Lucent Technologies 5 manual Calling Privileges and Restrictions, Reference

Models: 5

1 429
Download 429 pages 23.98 Kb
Page 130
Image 130

MERLIN LEGEND Communications System Release 5.0

Issue 1

System Manager’s Guide 555-650-118

June 1997

4 Features and Applications

 

Features

Page 4-14

 

 

Calling Privileges and Restrictions

4

Calling privileges and restrictions are planned and programmed centrally for the extensions in your company, as well as for remote access users. When you add a new extension or make other changes in your system, you may need to add or change calling restrictions. You should also consider security issues when you decide whether to allow the system to forward calls to an outside number or when

you plan for voice mail systems. See ‘Security’’on page 4-47 and Appendix A, ‘‘Customer Support Information’, for more information about security planning and procedures.

Although the features described in Table 4–3 affect individual users, controlling calling privileges is a system management function.

NOTES:

1.Do Not Disturb and Privacy are not calling restrictions, but are included here because they prevent calls to individual extensions.

2.If your system operates in Behind Switch mode with a Centrex service providing features, Centrex (and not system) calling restrictions must be used.

The Authorization Codes feature enables users to apply the calling restrictions of their own extensions when they need to make calls from more restricted phones.

For more information, see ‘AuthorizationCodes’’ on page 4-46, or the Feature

Reference.

In Release 4.0 and later systems, the system manager can remove one of the line buttons (SA or ICOM) assigned to an extension where there is a single-line telephone. This feature is designed to accommodate hotels and other institutions, where organizations do not want calls transferred from guest extensions. Removing one of the buttons prevents Privacy from being used at the extension.

In Release 3.1 and later systems, default settings for calling restrictions help system managers guard against toll fraud. For more information, see the topics

‘CallingRestrictions’’ on page 4-40 and ‘‘Security’’ on page 4-47.

Page 130
Image 130
Lucent Technologies 5 manual Calling Privileges and Restrictions, Reference