Lucent Technologies 8.2 Security Camera User Manual


  Open as PDF
of 1707
 
DEFINITY ECS Release 8.2
Administrator’s Guide
555-233-506
Issue 1
April 2000
Features and technical reference
1308Class of Restriction
20
Tie-Trunk Access
Incoming dial-repeating tie-trunk calls can be completed directly to an
inward-restricted or public-restricted extension but cannot be extended by
an attendant to an inward-restricted telephone.
Transfer
Incoming trunk calls cannot be transferred to an inward-restricted
extension when a 3-way COR check is made.
Incoming trunk calls can be transferred from an unrestricted extension to
an inward-restricted or public-restricted extension if the 3-way COR check
on Conference is overridden.
Interactions for fully restricted service restrictions
Centralized Attendant Service
Since COR information is not passed over Release Link Trunks (RLT),
fully restricted service allows all CAS calls. Therefore, CAS allows a
public network call to complete to a fully-restricted station.
Distributed Communications System
Fully Restricted Service allows all DCS calls because COR information is
not transparent for DCS. DCS can allow a public network call to be
completed to a Fully Restricted station.
Power Failure Transfer
All authorization features are bypassed when the switch is in Emergency
Transfer Mode.
Hunt Group
The COR assigned to the Hunt Group is checked on calls redirected by the
DDC or UCD of the hunt group. Extensions in the hunt group that have
Fully Restricted Service can receive calls from the public network (via the
hunt group) if the COR of the Hunt Group does not have Fully Restricted
Service.
Personal Central Office Line
Do not assign fully restricted service to users who have a personal CO line.
If you do, you will be paying for a CO line that no one can use!
Remote Access
If a barrier code is entered during connection to remote access, the code’s
associated COR is used for authorization checks. If remote access does not
require a barrier code, then the default barrier code’s COR is used. Remote
Access can require an authorization code instead of or in addition to the
barrier code. If an authorization code is required, the authorization code’s
associated COR overrides the barrier code’s COR.