Saturday, April 30, 2016

System parameters

System  programming overview 1  System  parameters 11   Initialize 12   Installer  password 13   Administrator  password 14   System clock 141   Set  time/date 142   Automatic  time  setting 143   Clock  adjustment 15   System  timing  parameters 151   Flash duration 152  Transfer  forward  timer 153   Recall  timers 1531   Exclusive hold 1532   System  hold 1533   Hold  recall  rings 154   ACD timers 1541   ACD exit  timer 1542   ACD wrap  timer 1543   ACD  hold recall  timer 155   ACD wrap  timer 156   Cell  phone delay 157   Device  timers 158   VIP Attendant  exit  timer 16   System  feature  parameters 161   Recording  alert  tone 162   Connect  tone 163   Station feature  set activation 164   Esi-Link  location  no./line  group  access  selection 165   Auto  attendant parameters 166   CO  line  parameters 167   Voice  mail parameters 169   Feature  set activation 17   System speed-dial 18   Maintenance/SMDR  serial  port 2  CO  line programming 21   Line  programming 211   Analog  CO  line  programming 212   T1  programming 2121   CO line  programming 2122   T1  frame format  and  line  coding 2123   Line  build-out 2124   CSU  emulation   213   PRI  programming 2131   CO line  programming 2132   Line  build-out 2133   CSU  emulation 2134   Switch  protocol 2135   DID 214   SIP  trunk  programming 2141   SIP  trunk  programming  day/night  mode 2142   SIP  account programming 2145   SIP  pilot table programming 22   Translation  table  programming 221   Centrex/PBX  access  code   222  Toll  restriction  exception  tables   223   ARS  (Automatic  Route  Selection) 224   DID and DNIS/ANI  translation table 225   PRI  pilot number  translation table 226   Local  allow  table 23  Line  parameters 231   Line  receive  volume 232   Analog  line disconnect 233   T1  line  receive  volume 234   PRI  line  receive  volume 24   Caller  ID  programming 3   Extension programming 31   Extension definition  and  routing 32   Extension feature authorization 321   Standard  feature  authorization 322   Advanced  feature  authorization 33   Department  programming 331   Department  definition  and routing 332   VIP ACD  parameters 34   Dial  plan  assignment 341   Flexible  number  assignment 342   Network  numbering 35   Extension button  mapping 37   ESI device  programming 371   Access  schedules 372   RFID  tag programming 373   View RFID  tag numbers 374   ESI  Presence  Management  parameters 375   ESI  Presence  Management  Reader  parameters 30   Station  move1 4   Auto  attendant  programming 41   Auto attendant  branch  programming 42   Announce  extension number 43   Automatic  day/night  mode  table 5  Voice mail programming 51   Maximum message/recording length 52   Message purge control 53   Guest/info mailboxes 54   Group  mailboxes 55   Message notification  options 551   Station delivery  options 552   Delivery/paging  parameters 56   Cascade notification  mailboxes 57   Q  &  A  mailboxes 58   Move and  delete  messages 6  Recording 61   Record  system  prompts 62   Record  directory  names 63   MOH programming 631   MOH source 632   Record  MOH   633   MOH volume 7   Reports 71   System  reports 711  Programming  report 712   Diagnostic  reports 72   ESI  Presence Management  access  door  report 73   ACD department  detail  report 74   Voice  mail  statistics  report 75   System speed-dial  list 76   NDDS  report 8   IP  programming 81   Display  licenses 82   Local  programming 821   IP  programming 822   Local  phone starting  address 824   Network  Services  Processor 83   Esi-Link  programming 831   Local  location  number 832   Esi-Link  location  programming 833   Delete  Esi-Link  location 834   Esi-Link  publish  list programming 835   Compression  algorithm 84   ESI  SIP Card  programming 85   ESI ASC  programming 86  ESI Mobile Messaging selection 1Shown in  the same  order  as  it  appears  in  the programming  menu on  an ESI desktop Feature Phone. D.5

