System programming overview 1 System parameters 11 Initialize 12 Installer password 13 Administrator password 14 System clock 141 Set time/date 142 Automatic time setting 143 Clock adjustment 15 System timing parameters 151 Flash duration 152 Transfer forward timer 153 Recall timers 1531 Exclusive hold 1532 System hold 1533 Hold recall rings 154 ACD timers 1541 ACD exit timer 1542 ACD wrap timer 1543 ACD hold recall timer 155 ACD wrap timer 156 Cell phone delay 157 Device timers 158 VIP Attendant exit timer 16 System feature parameters 161 Recording alert tone 162 Connect tone 163 Station feature set activation 164 Esi-Link location no./line group access selection 165 Auto attendant parameters 166 CO line parameters 167 Voice mail parameters 169 Feature set activation 17 System speed-dial 18 Maintenance/SMDR serial port 2 CO line programming 21 Line programming 211 Analog CO line programming 212 T1 programming 2121 CO line programming 2122 T1 frame format and line coding 2123 Line build-out 2124 CSU emulation 213 PRI programming 2131 CO line programming 2132 Line build-out 2133 CSU emulation 2134 Switch protocol 2135 DID 214 SIP trunk programming 2141 SIP trunk programming day/night mode 2142 SIP account programming 2145 SIP pilot table programming 22 Translation table programming 221 Centrex/PBX access code 222 Toll restriction exception tables 223 ARS (Automatic Route Selection) 224 DID and DNIS/ANI translation table 225 PRI pilot number translation table 226 Local allow table 23 Line parameters 231 Line receive volume 232 Analog line disconnect 233 T1 line receive volume 234 PRI line receive volume 24 Caller ID programming 3 Extension programming 31 Extension definition and routing 32 Extension feature authorization 321 Standard feature authorization 322 Advanced feature authorization 33 Department programming 331 Department definition and routing 332 VIP ACD parameters 34 Dial plan assignment 341 Flexible number assignment 342 Network numbering 35 Extension button mapping 37 ESI device programming 371 Access schedules 372 RFID tag programming 373 View RFID tag numbers 374 ESI Presence Management parameters 375 ESI Presence Management Reader parameters 30 Station move1 4 Auto attendant programming 41 Auto attendant branch programming 42 Announce extension number 43 Automatic day/night mode table 5 Voice mail programming 51 Maximum message/recording length 52 Message purge control 53 Guest/info mailboxes 54 Group mailboxes 55 Message notification options 551 Station delivery options 552 Delivery/paging parameters 56 Cascade notification mailboxes 57 Q & A mailboxes 58 Move and delete messages 6 Recording 61 Record system prompts 62 Record directory names 63 MOH programming 631 MOH source 632 Record MOH 633 MOH volume 7 Reports 71 System reports 711 Programming report 712 Diagnostic reports 72 ESI Presence Management access door report 73 ACD department detail report 74 Voice mail statistics report 75 System speed-dial list 76 NDDS report 8 IP programming 81 Display licenses 82 Local programming 821 IP programming 822 Local phone starting address 824 Network Services Processor 83 Esi-Link programming 831 Local location number 832 Esi-Link location programming 833 Delete Esi-Link location 834 Esi-Link publish list programming 835 Compression algorithm 84 ESI SIP Card programming 85 ESI ASC programming 86 ESI Mobile Messaging selection 1Shown in the same order as it appears in the programming menu on an ESI desktop Feature Phone. D.5
Saturday, April 30, 2016
Thursday, April 28, 2016
B channel (Bearer channel)
B channel (Bearer channel). An ISDN standard transmission channel used for voice or data transmission. Base station: A hardware component that is mounted on walls and ceilings to provide a radio link to an office or other area where portable telephones are used. Each base station houses two radios that allow portables to send and receive calls through the ICS. Background Music: A feature that allows you to hear music from the speaker of your Norstar telephone. It is available only if a music source has been attached to the ICS and the feature has been enabled under Feature settings in Sys prgrmmng. Basic password: A one- to six-digit password that prevents unauthorized access to the most commonly-used telephone settings. The Basic password can be assigned and changed in Passwords programming. Basic Rate Interface (BRI): An ISDN interface which uses two B channels and a D channel (2B+D). Bearer channel: See B channel. Business series terminals These terminals were developed to replace the Norstar M-series terminals. Therefore, their functionality closely parallels the M-series terminals. button caps: Interchangeable plastic caps that fit over the buttons of legacy Norstar M-series telephones. They are used to indicate the features programmed onto each programmable memory button. Button caps are either pre-printed or have clear windows that allow you to insert labels. Button Inquiry: ≤•‚ With this feature you can check the function of each programmable button on your system telephone. C Call Duration timer: ≤‡‡ A feature that allows you to see how long you spent on your last call, or how long you have been on your present call. Call Forward: ≤› A feature that forwards all the calls arriving at your telephone to another telephone in your Norstar system. To have calls forwarded outside the system, use Line Redirection. Call Forward No Answer: A feature that forwards all calls arriving at your telephone to another designated telephone in your Norstar system after a specific number of rings. Call Forward No Answer is assigned under Capabilities in Terminals&Sets programming. Call Forward On Busy: A feature that forwards all calls at your telephone to another designated telephone if your telephone is busy. This feature is assigned under Capabilities in Terminals&Sets programming. Call Forward Override: An automatic system feature that allows you to call someone and ask them to stop forwarding their calls to you. Call Information: ≤°⁄⁄ Call Information allows you to display information about incoming calls. For external calls, you can display the caller name, telephone number and the line name. For an internal call, you can display the name of the caller and the internal number. You can obtain information about r
