Lucent Technologies 8.2 Security Camera User Manual


  Open as PDF
of 1707
 
DEFINITY ECS Release 8.2
Administrator’s Guide
555-233-506
Issue 1
April 2000
Features and technical reference
1424Malicious Call Trace
20
You may lose continuity on the trace because the person activating
MCT on the second switch may not be the MCT controller.
If a malicious call comes in on a non-ISDN trunk, the controller needs the
telephone number for the connecting switch and a cross-reference of
system-trunk port numbers (including DS1 channel number, if appropriate)
not the trunk equipment locations at the connecting switch. Be sure that
they have this information.
The following are the system initiated operations for MCT:
Conversation Recording — After the user activates MCT, the system
attaches a MCT Voice Recorder, if available, to record the
conversation, if available.
Historical Recording — After the user activates MCT, the system
records the MCT-information that you can subsequently retrieve via
the MCT History report.
Interactions
Bridged Call Appearance
If a user at a primary extension receives an indication call, then a telephone
with a bridged call appearance of this extension can bridge on to the call.
For an MCT-Activate button push, if the currently active extension is a
bridged appearance, the system records the primary extension as the MCT
recipient.
For an MCT-Activate FAC, the user dials the number of the telephone with
the bridged call appearance that is actually on the call, instead of the
bridged number. However, the system logs the primary extension as the
recipient. Likewise, for self-originated MCT activations via FAC, the
system logs the primary extension as the MCT recipient provided that the
recently held appearance is a bridged call appearance. When you activate
MCT for yourself, dial # or wait for interdigit time-out.
Conference
A user can use conferencing to place a malicious caller on hold. The user
can initiate conferencing and enter the MCT-Activate FAC, then stop
conferencing and return to the malicious caller’s appearance.
MCT-Activate can be generated for a member of a conference and is not
affected by the number of parties on the conference.
Centralized Attendant Service
MCT-Activate, MCT-Control, and MCT-Deactivate must be performed by
telephones within the same PBX.