Lucent Technologies 8400 Calling/Connected Party Number CPN Restriction, Restriction Controlled

Models: 9400 8400

1 150
Download 150 pages 58.74 Kb
Page 87
Image 87

 

DEFINITY Enterprise Communications Server Release 8.2

Issue 1

 

Overview 555-233-002

April 2000

 

System Management Features

 

 

Security

67

 

 

 

 

 

 

 

 

 

 

Calling/Connected Party Number (CPN)

Restriction

Per Line CPN Restriction

Users may block the Calling Party Number when originating calls. For ISDN calls, the CPN Presentation Indicator is encoded accordingly. For non-ISDN calls, going to a public network that supports the CPN Restriction feature, the network specific Feature Activation Code gets passed to the network for interpretation and activation.

If Per Line CPN Restriction is administered for a station, it will override any ISDN Trunk Group administration for sending Calling Party Number.

Per Call CPN Restriction

Users may indicate Calling Number privacy information. For ISDN calls, the CPN Presentation Indicator is encoded accordingly. For non-ISDN calls going to a public network that supports the CPN Restriction feature, the network specific Feature Activation Code gets passed to the network for interpretation and activation of the desired feature.

If Per Call CPN Restriction is activated for an outgoing call, it will override any Per Line CPN Restriction administration for the calling station, and will override any ISDN Trunk Group administration for sending Calling Number.

Restriction — Controlled

Allows an Attendant or telephone user, with console permission, to activate and deactivate for an individual telephone or a group of telephones, the following restrictions: outward, total, station-to-station, and termination restrictions.

Malicious Call Trace

Allows you to trace malicious calls. You define a group of terminal users who can notify others in the group when they receive a malicious call. These users can then retrieve information related to the call. Using this information, you can identify the malicious call source or provide information to personnel at an adjacent system to complete the trace. It also allows you to record the malicious call.

Page 87
Image 87
Lucent Technologies 8400 Calling/Connected Party Number CPN Restriction, Restriction Controlled, Malicious Call Trace