Wednesday, April 27, 2016
Mirrored Memory Module
Mirrored Memory Module Note: For full instructions on installing the M3, see its Installation Guide (ESI #0450-0912). The Mirrored Memory Module (M3) ensures reliability and survivability of compatible ESI Communications Servers. Using RAID1-1 hard-disk drive technology, mirrored hard drives are intended to maintain system operation on one disk drive in the event a hard drive fails. No system programming is required for the M3 to function. Note: The ESI-1000 has all M3 components built-in, so the installation on the ESI-1000 of the hard-drive Memory Modules (see “Procedure for two hard-drive Memory Modules (ESI-1000),” page F.5) enables M3 operation on that system. M3 components are optional for the ESI-600 and ESI-200, and must be installed onto the ESI Communications Server main board. The M3 is a printed circuit assembly that supports two identically configured hard drives, mounted on standoffs. It also has LED indicators, an audible alarm, alarm reset button, and an IDE cable connector for connection to the main board. For the mirroring operation to function properly on the ESI Communications Server, each hard drive must be formatted and prepared by ESI. Installing the M3 (ESI-600 • ESI-200) The M3 kit consists of an M3 printed circuit board, hard drive mounting plate, faceplate, four (4) 1-inch standoffs, 12 nylon spacers (washers), eight (8) screws, and an IDE cable for connection to the main board. Refer to Fig. M3-1, below, to identify and locate where these components will be installed. Memory Modules (hard drives, or HDDs) are obtained separately. Note that each hard drive must be an ESI-formatted drive for the mirroring operation to function properly.
Tuesday, April 26, 2016
Electric strikes
Electric strikes Electric strikes are installed in a door frame where the strike plate is usually mounted. It includes a plate called the keeper or gate which is electrically released to swing out and thereby allows the latch to move through the space the keeper has vacated. There are several different types of electric strikes. Most electric strikes require 12 or 24 volts DC, and they may be fail-safe or fail-secure. A fail-safe electric strike needs power to remain locked, and is not commonly used. The most common type of electric strike is fail-secure. A fail-secure electric strike stays locked even without power from the outside coming in. To exit, a door knob or lever on the entry lockset is manually operated. Since the electric strike is not needed for this, it allows for safe exit. To provide an audible indication that the door is unlocked, DC-powered electric strikes will make a slight click when operated.1 It should be noted that the ESI Presence Management RFID Reader emits a confirmation tone when the door control relay is operated; therefore ESI recommends that a DC-powered electric strike be used with the RFID Reader for door access control. Electromagnetic locks Electromagnetic locks (magnalocks) are designed to secure any type of door or gate that closes against a fixed stop. All magnetic locks will work only with DC current, usually 12 to 24 volts. All electromagnetic locks are fail-safe. This means that they need a constant source of current to remain locked: if power is removed, the lock will open. All electromagnetic locks are silent, even when powered and locked. The lock consists of an electromagnet which mounts on the door frame and a strike plate which mounts on the moving door or gate. The strike plate is mounted in such a way that, when the door closes, it automatically self-aligns with the magnet. Magnetic force then takes over, strongly securing the door. Release is achieved by switching off power to the magnet. This type of lock secures the door from both entering and exiting, and there is no alternate method of unlocking the door. Important: Electromagnetic locks can be dangerous with respect to fire and smoke safety if not installed properly. Because of this, installation of this type of lock must be done by a licensed professional in most, if not all, areas. Before planning an installation it's very important to always check with the Local Authority Having Jurisdiction. Electric deadbolts Electric deadbolts come in several different styles, and as with electric strikes, they come in fail-safe and fail-secure configurations. The deadbolt is operated via a solenoid in the lock housing. Some models have a manual cylinder that allows exit without operating the solenoid. However, because electric deadbolts are installed separate from a standard entry lockset, they can be as dangerous as electromagnetic locks if not installed properly. Because of this, installation of this type of lock must be done by a licensed professional in most if not all areas.
