AT&T MERLIN LEGEND User manual

Category
Answering machines
Type
User manual
Update to
Integrated Solution III
System Manager’s Guide
for MERLIN LEGEND®
Communications System
AT&T 555-601-010ADD
March 1995
AT&T
Copyright © 1995, AT&T
AT&T 555-601-010ADD
All Rights Reserved
Printed in U.S.A.
March 1995
Notice
Every effort was made to ensure that the information in this update was complete and accurate at the time of printing.
However, information is subject to change.
Trademarks
AUDIX and MERLIN LEGEND are registered trademarks of AT&T in the U.S. and other countries.
Voice Power is a trademark of AT&T in the U.S. and other countries.
Ordering Information
The ordering number for this document is 555-601-010ADD. To order this document, call the AT&T GBCS Publications Fulfillment
Center at 1-800-457-1235.
Update to
Integrated Solution III
System Manager’s Guide
for MERLIN LEGEND®
Communications System
To diminish the risk of toll fraud occurrences, the Transfer to Subscribers
Only? parameter on the System Parameter Administration screen is now
permanently set to yes. This setting restricts transfers to registered subscribers
only. During a transfer from within Automated Attendant, Voice Mail, or Call
Answer services, when a caller enters an extension number, it is validated
against the subscriber database of the AUDIX® Voice Power™ system. If the
extension entered is not in the subscriber database, the caller will hear “That is
not a valid extension,” and the transfer will be denied. This will prevent the caller
from having an opportunity to gain access to the outgoing facilities of the
telephone communications system.
In some cases, it is necessary to allow transfers to extension numbers that do
not have corresponding voice mailboxes. For example, there may be a need to
transfer to a fax or data extension, or there may be a subset of users who do not
need to receive voice mail, but who should be able to receive transferred calls.
In these instances, such extensions can be administered as AUDIX Voice Power
subscribers with restricted mailboxes to ensure transfers to these extensions.
Restricted mailboxes can be set up by allocating minimal mailbox space (for
example, 1 minute). Additionally, the Subscriber Switch Call Coverage option in
AUDIX Voice Power should be set to Yes to avoid tieing up voice channels.
If voice mail is addressed to any of these restricted mailboxes, the limited
mailbox size will prevent most messages from being delivered.
NOTE:
Do not assign special-purpose subscribers (users with a mailbox but no
telephone on the switch) to extension numbers that start with the same
digit(s) as switch trunk access codes (for example, 9).
If you require assistance with the above administration, call the AT&T Support
Center at 1-800-628-2888.
555-601-010ADD
1
AT&T 555-601-010
Issue 2
September, 1993
AT&T
Integrated Solution III
For MERLIN LEGEND
®
Communications System
System Manager’s Guide
Copyright © 1993 AT&T
All Rights Reserved
Printed in the USA
555-601-010
Issue 2
September, 1993
NOTICE:
While reasonable effort was made to ensure that the information in this document was complete and
accurate at the time of printing, AT&T cannot assume responsibility for any errors. Changes and/or
corrections to the information contained in this document may be incorporated into future issues.
FEDERAL COMMUNICATIONS COMMISSION (FCC) STATEMENT
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant
to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against such
interference when operated in a commercial environment. Operation of this equipment in a residential area
is likely to cause interference in which case the user at his own expense will be required to take whatever
measures may be required to correct the interference.
TRADEMARK NOTICE
UNIX is a registered trademark of UNIX System Laboratories.
Voice Power, and AT&T FAX Attendant System are trademarks of AT&T.
AUDIX and MERLIN LEGEND are registered trademarks of AT&T.
HP and LaserJet are registered trademarks of Hewlett-Packard Company.
Microsoft and MS-DOS are registered trademarks of Microsoft Corporation.
SECURITY
As a customer of new telecommunications equipment, you should be aware of the significant and growing
problem of theft of long distance services by third parties, known commonly as “toll fraud.” It is particularly
important that you understand and take appropriate steps to deal with this crime because under applicable
tariffs, you will be responsible for payment of associated toll charges. AT&T can not be responsible for such
charges and will not make any allowance or give any credit resulting from toll fraud.
Toll fraud can occur despite the preventive efforts of network providers and equipment manufacturers. Toll
fraud is a potential risk for every customer with telecommunications equipment having one or more of the
following features: (1) remote access, (2) automated attendant, (3) voice mail, (4) remote administration
and maintenance, and (5) call forwarding (remote). This is not a product or design defect, but a risk
associated with equipment having one or more of the features described above. If your new
telecommunications equipment possesses any of these features, please consult the relevant portion of your
documentation for further details and specific procedures to reduce the risk of toll fraud or contact your
AT&T dealer for further details.
