Networking Solutions
555-230-024
12-6 Issue 5 January 1998
system management tools. DEFINITY ECS does not require the Facility Res tric-
tion Level to be in an ascending order when administered in th e patterns or pref-
erences through system management.
When a call is attempted, the system compares the Facility R estriction Level of
the telephone with the Facility Restriction Level of the tr unk routes available to
complete the call. If the Facility Restriction Level o f the telephone is equal to or
higher than the Facility Restriction Level of trunks, the call is completed; if it is
lower, the call is blocked on that preference and compared to the Facility Restric-
tion Level of the next route available. If the call fails to match the Facility Restric-
tion Level on the available preferences, the call may queue for the first available
and compatible trunk group.
DEFINITY ECS also provides a feature called Alternate Facility Restri ction Levels
that allows the attendant to temporarily change the Facil ity Restriction Levels on
originating facilities to a different set of Facility Restriction Level s. It is used to
grant users greater access to trunking facilities than is normally provided, such
as when charges are lower during evening hours.
Bearer Capability Class
Bearer capability class uses information available i n the switch to match the call-
ing requirements of a specific call with the best availa ble resources to support
that call. Bearer capability applies to all calls and suppor t facilities, but is of pri-
mary significance for data calls. Each call has a bearer requi rement — that is, a
set or range of requirements needed to support that call. For data calls. the se
requirements include data rate, synchronization, and cha nnel type.
Remote Network Access
Designed to guard against unauthorized system access, Remote Network
Access requires that a caller from outside the system dial either one of te n barrier
codes or an authorization code to gain access to the network. Authoriz ation
codes and their corresponding network-access permissions are assigned to indi-
vidual users.
When properly used, this feature enables you to control and administer system
access security, while still providing your authorized us ers with the benefits of
remote network access. The risks of unauthorized access can be minimized by
combining the use of Remote Network Access with the following:
An unpublished remote access number
Deactivate unassigned barrier codes immediately
Change barrier codes frequently
Inform remote access users of their responsibility
Monitor call detail reports for unauthorized or abnormal cal ling patterns