Technical information

DEFINITY ECS, DEFINITY Communications Systems,
System 75, and System 85
Issue 7 June 2001
6-9
NOTE:
In Table 6-2, FRLs 1 through 7 include the capabilities of the lower FRLs.
For example, FRL 3 allows private network trunk calls and local calls in
addition to FX and WATS trunk calls. Verify the route pattern FRLs no
pattern should carry an FRL of 0.
For DEFINITY G1, G3, and System 75:
Use change cor for the voice mail ports (versus subscribers) to display the
Class of Restriction screen.
Enter the FRL number (0 through 7) in the FRL field. Assign the lowest FRL
that will meet the outcalling requirements, if the outcalling feature is being
utilized. The route patterns for restricted calling areas should have a higher
FRL assigned to the trunk groups.
Use change route-pattern to display the Route Pattern screen.
Use a separate partition group for ARS on the ports used for outcalling,
and limit the numbers that can be called.
NOTE:
For DEFINITY ECS and DEFINITY G3, the Restricted Call List on the Toll
Analysis Table can also be used to restrict calls to specified areas.
For DEFINITY G2 and System 85:
Use PROC010 WORD3 FIELD23 to assign FRLs for use with
AAR/ARS/WCR trunks. Assign higher FRLs to restricted patterns in
PROC309 than the FRL in the COS for the voice mail ports.
For DEFINITY G2.2, do not use PROC314 to mark disallowed destinations
with a higher FRL value.
PROC314 WORD1 assigns a Virtual Nodepoint
Identifier (VNI) to the restricted dial string.
PROC317 WORD2 maps the
VNI to the pattern, and
PROC317 WORD2 shows the pattern preference,
with the FRL in field 4.
For earlier releases, use PROC313 to enter disallowed destinations in the
Unauthorized Call Control table.