Lucent Technologies 8.2 Security Camera User Manual


  Open as PDF
of 1707
 
DEFINITY ECS Release 8.2
Administrator’s Guide
555-233-506
Issue 1
April 2000
About this document
xviiOrganization
The following list describes the sections in this book.
‘‘System basics’’ tells you how to log in and log off, set permissions for others
who use the administration terminal, set daylight savings rules, set the system date
and time, post messages, and back up the information you administer.
‘‘
Introduction to the DEFINITY system’’ provides information on system-wide
functions. It explains how to read, use, and make simple changes to your dial plan,
and how to assign feature access codes.
‘‘
Managing phones’’ explains how to add, swap, and remove phones on your
system, and how to customize a phone for a switch administrator.
‘‘
Managing phone features’’ explains how to administer feature buttons for your
users’ phones.
‘‘
Managing your attendant consoles’’ explains attendant console feature buttons,
and tells you how to change, move, or add attendant consoles.
‘‘
Managing displays’’ provides information on the messages that appear on the
read-out screen on display phones.
‘‘
Handling incoming calls’’ shows you how to set up call coverage for incoming
calls to be sure that incoming calls are answered when the called party is not
available.
‘‘
Routing outgoing calls’’ explains how the switch handles outgoing calls and tells
you how to modify call restrictions and your routing plan.
‘‘
Managing multimedia calling’’ describes the Multimedia Applications Server
Interface (MASI), and provides instructions on administration, monitoring, and
troubleshooting. This section also provides information on Multimedia Call
Handling (MMCH), which enables users to control voice, video, and data
transmissions using a telephone and PC.
‘‘
Setting up telecommuting’’ provides information on switch-wide settings and
individual administration for telecommuting.
‘‘
Enhancing system security’’ provides information on analyzing and setting up
basic system security, preventing toll fraud, using logins and permissions and
passwords, and dealing with security violations.
‘‘
Managing trunks’’ contains procedures for working with analog and digital
trunks. Specialized trunks such as APLT, tandem, release-link, DMI-BOS and
ISDN trunk groups are not covered in this manual.