Thursday, April 28, 2016

B channel (Bearer channel)

B channel (Bearer channel).  An ISDN standard transmission channel used for  voice or  data transmission. Base station:  A hardware component that is  mounted  on walls and ceilings to provide a radio link to  an office or  other area where portable telephones are used. Each base station houses two radios that allow portables to send and receive calls through  the  ICS. Background Music:  A feature that allows you to hear music  from the speaker  of your Norstar  telephone. It  is available  only if a music  source  has been attached to the ICS and the  feature has been enabled  under  Feature settings  in  Sys  prgrmmng. Basic password:  A  one- to six-digit password that prevents unauthorized access to the  most  commonly-used telephone settings. The Basic  password can be assigned  and changed  in Passwords  programming. Basic Rate Interface (BRI):   An ISDN interface  which uses  two B  channels  and a D  channel (2B+D). Bearer  channel:  See  B  channel. Business series terminals  These terminals were developed to replace the Norstar M-series  terminals.  Therefore, their functionality closely parallels the M-series  terminals. button caps:  Interchangeable plastic caps  that  fit over  the buttons of  legacy Norstar M-series  telephones. They  are used  to indicate the  features programmed onto each programmable memory button.  Button caps  are either pre-printed or  have  clear  windows that allow you to insert  labels. Button Inquiry:  ≤•‚ With  this  feature  you  can check  the function of each programmable button on your system  telephone. C Call Duration  timer:  ≤‡‡ A feature that allows  you to see  how long you  spent on your last call, or how long you  have been on your present call. Call  Forward:  ≤› A feature that  forwards  all the calls arriving  at your telephone to another telephone in your Norstar  system.  To have calls forwarded  outside the system, use Line  Redirection. Call Forward  No Answer:  A feature that forwards all  calls  arriving at  your telephone to another  designated telephone in your  Norstar system  after a specific number of  rings.  Call  Forward No  Answer  is  assigned under Capabilities  in  Terminals&Sets programming. Call Forward  On Busy:  A feature that forwards all calls at your telephone to another designated telephone if your telephone is  busy. This feature  is assigned under  Capabilities  in Terminals&Sets  programming. Call Forward  Override:  An automatic  system  feature that  allows you to call someone and ask them to stop forwarding their calls to you. Call  Information:   ≤°⁄⁄ Call  Information  allows you to display information about incoming  calls. For external calls, you can display the  caller name, telephone number and  the line name.  For an internal call, you  can display the  name  of  the caller  and the internal number. You can  obtain information about  r

Wednesday, April 27, 2016

Mirrored Memory Module

Mirrored Memory  Module  Note:  For  full instructions  on installing the M3,  see its  Installation Guide  (ESI  #0450-0912). The  Mirrored Memory  Module  (M3)  ensures reliability  and survivability  of  compatible  ESI  Communications  Servers. Using RAID1-1  hard-disk  drive technology,  mirrored hard  drives  are intended  to  maintain  system  operation on one disk drive in the event a hard drive fails. No system programming is required for the M3 to function. Note:  The ESI-1000 has  all M3  components  built-in,  so  the installation on the  ESI-1000 of  the hard-drive  Memory Modules  (see “Procedure for  two hard-drive Memory  Modules  (ESI-1000),”  page  F.5)  enables  M3 operation on that  system.  M3 components  are optional for  the  ESI-600 and ESI-200,  and must  be installed onto the ESI  Communications  Server  main board. The M3  is  a printed  circuit  assembly  that  supports  two  identically  configured  hard  drives,  mounted on  standoffs. It  also  has  LED indicators,  an  audible  alarm,  alarm  reset  button,  and an  IDE cable  connector  for  connection to the main  board. For  the mirroring  operation to  function  properly  on  the ESI  Communications  Server,  each hard  drive  must  be formatted and prepared by  ESI. Installing  the M3  (ESI-600 •  ESI-200) The M3  kit  consists  of  an  M3  printed circuit  board,  hard  drive  mounting  plate,  faceplate,  four  (4)  1-inch standoffs,  12  nylon  spacers (washers),  eight  (8)  screws,  and an  IDE  cable for  connection to  the main  board. Refer  to  Fig.  M3-1,  below, to  identify  and  locate  where  these  components  will be  installed. Memory  Modules  (hard drives,  or  HDDs)  are  obtained  separately.  Note  that  each hard  drive  must  be an ESI-formatted  drive for  the  mirroring  operation to  function  properly.

