S
929
Programming Operations Guide
SL-1
This is a type of PRI line that can be used to create a private network between two
systems. It also supports the MCDN protocol.
VoIP programming note:
Prior to BCM
3.5, the SL-1 protocol was used as the gateway protocol for VoIP trunking. For BCM 3.5
and newer software, the CSE protocol is recommended for most VoIP trunking, unless
otherwise specified by the network administrator. VoIP trunking information is contained
in the
IP Telephony Configuration Guide
.
SMB
The Server Message Block (SMB) is a message format used by Windows to share files,
directories and devices.
SNMP
Simple Network Management (SNMP) is the protocol governing network management
and the monitoring of network devices and their functions.
SPIDs
Service Profile Identifiers (SPIDs) are a number that identifies a specific ISDN line. When
you obtain ISDN service, your telephone company assigns a SPID to your line. Part of the
initialization procedure is to configure your ISDN terminal adapter to use this SPID.
Most telephone companies in North America use the Generic SPID Format, which is a
14-digit number. The first 10 digits identify the telephone number, called the Directory
Number (DN). The remaining four digits identify a particular ISDN device, in the case
where multiple devices share the same Directory Number.
Each ISDN BRI line has two telephone numbers. Each of these telephone numbers has a
SPID. Refer to
“Adding SPIDs” on page 280
.
square system
This is a basic office system where all telephones have all the lines assigned to individual
indicator buttons. If the system has a receptionist, the receptionist answers the call, then
calls or pages the person.
SSL
Secure Sockets Layer (SSL) is a security protocol that the Business Communications
Manager uses to provide secure access to the system, including the Unified Manager. The
access application recommended by Nortel is PuTTY SSH (by SSH inc.). This application
replaces the Telnet access used on BCM 3.0 and previous versions of the Business
Communications Manager. SSH is accessed through the
Install Clients
button on the first
page of the Unified Manager. Refer to the
Management User Guide
for instructions about
installing it and using it to access the system.
Summary of Contents for BCM 3.7
Page 4: ...4 Software licensing N0008589 3 3...
Page 32: ...32 Contents N0008589 3 3 W 937 Index 939...
Page 46: ...46 Tables N0008589 3 3...
Page 64: ...64 How to get help N0008589 3 3...
Page 90: ...90 Manually activating Telnet N0008589 3 3...
Page 116: ...116 Delayed system restart N0008589 3 3...
Page 194: ...194 Configuring a data module N0008589 3 3...
Page 276: ...276 Setting line telco features N0008589 3 3...
Page 310: ...310 Using COS passwords N0008589 3 3...
Page 364: ...364 Enhanced 911 E911 configuration N0008589 3 3...
Page 380: ...380 Renumbering DNs N0008589 3 3...
Page 398: ...398 Saving wizard pages on your computer N0008589 3 3...
Page 458: ...458 Voice Mail settings N0008589 3 3...
Page 488: ...488 Setting system telco features N0008589 3 3...
Page 508: ...508 Other programming that affects public networking N0008589 3 3...
Page 522: ...522 PRI networking using Call by Call services N0008589 3 3...
Page 592: ...592 Monitoring Hunt groups N0008589 3 3...
Page 636: ...636 Configuring Double Density N0008589 3 3...
Page 640: ...640 Using the Network Update Wizard N0008589 3 3...
Page 666: ...666 Importing and Exporting DHCP data N0008589 3 3...
Page 722: ...722 Restarting the router N0008589 3 3...
Page 726: ...726 Important Web Cache considerations N0008589 3 3...
Page 748: ...748 Configuring an Interface with NAT N0008589 3 3...
Page 794: ...794 IPSec N0008589 3 3...
Page 818: ...818 Configuring the Policy Agent characteristics N0008589 3 3...
Page 832: ...832 Firewall rules for Business Communications Manager with Dialup interfaces N0008589 3 3...
Page 876: ...876 ISDN Programming N0008589 3 3...
Page 1004: ...1004 Index N0008589 3 3...