ORDERING INFORMATION
To order copies of this manual:
Contact:
Your AT&T Account Team or your AT&T Authorized Dealer.
or
Call:
AT&T at 1-800-432-6600
or
Write:
AT&T Customer Information Center
P.O. Box 19901
Indianapolis, IN 46219
Order:
Document No. 555-601-010
Contents
1
Introduction
Overview of Integrated Solution III
System Manager’s Responsibilities
Security
Passwords
Subscriber Passwords
Administrative Passwords
Login Attempts
Master Controller Access
Backup
Toll Fraud
Detecting Toll Fraud
Using this Guide
Conventions Used in this Guide
Getting Assistance
1-1
1-1
1-3
1-5
1-5
1-6
1-6
1-7
1-7
1-8
1-8
1-9
1-10
1-12
1-12
2
Accessing IS-III
2-1
Overview
2-1
2-1
Logging Into IS-III
Using On-Line Help
2-6
Viewing the Access Log
2-7
2-9
Logging Out of IS-III
i
Contents
3
Accessing IS-III Applications
3-1
Overview
3-1
Accessing AUDIX Voice Power
3-2
Accessing FAX Attendant
3-7
Accessing Call Accounting System
3-10
CAS Alarms
3-10
Accessing Integrated Administration
3-13
Accessing System Programming
& Maintenance Utility
3-15
4
Maintaining IS-III
4-1
Overview
Backing Up the System
Backing Up Administrative Files to Diskettes
Backing Up the Entire System to Tape
Backing Up the Integrated Administration
Files to Diskette
Displaying the Disk Usage Report
Formatting MS-DOS Floppy Diskettes
Formatting a 1.44 MB Floppy Diskette
Formatting a 720 KB Floppy Diskette
Adding or Changing Passwords
4-1
4-3
4-7
4-10
4-13
4-15
4-19
4-19
4-25
4-31
CAS and HackerTracker Alarms
4-36
Creating and Changing Group Lists
4-37
Setting CAS Alarm Notification
4-39
Restarting the
Printer Scheduler/Spooler
4-46
Reconciling the Dial Plan
4-49
Setting the Time and Date
4-53
ii
Contents
Shutting Down the System
4-58
Accessing Voice System Administration
4-61
A
Appendix A: Master Controller Features
Overview
Master Controller Processor
Reset Button
Power Button
Drive Indicators
Disk Drive Requirements and Capacities
Diskettes
Tape Drive Requirements
and Capacities
Tape Cartridge
Video Monitor
Keyboard
Escape Key
Enter Key
Tab Key
Ctrl Key
Alt Key
Cursor Control Key Group (Arrow Keys)
Function Key Group
Function Keys
Screen Navigation
A-1
A-1
A-5
A-5
A-5
A-6
A-6
A-6
A-7
A-7
A-8
A-8
A-8
A-8
A-8
A-8
A-9
A-9
A-9
A-9
A-10
iii
Contents
B
Appendix B: Ordering Information
Manuals
B-1
B-1
C
Appendix C: CAS Alarm Notification
C-1
CAS and HackerTracker Alarms
C-1
Alarm Strategy
C-2
Suggested Defaults
C-2
Voice Mail Messages
C-3
Index
Index-1
iv
Figures
3 Accessing IS-III Applications
3-1
3-1.
SPM Main Menu
3-17
A
Appendix A: Master Controller Features
A-1
A-1.
The Master Controller II+
A-2
A-2.
Master Controller II+ Front Panel
A-3
A-3.
Master Controller III
A-3
A-4.
Master Controller III Front Panel
A-4
v
Screens
2 Accessing IS-III
2-1
2-1.
Status Screen
2-2
2-2.
Integrated Solution III Main Menu
2-5
2-3.
Page 1 of the Help Screen for the
Integrated Solution III Main Menu
2-6
2-4.
Page 2 of the Help Screen for the
Integrated Solution III Main Menu
2-7
2-5.
Example Integrated Solution III Access Log
2-8
2-6.
Integrated Solution III Main Menu
2-9
2-7.
Confirm Exit Screen
2-10
3
Accessing IS-III Applications
3-1
3-1.
3-2.
3-3.
3-4.
3-5.
3-6.
3-7.
3-8.
3-9.
3-10.
Integrated Solution III Main Menu
AUDIX Voice Power/FAX Attendant Menu
AUDIX Voice Power Menu
Integrated Solution III Main Menu
AUDIX Voice Power/FAX Attendant Menu
Integrated Solution III Main Menu
Call Accounting System Menu
Integrated Solution III Main Menu
Extension Directory Screen
Integrated Solution III Main Menu
3-4
3-5
3-6
3-8
3-9
3-11
3-12
3-13
3-14
3-16
4
Maintaining IS-III
4-1
4-1.