Tuesday, April 26, 2016

Electric strikes

Electric strikes Electric  strikes  are installed in  a  door  frame  where the  strike  plate is  usually  mounted.  It  includes  a  plate  called the keeper  or  gate which is  electrically  released  to  swing  out  and thereby  allows  the latch to  move through the  space the keeper  has  vacated.  There  are  several  different  types  of  electric  strikes.  Most  electric  strikes require  12  or  24  volts DC,  and they may be  fail-safe  or  fail-secure.  A  fail-safe  electric  strike  needs  power to  remain  locked,  and  is  not commonly  used.  The most  common  type of  electric  strike  is  fail-secure.  A  fail-secure electric  strike stays  locked even without  power  from  the outside  coming  in.  To  exit,  a  door  knob  or  lever  on the entry lockset  is  manually  operated. Since the  electric  strike  is  not  needed for  this,  it  allows for  safe  exit.  To  provide  an  audible  indication that  the  door  is unlocked,  DC-powered  electric  strikes  will  make  a  slight  click  when  operated.1  It should  be  noted  that  the  ESI Presence  Management  RFID  Reader emits  a  confirmation  tone  when  the door  control  relay is  operated;  therefore ESI  recommends that  a DC-powered  electric  strike  be  used  with  the RFID  Reader  for  door  access  control. Electromagnetic locks Electromagnetic  locks  (magnalocks) are  designed  to  secure  any type  of  door  or  gate  that  closes against  a  fixed stop. All  magnetic  locks  will  work  only  with  DC  current, usually  12  to  24  volts.  All  electromagnetic  locks are  fail-safe. This  means that  they  need  a  constant  source  of  current  to  remain  locked:  if  power is  removed,  the  lock  will open. All  electromagnetic  locks  are  silent,  even  when  powered  and locked.  The lock  consists  of  an  electromagnet  which mounts  on  the door  frame and  a  strike  plate which mounts  on the moving  door  or  gate.  The  strike plate is  mounted in such  a  way  that, when  the  door closes, it automatically  self-aligns  with  the  magnet. Magnetic  force  then  takes  over, strongly  securing  the door.  Release is  achieved  by  switching off  power  to  the magnet.  This  type  of  lock  secures the door from both entering and exiting, and there is no alternate method of unlocking the door. Important:  Electromagnetic locks can  be  dangerous  with  respect  to  fire  and smoke safety  if  not  installed properly. Because of  this,  installation of  this type of  lock  must  be done by  a licensed professional in most,  if  not  all,  areas. Before  planning an installation it's  very  important  to  always  check with  the Local  Authority  Having  Jurisdiction. Electric deadbolts Electric  deadbolts  come  in  several  different  styles,  and as  with  electric  strikes,  they  come  in  fail-safe and fail-secure configurations.  The  deadbolt  is  operated  via a  solenoid  in  the lock  housing.  Some  models  have  a manual  cylinder that  allows  exit  without  operating the  solenoid.  However,  because  electric  deadbolts  are installed  separate  from  a standard  entry  lockset,  they  can  be  as  dangerous  as  electromagnetic  locks  if  not  installed  properly.  Because  of this, installation of this type of lock must be done by a licensed professional in most if not all areas.

