Part No. N0008589 3.3 December 2006 Business Communications Manager 3.7 Programming Operations Guide...
Page 2
Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Nortel Networks NA Inc. Trademarks NORTEL NETWORKS is a trademark of Nortel Networks.
Software licensing Software licensing The Apache Software License, Version 1.1 Copyright (c) 2000-2002 The Apache Software Foundation. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Contents Software licensing ........... . . 3 The Apache Software License, Version 1.1 .
Page 6
Contents Business Communications Manager system access ..... . 80 Unified Manager screen display ........80 Understanding the dynamic menu .
Page 7
Contents Entering information into the Quick Start Wizard ......108 Changing system identification parameters ....... . 110 Identifying your system and software version .
Page 8
Contents E1 parameters (region-specific) ........150 PRI Call-by-Call service selection .
Page 9
Contents Assigning lines for voice traffic ........171 Assigning lines for data traffic .
Page 10
Contents Planning your telephony services ........200 Three basic system telephony configurations .
Page 11
Contents Controlling telephone programming access ....... 236 Special features ........... . . 237 Chapter 9 Configuring lines .
Page 12
Contents Provisioning the loop variables ......... 285 Provisioning the Loop .
Page 13
Contents Setting up public network dialing ........316 About the Public DN lengths table .
Page 14
Contents Setting CbC limits (on U.K. core BCMs) ......353 PRI line pools ..........354 Viewing CbC limit metrics .
Page 15
Contents Using remote templates ..........396 Saving wizard pages on your computer .
Page 33
Figures Figure 1 Security Alert dialog (JVM) ........68 Figure 2 Main Product Maintenance and Support web page .
Page 34
Figures Figure 41 Finding state of port on Bus ........156 Figure 42 Ports on Bus, B1 screen .
Page 35
Figures Figure 83 Assigning a target line to a set ........298 Figure 84 Defining a Received number .
Page 36
Figures Figure 126 DN General screen for digital and IP telephones ..... . . 401 Figure 127 Line access fields ..........404 Figure 128 Assigning characteristics to each line .
Preface This guide explains how to program your Business Communications Manager system. For more information about the Business Communications Manager document suite, refer to “Related publications” on page This issue of the document reflects the added functionality built into the Business Communications Manager 3.7 release.
Before you begin Before you begin This guide is intended for these audiences: • the installer who performs the initial configuration of the system • the operator who manages the overall telephony operations of the system • the system administrator who manages the data and network operations of the system This guide assumes the following: •...
The IP telephones display a tag over the far left display key. Table 1 shows the icons that appear for each function on the different types of Nortel Networks digital telephones. Note that the 7316 and 7208 have a separate button for mute functions. The IP telephones and the 7316E have separate buttons for both mute and handsfree.
The Telephone Feature User Guide can be used with these telephones, as most Business Communications Manager features can be accessed from these telephones. The Nortel IP telephones also have a display menu that provides quick access to listed features.
Acronyms used in this guide Information about configuring IP telephones is contained in the IP Telephony Configuration Guide. The WLAN handsets have a separate installation and configuration document. Acronyms used in this guide This guide uses the following acronyms: Analog Access Lines Automated Call Distribution Authentication Header ANSI...
Page 52
Acronyms used in this guide Class of Service CSMA/CD Carrier Sense Multiple Access/Collision Detection Channel Service Unit Connected Telecommunications Equipment Centralized Voice Mail Digital Access Lines DASS2 Digital Access Signaling System Number 2 Data Communications Equipment DCOM Distributed Component Object Model DECT Digital enhanced cordless telecommunications or Digital European cordless telephone...
Page 53
Acronyms used in this guide Encapsulated Security Payload Full Double Density FQDN Fully Qualified Domain Name File Transfer Protocol GATM Global Analog Trunk Module HDLC High-level Data Link Control Handsfree Home Location Code (UDP dialing) Hospitality services HTTP Hypertext Transfer Protocol HTTPS Hypertext Transfer Protocol Secured Ingress Border Node...
Page 54
Acronyms used in this guide MCDN Meridian Client Defined Network (PRI SL-1) Message Digest algorithm MLPPP Multi-Link Point-to-Point Protocol MPPC Microsoft Point to Point Compression Media Services Card MS-PEC Media Services Processor Expansion Card Message Waiting Indicator Network Address Translation NBMA Non Broadcast Multi-Access NCRI...
Page 55
Acronyms used in this guide Routing Information Protocol Receive Loudness Rating Remote Procedure Call Realtime Transport Protocol Service Advertising Protocol SAPS Station Auxiliary Power Supply SDRAM Synchronous Dynamic Random Access Memory Secure Hash Algorithm Service Level Agreement Send Loudness Rating Server Message Block SMDS Switched Multimegabit Data Service...
Related publications WINS Windows Internet Name Service WLAN Wireless LAN Related publications In addition to the Programming Operations Guide, the Business Communications Manager documentation suite contains the following documents: • Management User Guide • Telephony Features Handbook • Installation and Maintenance Guide (BCM1000 and BCM400/200) •...
System documentation map System documentation map The following pages provide a map of the Business Communications Manager documentation CD. The map shows the overall task process of the system, and indicates which documentation deals with each section. All the documents described are included on the documentation CD that came with your system.
Programming Records Analog Telephone Analog Telephone Configuration Guide User Guide Digital telephony Installing lines Bix Block Wiring Guide Installation manuals Nortel Networks come with telephones digital telephones Digital Mobility Install/ Digital Mobility Configuration Guide Phone Cordless/radio digital handsets * Digital Cordless 7406...
System documentation map Operations documentation System Management and Maintenance Documentation CD Voice Mail and Call Management Applications Hardware Operations Installation Telephony Configuration Quick Start Wizard Using the telephones and equipment Setting up Lines, Programming Operations Guide Routes and 7000 User Card Access Codes 7100 User Card 7208 User Card...
System documentation map Call Management documentation System Management and Maintenance Documentation CD Voice Mail and Call Management Applications Hunt Groups Programming Operations Guide Hospitality Features Card Hospitality Services Call Detail Recording System Administration Guide Reference Guide Call Pilot Manager Set CallPilot Keycoded Applications Up and Operation Guide...
System documentation map Unified Manager and hardware maintenance documentation Hardware Installation Documentation CD Operations Voice Mail and Call Management System Management and Maintenance Programming Records (CD only) System configuration records Security and User Administration Programming Operations Guide Backup and Restore Management User Guide Maintenance and Troubleshooting Multi-site Administration: Network Configuration Manager...
How to get help How to get help If you do not see an appropriate number in this list, go to www.Nortelnetworks.com/support. USA and Canada Authorized Distributors - ITAS Technical Support Telephone: 1-800-4NORTEL (1-800-466-7835) If you already have a PIN Code, you can enter Express Routing Code (ERC) 196#. If you do not yet have a PIN Code, or for general questions and first line support, you can enter ERC 338#.
Page 63
How to get help India 011-5154-2210 Indonesia 0018-036-1004 Japan 0120-332-533 Malaysia 1800-805-380 New Zealand 0800-449-716 Philippines 1800-1611-0063 Singapore 800-616-2004 South Korea 0079-8611-2001 Taiwan 0800-810-500 Thailand 001-800-611-3007 Service Business Centre & Pre-Sales Help Desk +61-2-8870-5511 Programming Operations Guide...
Chapter 1 Getting started with Unified Manager This section provides you with information about the Unified Manager, the tool you access on the Business Communications Manager from your desktop and use to configure system information. This section describes the Unified Manager interface functions. You access Unified Manager on the Business Communications Manager through the internet, using a web browser.
Computer requirements Computer requirements To run the Unified Manager, you require: • a 133 MHz Pentium CPU or higher (or compatible) • 64 MB RAM • a minimum of 10 MB of available disk space • a minimum screen resolution of 1024 x 768 •...
Logging on to Unified Manager Using a HTTP Proxy server Unified Manager does not work properly if you use a HTTP Proxy server to connect to the Internet. If you use an HTTP Proxy server, you must change your web browser settings so you can bypass the Proxy Server when connecting to Business Communications Manager.
Understanding BCM SSL certificate properties Figure 1 Security Alert dialog (JVM) Click Yes. The first page of the Unified Manager appears. Refer to “Using the Unified Manager main page buttons” on page Understanding BCM SSL certificate properties When you first run the BCM version 3.7 software, you will note that the default Web access to the Business Communications Manager now utilizes SSL encryption for system security (BCM 3.5 and newer software).
Understanding BCM SSL certificate properties Uploading a certificate and a private security key Obtain a site certificate for your Business Communications Manager from a CA (Certificate Authority) vendor. Certificate files must use the .PEM format. You will be provided with a certificate and a private security key.
Understanding BCM SSL certificate properties Figure 3 Maintenance Tools dialog web page Under Maintenance Tools, Security, click the Upload Certificate and Private Key link. A web page displaying Certificate and Private Key fields appears. Figure 4 Main Product Maintenance and Support web page Use the Browse button beside each field to locate the certificate and private key files.
Manager and you need to restore the default certificate. Contact your technical support team for assistance. Refer to “How to get help” on page 62 for Nortel Networks support contact numbers. Suppressing the security alert message If you do not want to add a site-specific security certificate, but you want to suppress the security alert message, you can use the Internet Explorer Security options to disable the warning.
Using the Unified Manager main page buttons Using the Unified Manager main page buttons On the Business Communications Manager Unified Manager initial page, as shown below, a number of buttons provide access to various parts of the Unified Manager. The purpose of each button is discussed in this section.
Using the Unified Manager main page buttons Accessing the Unified Manager programming interface The Configure button accesses the Unified Manager programming interface for all services except those controlled by the CallPilot and IVR services. When you first install your system, you must run the Quick Start Wizard to set up your system parameters.
Using the Unified Manager main page buttons Using the Preinstalled Client Home Page hyperlink You can improve the time it takes to log on to Unified Manager by using the Preinstalled Client Access Home Page. To use this method, you must install the Java class files on your computer before you log into the Unified Manager.
Page 75
Using the Unified Manager main page buttons Logging on using the Preinstalled Client Access Home Page After you install the Java class files on you computer, you can use the Preinstalled Client Home Page hyperlink instead of the Configure button. Go to the Business Communications Manager first page.
Using the Unified Manager main page buttons Locating Wizards The Wizards are self-contained task applications that you can use to speed up some configuration tasks. The access icons for the Wizards are located on the Setup and Management Wizards page, which is accessed through the Wizards button on the start page of the Unified Manager.
Using the Unified Manager main page buttons • DN Renumber Wizard: renumbers a range of DNs. Refer to “Using a wizard to renumber telephone DNs” on page 378. • Network Update Wizard: allows you to update your system data network settings any time after the Quick Start Wizard was run, which sets the initial network setup.
Using the Unified Manager main page buttons Locating optional features from the main page After you set up the system and it is operating, you can add the keycodes for any optional features you want to include. You access the optional applications, including those which require keycodes, through the Install Clients button.
Using the Unified Manager main page buttons Finding documentation from the main page Use the Documentation button to find the information you require to help you understand and configure your system to your specifications. The entire Business Communications Manager documentation suite, plus a number of training panels, are included on your Business Communications Manager computer, as well as on the CD that accompanied your system.
Using the Unified Manager Using the Unified Manager Unified Manager provides a web-based navigation tool that allows you to view and change configurations for the Business Communications Manager system. Most changes made with Unified Manager become part of current Business Communications Manager programming when you select an item from the menu options.
Using the Unified Manager Figure 7 Main display of the Unified Manager Buttons Headings Navigation Menu bar Navigation frame Navigation tree Tabbed pages Information frame The menu bar contains configuration management options. When you select the different headings in the navigation tree, these options are enabled. If an option appears dimmed, it is not available for the heading you have selected.
Using the Unified Manager Understanding the dynamic menu You access some of the Business Communications Manager functions using the top menu bar. This menu bar is dynamic. Commands become active or inactive depending on the heading you select from the navigation tree in the left frame. The following table defines the menu bar top-level items.
Using the Unified Manager Understanding the navigation tree headings The Unified Manager navigation tree contains five main headings that allow you to access specific areas of the Business Communications Manager system. These headings are described in the following table. (<IP address>) Table 3 Navigation tree menu functions Heading Programming...
Page 84
Using the Unified Manager Table 3 Navigation tree menu functions (Continued) Heading Programming Provides access for configuring telephony and data networking services and Services various other related services. Telephony information is discussed from Chapter 7, “Telephony Services overview,” on page 195 Chapter 31, “Configuring the Dial Up resources,”...
Using Unified Manager Help Understanding tabbed pages Some headings display records that have more than one level. Each level is accessed by clicking the appropriate tab at the top of the screen. Figure 8 Tabbed page example Screen tabs Using Unified Manager Help As noted in “Understanding the dynamic menu”...
Logging off Viewing help for tabs Click on the tab to make it the active screen. Alternate-click anywhere in the right pane to get the csHelp button. Note: Some tabs may have other headings as well. Then click normally on the csHelp button to open the help web page. Figure 10 Accessing navigation tree heading help Click the tab, then alternate-click to get...
Using the SSH client to access the text-based interface Using the SSH client to access the text-based interface Some operations for the Business Communications Manager, such as initializing a new hard disk, use a text-based interface. In previous versions, the Telnet application was used to access the Business Communications Manager text menus.
Using the SSH client to access the text-based interface Using PuTTY Click the shortcut PuTTY icon. The PuTTY Configuration screen appears. Figure 11 PuTTY Configuration screen Click on the radio box beside SSH. In the Host Name (or IP address) box enter the IP address or the Fully Qualified Domain Name for the Business Communications Manager you want to connect with.
Manually activating Telnet Figure 12 Business Communications Manager Main Menu 11 Refer to the specific tasks that require this menu for details about using this it. Manually activating Telnet If you choose to continue operating the text-based menus with Telnet, rather than using the PuTTY client, you can manually activate the service from the Unified Manager.
Chapter 2 Introduction The Business Communications Manager includes software and hardware components that provide telephony, voice messaging, interactive voice response (IVR), data networking, and IP telephony. The web-based navigation tool, Unified Manager, provides easy access to all operations and maintenance programming on the Business Communications Manager system at a single site. For more information about Unified Manager, see “Using the Unified Manager”...
System configuration process maps System configuration process maps The following process maps show you the order in which your system is configured. Each section provides quick reference information about the step, plus a link to the process section. • Initial system configuration •...
System configuration process maps Initial system configuration Figure 13 Process for initial system configuration System Refer to the Installation and Maintenance Guides for hardware setup. hardware is installed Refer to the Installation and Maintenance Guides for media bay module settings and connections. To identify the media bay modules to the system Set and and set up their line values, refer to “Configuring resources —...
System configuration process maps Configuring telephony components Figure 14 Process for configuring the telephony components System Refer to the preceding flow chart. setup is complete When the trunk media bay modules are configured, the system assigns line or loop numbers. You may need to change some of the line attributes. You Set up can also refer to the lines and loops to set up line pools and call routing.
When you purchase an optional feature, you receive an Authorization Authorization Code for the feature. code Access the Nortel Networks Keycode web site and use the Authorization Get the Code to get a software keycode for the feature. For information about software...
System configuration process maps Data and IP telephony configuration Figure 16 Process for configuring the data and IP telephony components System Basic system configuration is complete. Refer to previous flowcharts. setup is complete You configure the data network options, so that Business Communications Manager operates properly on your network.
System configuration process maps Post-system setup features Figure 17 Post-setup processes System is The basic system has been installed and configured. set up Set up Determine how your Business Communications Manager system will alarm report alarms. Refer to the Management User Guide manager Set up Set backup schedules and determine call detail reporting (CDR).
Finding your way around Finding your way around The following sections provides you with quick links to the detailed configuration information: • “Security and User Management” on page 98 • “Telephony programming quick access list” on page 98 • “Data programming sections” on page 99 Security and User Management •...
Finding your way around Telephony configuration • Using Wizards to configure telephones: “Configuring DNs using the Wizards” on page • Using DN records to configure telephones: “Configuring DNs for system devices” on page 399 • Setting telephony system features: “Configuring system settings” on page 459 •...
For a detailed description about maintaining these units, refer to the Business Communications Manager BCM1000 Installation and Maintenance Guide. Note: Some of the components described in this section are not available in all areas. Ask your Nortel Networks Business Communications Manager supplier for information about the availability of components. N0008589 3.3...
Business Communications Manager hardware BCM200/BCM400 base units In conjunction with the BCM version 3.0 system release, Nortel released two new base unit models to provide added flexibility for system planning. These systems come preloaded with the latest version of software. You cannot run versions previous to BCM 3.0 software on these units.
Additional Business Communications Manager applications What do media bay modules do? Media bay modules are key components of the system. They provide the link between the external lines (trunks), the Business Communications Manager applications, and the internal extensions (DNs), which connect to individual telephones. The type of modules on your system depends on your set requirements and the type of lines available from your service provider.
Chapter 3 Configuring system parameters This section describes how to configure the basic programming information onto your new Business Communications Manager system using the Quick Start Wizard. This wizard allows you to choose the network and default telephony information that you want to use as the basic parameters for your system.
Accessing the Wizards Open up the Unified Manager. Refer to “Logging on to Unified Manager” on page 67 if you need instructions. Click the Wizards button. A login dialog box appears. In the Login field, type your login name. The default login name is ee_admin Note: You must have administrator-level privileges to use the wizards.
Accessing the Wizards Warning: Wizard timeouts When the message appears, it indicates that the wizard Wizard Instance Timeout was inactive for 30 minutes, the wizard has already been applied, or the Business Communications Manager or the server-side wizard component was restarted. Warning: Operations during Wizard application Do not use Windows NT login sessions while you are using the wizards or while there are wizards being applied.
Page 106
Accessing the Wizards Link Protocol WAN 1: WAN 2: • Default Next Hop Router (Next Hop on Primary Link) What is the IP address of the next router or link on the network? • (IP Domain) What is the domain name of the DNS server? What are the IP addresses (primary and secondary) for the server? <xxx.xxx.xxx.xxx>...
Page 107
You can also refer to Chapter 26, “Configuring the MSC resources,” on page 613. • Do you want to be able to immediately start registering Nortel IP (Registration) terminals on the system? • Do you want to change the default IP telephone access password?
Accessing the Wizards • Do you want to initialize Auto-attendant? (Auto-attendant Initialize?) • If you choose to initialize Auto-attendant, enter the line and ring information. from line: First line in the range you want to assign to the Auto-attendant. to line: Last line in the range you want to assign to the Auto-attendant.
Accessing the Wizards The General page for the Quick Start wizard appears. Enter your system information on the General page, Network page, Telephony page and CallPilot page. Refer to the information you entered in the table under “What you need to know before you use the wizard”...
Changing system identification parameters Changing system identification parameters There are some identification parameters you may choose to change after the Quick Start Wizard has set up your system. Warning: Running the Quick Start Wizard a second time will delete any changes you entered to the default telephony settings, including any telephony data.
Changing system identification parameters Viewing the system software version The system software version determines which features are available to your system, and, sometimes, how they work. Each version has a number of new features that only work with that version and newer versions. If you are having a problem running a feature, this may be one area where your service technician will ask you to look.
Changing system identification parameters Changing the system domain The system domain is the domain in which the Business Communications Manager system resides. If you do not know the domain for the Business Communications Manager system, contact your network administrator. To change the system domain, add the Business Communications Manager system to a new domain.
Changing system identification parameters Assigning a Windows 2000 domain Click the key beside System. Click the Identification heading. The Identification screen appears. Click the Change Domain Membership tab. The Change Domain Membership screen appears. Click the Add To box and click Win2000Domain. Click the Domain User ID box and enter the User ID that the system uses to access this domain.
Delayed system restart Delayed system restart There may be times when you perform a procedure that requires a system restart, but you want to delay the restart for a low-activity time. For instance, some keycodes require a cold start to become effective. You can add the keycode at any time, then use this procedure to delay the system restart until early morning, when there is no traffic on your system.
Delayed system restart Figure 22 Job scheduling window Under the first bullet, choose how often you want to schedule a restart. Example: If you are activating a keycode, click the Today Only radio button. Under the next bullet, enter the time you want the restart to occur. Example: for a 3 a.m.
Chapter 4 Managing system and user security access levels This section provides information about how you can set up and maintain the access security to your system by users and client applications. Security note: This symbol will be used throughout this section to indicate areas of possible security concern, primarily in regard to default settings that could pose a security risk if they are not changed.
Setting the interface timeout The figure below displays the Unified Manager headings under which security and user information is configured. The SSH client access application is installed on your desktop. The Install Clients button on the first Unified Manager page provides a download path. Figure 23 Security and user access headings System System...
Setting system security compatibility levels Setting system security compatibility levels Use the Security screen to set authentication, signing, encryption, and other security-related settings. Some of these settings depend on the Windows operating system used by client workstations. Security note: The default se tings define a mid-level of security which accommodates Windows 95/98/Me operating systems.
Page 120
Setting system security compatibility levels Table 4 Security settings (Continued) Attribute Value Description Clear Page Disabled Default: Disabled File on Enabled If Enabled, this setting prompts the system to clear the virtual memory Shutdown swap file on shutdown. When enabled, this option extends system shutdown by about two minutes.
Managing access passwords Managing access passwords You can grant or restrict specific access within the Unified Manager by assigning new users into user groups using the User Management screens. Core system configuration, such as resources and network management should be restricted to an administrator-level account.
The ee_admin account cannot be deleted, but the group membership can be modified for both accounts. Remote support: In order for the Nortel Networks support organization to assist you, dial-in access has been granted to both default administrator accounts. If dial-in access is removed, then remote access by support organizations may be impacted.
Managing access passwords • The Domain User Group Profile tab lists the domains for all the user group profiles. • The Lockout Policy tab provides settings to determine the parameters for locking users out of the Unified Manager if the lockout policy is enabled. •...
Managing access passwords Figure 26 User Profile screen to add or modify a user profile Use the following table to determine what information you need to add or change: Table 5 User Profile settings Attribute Value Description User Name <maximum of 20 Allows you to enter the user name.
Page 125
Managing access passwords Table 5 User Profile settings (Continued) Attribute Value Description Password <maximum of 14 Allows you to assign a password for the user. The password is case-sensitive characters long> and can be a maximum of 14 characters long. Note: •...
Managing access passwords Table 5 User Profile settings (Continued) Attribute Value Description Status Unlocked This field indicates the current state of the user’s password. If the password becomes locked and the user does not want to wait the lock-out time, the Unlock Administrator can choose Unlock on the user’s password record to release the password.
Managing access passwords Setting up callback for a user If the user will be accessing the system through a dial-up connection, you need to add that group to the user account. As well, in this case, callback will be enabled to ensure that the system security is maintained.
Managing access passwords Adding or modifying a group profile The access privileges inherent in the various predefined group profiles control user access within the Unified Manager interface. The administration group maps to administrator privileges on the Business Communications Manager host system. The other group profiles map to non-administration groups.
Managing access passwords The User Group List dialog box appears. Figure 30 User Group List add/modify screen Use the following table to determine the user profile information that needs to be added or changed: Table 6 User Group Profile settings Attribute Description UserGroupName...
Managing access passwords Deleting a Group profile If you want to delete a group profile, follow these steps: Select Management, User Manager. The User Profile screen appears showing the current user profile information. Click the User Group List tab, to view the existing groups. From the Configuration menu, select Delete User Group.
Managing access passwords Adding a Domain User Group profile The Domain User Group Profile screen displays a table of members of the Windows NT CDR User group. This screen is used to add external domain users into a CDR User group. Members of CDR user group have the sole ability to download CDR files from this Business Communications Manager system.
Managing access passwords Click the SAVE button to save your settings. The new user group information is added to the list on the Domain User Group Profile screen. Deleting a Domain User Group profile If you want to delete a Domain user Group, follow these steps: Select Management, User Manager.
Managing access passwords Use the information provided in the following table to determine the lockout policy for your system. The settings are effective as soon as they are entered. Table 8 Lockout policy settings Attribute Value Description Lockout Policy Enabled The Enabled setting allows you to set the following three parameters.
Managing access passwords Setting password policy You can define the system parameters for the passwords that you assign to users by determining the length, age and history that the passwords must meet. Select Management, User Manager. The User Profile screen appears showing the current user profile information. Click the Password Policy tab.
Chapter 5 Configuring resources — media bay modules This chapter describes the Unified Manager headings that define and control the settings for the media bay modules installed on your system. Task: Check settings for the media bay modules installed in the system. Trunk modules: •...
Explaining the Media Bay Modules headings system supports double density on all six buses. Refer to Chapter 26, “Configuring the MSC resources,” on page 613. Explaining the Media Bay Modules headings The Resources, Media Bay Modules heading allows you to view and change settings for each media bay module installed in Business Communications Manager.
Explaining the Media Bay Modules headings Tips: Some modules are region-based. If your system does not have the correct region installed during setup, the modules will not work. Refer to “Media bay module availability by region” on page 837. Note: Dimmed fields are read-only and cannot be changed. Note: If you receive the error message Telephony programming is currently not when you click on one of the headings, this means...
Explaining the Media Bay Modules headings Figure 36 Confirming the Programmed Bus Type These fields must agree. Programming tips: If the Actual Bus Type reads None, choose the correct setting in the Programmed Bus Type field. After the system initializes to the module, the Actual Bus Type should change to the correct module type.
Page 139
Explaining the Media Bay Modules headings Table 10 Bus XX record settings (Continued) Heading Value Description Trunk module, Analog Station Module or Data Module Number of busy ports <digit> This setting indicates how many ports on the module are currently being used. State Enabled This setting indicates the current state of the module.
Explaining the Media Bay Modules headings Module types and capacities Refer to the following table for a description of the Bus types settings. Table 11 Programmed Bus Types Available line types (some Programmed line types are Bus Type Hardware unit Capacity region-dependent) Station module...
Explaining the Media Bay Modules headings Table 11 Programmed Bus Types (Continued) Available line types (some Programmed line types are Bus Type Hardware unit Capacity region-dependent) Trunk module • 4X16 Media Bay Module • 4X16=1 per offset (4 lines) • 4X16s can be set to module (4X16) (counts as one and additional bus (station)
Defining trunk module types and settings Ports on Bus Both types of modules have a Ports on bus heading. This heading shows the state of the port that connects the module to the trunk line or system device. • Trunk modules, each port maps to an incoming line. Trunk port status is either idle or active. Refer to “Trunk module ports programming”...
Defining trunk module types and settings Configuring the trunk module to line type Follow these steps to define the modules to the system: Click on the keys beside Resources, Media Bay Modules, Bus <number>, and Modules on Bus. Click on the Module <number> you want to program. The Bus <number>-Module: <number>...
Defining trunk module types and settings Check the settings to ensure they reflect the line requirements. Note that only some of the fields appear for all module types. Refer to the following table for a description of each field. Table 12 Module record values Attribute Value Module/line type...
Page 145
Defining trunk module types and settings Table 12 Module record values (Continued) Attribute Value Module/line type Protocol NI-2, DMS100, DMS250, AT&T4ESS, SL-1, Euro, ETSI Q-Sig Choose the trunk protocol used by your service provider. The supported protocols are: PRI-T1: NI-2, DMS100, DMS250, AT&T4ESS, SL-1 PRI-E1: ETSI QSIG, Euro, SL-1 Note: SL-1 and ETSI QSIG require an MCDN keycode to display.
Page 146
Defining trunk module types and settings Table 12 Module record values (Continued) Attribute Value Module/line type Clock Source Primary, *BRI *BRI *BRI Secondary, Timing DASS2 Master Designates whether the DTM/BRI acts as a primary or secondary timing slave or as a Timing Master.
Defining trunk module types and settings Determining Clock Sources for DTMs or BRIs Clock Source allows you to designate the DTM or BRI on the system that obtains the timing reference for synchronization from the network. Systems with digital interfaces need to synchronize to the network in order to function. Synchronization follows a hierarchical path.
Defining trunk module types and settings Timing within networks In most T1/E1 network configurations, you need one DTM or BRI configured as Primary to act as a primary reference and obtain clocking from the network. The only application where you might not have a DTM/BRI designated as a primary reference is in a private DTM/BRI network where your Business Communications Manager system is connected to other equipment using T1/E1/BRI interface(s) that require a clock source and your system had been designated as the source of clocking for that private network.
Defining trunk module types and settings Table 13 TI parameters (Continued) Attribute Value Description DSX1 build 000-100, 100-200, Set the distance between Business Communications Manager 200-300, 300-400, and an external channel service unit. This setting only appears 400-500, 500-600, when the Internal CSU is set to Off. Contact your service provider or 600-700 feet for the proper settings.
Defining trunk module types and settings E1 parameters (region-specific) The E1 Parameters command appears for modules that have been configured as PRI in an E1 region. There is only one setting in the E1 Parameters menu - the CRC4 setting. CRC4 checking is enabled at the other end.
Defining trunk module types and settings Select the service you want to change. A configuration screen appears in the right frame. The Translation mode default is None. The following table shows the possible settings for the services. Table 15 Module record values Attribute Value Description...
Defining trunk module types and settings Provisioning lines (PRI, T1, DASS2) The Provision lines heading allows you to provision and deprovision lines associated with a T1 PRI, E1 (DASS2), or BRI ST/U interface. Provisioning a line or loop makes it available for system use. A deprovisioned line/loop is not available for use.
Defining trunk module types and settings Provisioning BRI loops/lines In order to provision lines on a BRI module you must first provision the loop on which the lines exist. Click the keys beside Resources and Media Bay Modules. Click the key beside the bus number (Bus 02 to 07) associated with the trunk module you want to provision.
Defining trunk module types and settings You should only have as many lines provisioned on a T1/PRI as you have B-channels being delivered on the T1/PRI from your service provider. Having more lines provisioned and assigned to users may occasionally result in the attempt to perform calls over a line failing because of a lack of B-channel resources being available.
Viewing station module information PRI version information DTM modules that are set to PRI and BRI modules display additional PRI information under Ports on bus, Port <number>, Channels, B1/B2, Addons. By clicking on the Addon 01 heading, you can view information about the version of the downloadable firmware component being used in this module.
Viewing station module information should change to the correct module type. You may also have to disable, then re-enable the module to force the system to re-initialize (under the Configuration menu). Refer to “Viewing Media Bay Module status” on page 159 for details about enabling and disabling modules.
Viewing station module information You can enable or disable any port. Refer to “Disabling/enabling a port channel setting” on page 160. Station module line deployment The MSC presents 32 physical ports for each bus number assigned to a station or analog station module.
Internally-driven channels Internally-driven channels You cannot change headings for buses that are used for internal processing. This section describes how these buses fit into the system. Bus 01 and Bus 08 provide access to telephony operations for internal processing, applications, and IP sets on the Business Communications Manager system.
Working with the modules Viewing Media Bay Module status Media Bay Modules selection allows you to view the status of all the modules as well as identify any device or lines connected to the system. This allows you to isolate any malfunctioning part of the system.
Working with the modules Click the OK button. Programming reminder: If your system has a 3/5 DS30 split, bus 07 will not have a module assigned to it. Disabling/enabling a port channel setting If you need to isolate a problem or block access from the module, you may need to turn off individual port channels, rather than the entire module.