4-2.
4-3.
4-4.
4-5.
4-6.
4-7.
4-8.
4-9.
4-10.
4-11.
Integrated Solution III Main Menu
User Maintenance Menu
Backup Files
Integrated Solution III Main Menu
User Maintenance Menu
Maintenance Log
Sample Disk Usage Report
Integrated Solution III Main Menu
User Maintenance Menu
Maintenance Log
Format MS-DOS Floppy Diskette Menu
4-4
4-5
4-6
4-15
4-16
4-17
4-18
4-19
4-20
4-21
4-22
vi
Screens
4-12.
4-13.
4-14.
4-15.
4-16.
4-17.
4-18.
4-19.
4-20.
4-21.
4-22.
4-23.
4-24.
4-25.
4-26.
4-27.
4-28.
4-29.
4-30.
4-31.
4-32.
4-33.
4-34.
4-35.
4-36.
4-37.
4-38.
4-39.
4-40.
4-41.
4-42.
4-43.
4-44.
4-45.
4-46.
Format 1.44 MB MS-DOS Floppy Diskette Screen
Remove Formatted Floppy Screen
Integrated Solution III Main Menu
User Maintenance Menu
Maintenance Log
Format MS-DOS Floppy Diskette Menu
Format 720 KB MS-DOS Floppy Diskette Screen
Remove Formatted Floppy Screen
Integrated Solution III Main Menu
User Maintenance Menu
Password Protection
Change/Add
Integrated Solution III Main Menu
User Maintenance Menu
Maintenance Log Menu
CAS Alarm Configuration
CAS Alarm Levels
Sample CAS Alarm Configuration
Integrated Solution III Main Menu
User Maintenance Menu
Confirm Printer Restart Screen
Integrated Solution III Main Menu
User Maintenance Menu
Reconcile Dial Plan Screen
Integrated Solution III Main Menu
User Maintenance Menu
Set Time and Date Screen
Choices Menu
Confirm Time and Date Screen
Integrated Solution III Main Menu
User Maintenance Menu
Shutdown Screen
Integrated Solution III Main Menu
User Maintenance Menu
Voice System Administration Menu
4-23
4-24
4-25
4-26
4-27
4-28
4-29
4-30
4-31
4-32
4-33
4-34
4-40
4-41
4-42
4-43
4-44
4-45
4-46
4-47
4-48
4-50
4-51
4-52
4-53
4-54
4-55
4-56
4-57
4-58
4-59
4-60
4-61
4-62
4-63
A
Appendix A: Master Controller Features
A-1
A-1.
Relationship between Function Keys and Screen Labels A-9
vii
viii
Introduction
1
Overview of Integrated Solution III
Integrated Solution III (IS-III) is a menu-driven software application that allows you to
administer and maintain your AT&T MERLIN LEGEND™ Communications System
and various applications that your system supports. Your IS-III system consists of a
processor called the Master Controller (II+ or III), a color video monitor, a keyboard,
a tape drive, IS-III Platform Software, and one or more of the following software
application packages:
System Programming & Maintenance Utility (SPM)
System Programming & Maintenance Utility (SPM) allows you to add, move,
and change your telephone features and assignments, and back up and
restore the telephone switch system programming information.
AUDlX
®
Voice Power™ (optional)
AUDIX Voice Power (AVP) uses voice prompts and announcements to guide
callers in sending and retrieving voice messages through the use of touch-
tone buttons on the callers’ telephones. AUDIX Voice Power can be used as a
personal answering service, a messenger to individuals or groups, an office
receptionist, an information service, and a message drop service.
AT&T FAX Attendant System™ (optional)
FAX Attendant (FA) enhances the capabilities of all fax machines attached to
your company’s MERLIN LEGEND Communications System. FAX Attendant
uses voice prompts and announcements to guide callers in sending and
receiving fax messages through the use of touch-tone buttons on the callers’
telephone. FAX Attendant can be used as a personal fax receiving service, a
fax messenger to individuals or groups, or as an information service allowing
callers to request different fax messages through an interactive voice
prompt/touch-tone interface.
1-1
Introduction
Integrated Solution Call Accounting System (optional)
With the Call Accounting System (CAS), you can track incoming and outgoing
calls so that you can make informed decisions about your telephone needs.
You can monitor the cost of calls, print reports of incoming and/or outgoing
calls, track calls made on behalf of clients, and identify cases of
telephone abuse. HackerTracker™ software is an optional add-on package that
monitors call activity and provides real-time alarms and alerts for any
abnormal or undesirable call activity, such as toll fraud.