Monday, April 25, 2016

Static Sensitive

Contents Static  Sensitive Handling Precautions  Required • There are  two methods for  System  Initialization.  The  first method  is  to Clear  All  Data,  except LEN0000  as a  CAT terminal,  and then program  the  System  Data.  The  second method  is  to use  the  Resident System  Program,  which  causes  the  system  to  configure  itself  automatically  to  the  default  settings,  wherever  the  line/ trunk  cards  are  installed.  Refer  to the  System  Data  Sheet,  for  the  default  settings. • Turn on the  “SW1”  switch  on all  the  PZ-PW86  units. • The “ON” lamp  must  be  lit  on all  the  PZ-PW86  units. 1.1. All  Clear,  Except  LEN0000 CAT STEP  1: On the  MP  Card,  set SW3 to “B”  and  press SW1. STEP  2: When  the  “MN”  lamp  on the system  is lit,  set SW3 to the  “0”  position  and p

Friday, April 22, 2016

Programmable Access buttons

Scroll buttons (Up, Down) — Allow you to scroll through the items in

the telephone display panel. See “Using the NBX Telephone

Display Panel” in Chapter 7.

4 Program button — Reserved for future use.

5 Programmable Access buttons and label area — Allow you and your

administrator to assign features to specific buttons. See “Programmable

Access Buttons” and “Status Lights for System Appearance Buttons”

later in this chapter.

6 Programmable Access and label area — Allow you and your

administrator to assign features to specific buttons. See “Programmable

Access Buttons” later in this chapter.

7 Hold button — Places a caller on hold. See “Putting a Call on Hold”

in

Chapter 7

.

8 Transfer button — Sends the currently active call to another telephone.

See “Transferring a Call”

in Chapter 7.

9 Conference button — Establishes a single call with up to three

additional internal parties, external parties, or both. See “Establishing a

Conference Call” in Chapter 7.

10 Redial button — Redials the last telephone number or extension that

you called. See “Redialing a Call”

in Chapter 7.

11 Speaker button — Enables you to use the speaker phone feature. Press

the Speaker button before you dial the call, when your telephone is

ringing, or while a call is in progress. To turn the speaker phone off and

resume the conversation, pick up the ha

Wednesday, April 20, 2016

Abbreviated dialing


The Abbreviated Dialing (AD) feature allows you to store selected telephone
numbers for quick and easy dialing. Each number can be a complete or
partial telephone number, an extension number, or a trunk or feature access
code and can contain up to 24 digits. Abbreviated Dialing offers four possible
types of lists—Personal, Group, System, and Enhanced, and you can have a
total of three lists. (Of these three lists, you can have only one System List
and one Enhanced List.) You program numbers on a Personal List; numbers
on Group Lists are programmable by the controller of the list; System Lists
and Enhanced Lists are programmable only by the system manager.
To place a call using an AD list button or feature access code
1. Press and then the appropriate dial pad key on which a list
access code is administered,
or Dial the appropriate AD List code for List 1, or List 2, or List 3.
2. When you hear dial tone, dial the desired list item (1, 2, 3...).
Note: An Enhanced List may also be available; see your system
manager.
You can also program a number on an AD button that is not stored on an AD
list. This Automatic Dialing number can be up to 16 digits.
To program a number on an AD button
Note: The system manager must program a feature button as an AD
button before you can program a number onto it.
1. While off-hook, press and then the dial pad key assigned to the
AD Program feature,
or While off-hook, dial the Program access code.
You will hear dial tone.
2. Press and then the dial pad key you wish to program.
For example, to store a number in AD entry F3, press and then
3.
3. Dial the outside number, extension, or feature access code you want to
store (up to 24 digits).
4. Press # to save the entry.
You will hear confirmation tone and then dial tone.
5. Repeat Steps 2 through 4 to program additional buttons.
6. Hang up to end programming.
Abbreviated Dialing/Automatic Dialing (AD)

