Lucent Technologies 555-661-150 IP Phone User Manual


 
MERLIN LEGEND Communications System Release 6.1
Network Reference
555-661-150
Issue 1
August 1998
Network Management
Page 5-14General Programming in Private Networks
5
2. Assign an FRL of 0.
3. Specify the digit absorption parameter to absorb exactly the
number of digits in the VMI conversion number. For example,
if the VMI conversion number is 3738, specify 4.
4. Specify the other (prepended) Digits parameter to add the
extension number for the centralized VMSAA calling group
on the VMS hub. For example, if the extension at the VMS
hub is 7700, specify prepending 7700.
5. Set voice/data attribute to Voice.
— Establish a calling group for the centralized VMS/AA and renumber the
calling group to the selected common extension for all VMI calling
groups sharing the centralized VMS/AA (for example, 7700).
— Assign the VMI conversion number as the single member of this calling
group.
NOTE:
The VMI conversion number should not be published. This
prevents users from dialing the VMI conversion number to retrieve
messages, which can result in improper operation of the VMS/AA
application.
— Keep the factory-set calling group hunt type; since the calling group has
only one member, the hunt type makes no difference.
— Assign the calling group type as Integrated VMI.
— Since the VMI calling group with a non-local member is always
considered available, other applicable parameters such as calling group
overflow receivers, delay announcement devices, queue alarm and
queue control are not needed.
— For individual extensions at each system that will receive coverage by
the centralized VMS/AA, establish a coverage group. Assign the
extensions as senders in the group and the VMI calling group as the
receiver.
— For calling groups that will receive overflow coverage to the centralized
VMS/AA, assign the VMI calling group as the calling group overflow
receiver.
SECURITYlALERT:
!
To establish subscriber mailboxes, program the centralized VMS/AA to
include all local and non-local covered extensions on any system. This is
also necessary for security purposes so that the VMS can be restricted to
transfer only to subscribers. See Appendix C for more information.