Mivoice Office 250: Features and Programming Guide Release 6.3 Sp5
Mivoice Office 250: Features and Programming Guide Release 6.3 Sp5
For additional information and/or technical assistance in North America, certified technicians may contact:
Mitel Networks Corporation
Technical Support Department (USA)
1146 North Alma School Road
Mesa, AZ 85201
1-888-777-EASY (3279)
Trademarks
The trademarks, service marks, logos and graphics (collectively "Trademarks") appearing on Mitel's
Internet sites or in its publications are registered and unregistered trademarks of Mitel Networks
Corporation (MNC) or its subsidiaries (collectively "Mitel") or others. Use of the Trademarks is prohibited
without the express consent from Mitel. Please contact our legal department at [email protected] for
additional information. For a list of the worldwide Mitel Networks Corporation registered trademarks, please
refer to the website: http://www.mitel.com/trademarks.
Limited Warranty
Mitel warrants that its products will, if delivered to the end-user in undamaged condition, be
free from defects in material and workmanship under normal use and service for the period set
forth on the current warranty periods as published in the U.S. Price List from time to time and
substantially in conformance with the documentation (functional and operating specifications)
that Mitel publishes regarding same (end-user reference and operating manuals and guides
relating to the program). Mitel does not, however, warrant that the functions contained in the
software program will satisfy Dealer's particular purpose and/or requirements or that the
operation of the program will be uninterrupted or error free.
Mitel shall incur no liability under this warranty and this warranty is voidable by Mitel (a) if the
product is used other than under normal use, with certified repair and maintenance service and
under proper environmental conditions, (b) if the product is subject to abuse, misuse, neglect,
flooding, lightning, power surges, third-party error or omission, acts of God, damage, or
accident, (c) if the product is modified or altered (unless expressly authorized in writing by
Mitel), (d) if the product is installed or used in combination or in assembly with products not
supplied or authorized by Mitel and/or which are not compatible with or are of inferior quality,
design, or performance to Mitel or Mitel supplied products so as to cause a diminution or
degradation in functionality, (e) if there is a failure to follow specific restrictions in operating
instructions or (f) if payment for product has not been timely made.
The sole obligation of Mitel and the exclusive remedy and recourse of Dealer under this
warranty, or any other legal obligation, with respect to product, including hardware, firmware,
and software media, is for Mitel, at its election, to either repair and/or replace the allegedly
defective or missing product(s) or component(s) and return (prepaid) same (if necessary), or
grant a reimbursement credit with respect to the product or component in the amount of the
sales price to the Dealer. With regard to a software program design defect, however, to the
extent it prevents the program from providing functionality and/or operating as intended by
Mitel, is service affecting, and prevents beneficial use of the product, Mitel does undertake to
use its best efforts to devise a suitable corrective solution to the problem within a reasonable
period of time; should said action, however, not substantially resolve the problem, then Mitel
reserves the right to substitute a new release (“stream”) of software as soon as it is generally
made available by Mitel. The above, with regard to a software design defect, likewise,
constitutes the sole obligation of Mitel and exclusive remedy of Dealer hereunder.
The responsibility of Mitel to honor the express limited warranty stated above also shall be
predicated on receiving timely written notice of the alleged defect(s) with as much specificity
as is known within thirty (30) calendar days of the malfunction or by the expiration of the warranty
period (plus thirty [30] calendar days), whichever occurs first. Mitel shall further have the right
to inspect and test the product to determine, in its reasonable discretion, if the alleged
malfunction is actually due to defects in material or workmanship. Unless waived by Mitel,
Dealer agrees to return (prepaid) the allegedly defective product or component to Mitel for
inspection and/or testing, and, if appropriate, for repair and/or replacement.
v
Limited Warranty
NOTICE
The above express Limited Warranty is in lieu of all other warranties, express or implied, from Mitel Net-
works Corporation, or Inter-Tel, Inc., and there are no other warranties which extend beyond the face of this
warranty. All other warranties whatsoever, including the implied warranty of merchantability and the implied
warranty of fitness for a particular purpose relating to use or performance of the product, including its parts,
are hereby excluded and disclaimed.
