Programming instructions
- 407 -
DX-120 Programming Manual BASIC EXTENSION PROGRAMMING TASKS
Setting Up Intrusion Capabilities
Intrusion allows extension users to break into an existing call, provided you have given them the privilege to do so. This
feature can be very effective for observing service, and any time that callers have to forcibly enter a conversation on a
busy CO line or at a busy extension.
LEGAL NOTICE
This feature may violate privacy laws if used in a manner that is inconsistent
with requirements of those laws. Vertical Communications, Inc. assumes no
responsibility with regard to the use of this feature; it is provided for the virtue
of ethical use only.
YOU are responsible for using this feature appropriately, considering all applicable laws.
• Intrusion can be used both on a busy CO line and on a busy extension.
• The following conditions apply:
- The calling extension must have Intrusion Active set to Y (yes) for this feature to operate.
NOTE
In order to use the Intrusion Active capability, you MUST have Monitoring Privileges
set up (see
“Setting Up Monitoring Privileges” on page 404)
- The busy extension must have Intrusion Accept set to Y (yes) for this feature to operate.
- The system plays an intrusion tone to all parties when it invokes intrusion (extensions and CO lines).
- You can deactivate the intrusion tone.
SETTING UP INTRUSION CAPABILITIES VIA PC-DBA
From the PC-DBA main screen:
Setting Up Intrusion Capabilities via PC-DBA (continued on next page)