Chapter 6 Data and split-line configuration This section discusses configuration for modules and applications that require data or combination data/telephony line configuration. • DDI MUX modules require two DS30 bus positions. This module supports combinations of data channels and T1 lines. A DTM (digital trunk module) contained within the module is programmed using normal DTM line configuration.
Configuring the DDI Mux module • provides end-to-end transparent bit service • supports loopbacks between the DDI Mux and the internal Business Communications Manager components, and between the DDI Mux and digital terminal equipment Note: The DTE cable that connects the Business Communications Manager to the router is ordered separately from the module.
Configuring the DDI Mux module Figure 45 Network overview: DDI MUX connected to BCM400 internal router Switch/Hub T1 mux service Service Provider/ PSTN DTE cable Figure 46 Overview of network using DDI Mux module with an external router Switch/Hub Router T1 mux service Service Provider/ DTE cable...
Configuring the DDI Mux module Configuring DDI Mux connections After you have installed the DDI Mux, configure the module settings in the Unified Manager. To configure the DDI Mux, you need to: • assign the DDI Mux modules under Resources, Media Bay Modules •...
Configuring the DDI Mux module Assigning lines for voice traffic A digital T1 line has up to 24 telephone lines available for use. On the DDI Mux, you can assign some of these lines to telephony traffic and some to data traffic. For the lines that you want to use for telephony traffic, configure the lines in the same manner as you configure lines for a DTM.
Configuring the DDI Mux module Click the Trunk/line data heading. Click the Trunk type drop list and then click Fixed data channel. Repeat steps 5 to 7 for each line you want to assign to the Data Module. Assigning the line Click the Resources key and then the Media Bay Modules key.
Configuring the DDI Mux module Click the Line assignment heading. Click on the line number you want to remove. Click the Delete button. On the confirmation dialog box, click the Yes button. Configuring the line for telephony Click the keys beside Services and Telephony Services. Click the keys beside Lines, Physical lines and All physical lines.
Page 168
Configuring the DDI Mux module Table 18 DDI Mux Configuration settings (Continued) Setting Value Description Transmit clock When the internal DCE signal is used to clock in data, signal delays caused by inversion cable length can cause clocking errors. To adjust for round trip delays between the DDI Mux and DTE, invert the internal clock used by the module to clock in data from the DTE.
UTWAN headings and menu items are not visible on Unified Manager by default. To make the UTWAN headings and menu items visible on Unified Manager, you need to use a utility available from Nortel Networks. To obtain this utility, call the Nortel Networks Technical Support line.
Universal T1 WAN (UTWAN) UTWAN connection The UTWAN connection supports frame relay or Point-to-Point protocol (PPP) at the link layer. The link protocol you use depends on the existing network or on the service you buy from your Internet service provider. Frame Relay In Frame Relay mode, the UTWAN interface allows up to 50 PVCs (permanent virtual circuits) to be configured.
Universal T1 WAN (UTWAN) Data compression Business Communications Manager provides a WAN Data Compression feature. On the UTWAN connection, Business Communications Manager supports the following data compression protocols: • Frame Relay Forum standard FRF.9 data compression protocol with STAC compression algorithm •...
Universal T1 WAN (UTWAN) Assigning lines for data traffic The number of lines you assign for data traffic determines the bandwidth of your data networking connection. The following table shows the available bandwidth for data traffic on the UTWAN according to the number of lines assigned. Table 19 Bandwidth available per channel Number of lines Bandwidth (bps)
Universal T1 WAN (UTWAN) Changing the line type In the Unified Manager, click the Services key and click the Telephony Services key. Click the Lines key and click the Physical lines key. Click the All physical lines key. Click the key of one of the line numbers you want to assign for data traffic. Click the Trunk/line data heading.
Universal T1 WAN (UTWAN) Removing a line assigned for data traffic If you decide you want to stop using a line for data traffic and use it as a telephony line, use the procedures below: Removing the line from the Data Module Click the Resources key and click the Media Bay Modules key.
Universal T1 WAN (UTWAN) Configuring the UTWAN Network Interface parameters The first step to configuring the UTWAN Network Interface parameters is: • “Configuring the UTWAN Summary parameters” on page 175 One of the UTWAN Summary parameters is the link protocol used on the T1 line. When you select the appropriate link protocol, the screen changes to show the parameters required for that link protocol.
Page 176
Universal T1 WAN (UTWAN) Table 21 UTWAN Summary parameters (Continued) Attribute Description Status Shows the current resource status of the UTWAN interface. The possible states are: Up: The UTWAN is operational. Down: The UTWAN is not operational. Link Protocol Lets you select a link protocol. The link protocol you choose depends on the existing network or the service you buy from your Internet service provider.
Universal T1 WAN (UTWAN) Configuring the UTWAN to use a Frame Relay link Configuring the UTWAN to use a Frame Relay link consists of the following: • “Configuring the UTWAN Summary parameters” on page 175 • “Configuring the Frame Relay parameters” on page 177 •...
Page 178
PVC. The possible values are between 1 and 7. The default value is 6. Note: Nortel Networks highly recommends that you do not change the Low Water Mark from the default value. High Water Mark This is one of the parameters that controls the link layer queuing behavior if the link layer fragmentation is enabled for this PVC.
Universal T1 WAN (UTWAN) Configuring the PVC Configuration parameters You must configure the PVC Configuration parameters for each PVC. Adding a PVC Configuration record Follow these steps to add a PVC Configuration record: On the navigation tree, click the Resources key and click the UTWAN key. Click the UTWAN1 heading.
Page 180
Universal T1 WAN (UTWAN) Table 23 WAN PVC Configuration parameters (Continued) Column Description DC Retry Time Enter the Data Compression Retry Time is seconds. The possible values are 1 to 15 seconds. The default value is 3 seconds. DC Retry Count Enter the Data Compression Retry Count.
Universal T1 WAN (UTWAN) Deleting a PVC Configuration record Follow these steps to delete a PVC Configuration record. On the navigation tree, click the Resources key and click the UTWAN Key. Click the UTWAN1 heading. The Summary screen appears. Click the PVC Configuration tab. The PVC Configuration screen appears.
Page 182
Possible values are 1 to 7. The default value is 6. Note: Nortel Networks highly recommends that you do not change the Low Water Mark from the default value. High Water Mark This is one of the parameters that Controls the link layer queuing behavior for PPP when link layer fragmentation is enabled.
Universal T1 WAN (UTWAN) Configuring the LCP Options On the navigation tree, click the Resources key and click the UTWAN key. Click the UTWAN1 heading. The Summary screen appears. Click the LCP Options tab. The LCP Options screen appears. Configure the LCP Options according to the information in the following table. Table 25 LCP Options Attribute Description...
Universal T1 WAN (UTWAN) Table 25 LCP Options (Continued) Attribute Description LQ Reporting Enter the maximum time in 100th of seconds between the transmission of packets. Period Possible values are 100 to 60000. The default value is 1000. Retry Timer Enter the number of seconds waited before retransmitting LCP Configure-Request packets.
Universal T1 WAN (UTWAN) Configuring the PPP User List You can restrict access to the network using the PPP User List. Business Communications Manager uses the information on this list to verify and confirm the identity of the user. Only those users whose names appear on the PPP User List can access the network.
Page 186
Universal T1 WAN (UTWAN) Table 27 PPP User parameters (Continued) Attribute Description PPP Remote User Enter the user name associated with the computer you want Business Communications Name Manager to identify as a valid network user. The Remote User Name can be up to 32 characters in length. You must overwrite the default user name User with the user name you want to add to the list.
In both of these examples, broadcast traffic destined for one IP address would not be transmitted on the links associated with the other IP address. Restrictions when using multiple IP addresses • Nortel Networks does not recommend using more than two IP address classes. • Multiple IP addresses supports RIP routing. •...
Universal T1 WAN (UTWAN) Table 28 Additional WAN IP addresses (Continued) Attribute Description Subnet Mask Enter the subnet mask of the WAN interface in the following format: 255.255.255.255. If you do not know your subnet mask address, contact your system administrator or your Internet service provider.
Universal T1 WAN (UTWAN) Viewing the UTWAN performance To access the UTWAN performance graphs and tables: On the navigation tree, click the Resources key and click the UTWAN key. Click the UTWAN1 heading. The Summary screen appears. On the Performance menu, click UTWAN1 Graph. The WAN Graph: Statistic Chart appears.
Configuring a data module Configuring a data module DS30 bus 08 is reserved for configuring circuit switched B-channels as a WAN interface for the Business Communications Manager. This allows the Integrated QoS Routing feature to create one or more dial up ISDN connections via the PSTN network using PRI or BRI trunks. Business Communications Manager automatically configures the Module type as a Data Module and sets the Data module type to Baystack.
Configuring a data module Fixed access Fixed access is supported for the Norstar Data Interface (NDI) only. To assign one or more Fixed lines to the data module: Adding line assignments On the navigation tree, click the Resources key and click the Media Bay Modules key. Click the Bus 08 key and click the Data Module key.
Configuring a data module Line assignment You can assign one or more lines to the BayStack data module for incoming data transmission. Note: The data module will answer data calls only. It will not answer voice calls. Adding line assignments On the navigation tree, click the Resources key and click the Media Bay Modules key.
Configuring a data module Line pool access You can give the BayStack data module access to a line pool for outgoing data transmission. Adding line pool access On the navigation tree, click the Resources key and click the Media Bay Modules key. Click the Bus 08 key and click the Data Module key.
Page 194
Configuring a data module N0008589 3.3...
Chapter 7 Telephony Services overview The following sections provide a general overview of the Unified Manager Telephony Services headings. This group of settings is located under the Services heading on the Unified Manager main navigation tree. The records under this heading allow you to define how the lines and telephones in your system operate.
Page 196
Voice mail If you are using the voice mail application for this unit, you can set up mail boxes for system telephones as well as for telephones from other systems on the same private network. Voice mail configuration information is contained in the CallPilot suite of documents.
Process map: Creating telephony services Process map: Creating telephony services The figure below lists the tasks involved in creating telephony services on your system. Figure 47 Tasks for installing the telephony components Refer to the Installation and Maintenance Guides for hardware setup System and wiring for peripheral equipment, including the computer you are hardware...
The following two figures show the Telephony Services headings in the Unified Manager. Figure 48 Telephony Services menu options Lines General Settings ..Telephony Services VoIP Lines Nortel IP Terminals System DNs Enabled VoIP Lines Feature labels Active Set DNs IP trunking...
Telephony Services headings Typical DN record headings Figure 49 Headings found under typical DN heading DN XXX-XXX Capabilities User Preferences General DND on busy Model Name Handsfree Call log options Model/DN type HF answerback Dialing options Device port Pickup group Language Control set Page zone...
485 Planning your telephony services Nortel Networks strongly recommends that you use the planning tables from the Installation and Maintenance Guide or the Programming Records spreadsheets to understand what lines and set numbers (DNs) are available to you. Programming records, which are set up in Microsoft Excel*, provide a reference for your system programming.
Planning your telephony services Three basic system telephony configurations This section provides a broad overview of the telephony setup for three of the most common office telephone configurations. Square system This is a typical small-office setup, where all lines are available on any telephone. There may not be a designated attendant.
Planning your telephony services PBX system This setup is for a larger offices which have fewer CO lines than there are telephones. In this case the lines are pooled, and the line pool is assigned to all telephones. As well, there is a designated attendant with a telephone that has all lines individually assigned.
Planning your telephony services DID system This setup allows you to assign a dedicated phone number to each telephone. The CO assigns a list of available numbers for each DID (Direct Inward Dial) line. You can change your DN range to match these numbers, or you can use target lines to match each number with a DN.
Telephony metrics Telephony metrics The system provides call metrics for Hunt groups (“Monitoring Hunt groups” on page 589), PRI Call-by-Call services limits (“Viewing CbC limit metrics” on page 355), and IP telephony fallback (IP Telephony Configuration Guide). N0008589 3.3...
Chapter 8 Telephony feature planning This section provides a quick reference to telephony programming basics, which you need to understand before you can decide what defaults you want to change, and how you want to configure your telephones and routing. •...
Creating numbering plans Creating numbering plans Access to and from and within your system is based on dialing strings and how the system adds or deletes from this sequence to route the call. A dialing string is the numbers that the caller physically enters on a telephone or programs onto a memory key.
Page 207
Creating numbering plans Incoming calls: If your system is networked with other systems, you will also need to determine a private access code that tells your system when a call is to be dialed out over the private network instead of over the public network. This access code is also entered under Services, Telephony Services, General settings, Access codes.
Page 208
Creating numbering plans Internal feature access: Meanwhile, you need to keep in mind that the leading digit of any of the above dialing codes cannot conflict with the other system access codes that you want to use: Variable Example or default settings Park Prefix 1 (101-125) Direct Dial Digit...
Creating numbering plans Outgoing calls Outgoing calls require line pool access codes or destination code (with defined routes) to leave the system. • Access codes provide direct, unscheduled access to an analog, digital (T1), of Voice over IP (VoIP) line pool. Refer to “Programming access codes”...
Creating numbering plans Incoming calls Incoming call handling also depends on the call type. The system also uses the Public and Private DN # length settings to determine call handling. Refer also to “Defining DN length” on page 294. The system processes a call in the following way: The system receives a call from the public or private network.
Creating numbering plans Figure 53 Incoming public and private call coding Call comes in System checks call type Public Private Default incoming MCDN Local/ Unknown/Unknown Private/Subscriber Private/CDP call handling National/Special or Private/Unknown or Private UDP Prepend Prepend private appropriate access code access code Match Dest.
Name a telephone, a line or a Hunt group Name a telephone, a line or a Hunt group You can assign names to identify external lines, target lines, and your colleagues’ telephones. During a call, the name (if programmed) appears on the telephone display instead of on the external line number or internal telephone number of the caller.
Incoming and outgoing call display Incoming and outgoing call display If you subscribe to Call Display services from your local telephone company, one line of information about an external caller appears on the display after you answer a call. If you answer before the Call Display information appears on your display, press FEATURE 811 to view the line number or line name.
Programming line access • Outgoing call display, telephones: Determine what number is displayed to a destination telephone when a call is made from a system telephone to a telephone on the private or public network: “Configuring line access” on page 405.
Page 215
Programming line access • Even when you use line pools, it is possible that a line pool will be unavailable for outgoing traffic. To alleviate this, you can determine overflow paths for any routes that you designate. Refer to “Using multiple routes and overflow routing” on page 348 for more information about overflow routing.
Programming line access Incoming calls For incoming calls, you can have a central reception point, or you can specify target lines to one or more telephones to receive directed calling. You can arrange your telephones in Hunt groups, ringing groups, or call groups that use system-wide call appearance (SWCA) assignments to share calls.
Answering calls • If you assign the prime line to a line pool, all the lines in that line pool must be assigned to the telephone. When you pick up the handset, the telephone automatically grabs the first available line from the assigned line pool. In this configuration, you must ensure that the outgoing number is allowed by the line pool.
Answering calls DRP 2 3rd highest priority DRP 1 (or None) (default) Lowest priority Call Ringing: When more than one call rings at a telephone, highest priority DRP rings first. Hunt groups: If the Hunt Group DRP is higher than the DRP of line of the incoming call and the telephone DRP, all telephones in the group will ring with the ring pattern assigned to the Hunt Group.
Answering calls and telephones. Telephones with KIMs or CAP modules that are not configured in system programming allow only memory button programming on the modules. In this case, the KIM is known as an OKIM (ordinary KIM). Programming: • “Identifying the telephone (General heading)” on page 403 •...
Page 220
Answering calls • Group Pickup: Your system can support nine pickup groups. If a telephone has been assigned as a member of a pickup group, the user can pick up a call that is ringing at any telephone in the pickup group (FEATURE 75). Programming: •...
Make a call Make a call You can set up your system in several ways that will determine how users can make calls. This section includes: • “Emergency 911 dialing” on page 222 • “Select how you dial your calls” on page 222 •...
Make a call Emergency 911 dialing Emergency 911 dialing is the capability to access a public emergency response system. State and local requirements for support of Emergency 911 dialing service by Customer Premises Equipment vary. Ask your local telecommunications service provider about compliance with applicable laws and regulations.
Make a call Create a conference call You can establish calls to two people at the same time, and allow each caller to hear the other two callers. You must have at least two intercom buttons assigned to your telephone to initiate a conference call (FEATURE 3).
Handling calls Programming: • System speed dials: “Configuring system speed dial numbers” on page 482. • Alpha tagging: “Using alpha tagging for name display” on page 463. • User speed dials: “Configuring user speed dialing” on page 444. • Saved Number Redial: This feature allows you to save the number of the current external call, provided that you dialed the call, so that you can call it again later.
Handling calls Parking or transferring calls • Transfer calls (call forward): Allows you to direct a call to another telephone internally or externally. To transfer a call to an external destination, you need to know the line pool or destination code to route the call. (FEATURE 70). You can also set up a telephone to automatically send calls to another telephone or to a voice mail box if the telephone is not answered or if it rings busy.
Handling calls You can use SWCA programming to define logical groups of telephones. Each group can be assigned a set of the SWCA codes, which allows them to pass calls within the group. Each telephone in the group also displays the current status of the call, so users can determine which calls are being dealt with.
Prevent calls from ringing at your telephone — if the voice mail system is on a remote system, ensure that the correct routing codes are added to the voice mail forwarding dial string. — if calls are being forwarded to telephones or voice mail outside the system, ensure that Allow redirect is set for the telephones.
Communicating in the office If an external call uses a target line, the call is processed according to the programming of the target line. If the target line is busy, the caller hears a busy tone or routes the call to the prime set for the target line or to the voice mail system, even if there is DND on Busy programming.
Communicating in the office Programming: • “Configuring the Capabilities features” on page 418 • “Programming Feature settings” on page 465 • “Setting system timers” on page 479 • Messages: This feature allows you to leave a message on the display of another telephone in your system or to analog telephones connected to an Analog Station Module (ASM/GASM).
M-series telephones and on the 7208 digital phone. • handsfree-only to the bottom right button for Nortel IP telephones and 7316 digital phones, which have a separate mute button located under the dial pad. •...
Page 231
Track your incoming calls Call Log can help you to — keep track of discarded calls or calls not answered — track patterns for your callers (for example volume of calls and geographic area of calls) — record caller information quickly and accurately —...
Use alternate or scheduled services Use alternate or scheduled services There are three types of services for Business Communications Manager to handle calls in a different way on different days, and at different times of the day. These services for scheduling call restrictions, ringing groups, and routing services are controlled through the control telephone.
Special telephones • Direct dial telephone: This is the telephone that system users can dial with one digit (direct dial access code). An example of this would be a receptionist telephone. This telephone is also usually the control telephone for system scheduling. You can create up to five direct dial telephones, however, they all respond to the same direct dial access code.
Also, the doorphone does not use the user preferences or the Telco features settings. Installation and configuration information is contained in the Nortel Networks Digital Doorphone Installation and Configuration Guide. Legacy devices •...
Page 235
Call out to external systems using host system dialing • Link: If you connect the system to a private branch exchange (PBX), you can use a Link signal to access special features. On some telephones, Link is called FLASH. You can include the Link signal as part of a longer stored sequence on an external autodial button or in a speed dial code.
Call in from outside the system • Wait for Dial Tone: This feature (FEATURE 804) causes a sequence of numbers to pause until dial tone is present on the line before continuing to dial. You can use this feature if you must dial a remote system and then wait for dial tone from that system before dialing the remainder of your number.
Special features Special features This section describes features on the system which serve a specific purpose that is optional to the general function of the system. • Hospitality services: This feature allows small to medium service facilities to provide customer telephone service, as well as administration services through a telephone interface. Programming: Besides the general line and telephone programming required for individual group members, Chapter 24, ”Configuring Hospitality Services”...
Page 238
Special features • IVR: The Interactive Voice Response feature allows your customers greater interaction with your call centers. Configuration information is located in Interactive Voice Response Installation and Configuration Guide (IVR) N0008589 3.3...
Chapter 9 Configuring lines This section describes the information accessed under the Services, Telephony Services, Lines headings. Task: • Configure the lines connected to the system, or call channels configured as Voice over IP (VoIP) trunks or target lines. This section contains: •...
Understanding the process of line configuration Understanding the process of line configuration Refer to the process map below, which leads you through the order for configuring the lines for your system. Figure 54 Process map: Configuring the lines for your system VoIP lines Trunk module lines Modules are...
Understanding how the system identifies lines Understanding how the system identifies lines On a new system, lines and loops are numbered and assigned defaults based on the type of media bay modules that have been connected to the system. The exception is the voice over IP (VoIP) trunks, which require a keycode to activate.
Understanding how the system identifies lines Copying line programming The Copy command allows you to duplicate programming for a line and apply it to another line. You cannot copy programming between lines on different types of media bay modules. The Received number of a target line is a unique number and cannot be copied.
Understanding how the system identifies lines Business Communications Manager systems or Meridian 1-IPT systems. Note: SIP trunks can only be used between Business Communications Managers. You can also create a fallback for the trunk. This is a situation where the system reroutes the call to a PSTN line pool if the primary route is not available or the call quality is not suitable.
Understanding how the system identifies lines Follow these steps to use the table. For each bus number, circle the module you set to that number. Beside the module name, circle the group of line numbers appropriate for the offset you set on the modules.
Page 245
Understanding how the system identifies lines Table 30 DS30 number and offset line-loop default list (Continued) Line/Loop numbers (default) DS30 Offset Line pool Access codes Type of module A-O/PRI and routes Trunk module DTM (T1) 151-174 DTM (NA-PRI) 151-173 DTM (E1 PRI 151-180 DDI MUX DTM 151-174* BRI 181-188 189-196...
Understanding how the system identifies lines Table 30 DS30 number and offset line-loop default list (Continued) Line/Loop numbers (default) DS30 Offset Line pool Access codes Type of module A-O/PRI and routes Trunk module DTM (T1) 61-84 DTM (NA-PRI) 61-83 DTM (E1 PRI) 61-90 DDI MUX DTM 121-144* BRI 61-68 69-79...
Tips: External lines and telephones must be programmed to use one of the Scheduled Services: Ringing, Restriction, and Routing Services. For maximum flexibility, Nortel Networks recommends that you create two different control telephones, one for the lines and one for the telephones.
Assigning Trunk/line data Table 31 General record values (Continued) Attribute Value Description Tips: You can program a line pool access code under Telephony Services, General Settings, Access Codes. Refer to “Setting up line pool access codes” on page 328. Assigning Trunk/line data The Trunk/line data heading allows you to program settings for lines that affect how the Business Communications Manager communicates with other switches.
Assigning Trunk/line data • “BRI fields” on page 262 • “DPNSS fields” on page 264 • “VoIP fields” on page 265 • “Lines field cross-reference chart” on page 267 Loop start analog/digital fields Table 32 Loop start analog and digital fields Attribute Value Description...
Page 250
Assigning Trunk/line data Table 32 Loop start analog and digital fields (Continued) Attribute Value Description Prime set Assign a telephone to provide backup answering for calls on the line. For an Auto Answer line, calls are redirected if the received number is invalid or the target line is None busy, and if the If busy parameter is set To prime.
Page 251
Assigning Trunk/line data Table 32 Loop start analog and digital fields (Continued) Attribute Value Description Answer Manual Define whether a trunk is manual or automatic answer. mode Auto Auto answer mode allows the trunk to be a shared resource by the system telephones.
Assigning Trunk/line data Table 32 Loop start analog and digital fields (Continued) Attribute Value Description Redirect to <dial string> Enter a dial string (including routing code) to redirect the line to an external telephone, such as a call attendant on another system. If you want to stop redirection, you need to delete the dial string and allow the record to update.
Page 253
Assigning Trunk/line data Table 33 Ground start fields (Continued) Attribute Value Description Prime set Assign a telephone to provide backup answering for calls on the line. For an Auto Answer line, calls are redirected if the received number is invalid or the target line is None busy, and if the If busy parameter is set To prime.
Assigning Trunk/line data Table 33 Ground start fields (Continued) Attribute Value Description Redirect to <dial string> Enter a dial string (including routing code) to redirect the line to an external telephone, such as a call attendant on another system. If you want to stop redirection, you need to delete the dial string and allow the record to update.
Page 255
Assigning Trunk/line data Table 34 DID line fields (Continued) Attribute Value Description Line type Public Define how the line is used in relation to other lines in the system. Private to: • Public line: can be accessed by more than one telephone. Pool A to O •...
Assigning Trunk/line data Table 34 DID line fields (Continued) Attribute Value Description ANI Number Y or N Define whether the telephone number of the caller will be collected for this line. For T1 E&M and T1 DID trunks connected to a DTM, this setting only appears if Signaling is set to WinkStart.
Page 257
Assigning Trunk/line data Table 35 E&M line fields (Continued) Attribute Value Description E&M trunk T1 E&M Line type Public Define how the line is used in relation to other lines in the system. Private to: • Public line: can be accessed by more than one telephone. Pool A to O •...
Page 258
Assigning Trunk/line data Table 35 E&M line fields (Continued) Attribute Value Description Distinct ring None Choose the distinctive ring pattern that you want to assign to the line. This allows Pattern 2 you to provide selective service to calls with differing answer priorities. Pattern 3 When more than one line with the distinct ring settings rings at a telephone, the line Pattern 4...
Assigning Trunk/line data Table 35 E&M line fields (Continued) Attribute Value Description DNIS Y or N Defines whether the digits dialed by an external caller on this line will be Number collected.For T1 E&M trunks connected to a DTM, this setting only appears if Signaling is set to WinkStart and Answer mode is set to Manual.
Page 260
Assigning Trunk/line data Table 36 Target lines and DASS2 line fields (Continued) Attribute Value Description Distinct rings read-only This field shows the Distinct Ring Patterns that have already been assigned to at in use least one line. Distinct ring None Choose the distinctive ring pattern that you want to assign to the line.
Assigning Trunk/line data PRI fields Table 37 PRI line fields Attribute Value Description Line type PRI A to PRI-F Define how the line is used in relation to other lines in the system. • PRI A to PRI F: you must use routes and destination codes to direct PRI lines. Prime set Assign a telephone to provide backup answering for calls on the line.
Assigning Trunk/line data BRI fields Table 38 BRI line fields Attribute Value Description Manual answer line Auto answer line Line type Public Define how the line is used in relation to other lines in the system. Private to: • Public line: can be accessed by more than one telephone. PRI A to PRI-F •...
Page 263
Assigning Trunk/line data Table 38 BRI line fields (Continued) Attribute Value Description Warning: If you assign a distinctive ring pattern to a line, and that distinctive ring pattern has already been assigned to a telephone, all telephones with that ring pattern will be reset to pattern 1.
Assigning Trunk/line data DPNSS fields Table 39 DPNSS line fields Attribute Value Description Line type Public Define how the line is used in relation to other lines in the system. Private to: • Public line: can be accessed by more than one telephone. PRI A to PRI-F •...
Assigning Trunk/line data Table 39 DPNSS line fields (Continued) Attribute Value Description Use auxiliary Y or N Turn the auxiliary ringer on or off for all telephones using this line. ringer When programmed on a line, the auxiliary ringer will ring every time a call is received.
Page 266
Assigning Trunk/line data Table 40 VoIP line data fields (Continued) Attribute Value Description Prime set Assign a telephone to provide backup answering for calls on the line. For an Auto Answer line, calls are redirected if the received number is invalid or the target line is None busy, and if the If busy parameter is set To prime.
Assigning Trunk/line data Lines field cross-reference chart The following table provides a quick cross reference that shows common line fields, noted by trunk type. Table 41 Combined line settings table Trunk types Attribute Value Description Line type Public Define how the line is used in relation to other lines in the system.
Page 268
Assigning Trunk/line data Table 41 Combined line settings table (Continued) Trunk types Attribute Value Description Distinct ring None Choose the distinctive ring pattern that you want to assign to Pattern 2 the line. This allows you to provide selective service to calls Pattern 3 with differing answer priorities.
Page 269
Assigning Trunk/line data Table 41 Combined line settings table (Continued) Trunk types Attribute Value Description Loop start analog Answer Manual Define whether a trunk is manual or automatic answer. Loop start digital mode Auto Auto answer mode allows the trunk to be a shared resource Ground start digital by the system telephones.
Assigning Trunk/line data Table 41 Combined line settings table (Continued) Trunk types Attribute Value Description Loop start analog Loss Short CO Select the appropriate loss/gain and impedance settings for Packages Medium CO each line. Long CO For more information refer to “Using loss packages”...
Assigning Trunk/line data Note: The Auto privacy setting does not apply to target lines, PRI lines or VoIP trunking lines. Received # Target lines provide an additional record under Trunk/Line Data, and that is the Received number. You can specify received numbers for both private (VoIP and MCDN) and public network connections.
Assigning Trunk/line data • A telephone can be administered to search automatically for an idle line from several lines that appear on the telephone. Assign a line pool as the prime line (in Line access) and all the lines in the line pool must appear on that telephone. When the user lifts the receiver or presses Handsfree, any one of the lines, if idle, can be selected by Automatic Outgoing Line selection.
Assigning Restrictions Assigning Restrictions Restrictions prevent you from making certain kinds of calls from specific lines on the telephone. You can also restrict some features. This section describes how to apply restriction filters to lines. You can assign a different restriction filter for normal service and for each of six schedules. Refer to “Defining service schedules”...
Assigning Restrictions Note: When a remote user places an external call on a line, any filters used with the line still apply. However, if DND is active on the line, no set or set/line restrictions apply. Setting remote restrictions Specify the restriction filter for the line that remote callers use to call in to Business Communications Manager.
Setting line telco features Setting line telco features If you subscribe to a voice message service outside your office, you can access it through your Business Communications Manager system. You can specify what voice message center you use for each external line that receives message waiting indication. Click on the keys beside Services, Telephony Services, Lines.
Page 276
Setting line telco features N0008589 3.3...
Chapter 10 Configuring BRI Loops The following sections describe the information accessed under the Services, Telephony Services, Loops headings. The Loops headings allow you to program BRI S, T, U2, and U4 ISDN loop settings. Task: Configure the BRI loops connected to the system through BRI modules. This section includes information about: •...
BRI configuration process map BRI configuration process map The following process map shows the steps for configuring loops for T-1 based BRI modules. Figure 62 Process map: Configuring the loops for your BRI module BRI module is installed and system is running. Note the loops that are active.
Identifying BRI T-loops (T1 profiles) Identifying BRI T-loops (T1 profiles) T1-based BRI loops have three parameters that identify loop characteristics. In the Unified Manager, click on the keys beside Services, Telephony Services, Loops. Click on the loop number you want to configure as an ISDN trunk connection. Figure 63 T-loop screen (T1 profiles) Configure the loop settings according to the following table: Table 45 Loop settings...
Identifying BRI T-loops (T1 profiles) Adding SPIDs System running with T1 country profiles (North American) support additional BRI services offered by ISDN service providers and defined by network service profile identifiers (SPIDs). The SPID allows you to enter a network connection that provides a path for voice or data services. Collect the information supplied by your service provider: SPIDs, Network DNs, TEIs.