Monday, April 25, 2016
Static Sensitive
Contents Static Sensitive Handling Precautions Required • There are two methods for System Initialization. The first method is to Clear All Data, except LEN0000 as a CAT terminal, and then program the System Data. The second method is to use the Resident System Program, which causes the system to configure itself automatically to the default settings, wherever the line/ trunk cards are installed. Refer to the System Data Sheet, for the default settings. • Turn on the “SW1” switch on all the PZ-PW86 units. • The “ON” lamp must be lit on all the PZ-PW86 units. 1.1. All Clear, Except LEN0000 CAT STEP 1: On the MP Card, set SW3 to “B” and press SW1. STEP 2: When the “MN” lamp on the system is lit, set SW3 to the “0” position and p
Friday, April 22, 2016
Programmable Access buttons
Scroll buttons (Up, Down) — Allow you to scroll through the items in
the telephone display panel. See “Using the NBX Telephone
Display Panel” in Chapter 7.
4 Program button — Reserved for future use.
5 Programmable Access buttons and label area — Allow you and your
administrator to assign features to specific buttons. See “Programmable
Access Buttons” and “Status Lights for System Appearance Buttons”
later in this chapter.
6 Programmable Access and label area — Allow you and your
administrator to assign features to specific buttons. See “Programmable
Access Buttons” later in this chapter.
7 Hold button — Places a caller on hold. See “Putting a Call on Hold”
in
Chapter 7
.
8 Transfer button — Sends the currently active call to another telephone.
See “Transferring a Call”
in Chapter 7.
9 Conference button — Establishes a single call with up to three
additional internal parties, external parties, or both. See “Establishing a
Conference Call” in Chapter 7.
10 Redial button — Redials the last telephone number or extension that
you called. See “Redialing a Call”
in Chapter 7.
11 Speaker button — Enables you to use the speaker phone feature. Press
the Speaker button before you dial the call, when your telephone is
ringing, or while a call is in progress. To turn the speaker phone off and
resume the conversation, pick up the ha
Wednesday, April 20, 2016
Abbreviated dialing
The Abbreviated Dialing (AD) feature allows you to store selected telephone
numbers for quick and easy dialing. Each number can be a complete or
partial telephone number, an extension number, or a trunk or feature access
code and can contain up to 24 digits. Abbreviated Dialing offers four possible
types of lists—Personal, Group, System, and Enhanced, and you can have a
total of three lists. (Of these three lists, you can have only one System List
and one Enhanced List.) You program numbers on a Personal List; numbers
on Group Lists are programmable by the controller of the list; System Lists
and Enhanced Lists are programmable only by the system manager.
To place a call using an AD list button or feature access code
1. Press and then the appropriate dial pad key on which a list
access code is administered,
or Dial the appropriate AD List code for List 1, or List 2, or List 3.
2. When you hear dial tone, dial the desired list item (1, 2, 3...).
Note: An Enhanced List may also be available; see your system
manager.
You can also program a number on an AD button that is not stored on an AD
list. This Automatic Dialing number can be up to 16 digits.