In no event shall Mitel Networks Corporation, under any circumstances, be liable for nor shall a purchaser
(directly or indirectly) be entitled to any special, consequential, incidental, indirect, punitive, or exemplary
damages as a result of the sale or lease of product including but not limited to failure to timely deliver the
product or failure of product to achieve certain functionality, or arising out of the use or inability to use the
product, in whole or in part and including but not limited to loss of profit, loss of use, damage to business or
damage to business relations even if notified of the possibility of such damages. Mitel shall not be liable for
personal injury or property damage unless caused solely by Mitel’s negligence.
vi
Network Security Statement
Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be
removed. If this package is used in a product, Eric Young should be given attribution as the
author of the parts of the library used. This can be in the form of a textual message at program
startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
Redistributions of source code must retain the copyright notice, this list of conditions and the
following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
All advertising materials mentioning features or use of this software must display the following
acknowledgment:
“This product includes cryptographic software written by Eric Young ([email protected])” The
word ‘cryptographic’ can be left out if the routines from the library being used are not
cryptographic related.
vii
Secure Socket Layer
If you include any Windows specific code (or a derivative thereof) from the apps directory
(application code) you must include an acknowledgment:
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available version or derivative of this code
cannot be changed. i.e. this code cannot simply be copied and put under another distribution
license [including the GNU Public License.]
viii
Table of Contents
Limited Warranty. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Chapter 1:
New Features
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
System Documentation Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Important Introductions and Discontinuations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
ix
Document Title - Using Variables
Direct Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Flexible SIP Header Configuration to SIP Trunk Provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Restricted CLI in SIP Header . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Display only Caller Identification instead of Transfer Information . . . . . . . . . . . . . . . . . . . . . . . .9
Alternate Lamp Indication on Phone/ PKM Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Release Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Notification of no Primary or Local Attendant Configured . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
SSL Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Security Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Discontinuation of UCX (Unified Communicator Express) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
x
Table of Contents
Virtualized PS1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
New PS1 Hardware Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
MiVoice Office 250 Attendant Console Refresh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Digital Telephone Refresh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Video Support for SIP to SIP Calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
BT CLIP CLID Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
SIP ACD Agent Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
xi
Document Title - Using Variables
Terminology Changes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Chapter 2:
About Database Programming
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Chapters in This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
System Administration & Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Planning the Programming Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Programming Wizards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Programming Checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
xii
Table of Contents
DB Programming Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Viewing Mitel DB Programming Panes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Changing Displayed Information in the Programming Window . . . . . . . . . . . . . . . . . . . . . . . . . 47
Using a Keyboard Instead of a Mouse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Filtering Lists of Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Using SQL Statements to Filter Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Using SQL Wildcard Characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Combining SQL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Using the Clear Filter, Save Filter, and Load Filter Commands . . . . . . . . . . . . . . . . . . . . . . 54
Database Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Chapter 3:
System Management
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Security Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
SSL Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
System Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Passwords and Password Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Encrypted Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Increased Security Key Strength . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
SSL Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
SSL Port Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Maintenance Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
xiii
Document Title - Using Variables
Changing Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Changing Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Downgrading Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Troubleshooting Licensing Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Backup Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Save Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Restore Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
System Resets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Immediate System Resets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Call Processing Resets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Major Reset Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
System Requires Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Scheduled Reset Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Force Reset If Not Idle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Days of the Week . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Always Reset On Days Of Week . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Reboot System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Reset System Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Message Print . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Output Port And Local Backup Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Message Print Output Active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Output Device Line Width . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
xiv
Table of Contents
Print Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Station Message Detail Recording . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Feature Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Programming SMDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Accessing the SMDR Socket Directly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Chapter 4:
Private Networking and System Nodes
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Local Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Remote Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Programming Remote Node Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Changing Remote Node Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Deleting a Remote Node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Remote Node Trunk/IP Connection Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Programming Remote Node Trunk/IP Connections Groups . . . . . . . . . . . . . . . . . . . . . . . . 112
Deleting Node Trunk Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Using a Remote Node Search Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Programming Remote Node Audio for Calls Camped onto this Device . . . . . . . . . . . . . . . 114
Modems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Off-Node Modems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Local Modems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Programming Local Modem Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Configuring Local Modems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