Identifying BRI T-loops (T1 profiles) Adding SPID network DNs Under the SPID # heading, click the Network DNs heading. Click the Add button above the navigation tree. Figure 66 Add Network DN to SPID X Type the ISDN DN number in the DN box for the device you want to use. Click the Save button.
Identifying BRI T-loops (ETSI, QSIG) Identifying BRI T-loops (ETSI, QSIG) BRI loops for ETSI and ETSI-QSIG provide some flexibility in defining the T-loop characteristics. Refer to “Core software and regions” on page 834 for a detailed list of countries that use these profiles. Collect the information supplied by your service provider.
Page 283
Identifying BRI T-loops (ETSI, QSIG) Table 46 Loop settings (Continued) Attribute Value Description Local number length 0-10 Set the local number length for loops to interfaces that receive overlap rather than enbloc digits. This number is the total length of the called party number received.
Configuring D-packet service for T loops Configuring D-packet service for T loops This configuration occurs for all profiles. A T-loop can be used in combination with an S-loop to provide D-packet service for a point-of-sale terminal adapter (POSTA) or other D-packet device. To deliver D-packet service, a network connection (T-loop) is programmed to work with a terminal connection (S-loop).
Provisioning the loop variables Figure 71 Add a TEI to the D-packet service Provisioning the loop variables When you assign a BRI loop as a trunk loop, you need to return to the media bay module settings and provision the loop, and the lines assigned to the loop. Once the loop is provisioned, it displays the two line numbers that are assigned to the loop, these also need to be provisioned.
Provisioning the loop variables Provisioning the lines Once you provision the loop, two numbers are assigned to the loop. These also need to be separately provisioned. Click the keys beside Resources, Media Bay Modules, Bus 0X, Modules on bus, Module X, Provision loops, Loop XXX, Lines on Loop.
Provisioning the loop variables Programming BRI lines Once the loops and lines are provisioned (“Provisioning the Loop” on page 285 “Provisioning the lines” on page 286), you program the lines in the same manner as you do for non-BRI lines, under the Services, Telephony Services, Lines heading.
Provisioning the loop variables Assigning the lines to telephones Once the line records are programmed, assign the BRI lines or target lines and BRI line pools to the DN records for the telephones that will use the line(s) to receive/send calls. Refer to “Determining line assignments”...
Setting BRI for ISDN device connections Setting BRI for ISDN device connections BRI S-loops support devices that use an ISDN interface. You can assign a single device to a loop, or multiple devices connected through an NT-1 interface (“Using an NT-1 for BRI U2/BRI U4” on page 278).
Setting BRI for ISDN device connections Configuring S-loops Click on the keys beside Services, Telephony Services, Loops. Click on the loop number you want to configure. Figure 77 S-loop screen (North American profile) Configure the loop settings according to the following table: Table 47 Loop settings Attribute Value...
Setting BRI for ISDN device connections Assigning DNs to the S- loop You can have a maximum of 58 ISDN DNs on your system. However, there are only 28 default DNs provided. The default ISDN DN range is 597 to 694. To add to the defaults, you need to use DNs from the Companion range: 565 to 597 (change DN type to ISDN and DECT) Companion: If you have either a legacy Companion wireless system, which uses the Companion DNs, or a legacy DECT portable system, which uses the ISDN and DECT DNs,...
Setting BRI for ISDN device connections Figure 79 Adding a Loop DN 10 Click outside the right frame to save the entry. Configure the ISDN terminal records You configure the ISDN terminal records in the same way that you do any other DN record. These records are found under the Services, System DNs, All ISDN/DECT DNs heading.
The following figure highlights the Unified Manager navigation tree headings that will be discussed in this chapter. Figure 80 Process map: Access headings Telephony Services General Settings Feature Settings Nortel IP Terminals Lines IP trunking VoIP Lines Timers Physical Lines...
Defining DN length Defining DN length The DN lengths setting allows you to change the number of digits for the Received number length and the DN length, which are used by the system to determine if an incoming call is valid for the system.
Defining DN length Changing the DN length Warning: If your system is running with a PBX telephony template, the Public and Private received # length are hardcoded to 3 (digits) at startup. Increasing the DN length after system startup does not change these digits, so you will need to manually change the Public and Private receive # length.
Defining DN length Using the Received # length If you change the DN length of your system, you may need to change the Received # length, which is what the system uses, in conjunction with the dialing table coding, private and public networking, and the access codes to determine a route for an incoming call over an auto-answer trunk.
Assigning target lines The following table provides the possible values for each field. Table 48 Private and Public received numbers Attribute Value Description Private length 1, 2, 3, 4, 5, 6, 7 The number of digits that the system uses to determine if a call tagged as Private fits the system private DN numbering.
Assigning target lines Assigning a target line to a telephone Ensure you have auto-answer lines such as analog DID, T1 lines set to auto answer, PRI, or VoIP trunking lines. Click the keys beside Services, Telephony Services, System DNs, Active Set DNs. Choose the DN of the set where you want the line to be directed.
Assigning target lines Repeat steps 3 to 7 for all the DNs you want to assign with target lines. Configuring the target line received number Configure the numbers that the system uses to identify the destination for the target line. Click the keys beside Services, Telephony Services, Lines, Target Lines.
Configuring for remote access Notes about the Public and Private Received Numbers If the received number is different than the regular DN number, enter the number in the Private number and/or Public number field. For instance, in North America, you can enter the 10-digit public number in the Public number field.
Creating Direct Inward System Access (DISA) Creating Direct Inward System Access (DISA) To control access from the public or private network, you can configure auto-answer trunks to answer with DISA. Remote callers hear a stuttered dial tone and must then enter a COS password that determines what they are allowed to do in the system.
Creating Direct Inward System Access (DISA) Remote access on loop start trunks Loop start trunks provide remote access to Business Communications Manager from the public network. They must be configured to be auto-answer to provide remote system access. A loop start trunk must have disconnect supervision if it is to operate in the auto-answer mode. T1 E&M trunks always operate in disconnect supervised mode.
If Answer mode is set to Auto, Business Communications Manager automatically answers the incoming call. Because most other DPNSS features are extension-specific, Nortel Networks recommends that all DPNSS lines are configured as auto-answer lines. •...
Defining remote access packages Defining remote access packages The Remote access packages setting allows you to control the remote use of line pools. Create a remote access package by defining the system line pools remote users can access. You then assign the package to individual lines, (refer to “Defining line pool access for remote packages”), and to a particular Class of Service password (see “Using COS passwords”...
Using COS passwords Figure 85 Setting remote page for a remote access package Using COS passwords COS passwords permit controlled access to the system resources by both internal and remote users. • When an internal user enters a COS password at a telephone, the restriction filters associated with the COS password apply instead of the normal restriction filters.
Using COS passwords Creating COS parameters Follow these steps to create COS groups and passwords: Click the keys beside Services, Telephony Services, General Settings, and COS Passwords. Click on a COS group (COS 00-99). The COS window appears in the right frame. Figure 86 Assigning COS password and remote access parameters COS 99 Use the information in the following table to determine which values to set for each password.
Using COS passwords Notes about COS passwords The COS password can define the set of line pools that may be accessed and whether or not the user has access to the paging feature. The class of service (COS) that applies to an incoming remote access call is determined by: •...
Using COS passwords COS examples Example: Using the COS feature to access a restricted line A sales representative out of the office needs to make long distance calls to the European office. Your system has a leased line to Europe with reduced transatlantic charges. You provide the sales representative with a Class of Service password that gives access to the transatlantic line.
Page 309
Using COS passwords Table 51 External access tones (Continued) Fast busy tone You have done one of the following: • Entered an incorrect COS password. Your call disconnects after five seconds. • Taken too long while entering a COS password. Your call disconnects after five seconds.
Configuring the public and private dialing plans Configuring the public and private dialing plans The dial plan you choose determines the type of numbering required to access a public and private network by defining the DN lengths for the codes that access the networks. You can define only one private network per system.
Configuring the public and private dialing plans Using private network dialing If your Business Communications Manager is part of a private network, you have a choice of dialing plans. However, all Business Communications Managers on a network must use the same type of dialing plan and have the same Private DN lengths to ensure proper call direction.
Configuring the public and private dialing plans Figure 88 Configuring private network types Use the following table to determine which values to set so callers can access a private network. Table 52 Private network values Attribute Values Description Type None, CDP, UDP You can specify if your Private network uses a coordinated dialing plan (CDP) or a universal dialing plan (UDP).
Page 315
Configuring the public and private dialing plans Table 52 Private network values Private Network ID 1-127 This is the unique number that identifies the system to the (CDP/UDP networks) Meridian PRI-MCDN network. Both end points must match on a PRI-MCDN network. On a VoIP trunking-MCDN network, this ID must be the same on all nodes.
Configuring the public and private dialing plans Outgoing private calls routing When you set up routing for private calls, the route is set to Private. Refer to “Configuring call routing” on page 331. How the system identifies the call depends on the type of trunk chosen for the route. Refer to the table below.
Configuring the public and private dialing plans Adding or modifying dialing plan Public DN lengths To add or modify Public DN lengths, follow these steps: Click the keys beside Services, Telephony Services, General Settings, Dialing Plan and Public network. Click on Public DN lengths. At the top of the column, click Add.
Configuring the public and private dialing plans Outgoing public calls routing Outgoing public calls from within the system typically have the routes set to Public. Refer to “Configuring call routing” on page 331. The NPI/TON gets sent as Unknown/Unknown. The public called number length is based on the Public DN lengths table in the Public networks dialing plan.
Determining line access dialing Determining line access dialing The next two sections, “Understanding access codes” on page 320 “Configuring call routing” on page 331 describe what you do with the lines and loops you previously set up into line pools. By using access codes or call routing, which uses destination codes, you can determine which lines (routes) outgoing calls use.
Understanding access codes Understanding access codes The system uses access codes to direct calls to the correct lines and destinations. If the codes “Creating numbering plans” conflict, some of the features on the system do not work. Refer to on page 206 for a general overview about using access codes within the system dialing plan.
Programming access codes Programming access codes Your system requirements will determine which access codes you need to set up. Follow these steps to set up codes found on the Access codes screen: Click on the keys beside Services, Telephony Services, General Settings Click on Access codes.
Page 322
Programming access codes Table 56 Access codes values (Continued) * Direct dial digit None The Direct dial digit setting allows you to specify a single system-wide digit to call a direct dial telephone. <one-digit number> Remote dial-in (Also refer to “Configuring for remote access”...
Programming access codes Table 56 Access codes values (Continued) * Local access <code to access local MCDN connections only. code PSTN> This number is prepended to an incoming M1 local dial string and designates the call as a Local call type (typically 9). Refer to “Using the MCDN access codes (tandem calls)”...
Programming access codes Note: Other programmable settings may affect what numbers appear in the window during programming. Although the numbers 0 to 9 are valid Park prefix settings, some may already be assigned elsewhere by default or by programming changes. If the DN length changes, and the changed DNs conflict with the Park prefix, the setting changes to None.
Programming access codes 3 Use the following table to determine the settings you want to define direct dial sets. Table 57 Direct dial values Attribute Values Description Type Internal This is the type of number for the direct-dial set. External None Internal/External# The DN number of the telephone to be designated as the direct dial...
Programming access codes Tips about access codes Here are some helpful pointers to assist you in planning the access codes for your system. Table 58 Access/dialing codes: avoiding numbering conflicts XXXXX Numbering cannot conflict with these features Direct Private Public/ Public/ Park External...
Programming access codes Using the MCDN access codes (tandem calls) Three special codes exist specifically for programming over PRI and VoIP trunks that are using the MCDN protocol, and which connect to a call server systems that use specific call codes for special call types, such as the Meridian 1 (M1).
Setting up line pool access codes This is how the codes relate: Meridian 1 access codes Business Communications Manager access codes Sample code Private access code Network/long distance code National access code Local access code Local code Special access code Calls coming in from the public network need to be translated to their private network destination before routing/tandeming through the private network.
Page 329
Setting up line pool access codes Type the Access code (up to four digits). The default Access code is 9 for Line Pool A. There is no default Access code for Line Pools B to O. Note: You cannot assign PRI line pools with a line pool access code. You must define PRI line pools under routing, and create destination codes for the routes.
Using Carrier codes Using Carrier codes A multi-digit Carrier access code contains an Equal Access Identifier Code (CAC) followed by a Carrier Identification Code (CIC). The CIC identifies the carrier that handles the call. The Carrier Access Code table stores the CAC digit pattern that you define for your region. In most cases it is not necessary to change the default values.
Configuring call routing Figure 97 Configuring a carrier code prefix ID length Use the following table for information about the two fields on this screen. Table 59 Carrier access code values Attribute Values Description Code prefix <one to six digits> This value defines the prefix that will be used to access the carrier (Read-only) code.
Configuring call routing Figure 98 Call Routing headings Call Routing Routes Route 000 External # Use pool Destination Codes Schedules Call routing decides what path an outgoing call takes using the digits that are dialed. It is sometimes called Automatic Route Selection (ARS). When you select an internal line and dial, the system checks the numbers you enter against the routing tables.
Defining routes Routing configuration The settings for a call routing include: • a three-digit route number (000-999) • external # digits (up to 24 digits) • a line pool • destination codes (max. of 500 available, up to 12 digits) •...
Defining routes Figure 100 Define route parameters Use the information in the following table to configure the route settings. Table 60 Route settings Attribute Value Description External # <a maximum of 24 Enter the external or dial-out number for the route you want the assigned digits>...
Page 335
Defining routes Table 60 Route settings (Continued) Attribute Value Description DN type or Public This setting tells the system what type of line protocol the route uses to Service type process the dial string. Private The heading changes between DN type and Service type, depending on Local (Subscriber) the PRI line protocol.
Defining routes Call by Call service routing The following table provides an example of a Routing Table containing Call by Call programming (available in the North America market profile). Refer also to “Configuring Call by Call services” on page 350. Table 61 Call by Call routing table example Route # Dial Out...
Defining routes Programming the PRI routing table The dialing plan must be thoroughly planned out in advance before programming the information into the Business Communications Manager system. To program the routing table: Click on the keys beside Services, Telephony Services, Call Routing, Routes. Click on the route number record you want to use.
Using destination codes Using destination codes Destination codes allow you to control how the system interprets and routes dial strings from internal sources. Destination codes are similar to line pool codes except that by using routes (which attach dial strings and DN type designators to line pools) and schedules you can control what digits the user has to dial and how the system routes the call out of the system, including what numbers from the dial string get added or deleted to the route dialout.
Using destination codes Why use destination codes? Routes determine path (line or pool) and any required access numbers. Destination codes determine which route to take (i.e. an end node uses one destination code for all other nodes in the system). If you choose to use the destination codes Normal schedule, the call will always go out over the same route.
Using destination codes Deciding on a code Note: When configuring a private network, ensure the numbering plan does not conflict with the public telephone network. For example, in North America, using “1” as an access code in a private network, conflicts with the PSTN numbering plan for long distance calls When deciding on which digit(s) to use to start your destination code(s), you need to take into consideration:...
Grouping destination codes using a wild card economical route is being used. Depending on how many exceptions there are, you can use the wild card at the end of the string to save yourself from the necessity of entering a number of destination codes with the same leading digits.
Configuring destination codes with wild cards Figure 102 Adding a destination code with a wild card Click the Save button to save the destination code. Set up the destination code schedules Click on the key beside Schedules. Click on the schedule name you want to program.
Configuring destination codes with wild cards Enable/disable wild card digits Click on the key beside Wild cards. The valid numbers for the wild card for this code are displayed. Click on the number you want to change. In the Wild card state field, choose Assigned (can be used with this destination code) or Available (can be used as part of another destination code).
Configuring destination codes with wild cards Figure 103 Routing Service programming example Routing Service ( Services: Routing Service Route # Dial out (if required) (000-999) (max. 24 digits or characters) Use Pool none A B C D E F G H I J K L M N O none A B C D E F G H I J K L M N O The following figure shows an example of a Destination codes programming record filled out...
Configuring destination codes with wild cards Notes about the Absorbed length: The digit absorption setting (Absorbed Length) applies to a maximum of two schedules. Setting Absorbed Length to 0 minimizes the effort involved in preparing destination codes. When the Absorbed Length is at 0, the actual digits dialed by a caller are preserved in the dialout sequence.
Configuring destination codes with wild cards Follow these steps to program a long distance carrier access code into a destination code. Create a route that uses a line pool containing local lines only. Program the route to use a line pool containing the lines used to access the long distance carriers.
Configuring destination codes with wild cards Using multiple routes and overflow routing If all the lines used by a route specified by a destination code are busy when a call is made, you can program other routes that the system automatically flows the calls to, or you can allow the call to overflow directly to the Normal route schedule (usually the most expensive route).
Configuring destination codes with wild cards Assign an overflow route, usually the most expensive route, to the same Destination Code, but for the Normal schedule. Figure 107 Configuring the Normal schedule for overflow Under Scheduled Services, Routing Service, <preferred route schedule>, choose auto for Service Setting, and Y for Overflow.
Configuring Call by Call services Using dialing restrictions with routing You can further customize routing service by adding dialing filters to lines in line pools. Filters restrict the use of the line to specific area codes. To set up restriction filters, refer to “Defining restriction filters”...
Configuring Call by Call services Call by Call services Business Communications Manager supports the Call by Call Services listed in the following table. Table 67 Call by Call Services available on the system Service Description Public Public calls connect Business Communications Manager and a Central Office (CO).
Configuring Call by Call services Switches supporting Call by Call limits The following table lists the service types and cross-references them with four common switches. Table 68 Switches and service types chart Switches DMS-250 DMS-100 (MCI, Sprint, Service types NI-2 (custom) Generic) AT&T 4ESS...
Configuring Call by Call services Setting CbC limits PRI pool limits for Call by Call services allows you to configure limits for service types without interacting with the CO. This feature sets the minimum and maximum number of incoming and outgoing calls per service type for the PRI pool.
Configuring Call by Call services Figure 109 PRI Overlap Note: If more than one PRI and its channels are in the same PRI Pool, the administrator must change the Maximum outgoing value to reflect the total number of channels available. For example: 1 PRI: Maximum outgoing = 30 2 PRI: Maximum outgoing = 60 3 PRI: Maximum outgoing = 90...
Configuring Call by Call services Viewing CbC limit metrics You can view statistical information about call-by-call limit settings for PRI when the protocol is set to call-by-call routing. Choose Diagnostics, Service Metrics, Telephony Services, CbC limit metrics. The display shows the pools that supports CbC routing. Choose a PRI pool.
Defining restriction filters Figure 110 Metrics for all CbC options To clear the settings for a selected service, click Clear metrics on the Configuration menu. Defining restriction filters Restriction filters allow you to restrict the numbers that can be dialed on any external line within Business Communications Manager.
Defining restriction filters This section includes the following information: • “Adding a restriction filter” on page 357 • “Notes about restriction filters” on page 358 • “Adding overrides to restrictions” on page 360 • “Restriction filter examples” on page 361 The following figure shows the Restriction Filters headings.
Defining restriction filters Removing restrictions To remove restrictions that no longer apply, click on the Restriction # you want to remove, then click the Delete button at the top of the column. Exercise caution when removing overrides. If you remove a restriction, the overrides associated with the restriction are also removed. This action also changes the identifying numbers of the subsequent restrictions that you have defined.
Defining restriction filters • When restricting the dialing of a central office feature code, do not forget to create separate restrictions for the codes used for DTMF and pulse lines (for example, *67 and 1167). • Do not string together a central office feature code and a dialing sequence that you want to restrict.
Defining restriction filters Filters 02, 03, and 04, although not preset with restrictions and overrides, are the default filters in these programming headings: Table 71 Default filters for program headings Filter Heading Sub-heading System DNs Set restrictions Lines Line restriction Lines Remote restriction Default filters (other)
Defining restriction filters To delete an override: Select the override you want to delete, and then click on the Delete button at the top of the column. If you want to delete all overrides for that restriction, click the Delete All button.
Enhanced 911 (E911) configuration In the following figure, dialed digits must pass both the remote restriction and the line restriction. A remote caller can override these filters by dialing the DISA DN and entering a COS password. Figure 115 Remote line restriction example Line restriction No long Remote restriction...
Page 363
Enhanced 911 (E911) configuration • By default, Restriction Filter 02 is assigned to all sets on startup. There are no restrictions applied in Restriction Filters 02-99. Restriction Filter 01 has restrictions, but 911 is an exception for this filter. For information on how to change the Restrictions, refer to “Defining restriction filters”...
Chapter 13 Configuring DN records, an overview This section provides an overview about the process for programming the records of the telephones and equipment attached to the station modules on the Business Communications Manager. Refer also to the process map on the next page (“Understanding the configuration process”...
Understanding the configuration process Understanding the configuration process The following process map provides an over-all view of how to set up telephone configurations. Figure 116 Process map: Configuring DNs for system devices Lines, station modules and base stations are installed, as required. DN number ranges depend on where station modules are set, on the type of telephones, and on the vintage of your system.
DN mapping for digital telephones DN mapping for digital telephones Use the following tables to determine which DNs can be assigned to your telephones if your system administrator did not provide you with a list of available DNs or did not fill out the Programming Record forms.
DN mapping for digital telephones DN chart for upgraded 2.5 systems BCM 2.5 systems upgraded to 3.0 or newer software Module type (SD = single density; FDD = full double density; PDD = Partial double density) Module DSM 32 or DSM32+ location DSM16 or DSM 32+...
DN mapping for digital telephones DN chart for new 3.0 or newer systems If your system is a brand new BCM 3.0 or newer system, the DN numbering is consecutive from DS30 02 to 07. New BCM 3.0 or newer systems Module type (SD = single density;...
Defining the System DN headings DN mapping for ISDN and legacy wireless handset devices This equipment has pre-set DNs that are automatically assigned on a default system. Table 72 DN mapping for ISDN and legacy Companion and DECT handsets Default DN Media Bay System version Equipment...
Defining the System DN headings The System DN heading provides access to the DN records of telephones that are active on the system, records of all the DNs that are available, and a comprehensive list of all DN possibilities. Use the list that is most convenient for what you want to do. Figure 117 System DNs main headings System DNs System DNs (continued)
Page 372
Defining the System DN headings Warning: Changing DN settings after system startup: Changes to the Start DN, DN length or Received # length can affect other applications. Make changes to these settings only at system installation, before you do any other programming.
Use this list when you want to change a configuration, or to remove a telephone. Nortel IP telephone configuration records are located under Services, IP Telephony. Although you do not have to assign DNs to configure IP telephony DN records, they will not appear under this listing unless the telephone has been registered to the system.
Page 374
Defining the System DN headings This list displays the 7XXX digital phones, 7406 cordless digital phone, Set DNs 20XX IP telephones and WLAN IP telephone DNs that are not assigned or are not active. Use this list to set up new telephones before they are installed in the field.
Defining the System DN headings DN Registration headings The DN records found under this heading indicate whether a device is registered to the system, and, if it is, whether it is active. Figure 118 Registration DNs, main headings All System B2s DN Registration ...
Page 376
Defining the System DN headings Following is a brief description of the type of devices found under each heading. This is a list of registered DNs that are currently in contact with the Active DNs reg’d Business Communications Manager. This is a list of DNs that are registered but which are inactive. For Inactive DNs reg’d example, in the case of a portable handset, this might mean that the user has the handset turned off.
Defining the System DN headings Moving between the Inactive and Active lists DNs move between active and inactive lists based on a number of factors which are described in the two sections below. From Active list to the Inactive list A DN record heading will move from the Active list to the Inactive list in the following circumstances: •...
Renumbering DNs Refer to the IP Telephony Configuration Guide for detailed instructions about installing the 20XX IP telephones and to the WLAN IP telephone documentation for detailed instructions about installing and registering the WLAN handsets. Feature DNs The system also uses DNs to define remote access features and Hunt groups. These DNs do not show up on the System DNs list.
Renumbering DNs Warning: legacy DECT systems, DECT DNs Do not change DECT DNs after the DECT Configuration wizard has run. Doing so will make the DECT handsets inoperable until you reconfigure the DECT module with the DECT Wizard and resubscribe the handsets. Change telephone DNs using the Unified Manager The General Settings heading also provides access to a screen where you can change the DN setting.
Chapter 14 Configuring DNs using the Wizards Wizards are used to make telephone configuration faster and more convenient, especially for sites where most of the telephones have the same programming. Each record still may require some adjustments for individual users, but most of the tedious programming can be done using the Wizards.
Page 382
Editing DN Record Templates Refer to “What you need to know to fill out a template” on page 383 for a description of the information required by this Wizard. You can print out this list and insert the data you want to enter.
Editing DN Record Templates What you need to know to fill out a template Before you fill out a template, look at the following list and determine what entries you want to include in the template. Photocopy the list and fill it out for each template you want to create. Detailed explanations of the fields can be found elsewhere in this chapter.
Page 384
Editing DN Record Templates Table 73 Edit DN Record Template information (Continued) Screen 5, Capabilities Refer to “Defining device capabilities” on page 417. • Do you want a second call to ring if the telephone is busy? (DND on busy): No/Yes •...
Page 385
Editing DN Record Templates Table 73 Edit DN Record Template information (Continued) • Do you want the telephone to have access to a Hotline (Type) None, Internal/External number? Refer to “Assigning a Hotline” on page 423. If internal . . . What is the internal number for the hotline? (Internal #) If external .
Page 386
Editing DN Record Templates Table 73 Edit DN Record Template information (Continued) • Do you want to determine button settings for the (Perform Button Programming) telephones? No/Yes Refer to “Programming telephone buttons” on page 432. If No, — If Set model is set to Multiple, the button programming for the selected DNs does not change.
Creating telephone records with the Add Users Wizard Creating telephone records with the Add Users Wizard Use the Add Users Wizard to change the telephony settings for DN records. You can change a single DN or a group of DNs that require the same settings. All the DN feature information can be entered when you run this Wizard, or you can indicate a pre-defined template that automatically sets up the DN features.
Creating telephone records with the Add Users Wizard After you configure the DNs, review each DN record and determine if you need to change any of the other settings. Refer to the detailed programming sections to identify each field under each heading.
Page 389
Creating telephone records with the Add Users Wizard Table 74 Add Users wizard information (Continued) Screen 2, Per-DN settings Refer to “Assigning target lines” on page 297. • Enter the Name for each DN you are configuring. (Template Name) • If you want to create a target line, click the Show Target Lines link and fill out the line information.
Page 390
Creating telephone records with the Add Users Wizard Table 74 Add Users wizard information (Continued) • Do you want to be able to answer a voice call without (HF Answerback) No/Yes lifting the receiver or pressing the handsfree button on the telephone? •...
Page 391
Creating telephone records with the Add Users Wizard Table 74 Add Users wizard information (Continued) What is the external number for the hotline? External # Screen 7, User Preferences Note: Not all of these preferences appear for all models of telephones. Refer to “Defining user preferences”...
Creating telephone records with the Add Users Wizard Table 74 Add Users wizard information (Continued) If Yes, (Button XX) — The button display for the telephone appears. Blank Lines and intercom buttons will be indicated as Internal Autodial read-only and cannot be changed. Refer to External Autodial “Changing button programming in the wizard”...
Creating telephone records with the Add Users Wizard Warning: Before you attempt to change this value, ensure that you are aware of the other settings in your system that might be affected by the change. • If you choose the Auto Assign, the wizard populates the Line field for each DN you have specified.
Creating telephone records with the Add Users Wizard Changing button programming in the wizard The button programming section of the wizard only appears if a specific type of telephone has been specified in the wizard or template. The changes you make to this table will overwrite any existing programming for these telephones connected to the ports associated with the DN records that you are changing with this wizard.
Creating telephone records with the Add Users Wizard Figure 122 External autodial selection Notes about programming telephone buttons When you choose a telephone model, then choose Perform button programming on the User Preferences page, the button layout for that telephone appears. Each button can be programmed to be empty (Blank), to dial an internal or external number, or to activate a feature code.
Using remote templates Using remote templates If you have a group of Business Communications Managers in various locations, and you want to ensure consistency of telephone programming, you can configure DN Record Templates on one system, and then access the templates from the other systems by using the Add Users Wizard. The templates can be stored on the originating Business Communications Manager or you can move the files to any HTTP web server.
Saving wizard pages on your computer Saving wizard pages on your computer If you want to save a copy of your button settings, or the summary page to your computer as part of your Programming Record files, you can use the View Source heading under the right-click menu.
Page 398
Saving wizard pages on your computer N0008589 3.3...
Chapter 15 Configuring DNs for system devices This section describes, in detail, the DN record screens that are used for configuring the telephones and equipment attached to the station modules on the Business Communications Manager screen-by-screen. Refer also to the process map (“Understanding the configuration process”...
The Unified Manager navigation tree allows you to refine details about individual telephones. You can also use these DN records instead of the Add Users Wizard (“Configuring DNs using the Wizards” on page 381) to configure telephones. For general information about the DN headings and how to decide which records you need to use, and how to alter the number, refer to the information under “Configuring DN records, an overview”...
Copying settings to other DNs Figure 125 Headings found under typical DNXXX heading Priority call DN XXX-XXX Button programming Auto hold General User speed dial Aux ringer Name External # Allow redirect DN type Facility Redirect ring Device port Restrictions Keep DN alive Control set Set restrictions...
Copying settings to other DNs The following table describes the fields that appear in the various copy screens. Choose the settings that will set up the system to copy the information you want to the DNs you specify. Table 75 Copy values Attribute Value Description...
Identifying the telephone (General heading) Caution: Caller ID set (DNXXX, Line Access, Line Assignment, Line XXX). You can only enable Caller ID Set (target lines and analog devices attached to an GASM) on a maximum of 30 telephones. If you attempt to copy an enabled setting to more than 30 sets, you will receive an error message.
Identifying the telephone (General heading) Use the information in the following table to choose the general settings for the telephone. Table 76 General record values Attribute Value Description Name <up to seven alphanumeric Use this field to provide a more specific description of the telephone, characters>...
You must program external lines and telephones with a control telephone to use the Scheduled Services: Ringing, Restriction, and Routing Services. • Nortel Networks recommends that the control telephone you assign for all telephones (DNs) is different from the control telephone you assign for the lines. •...
Configuring line access Assigning line access The prime line for a telephone is the line that is automatically selected when a call is made from the telephone. The default for all telephones is: • Prime line: I/C (intercom) • Intercom keys: 2 Figure 127 Line access fields ISDN/DECT, 7000 and 7100 digital telephones, 2001 IP telephones do not have intercom keys Digital Doorphone: Ensure this is set to None before you install the Digital Doorphone hardware.
Configuring line access Table 77 Telephone line access fields (Continued) Attribute Values Description Intercom (I/C) 0 to 8 Assign the number of intercom buttons to a telephone. keys Intercom buttons provide a telephone with access to internal and external lines, and line pools. Refer to “Assigning intercom (I/C) buttons (keys)”...
Configuring line access Assigning intercom (I/C) buttons (keys) The Intercom keys attribute assigns the number of intercom buttons that display on a telephone. Intercom buttons provide access to a maximum of eight internal and/or external lines and line pools. The user presses the intercom key to answer internal calls, or to select a line or line pool to make a call.
