Lucent Technologies MERLIN LEGEND 6 System Manager's Manual page 147

Communications system
Table of Contents

Advertisement

MERLIN LEGEND Communications System Release 6.0
System Manager's Guide 555-660-118
4
Features and Applications
Features
Calling Privileges and Restrictions
Calling privileges and restrictions are planned and programmed centrally for the
extensions in your company, as well as for remote access users. When you add a
new extension or make other changes in your system, you may need to add or
change calling restrictions. You should also consider security issues when you
decide whether to allow the system to forward calls to an outside number or when
you plan for voice mail systems. See
"Customer Support Information," for more information about security planning and
procedures.
Although the features described in
calling privileges is a system management function.
NOTES:
1. Do Not Disturb and Privacy are not calling restrictions, but are included
2. If your system operates in Behind Switch mode with a Centrex service
The Authorization Codes feature enables users to apply the calling restrictions of
their own extensions when they need to make calls from more restricted phones.
For more information, see
Reference.
In Release 4.0 and later systems, the system manager can remove one of the line
buttons (SA or ICOM) assigned to an extension where there is a single-line
telephone. This feature is designed to accommodate hotels and other institutions,
where organizations do not want calls transferred from guest extensions.
Removing one of the buttons prevents Privacy from being used at the extension.
In Release 3.1 and later systems, default settings for calling restrictions help
system managers guard against toll fraud. For more information, see the topics
"Calling Restrictions" on page 4–44
here because they prevent calls to individual extensions.
providing features, Centrex (and not system) calling restrictions must
be used.
"Authorization Codes" on page
4
"Security" on page 4–51
Table 4–3
affect individual users, controlling
and
"Security" on page
Issue 1
February 1998
Page 4-15
and Appendix A,
4–50, or the Feature
4–51.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Merlin legend 6.0

Table of Contents