To program a number on an AD button
Note: The system manager must program a feature button as an AD
button before you can program a number onto it.
1. While off-hook, press and then the dial pad key assigned to the
AD Program feature,
or While off-hook, dial the Program access code.
You will hear dial tone.
2. Press and then the dial pad key you wish to program.
For example, to store a number in AD entry F3, press and then
3.
3. Dial the outside number, extension, or feature access code you want to
store (up to 24 digits).
4. Press # to save the entry.
You will hear confirmation tone and then dial tone.
5. Repeat Steps 2 through 4 to program additional buttons.
6. Hang up to end programming.
Abbreviated Dialing/Automatic Dialing (AD)
Monday, April 18, 2016
VLANs are logical segments within a corporate LAN
VLANs are logical segments within a corporate LAN. By assigning VLAN settings to IP-PTs, it is possible to
separate the packets transmitted by an IP-PT according to the type of data, and specify which VLAN each data
type will be sent over. This allows you to avoid generating unnecessary network traffic on each segment, and
to reduce the load on the network. As a consequence, speech quality can be assured.
Therefore, we recommend using the VLAN feature to perform VoIP communication effectively.
Some IP-PTs (e.g., KX-NT136) are equipped with 2 ports, primary and secondary, for packet communication.
Allocating these ports to different VLANs enables you to split the paths for packets depending on whether the
packet contains voice signals or data.
VLAN settings (VLAN ID and VLAN priority) for the primary port affect voice data transmitted by the IP-PT,
whereas VLAN settings for the secondary port apply to data transmitted by a PC connected to the IP-PT. When
sending packets, the IP-PT can attach information on which VLAN the packets are to be transmitted over
(VLAN Tagging). The switching hub that receives these packets reads the VLAN information and sends the
packets over the appropriate VLAN. This helps to ensure bandwidth for IP-PT voice transmissions.
In this way, an IP-PT with 2 ports can transmit voice packets from the primary port with higher priority than
other packets from the secondary port.
Sunday, April 17, 2016
LAN
Major New Features in Version 1.2 of HiPath 3000
Important Notices
G281-0788-00, April 2002
1-14 HiPath 3000 V1.2-3.0, System Description
3000sb1.fm
New Options
In connection with the control boards, the following new optional boards are available.
CMS (Clock Module Standard)
The CMS module replaces the old CGMC clock generator. The
CMS must be used in the following situations:
● Clock generator for the master system in the network
● Clock generator for HiPath cordless during operation with the
SLC16 board
● Clock generator for a single-cell cordless solution (2-channel
mode) with BS3/S base station
CMA (Clock Module ADPCM)
The CMA module is implemented exclusively in the HiPath 3550,
HiPath 3350, HiPath 3500 and HiPath 3300 systems. The module
is required as a clock generator for HiPath cordless (4-channel
mode) with the BS3/1 base station when the new control boards
are connected directly to the UP0/E ports.
LIM (LAN Interface Module)
The LIM module enables you to integrate all HiPath 3000 models
into TCP/IP-based LANs economically for
● central system administration (TCP)
● call detail recording (CDRC)
● APS transfer or
● fault management.
A 10BaseT interface (10 Mbit) with an RJ45 jack is available for
connecting to the LAN.
IMODC (Integrated analog modem)
The format of the printed-circuit board on the integrated analog
modem for remote maintenance (remote access via analog
trunks) is new. The module is plugged into the appropriate slots
on the control boards (this is not possible in HiPath 3250 or Hi-
Path 3150).
MPPI (optional music on hold from Beyertone)
The plug-in MPPI module can be used universally in all HiPath
3000 models making an economical solution available for an al-
ternative music on hold.
Saturday, April 16, 2016
key basic function
For certain functions, you can append data to the key basic function. For example, the function 26 appended by data 1 makes a Group Call Pickup key for Pickup Group 1. You can also program Function Keys using Service Codes. To clear any previously programmed key, press 000 to erase any displayed code.