Determining line assignments Determining line assignments The line assignment setting allows you to assign physical trunks and target lines to each telephone. Target lines are incoming only. Other lines can be used to both make and answer calls if they are configured to do so.
Determining line assignments Assigning lines to telephones Follow these steps to assign lines to telephones: If you are not already in the DN record, click the telephone DN to which you want to assign a trunk or line. Choose Line access. Click on the Line assignment heading. Click the Add button.
• Nortel Networks recommends a maximum of four line buttons per telephone. You can program more than four line buttons on a telephone by programming less than four on other sets. For example, you might program 20 line buttons on a receptionist telephone equipped as a CAP station and only two lines on all other telephones.
Determining line assignments handsfree buttons. Line programming will not overwrite assigned intercom, Answer DN, handsfree, or Hunt group buttons. Refer to Figure 129. Intercom buttons, on the other hand, will overwrite anything. (Figure 130) Note: You need at least two intercom buttons if you want to use the conference feature. answer DNs will also overwrite line programming, but not Intercom buttons.
Determining line assignments Figure 131 Adding an Answer DN If you add an Answer DN, the system Line Line Line Line overwrites the button above the last assigned Answer DN. In this case, Line Line Line Line giving you one less line button. HG XX HG XX Line...
Assigning line pool access Assigning line pool access The Line pool access heading allows you to define the line pools that the telephone will be able to access. These shared pools of lines allow many users to use fewer lines for connections where dedicated lines are not practical or not desirable.
Using Answer DNs Assigning Answer DNs Use these steps to assign answer DNs to a telephone: If you are not already in the DN record, click the telephone DN to which you want to assign an answer DN. Click the key beside Line access. Click on the Answer DNs heading.
Page 416
Using Answer DNs The portable handsets do not have answer buttons, but you can assign a single Answer DN to each handset. If you want to share a portable telephone among users, use the Call Forward feature to temporarily call forward a desk telephone DN to the handset. Warning: legacy DECT system security notice: Ensure that your DECT handset is set to answer calls manually.
Defining device capabilities Defining device capabilities The Capabilities headings control how the system interacts with individual telephones, and how the telephones receive calls. The Capability heading itself has a set of feature settings, which determine how much functionality the telephone will have in terms of system features. To configure capabilities settings, refer to “Configuring the Capabilities features”...
Defining device capabilities Configuring the Capabilities features If you are not already in the DN record, click the telephone DN to which you want to assign set capabilities. Click the Capabilities heading. Use the information in the following table to configure the telephone capabilities. Table 79 Capabilities fields Attribute Values...
Page 419
Defining device capabilities Table 79 Capabilities fields (Continued) Attribute Values Description Priority call N or Y Defines whether this telephone can interrupt calls or override Do Not Disturb at another telephone. Auto hold Y or N This setting determines if the system will automatically put an active call on hold if you answer or initiate another call.
Defining device capabilities Table 79 Capabilities fields (Continued) Attribute Values Description Auto hold for incoming N or Y N = if the telephone is active when a page comes in, the page will be put on page queue until the user hangs up Y = if the telephone is active when a page comes in, the call is automatically put on hold and the page proceeds.
Assigning Call Forward Assigning Call Forward The Call Forward setting under Capabilities allows you to define how the system handles calls when the call is unanswered or the line is busy. You can enter internal numbers, external numbers, and routing codes to process these calls. For instance, if your voice mail system is on a Meridian system, you would call forward unanswered calls to that number.
Assigning Call Forward Use the information in the following table to configure the call forward settings. Table 80 Call forward fields Attribute Values Description Fwd no answer to up to 24 digits Enter the number to which you want to redirect unanswered incoming calls. Fwd no answer 2, 3, 4, 6, 10 Define the number of rings before the system forwards an unanswered call.
Assigning a Hotline Assigning a Hotline The Hotline heading under Capabilities allows you to define a telephone number that automatically dials when you lift the receiver or press the Handsfree button on a telephone. ISDN terminals, and legacy handsets (DECT handsets, NetVision): This feature is not supported for this equipment.
Determining analog settings Determining analog settings The settings for analog devices under Capabilities allow you to define general settings for equipment connected to an analog media bay module or through an Analog Terminal Adaptor (ATA2), which connects an analog device to a digital media bay module (DSM). These settings apply to analog DNs only and are available to telephone DNs in the digital telephone range with Model set to Other.
Determining analog settings Table 83 ATA settings (Continued) Attribute Values Description ATA Dvc Modem Default: Modem Devices connected to the system through an ATA can have connectivity issues over Telephon BRI/PRI lines. To alleviate this, you can specify the type of device attached to the analog line.
Setting intrusion controls Setting intrusion controls If the break-in feature is allowed on any private network MCDN lines (PRI SL-1) assigned to the telephone, you need to define the level of intrusion for each telephone. This determines if the user can use the feature, and to what degree.
Setting SWCA call groups Setting SWCA call groups Although System-side Call Appearance (SWCA) assignments are meant to be assigned to buttons with indicators, you can assign SWCA assignments to a telephone without assigning them to buttons using the fields on this screen. This is useful if you want to use the full range of SWCA assignments.
Defining user preferences For information about configuring SWCA button controls, refer to “Programming SWCA controls for your system” on page 471. Use button programming to assign SWCA assignments to telephone buttons with indicators. Refer to “Programming telephone buttons” on page 432.
Defining user preferences Configuring user preferences Use these steps to program user preferences for a telephone. If you are not already in the DN record, click the key beside the telephone DN to which you want to assign a user preferences. Click the User preferences heading.
Defining user preferences Table 86 User preference choices (Continued) Setting Values Description Dialing options Standard dial Determine how the telephone handles dialed information. Pre-dial Standard: Pick up the receiver and dial. Automatic dial Pre-dial: Dial the numbers, then pick up the receiver to allow the telephone to dial the number.
Page 431
Defining user preferences • indication if the call was answered and by whom • time and date of the call • number of repeated calls from the same source • name of the line on which the call came Call Log can help to •...
Programming telephone buttons Programming telephone buttons Button programming allows you to program the buttons on a telephone with internal and external autodialers and with programmed feature keys. You also can use these screens to remove programming from a button, making it blank. Assigned line, Hunt group designator, answer DNs buttons, intercom buttons, and handsfree buttons cannot be changed through these screens.
Programming telephone buttons Configuring buttons from the DN record Follow these steps to program the buttons on a telephone. If you are not already in the DN record, click the key beside telephone DN where you want to program button features. Click the key beside User preferences.
Programming telephone buttons Notes about button programming: • The number of available button positions, will depend on the model of telephone that you are programming. • New button programming will overwrite any memory button programming performed at the telephone by the user. Conversely, any changes to memory button programming performed by the user at the telephone, after button programming, will overwrite memory keys programmed under Button programming or CAP/KIM button programming.
LAN CTE keycode before it can be used. IP telephones also have soft display labels. These feature labels can be changed under Telephony Services, General Settings, Nortel IP Terminals, Feature labels. The IP Telephony Configuration Guide describes this process in detail.
Default button assignments 7316E digital phone button defaults The default button assignments for the 7316E depend on the template applied. Refer to your Programming Records to identify the current button programming for each telephone or group of telephones. • This telephone has individual handsfree, mute and headset buttons, located under the dialpad. Handsfree must be set to automatic for these buttons to work.
Default button assignments 7316 button defaults Button mapping for the 7316 digital phone is unique. Although the button is patterned after the 7310, the 7316 does not have a second level on its upper button group. Because of this, the numbering for the 7316 is not consecutive.
Default button assignments 7208 button defaults The default button assignments for the 7208 digital phones depend on the template applied. Figure 141 The 7208 button mapping 7208 default button mapping Btn # Pick-Up Target line Transfer Transfer Last No. Redial Last No.
Default button assignments 7000 button defaults* Figure 142 7000 button mapping This basic-function telephone has four programmable memory keys (Figure 142) which default to the features shown in the table below. This telephone has no display and does not support features that require a speaker or a display.
Default button assignments IP telephone button defaults The 20XX IP telephones have fewer programmable buttons than the 7316 or 7316E digital phone, but they have access to a feature menu through the Services key (FEATURE *900) that greatly expands quick access to call features. Additionally, IP telephones support the hot desking feature, which allows the user to transfer telephone settings from one IP telephone to another to allow mobility without needing to relocate the physical telephone.
Default button assignments 2002 IP telephone button defaults The 2002 IP telephone has four memory buttons beside a display that provides soft labels for the buttons. This telephone also has five other programmable buttons with no display. Figure 145 2002 default button assignment 2002 default button mapping Btn #...
Page 442
Default button assignments Model 2001 feature buttons: • Four display buttons appear under the telephone display screen. The first button defaults to act as the Feature button (green button). The other buttons provide access to menu commands that appear on the display, as with the other types of telephones on the system. •...
Default button assignments WLAN IP telephone default settings This handset emulates the 2004 IP telephone in how it functions. However, since it does not have memory keys with indicators, a soft display menu provides the button equivalents. These settings cannot be changed.
Configuring user speed dialing Configuring user speed dialing Speed dial numbers allow users to dial out a number with fewer button presses than dialing out the entire dial string. User speed dial codes can be assigned to telephones using the following procedure. Click the key beside the telephone DN if you are not already in the DN record for the telephone to which you want to assign the user speed dial.
Configuring user speed dialing Table 89 User speed dial settings Setting Values Description External # <external phone number> Enter the number the telephone will automatically dial when the user speed dial code is entered. Remember to include the access codes for the route you choose. Facility Use prime line Select the route you want the dialed number to take out of your system.
Setting up CAP stations Setting up CAP stations A CAP (Central Access Point) station acts as a central answering and monitoring point for a group or a business. You can configure quick dial numbers that allow the person at this station to monitor and answer call traffic into the group.
Setting up CAP stations You can configure a total of 12 CAP stations on a Business Communications Manager using the CAP/KIM assignment setting. Modules that have been configured like this will be referred to as eCAPs and eKIMs. Note: If you do not use CAP/KIM assignment to designate a 7316E +KIM as a CAP station, there is no set limit to the number of these combinations that you can have on your system, resources permitting.
Setting up CAP stations Figure 150 CAP/KIM assignment, CAP/KIM 1 screen Type the DN for the 7316E telephone that you want to designate as a CAP station. Click on the next CAP/KIM to add another CAP station, or click elsewhere on the navigation tree to save the setting.
Setting up CAP stations • If a CAP/KIM module is relocated with the telephone, the settings are retained. • If you replace a legacy 7324+eCAP with a 7316E+eKIM, only the line assignments will be copied to the new telephone, but not to the eKIM. The telephone programming will revert to the default settings for other buttons.
Setting up CAP stations Click the key beside CAP/KIM button programming. The following figure shows the programming field for button 01. Figure 151 Programming a CAP/KIM button. Click the button number that you want to program. Use the information in the following table to configure button preferences. Table 90 CAP/KIM feature button programming choices Setting Values...
Setting up CAP stations Cold starting the KIM to erase programming If your KIM fails, or if you want to erase programming on the KIM, there are two types of cold start. Note: If you are cold starting an eKIM that has line or Hunt group assignments, the cold start will erase current programming, and insert the line appearances, starting with the top, left button.
Programming restrictions for DNs Programming restrictions for DNs The Restrictions settings prevent callers from making certain kinds of calls from a specific telephone or from lines that are available at the telephone. You can also restrict some features. You can copy the restriction settings you program on one telephone to other telephones. TIPS: Remote access: Users dialing in from an external source are given a COS password to gain access to the system.
Programming restrictions for DNs Defining telephone dialing restrictions Set restrictions allow you to assign a restriction filter to a telephone to prevent certain numbers from being dialed from that telephone and prevent the use of some features. Follow these steps to create or change set restrictions: If you are not already in the DN record, click the key beside the telephone DN for which you want to assign set restrictions.
Programming restrictions for DNs ISDN terminals/cordless handsets notes: • Set lock is not supported. • Allowed last number redial is supported on some handsets. Refer to the user manual for your telephone. • Allowed saved number redial is not supported •...
Programming restrictions for DNs Defining line/set restrictions The Line/set restrictions settings allow you to assign a restriction filter to a specific line for outgoing calls at a specific telephone. This type of filter replaces any line or set restriction filters that can otherwise apply.
Configuring telco features Configuring telco features The Telco features heading allows you to program how the Business Communications Manager works with the public network or other outside features and services to supply Call Display. Figure 156 DN Telco Features fields You can copy the Telco features settings you program on one telephone to other telephones.
Voice Mail settings Table 93 Telco features settings (Continued) Setting Values Description Available log space <total amount of log This setting indicates the total amount of space available for call (read only) space that is logging on the system. available> Legacy DECT system note: DECT handsets display numbers for incoming calls from outside the local network, and displays the telephone name for incoming calls from internal sets.
Chapter 16 Configuring system settings Some settings affect all telephones in the system, which have the specific feature. This section describes the call-related Telephony services settings found under General Settings, System Speed dial and Telco features headings. TASKS: Define system-wide settings (General settings) that affect how all the telephones in the system use certain features, or perform in specific ways.
Page 460
(“Maximum System Speed Dials”) • system call log space (“Resetting call log space” on page 478). Nortel IP terminals IP Telephony Configuration Guide IP trunking The fields on the screen are described under “Configuring special IP trunking interoperability” on page 545.
Network Services Business name Silent monitor Feature settings Access codes SWCA control Remote access packages Call log space COS passwords Nortel IP terminals DN lengths IP trunking CbC limits Timers Release reasons Direct Dial Network Services CAP/KIM assignment Silent monitor...
Network name display Table 95 Call features/interface list Interface SL-1 ETSI Euro Feature NI-2-2 PRI Custom PRI (MCDN) NI-2 BRI (PRI/BRI) ETSI QSIG Receiving Connected Name Supported Supported Supported Sending Calling Party Name Supported Supported Supported Supported Sending Connected Name Supported Supported Supported...
Services, General settings, IP Trunking. Programming Business name display Nortel Networks recommends that you use a blank space for the last character of the Business name to act as a separator between the Business name and telephone name.
Page 464
Network name display Limitations: • Due to system resource limitations, only 30 telephones can be assigned to provide alpha tagging CLID per line. Refer to table entry: Maximum CLI per Line on page 468. • If the incoming number only partially matches the CLID match length, no name displays. •...
Programming Feature settings Programming Feature settings The Feature settings heading allows you to program a number of features that apply to all telephones connected to Business Communications Manager. Follow these steps to define feature settings on a specific telephone: On the navigation tree, click on the keys beside Services, Telephony services, and General settings.
Programming Feature settings Table 96 Set feature values Attribute Value Description Background music Y or N Allows you to listen to music through your telephone speaker after pressing FEATURE 86 on your telephone. A music source must be connected to Business Communications Manager or IP music must be configured.
Page 467
Programming Feature settings Table 96 Set feature values (Continued) Attribute Value Description Alarm set None Allows you to assign a device on which alarm messages appear when a problem has been detected in the system. DN: <number> Alarms are recorded in the Windows NT event log. Set relocation Y or N Activate Set relocation after you perform the telephone...
Society of Composers, Authors and Publishers or a similar organization if radio or TV broadcasts are transmitted through the Background Music feature of this telecommunication system. Nortel Networks hereby disclaims any liability occurring as a result of failure to obtain a license. N0008589 3.3...
Programming Feature settings Answer key levels The following table shows what functions are provided by each level of the answer key settings. The Xs indicate the call types which will ring at answer DN telephones. Table 97 Answer keys Answer keys Basic Enhanced* Extended*...
Configuring system-wide call appearance groups Configuring system-wide call appearance groups These sections describe the system wide call appearance (SWCA) feature in detail: • “Programming SWCA controls for your system” on page 471 • “How SWCA works in a call group” on page 474 •...
Configuring system-wide call appearance groups FEATURE *537 retrieves the oldest SWCA call. The call becomes active on the telephone that invoked the code, and the indicator on all other telephones becomes solid. FEATURE *538 retrieves the most recent SWCA call. The call becomes active on the telephone that invoked the code, and the indicator on all other telephones becomes solid.
Configuring system-wide call appearance groups On the navigation tree, click on the keys beside Services, Telephony Services, General Settings, and Feature settings. Click on SWCA Controls. The SWCA Controls screen appears in the right frame. Figure 160 Setting SWCA controls Use the values in the following table to set the SWCA controls.
Page 473
Configuring system-wide call appearance groups Table 98 SWCA controls (Continued) Attribute/Value Description Invoke SWCA parking by Hold Choose whether calls that are put on hold will automatically assign to a SWCA key. Y or N If you choose Y (yes) ... When the user presses Hold, the system attempts to repark the call on the current SWCA key assigned to the call, or on a free SWCA key programmed on the telephone.
Configuring system-wide call appearance groups • 7316E+KIM digital phones can have SWCA codes assigned to the KIM module buttons. The telephone does not have to be designated as an eCAP for this functionality, since the SWCA consignments are considered feature programming, not line programming. How SWCA works in a call group The SWCA feature displays call appearances on any telephones in the system which have buttons with displays assigned for the same SWCA answer keys.
Configuring system-wide call appearance groups Figure 162 SWCA indicators, incoming call from an intercom (auto SWCA association for intercom is on) Call is answered and Call is parked on the SWCA. Call is retrieved. automatically associated to a Intercom indicator disappears and A solid indicator appears beside SWCA.
Configuring system-wide call appearance groups Parking a call to a SWCA key If a call is manually assigned to an SWCA key, the call automatically goes into park mode. If a call is automatically assigned to an SWCA key when it is answered, you have three choices for parking the call: Press the SWCA key the call is assigned to.
Page 477
Configuring system-wide call appearance groups Conference calls A conference call cannot be parked on a SWCA key. You cannot conference a call that is parked on a SWCA key. To conference such a call, you need to retrieve the call, and then put it on hold, and then create the conference.
Resetting call log space Resetting call log space The Call log space heading allows you to reallocate the Call log space equally to all telephones in your system. Warning: Use this heading only if you want to allocate an equal amount of log space to all the telephones in your system.
Setting system timers Click OK to reallocate the log space and clear all user logs. Click Cancel if you do not want to clear user logs. In this case, the call log space will not be reallocated. Setting system timers The settings under Timers allows you to define a number of timed features for your Business Communications Manager system.
Setting system timers The possible settings are described in the following table. Table 100 Timer values Attribute Values Description Camp timeout 30, 45, 60, 90,120, 150 Assign the number of seconds before an unanswered camped call or 180 seconds returns to the telephone that camped the call. Park timeout 30, 45, 60, 90, 120, 150, Assign the number of seconds before a parked call on an external line...
Define release reason levels Define release reason levels The Release reasons heading allows you to determine the level of system reporting you require for released ISDN calls. You can choose to have no text, a simple explanation, or a detailed explanation.
Configuring system speed dial numbers Configuring system speed dial numbers The System speed dial heading accesses screens that allow you to assign speed dial codes to external numbers that can be dialed from any telephone on the system. Examples of system speed dials might include telephone numbers of regional sales offices within your organization or key customers that you call frequently.
Configuring system speed dial numbers Assigning numbers to system speed dial codes Follow these steps to create a speed dial code for quick-access to an external number: Click on the keys beside Services, Telephony services, and System speed dial. Click a Speed dial number (Speed dial # XXX). Figure 164 Undefined speed dial screen ..
Page 484
Configuring system speed dial numbers Table 102 Release reason values (Continued) Display Digits Y or N Y = the speed dial number displays N = the name defined for the speed dial displays If N is selected: Name <alphanumeric> In the Name field, enter the name you want to display for alpha tagging.
Setting system telco features Setting system telco features The Telco features commands found under the General heading allow you to define settings for voice message center numbers and outgoing name and number blocking (ONN). Task: • Set up voice message access and control strings (“Defining Voice Message Center numbers”...
Setting system telco features Table 103 Voice message center settings (Continued) Field Values Description Message wait <string> indicates that the voice messages have been retrieved. cancellation string This is a default NSI string for message waiting. Repeat for each center you want to identify. TIPS: •...
Setting system telco features Programming note: Ensure that users who have access to this feature have telephones with valid OLI numbers. Refer to “Assigning line access” on page 406. Configuring ONN blocking service codes Follow these steps to configure an ONN setting: Click on the keys beside Services, Telephony services, and Telco features.
Page 488
Setting system telco features N0008589 3.3...
Chapter 17 Configuring schedules This section describes the headings where you configure system-wide schedules. The information discussed in this chapter is found under the Telephony Services heading Scheduled services. Task: • Understand how to activate and deactivate schedules from a control telephone (“Turn services on and off”...
Turn services on and off Turn services on and off You can manage schedules from a control telephone using the feature codes shown in the table below. This section provides step-by-step instructions for turning services on and off on one-line and two-line display telephones.
Defining common schedule settings Overriding services with a Control telephone The control telephone can override services turned on and off according to a schedule by entering a Services feature code, and then by selecting a different schedule. This override remains until canceled.
Defining common schedule settings Changing schedule names Schedules have been given default names. However, if you change the purpose of your schedules, you can also change the name to reflect this. Use these steps if you want to change the name of a schedule. Click on the Common settings key and on the Schedule names key.
Defining common schedule settings Changing schedule times Schedule start and stop times are set at times you are most likely to want each service to be active. Click the keys beside Services, Telephony services, and Scheduled services, and Schedule times. Click the key beside the day you want to program (for example, Monday).
Defining common schedule settings About start and stop times Here are some general rules about setting start and stop times: • It is only necessary to program start and stop times for schedules that are activated automatically. • The time may be entered in either 12 or 24-hour format. If the display is in English, and the hour entered is less than 13, the display prompts you to specify AM or PM.
Defining service schedules Defining service schedules The Scheduled services headings access records that allow you to define service by the time of day and day of week for the following services: • “Configuring ringing service” on page 496 • “Configuring restriction service” on page 499 •...
Configuring ringing service Configuring ringing service At certain times or in certain situations, you may want additional telephones to ring for incoming lines. The most common use of this feature is when a security desk telephone rings for incoming lines after 5:00 p.m., a practice often called night service. Each non-auto-answer and target line can be assigned a ringing group for each schedule.
Configuring ringing service TIPS: You can assign any telephone on the Business Communications Manager system to a ring group. The assigned control telephone for each schedule is added to each ring group. A telephone can belong to more than one ring group. Click Save to enter the DN.
Configuring ringing service Table 107 Ringing group schedule values (Continued) Attribute Value Description Trunk answer Y or N Trunk answer allows you to answer, from any telephone, an external call that is ringing at another telephone in your office if the Ringing Service is active on that line at the time of the call.
Configuring restriction service Table 108 Ringing group schedule line values (Continued) Attribute Value Description Aux ringer Y or N This variable indicates whether the auxiliary ringer (if installed) also rings when Ringing service is on. TIPS: • The default ringing telephone is 221 (Start DN). This means that all lines ring at telephone 221 when Ringing service is on.
Configuring restriction service Table 109 Restriction schedule values Attribute Value Description Service setting Off Off prevents the service from being activated. Auto Manual Auto allows you to program a stop and start time for a service under the Common Settings heading. These times are then automatically executed when the service is active.
Configuring routing service Configuring routing service Routing service allows you to assign alternate routes to calls. You can take advantage of lower costs available on selected routes for some days and at some times. You can also use this service to set up overflow routing, to allow calls that come into line pools that have no available lines to be answered through an alternate line pool.
Page 502
Configuring routing service Table 110 Routing service schedule values (Continued) Attribute Value Description Overflow routing Y or N If all the lines used by a route are busy when a call is made, you can program Routing service to overflow to the route used for normal mode. If this happens, the telephone sounds a warning tone and displays the message Expensive .
Chapter 18 Configuring public networks This section describes the ways of networking Business Communications Managers across a public network. Different countries have different trunk types, therefore, these descriptions are also region based. Refer to “Media bay module availability by region” on page 837 for more information.
Simple networking Callers using Business Communications Manager These callers can: • call directly to a specific telephone • select an outgoing line to access a private network • select an outgoing line to access features that are available on the private network •...
Dialing plans for T1 lines Dialing plans for T1 lines Business Communications Manager has a routing feature that allows you to set up a coordinated dialing plan with other systems in the public network. The goal is to have a network-wide dialing plan where all telephone numbers are unique and of a uniform length.
Other programming that affects public networking Other programming that affects public networking Besides the line programming, these topics cover other areas that affect how calls are sent or received over the public network. • “Controlling access into the system” on page 293 (Public Received Number Length, Target lines and remote access) •...
Page 508
Other programming that affects public networking N0008589 3.3...
Chapter 19 Configuring private networks This section describes the basic requirements for private networking Business Communications Managers. As well, four simple private networks are described. Private networking using the MCDN protocol is described in “Configuring private networks with SL-1 MCDN” on page 523 “Configuring ETSI QSIG and DPNSS network services”...
You must purchase and install these keycodes before you can create any of the networks described in this chapter. Consult with your Nortel Networks distributor to ensure you order the correct keycodes for the type of network you want to create.
Private network programming parameters Lines used for networking External (trunk) lines provide the physical connection between Business Communications Manager and other systems in a private or public network. The Business Communications Manager numbers physical lines from 061 to 233/240. Default numbering depends on the trunk module positioning within the Business Communications Manager.
Using routing to create networking Using routing to create networking By properly planning and programming routing tables and destination codes, an installer can create a numbering plan where T1 E&M lines between Business Communications Manager systems are available to other systems in the network The following figure shows a network of three Business Communications Manager systems.
Using routing to create networking Table 112 E and M routing for a Business Communications Manager network New York office: Parameter Setting Trunk/Line Data Network line (external) Line 061 T1 E&M Answer Mode Auto Line type Pool H Target line (internal) Line 241 Target line Private Received #...
Page 514
Using routing to create networking Table 112 E and M routing for a Business Communications Manager network (Continued) Santa Clara office: Parameter Setting Network line (external to New York) Line 091 T1 E&M Answer Mode Auto Line type Pool M Network line (external to Santa Clara) Line 092 T1 E&M...
Page 515
Using routing to create networking Table 112 E and M routing for a Business Communications Manager network (Continued) Toronto office: Parameter Setting Trunk/Line Data (external) Line 093 T1 E&M Answer Mode Auto Line type Pool N Target line (internal) Line 300 Target line Private Received # 6221...
Using shared line pools to create a network Using shared line pools to create a network Using shared line pools is a powerful and efficient way to create a coordinated dialing plan for a small network. If the Business Communications Manager systems are close to each other geographically, you can conserve resources by not duplicating long-distance access.
Using shared line pools to create a network Figure 181 Network example using shared line pools Network # 5234 Network # 6334 Received # 234 Received # 334 Internal # 234 Internal # 334 System B System A T1 E&M Pool A (5) Pool A (6) Pool B (8)
Using shared line pools to create a network The following table shows the system coding for each system to set up a line pool-based coordinated dialing plan. Table 113 Creating a coordinated dialing plan using line pools Route from System A to: System Lines, Trunk/Line Data Assign lines that connect with...
PRI networking using Call-by-Call services PRI networking using Call-by-Call services The example shown in the following figure highlights the use of PRI Call-by-Call services. It shows two offices of a company, one in New York and one in Toronto. Each office is equipped with a Business Communications Manager system and a PRI line.
PRI networking using Call-by-Call services two T1 spans. With PRI Call-by-call services, the only limitation is that there are no more than 23 calls in progress at any one time. The dialing plan at each Business Communications Manager site is configured to determine the call type based on the digits dialed by the user.
Page 521
PRI networking using Call-by-Call services Table 114 PRI call-by-call services routing information (Continued) New York office: Parameter Home System Settings Hardware Protocol NI-2 Trunk/Line Data Line 245 Target line Private/Public Received # 6221 Line Access DN 6221 L245:Ring only Line pool access Line pool PRI-A Routing Services Private Network...
Page 522
PRI networking using Call-by-Call services N0008589 3.3...
Chapter 20 Configuring private networks with SL-1 MCDN This section describes how to network Business Communications Managers together in a private network using PRI SL-1 lines with or without the MCDN protocol. When Business Communications Managers are networked with other call services, such as Meridian 1, using the MCDN protocol, the network can also support centralized voice mail.
System numbering plans System numbering plans Both these types of networks require similar setups for dialing plans and routing. Each node must have a way to route external calls to the adjacent node or nodes. To do this, all nodes must have the same Private DN lengths.
Creating tandem private networks In this type of network, you must ensure that each Business Communications Manager system, known as a node of the network, is set up to route calls internally as well as to other nodes on the system.
Page 526
Creating tandem private networks Table 115 Call originating from the public network to a tandem network (Continued) Received Destination Description Node A Node E User in Calgary dials a 765-xxxx number. DN type: Public Node A receives it and identifies it as being for B. Uses private trunk to route call to B. Incoming interface: Public Destination: Remote node Outgoing interface: Private...
Page 527
Creating tandem private networks Table 115 Call originating from the public network to a tandem network (Continued) Received Destination Description Node A Node D User in Calgary dials a 761-xxxx number which is answered with DISA. Incoming interface: Public DN type: Public Destination: Local (DISA DN) User enters a COS password and a private DN for Node D, i.e.
Creating tandem private networks Calls originating in the private network The following table describes who each node handles calls originated in the public network. Table 116 Calls originating from the private network within a tandem network Received Destination Description Node B Node B DN is internal, therefore no trunk routing is required.
Page 529
Creating tandem private networks Table 116 Calls originating from the private network within a tandem network (Continued) Received Destination Description Node B Node C User on Node B dials a private DN for a user on C. DN type: Private Node B recognizes it as being the responsibility of Node A and routes the call over the private trunk to A.
Creating tandem private networks Table 116 Calls originating from the private network within a tandem network (Continued) Received Destination Description Node B Node F User on B dials a private DN for node F. DN type: Private Node B identifies it as being for node A and uses private trunk to route the call to A. Incoming interface: Intercom Destination: Remote node Node A receives it and identifies it as being for C.
Understanding MCDN network features Understanding MCDN network features When you connect your Business Communications Manager systems through an SL-1 and use the MCDN protocol, your network provides a number of network call features. You can use this protocol to network other Business Communications Manager systems, such as the tandem system, shown in the previous section, Norstar systems, or Meridian 1 systems.
Understanding MCDN network features Figure 184 Network call redirection path Meridian 1 with Meridian Mail Business Communications Manager SL-1 MCDN Telephone A Original call Telephone B Call forwarded to Meridian Mail If you are using the centralized voice message system from a Meridian 1 system, you require the following programming on the M1: M1 programming in LD 17 •...
Understanding MCDN network features ISDN Call Connection Limitation The ICCL feature piggybacks on the call initiation request and acts as a check at transit PBX points to prevent misconfigured routes or calls with errors from blocking channels. This feature adds a transit/tandem counter to a call setup message. This counter is compared at each transit PBX with a value programmed into the transit PBX, in a range from 0 to 31.
Understanding MCDN network features Trunk Route Optimization TRO finds the most direct route through the network to send a call between nodes. This function occurs during the initial alerting phase of a call. Business Communications Manager configurations: • Under Network Services, MCDN, set TRO to Y(yes). •...
