Lucent Technologies 5 Marine Radio User Manual


 
MERLIN LEGEND Communications System Release 5.0
System Manager’s Guide
555-650-118
Issue 1
June 1997
Features and Applications
Page 4-14Features
4
Calling Privileges and Restrictions 4
Calling privileges and restrictions are planned and programmed centrally for the
extensions in your company, as well as for remote access users. When you add a
new extension or make other changes in your system, you may need to add or
change calling restrictions. You should also consider security issues when you
decide whether to allow the system to forward calls to an outside number or when
you plan for voice mail systems. See ‘‘
Security’’ on page 4-47 and Appendix A,
‘‘Customer Support Information’’, for more information about security planning
and procedures.
Although the features described in Table 4–3
affect individual users, controlling
calling privileges is a system management function.
NOTES:
1. Do Not Disturb and Privacy are not calling restrictions, but are included
here because they prevent calls to individual extensions.
2. If your system operates in Behind Switch mode with a Centrex service
providing features, Centrex (and not system) calling restrictions must
be used.
The Authorization Codes feature enables users to apply the calling restrictions of
their own extensions when they need to make calls from more restricted phones.
For more information, see ‘‘
Authorization Codes’’ on page 4-46, or the
Feature
Reference.
In Release 4.0 and later systems, the system manager can remove one of the line
buttons (SA or ICOM) assigned to an extension where there is a single-line
telephone. This feature is designed to accommodate hotels and other institutions,
where organizations do not want calls transferred from guest extensions.
Removing one of the buttons prevents Privacy from being used at the extension.
In Release 3.1 and later systems, default settings for calling restrictions help
system managers guard against toll fraud. For more information, see the topics
‘‘
Calling Restrictions’’ on page 4-40 and ‘‘Security’’ on page 4-47.