Instruction manual

Large business communications systems
5-16 Issue 9 May 2003
Toll Restriction: cannot make toll calls unless the numbers are specified on
an unrestricted call list. For G3, you can specify if the restriction applies to
all toll calls or only TAC toll calls over CO/FX trunks.
NOTE:
The switch identifies all public network calls with 0 or 1 as the first or
second digit as toll calls. For G3, toll calls and private network calls
are defined on the Toll Analysis screen. For G2.2, only the first digit, 0
or 1, identifies it as a toll call.
Code Restriction: for DEFINITY G1 and System 75, denies outgoing calls
to selected office and area codes administered in the code table.
Fully Restricted: for Communication Manager, MultiVantage™ Software,
DEFINITY ECS and DEFINITY G3, denies outgoing calls, including dial
access to trunks. Allows no incoming calls via public network trunks. See
also ‘‘Fully restrict service’’ on page 5-31
.
COR-to-COR restrictions/calling permissions
If it is not practical to dial-access-restrict outgoing or two-way trunk groups, then
COR-to-COR restrictions should be used to prevent direct access to those trunk
groups. These restrictions can give no calling permissions to CORs assigned to
trunk groups or data stations.
The following options are available:
Voice terminal—Public Restriction: restricts callers at specified voice
terminals from receiving public network calls. A denied call is routed to an
intercept tone, a recorded announcement, or the attendant.
Calls can redirect to a public-restricted voice terminal. The COR of the
originally called extension number is the only one checked.
Voice Terminal—Termination Restriction: restricts voice terminal users on
specified extension numbers from receiving any calls. However, voice
terminal users can originate calls. Direct inward dialing or advanced private
line termination calls are routed to a recorded announcement or the
attendant.
NOTE:
When a call is to a VDN extension, the COR of the caller and the
VDN are compared to determine if the associated call vector can be
accessed. After the vector is accessed, the COR of the VDN is used
for further call permission checking. See also ‘‘Restriction override
(3-way COR check)’’ on page 5-17.