Monday, April 18, 2016

VLANs are logical segments within a corporate LAN

VLANs are logical segments within a corporate LAN. By assigning VLAN settings to IP-PTs, it is possible to
separate the packets transmitted by an IP-PT according to the type of data, and specify which VLAN each data
type will be sent over. This allows you to avoid generating unnecessary network traffic on each segment, and
to reduce the load on the network. As a consequence, speech quality can be assured.
Therefore, we recommend using the VLAN feature to perform VoIP communication effectively.
Some IP-PTs (e.g., KX-NT136) are equipped with 2 ports, primary and secondary, for packet communication.
Allocating these ports to different VLANs enables you to split the paths for packets depending on whether the
packet contains voice signals or data.
VLAN settings (VLAN ID and VLAN priority) for the primary port affect voice data transmitted by the IP-PT,
whereas VLAN settings for the secondary port apply to data transmitted by a PC connected to the IP-PT. When
sending packets, the IP-PT can attach information on which VLAN the packets are to be transmitted over
(VLAN Tagging). The switching hub that receives these packets reads the VLAN information and sends the
packets over the appropriate VLAN. This helps to ensure bandwidth for IP-PT voice transmissions.
In this way, an IP-PT with 2 ports can transmit voice packets from the primary port with higher priority than
other packets from the secondary port.

Sunday, April 17, 2016

LAN

Major New Features in Version 1.2 of HiPath 3000
Important Notices
G281-0788-00, April 2002
1-14 HiPath 3000 V1.2-3.0, System Description
3000sb1.fm
New Options
In connection with the control boards, the following new optional boards are available.
CMS (Clock Module Standard)
The CMS module replaces the old CGMC clock generator. The
CMS must be used in the following situations:
● Clock generator for the master system in the network
● Clock generator for HiPath cordless during operation with the
SLC16 board
● Clock generator for a single-cell cordless solution (2-channel
mode) with BS3/S base station
CMA (Clock Module ADPCM)
The CMA module is implemented exclusively in the HiPath 3550,
HiPath 3350, HiPath 3500 and HiPath 3300 systems. The module
is required as a clock generator for HiPath cordless (4-channel
mode) with the BS3/1 base station when the new control boards
are connected directly to the UP0/E ports.
LIM (LAN Interface Module)
The LIM module enables you to integrate all HiPath 3000 models
into TCP/IP-based LANs economically for
● central system administration (TCP)
● call detail recording (CDRC)
● APS transfer or
● fault management.
A 10BaseT interface (10 Mbit) with an RJ45 jack is available for
connecting to the LAN.
IMODC (Integrated analog modem)
The format of the printed-circuit board on the integrated analog
modem for remote maintenance (remote access via analog
trunks) is new. The module is plugged into the appropriate slots
on the control boards (this is not possible in HiPath 3250 or Hi-
Path 3150).
MPPI (optional music on hold from Beyertone)
The plug-in MPPI module can be used universally in all HiPath
3000 models making an economical solution available for an al-
ternative music on hold.

Saturday, April 16, 2016

key basic function

For certain functions, you can append data to the key basic function. For example, the function 26 appended by data 1 makes a Group Call Pickup key for Pickup Group 1. You can also program Function Keys using Service Codes. To clear any previously programmed key, press  000  to erase any displayed code.

Wednesday, April 13, 2016

Dialed DISA number gets ringback

Dialed DISA number gets ringback instead of stuttered dial tone The remote caller has dialed a  DISA number, but has instead reached a target line,  or has been routed  to the prime telephone for the auto-answer trunk. The Norstar system has mapped the incoming digits from a switch onto a target line, or has been unable to map the digits anywhere. Solution 1. Verify  that  the switch is  sending the correct number of digits for the Received number length defined in your system. 2. Verify all the digit strings that the switch should be sending. 3. Check that you have defined the correct DISA DN for your system. 4. Make sure that the published telephone numbers for your network are correct. Dialed DISA number gets dial tone instead of stuttered dial tone Possible problem The remote caller has  dialed a DISA number, but has reached the Norstar system instead. The Norstar system has mapped the incoming digits from a switch onto the Auto DN. Solution 1. Verify  that  the switch is  sending the correct number of digits for the Received number length defined in your system. 2. Verify all the digit strings that the switch should be sending.

