Calling privileges and restrictions – Lucent Technologies MERLIN LEGEND 6 User Manual

Page 147

Advertising
background image

MERLIN LEGEND Communications System Release 6.0
System Manager’s Guide

555-660-118

Issue 1

February 1998

Features and Applications

Page 4-15

Features

4

Calling Privileges and Restrictions

4

Calling privileges and restrictions are planned and programmed centrally for the
extensions in your company, as well as for remote access users. When you add a
new extension or make other changes in your system, you may need to add or
change calling restrictions. You should also consider security issues when you
decide whether to allow the system to forward calls to an outside number or when
you plan for voice mail systems. See

“Security” on page 4–51

and Appendix A,

“Customer Support Information,” for more information about security planning and
procedures.

Although the features described in

Table 4–3

affect individual users, controlling

calling privileges is a system management function.

NOTES:

1.

Do Not Disturb and Privacy are not calling restrictions, but are included
here because they prevent calls to individual extensions.

2.

If your system operates in Behind Switch mode with a Centrex service
providing features, Centrex (and not system) calling restrictions must
be used.

The Authorization Codes feature enables users to apply the calling restrictions of
their own extensions when they need to make calls from more restricted phones.
For more information, see

“Authorization Codes” on page 4–50

, or the

Feature

Reference.

In Release 4.0 and later systems, the system manager can remove one of the line
buttons (SA or ICOM) assigned to an extension where there is a single-line
telephone. This feature is designed to accommodate hotels and other institutions,
where organizations do not want calls transferred from guest extensions.
Removing one of the buttons prevents Privacy from being used at the extension.

In Release 3.1 and later systems, default settings for calling restrictions help
system managers guard against toll fraud. For more information, see the topics

“Calling Restrictions” on page 4–44

and

“Security” on page 4–51

.

Advertising