xv
Document Title - Using Variables
Chapter 5:
Numbering Plans
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
xvi
Table of Contents
Chapter 6:
Trunks and Gateways
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
xvii
Document Title - Using Variables
xviii
Table of Contents
xix
Document Title - Using Variables
xx
Table of Contents
Chapter 7:
End User Features
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Do-Not-Disturb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
xxi
Document Title - Using Variables
Hold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Alternate Message Source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Silent Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
xxii
Table of Contents
Record-A-Call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
Redial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
xxiii
Document Title - Using Variables
Assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Chapter 8:
Phones and Devices
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
xxiv
Table of Contents
xxv
Document Title - Using Variables
xxvi
Table of Contents
Keymaps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Viewing Default Keymaps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
Programming Keymaps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
Adding New Keymaps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Programming Phone Keymaps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Keymap Number Column . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Keymap Value Column . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Keymap Selection Column . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
Selecting Standard or Alternate Keymaps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463
Changing Keymap Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Copying and Pasting Keymaps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
Programming Phone Keymap Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Programming DSS/PKM Keymaps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468
Automatically Populating DSS/PKM Keymaps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Manually Populating DSS/PKM Keymaps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Programming DSS/PKM Phone Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
Programming DSS or PKM Devices for Phones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
xxvii
Document Title - Using Variables
Assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
Configuration Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
Feature Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
Programming Configuration Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488
Conference Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
OfficeLink Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
xxviii
Table of Contents
Attendants. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
Chapter 9:
Extension Lists and System Groups
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528
xxix
Document Title - Using Variables
xxx
Table of Contents
xxxi
Document Title - Using Variables
Chapter 10:
System and Device IP Settings
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628
xxxii
Table of Contents
xxxiii
Document Title - Using Variables
Sockets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668
Enabling or Disabling a Socket Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668
Entering a Socket Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668
xxxiv
Table of Contents
Chapter 11:
SIP Peers
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
xxxv
Document Title - Using Variables
xxxvi
Table of Contents
Chapter 12:
System Settings
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756
xxxvii
Document Title - Using Variables
Chapter 13:
Users
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 814
xxxviii
Table of Contents
xxxix
Document Title - Using Variables
Chapter 14:
Voice Processor Features and Programming
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864
Program Planning Sheets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864
Mitel Voice Processing Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864
Supporting Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 865
xl
Table of Contents
xli
Document Title - Using Variables
Record-A-Call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 921
Feature Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 921
UVM Record-A-Call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 922
MiCollab Unified Messaging Record-A-Call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 923
xlii
Table of Contents
Directories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 956
Locating a Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 956
Entering a Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 957
Changing the First/Last Name Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 957
Listening to the Next/Previous Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 958
Accepting a Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 958
Requesting Additional Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 958
xliii
Document Title - Using Variables
Fax-On-Demand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 980
Fax-on-Demand Timers and Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 980
Fax Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 982
Allow International Calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 983
Outgoing Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 983
Start/Stop Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 984
Days of the Week . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 984
Fax Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 984
Chapter 15:
Subscriber Mailboxes
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 990
xliv
Table of Contents
xlv
Document Title - Using Variables
Chapter 16:
Voice Processing Management
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1028
Chapter 17:
xlvi
Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1054
Chapter 18:
System Diagnostics
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1062
xlvii
Document Title - Using Variables
xlviii
Table of Contents
xlix
Document Title - Using Variables
Alarms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1155
Alarm Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1155
Network Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1156
Displaying Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1156
Alarm Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1157
Clearing an Alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1158
Responding to a Major Alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1158
l
Table of Contents
li
Document Title - Using Variables
lii
Chapter 1
NEW FEATURES
Features and Programming Guide
INTRODUCTION
This chapter lists new features related to the MiVoice Office 250 Database (DB) Programming
application. This includes features used to complete system configuration and perform system
adds, moves, and changes after the system is installed. For information about new features
related to system hardware, licensing, or upgrades, refer to the MiVoice Office 250 Installation
Manual.
For additional system documentation, refer to the “Documentation” folder of the system software
DVD. You can also find all documentation on the Mitel eDocs Web site (http://edocs.mitel.com).
2
New Features
OTHER UPDATES
A Logout From ACD Hunt Groups During Hot Desk Logout system flag is used to make
agents or members of ACD Hunt Groups logout automatically during Hot Desk logout.
3
Features and Programming Guide
E-MAIL GATEWAY
A new flag Allow any authorization servers allows system attempt authentication to multiple
IP addresses that resolve to the E-mail SMTP Server.
4
New Features
IMPROVED FUNCTIONALITY
• Callback from Voice Mail feature can be used by SIP phones.
• A Hunt Group Supervisor using a 6900 SIP Phone can now initiate Station Monitor, Barge-
In and Steal. Barge-In and Steal features are available after activating Station Monitor on
6900 SIP Phone. This enhancement requires MiVoice Office Application Suite Release 5.2
or later.
SECURITY UPDATES
New OpenSSL version 1.0.2r.
5
Features and Programming Guide
SECURITY UPDATES
• MiVoice Office 250 is now GDPR compliant.
• MiVO 250 offers TLS 1.2 on all secured system connections. The System Administration
(Sys Ad) and the Database Programming (DBP) applications connect with TLS 1.2 to MiVO
250.
• The default value of OAI/WEB/ SIP ports are set to disabled. It is recommended to set this
value to enabled before the ports are used. Upgrading an existing system implements this
new default setting.
