Lucent Technologies 8.2 Security Camera User Manual


  Open as PDF
of 1707
 
DEFINITY ECS Release 8.2
Administrator’s Guide
555-233-506
Issue 1
April 2000
Features and technical reference
1339Facility restriction levels and traveling class marks
20
Access assigned, the individual attendant’s COR FRL is used. Data terminals use
the FRL of the COR assigned to the associated data module.
A remote access call uses the FRL of the COR assigned to the dialed barrier code.
If a barrier code is not required on remote access calls, there is no FRL
Call terminating facilities
Any of the following trunk types can serve as the termination point for an AAR or
ARS call:
Tie trunk — excluding Release Link Trunks (RLT), but including Common
Control Switching Arrangement (CCSA) and Enhanced Private Switched
Communications Services (EPSCS) access trunks
Wide Area Telecommunications Service (WATS)
Central Office (CO)
Foreign exchange (FX)
Integrated Services Digital Network - Primary Rate Interface (ISDN-PRI)
Each of these outgoing trunk groups has an assigned COR that contains an FRL.
However, this FRL is never used in an AAR or ARS call. A terminating-side FRL
for AAR/ARS calls is assigned in the route pattern, not to the outgoing trunk
group.
FRL guidelines
You assign the FRL to the trunk group within the route pattern. You can use the
same trunk group in more than one route pattern, and the same trunk group can
have a different FRL in a different pattern. You can assign the same FRL to more
than one trunk group.
Be consistent in FRL assignments. For ease of assignments, always use FRL 0 or
1 for a trunk group that everyone can access. If you use a range of 0–5 in one
pattern, use the same range in another pattern if all users can access the
first-choice route.
Assign a COR with an FRL of 0 to a group of users to restrict them from making
outgoing calls. Use any other number for the FRL on your first choice route
pattern. This denies access to any trunk group for the users, because all
trunk-group FRLs are greater than 0.
You assign FRLs for remote access users through the remote-access barrier codes.
You can assign up to 10 barrier codes, each with its own COR and FRL. The
simplest way to assign these FRLs is to duplicate the on-premises FRLs, then
relate the appropriate barrier code to users who need remote access.