Understanding MCDN network features Trunk Anti-tromboning TAT is a call-reroute feature that works to find better routes during a transfer of an active call. This feature acts to prevent unnecessary tandeming and tromboning of trunks. TIPS: This feature is not applicable for alerting calls. Business Communications Manager configurations: •...
Using SL-1 with MCDN to network with a Meridian system Using SL-1 with MCDN to network with a Meridian system When you connect your Business Communications Manager systems through the SL-1 MCDN protocol to a Meridian 1, the Meridian system manages several aspects of the network, including voice mail, auto attendant services, and system timing.
Using SL-1 with MCDN to network with a Meridian system Note: For MCDN over VoIP trunks, the Meridian uses the IPT trunk card (introduced in BCM 3.5). Both systems must have remote gateways pointed to correct system types and protocols. Refer to the IP Telephony Configuration Guide for information about Remote Gateways for the Business Communications Manager system.
Using SL-1 with MCDN to network with a Meridian system Note: If you have public DNs set up for your telephones that are different from the system-assigned DN, each telephone would need two target lines to accommodate both public and private networks. •...
Using SL-1 with MCDN to network with a Meridian system CDP-specific programming Business Communications Manager CDP programming • Private Dialing Plan: Private Type=CDP Access Code <unique code>. • Private DN length <system DN length> • <number assigned from M1 LD 16, RDB - PNI in M1 (1-128)>...
Using SL-1 with MCDN to network with a Meridian system An example of a private network with Meridian 1 The following figure shows a private network composed of one central Meridian 1, and two sites with Business Communications Manager systems all connected by SL-1, with MCDN activated on all sites.
Using SL-1 with MCDN to network with a Meridian system Note that the Private Network Identifier (PNI) is programmed at each end of the links. The PNI identifies the Business Communications Manager to the Meridian 1 system. Routing is set up such that network calls are made by dialing a four-digit private network DN. For example, if a user in the west end branch wishes to call a user in the east end branch within the private network, they dial 6221.
Using SL-1 with MCDN to network with a Meridian system Table 123 MCDN dialing plan settings (Continued) East End office: Dialing Plan programming Type Private Network ID Location Code <unique three digits> (becomes part of destination code) Private DN Length Public DN Length Business Communications Manager routing information: The following table lists the lines and routing information required to set up the network shown in...
VoIP networking Table 124 Network routing information (Continued) East End office: Trunk/Line Data Line 245 Target line Private Received # 6221 Line Access DN 6221 L245:Ring only Line pool access Line pool PRI-A Routing Services Private Network Public Network Head Office to West End Route Dial out # No number...
VoIP networking Configuring special IP trunking interoperability Under Services, Telephony Services, General settings, IP trunking, there are four fields that may need to be filled out to specify specific parameters of the VoIP trunk between your system and a system such as Meridian 1 or Succession 1000/M, which may have special network requirements, such as Bandwidth Management or zone dialing.
Page 546
VoIP networking Table 125 IP trunking interoperability fields (Continued) Field Value Description Virtual Private Network ID <digits> Default:0 This is the VPN ID for a remote system, such as Succession 1000/M. In some applications, such as for the Survivable Remote Gateway (SRG) acting as a Branch Office, this ID is required to ensure that Bandwidth Management is handled correctly for calls coming into the Succession 1000/M from your system.
Chapter 21 Configuring ETSI QSIG and DPNSS network services This section describes the network services for ETSI QSIG and DPNSS private networks. ETSI-QSIG and DPNSS private networking is configured in the same way as described in “Configuring private networks with SL-1 MCDN” on page 523.
Networking with ETSI QSIG Networking with ETSI QSIG (International systems only) ETSI QSIG is the European standard signaling protocol for multi-vendor peer-to-peer communications between PBX systems and/or central offices. Other information in this section: “ETSI Euro network services” on page 549 The following figure illustrates an ETSI QSIG network.
ETSI Euro network services The following table lists the settings for some of the hardware parameters for ETSI QSIG networking example shown above. Table 126 Hardware programming for branch offices West End office: East End office: Hardware DTM/BRIM PRI/BRI Hardware DTM/BRIM PRI/BRI programming...
ETSI Euro network services Table 127 ETSI network values Attribute Values Description Netwrk Diversion Y or N Allows you to choose if you want to allow calls to be redirected to an outside network. MCID Y or N Malicious Call Identification If you set this feature to Y, the called party can use FEATURE 897 to request the network to record the identity of an incoming call.
DPNSS 1 services DPNSS 1 services The Digital Private Network Signaling System (DPNSS 1) is a networking protocol enhancement that extends the private networking capabilities of existing Business Communications Manager systems. It is designed to offer greater centralized functionality for operators, giving them access to Business Communications Manager features over multiple combined networks.
DPNSS 1 features • These remote access features are supported on DPNSS: DDI, line pool access code, destination Codes and remote page feature codes. Software Keys are required to enable DPNSS 1. DPNSS to Embark connections DPNSS lines connected to an Embark switch perform call redirection/diversion using the Call Forward feature to create a tandem link back to the switch.
Note: Three Party Service is supported on 7000 digital phones, but in a receive-only fashion. These telephone types cannot initiate Three Party Service. For more information about these telephone types, see the Nortel Networks Digital Phone 7000 User Card. Using the diversion feature Diversion is a DPNSS 1 feature for Business Communications Manager that allows users to forward their calls to a third party on the DPNSS 1 network.
DPNSS 1 features • Diversion On No Reply diverts calls that go unanswered after a specified amount of time. This feature is programmed in the Unified Manager. • Bypass Call Diversion overrides all call forward features active on a telephone over a DPNSS line.
DPNSS 1 features Using the Redirection feature Redirection is a DPNSS 1 feature similar to Business Communications Manager Transfer Callback. Redirection lets a call awaiting connection, or re-connection, be redirected by the originating party to an alternate destination after a time-out period. Failed calls can also be redirected.
DPNSS 1 features Restrictions by telephone type • ATA2/GASM—supported • ISDN—not supported • Portables—not supported The telephone receiving the intrusion displays Intrusion Call. A warning indication tone will sound after intrusion has taken place, and the standard conference call tone will sound every 20 seconds.
DPNSS 1 features Call offer Call Offer over DPNSS 1 allows a calling party to indicate to the wanted party that there is an incoming call available, even though there is no answer button available to present the call on the telephone.
DPNSS 1 features User actions The party receiving a Call Offer has three choices: • Ignore it. After a programmed time interval, the Offer request is removed. • Reject it. If the user activates Do Not Disturb on Busy (DND) when the Call Offer request is made, the request is removed from the telephone.
Private networking with DPNSS Loop avoidance Errors in the configuration of a network may make it possible for a call to be misrouted, and arrive at a PBX system through which it has already passed. This would continue, causing a loop which would eventually use up all of the available channels.
Private networking with DPNSS Calls are dialed and identified to the system as follows: • To reach a telephone inside the Private Network, at the Business Communications Manager site, the user dials the DN of choice. • To reach a telephone inside the Private Network, from another site, the user dials HLC + DN. •...
Private networking with DPNSS Figure 191 DPNSS networking Private Network DPNSS DPNSS Terminating Business Communications Business Communications Manager Site C Manager Site A DN # 3333 DN # 111 LOC #496 LOC # 244 DPNSS DPNSS Meridian M1 LOC # 563 Business Communications Business Communications Manager Site B...
Private networking with DPNSS Guidelines for creating a private numbering plan with DPNSS Use the following guidelines when creating a private numbering plan with DPNSS. • When creating HLCs for the nodes in your system, avoid numbering conflicts between network nodes and internal DNs, Hunt group DNs. •...
Chapter 22 Configuring centralized voice mail This section describes how to set up the Business Communications Manager to support centralized voice mail or call attendant over a private network. The Business Communications Manager supports voice mail configuration either from the local source or by accessing a remote voice mail system located on another Business Communications Manager or attached to a Meridian 1 system.
Business Communications Manager as host Business Communications Manager as host A Business Communications Manager that acts as a central voice mail location must be running at least BCM version 3.5 or newer software. Other systems on the network can be running older software, as long as that software supports MCDN.
System set up for host Business Communications Manager Refer also to “System set up for satellite systems” for specific call features available from a Meridian 1-based voice mail system. System set up for host Business Communications Manager The Business Communications Manager that hosts the voice mail needs to ensure that incoming calls are directed to the voice mail service.
System set up for satellite systems VoIP networking note: If you are using H.323 VoIP trunks for central voice mail, you need to set the following: • Ensure that the local gateway protocol is set to SL-1 or CSE (BCM 3.0 or newer software), based on the version of the satellite systems.
Page 567
System set up for satellite systems Configuring the telephone records: Click on the keys beside System DNs, Active set DNs, DN YYY (the telephone you associated with the voice mail target line), Line access, Line assignment. 10 Click on Line XXX (the target line you programmed for the telephone. 11 Set the Vmsg set field to Y (yes).
Configuring the system for centralized voice mail Configuring the system for centralized voice mail MCDN is supported over a PRI (SL-1) line or VoIP trunks between your Business Communications Manager and other systems, such as a Meridian 1, Norstar, or other Business Communications Managers.
MIK and MCK message indicators on the Meridian telephones. This feature works for both Nortel and third-party voice mail systems. Messages are received at a centralized location, to a pre-determined telephone, where they are processed and forwarded to the target telephone.
Page 570
Meridian MCDN call features over PRI SL-1 lines Programming notes Business Communications Manager programming M1 programming To select Remote Capability for MWI on a per-loop basis for PRI: 1. Disable the PBX D-channel associated with IPT (LD96). Resources, Media Bay Modules, Bus XX, Modules on bus, Module X: 2.
Meridian MCDN call features over PRI SL-1 lines Camp-on A call received by the Meridian attendant can be assigned to a telephone anywhere in the MCDN network, when the following situations are valid: • the target telephone rings busy when the attendant calls •...
Meridian MCDN call features over PRI SL-1 lines Break-in The Meridian attendant can use the break-in feature to interrupt an on-going call from a telephone in the Business Communications Manager system. The following figure demonstrates the call path for a Meridian attendant to break into a call between telephones in the Business Communications Manager system.
Configuring MWI on DPNSS 1 networks How the intrusion hierarchy works: — Break-in is allowed if Attendant telephone is High and caller telephone is Medium. — Break-in is not allowed if Attendant telephone is Medium and caller telephone is high. Configuring MWI on DPNSS 1 networks Message Waiting Indication (MWI) is a DPNSS 1 feature for Business Communications Manager Call Services.
Configuring MWI on DPNSS 1 networks To assign a message center: Click the keys beside Services, Telco Features. Figure 195 Telco features Voice message center Click Voice message center numbers. Choose a Voice message center: 1 to 5. The existing telephone (DN) for Message Waiting appears if available, as Tel#:XXXX. Type the new target number, starting with an access code, if required, or None.
Configuring MWI on DPNSS 1 networks Programming MWI and MWC MWI and MWC information is received from the network in the form of NSI strings. The NSI strings in DPNSS are dependent on the supplier of the PBX. Therefore, the strings vary depending on the originating PBX system.
Configuring MWI on DPNSS 1 networks Setting Message Waiting Indication Follow these steps to set the MWI: Ensure that you have programmed a telephone to access target lines for receiving messages. For information on access to target lines, refer to “Assigning message centers to a line”...
Chapter 23 Configuring Hunt groups This section explains how to create hunt groups using the Hunt Group headings in the Unified Manager. Hunt groups are designed to provide a service where incoming calls appear on a targeted group of telephones called a Hunt group (“How to use Hunt groups”...
How to use Hunt groups How to use Hunt groups You can use hunt groups to route calls to a support service such as a Help Line for a software company. For example, specialists handling Product A can be in one group, and specialists handling Product B can be in another group.
Identifying a Hunt group Identifying a Hunt group When you first set up a Hunt group, you need to identify how a call will be handled among the group. Click the keys beside Services, Telephony Services, and Hunt groups. Click on a Hunt group (Hunt group 1-30). The Hung group ## screen appears in the right frame.
Page 580
Identifying a Hunt group Table 132 Hunt group settings (Continued) Field Values Description Mode (continued) Refer to “Hunt group modes” Linear—rings the first telephone in the hunt group list. If that on page 581 telephone is busy, the system continues down the hunt group priority list until a non-busy telephone takes the call.
Identifying a Hunt group Table 132 Hunt group settings (Continued) Field Values Description Name <an alpha-numeric string Provides a unique name for the Hunt Group. The default is HGxx, naming the Hunt Group> where xx is the Hunt Group number 01-30. Aux ringer Y or N Defines whether an auxiliary ringer (if installed) rings for incoming...
Identifying a Hunt group Figure 201 Linear call mode " " Call A " " Incoming Call B answered Call A call answered Call B (This telephone was busy when Call A came in, but was free when call B came in) Figure 202 Rotary call mode Answers call B Call A...
Hunt group members Hunt group members After you determine the hunt group, you then assign members to the group. This section includes information about: • “Adding a Hunt group member” on page 583 • “Moving members” on page 585 The following limitations apply to adding member DNs to a Hunt Group: •...
Hunt group members Figure 203 Hunt group XX screen Choose the Appearance type to define how the call appears on the set. Table 133 Hunt group member settings Field Values Description (read-only) The DN of the telephone designated as this member of the hunt group. Appearance type Appr&Ring Appr&Ring (default): The call number appears on the display and the...
Hunt group members Moving members Member order within a Hunt group is important. The member order determines how a call routes through a Hunt group when the group is set to either linear or rotary mode. To move a member within a Hunt group: Click on the keys beside Services, Telephony Services Hunt groups.
Programming Hunt group lines DN 225 moved to Member 001 Programming Hunt group lines Multiple lines can be assigned to Hunt groups. However, a line can only exist in one Hunt group. When you assign lines to Hunt groups, you must ensure that there is no interruptions to the call before the Hunt group DN handles the call.
Programming Hunt group lines Assigning a line to a hunt group Assign the lines that you want calls to come in on: Click on the keys beside Services, Telephony Services Hunt groups. , and Click the key beside the Hunt group (Hunt group 1-30). Click Line Assignment.
Feature operation within Hunt groups Feature operation within Hunt groups The operation of some features varies if the Business Communications Manager telephone is part of a Hunt group. The following table shows the affected features. Table 134 Hunt group feature operation Feature Description Call Forward All Calls...
Monitoring Hunt groups Monitoring Hunt groups The Business Communications Manager system offers two ways to monitor hunt group activity. You can use Silent Monitor (“Setting up Silent Monitoring” on page 589) to actively monitor current calls or you can use the Hunt Metrics tables (“Using Hunt group metrics”...
Monitoring Hunt groups Security Note: Change the password regularly. Using Silent Monitor You can set up a number of two-line telephones on your system to use as supervisory telephones to monitor active hunt group calls from external numbers. Only telephones that have been designated as monitoring devices have access to the FEATURE *550 code, which activates the monitoring session.
Monitoring Hunt groups Using Hunt group metrics The Hunt Group Metrics tables are located under Diagnostics, Service Metrics in the Unified Manager. Each Hunt group has a separate listing of group data that gives you a quick overview of activity and potential trouble spots. To access these screens: Click on the keys beside Diagnostics, Service Metrics, and Hunt Group Metrics.
Chapter 24 Configuring Hospitality Services This section describes the Hospitality headings. These records allow facilities such as hotels, motels, and hospitals to control telephone access to external lines, to provide alarm clock services on internal telephones, and to monitor room serviced status. Tasks: •...
About the Hospitality feature About the Hospitality feature In a temporary room occupancy setting, such as hotels or hospitals, guests gain improved services through immediate access to basic functions like: • wake-up services or reminders via alarms on the room telephones •...
Setting up Hospitality services Power failures If the Business Communications Manager system experiences a power failure, the failure can result in lost Alarm times. When the Business Communications Manager system resumes running, and the system time resets, the missed Alarm times alert. Setting up Hospitality services The Hospitality heading allows you to enter the time when occupied rooms change state from Service done to Service required.
Identifying room telephones Identifying room telephones The Set/room settings allow you to assign one or more telephones to a room. This menu also enables access control to hospitality administrative features. Under the Hospitality heading, click on the key beside Set/room settings. Click on the key beside Active sets if you are configuring a telephone that has already been set up.
Identifying Call Permissions Identifying Call Permissions The Call Permissions heading allows you to define dialing filters for room telephones based on the room occupancy status. The dialing filters are standard Business Communications Manager Restriction filters (Filters 00-99). For more information, refer to “Defining restriction filters”...
Programming Alarm data Programming Alarm data The Alarm data heading allows you to program how the system provides alarms to the room telephones. It also allows you to define how to be notified when an alarm expires (“Configuring for expired alarms”...
Programming Alarm data Configuring for expired alarms The Expired alarms setting allows you to program the system to notify a specific telephone whenever a Hospitality alarm expires. This occurs when the maximum number of alarm attempts has occurred and the alarm is cancelled without the user responding. You can also choose to allow a caller to hear a tone when an alarm expires.
Using the Hospitality Services Admin telephone Using the Hospitality Services Admin telephone The front desk personnel can control alarms and from a two-line display administration telephone. The following procedures are available to the users on the Hospitality User Card. The following sections describe these processes: •...
Using the Hospitality Services Admin telephone Setting the state of a room at a telephone To access the Room Occupancy feature and assign the state of a room set: Press FEATURE 879 on a two-line display telephone. If configured, the display shows Password: Enter the Desk admin password.
Using the Hospitality services room telephone Using the Hospitality services room telephone The room telephones can be used by cleaning staff and guests to set alarms and room states. This section describes these codes and the process for using them. •...
Using the Hospitality services room telephone To program the Alarm time feature on an analog telephone: Press FEATURE 875. A tone sounds. Enter a four-digit alarm time. When using the 24-hour clock format (hour: 00 to 23 and minutes: 00 to 59), a tone sounds. When using the 12-hour format, press * to select am, or # to select pm.
Using the Hospitality services room telephone Setting the Room condition The Room condition (RC) feature allows users to exchange information about the serviced state of a room. Cleaning or maintenance personnel access the system database from a room telephone to: •...
Chapter 25 Configuring the music source The Music on Hold and Background Music features provide music to users. For these features to function properly, a music source must be connected to the Business Communications Manager. There are three ways you can connect the music source to the Business Communications Manager: •...
Selecting the music source Selecting the music source After you have connected the music source, you must select the music source you want to use. On the navigation tree, click the Services key and click the IP Music heading. The Summary screen appears. Configure the IP Music Summary parameters according to the following.
Configuring BcmAmp Configuring BcmAmp BcmAmp is an audio player that resides on the Business Communications Manager. If you choose to use BcmAmp, you must configure the play list, which is the music available to BcmAmp. Configuring the play list involves: •...
Configuring BcmAmp If you want to assign a name to this sound file, enter the name in the As box. This name appears on the File List to help identify the sound file. Click the Go link. The file is added to the File List. Repeat steps 3 to 7 for each sound file you want to add to Business Communications Manager.
Configuring BcmAmp Adding music to the Play List The play list is an ordered list of songs that are heard by users of the Background Music and Music On Hold features. To add a sound file to the Play List: Start the BcmAmp Administration application.
Configuring BcmAmp Using the BcmAmp Player The BcmAmp Player is a web based interface that allows you to select, play, stop, or pause sound files that appear on the Play List. To access the BcmAmp Player: Start the BcmAmp Administration application. Click the BcmAmp Player link.
Configuring a Network Device to be the IP Music Source To play a sound file, click the Play button. To stop a sound file, click the Stop button. To pause a sound file, click the Pause button. Configuring a Network Device to be the IP Music Source To configure a Network Device to be the IP Music source: On the navigation tree, click the Services key and click the IP Music heading.
Page 612
Configuring a Network Device to be the IP Music Source Press the Tab key to save your changes. Note: If you make any changes on the Network Device or Advanced Network screens, you must disable and then re-enable the IP Music service for the change to be recognized by Business Communications Manager.
Chapter 26 Configuring the MSC resources This section describes how to set up the resources controlled by the Media Services Card (MSC), which is the control center for voice and data traffic in the Business Communications Manager. Warning: Only system administrators should have access to these Unified Manager records.
Types of MSC resources Signaling channels Signaling channels are the communication channels used to send control signals to and from the MSC. You must have one signaling channel for each device you have connected and feature port you have enabled. The number of signaling channels you have determines how many devices you can have connected and feature ports you can have enabled on your system.
Rules for managing the MSC resources Rules for managing the MSC resources The following rules are provided to assist you in configuring your MSC resources. • “Signaling channel rules” on page 615 • “Media channel rules” on page 615 • “DSP resources rules”...
Rules for managing the MSC resources • Voicemail and call center use one media channel for each active session. • A call between an IP telephone and a digital or analog telephone or a PSTN line uses a media channel for the duration of the call. •...
Rules for managing the MSC resources DSP resources rules The number of DSP resources you have depends of the number of type of MS-PEC you have installed. For information about how to determine the MS-PECs you have, refer to “Viewing the MS-PEC configuration”...
Determining the MSC resources you require Media gateways One media gateway is required for each call: • from an IP telephone to an analog or digital telephone • from an IP telephone using a PSTN line • from an analog or digital telephone using an IP trunk Determining the MSC resources you require The following 20 questions are designed to help determine how many MSC resources you require.
Determining the MSC resources you require DECT mobility (legacy system) How many DECT media bay modules are installed? The range is 0 to 1 media bay modules. For each DECT media bay module: • add 1 to the media channel count Note: If your system also has Dial-on-Demand WAN, DECT uses one of the 27 WAN media channels, so an additional channel is not required.
Determining the MSC resources you require IVR and IVR Fax What is the maximum number of IVR ports required? IVR ports are used for interactive voice response applications. The range is 0 to 24 ports. For each voicemail port: • add 1 to the signaling channel count •...
Determining the MSC resources you require 12 How many IP telephones specified in question 10 will be using the G.711 codec? The range is 0 to the maximum number of IP telephones selected in question 11. For each IP telephone: •...
Page 622
Determining the MSC resources you require 18 How many IP trunks specified in question 15 will be using the G.729 codec? The range is 0 to the maximum number of IP trunks selected in question 16. For each IP trunk: •...
Determining the MSC resources you require Record of required MSC resources Use the following table to record the MSC resources you require for your Business Communications Manager system. To determine the resources that you require, answer the questions in “Determining the MSC resources you require” on page 618.
Determining the MSC resources you require Evaluation After you have answered the questions and calculated the four totals, use the following rules to determine the required Business Communications Manager configuration. Table 146 Evaluation of required Business Communications Manager configuration Resource Number required Required configuration 58 or less 2/6 DS30 split...
Determining the MSC resources you require Example of a Business Communications Manager configuration The following two tables provide examples of required configurations. Table 147 Example of required configuration Signaling Media Voice bus DSP resource Answer Question channels channels paths units 512 kbit/s (8) 1.
Configuring the MSC resources Configuring the MSC resources After you have determined what MSC resource you need, you can start configuring your MSC resources. This includes: • “Viewing the MSC information” on page 626 • “Viewing the MS-PEC configuration” on page 627 •...
Out of Service: Indicates there is a hardware failure on the MS-PEC. Replace the MS-PEC with a Business Communications Manager compatible MS-PEC. • Unsupported: Indicates that the MS-PEC installed is for a different Nortel Networks product and is not compatible with Business Communications Manager. Replace the MS-PEC with a Business Communications Manager compatible MS-PEC.
Configuring the MSC resources Understanding the MSC Minimum and Maximum values The MSC Configuration allows you to determine how the resources are assigned on your Business Communications Manager. In some Business Communications Manager systems, the total number of features and devices that require resources exceeds the number of resources that are available.
Configuring the MSC resources Viewing the MSC Configuration To view the MSC Configuration: On the navigation tree, click the Resources key and click the Media Services Card key. Click the MSC Configuration heading. The Configurations screen appears. Click the Current tab. The Current screen appears.
Trunks you can use on your system. Media Gateways Media Gateways provide the connection between IP telephony devices (IP trunks, Nortel IP telephones, and H.323 terminals) and normal telephony devices (PSTN lines; 7316E, 7316, 7208s, 7100, 7000 digital phones; analog telephones etc.).
Configuring the MSC resources Table 153 MSC custom configuration parameters (Continued) Component Description Voice Mail and Voice Mail and Call Center Ports are communication channels that connect users to the CallPilot ACD Ports Voicemail and Call Center Software. DSP resources are required only when a user connects to voicemail or call center. This includes callers hearing greetings, callers leaving messages, and users accessing their mailboxes.
You can increase the License limit of a component by entering keycodes. For information about how to obtain a keycode, contact your Nortel Networks sales representative. Hardware Limit Shows the maximum number of resources that are allowed for this component based on the hardware installed in this system.
Changing the DS30 Split Changing the DS30 Split A DS30 bus is a group of 32 signaling channel and 32 media channels. The DS30 split determines how these channels are assigned on Business Communications Manager. You have a choice of a 2/6 or a 3/5 split. If you choose a 2/6 split, two DS30 buses are assigned to the MSC and six are assigned to the Media Bay Modules.
Configuring Double Density To change the DS30 split setting: On the navigation tree, click the Diagnostics key. Click on MSC. On the top menu, click Configuration, and select DS30 split from the list. A dialog box appears. The DS30 Split field displays the current setting for your system. If you want to change the setting, choose the other option from the list.
Configuring Double Density On the screen, click the arrow beside the Double Density Mode field and select Full Double Density. Figure 215 Double Density Mode choices Click OK to update your system to Full Double Density. Programming Operations Guide...
Page 636
Configuring Double Density N0008589 3.3...
Chapter 27 Using a wizard to change data parameters This section provides information about viewing and changing Business Communications Manager LAN, WAN, and dialup networking resources settings. • “Viewing Business Communications Manager resources” on page 637 • “Using the Network Update Wizard” on page 638 The following figure shows the programming map for Business Communications Manager networking resources.
Using the Network Update Wizard Using the Network Update Wizard When your system is first installed, the data resources are set up when the Quick Start Wizard is run. Refer to “Using the Quick Start Wizard” on page 108. If you need to change any of your system name, LAN, WAN, or dialup settings after your system has been configured, you can use the Network Update Wizard.
Using the Network Update Wizard What you need to know Use the following chart to gather the information you need to make the data resource changes that you require. Not all of these fields will appear if your system does not support the specified hardware.
Page 640
Using the Network Update Wizard N0008589 3.3...
Chapter 28 Configuring DHCP Business Communications Manager provides DHCP (Dynamic Host Configuration Protocol) service to branch office clients. DHCP allows a network administrator to supervise and distribute IP addresses from a central location. This service dynamically assigns IP addresses to branch office computers or IP telephones, so you do not need to manually assign an IP address.
Configuring the DHCP Mode If you must modify the DHCP default configuration on Business Communications Manager, make sure configuration settings are consistent throughout the network and take the following into consideration: • If a change in the DHCP configuration resulted in a change in the IP addresses of a scope, perform one of the following actions to ensure good system operation: —...
Configuring a DHCP Server Configuring a DHCP Server If you chose DHCPServer as the DHCP mode, configure the DHCP Server settings in the Global Options and Summary screen. On the navigation tree, click the Services key and click the DHCP heading. The Summary screen appears.
The default value is: Nortel-i2004-A,10.10.10.1:7000,1,1;10.10.10.1:7000,1,1. where: Information • Nortel-i2004-A — is the identification name for the IP telephone • 10.10.10.1 — is the IP address for the primary Terminal Proxy Server (TPS). This is normally the Published IP address of the Business Communications Manager.
If you do not want DHCP to automatically assign VLAN IDs to the IP telephones, enter VLAN-A:none. in this text box. Note1: The NORTEL IP Terminal VLAN Id string must be terminated with a period (.). Note2: If you do not know the VLAN ID, contact your network administrator.
LAN settings for DHCP Server LAN settings for DHCP Server This section describes configuring the DHCP server, as well as: • “Configuring Address ranges for a Local Scope” on page 648 • “Configuring Excluded addresses for a Local Scope” on page 649 •...
LAN settings for DHCP Server Configure the scope-specific settings according to the following table. Table 159 LAN Scope Specific Options Attribute Description Name Allows you to specify the name of the LAN scope. Description Allows you to specify a description for the LAN scope. DNS Server Allows you to specify the IP addresses of the primary DNS server and the secondary DNS server in a valid dot format.
LAN settings for DHCP Server Configuring Address ranges for a Local Scope Address ranges allow you to specify the valid IP addresses for the DHCP clients. Note: You must add at least one Address range to use DHCP server. Adding an address range On the navigation tree, click the Services key and click the DHCP key.
LAN settings for DHCP Server On the Configuration menu, click Modify Address Range. The Address Range dialog box appears. Modify the Address Range settings. Click the Save button. Deleting an address range On the navigation tree, click the Services key and click the DHCP key. Click the Local Scope key and click the LAN1 heading.
LAN settings for DHCP Server Configure the Excluded Address attributes according to the following table. Table 161 Excluded Addresses Attribute Description Range (E#) Allows you to specify the Range identifier. The range setting uniquely identifies an excluded range in the scope. The value for this setting must follow certain conventions.
LAN settings for DHCP Server Click an excluded address range in the Excluded Address Range table. On the Configuration menu, click Delete Excluded Address Range. A message prompts you to confirm the deletion. Click the Yes button. Configuring Reserved addresses for a Local Scope Reserved addresses allow you to assign IP addresses to specific DHCP clients.
LAN settings for DHCP Server Click the Local Scope key and click the LAN1 heading. The LAN Scope Specific Options screen appears. Click the Reserved Address tab. The Reserved Address screen appears. Click a reserved address in the Reserved Address table. On the Configuration menu, click Modify Reserved Address.
Page 653
LAN settings for DHCP Server Table 163 Reserved Addresses Lease Information (Continued) Setting Definition Client Description Shows the description that will help to identify the DHCP client this IP address is assigned to. Lease Expiration Shows the date when this IP address is no longer reserved for the DHCP client. Date Lease Expiration Shows the time when this IP address is no longer reserved for the DHCP client.
Remote Scope Remote Scope A remote scope is a remote network (not LAN1 or LAN2) that uses the DHCP Server to get IP addresses through a DHCP relay agent. This section describes: • “Adding a Remote Scope” on page 654 •...
Remote Scope Modifying Remote Scope settings On the navigation tree, click the Services key and click the DHCP key. Click the Remote Scope key. Click the remote scope you want to modify. The Scope Specific Options screen appears. Configure the remote scope-specific settings according to the following table. Table 165 Remote Scope specific settings Attribute Description...
Remote Scope Configure the Address Range attributes according to the following table. Table 166 Remote Scope Address Range attributes Attribute Description Range (R#) Allows you to specify the Range identifier. The range box uniquely identifies an Address range in the scope. The value for this setting must follow certain conventions.
Remote Scope On the Configuration menu, click Delete Address Range. A dialog box appears asking you to confirm the deletion. Click the Yes button. Note: When you delete or modify an IP Address range it removes any excluded addresses that are in the original address range value. Configuring Remote Scope excluded addresses Excluded addresses allow you to specify the IP addresses that are not available to DHCP clients.