Wednesday, April 13, 2016
Dialed DISA number gets ringback
Dialed DISA number gets ringback instead of stuttered dial tone The remote caller has dialed a DISA number, but has instead reached a target line, or has been routed to the prime telephone for the auto-answer trunk. The Norstar system has mapped the incoming digits from a switch onto a target line, or has been unable to map the digits anywhere. Solution 1. Verify that the switch is sending the correct number of digits for the Received number length defined in your system. 2. Verify all the digit strings that the switch should be sending. 3. Check that you have defined the correct DISA DN for your system. 4. Make sure that the published telephone numbers for your network are correct. Dialed DISA number gets dial tone instead of stuttered dial tone Possible problem The remote caller has dialed a DISA number, but has reached the Norstar system instead. The Norstar system has mapped the incoming digits from a switch onto the Auto DN. Solution 1. Verify that the switch is sending the correct number of digits for the Received number length defined in your system. 2. Verify all the digit strings that the switch should be sending.
Tuesday, April 12, 2016
Speed dial bin
Per speed dial bin (000 ~ 999) assign the telephone number that is to be called when the bin is accessed. If 13-01-01 is set to (0) do not include the trunk access code. If 13-01-01 is set to (1) include the trunk access code.
Monday, April 11, 2016
Confirm the terminal connected
Confirm the terminal connected with same ESI. If they work normally, confirm the breakdown or the wiring for the terminal. Exchange the terminal that doesn't work and the working terminal, and confirm it’s working. An external factor of the noise etc. is thought. Please reconfirm wiring and the installation, etc. Please inquire of the manufacturer when the problem occurs after it confirms it.
Sunday, April 10, 2016
Password setup
Password Setup to set the system passwords. For password entry, the system allows eight users to be defined. Each user can have a: • Unique alphanumeric name (up to 10 alphanumeric characters) • Password entry of up to eight digits (using 0 ~ 9, # and • Password level *) The IN level password is used by the System Installer for system programming. The SA or SB level password cannot access the IN level programs. The reverse type (white on black) just beneath the Description heading is the program access level. You can only use the program if your access level meets or exceeds the level the program requires. (SA level password can access to SA or SB programs, and SB level password can access to SB programs only.)
Thursday, April 7, 2016
Toll restriction limits
Code Restriction/Toll restriction limits the telephone numbers a user may dial. By allowing extensions to place only certain types of calls (e.g. local and toll free), you can better control long distance costs. The system applies code restriction/toll restriction based on the users assigned code restriction class.
The system allows for up to 15 different code restriction classes.
Wednesday, April 6, 2016
Incoming digits
The Norstar system did not receive some or all of the incoming digits. Solution 1. Check that the system hardware is receiving signals properly. 2. Verify that the switch is sending the correct number of digits for the Received number length defined in your system. 3. If the switch at the far end is sending pulse signals, make sure they are being sent at the proper rate. Pulse digits must be 300 ms or more apart for Norstar to receive them. Possible problem If remote callers are having difficulty getting through from the public network, there may be a problem with your DID Trunk Cartridge. Solution 1. Connect a single-line DTMF telephone to a DID trunk input on the DID Trunk Cartridge. 2. Use the single-line telephone to enter a Received number that has been programmed for a target line in your system. Listen for ringback.
Tuesday, April 5, 2016
number gets stuttered dial tone
number gets stuttered dial tone instead of ringback Possible problem The remote caller has tried to reach a Norstar target line, but has reached a trunk with DISA instead. Alternatively, the Norstar system has mapped incoming digits onto the DISA DN. Solution 1. Verify all the digit strings that the switch should be sending. 2. Check that you have defined a corresponding Received number for every target line in your system. 3. Check that you have defined the correct DISA DN for your system. 4. Make sure that the published telephone numbers for your network are correct. Dialed number gets dial tone instead of ringback Possible problem The remote caller has tried to reach a Norstar target line, but has reached the Norstar system instead. Norstar has mapped the incoming digits onto the Auto DN. Solution 1. Verify all the digit strings that the switch should be sending. 2. Check that you have defined the corresponding
Saturday, April 2, 2016
Remote
Remote feature code gets no response Possible problem A Norstar user has called into another Norstar system and is trying to activate a remote feature but gets no response after dialing the feature code. Solution 1. Make sure that the remote caller is dialing the feature code correctly. Use the asterisk (*) character, followed by the feature code, to activate a remote feature. Do not use ≤ for accessing features on a remote Norstar system. 2. Make sure that the remote user is dialing tones, not pulses, once the call is answered.