IS-III also provides Integrated Administration, which allows you to perform both
telephone switch system programming and application administration simultaneously
by selecting choices from application-oriented menus and by filling in blanks on
application-oriented forms. Integrated Administration allows information to be entered
only once. All necessary switch system programming is propagated by AUDIX Voice
Power and FAX Attendant to the MERLIN LEGEND Communications System.
NOTE:
Throughout this guide, references to the Master Controller apply to the Master
Controller II+ and III. Any information that differs between the two processors
will be noted.
1-2
Introduction
System Manager’s Responsibilities
As the IS-III System Manager, you are responsible for performing the following tasks:
adding passwords initially and changing them periodically
Maintaining passwords for both logging in and accessing each application
from within IS III helps protect the system from unauthorized access. See
Chapter 4 for the procedures to add and change passwords.
NOTE:
In addition to adding and changing passwords, the System Manager is
responsible for all aspects of system security. See “Security” later in
this chapter.
backing up the system regularly (daily, weekly, or monthly)
The frequency of your backups depends on how up-to-date you want your call
accounting records, administrative files, voice files, and fax files to be when
you recover from catastrophic failure or any restore. For example, if these
files and records change daily, you should back up the system daily.
Conversely, if these files and records change no more than once a month,
monthly backup is appropriate.
checking and maintaining disk usage space regularly (daily, weekly, or
monthly)
Access the Disk Usage Report and check if there are too many Call
Accounting records, voice messages, and fax messages. You must monitor
these records and messages regularly and maintain disk space for optimal
system performance.
shutting down and rebooting the system properly once a month, when the
system is idle
By using the procedures in Chapter 4 to shut down and reboot the system at
regular intervals, you are able to check the status of the entire system and
possibly prevent major problems.
1-3
Introduction
Security
Your Integrated Solution III system has been carefully designed to be secure. As the
System Manager, it is your responsibility to protect voice and fax mail subscribers
from unauthorized access to their mailboxes. Careful attention to security-related
administrative features, procedures, and maintenance are required to ensure the
integrity of user information. It is your responsibility to read this section and
implement its recommendations as part of your Integrated Solution III environment.
Passwords
A password is one of the most effective ways of securing voice and fax mailboxes
and the Master Controller. In general, all passwords should adhere to the following
guidelines:
Do not use ascending digits (1234) for passwords.
Do not use the same digit repetitively (1111) for passwords.
Do not use the current year (1993) for passwords.
Do not use your extension number as a password (extension 3455 with
password 3455).
Do not use your extension number in reverse order as a password (extension
3455 with password 5543).
Do not use your name or initials as a password.
Passwords should not be posted, shared, or printed in an obvious place.
Passwords should not be coded in programmable function keys or speed-
dialing keys.
Passwords should be periodically changed based on the sensitivity of the
messages or accessible information.
See Chapter 4 for procedures on adding and changing passwords.
1-5
Introduction
Subscriber Passwords
Make sure that subscribers understand the importance of password security to their
mailboxes and implement the following guidelines:
Subscribers should change their passwords the first time they log into the
system and periodically thereafter. Consider sending a broadcast message
on the first of each month to remind them.
Subscribers can have passwords of up to nine digits to access the AUDIX
Voice Power and FAX Attendant systems. There is no minimum password
length; however, you should encourage subscribers to make their passwords
at least five digits.
Subscriber passwords are specified in their profiles on the Subscriber
Administration screen. A pound sign (#) in the Password field denies access
to anyone trying to log into the mailbox. The system responds with login
incorrect regardless of what the caller enters. Use this feature whenever it
becomes necessary to restrict mailbox access. Once a subscriber profile is
saved, the password value will not be displayed on the screen. This is for
security purposes. If subscribers forget their passwords, the System Manager
must enter new passwords in their profiles and resave them. The old
passwords are unrecoverable.
Administrative Passwords
Administrative passwords are phone-based and computer-based passwords for the
System Managers and Service Administrators. The following are guidelines for
administrative passwords:
1-6
Make sure that the passwords set during installation are changed.
Establish and enforce procedures among administrators for changing
passwords. These procedures should include how often passwords are
changed and how notification of new passwords is made.
Because subscribers are required to choose passwords, inevitably some will
forget their passwords. To prevent unauthorized access to a subscriber’s
mailbox, establish a procedure for reissuing passwords in these situations.
Computer-based passwords must be at least six characters long.
You must include both numbers and letters in computer-based passwords.
Passwords are case-sensitive (that is, the system distinguishes between
uppercase and lowercase letters in passwords). Consider using special
characters such as dollar signs, commas, and percent signs.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136

AT&T MERLIN LEGEND User manual

Category
Answering machines
Type
User manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI