Avaya S8100 Series Скачать руководство пользователя страница 2

Copyright 2003, Avaya Inc.
All Rights Reserved

Notice

Every effort was made to ensure that the information in this document 
was complete and accurate at the time of printing. However, 
information is subject to change.

Warranty

Avaya Inc. provides a limited warranty on this product. Refer to your 
sales agreement to establish the terms of the limited warranty. In 
addition, Avaya’s standard warranty language as well as information 
regarding support for this product, while under warranty, is available 
through the following Web site: 

http://www.avaya.com/support

.

Preventing Toll Fraud

“Toll fraud” is the unauthorized use of your telecommunications 
system by an unauthorized party (for example, a person who is not a 
corporate employee, agent, subcontractor, or is not working on your 
company's behalf). Be aware that there may be a risk of toll fraud 
associated with your system and that, if toll fraud occurs, it can result 
in substantial additional charges for your telecommunications 
services.

Avaya Fraud Intervention

If you suspect that you are being victimized by toll fraud and you need 
technical assistance or support, in the United States and Canada, call 
the Technical Service Center's Toll Fraud Intervention Hotline at
1-800-643-2353.

How to Get Help

For additional support telephone numbers, go to the Avaya support 
Web site: 

http://www.avaya.com/support

. If you are:

• Within the United States, click the Escalation Management link. 

Then click the appropriate link for the type of support you need.

• Outside the United States, click the Escalation Management link

Then click the International Services link that includes telephone 
numbers for the international Centers of Excellence.

Providing Telecommunications Security

Telecommunications security (of voice, data, and/or video 
communications) is the prevention of any type of intrusion to (that is, 
either unauthorized or malicious access to or use of) your company's 
telecommunications equipment by some party.

Your company's “telecommunications equipment” includes both this 
Avaya product and any other voice/data/video equipment that could be 
accessed via this Avaya product (that is, “networked equipment”).

An “outside party” is anyone who is not a corporate employee, agent, 
subcontractor, or is not working on your company's behalf. Whereas, a 
“malicious party” is anyone (including someone who may be 
otherwise authorized) who accesses your telecommunications 
equipment with either malicious or mischievous intent.

Such intrusions may be either to/through synchronous 
(time-multiplexed and/or circuit-based) or asynchronous (character-, 
message-, or packet-based) equipment or interfaces for reasons of:

• Utilization (of capabilities special to the accessed equipment)
• Theft (such as, of intellectual property, financial assets, or toll 

facility access)

• Eavesdropping (privacy invasions to humans)
• Mischief (troubling, but apparently innocuous, tampering)
• Harm (such as harmful tampering, data loss or alteration, 

regardless of motive or intent)

Be aware that there may be a risk of unauthorized intrusions 
associated with your system and/or its networked equipment. Also 
realize that, if such an intrusion should occur, it could result in a 
variety of losses to your company (including but not limited to, 
human/data privacy, intellectual property, material assets, financial 
resources, labor costs, and/or legal costs).

Responsibility for Your Company’s Telecommunications Security

The final responsibility for securing both this system and its 
networked equipment rests with you - Avaya’s customer system 
administrator, your telecommunications peers, and your managers. 
Base the fulfillment of your responsibility on acquired knowledge and 
resources from a variety of sources including but not limited to:

• Installation documents
• System administration documents
• Security documents
• Hardware-/software-based security tools
• Shared information between you and your peers
• Telecommunications security experts

To prevent intrusions to your telecommunications equipment, you and 
your peers should carefully program and configure:

• Your Avaya-provided telecommunications systems and their 

interfaces

• Your Avaya-provided software applications, as well as their 

underlying hardware/software platforms and interfaces

• Any other equipment networked to your Avaya products

TCP/IP Facilities

Customers may experience differences in product performance, 
reliability and security depending upon network configurations/design 
and topologies, even when the product performs as warranted.

Standards Compliance

Avaya Inc. is not responsible for any radio or television interference 
caused by unauthorized modifications of this equipment or the 
substitution or attachment of connecting cables and equipment other 
than those specified by Avaya Inc. The correction of interference 
caused by such unauthorized modifications, substitution or attachment 
will be the responsibility of the user. Pursuant to Part 15 of the Federal 
Communications Commission (FCC) Rules, the user is cautioned that 
changes or modifications not expressly approved by Avaya Inc. could 
void the user’s authority to operate this equipment.

Product Safety Standards

This product complies with and conforms to the following 
international Product Safety standards as applicable:

Safety of Information Technology Equipment, IEC 60950, 3rd Edition 
including all relevant national deviations as listed in Compliance with 
IEC for Electrical Equipment (IECEE) CB-96A.

Safety of Information Technology Equipment, CAN/CSA-C22.2
No. 60950-00 / UL 60950, 3rd Edition

Safety Requirements for Customer Equipment, ACA Technical 
Standard (TS) 001 - 1997

One or more of the following Mexican national standards, as 
applicable: NOM 001 SCFI 1993, NOM SCFI 016 1993, NOM 019 
SCFI 1998

The equipment described in this document may contain Class 1 
LASER Device(s). These devices comply with the following 
standards:

• EN 60825-1, Edition 1.1, 1998-01
• 21 CFR 1040.10 and CFR 1040.11.

