MERLIN LEGEND Communications System Release 6.1

Issue 1

Network Reference 555-661-150

August 1998

5 Network Management

 

General Programming in Private Networks

Page 5-14

 

 

2.Assign an FRL of 0.

3.Specify the digit absorption parameter to absorb exactly the number of digits in the VMI conversion number. For example, if the VMI conversion number is 3738, specify 4.

4.Specify the other (prepended) Digits parameter to add the extension number for the centralized VMSAA calling group on the VMS hub. For example, if the extension at the VMS hub is 7700, specify prepending 7700.

5.Set voice/data attribute to Voice.

Establish a calling group for the centralized VMS/AA and renumber the calling group to the selected common extension for all VMI calling groups sharing the centralized VMS/AA (for example, 7700).

Assign the VMI conversion number as the single member of this calling group.

NOTE:

The VMI conversion number should not be published. This prevents users from dialing the VMI conversion number to retrieve messages, which can result in improper operation of the VMS/AA application.

Keep the factory-set calling group hunt type; since the calling group has only one member, the hunt type makes no difference.

Assign the calling group type as Integrated VMI.

Since the VMI calling group with a non-local member is always considered available, other applicable parameters such as calling group overflow receivers, delay announcement devices, queue alarm and queue control are not needed.

For individual extensions at each system that will receive coverage by the centralized VMS/AA, establish a coverage group. Assign the extensions as senders in the group and the VMI calling group as the receiver.

For calling groups that will receive overflow coverage to the centralized VMS/AA, assign the VMI calling group as the calling group overflow receiver.

!SECURITYlALERT:

To establish subscriber mailboxes, program the centralized VMS/AA to include all local and non-local covered extensions on any system. This is also necessary for security purposes so that the VMS can be restricted to transfer only to subscribers. See Appendix C for more information.

Page 210
Image 210
Lucent Technologies 555-661-150 manual SECURITYlALERT