Lucent Technologies 8.2 Security Camera User Manual


  Open as PDF
of 1707
 
DEFINITY ECS Release 8.2
Administrator’s Guide
555-233-506
Issue 1
April 2000
Features and technical reference
1425Malicious Call Trace
20
DCS
If a telephone in a DCS network is involved in a malicious call, the
extension is recorded and displayed with the MCT information. MCT
notification passes over ISDN-PRI DCS trunks but MCT-Activate,
MCT-Control, and MCT-Deactivate must be performed by telephones
within the same DCS node.
Emergency Access to the Attendant
Ordinarily, during MCT-Control no other feature can access the controlling
telephone’s display. However, MCT gives up control of the display until the
Emergency Access call has completed.
ISDN
ISDN notification of an MCT activation takes place if either the originator
of the call is an ISDN trunk group with Country Protocol 2 or any trunk on
the call is an ISDN private network trunk with Country Protocol 1 and
Protocol Version “a” or Peer Protocol q-sig. When the ISDN trunk group is
Country Protocol 2, notification is sent only to the public network.
Make-Busy/Position-Busy/Send All Calls
The switch attempts to activate Make-Busy or Position-Busy for telephones
or consoles that activate MCT-Control. If a user has a Send All Calls (SAC)
button administered, then SAC activates when the user activates
MCT-Control. When MCT is deactivated, the telephone resets to its
original state.
Music-On-Hold
If an agent places a malicious call on hold that is being recorded and the
call goes to music-on-hold, the music-on-hold port and the MCT Voice
Recorder port can lock. In this case, the MCT Voice Recorder continues to
record the music-on-hold and is unavailable for recording subsequent
malicious calls. You must perform a busy-out/release on the MCT Voice
Recorder port to drop the connection.
Priority Calling
A priority call to an MCT recipient is denied.
QSIG Global Networking
MCT notification passes over the following ISDN QSIG trunk groups:
tandem, tie, access, and DMI-BOS. QSIG supplementary services name
and number ID provide a malicious caller’s name and telephone number.
Transfer
If a user transfers a malicious call, the MCT information displayed on the
controlling telephone identifies the transferring party as the MCT recipient.