Содержание S8100 Series

Страница 1: ...Job Aids for Upgrading the Avaya S8100 Media Server with the Avaya G600 or Avaya CMC1 Media Gateway 555 245 751 Issue 1 November 2003...

Страница 2: ...ntly innocuous tampering Harm such as harmful tampering data loss or alteration regardless of motive or intent Be aware that there may be a risk of unauthorized intrusions associated with your system...

Страница 3: ...th Part 68 of the FCC rules On either the rear or inside the front cover of this equipment is a label that contains among other information the FCC registration number and ringer equivalence number RE...

Страница 4: ...ation of Conformity SDoC Avaya Inc in the United States of America hereby certifies that the equipment described in this document and bearing a TIA TSB 168 label identification number complies with th...

Страница 5: ...rver to upgrade its software from R9 5 This Job Aid provides the steps for upgrading an S8100 Media Server s software by transferring the new software from a CD This procedure applies to either a full...

Страница 6: ...8100 s Processor board a Connect a cable from the laptop s PCMCIA Ethernet card to an RJ45 coupler b Connect a cross over flip cable from the coupler to the TN2314 s RJ45 jack 4 LT IE Connect to the S...

Страница 7: ...e entire backup a Click Administer System b Log in with lucent3 c Click Backup Restore under System Maintenance d Click Immediate Backup e Under Choose Items for Immediate Backup select everything tha...

Страница 8: ...apter 2 and Appendix I of Installation and Upgrades for the S8100 Media Server 555 123 146 a On the S8100 s desktop right click My Network Places and select Search b When the search window pops up cli...

Страница 9: ...dows 2000 appears when the upgrade to SP4 finishes choose no to decline f From the bash shell do a manual reboot by executing start all 19 If you upgraded to SP4 in Step 18 and restarted Windows 2000...

Страница 10: ...tip to display the customer s parameters If any parameter is not as you recorded in Step 15 use the following setip commands to reset those parameters setip name args setip cust args setip dns args se...

Страница 11: ...12 you must do two restores After the first restore repeat the steps above using the location of the backed up AUDIX announcements for the Source in Step d 39 SDT IE Close Internet Explorer 40 SDT Ope...

Страница 12: ...eed to close 56 BS Close the bash windows a Type exit to close the bash window b Type exit to close the LAC window 57 LT IE Backup the translations and other data to the PCMCIA card or to a network lo...

Страница 13: ...software release on the new hard drive is earlier than the software release on the hard drive to be replaced you must upgrade the software on the new hard drive after the replacement Access keys The a...

Страница 14: ...00 s Processor board a Connect a cable from the laptop s PCMCIA Ethernet card to an RJ45 coupler b Connect a cross over flip cable from the coupler to the TN2314 s RJ45 jack 4 LT IE Connect to the S81...

Страница 15: ...ntire backup a Click Administer System b Log in with lucent3 c Click Backup Restore under System Maintenance d Click Immediate Backup e Under Choose Items for Immediate Backup select everything that i...

Страница 16: ...e always installed in the top slot of the drive bay 20 Re install the Processor board into the platform and power up the system 21 Wait approximately 5 minutes then reconnect to the S8100 s desktop an...

Страница 17: ...Gateways 555 233 146 30 LAC Exit the LAC window and bash shell a Type exit and close the telnet window b Type exit to close the bash window 31 SDT Open Internet Explorer on the S8100 s desktop and lo...

Страница 18: ...arms are present Run display alarms 44 SAT Verify outgoing alarm reports link to INADS Run test inads link 45 SAT Verify no license emergency numbers Type change system parameters features See Adminis...

Страница 19: ...se Items for Immediate Backup select everything that is installed e Set Destination to PCMCIA or click Other Location to backup to a network location f Click the Backup button Note If the medium you a...

Страница 20: ...laces the TN795 with the TN2314 processor circuit pack The hard drive on the new circuit pack contains the new software Access keys The access method for each step is identified by the following keys...

Страница 21: ...proxy server radio button and click OK to close the popup windows 3 Connect the laptop to the R9 5 Processor board TN795 a Connect a cable from the laptop s PCMCIA Ethernet card to an RJ45 coupler b...

Страница 22: ...nnouncements and MultiVantage translations When the backup finishes return to the Immediate Backup screen and select only the AUDIX announcements radio button and send this backup to the same or a dif...

Страница 23: ...to xxx under Remote Control Terminal Services where xxx is the host name used for this system c If a VBScript error message appears click OK d Click the Connect button leave the Server field blank e...

Страница 24: ...the LAC window and bash shell a Type exit and close the telnet window b Type exit to close the bash window 32 SDT Open Internet Explorer on the S8100 s desktop and login a Double click the IE icon on...

Страница 25: ...Run display alarms 45 SAT Verify outgoing alarm reports link to INADS Run test inads link 46 SAT Verify no license emergency numbers Type change system parameters features See Administer No License E...

Страница 26: ...Under Choose Items for Immediate Backup select everything that is installed e Set Destination to PCMCIA or click Other Location to backup to a network location f Click the Backup button Note If the me...

Отзывы: