Instruction manual
DEFINITY® Business Communications System and GuestWorks® Issue 6
Overview
555-231-208
Issue 1
April 2000
Features
A-32Basic features
A
Remote Call Coverage
Allows calls to be redirected to a remote location. This allows users to have calls
placed to their on-site offices redirected to their home offices. You can administer
the system to either monitor calls and bring them back for additional processing (if
not answered), or to leave calls at the remote (off-net) location.
Reset Shift Call
Allows calls made to a busy station to hear a special dial tone. When this special
dial tone is heard, a single digit may be entered which replaces the last digit of the
originally dialed extension. At this point, the call is sent to the new extension. If
call coverage is supplied for the dialed extension, the call routes to coverage as
normal. If the coverage extension is busy, the special dial tone is heard and a
single digit may be entered again. This feature is active for station-to-station calls,
not for incoming or outgoing calls. The procedure is basically the same for
transferred or conferenced calls.
Ringback Queuing
Places calls in an ordered queue (first-in, first-out) when all trunks are busy. The
telephone user who is trying to make a call is automatically called back and hears
a distinctive three-burst signal when a trunk becomes available.
Ringer Cutoff
Allows the user of a multi-appearance telephone to turn audible ringing signals on
and off. Visual alerting is not affected by this feature. When this feature is
enabled, only Priority (three-burst) ring, Redirect Notification, Intercom ring, and
manual signaling ring at the telephone. Internal and external calls do not ring.
Ringing — Abbreviated and Delayed
Allows you to manually or automatically assign one of four ring types to each call
appearance on a telephone. Whatever treatment you assign to a call appearance
is automatically assigned to each of its bridged call appearances.
Security Violation Notification
Allows you to set security-related parameters and to receive notification when the
limits that you have established are violated. You can run reports related to both
valid and invalid access attempts. You can also automatically disable a login ID or
Remote Access authorization that is associated with a security violation. This
keeps the system secure from access by that login ID until the problem has been
corrected.