Considerations for the Call Vectoring Features

taken by the adjunct is to drop one party on the call, the switch will drop the other party as well and clear the call (it cannot retain a call with only one party, if there is no Return Destination for further processing).*

User Scenario — Remote Access with Host

Provided Security

A customer may use the VDN Return Destination feature to provide a more flexible remote access feature together with host based call security. The remote user/caller does not have to call back into the switch when multiple destinations need to be reached nor does the caller have to enter his/her identification every time a new destination is desired. For example, a customer can program the following vector that is accessed by dialing a VDN that has a Return Destination administered.

1. collect 8 digits after announcement 1001 ("Please enter

your identification number and password followed by # sign")

2.adjunct routing link 1221

3.wait-time 6 seconds hearing silence

4.collect 16 digits after announcement 1002 ("Please enter the telephone number of your destination followed by # sign")

5.adjunct routing link 1222

6.wait-time 6 seconds hearing silence

7.disconnect after announcement 1003 ("We are sorry, but we are experiencing technical difficulties at this time, please try again later")

Figure C-1. Sample Return Destination Vector with Remote

Access

In this scenario, a remote caller will call into the switch by dialing the VDN administered with the Return Destination. The vector executed will prompt the caller to enter an identification number and a password that will be passed, via the adjunct routing vector command, to the host for validation. The host can keep track of invalid attempts or decide to de-activate or activate certain identification numbers based on customer set criteria.

After the host based security is passed (the host sends an Abort to cancel the switch Route request; otherwise, the host routes the call to an exception destination/VDN), the switch will collect digits for the destination that the caller wants to reach (vector step 4 above). The host receives the number entered by the caller (vector step 5 above) and validates the entered number to check if the caller is allowed to reach the specified destination. If so, the host routes the call to the desired (dialed) destination.

C-6Issue 4 September 1995

Page 308
Image 308
AT&T 555-230-520 manual User Scenario Remote Access with Host Provided Security