Index

Connectivity, 4-1

Conventions, documentation, xv Corporate Security (AT&T), A-12Coverage Group

definition of, 1-4Coverage Path

definition of, 1-4Crisis Intervention

toll fraud, A-12Cut-to-Service

MERLIN LEGEND, 3-7

D

Dedicated Ports

port administration, 1-9port considerations, 1-8

Dial Plan Digits integration planning, 2-7worksheet, 2-8

Digital Networking

high-speed not supported, 1-20See also Networking

Direct to Voice Mail Button description of, 1-19

Disallowed List

creation procedure, 5-12integration planning, 2-5switch security, A-6

Voice Port assignment, 5-13Documentation conventions, xv DVM Button

description of, 1-19

F

Forms

Intuity System, 2-1

MERLIN LEGEND, 2-1

Fraud. See Toll Fraud

Functional Differences, 1-20

G

Generic VMI Calling Group

definition of, 1-4

Glossary, GL-1

Greetings

BUSY and NO ANSWER, 1-20Group Calling

integration planning, 2-4Group Coverage

integration planning, 2-3member assignment, 5-2receiver assignment, 5-7

H

Hardware Platform connection, 3-1installation, 3-1

Holiday Schedules

automated attendant concepts, 1-12description of, 1-17

entering, 6-6

integration planning, 2-16worksheet, 2-17

I

Installation

hardware platform, 3-1SPM software, B-3

switch integration software, B-3Integrated VMI Calling Group

definition of, 1-4Integration

Intuity System procedure, 6-1Integration Planning

allowed lists, 2-5application names, 2-2

assign service to called number, 2-9business schedules, 2-14channel information, 2-9

dial plan digits, 2-7digits in dial plan, 2-7disallowed lists, 2-5group calling, 2-4group coverage, 2-3Holiday Schedules, 2-16Intuity AUDIX subscribers, 2-3Intuity System, 2-6,2-9MERLIN LEGEND, 2-1number plan, 2-2restrictions, 2-5

Routing Table, 2-10voice ports, 2-2

Intuity AUDIX

IN-2Issue 2.0 December 1995

Page 177
Image 177
AT&T 585-310-231 manual IN-2Issue 2.0 December