Remote Scope Click the Save button. Modifying excluded address ranges: On the navigation tree, click the Services key and click the DHCP key. Click the Remote Scope key. Click the remote scope you want to modify. The Scope Specific Options screen appears. Click the Excluded Address tab.
Remote Scope Configuring Remote Scope Reserved Addresses Reserved addresses allow you to assign IP addresses to specific DHCP clients. Adding a reserved address On the navigation tree, click the Services key and click the DHCP key. Click the Remote Scope key. Click the remote scope you want to modify.
Remote Scope Deleting a reserved address On the navigation tree, click the Services key and click the DHCP key. Click the Remote Scope key. Click the remote scope you want to modify. The Scope Specific Options screen appears. Click the Reserved Address tab. The Reserved Address screen appears.
Remote Scope Deleting a Remote Scope On the navigation tree, click the Services key and click the DHCP key. Click the Remote Scope key. Click the remote scope you want to delete. The Remote Scope Specific Options screen appears. Click the Delete button. Or, right click the remote scope you want to delete and click Delete.
Configuring a DHCP Relay Agent Configuring a DHCP Relay Agent If you chose DHCPRelayAgent as the mode, configure the DHCP Relay Agent settings in the Global Options and Server List screens with the following process. On the navigation tree, click the Services key and click the DHCP heading. The DHCP Mode screen appears.
LAN settings for DHCP Relay Agent LAN settings for DHCP Relay Agent If you configured the DHCP mode as DHCPRelayAgent (refer to “Configuring the DHCP Mode” on page 642), then configure the LAN scope attributes as follows. If the mode is DHCPServer refer to “LAN settings for DHCP Server”...
• Scope options The DHCP data is stored on the Business Communications Manager in the directory D:\Data Files\Nortel Networks\Unified Manger. The file is named ScopeName.dat where ScopeName is the name of the DHCP scope. To export the DHCP data: On the navigation tree, click the Services key and click the DHCP key.
Importing and Exporting DHCP data Importing DHCP data When you import the DHCP data, the DHCP programming from a previous export replaces the current DHCP programming for the scope. To import the DHCP data: On the navigation tree, click the Services key and click the DHCP key. Click the Local Scope key to import data for a local scope.
Page 666
Importing and Exporting DHCP data N0008589 3.3...
Chapter 29 Configuring the LAN resources Business Communications Manager is equipped with an Ethernet/802.3 network interface card which supports the IEEE 802.3 Ethernet frame format. The Ethernet connection uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) to manage the access to the physical media.
Configuring LAN resources Configuring LAN resources The following section describes how to set up the LAN card on your Business Communications Manager. The information in this section includes: • “Setting LAN global parameters” on page 668 • “Configuring a LAN interface” on page 669 •...
Configuring LAN resources Note: The settings in the table above ensure data routing uses a maximum of 60 to 70 percent CPU cycles. If the LAN to WAN link speed is 10 mbps, selecting higher traffic smoothing parameters has no impact on packet forwarding, which the system still performs at a link speed of 10 mbps.
Page 670
The default Admin Status is Up. The routing table entries for unused network interfaces can cause routing issues. For this reason, Nortel Networks recommends you disable the Admin Status on any LAN interface that is not connected to the network.
Configuring LAN resources Note: Setting the LAN connection speed to 100 Mbit/s does not reduce performance. However, the CPU is more efficient if you limit your incoming traffic to 10 Mbit/s. To increase your CPU performance, set the connected external LAN hub or switch to 10 Mbit/s or to Auto Sense.
Configuring LAN resources Modifying an Additional IP Address On the navigation tree, click the Resources key and click the LAN key. Click the heading of the LAN resource you want to modify (for example, LAN1). The LAN Summary screen appears. Click the Additional IP Address tab.
Chapter 30 Configuring the WAN resources A WAN (wide area network) is a geographically dispersed data communication network. The term WAN distinguishes a broader data communication structure from a local area network (LAN). This section includes information about: • “Permanent WAN connection” on page 673 •...
Viewing WAN resources The available Data Link Control interface numbers are 0-1023. Of the 1023 PVCs, 16 are reserved. The maximum number of PVCs allowed is 1008. Point-to-Point-Protocol (PPP) Point-to-Point Protocol (PPP) is a full-duplex transmission protocol for communication between two computers using a serial interface.
Setting global WAN parameters Note: If you disconnect the WAN cable from the WAN card, the Status does not update immediately. It can take more than two minutes before the Status updates to show the new Status of the WAN card. Setting global WAN parameters If PPP is the link protocol for a WAN interface (WAN1 or WAN2), you can restrict access to the network using the PPP Password List.
Setting global WAN parameters Modifying an existing item on the PPP Password List On the navigation tree, click the Resources key and click the WAN heading. The Resources screen appears. Click the PPP Password List tab. The PPP Password List screen appears. Click the PPP Password you want to modify.
Configuring the WAN interfaces Configuring the WAN interfaces The following sections describe how to configure the WAN interfaces on the Business Communications Manager system. This section includes: • “Configuring WAN summary parameters” on page 677 • “Setting WAN Line Parameters” on page 679 •...
Page 678
The default Admin Status is Up. The routing table entries for unused network interfaces can cause routing issues. For this reason, Nortel Networks recommends you disable the Admin Status on any WAN interface that is not connected to the network.
Configuring the WAN interfaces Setting WAN Line Parameters The WAN Line Parameters screen is displayed when configuring a T1 port (North America only). Business Communications Manager supports T1 and fractional T1. Refer to the Port box on the WAN Summary Parameters screen to see which type of port your are configuring. Note: The WAN Line Parameters screen is only available on the WAN1 interface.
Configuring the WAN interfaces Note: Always use the same frame type and line coding method as your service provider. Press the Tab key to save the settings. Setting WAN Sync Parameters The WAN Sync Parameters screen is only available on the WAN2 interface. On the navigation tree, click the Resources key and click the WAN Key.
Configuring the WAN interfaces Configure the WAN Frame Relay Parameters by referring to the following table. Table 179 WAN frame relay parameters Attribute Description LMI Type Select the type of local management protocol used on this link. The link management type must be the same as the one used by the frame relay service provider.
Configuring the WAN interfaces PVC Congestion Control If frame relay is your link protocol, you must configure PVC Congestion Control. If PPP is your link protocol, there are no PVC Congestion Control settings to configure. Adding PVC congestion control Follow these steps to add a PVC congestion control: On the navigation tree, click the Resources key and click the WAN Key.
Configuring the WAN interfaces Modifying PVC congestion controls Follow these steps to modify a PVC congestion control setting: On the navigation tree, click the Resources key and click the WAN Key. Click the WAN1 or WAN2 heading. The WAN Summary screen appears. Click the PVC Congestion Control tab.
Configuring the WAN interfaces Configure the WAN PPP Parameters according to the information in the following table. Table 181 WAN PPP parameters Attribute Description LCP Keep Alive Interval This parameter determines the how long the Business Communications Manager waits before determining that the WAN link is not functioning. When there is no regular traffic on the WAN link, the Business Communications Manager sends an echo packet out on the link.
In both of these examples, broadcast traffic destined for one IP address would not be transmitted on the links associated with the other IP address. Restrictions when using multiple IP addresses • Nortel Networks does not recommend using more than two IP address classes. • Multiple IP addresses supports RIP routing. •...
Configuring the WAN interfaces Configure the Additional IP Address parameters with the information in the following table. Table 182 Additional WAN IP addresses Attribute Description Range (A#) View the Additional IP Address identifier. The Range number uniquely identifies an Additional IP Address. The value for this setting must follow certain conventions.
Configuring the WAN interfaces Configuring the DLCI to IP Mapping When connected to a Frame Relay network, Business Communications Manager uses Frame Relay INARP (Inverse Address Resolution Protocol) messaging to request the next hop protocol address for a given DLCI. If the other end of the connection does not support INARP messaging, there can be a communication failure because the mapping of which DLCI to use to reach a particular IP address is not known.
Configuring the WAN interfaces Modifying DLCI to IP Mapping On the navigation tree, click the Resources key and click the WAN key. Click the WAN1 or WAN2 heading. The WAN Summary screen appears. Click the DLCI to IP Mapping tab. The DLCI to IP Mapping screen appears.
Chapter 31 Configuring the Dial Up resources Business Communications Manager allows you to create and use dial up connections for Remote Access Service (RAS) or dial-on-demand network access. RAS allows you to access Business Communications Managers remotely by making an IP connection using PPPoE, an ISDN BRI/PRI line, PPTP or the V.90 modem.
SNMP traps to the SNMP Manager, you must enable the V.90 modem interface. If you are not using the V.90 modem interface for WAN backup or SNMP traps, Nortel Networks recommends that you disable the modem to help prevent unauthorized access to the Business Communications Manager.
V.90 modem dial up To disable the V.90 modem interface: On the navigation tree, click the Resources key and click the Dial Up key. Click the V.90 heading. Click the Modem Status drop list and click Disabled. Press the TAB key to save the settings. Changing the Modem Region There are several internal modem settings that vary depending on the country in which the modem is operating.
V.90 modem dial up To configure the V.90 modem interface: On the navigation tree, click the Resources key and click the Dial Up key. Click the V.90 key to see available modem interfaces. Click the ModemBackup heading if you want to configure the interface used for the backup WAN connection.
Page 693
V.90 modem dial up Table 186 Modem link parameters (Continued) Attribute Description Connect Rate Lets you specify the initial speed (in bits per second) for the modem to connect. Set to the maximum permissible value for best results. Permitted values: 57600, 38400, 19200, 9600, 4800.
V.90 modem dial up 10 Configure the V.90 Modem Access Parameters according to the information in the following table. Table 187 V.90 modem access parameters Attribute Description Authentication Lets you select the authentication type for the link. The options are AllowClearText or EncryptedOnly.
ISDN dial up ISDN dial up Business Communications Manager supports ISDN dial up for dial-on-demand WAN access. You have the choice to use ISDN BRI/PRI as a persistent or dial-on-demand WAN connection or as a backup for your permanent WAN connection. Tips To use an ISDN dial-up connection, you must first configure your system for ISDN.
ISDN dial up In the Confirm Password box, type the password again. In the Channel list, select the channel the connection must use. Click Save to save your settings. The newly created ISDN interface appears under ISDN. Configuring an ISDN interface To configure an ISDN interface: On the navigation tree, click the Resources key and click the Dial Up key.
ISDN dial up Configure the ISDN Link Parameters according to the information in the following table. Table 189 ISDN link parameters Attribute Description Dial Retries Enter the number of times the systems attempts to connect before considering the connection non operational. The default value is 3.
ISDN dial up 10 Press the TAB key to save the settings. 11 Click the ISDN Dial-Out User tab. The ISDN Dial-out User screen appears. 12 On the Configuration menu, click Modify ISDN Dial-out User. 13 Configure the ISDN Dial-out User parameters using the information in the following table. Table 191 ISDN dial-out user parameters Attribute Description...
ISDN dial up Table 192 ISDN channel characteristics (Continued) Attribute Description Line Type Select either a 64K Digital or 56K Digital line. Business Communications Manager ISDN supports two types of Unrestricted Digital Information (UDI) bit streams: UDI, and UDI-56. With UDI, data is transmitted at 64kbps (64K Digital).
ISDN dial up Deleting an ISDN interface On the navigation tree, click the Resources key and click the Dial Up key. Click the ISDN key. Click the heading of the ISDN interface you want to delete. Click the Delete button. Or, right click the ISDN interface heading and click Delete. A confirmation dialog box appears.
You must purchase and install the PPPoE Software keycode before you can install PPPoE. For Keycode information about purchasing the PPPoE Software Keycode, contact your Nortel Networks representative. For information about how to install the PPPoE Software Keycode, refer to the Software Keycode Installation Guide that comes with your Software Keycode.
Point to Point Protocol on Ethernet (PPPoE) Installing PPPoE You must install PPPoE before you can add or configure a PPPoE interface. Note: To install PPPoE, the computer you are using to access the PPPoE Install Wizard must be connected to the LAN1 interface of Business Communications Manager. To install PPPoE: Launch your web browser.
Point to Point Protocol on Ethernet (PPPoE) Creating a PPPoE dial up interface On the navigation tree, click the Resources key, and click the Dial Up key. Click the PPPoE heading. Click the Add button. Or, right click the PPPoE heading and click Add. The Add PPPoE dialog box appears.
Point to Point Protocol on Ethernet (PPPoE) Configure the PPPoE Link Parameters according to the information in the following table. Table 195 PPPoE link parameters Attribute Description Dial Retries Enter the number of times the system attempts to connect before considering the connection non operational.
Point to Point Protocol on Ethernet (PPPoE) 10 Press the TAB key to save the settings. 11 Click the PPPoE Dial-Out User tab. The PPPoE Dial-out User screen appears. 12 Click the PPPoE Dial-out User you want to modify. 13 On the Configuration menu, click Modify PPPoE Dial-out User. 14 Configure the PPPoE Dial-out User parameters according to the information in the following table.
Communications Manager does not answer an incoming call from a router on the V.90 interface. • If you are using the remote dial-in for maintenance, Nortel Networks recommends that you use the Preinstall Client Access Home Page to access Business Communications Manager. N0008589 3.3...
Chapter 32 Configuring DNS Business Communications Manager functions as both a gateway to the Internet and as a DNS proxy. Note: If your PC is a DHCP client under Business Communications Manager, you do not have to let your workstations know that Business Communications Manager is your Internet gateway.
Using the Business Communications Manager DNS service Consider the following guidelines when using DNS: • If you enable the Business Communications Manager DNS service, ensure that you configure each workstation on the network to use Business Communications Manager as DNS server. •...
Chapter 33 Configuring IP Routing The IP Routing service setting allows you to select, add or delete routing protocol on specific interfaces, choose routing protocol options, and add or delete static routes. Note: If you change the IP address or subnet mask of any interface (LAN or WAN), you must reboot Business Communications Manager before you configure IP routing.
Open Shortest Path First (OSPF) Open Shortest Path First protocol bases its path descriptions on “link states” that take into account additional network information. OSPF also lets the user assign cost metrics to a given host router so that some paths are given preference. OSPF supports a variable network subnet mask so that a network can be subdivided into areas.
Configuring IP Routing global settings Configuring IP Routing global settings This section describes how to configure global settings for the IP Routing. It also includes information about: • “Setting the RIP Global Settings” on page 711 • “Setting the OSPF Global Settings” on page 712 To configure global settings for IP Routing: On the navigation tree, click the Services key and click the IP Routing heading.
Configuring IP Routing global settings Press the TAB key to save your settings. Setting the OSPF Global Settings If OSPF is the routing protocol of your choice, configure the OSPF Global Settings as described below. Click the OSPF Global Settings tab. The OSPF Global Settings screen appears.
Configuring IP routing on an interface Configuring IP routing on an interface After you configured the IP Routing global settings, you must configure each available network interface to use the routing protocol of your choice or static routes. Note: You must use the same routing protocol on all interfaces. For example, you can not configure your LAN1 interface to use RIP and your WAN1 interface to use OSPF.
Configuring IP routing on an interface Configure the RIP Parameters according to the following table. Table 204 IP RIP Parameters Attribute Description Metric Allows you to assign a cumulative value (in terms of hop count or associated cost [if applicable]) to routes passing through this interface.
Configuring IP routing on an interface Table 204 IP RIP Parameters (Continued) Attribute Description Route Tag Allows you to create a special tag which identifies routes announced over the interface. The route tag helps identify route packets when debugging routing problems using a network sniffer. Poisoned Allows you to enable or disable options designed to avoid routing problems such as loops or Reverse...
Configuring IP routing on an interface Disabling the RIP Subnet summary On the navigation tree, click the Services key and click the IP Routing key. The available interfaces for IP routing are listed under the IP Routing heading. Click the interface you want to configure. The Summary window appears.
Configuring IP routing on an interface Configure the OSPF parameters according to the following table. Table 205 IP OSPF Parameters Attribute Description Metric This field allows you to assign the link cost for this interface that advertised in the router’s link state advertisement for this interface.
Configuring IP routing on an interface OSPF NBMA Neighbors Frame Relay on Business Communications Manager is a Non Broadcast Multiple Access (NBMA) network. NBMA is a network that can connect two or more routers, but has no hardware broadcast capability. For OSPF function properly on a NBMA network, you must configure OSPF to unicast to the IP addresses of the routers on the network.
Configuring IP routing on an interface Deleting OSPF NBMA Neighbors Click the OSPF NBMA Neighbor you want to delete. On the Configuration menu, click Delete OSPF Neighbor. A confirmation dialog box appears. Click the Yes button. Static routes You can add static routes to the Business Communications Manager routing table. Static routes added to the routing table take precedence over dynamic routes.
Configuring IP routing on an interface Modifying the static route configuration Click a static route you want to modify in the Static Route table. On the Configuration menu, click Modify Static Route. The Static Route dialog box appears. Modify the static route attributes. Click the Save button.
Restarting the router Restarting the router When you make OSPF changes to the router, you need to restart the Routing and Remote Access Service for the changes to take place. Warning: This procedure will affect any service that requires access across the LAN or WAN, including IP telephone service.
Chapter 34 Configuring Web Cache When you use Business Communications Manager as a web proxy, Business Communications Manager can store, or cache, information downloaded from the Internet. A proxy is a server that acts on behalf of another. Web caching allows LAN workstations to share common information downloaded from the Internet.
Guidelines for using Web caching/Proxy Consider the following guidelines when using web caching/proxy: • You cannot use the web server installed on Business Communications Manager as a general purpose HTTP server. It is only used by the Business Communications Manager web-based management client and Web Cache services.
Important Web Cache considerations Table 208 Web Cache attributes (Continued) Attribute Description Cache Maximum Allows you to specify the maximum life, in hours, on the proxy server for cached HTTP pages. Life Values are 1 to 24. The default value is 24 hours. Maximum Server Allows you to specify the number of threads ready to serve HTTP requests in the proxy server.
Page 726
Important Web Cache considerations N0008589 3.3...
Chapter 35 Configuring QoS monitor The IP telephony Quality-of-Service (QoS) Monitor periodically monitors the delay and packet-loss of IP networks between two peer gateways. The Business Communications Manager QoS Monitor uses the same method as the Meridian 1 IPT. These monitoring packets are delivered at UDP port 5000.
Page 728
QoS Monitor patch to upgrade QoS Monitor on those systems. If you do not upgrade QoS Monitor on these earlier Business Communications Manager systems, IP telephony calls to those systems will not operate correctly. To obtain the QoS Monitor patch, contact your Nortel Networks support personal. N0008589 3.3...
Setting the QoS monitor Setting the QoS monitor On the navigation tree, click the Services key and click the QoS Monitor heading. The QoS Monitor Summary screen appears. Configure the QoS Monitor Summary attributes according to the following table. Table 209 QoS Monitor Summary attributes Attribute Description Description...
Viewing the QoS Monitor Mean Opinion Score Table 210 Mean Opinion Score descriptions Attribute Description Name Displays the name of the Remote Gateway. Destination IP Displays the IP address of the Remote Gateway. QoS Monitor Displays the status of QoS Monitor for this Remote Gateway. If Enabled is displayed, QoS Monitor is currently collecting QoS information for this Remote Gateway.
Viewing the QoS Monitor Mean Opinion Score Table 210 Mean Opinion Score descriptions Attribute Description G.729 Trans Displays the current MOS value calculated when using a G.729 codec to transmit VoIP packets to this Remote Gateway. The MOS can be a value from 0.00 to 5.00, where 0.00 is the worst score (Poor) and 5.00 is best score (Excellent).
Chapter 36 Configuring Net Link Manager Net Link Manager is a Business Communications Manager service that provides constant primary link status monitoring. Net Link Manager is also where you select your WAN primary and backup interfaces. This section contains information about enabling/disabling Net Link Manager, as well as how to select WAN links: •...
Selecting a permanent WAN link as the primary WAN connection Enabling or Disabling Net Link Manager On the navigation tree, click the Services key and click the Net Link Mgr heading. The Net Link Manager Summary screen appears. Configure the Net Link Manager attributes according to the following table. Table 212 Net Link Manager attributes Attribute Description...
Page 735
Selecting a permanent WAN link as the primary WAN connection Table 213 Permanent WAN Connections settings (Continued) Attribute Description Down Poll Allows you to set the polling interval on the Primary WAN Link, in seconds, when the primary Interval WAN link is down, and the backup (dial-up) WAN link is operational. A short interval provides faster recovery.
Selecting a dial-up link as the primary WAN connection Selecting a dial-up link as the primary WAN connection The dial-up WAN connection supports PPP only. Business Communications Manager supports ISDN dial-up PPPoE dial-up WAN connections. Setting a dial-up connection as the primary WAN connection means that the Business Communications Manager default route is to the dial-up connection.
Chapter 37 Configuring NAT (Network Address Translation) Business Communications Manager provides security and firewall features to protect your private data resources from outsiders. This section includes information about the different types of NAT, as well as: • “Enabling and disabling NAT” on page 738 •...
Enabling and disabling NAT NAT and IP Firewall filters When you use NAT and IP Firewall filters, there are two interactions you need to be aware of. • On inbound traffic, the NAT rules are applied before the IP Firewall Filter rules. •...
Configuring an Interface with NAT Configuring an Interface with NAT This section describes how to configure an interface with NAT. It also includes information about: • “Adding Default rules” on page 739 • “Adding a Rule to an interface” on page 740 •...
Configuring an Interface with NAT Note: Before you can specify the Rule Order you must first add the Rules. Press the Tab key to save the settings. Adding a Rule to an interface The maximum number of Rules you can add is 32. Click the Rule Setting tab.
Configuring an Interface with NAT Table 215 NAT Rule Settings (Continued) Attribute Description Public IP Type Allows you to specify if the IP type is Fixed or Dynamic. Use Dynamic when the IP is assigned by an outside source. For example, your Internet Service Provider (ISP) assigns your IP address.
Configuring an Interface with NAT Configuring NAT to change the source IP address used for WAN traffic Normally, when traffic originates from the Business Communications Manager, the source IP address of the data packets is the IP address of interface that is on the edge. For example, if the traffic is sent out of the WAN1 interface, the source IP address of the data packets is the IP address of WAN1.
Configuring an Interface with NAT Examples of common NAT configurations Example 1: Using a static Public IP address A Business Communications Manager has two LANs and a WAN. The WAN connects to the outside and has one public IP address. The LANs are part of a private network. The system maps all outgoing traffic.
Configuring an Interface with NAT Example 2: Using dynamic Public IP address A Business Communications Manager has two LANs and a WAN. The WAN connects to an Internet Service Provider that assigns the IP address. The LANs are part of a private network. The system maps all outgoing traffic.
Configuring an Interface with NAT Example 3: Changing the source IP address of WAN traffic A Business Communications Manager has a WAN and two LANs. The WAN1 interface connects to the outside and has an IP address of 192.168.12.90. The Business Communications Manager also has an ISDN WAN backup interface that gets it IP address dynamically.
Page 746
Configuring an Interface with NAT Rule name Direction Protocol TCP/UDP Private IP Type Fixed Private IP 192.168.12.90 Private Range Mask 255.255.255.255 Private Port Range Public IP Type Fixed Public IP 10.255.5.86 Public Rang Mask 255.255.255.255 Public Port Range The three rules required for the ISDN interface are: Rule name Direction Protocol...
Page 747
Configuring an Interface with NAT Rule name Direction Protocol TCP/UDP Private IP Type Fixed Private IP 192.168.12.90 Private Range Mask 255.255.255.255 Private Port Range Public IP Type Dynamic Public IP <leave blank> Public Rang Mask <leave blank> Public Port Range Programming Operations Guide...
Page 748
Configuring an Interface with NAT N0008589 3.3...
Chapter 38 Configuring NTP Client Network Time Protocol (NTP) is an IP protocol that allows you to synchronize the time on your network devices. The NTP Client allows you to synchronize the time on your Business Communications Manager system with the NTP Server on your network. This ensures that your Business Communications Manager is using the same time as the other Business Communications Manager systems and servers on your network.
Configuring the NTP Client settings Configuring the NTP Client settings Configure the NTP client settings: On the navigation tree, click the Services key and click the NTP Client Settings heading. The NTP Client Settings screen appears. Configure the NTP Client settings according to the following table. Table 216 NTP Client settings Attribute Description...
Starting the NTP Client Service Starting the NTP Client Service If you set the NTPClient Service Start Type option to Automatic, the NTP Client service starts automatically and will automatically start whenever Business Communications Manager is started up or rebooted. If you set the NTPClient Service Start Type option to Manual, you must start the NTP Client Service the first time you configure the NTP Client settings.
Manually updating the Business Communications Manager time Manually updating the Business Communications Manager time You can force the NTP Client to update the Business Communications Manager time by manually updating the time. To manually update the time: On the navigation tree, click the Services key and click the NTP Client Settings heading. The NTP Client Settings screen appears.
Chapter 39 Virtual Private Networks (VPN) Business Communications Manager uses the Internet and tunneling protocols to create secure extranets. These secure extranets require a protocol for safe transport from the Business Communications Manager to another device through the Public Data Network (PDN). Business Communications Manager uses the PPTP (“PPTP”...
Manager using PPTP or IPSec. PPTP PPTP is a tunneling protocol supported by Nortel Networks, Microsoft, and other vendors. The PPTP client is available for Windows 95 (www.microsoft.com) and is built-in to Windows 98 and later. Third-party vendors have developed PPTP clients for Windows 3.1 and the Macintosh operating system.
PPTP PPTP offers the following features: • Support for multiple authentication schemes: MS-CHAP, CHAP, or PAP. • Support for IP address translation via encapsulation. • Support for RC4 encryption. • Support for compression of data packets. Settings required for PPTP tunnels The data packets that pass through PPTP tunnels interact with other routing features in Business Communications Manager.
PPTP IP Addresses and DHCP Server Ensure that the IP addresses for the LAN interfaces, WAN interfaces, dial up links, and PPTP tunnels are unique across all sites. This simplifies configuration, eliminates conflicts due to NAT, and prevents the addresses assigned by the DHCP server from conflicting with the IP addresses of subnets in remote sites.
PPTP Table 218 PPTP Summary settings (Continued) Attribute Description Keep Alive Interval Allows you to specify the amount of time Business Communications Manager waits without any data traffic on the tunnel before it sends an Echo Request message. When the far end of the tunnel receives an Echo Request, the system at the far end must send an Echo Response message.
PPTP Click the Clients IP List tab. The Clients IP List screen appears. On the Configuration menu, click Add to Client IP List. The Client IP dialog box appears. Configure the PPTP Client attributes according to the following table. Table 219 PPTP Client attributes Attribute Description Client...
PPTP To add a PPTP tunnel: On the navigation tree, click the Services key and click the VPN key. Click the PPTP heading. The PPTP Summary screen appears. Click the Add menu. Or, right click the PPTP heading and click Add. The Add PPTP dialog box appears.
689. You can also use a static IP address, but this requires coordinating this address on both ends of the tunnel. Nortel Networks recommends that you use the RemoteAssigned option whenever possible. Description Allows you to enter a brief description of the PPTP tunnel.
PPTP Table 222 PPTP Tunnel Link parameters (Continued) Attribute Description Connect retries Allows you to specify the maximum number of times this tunnel attempts to connect to the primary PPTP server. If a connection is not made after the specified number of retries, this tunnel attempts to connect to the secondary PPTP server.
PPTP Table 223 PPTP Tunnel Authentication parameters (Continued) Attribute Description User ID Allows you to specify the User ID that this end of the tunnel sends to the far end of the tunnel for authentication during tunnel establishment. If you are using another Business Communications Manager on the far side of the tunnel, this User ID needs to match the tunnel name or interface name specified on the far side of the tunnel.
PPTP Table 224 PPTP Destination Networks attributes (Continued) Attribute Description Subnet Mask Allows you to specify the subnet mask for the destination network. You require Subnet Mask only if you have entered a value in the Destination Network box. Always use a valid subnet address and mask pair. If you are using a mask that contains more than 1 host address, then always specify the subnet number that corresponds to that subnet and not any other address.
PPTP Deleting a Destination Network Click the Destination Network to delete. On the Configuration menu, click Delete Destination Network. A message prompts you to confirm the deletion. Click the Yes button to confirm the deletion. Deleting a PPTP tunnel Note: Before you delete a PPTP tunnel, delete any destination networks assigned to the tunnel.
IPSec IPSec The IPsec tunneling protocol is supported by Nortel Networks and other third-party vendors. IPsec is an emerging standard that offers a strong level of encryption (DES and Triple DES), integrity protection (MD5 and SHA), and the IETF-recommended Internet Security Association & Key Management Protocol (ISAKMP) and Oakley Key Determination Protocols.
IPSec Encryption All of the following encryption methods ensure that the packets have come from the original source at the secure end of the tunnel. Note that some of the encryption types will not appear on some non-US models that are restricted by US Domestic export laws. The following table shows a comparison of the security provided by the available encryption and authentication methods.
IPSec Protocol The protocol can be ESP or AH. • Encapsulating Security Payload (ESP) provides data integrity, source authentication and confidentiality for IP datagrams by encrypting the payload data to be protected. ESP uses the Data Encryption Standard (DES) and Triple DES algorithms. •...
IPSec Both SHA1 and MD5 use Hashed Message Authentication Code (HMAC) to improve authentication. HMAC is a technique that uses a secret key and a message digest function to create a secret message authentication code. IPSec capacity restrictions The Business Communications Manager performs all IPSec processing using software. To prevent overloading the Business Communications Manager processor with IPSec traffic processing, the network traffic that requires IPSec processing should not exceed 6Mbps.
IPSec Networks would have two networks configured as 10.10.10.0 with a mask 255.255.255.0 and 10.10.11.0 with a mask 255.255.255.0 and the Remote Accessible Networks would be 12.12.12.0 with a mask of 255.255.255.0. All packets that do not match these rules will be NATed and sent out the interface and not through the tunnel.
IPSec You can create these rules automatically when creating or modifying Branch Office and Remote Tunnels by selecting Yes for the Create Firewall Rules for this tunnel on the Parameters page for a particular tunnel. The three firewall rules required by the Branch Office tunnels are then created.
IPSec In addition to the above rules, Remote User tunnels need extra rules. These are extra rules are for the QOTD (Quote of the Day) server, Password server and ICMP that the IPSec client issues. Table 229, Table 230 Table 231 show the rules required.
Page 772
IPSec Example Business Communications Manager 1 has been configured with a WAN1 address of 10.200.40.12 and a LAN 1 address of 10.10.10.1. Your computer at home has the address of 207.44.126.81. You have setup the Business Communications Manager to use the address range 10.10.10.100 - 10.10.10.200 with a mask of 255.255.255.0 for the IPSec Address Pool.
IPSec Protocol ICMP Source IP 207.44.126.81 Source mask 255.255.255.255 Destination IP 10.200.40.12 Destination mask 255.255.255.255 Protocol Source IP 10.10.10.0 Source Mask 255.255.255.0 Source Port Destination IP 10.10.10.0 Destination Mask 255.255.255.0 Destination Port For information about how to add or change Filters, refer to “Configuring IP Firewall Filters”...
