556
DPNSS 1 features
N0008589 3.3
Restrictions by telephone type
•
ATA2/GASM—supported
•
ISDN—not supported
•
Portables—not supported
The telephone receiving the intrusion displays
Intrusion Call
.
A warning indication tone
will sound after intrusion has taken place, and the standard conference call tone will sound every
20 seconds.
Intrusion levels
Whether or not a telephone will accept or reject an Executive Intrusion request depends on the
level of intrusion protection programmed. Each telephone (DN) has an Intrusion Capability Level
(ICL) and four Intrusion Protection Levels (IPL).
When the ICL of the intruding telephone is higher than the IPLs of
both
telephones on the active
call, EI will occur. It is best to set the IPLs of most the Business Communications Manager
telephone to the default of
None
, or Low or Medium.
Intrusion levels are described as follows:
•
ICL: determines the ability of the attendant to intrude. As long as the ICL is higher than the
IPL of the wanted party, EI is allowed. Since EI is a receive-only feature, the ICL cannot be set
on Business Communications Manager.
•
IPL: determines the ability of the attendant to refuse intrusion. If the IPL is lower than the ICL
of the originating party, EI is allowed. For general purposes setting the IPL to None, Low or
Medium is recommended, unless intrusion is not wanted.
Programming IPL on a telephone
1
Click on the keys beside
Services, Telephony Services, System DNs, Active Set DNs,
DN ##,
and
Capabilities
.
2
Choose
Intrusion
.
3
Click a
Protection level
: None, Low, Med, or High.
If the level of intrusion protection is set to
High
no intrusions will be allowed. The default is
None
.
Summary of Contents for BCM 3.7
Page 4: ...4 Software licensing N0008589 3 3...
Page 32: ...32 Contents N0008589 3 3 W 937 Index 939...
Page 46: ...46 Tables N0008589 3 3...
Page 64: ...64 How to get help N0008589 3 3...
Page 90: ...90 Manually activating Telnet N0008589 3 3...
Page 116: ...116 Delayed system restart N0008589 3 3...
Page 194: ...194 Configuring a data module N0008589 3 3...
Page 276: ...276 Setting line telco features N0008589 3 3...
Page 310: ...310 Using COS passwords N0008589 3 3...
Page 364: ...364 Enhanced 911 E911 configuration N0008589 3 3...
Page 380: ...380 Renumbering DNs N0008589 3 3...
Page 398: ...398 Saving wizard pages on your computer N0008589 3 3...
Page 458: ...458 Voice Mail settings N0008589 3 3...
Page 488: ...488 Setting system telco features N0008589 3 3...
Page 508: ...508 Other programming that affects public networking N0008589 3 3...
Page 522: ...522 PRI networking using Call by Call services N0008589 3 3...
Page 592: ...592 Monitoring Hunt groups N0008589 3 3...
Page 636: ...636 Configuring Double Density N0008589 3 3...
Page 640: ...640 Using the Network Update Wizard N0008589 3 3...
Page 666: ...666 Importing and Exporting DHCP data N0008589 3 3...
Page 722: ...722 Restarting the router N0008589 3 3...
Page 726: ...726 Important Web Cache considerations N0008589 3 3...
Page 748: ...748 Configuring an Interface with NAT N0008589 3 3...
Page 794: ...794 IPSec N0008589 3 3...
Page 818: ...818 Configuring the Policy Agent characteristics N0008589 3 3...
Page 832: ...832 Firewall rules for Business Communications Manager with Dialup interfaces N0008589 3 3...
Page 876: ...876 ISDN Programming N0008589 3 3...
Page 1004: ...1004 Index N0008589 3 3...