 570 system configuration 92...
  • Page 984 Index IP firewall 821 dialing plan 503 IP routing precedence 708 dialing plan programming 315 ISDN link parameters 695 DN prefix 316 ISDN supported 867 public DN lengths 315 loop programming 282 to tandem network 523 NAT 735 public networking NAT rule settings 738 outgoing calls 317 Password server 769...
  • Page 985 Index overview 799 remote scope address 654 policies, configuring 807 reserved addresses 649, 657 PPTP 753 restriction 666 remote access 921 role combinations RAS server TCP/IP parameters 687 deleting 801 RC2 894 summary parameters, DiffServ 799 RC4 894 QoS monitor mean opinion score 727 ReadOnlyUserGroup 122 overview 725...
  • Page 986 Index Edit DN Record Template Wizard 382, 388 remote system access 301 redirect to, line programming 252, 254, 256, 259, 260, remote access answer with DISA 898 redirected calls, Line Redirection and Call Forward COS password 895 COS passwords 305 redirection loops, avoiding 418 description 922 region...
  • Page 987 Index VoIP trunks 303 viewing network resources 635 viewing PEC configuration 625 remote scope viewing UTWAN resources 189 DHCP 653 viewing WAN resources 672 DHCP server 652 WAN backup link settings 690 excluded addresses 655 importing data 663 restart, delayed 114 lease information 658 restarting IP router 719 reconciling imports 663...
  • Page 988 Index retrieval code, park mode 464 turning on (871) 850 retrieving Call Park 322 global settings 709 voice messages 483 IP routing information 707 IPSec restrictions 767 retry interval network interface parameters 711 hospitality alarms 596 router information exchange 924 PPTP tunnel link 758 subnet summary 713 ring again...
  • Page 989 Index router ID, OSPF global settings 710 hotline 421 system speed dial 481 router priority, OSPF parameters 715 user speed dial 443 routing 344 routing table update mode, RIP parameters 712 call by call services network 518 CBC routing table 334 RPC port, firewall restrictions 823 CbC services routing 518 RSA 894...
  • Page 990 Index service control password 926 system 236 system password 75 scope status system timeout 118 LAN DHCP scope 645 Unified Manager considerations 117 remote scope 653 uploading a certificate 69 ScopeNam.dat, DHCP 662 user groups 129 screen user/system parameters 117 Unified Manager, main 80 Selective LIne Redirection, see SLR 460 Secondary clock source 279, 282...
  • Page 991 Index changing restrictions at telephone (872) 853 SHA1, encryption authentication 765 changing ringing at telephone (871) 853 share files changing routing at telephone (873) 853 SMB 927 control telephone 895 Shasta 5000, IPSec compatibility 767 extra dial set 496 short tones 417 line/set restrictions 453 overriding 488 signal...
  • Page 992 Index SM password source port, IKE firewall 768 silent monitor 587 source range mask SM sets DCOM rules 827 silent monitor 587 IP firewall 821 port 6800 rules 827 SM supervision 417 RPC rules 827 source routing, IP firewall 822 Windows share 927 South America, supported languages 833 SMB client signing 120...
  • Page 993 Index square system 201, 927 station modules, configuration 155 status MCDN Zone ID 544 DHCP summary 643 Virtual Private Network ID 544 DNS summary 706 IP firewall summary 818 IP routing summary 709 installing 87 IPSec global 772 ISDN summary 694 security protocol 927 LAN interface 668 standard dial 222, 428...
  • Page 994 Index supervised line 933 system access remote 301 supervised trunk mode 250, 268 system clock 747 supervisor dial-in access 122 system configuration process maps 92 suppression bit 279, 283, 290, 484 system configuration menu 83 SWCA System DNs associate SWCA key to call 470 auto hold control 417 active application DNs 371 auto-hold 475...
  • Page 995 Index tandem calling remote access on private network 930 T reference point 863 tandem calls T.38 fax MCDN special labels 325 UDP protocol 933 tandem network T.38 IP fax protocol 902 private nodes 930 tandem networking # of lines and loops 144 call routing 528 Answer timer 144 from public network 523...
  • Page 996 Index TE (see ISDN terminal equipment) 863 distinct ring in use 428 DN length 295 telco features DND on busy 416 programming lines 275 Edit DN Record Templates Wizard 379 telephones 454 external autodial button 431, 448 voice message center 483 feature 431, 448 Telephon, ATA Dvc setting 423 first display 454...
  • Page 997 Index user speed dialing 442 see also SSL 931 voice message center 483 text-based interface 931 voice message set 298 template voice message waiting indication 298 preconfigured 386 telephone restrictions, scheduling 452 remote 386 telephones template, button assignments 434 7000 885 templates 7100 885 using remote templates 394...
  • Page 998 Index call park callback 892 delayed ring transfer (DRT) 900 camp timeout 478, 892 initiate (3) 851 forward no answer delay 226 initiating at telephone (70) 852 held line reminder 905 priority call (69) 852 Host delay 478 ring delay 464 hunt delay 578 SWCA calls 474 hunt group queue time-out 578...
  • Page 999 Index trunk route optimization (TRO), MCDN 533 LOC 911 private access code 920 trunk route optimization, see TRO and MCDN 932 private dialing plan 933 trunk/line data private DN lengths 314 call by call services network 518 private network ID 314 E and M networking 511 T.38 fax protocol 933 line pool network 516...
  • Page 1000 1000 Index system power 933 User Profile warning 104 Use pool, routing 332 user speed dial description 934 use remote package 247 user speed dials, programming 442 use tone 597 Usergroupname 129 user domain user group 131 UserName-Password, PPP parameters 682 failed logon attempts before lockout 133 users ISDN dial-up 122...

This manual is also suitable for:

Business communications manager 3.7

Table of Contents