IPSec Configure the IPSec global settings according to the following table. Table 233 IPSec Global settings Attribute Description Description Displays the name of the IPSec service. This is a read only attribute. Version Displays the version number of the IPSec service. This is a read only attribute.
IPSec Click the Add button. Or, right click the Branch Office Accounts heading and click Add. The Add Branch Office Accounts dialog box appears. Configure the Branch Office Tunnel Settings according to the following table. Table 234 IPSec Branch Office Tunnel settings Attribute Description Tunnel Number...
Page 776
Select No if you do not want Business Communications Manager to create Firewall rules for this tunnel. If you are using the Business Communications Manager Firewall, Nortel Networks recommends that you select Yes for this option. The default setting is No.
IPSec Adding Local Accessible Networks to the Branch Office IPSec tunnel The maximum number of Local Accessible Networks you can add is 16. On the navigation tree, click the Services key and click the VPN key. Click the IPSec key and click the Branch Office Accounts key. Click the tunnel you want to modify.
IPSec Configure the Remote Accessible Network parameters according to the following table. Table 236 IPSec Remote Accessible Network parameters Attribute Description Network Number Allows you to specify the Network identifier. (R#) The Network Number uniquely identifies a Remote Accessible Network. The value for this setting must follow certain conventions.
IPSec Modifying a Branch Office IPSec Tunnel On the navigation tree, click the Services key and click the VPN key. Click the IPSec key and click the Branch Office Accounts key. Click the tunnel you want to modify. The Tunnel Parameters screen appears. Change the required IPSec Tunnel settings.
IPSec Deleting a Branch Office IPSec tunnel On the navigation tree, click the Services key and click the VPN key. Click the IPSec key and click the Branch Office Accounts key. Click the tunnel you want to delete. Click the Delete button. Or, right click the tunnel you want to delete and click Delete.
IPSec Creating a tunnel between two Business Communications Managers The following is an example of a how to connect two Business Communications Manager systems together using an IPSec tunnel. In this example, the IPSec tunnel connects a Business Communications Manager with a LAN 2 IP address of 10.10.11.1 and another Business Communications Manager with a LAN 2 IP address of 10.10.11.2.
IPSec Creating a tunnel between a Business Communications Manager and a Contivity Extranet Switch v02_61 The following are an examples of a how to connect a Business Communications Manager to a Contivity Extranet Switch using an IPSec tunnel. In this example, the IPSec tunnel connects a Business Communications Manager with a LAN 2 IP address of 47.81.20.50 and a Contivity Extranet Switch with a Public IP address of 47.82.30.60.
IPSec The following example describes how to configure a Business Communications Manager with a Contivity Extranet Switch when NAT is required on the Business Communications Manager and external access is required on the same interface as the tunnel (split tunneling). Configuring the Business Communications Manager Using the same systems from the previous example, we will now enable NAT and turn on Default Rules on the Business Communications Manager.
IPSec IPSec Remote User configuration The IPSec Remote User feature allows remote users to dial in to an Internet Service Provider (ISP) anywhere in the world and connect to the corporate network in a secure way. All the remote user requires is an IPSec VPN client installed on their computer.
IPSec Figure 218 Example of a Split Tunneling environment 20.20.20.7 20.20.20.5 ISP Internet Address: 200.x.x.x VPN Client IP Address: 10.2.3.30/24 IPSec Tunnel Internet 300.x.x.x Business Communications Manager 10.2.3.1/24 10.2.3.2/24 In the example in the figure above, PC1 and PC2 are on a home IP network (20.20.20.0/ 255.255.255.0).
IPSec Split Tunneling security considerations Business Communications Manager takes precautions against violators potentially hacking tunneled information when the Business Communications Manager is operating in Split Tunnel mode. The primary precaution is to drop packets that do not have the IP address that is assigned to the tunnel connection as its source address.
IPSec Dynamic IP address from an IP Address Pool To assign a dynamic IP address, you must configure a Remote IP Address Pool and assign the Remote IP Address Pool to the Remote User Account. For information about how to configure a Remote IP Address Pool, refer to “Adding a Remote IP Address Pool”...
IPSec Configure the Remote IP Address Pool List settings according to the following table. Table 238 IPSec Remote IP Address Pool settings Attribute Description Pool Number Allows you to specify the Remote IP Address Pool List identifier. The Pool Number uniquely identifies a Remote IP Address Pool List. The value for this setting must follow certain conventions.
IPSec Adding Remote User Accounts On the navigation tree, click the Services key and click the VPN key. Click the IPSec key and click the Remote User Accounts heading. Click the Remote User Summary tab. The Remote User Summary screen appears. Click the Add button.
Page 790
IPSec Table 239 IPSec Remote User Account settings (Continued) Attribute Description PFS Enabled Allows you to enable Perfect Forward Secrecy (PFS). With PFS, keys are not derived from previous keys. This ensures that one key being compromised cannot result in the compromise of subsequent keys. You can choose Yes or No.
IPSec Configuring Remote User Accounts On the navigation tree, click the Services key and click the VPN key. Click the IPSec key and click the Remote User Accounts key. Click the Remote User Account you want to modify. The Remote User Settings screen appears. Change the required Remote User Account settings.
IPSec Adding a Split Tunnel Network On the navigation tree, click the Services key and click the VPN key. Click the IPSec key and click the Remote User Accounts key. Click the Remote User Account you want to modify. The Remote User Settings screen appears. Click the Split Tunnel Networks tab.
IPSec Deleting a Split Tunnel Network On the navigation tree, click the Services key and click the VPN key. Click the IPSec key and click the Remote User Accounts key. Click the Remote User Account you want to modify. The Remote User Settings screen appears. Click the Split Tunnel Networks tab.
Chapter 40 Policy-enabled networking This section discusses the Policy services you can configure to enhance your data network. Included is the following information: • “Policy configuration overview” on page 795 • “Implementing Quality of Service (QoS)” on page 801 • “Implementing Common Open Policy Services (COPS)”...
Policy configuration overview Business Communications Manager uses DiffServ to manage network traffic and resources. The information that is required to support DiffServ and multi-field classification is transferred using the Common Open Policy Services (COPS) protocol. COPS is a query and response protocol that exchanges policy information messages using the Transmission Control Protocol (TCP).
Policy configuration overview Figure 219 DiffServ bandwidth brokers and nodes DiffServ domain Interior Interior Node Node Boundary Link End-to-End QoS 9927EA DiffServ components The DiffServ architecture is comprised of the following components: • Traffic conditioners — These components include classifiers, DiffServ-byte markers, shapers, policiers and profilers.
Policy configuration overview IP service classes Business Communications Manager supports the following services classes: • Critical and Network classes have the highest priority over all other traffic. • Premium class is an end-to-end service functioning similarly to a virtual leased line. Traffic in this service class is guaranteed an agreed upon peak bandwidth.
Policy configuration overview These Required treatments (or service class behaviors) for these Service classes are implemented using nine queues and a scheduler for these queues. Queue 1 has the highest priority, referred to as Strict Priority. Queues 2 to 9 are scheduled according to a Weighted Fair Queuing (WFQ) scheme. The following table summarizes the mappings between service classes, queues and DSCP codes.
These edge devices police traffic flows by marking packets and applying forwarding behaviors to the packets at the network node. For further information about Optivity products, contact your Nortel Networks sales representative. Policy overview Use Unified Manager to configure policies and filters to control the behavior of network traffic.
Implementing Quality of Service (QoS) Implementing Quality of Service (QoS) The QoS application delivers a set of tools that, when optimally configured, combat escalating bandwidth costs and optimize application performance in your network. QoS tools allow you to prioritize your critical applications and sensitive traffic. You can tailor appropriate services to support this traffic over the wide area, thus maintaining the necessary performance levels on an end-to-end basis.
Implementing Quality of Service (QoS) Click the network adapter you want to modify. On the Configuration menu, click Modify Adapter Water Mark. The Advanced property sheet appears. Configure the Advanced parameters according to the following table. Table 245 QoS Advanced parameters Setting Definition Adapter Name...
Implementing Quality of Service (QoS) Table 246 QoS Interface Group Table parameters (Continued) Attribute Description Queue Set Id This is a read only attribute. Role Combination Select the interfaces that you want to include in this interface group. Capabilities This is a read only attribute. Click the Save button.
Implementing Quality of Service (QoS) Configuring Policy Rules Policy Rules are IP filters that are defined as part of a QoS Policy. You can create an IP filter, which enables Business Communications Manager to classify traffic. In turn, you can create an access control list from a series of defined filters to create an IP filter group.
Implementing Quality of Service (QoS) Table 247 QoS IP Filter parameters (Continued) Attribute Description DSCP Enter the DSCP value to match the inbound DSCP. You can enter any decimal value from 0 to 63. If you choose the default (-1), the DSCP value in the packet will be ignored. Protocol Select a protocol to match the filter.
Implementing Quality of Service (QoS) Deleting an IP filter configuration To delete an IP filter configuration: On the navigation tree, click the Services key and click the Policy Management key. Click the QoS key and click the Rules heading. Click the entry you want to delete. On the Configuration menu, click Delete IP Filter Entry.
Implementing Quality of Service (QoS) Modifying an IP filter group configuration To modify an IP filter group configuration: On the navigation tree, click the Services key and click the Policy Management key. Click the QoS key and click the Rules heading. Click the IP Filter Group Table tab.
Implementing Quality of Service (QoS) On the Configuration menu, click Add Entry. The Actions dialog box opens. Configure the Action parameters according to the following table. Refer to the table “Default Queue mapping for Business Communications Manager” on page for the mapping of DSCP codes, queues and service classes. Table 249 QoS Action parameters Attribute Description...
Enter the number used to determine the order of precedence for this policy. Nortel Networks recommends that you consider an order numbering strategy (for the values in the Order field) as you configure policies. The policies in the Policy Table are arranged in ascending order according to value in the Order column.
Implementing Quality of Service (QoS) Modifying a policy To modify a policy: On the navigation tree, click the Services key and click the Policy Management key. Click the QoS key and click the Policies key. Click the heading of the policy you want to modify. Click the policy you want to modify.
Implementing Common Open Policy Services (COPS) Implementing Common Open Policy Services (COPS) COPS in your networks allows Business Communications Manager to: • Gather all relevant Policy information from a policy server (COPS). • Make a decision based on your (as network administrator) set policies and network resources, •...
Page 812
Implementing Common Open Policy Services (COPS) Table 251 Status page items (Continued) Item Descriptions Client Type The protocol client type for this entry. Note: Multiple client types can be served by a single COPS server. Note: The value 0 (zero) indicates that this entry contains information about the underlying connection.
Page 813
Implementing Common Open Policy Services (COPS) Table 251 Status page items (Continued) Item Descriptions Open Failures The number of times that the COPS client failed to perform a COPS Client-Open to a COPS server for the selected client type. Note: This is a cumulative value and is not zeroed on new connections. Unsupported Client The total number of COPS packets that this client has received from COPS servers that Type...
Implementing Common Open Policy Services (COPS) Configuring a COPS Client To configure a COPS client, you enter the information the COPS Client needs to connect to a COPS Server. Adding a COPS Client Server entry On the navigation tree, click the Services key and click the Policy Management key. Click the COPS Client key and the Configuration heading.
Implementing Common Open Policy Services (COPS) Modifying the COPS Client Server Retry Data If Business Communications Manager cannot connect to the COPS Client Server on its first attempt, Business Communications Manager will wait and then try to connect again. On the COPS Client Server Retry Data screen, you can enter the number of times that Business Communications Manager attempts to connect again and time it waits between attempts.
Configuring the Policy Agent characteristics Configuring the Policy Agent characteristics You can configure the Policy Agent operational parameters. To configure a Policy Agent. On the navigation tree, click the Services key and click the Policy Management key. Click the Policy Agent tab. The Policy Agent screen appears.
Configuring the Policy Agent characteristics This screen displays read only information. This information is described in the following table. Table 256 Policy Class Support Attribute Description Policy Name Shows the name of the policy. Current Instances Shows the current class entries. Maximum Shows the maximum number of allowed class entries.
Page 818
Configuring the Policy Agent characteristics N0008589 3.3...
Chapter 41 Configuring IP Firewall Filters The Business Communications Manager IP Firewall Filters feature is one of the security features Business Communications Manager offers to protect your network against intruders. The security and firewall features are also used for controlling what outside resources your users will be able to access.
Viewing and changing the status of Firewall Filters Stateful Packet Filters Business Communications Manager supports stateful packet filtering for IP protocols. Stateful packet filters monitor active sessions and record session information such as IP addresses and port numbers. They maintain state information for each flow (TCP, UDP or ICMP). Stateful filters use the state information to determine if a packet is responding to an earlier request that has been validated by the rule set.
Configuring IP Firewall Filters for an interface Configuring IP Firewall Filters for an interface This section describes configuring IP Firewall Filters for a single interface. Follow the same instructions to configure the parameters for each of the other interfaces. This section also includes information about: •...
Note: You must still specify an H.323 rule to allow IP call voice traffic. This setting only allows the IP telephone to contact the system to register. Also, Registration must be turned on in the Services, IP Telephony, Nortel IP Telephone, General page, before the telephone can access the system to register.
Configuring IP Firewall Filters for an interface Adding an Input Filter for a Firewall Filter Interface Before you can specify a Rule Order, you must add Filter Rules. The maximum number of Input Filter Rules you can add is 32. Click the Input Filters’...
Page 824
Configuring IP Firewall Filters for an interface Table 259 Firewall Input Filter Rule settings (Continued) Attribute Description Destination IP Allows you to specify if the Destination IP Type is Fixed or Dynamic. Type Use Dynamic when the IP is assigned by an outside source. For example, your Internet Service Provider (ISP) assigns your IP address.
Configuring IP Firewall Filters for an interface Note: When you set filters, make sure you allow the flow of packets going to the RPC port (port 135 TCP or UDP), DCOM ports, and the Unified Manager port (port 443 TCP) for correct Unified Manager operation.
Configuring IP Firewall Filters for an interface Configuring the order of the input filters for an interface After you enter all of the input filters, you need to set the order in which the filters are used. The order of the input filter rules is very important. The more specific rules, such as rules for specific port numbers and addresses, should be placed first.
Configuring IP Firewall Filters for an interface Adding an Output Filter for a Firewall Filter Interface Before you can specify a rule order, you must add filters. The maximum number of output filter rules you can add is 32. Click the Output Filter Rules’ Setting tab. The Output Filter Rules’...
Configuring IP Firewall Filters for an interface Configuring the order of the Output Filters for an interface After you enter all of the Output filters, you need to set the order in which the filters are used. The order of the Output Filter Rules is very important. The more specific rules, such as rules for specific port numbers and addresses, should be placed first.
Accessing Unified Manager through the Firewall Accessing Unified Manager through the Firewall • Do not set any blocking input rules on the interface that you use to connect to Business Communications Manager using Unified Manager. This includes enabling the default rules. •...
Accessing Unified Manager through the Firewall Table 262 Input Rule Configuration for Unified Manager — port 443 (Continued) Destination Range Mask Appropriate mask (or blank if IP Type is Dynamic) Destination Port Range Note: The order of these three rules does not matter, as long as these rules come before more general rules.
Firewall rules for Business Communications Manager with Dialup interfaces Firewall rules for Business Communications Manager with Dialup interfaces For systems with dialup interfaces (ISDN, V.90), we recommend that you add Firewall filters to all interfaces except the dialup interface that blocks NetBIOS traffic. This prevents any NetBIOS packets from getting into the Business Communications Manager and bringing up the dialup interface link.
Page 832
Firewall rules for Business Communications Manager with Dialup interfaces N0008589 3.3...
Appendix A Defining region-based defaults This section describes some of the differences in the system defaults. These defaults are set based on the region or telephony or CallPilot template that you select in the Quick Start wizard when the system is first configured. Each region is designed using a set of system defaults that provide specific functionality for the geographical area in which the system is deployed.
Region-based system settings Core software and regions Each Region setting requires a specific core software to perform correctly. The following table shows the core software available. Table 264 Core software, defined by region and carrier profile Core Software (Carrier s/w ID) T1 CT2 Plus T1 Etiquette E1 Euro...
Region-based system settings Table 265 Languages (Continued) Region Language Sweden Swedish, Norwegian, Danish, NA English Switzerland German, Euro French, Italian, NA English The following table shows a breakdown of the language support for South American and Central American countries. Table 266 South/Central America language breakout Language Spanish English...
Region-based system settings Companding Law by region The following table shows the companding law used for each region. Legacy DECT systems: You must ensure that DECT systems that require mu-law have the correct region setup before you install the DECT system. Refer to the DECT documentation for details.
Region-based system settings Media bay module availability by region Some of the media bay modules are customized for a specific type of line and are not available to all regions. The following table lists a cross-reference between regions and the type of modules that can be used within the related area.
Region-based system settings FEM-trunk module combinations by region Trunk Modules may be connected to the Business Communications Manager system using the Fiber Expansion Module (FEM). The following table provides a cross-reference between regions and the Trunk Modules you can connect to the FEM. Table 270 Trunk availability, by region Analog Country- specific...
Region-based system settings PRI line protocol support, by region Table 271 PRI line protocol supported, by region Region BRI T side BRI S side Australia ISDN ETSI 300 403 ISDN ETSI 300 102 DASS2 DPNSS MCDN ISDN ETSI 300 403, ETSI QSIG 300 239, Brazil ISDN ETSI 300 403,...
Region-based system settings Supported ISDN line services The following table shows the ISDN private network services that are supported by the Business Communications Manager. Table 272 ISDN line services MCDN over PRI (SL-1) DPNSS DASS2 ETSI QSIG Basic Call Basic Call Basic Call Basic Call Name display...
Region-based system settings Defining time zones by country and language Time zones are based on the actual time zone where the Business Communications Manager server is located. The Time Zone dropdown list on the initialization screen, allows you to be very specific in choosing a compatible time zone. If your exact location is not on the list, choose the one with the time zone closest to you.
Page 842
Region-based system settings Table 275 Region defaults (Continued) Functionality Attribute North American Global United Kingdom Call Back Kill time 180 sec 180 sec 360 sec PCM Companding Law mu-law a-law EBI a-law EBI Race Integration disabled disabled disabled OLI digits fixed 10 digits fixed 10 digits variable length a...
Page 843
Region-based system settings Table 275 Region defaults (Continued) Functionality Attribute North American Global United Kingdom Handsfree none none none Pickup Group none none none Remind Delay 60 secs 60 secs 60 secs Allow SLR disabled disabled disabled Transfer Callback Show in second disabled disabled disabled...
Region-based system settings Dialing plan defaults Some profiles have default restriction dialing filters. The table below lists the filters for these profiles. Table 276 Default dialing restrictions, by profile Restriction Restriction/ Restriction/ Restriction/ Restriction/ Restriction/ Restriction/ Profile filter # override override override override...
BRI and PRI line types BRI and PRI line types The following table provides a description of the types of lines that BRI and PRI trunks can provide. These are set under Resources, Media Bay Modules, Bus XX, Module X on the Unified Manager.
BRI and PRI line types Table 277 BRI and PRI line types (DTM and BRI modules) (Continued) Digital trunk types Description DPNSS (international term: Q.Sig or Q.931) a digital private network signaling system which allows phone systems from different manufacturers to be tied together over E1 lines, offering significant enhancements to Business Communications Manager networking capabilities.
CallPilot regions CallPilot regions The CallPilot portion of the Business Communications Manager application also has a region setting that defines some call-management-related system defaults. The CallPilot region is specified at system initialization and start up when you run the Quick Start Wizard. You can also change this setting under System, Identification. The following table lists the default prime language for the countries (regions) where the voice mail application is supported.
CallPilot regions The following table lists the feature default settings that differ among the CallPilot regions. Table 279 CallPilot feature default anomalies Mail box Alternate QZ Max local National Number login mapping number length Length Maximum CLID display Regions False True Australia CALA Caribbean...
Appendix B System Features This section contains two lists: • “Business Communications Manager feature codes” on page 849 which contains a complete list of the feature codes that can be accessed from digital and IP telephones. • “Button programming features” on page 853 contains a list of the features that are programmable under the DN record Button Programming heading.
Page 850
Business Communications Manager feature codes Table 280 Features sorted by feature name and by activation code (Continued) Sorted by feature name Sorted by activation code FEATURE FEATURE Feature name <code> <code> Description Call Forward - Cancel *503 Language - Alternate 2 Call Forward to Voice Mail *504 Language - Alternate 3...
Page 851
Business Communications Manager feature codes Table 280 Features sorted by feature name and by activation code (Continued) Sorted by feature name Sorted by activation code FEATURE FEATURE Feature name <code> <code> Description Line Redirection - Cancel Privacy (on/off) Link Line Redirection Long tones Line Redirection - Cancel Malicious call identification (MCID)
Page 852
Business Communications Manager feature codes Table 280 Features sorted by feature name and by activation code (Continued) Sorted by feature name Sorted by activation code FEATURE FEATURE Feature name <code> <code> Description Find available SWCA *520 #873 Turning Routing service off Find oldest SWCA *537 Alarm time...
Button programming features Button programming features This section describes the features available for Button Programming on the telephone records. Refer to the Business Communications Manager Telephone Features User Guide for information about using these features. Note that some of these features need other system settings in order to work. •...
Page 854
Button programming features Table 281 Button Programming Feature settings (Continued) Set command (FEATURE Feature Description <code>) Restriction override Allows the user to override any restrictions for the call they are trying to dial. Priority Call Allows the user to access a telephone that is currently busy. Transfer Allows the user to transfer an existing call to another telephone.
Page 855
Button programming features Table 281 Button Programming Feature settings (Continued) Set command (FEATURE Feature Description <code>) Call Information Allows the user to view information about a current call. Call Log - View Allows the user to view call log information. Information Call Log - Manual Allows the user to manually active call logging.
Page 856
Button programming features Table 281 Button Programming Feature settings (Continued) Set command (FEATURE Feature Description <code>) Display voice mail DN Displays the voice mail, skill set, or IVR extension number. Transfer to mailbox Transfers calls to a mailbox on the CallPilot system. Voice mail interrupt Intercepts a caller who is listening to your mailbox greeting or leaving a message.
Nortel Networks endeavours to test all variations of ISDN PRI on Business Communications Manager; however, due to the number of variations, this is not always possible.
Welcome to ISDN Analog versus ISDN ISDN offers significantly higher bandwidth and speed than analog transmission because of its end-to-end digital connectivity on all transmission circuits. Being digital allows ISDN lines to provide better quality signaling than analog POTS lines, and ISDN out-of band data channel signaling offers faster call set up and tear down.
Welcome to ISDN ISDN Layers ISDN layers refer to the standards established to guide the manufacturers of ISDN equipment and are based on the OSI (Open Systems Interconnection) model. The layers include both physical connections, such as wiring, and logical connections, which are programmed in computer software.
Services and features for ISDN BRI and PRI Services and features for ISDN BRI and PRI As part of an ISDN digital network, your system supports enhanced capabilities and features, including: • faster call set up and tear down • high quality voice transmission •...
Services and features for ISDN BRI and PRI Business Communications Manager supports the following ISDN services and features offered by ISDN service providers: • D-channel packet service (BRI only) to support devices such as transaction terminals. Transaction terminals are used to swipe credit or debit cards and transmit the information to a financial institution in data packets.
Services and features for ISDN BRI and PRI For more information, see “Network name display” on page 461. Consult your customer service representative to determine which of these features is compatible with your service provider. Name and number blocking (ONN) (North America only) When activated FEATURE 819 allows you to block the outgoing name and/or number on a per-call basis.
Services and features for ISDN BRI and PRI Emergency 911 dialing (North America only) The ISDN PRI feature is capable of transmitting the telephone number and internal extension number of a calling station dialing 911 to the Public Switched Telephone Network (PSTN). State and local requirements for support of Emergency 911 dialing service by Customer Premises Equipment vary.
ISDN hardware • allows long distance carrier selection through user-dialed Carrier Access Codes Consult your customer service representative to determine how your dialing plan is configured. ISDN hardware To support connections to an ISDN network and ISDN terminal equipment, your Business Communications Manager must be equipped with a BRI S/T Media Bay Module (BRIM) or a Digital Trunk Media Bay Module (DTM) card configured for PRI.
ISDN hardware S Reference Point The S reference point connection provides either a point-to-point or point-to-multipoint digital connection between Business Communications Manager and ISDN terminal equipment (TE) that uses an S interface. Refer to the figure below. S loops support up to seven ISDN DNs, which identify TE to the Business Communications Manager system.
ISDN hardware Figure 221 T reference point network connection ISDN Business Communications Manager A T loop can be used in combination with an S loop to provide D-packet service for a point-of-sale terminal adapter (POSTA) or other D-packet device. D-packet service is a 16 kbps data transmission service that uses the D-channel of an ISDN line.
NT1, and between the NT1 and the Business Communications Manager system. The NT1 from Nortel Networks is packaged two ways: • a stand alone package which contains one NT1 card (NTBX80XX) and a power supply (NTBX81XX) •...
Ordering ISDN PRI Ordering ISDN PRI This section provides information about how to order ISDN PRI service for your Business Communications Manager. Ordering ISDN PRI Service in Canada In Canada, order Megalink™ service, the trade name for standard PRI service and set the Business Communications Manager equipment to the supported protocol that is identified by your service provider, either DMS-100 or NI-2.
Supported ISDN Protocols Ordering ISDN BRI Service in the United States In the U.S., regardless of the CO (Central Office) type, order National ISDN BRI-NI-1 with EKTS (Electronic Key Telephone System) turned off. Use the following packages as a guideline for ordering your National ISDN BRI-NI-1.
ISDN Programming ISDN Programming Most of the programming for PRI and BRI lines, and ISDN terminals is performed under the Resources, Media Bay Modules heading in the Unified Manager. This section gives you an overview of programming for PRI and BRI lines, ISDN terminals and devices, and D-packet services.
ISDN Programming Programming ISDN BRI Resources Some steps may not be necessary depending on the service you are providing. For more detailed programming information, see “Configuring resources — media bay modules” on page 135 “Configuring lines” on page 239. For complete module installation instructions and safety precautions, see the Business Communications Manager Installation and Maintenance Guide.
ISDN Programming If you are configuring auto-answer BRI trunks to map to target lines, program the received number for the target line (see “Assigning target lines” on page 297) to be the same as the Network DN supplied by your service provider (Loops, Loop XXX, SPIDs, SPID 1, Network DN).
ISDN Programming Program Direct Inward System Access (DISA) on PRI Lines (North America) When a DTM is configured for PRI, all lines on that module are set to Auto Answer without DISA. DISA, however, can be accessed by one of two methods. Method 1 Define the DISA DN to match the trailing digits of the Called Party Number (CDN).
ISDN Programming Program ISDN Equipment PRI modules support various applications that are enabled by PRI. Terminal equipment for BRI Cards ISDN devices and terminals connected to the Business Communications Manager system must be configured under Services, Telephony Services, Loops. You choose directory numbers for ISDN equipment from a predetermined range of DNs (597 to 694).
ISDN Programming D-packet Service (BRI only) The D-packet service supplied by the Business Communications Manager system supports a point-of-sale terminal adapter (POSTA). Connecting a POSTA allows transaction terminals (devices where you swipe credit or debit cards) to transmit information using the D channel of the BRI line, while the B channels of the BRI line remain available for voice and data calls.
Appendix D Configuring an analog device Analog device DNs are programmed in the same way as digital telephone DNs. However, programming settings will vary, depending on the type of analog device and how it is connected to the Business Communications Manager system. There are two types of analog devices: voice and data communications.
Configuring an analog device DN record Configuring an analog device DN record This section describes the areas of DN record programming that are required or which differ from a default setting. For general information about DN record programming, refer to “Configuring DNs for system devices”...
Configuring an analog device DN record General heading The General heading allows you to assign a name to the analog device and to view the physical port number assigned to the DN. From Unified Manager, click on the keys beside Services, Telephony Services, System DNs, and Active set DNs.
Configuring an analog device DN record Table 285 General record fields (Continued) Attribute Values Description Device port <port number> This read-only setting shows the port number for the DN. Line access Line access settings allows you to assign lines or line pools to an analog device. After lines and line pools are assigned, you can choose a prime line for the analog device.
Configuring an analog device DN record Table 286 Line assignment fields (Continued) Attribute Values Description Caller ID set Y or N This setting only appears for analog lines that provide CLID. This setting is for analog display telephones connected to an ASM 8+ module using the North American profile.
Configuring an analog device DN record Use the table below to select a prime line. The prime line is the line that is automatically selected when a call is made from an analog device. Table 287 Prime line field Attribute Values Description Prime line...
Configuring an analog device DN record Figure 227 Capabilities fields screen example Use the information in the following table to configure seven specific capabilities fields (if required) for an analog device. Table 288 Capabilities fields Attribute Values Description Handsfree Auto Set this value to None for analog devices.
Configuring an analog device DN record Table 288 Capabilities fields (Continued) Attribute Values Description Paging Y or N This setting is for analog telephones. Defines whether paging announcements can be make from the analog telephone. Set this value to N for modems and fax machines.
Configuring an analog device DN record Use the information in the following table to configure an external hotline setting. Table 289 Hotline values Attribute Values Description External External # Use this setting for modems credit card verifiers and fax machines. Facility Value: Enter pause (F78) for the external number.
Configuring an analog device DN record Table 290 ATA settings (Continued) Attribute Values Description ATA use On site Select the location of the analog device. Off site The Off site value is supported on analog devices connected to an ASM 8+ module. ATA tones Y or N Defines whether the analog device receives system tones.
Glossary The following sections provide brief explanations of the terms used in this documentation. ABCDEFGHIKLMNOPQRSTUVW Numerical 7000 digital phone This telephone has four programmable buttons, but no display, and is not available in all markets. 7100 digital phone This telephone has a single line display and one programmable button without an indicator.
Page 888
access codes A digit or group of digits that provide direction to the system as to how to route a call or access a feature, such as call park. The Access Codes heading also provides access to the line pool codes and carrier codes. (Services, Telephony Services, General Settings, Access Codes).
Page 889
asynchronous A method of transmission where the time intervals between characters are not required to be equal. Signals are sourced from independent clocks with different frequencies and phase relationships. Start and stop bits may be added to coordinate character transfer. ATA2 The Analog Terminal Adapter (ATA2) connects analog telecommunication devices, such as fax machines, answering machines, and single line telephones, to a digital media bay...
Page 890
Automatic Daylight Savings Time A feature that switches the system to standard or daylight savings time at programmed times. This feature is set when you run the Quick Install Wizard and specify a time zone setting. An IP telephone that is in a different time zone than the system to which it is registered, must be configured manually to the local time, and then manually changed when Daylight Savings Time occurs.
Page 891
base station This device is part of the wireless/portable handset systems that can be used with the Business Communications Manager. It contains radio equipment that receives and sends signals to a cordless handset used within a specific radius of the base station. The base station connects to a media bay module installed in your Business Communications Manager System.
Page 892
transferred call was assigned a higher intrusion level. Also, the user at the other end has the option of refusing the call by entering the Do Not Disturb feature code. The Basic Rate Interface (BRI) ISDN interface uses two B-channels and a D-channel (2B+D).