Tuesday, April 12, 2016

Speed dial bin

Per speed dial bin (000 ~ 999) assign the telephone number that is to be called when the bin is accessed. If 13-01-01 is set to (0) do not include the trunk access code. If 13-01-01 is set to (1) include the trunk access code.

Monday, April 11, 2016

Confirm the terminal connected

Confirm the terminal connected with same ESI. If they work normally, confirm the breakdown or the wiring for the terminal. Exchange the terminal that doesn't work and the working terminal, and confirm it’s working. An external factor of the noise etc. is thought. Please reconfirm wiring and the installation, etc. Please inquire of the manufacturer when the problem occurs after it confirms it.

Sunday, April 10, 2016

Password setup

Password Setup  to set the system passwords. For password entry, the system allows eight users to be defined. Each user can have a: • Unique alphanumeric name (up to 10 alphanumeric characters) • Password entry of up to eight digits (using 0 ~ 9, # and • Password level *) The IN level password is used by the System Installer for system programming. The SA or SB level password cannot access the IN level programs. The reverse type (white on black) just beneath the Description heading is the program access level. You can only use the program if your access level meets or exceeds the level the program requires. (SA level password can access to SA or SB programs, and SB level password can access to SB programs only.)

Thursday, April 7, 2016

Toll restriction limits

Code Restriction/Toll restriction limits the telephone numbers a user may dial.  By allowing extensions to place only certain types of calls (e.g. local and toll free), you can better control long distance costs.  The system applies code restriction/toll restriction based on the users assigned code restriction class.

 

The system allows for up to 15 different code restriction classes.

 

Wednesday, April 6, 2016

Incoming digits

The Norstar system did not receive some or all of the incoming digits. Solution 1. Check that the system hardware is receiving signals properly. 2. Verify  that  the switch is  sending the correct number of digits for the Received number length defined in your system. 3. If the switch at the far end is sending pulse signals, make sure they are being sent at the proper rate. Pulse digits must be 300 ms or more apart for Norstar to receive them. Possible problem If remote callers are having difficulty getting through from the public network, there may be  a problem with your DID Trunk Cartridge. Solution 1. Connect a single-line DTMF telephone to a DID trunk input on the DID Trunk Cartridge. 2. Use the single-line telephone  to enter a Received number that has been programmed for a  target line in your system. Listen for ringback.

Tuesday, April 5, 2016

number gets stuttered dial tone

number gets stuttered dial tone instead of ringback Possible problem The remote caller has tried to reach a Norstar target line, but has reached a trunk with DISA instead. Alternatively, the  Norstar system has mapped incoming digits onto the DISA DN. Solution 1. Verify all the digit strings that the switch should be sending. 2. Check that you have defined a corresponding Received number for every target  line in your system. 3. Check that you have defined the correct DISA DN for your system. 4. Make sure that the published telephone numbers for your network are correct. Dialed number  gets  dial  tone instead of  ringback Possible problem The remote caller has tried to reach a Norstar target line, but has reached the Norstar system instead.  Norstar has  mapped the incoming digits onto the Auto DN. Solution 1. Verify all the digit strings that the switch should be sending. 2. Check that you have defined the corresponding

Saturday, April 2, 2016

Remote

Remote feature code gets no response Possible problem A Norstar user has called into  another Norstar system and is trying to activate a remote feature but gets no response after dialing the feature code. Solution 1. Make sure that  the  remote caller is dialing the feature code correctly. Use the asterisk  (*) character, followed  by the feature code, to activate a remote feature. Do not use  ≤ for accessing features  on a remote Norstar system. 2. Make sure that the remote user  is dialing tones, not pulses, once the call is answered.