Page 893
• active call: set displays elapsed time of call (not dynamic) call forward A feature that forwards all the calls arriving at your telephone to another telephone in your system, or, if you are using ISDN lines to forward the call, to external systems. To have calls forwarded outside the system on other types of lines, use the line redirection feature.
Page 894
The retrieval code appears on the display of your telephone when you park the call. You can park up to 25 calls on the system at one time. (FEATURE 74) You can also specify a prefix to the retrieval under Access codes. (Services, Telephony Services, General Settings) You also need to specify a timeout for parked calls (Services, Telephony Services, General settings, Timers) call park callback...
Page 895
A central answering position (CAP) consists of a 7316E digital phone connected to one or more key indicators modules (KIM). Without system configuration, the modules support extra memory buttons (CAP module, 48; KIM, 24). The system can support as many of these CAPs as the telephony resources support 7316E digital phone.
Page 896
centralized voice mail You can use the Business Communications Manager auto attendant and voice mail applications on one Business Communications Manager system within a private MCDN network to support all the systems connected on the private network. The Business Communications Manager can also be set up to access voice mail systems attached to other systems, such as a Meridian 1.
Page 897
clock sources This is a feature of DTM and BRI modules that allows you to determine where these modules receive their synchronization timing for the network. coldstart A coldstart occurs when you lose all system programming. You can lose system programming after a major event such as an extended power failure.
Page 898
DASS2 Digital Access Signaling System Number 2 (DASS2) is a UK proprietary standard for signaling on ISDN connections between customer premises and the public network. DASS2 is used between the customer equipment and ISDN local exchange and is suitable for multiple access. Data link connection identifier See DLCI.
Page 899
dialing plan This is the overall numbering plan for your system that determines what numbers need to be dialed to reach specific destinations, and what numbers need to be received to be directed into the system, or through the system, in the case where the Business Communications Manager is acting as a node on a tandem network.
Page 900
directory number See DNs. DISA Directed Inward System Access (DISA) is a feature that is assigned to lines to allow the system to answer calls from users from outside the system, who want to access the system and use system features. When this feature is active, the external user hears a stuttered dial tone and must enter a valid class of service (COS) password to proceed.
Page 901
A Domain Name Service (DNS) proxy translates alphabetic domain names into computer-readable IP addresses. For example, the domain name www.nortelnetworks.com for the Nortel Networks web site can translate to the IP address 192.177.5.18. After a domain name is translated into an IP address, the workstations on your network can communicate with the web site.
Page 902
double density Double density for station modules is a function of Business Communications Manager 3.0 and later software. This functionality uses the B2 portions of the line to provide an additional 16 possible telephone connections on each MSC bus. Only station modules that support this feature provide this access, including the ASM8, DSM16+ and the DSM32+ media bay modules.
Page 903
dynamic IP address Dynamic IP addresses are assigned to computers by an IP address server, as the computer needs it. Usually there is a particular range or scope of IP addresses that your network uses. With dynamic IP addressing, a computer can have a different IP address every time it connects to the network.
Page 904
ETSI European Telecommunications Standards Institute. ETSI defines the protocol defined by the institute that provides telecommunications standards in Europe. See also ANSI and QSIG. event message The system stores event messages in the system log and displays these messages during a maintenance session.
Page 905
filtering Filtering is the process of examining a data packet on the network to determine the destination of the data and whether the packet should be passed along on the local LAN, copied to another LAN, or dropped. FQDN A Fully Qualified Domain Name (FQDN) consists of a combination of host name and domain name.
Page 906
system (local gateway) and remote system (remote gateway) so the system can correctly receive and send information over the trunk. If the network has a Gatekeeper application, this application determines where data packets go, and it is not necessary to configure the remote gateway in this case.
Page 907
hard disk A data storage device that uses rigid magnetic disks permanently installed inside the computer CPU or a portable unit. HDLC High-level Data Link Control (HDLC) is a group of protocols or rules for transmitting data between network points or nodes. Data is organized into a unit, called a frame, and sent across a network to a destination that verifies its successful arrival.
Page 908
host system signaling Also referred to as end-to-end signaling. Telephones can access a remote system or dial a number on an different carrier by using host feature activation codes, such as Link, Pause and Run/Stop. hot desking This is an IP telephone feature that allows a user to forward complete IP functionality from one IP telephone to another one, even at a remote location until the feature is deactivated.
Page 909
in-band In-band is a method of device access that utilizes a network interface component within the device. Install Client button This button, located on the Unified Manager front page, provides access to Business Communications Manager supplementary management programs, such as the Java class files.
Page 910
internal user A person using a telephone connected to the Business Communications Manager telephone. Internet A global TCP/IP network linking millions of computers for communications purposes. Internet Engineering Task Force See IETF. Internet-standard Network Management Framework Device configuration and monitoring via SNMP. Interrupt Request See IRQ.
Page 911
IRQ is a signal that is sent by a hardware device to the microprocessor, requesting its immediate attention. For example, every communications port has an interrupt request line for telling the microprocessor when data is received or transmitted. IRQ conflict An IRQ conflict occurs when two hardware devices have the same IRQ.
Page 912
Kbyte The abbreviation for kilobyte. A kilobyte is equal to 1024 bytes. keycode This code is used to enable application options on the Business Communications Manager. These codes are entered by the installer or system administrator. Keycodes are a combination of access codes that are encrypted to open a single application on a specific Business Communications Manager.
Page 913
line number A number that identifies an external line connected to the Business Communications Manager. The total number of lines depends on the number and type of trunk media bay modules installed. Voice over IP (VoIP) trunks and target lines are also defined as line numbers, although they do not connect to the system through physical lines.
Page 914
Long Tones This feature allows you to control the length of a tone so that you can signal devices such as fax or answering machines. These devices require tones longer than the standard 120 milliseconds. (FEATURE 808) MAC address The Media Access Control is a physical address that is the portion of the data-link layer in 802.x networks.It controls addressing information of the packet and enables data to be sent and received across a local area network.
Page 915
See MSC. Meridian 1 ISDN Primary Rate Interface A protocol used between members of the Nortel Networks Meridian family of Private Telecommunication Network Exchanges. The signaling information is carried via time slot 16 of a 2.048 Mbit/s digital transmission system.
Page 916
music source You can connect a radio or other source of music to the system to provide music for the Music on Hold and Background Music features. A music source is customer-supplied. The source is connected through a jack on the MSC on the Business Communications Manager.
Page 917
network Two or more computers linked electronically to share programs and exchange data. This process requires both hardware devices and software to coordinate the connection and data exchange. Network Call Redirection Information See NCRI. network device A network device is a hardware device used as a communications component within a network.
Page 918
out-of-band Out-of-band is a method of device access which circumvents the network interface components within the device. overflow For digital and IP telephones, turn this setting on to allow the system to choose a fallback path for an outgoing call. The feature is turned on under Routing Service, <schedule>.
Page 919
• Page Time out is defined under Timers (Services, Telephony Services, General Settings). This setting controls how long a Page Announcement can last. • Page zone defines An area in the office that receives internal page announcements that other areas of the office do not hear. This feature is defined for each telephone under Capabilities.
Page 920
Peripheral Component Interconnect (PCI) slots are hardware sockets on a circuit board. For instance, the Business Communications Manager has four PCI slots on the MSC board. Each slot contains one PEC III card, which handles call processing for the system. Peripheral Component Interconnect Slot See PCI.
Page 921
power cable A cable that connects the Business Communications Manager base unit to a power source. Point-to-point protocol (PPP) is a protocol for communication between two computers using a serial interface, typically a personal computer connected to a server by a telephone line.
Page 922
private access code A one-digit number that identifies the systems on a private network that is using the a Universal Dialing Plan (UDP). This number is assigned in front of the Home Local Code (HLC) that is unique to each node. Dial string: (<priv.access.code>+<HLC>+<DN>) Private branch exchange See PBX system.
Page 923
pulse/tone dialing An external line setting for pulse or tone dialing. Pulse is the traditional method of dialing used by rotary-dial or push-button single-line telephones. Tone dialing allows telephones to communicate with other devices such as answering machines. You require tone dialing to access the features that PBX systems can provide or to use another system remotely.
Page 924
recall See Link. receiver In this document, this term can refer to the handset of a telephone. regression code This feature restores the previous system security number so that previously applied UTAM Activation Codes and Portable Credit Codes can be re-entered to restore full system operation for Companion components.
Page 925
remote device A remote device is any network device that is accessible only by means of communication over a digital or analog (dial-up) network. remote monitoring A feature that allows an off-site technician with a computer to call in and troubleshoot your system through the built-in modem.
Page 926
ring type A feature that allows you to select one of four distinctive rings for your telephone. See also distinctive ring. This feature is set under User Preferences, but can be changed at a telephone. (Services, Telephony Services, System DNs) ring volume A feature that allows you to set the volume at which your telephone rings.
Page 927
Routing Information Protocol See RIP. routing service Routing services defines schedules that allow you to change the route of a call without changing the destination code. This provides a way of shifting from one service provider to another at different times of the day if the rates are better. The system determines the routing;...
Page 928
Server Message Block See SMB. service control password This is the password that you enter when you want to start or change routing and restriction service settings. Service modes See services. Service Profile Identifiers See SPIDs. services You can define service schedules for ringing services, restriction services and routing services.
Page 929
Manager uses to provide secure access to the system, including the Unified Manager. The access application recommended by Nortel is PuTTY SSH (by SSH inc.). This application replaces the Telnet access used on BCM 3.0 and previous versions of the Business Communications Manager.
Page 930
Start DN This is the first directory number (DN) in the DN range on the system. This number is specified during system setup (Quick Start Wizard). Changing this number causes the system to perform a cold boot and all telephony programming would be lost. This number is assigned by default to DS30 02 first port.
Page 931
Symbol See NetVision. synchronous A synchronous signal is sourced from the same timing reference. A synchronous signal causes the interval between successive bits, characters, or events to remain constant or locked in to a specific clock frequency. Synchronous Dynamic Random Access Memory (SDRAM) Computer memory that stores data temporarily.
Page 932
Digital carrier system or line that carries data at 1.544 Mb/s. These lines can be used to connect systems on a private network. See also universal T1 Wide Area Network (UTWAN). tandem calling On a private network, a node can pass a call to one or more nodes on the private network, and then out to the PSTN of the appropriate remote node.
Page 933
TCP checks packets of information for errors, sends requests for re-transmission in the event of errors and returns multiple packets of a message into the original sequence when the message reaches its destination. IP controls how packets are sent out over networks and has a packet addressing method that lets any computer on the Internet forward a packet to another computer that is a step or more nearer to the packet target.
Page 934
The trunk route optimization MCDN feature allows the call to find the most direct route through the private network to send a call between nodes. This function occurs during the initial alerting phase of a call. tromboning Tromboning refers to the way a transferred call uses lines on a network. If TAT is not present (no MCDN protocol is applied), a call made from a telephone on another system, and then transferred from the telephone to a third telephone on the first system can consume two network lines.
Page 935
Type of Service See TOS. Telephony dialing plan: Networked systems that connects using a Universal Dialing Plan (UDP) have system identification numbers and a location code that are unique to each system. Also, the Private DN length is the same on all systems. The system identification numbers and location codes are entered as a unique destination code that gets dialed out with whatever extension is being dialed.
Page 936
user data User Data is an option in the Set Copy feature. User Data refers to the personal settings which are unique to a telephone, and which are not programmed for the system. You program User Data for each telephone. These settings, for example, include Personal Speed Dial and the assignment of programmable memory buttons.
Page 937
voice call deny Use this feature to prevent your telephone from receiving voice call. voice message center A maximum of five external voice message centers can be programmed onto a Business Communications Manager. However, each telephone can only access one system. If the Business Communications Manager is hosting voice messaging for other systems, remote call-in must be set up to accommodate external callers, even over a private MCDN network.
Page 938
web proxy A web proxy, or HTTP proxy, is a server that acts on behalf of the requester of pages from an HTTP server and the Internet. You must bypass this server to correctly use the Business Communications Manager. Weighted Fair Queuing (WFQ) is a queuing method that allows low volume traffic such as Telnet to be given priority and interactive traffic receives higher priority than batch transfers.
Page 939
Index Symbols 7406 overview 234 # of lines/loops 144 78, 1.5-second pause 332 *89, programmed release 332 804, wait for dial tone code 332 *9, Run/Stop code 332 808, long tones 332 Numbers dialing 901 2001 emergency dialing 222 default button programming 439 enhanced configuration 360 deregistering 375 line redirection 418...
Page 940
Index queue status (909) 853 agent busy/ready (908) 847, 853 acronyms 51 agent login/log out, ACD (904) 853 action agent login-log out (904) 847 configuring 805 policy parameters 807 encryption protocol 765 activation code, features 847 firewall rules 768 NAT restriction 765 active application DNs 371 alarm active Companion DNs 371...
Page 941
Index first (*502) 848 Answer with DISA, trunk mode 250, 268 second (*503) 848 answering calls third (*504) 848 Answer other telephones 220 alternate services, overview 232 Call Display services 213 Call Pickup 219 alternate telephone number, WAN modem link Conference Calls 223 parameters 690 distinctive ring patterns 217...
Page 942
Index ATA use (site) 422 full 903 Call Park prefix 323 per telephone 887 external code 322, 902 Auto Hold (73) 847 glossary 887 auto hold for incoming page 418 hospitality 592 auto hold, allow/disallow 417 line redirection 418 message indicator 422 auto log 891 options 887 attempts, alarm 596...
Page 943
Index CAP/KIM 446 basic packet filters, see also stateless 817 auxiliary ringer 888 basic rate interface, see also BRI 890 Add Users wizard 388 baud rate 889 Directed Pickup 219 BayStack Edit DN Record Template Wizard 382 data module 190 hunt groups 579 module programming 190 overview 233...
Page 944
Index ISDN 909 creating IPSec tunnel 779, 780 line types 843 dial-up support 687 Low line loop 144 frame relay 716 mapping to target lines 260, 267, 870 hardware overview 100 module function 862 identifying software version 110 network DN 281 IP Routing global protocols 709 ONN blocking 485 logging off 86...
Page 946
Index call forward no answer Call Pickup overview 226 Directed Pickup 219 Group Pickup 220 Call forward on busy overview 226 call pickup directed (Feature 76) 892 call handling overview 224 Call Queuing at telephone (801) 852 Call information accessing (811) 848 call queuing Feature 801 892 call information...
Page 947
Index messaging DN, Add Users wizard 388 CAP/KIM assignment 893, 901 messaging DN, Edit DN Record Template Wizard CAP/KIM button programming internal autodial 448 programming overview 237 capabilities Quick Start Wizard 105, 107 Add Users wizard 387 region, Quick Start Wizard 105 auto hold for incoming page 418 transfer to mail box (986) 854 Edit DN Record Template Wizard 382...
Page 948
Index remote access 922 Clid Match Length 466 voice mail 894 CLID name display 461 certificate client 894 private security key 69 COPS, configuration 812 security, logon 67 PPTP client 756 uploading a security certificate 69 client description Challenge-Handshake Authentication Protocol, see also lease information 651, 658 CHAP 894 reserved addresses 649, 657...
Page 949
Index sending messages, overview 229 DHCP Remote Scope 653 DHCP, LAN 644, 652 communicating with other switches 248 DHCP, overview 639 communication channels, MSC resources 612 DNS, overview 705 companding laws, by region 834 NetLink manager, overview 731 Companion QoS mean opinion score 727 active DNs 371 QoS monitor, overview 725 routing, overview 707...
Page 950
Index line programming 242 exporting DHCP 662 telephone settings 399 fixed channel, DDI Mux 165 importing DHCP 663 copyright 2 network wizard 636 core software, regions 832 Policy (DiffServ) 793 reconciling DHCP 663 auto DN 321 data channel 895 calls answered with DISA 321 data compression password (68) 848 PPTP tunnel link 759...
Page 951
Index decreasing maximum value, MSC 626 delay Camp timeout 478 decreasing minimum value, MSC 626 dial, signaling programming 255, 258, 270 decrement TTL, LAN setting 666 host delay timer 478 DECT link timer 478 auto answer issue 414 Park timeout 478 call display 455 ring transfer 464 DECT Configuration Wizard 370...
Page 952
Index DHCP summary 643 wild cards 340, 341 DNS summary 706 destination IP IP firewall summary 818 AH firewall 768 IP routing summary 709 DCOM rules 827 IPSec global 772 ESP firewall 768 ISDN summary 694 ICMP 769 LAN DHCP scope 645 IKE firewall 768 LAN interface 667 IP firewall 822...
Page 953
Index exporting data 662 dial-in importing data 663 setting up callback 127 LAN 644, 652, 661 dial-in access 122 PPTP 754 dialing reconciling data 663 automatic dial 222 relay agent 640 enbloc 901 relay agent configuration 660 insert pause (78) 852 Remote Scope 653 link code (F71) 332 remote scope excluded addresses 655...
Page 954
Index overrides 356 QoS overview 799 remote callers 274 QoS summary parameters 799 remote restrictions 359 queue managers 795 routing 348 traffic conditioners 795 telephone 450 Diffserv wild card character 358 TOS 931 dialing timeout 312 DiffServ Code Point (DSCP) 794 dialling Digital pre-dial 222...
Page 955
Index direct-dial telephone display Add Users wizard 388 voice mail DN (985) 854 Edit DN Record Template Wizard 382 display buttons 898 sending messages 465 display network name 859 Directed Inward System Access, see also DISA 898 Display Voice Mail DN (985) 848 Directed Pickup disposition, IP firewall 821 answering from any telephone (76) 852...
Page 956
Index DN length DECT DNs, wizard 370 call by call service defaults 351 DECT feature non-support 416 changing 294 dialing restrictions 450 client application requirements 294 disable-enable module port 160 numbering plan overview 206 display voice mail DN (985) 854 overview 206 DN mapping for double density 365 programming 295...
Page 957
Index documentation terminating node 549 accessing 78 three party service 551 CD map 57 DPNSS lines, Embark switch 420 finding your way around 98 DRP, see distinctive ring pattern 217 related documentation 56 Domain Name Server, see also DNS 899 unanswered call transfer 900 Domain Name System, see also DNS 899 DS/CLID, module mode 144...
Page 959
Index IPSec global 772 ETSI QSIG IPSec levels 763 advice of charge- end of call (AOCE) 547 logon security certificate 67 hardware settings 547 methods 764 malicious call identification (MCID) 548 minimum web encryption 120 network diversion 548 security levels 119 network services 547 VPN protocols 751 networking 546...
Page 960
Index external code, access codes 322 Camp-on 82 225 camp-on 82 225 external lines, access code conflicts 325 change user speed dial *4 223 external paging 902 Class of Service (COS) 68 308 equipment 228 Do Not Disturb (85) 227 external routing feature codes 332 Do Not Disturb on Busy (85) 227 external voice mail...
Page 961
Index DND on Busy 227 clock source 864 forward timeout, DNS summary 706 File Transfer Protocol, see also FTP 903 forwarding calls filter group name, IP filters 804 Call Forward No Answer 226 Do Not Disturb on Busy 227 filter order, IP filters 804 Forward no answer delay, overview 226 filter type, policy 807 Line Redirection 418...
Page 962
Index gateways disconnect supervision for digital loops 904 DNS 705 redirect to 254 ISDN restrictions 694 use auxiliary ringer 251, 253, 255, 258, 260, 263, MSC media 612, 616 265, 266, 269 QoS monitor 725 ground start trunks GATM line settings 252 impedance 270 Group 82 module mode 144...
Page 963
Index hardware on hold settings 915 BCM200/400 889 home location code, DPNSS 557 overview 100 Home Location Code, see also HLC 905 station media bay module 928 hop-count threshold, relay agent 661 hardware compression, WAN modem link parameters hospitality (alarm) attempts 596 hardware ID 625 admin set 592 hardware limit, MSC component 630...
Page 964
Index Add Users wizard 388 Edit DN Record Template Wizard 383 ICMP facility 421 firewall filter settings 769 numbers 421 message control and error reporting 906 overview 232 ID length, carrier access codes 329 HTTP proxy ID, policy server 814 web proxy 936 ID, system parameters 110 hunt delay 578...
Page 965
Index Install Clients 87 internal user 908 SSH 927 Internal/External #, direct dial programming 324 install clients 78 international (special) access code 322 Integrated Services Digital Network (see ISDN) 857 international 800 890 interactive auto attendant, IVR 909 International INWATS, call by call services 349 Interactive Voice Response, see also IVR 909 internet intercom...
Page 966
Index dynamic 901 output filter 825 fixed, IPSec 767 output filter order 826 IPSec local network 775 packet filtering 817 IPSec remote network 776 summary 818 IPSec restrictions 767 IP header compression IPSec split tunnel 790 ISDN link parameters 695 ISDN summary 694 PPPoE link parameters 702 LAN address 669...
Page 967
Index static routes 717 remote IP pool 785 remote protocol firewall rules 768 IP service classes 796 remote user 782 IP Services list (900) 848 remote user tunnel rules 769 IP set DNs reg’d 374 restriction 666 IP telephones restrictions 187, 683 2001 buttons 439 sending all traffic 776 settings 766...
Page 968
Index ETSI 902 voice bus path 615 hardware 862 IVR, overview 238 installation programming 868 interface configuration 694 IP address assignment 697 IPSec dialup connection 767 Java layers 857 class files 909 line services, by region 838 Java Class, preinstalled 74 link parameters 695 loss plan setting 148, 149 java class files 909...
Page 969
Index lease information configuring resources 666 remote scope 658 description 910 reviewing 650 DHCP restrictions 639 lease time DHCP scopes 644 LAN DHCP scope 645 DHCP server settings 644, 652 remote scope 653 DHCP settings 661 least cost routing 345 ethernet 901 see also routing service 910 interface configuration 667...
Page 970
Index description 911 use remote package 247 external autodial 431, 448 line protocol, by region 837 line pool network 516 Line redirection network sharing 514 activate (84) 848 PRI line pools 412 Call Forward on busy 226 remote access packages 304 cancel (#84) 848 setting line type 249, 252, 255, 257, 259, 261, 262, hunt groups 586...
Page 971
Index link lockout at CO, loop start analog lines 251, 269 user 123 code (F71) 332 Lockout duration 133 initiating code at telephone (71) 852 lockout policy 132 insert into dial sequence (71) 849 failed logon attempts before lockout 133 protocol, Network Wizard 637 lockout duration 133 protocol, Quick Start Wizard 106...
Page 972
Index High line loop 144 low water mark, QoS advanced 800 Low line loop 144 Low/line loop 144 Loop avoidance, programming 557 LQR interval, PPP parameters 682 loop programming lunch schedule 491 clock source 279, 282 local number length 283 network DNS 281 ONN blocking (ETSI lines) 283 ONN blocking state 279, 290...
Page 973
Index maximum length, dialing restrictions 356 MCID overview 231 maximum link speed, WAN summary 175, 675 MCID (897) 849, 853 maximum message size, policy device 815 MD5 894 maximum server threads, web cache 723 MD5, encryption authentication 765 Maximum system speed dials 466 mean opinion score, QoS monitor 727 maximum time adjustment, NTP client 748 Media Access Control, see also MAC address 912...
Page 974
Index moving, Hunt group 583 cancel code (#1) 851 cancel send (#1) 849 memory button direct-dial telephones (F1) 465 activate programming (*3) 849 express messaging into voice mail (980) 853 autodial 223 message reply enhancement 465 program defaults 433 network features 567 menu overview 229 help topics 85...
Page 975
Index disabled/enabling a module 159 voice bus path 615 ports on bus 142 station 155 OSPF parameters 715 station ports 156 PPPoE internet 699 trunk ports programming 154 multi-line hunt 859, 867 viewing status 159 multi-link point-to-point protocol (MLPPP) 672 monitored events, WAN frame relay 679 Multilink PPP 913 monitoring...
Page 976
Index selective line redirection 460 network autodial access 504 name display, alpha tagging 461 configuration samples 501 name display, outgoing 543 DDI Mux overviews 162 name, blocking outgoing, service codes 485 dialout digits 504 naming services 489 overview 102 private systems to Business Communications Manager 502 adding default rules 737 public network to Business Communications...
Page 977
Index choosing link protocol 176, 676 received # 510 clock sources 895 received #, shared line pools 515 coordinated dialing using line pools 516 restriction filters 513 DASS2 896 RIP parameters 711 destination code 512 system callers 502 dialing plan 897 tandem network 523 DiffServ 793 tandem network originating calls 526...
Page 978
796 On hold (see hold) 464 Nortel IP terminal information, DHCP global options one button dialing (see Autodial) 223 Nortel IP terminal VLAN id, DHCP Global options cancel (#819) 849 initiating (819) 849 North America ONN blocking...
Page 979
Index routing protocol 915 NAT supported 735 routing protocol list 714 page OSPF log level, global settings 710 Add Users Wizard 388 auto hold for incoming page 418 OSPF neighbor, OSPF NBMA 716 combined (63) 849 out packets, COPS status 810 description of page features 916 outgoing Edit DN Record Template Wizard 382...
Page 980
Index complexity 134 PEC cards 615 COS 305 per hop behavior (PHB) 794 COS programming 306 Performance 82 default 122 performance graphs and tables, UTWAN 189 default log-on 67 default system admin. 73 performance graphs and tables, WAN 686 desk 593 performance, LAN 670 ee_admin 122 performance, menu 83...
Page 981
Index policy agent state 814 PPP User, UTWAN parameters 181 policy name, policy class 815 PPPoE Access Parameters 702 policy-enabled networking Channel Characteristics 703 actions 798 deleting an interface 704 configuration overview 793 dial-out user parameters 703 DiffServ Code Point (DSCP) 793 dial-up interface 701 filters 798 DSL 699...
Page 982
Index hardware 862 priority call 919 High line loop 144 (69) 849, 852 ISDN 856, 909 Add Users wizard 388 limits, call-by-call programming 351 allow/disallow 417 line pools 352, 412 Edit DN Record Template Wizard 382 line types 843 hunt groups 586 Low line loop 144 overview 222 MCDN network dialing 314...
Page 983
Index DPNSS 1 three party service 551 private/public, lines overview 215, 217 ETSI QSIG 546 process map ETSI QSIG services 547 access headings 293 forwarding to voice mail 420 configuring lines 240 integrating into 507 configuring loops 277 MCDN 521 configuring telephone records 364 MCDN break-in 570 system configuration 92...
Page 984
Index IP firewall 821 dialing plan 503 IP routing precedence 708 dialing plan programming 315 ISDN link parameters 695 DN prefix 316 ISDN supported 867 public DN lengths 315 loop programming 282 to tandem network 523 NAT 735 public networking NAT rule settings 738 outgoing calls 317 Password server 769...
Page 986
Index Edit DN Record Template Wizard 382, 388 remote system access 301 redirect to, line programming 252, 254, 256, 259, 260, remote access answer with DISA 898 redirected calls, Line Redirection and Call Forward COS password 895 COS passwords 305 redirection loops, avoiding 418 description 922 region...
Page 987
Index VoIP trunks 303 viewing network resources 635 viewing PEC configuration 625 remote scope viewing UTWAN resources 189 DHCP 653 viewing WAN resources 672 DHCP server 652 WAN backup link settings 690 excluded addresses 655 importing data 663 restart, delayed 114 lease information 658 restarting IP router 719 reconciling imports 663...
Page 988
Index retrieval code, park mode 464 turning on (871) 850 retrieving Call Park 322 global settings 709 voice messages 483 IP routing information 707 IPSec restrictions 767 retry interval network interface parameters 711 hospitality alarms 596 router information exchange 924 PPTP tunnel link 758 subnet summary 713 ring again...
Page 990
Index service control password 926 system 236 system password 75 scope status system timeout 118 LAN DHCP scope 645 Unified Manager considerations 117 remote scope 653 uploading a certificate 69 ScopeNam.dat, DHCP 662 user groups 129 screen user/system parameters 117 Unified Manager, main 80 Selective LIne Redirection, see SLR 460 Secondary clock source 279, 282...
Page 991
Index changing restrictions at telephone (872) 853 SHA1, encryption authentication 765 changing ringing at telephone (871) 853 share files changing routing at telephone (873) 853 SMB 927 control telephone 895 Shasta 5000, IPSec compatibility 767 extra dial set 496 short tones 417 line/set restrictions 453 overriding 488 signal...
Page 992
Index SM password source port, IKE firewall 768 silent monitor 587 source range mask SM sets DCOM rules 827 silent monitor 587 IP firewall 821 port 6800 rules 827 SM supervision 417 RPC rules 827 source routing, IP firewall 822 Windows share 927 South America, supported languages 833 SMB client signing 120...
Page 993
Index square system 201, 927 station modules, configuration 155 status MCDN Zone ID 544 DHCP summary 643 Virtual Private Network ID 544 DNS summary 706 IP firewall summary 818 IP routing summary 709 installing 87 IPSec global 772 ISDN summary 694 security protocol 927 LAN interface 668 standard dial 222, 428...
Page 994
Index supervised line 933 system access remote 301 supervised trunk mode 250, 268 system clock 747 supervisor dial-in access 122 system configuration process maps 92 suppression bit 279, 283, 290, 484 system configuration menu 83 SWCA System DNs associate SWCA key to call 470 auto hold control 417 active application DNs 371 auto-hold 475...
Page 995
Index tandem calling remote access on private network 930 T reference point 863 tandem calls T.38 fax MCDN special labels 325 UDP protocol 933 tandem network T.38 IP fax protocol 902 private nodes 930 tandem networking # of lines and loops 144 call routing 528 Answer timer 144 from public network 523...
Page 996
Index TE (see ISDN terminal equipment) 863 distinct ring in use 428 DN length 295 telco features DND on busy 416 programming lines 275 Edit DN Record Templates Wizard 379 telephones 454 external autodial button 431, 448 voice message center 483 feature 431, 448 Telephon, ATA Dvc setting 423 first display 454...
Page 997
Index user speed dialing 442 see also SSL 931 voice message center 483 text-based interface 931 voice message set 298 template voice message waiting indication 298 preconfigured 386 telephone restrictions, scheduling 452 remote 386 telephones template, button assignments 434 7000 885 templates 7100 885 using remote templates 394...
Page 998
Index call park callback 892 delayed ring transfer (DRT) 900 camp timeout 478, 892 initiate (3) 851 forward no answer delay 226 initiating at telephone (70) 852 held line reminder 905 priority call (69) 852 Host delay 478 ring delay 464 hunt delay 578 SWCA calls 474 hunt group queue time-out 578...
Page 999
Index trunk route optimization (TRO), MCDN 533 LOC 911 private access code 920 trunk route optimization, see TRO and MCDN 932 private dialing plan 933 trunk/line data private DN lengths 314 call by call services network 518 private network ID 314 E and M networking 511 T.38 fax protocol 933 line pool network 516...
Page 1000
1000 Index system power 933 User Profile warning 104 Use pool, routing 332 user speed dial description 934 use remote package 247 user speed dials, programming 442 use tone 597 Usergroupname 129 user domain user group 131 UserName-Password, PPP parameters 682 failed logon attempts before lockout 133 users ISDN dial-up 122...