The Mitel 5613/5614 SIP Phones are supported on MiVoice Office 250 with the same
functionality as the previous models of Mitel 5603/5604.
6
New Features
Page zone numbers: With improved OAI functionality 6900 phones can now select a Page
Zone ID in Keymap profiles on MiVO AppSuite.
If CT Gateway is in use, this will need to be upgraded to 5.0.63.0 to allow the new
NOTE
OAI functionality to be used.
OTHER UPDATES
AWP shows the 69xx SIP phone as separate device type in the Device General tab.
SECURITY UPDATES
• New OpenSSL version 1.0.2n.
• Meltdown/Spectre: The new Bios on PS-1 Dell R230 servers is supported.
• GDPR documents are available as part of the Release 6.3 SP1 documentation.
• Inbound Authentication is now available for SIP Voicemail.
When creating a SIP Voicemail, it is recommended to populate Inbound Authentication
credentials to avoid any unauthorized access to MiVO250.
7
Features and Programming Guide
No licenses are needed. The MiVoice Office 250 Release 6.3 detects CloudLink as a Trusted
Application and automatically releases the needed OAI and SIP trunk licenses. The Trunk group
configuration for CloudLink is supported with a new template for CloudLink.
The 6900 SIP phone configuration is supported with a new 6900 SIP phone type, that can be
used instead of the generic SIP phone type.
The MiVoice Office 250 Rel 6.3 supports additional SIP extension and trunk features, handset
flags and security improvements.
DIRECT PAGE
Direct Page is an enhancement to the existing Page feature, which allows you to page to the
loudspeaker of an individual IP/ Digital Phone instead of a whole Paging Zone.
8
New Features
• To configure an IP/ Digital Phone as a destination for Direct Page the phone must be
assigned to a Paging Zone, which has the Use zone for Direct Page option enabled. This
is disabled by default.
• A Direct Page is then activated by dialing 7 (Default Feature Code for Paging), followed by
the configured Paging Zone, and then the extension number of the phone you want to
Direct Page.
• Direct Page can only be activated by Phones that have the Initiate Direct Page flag set to
Yes.
• Analog and SIP phones cannot receive a Direct Page, but can initiate a Direct Page to an
IP/ Digital Phone.
RELEASE KEY
Actual desktop phones on MiVoice Office 250 do not have the old “infinity key” to release a call
with a simple keyclick. For example, a receptionist with a headset still had to use the hook in
the cradle of the desktop phone to release calls. Now it is possible to configure the release
call functionality on any phone key. The configuration can also be defined by the user in the
User Web Portal (UWP).
9
Features and Programming Guide
SSL CERTIFICATE
You can generate Certificate Signing Request and Upload SSL Certificate settings to create
a CSR request and upload customer’s own certificate on the system.
SECURITY UPDATES
• New OpenSSL version 1.0.2l
• Improvements have been made to the existing Firewall, including the ability to save and
restore settings. Firewall configuration options have been extended to include the PS-1
when equipped with the MiVoice Office 250 6.3 software release.
10
New Features
The debug logging level for UVM is only to be used for specific debugging
activity. It is not recommended to enable debug logging level without prior
consultation with Mitel Product Support. Alarm A150 `Extended APP
NOTE Logging is Enabled` will appear until all applications are turned off debug
logging level again. The Alarm 150 will not appear on administrator
telephones, it will only appear within System Administration and
Diagnostics, and Message Print.
The MiVoice Office 250 v6.2 SP2 has included a series of fixes to prevent the Dirty COW
vulnerabilities from affecting the system.
OTHER ENHANCEMENTS
• The MiVoice Office 250 Release 6.2 SP2 uses OpenSSH 7.1p1 and OpenSSL 1.0.2j.
• The MiVoice Office 250 Release 6.2 SP2 supports Dell R230 as PS-1
11
Features and Programming Guide
WATCHDOG IMPROVEMENT
The watchdog monitors activity of call processing. If call processing does not respond to the
watchdog every 30 seconds, it will restart the MiVoice Office 250 system. New Logs are in the
cp_watchdog_observer_log.txt file available in SysAdmin and Admin Web Portal (AWP).
T1/E1 REFRESH
The FPGA component on the Dual T1/E1 card had to be replaced. The new card version is
backward compatible to previous releases. Release 6.2 SP1 now also contains the firmware
upgrade mechanism.
12
New Features
SYSTEM PARK
System Park is a feature that allows calls to be parked by a phone, then either retrieved again
by that phone, or retrieved by another phone.
The MiVoice Office 250 Release 6.2 supports the following features.
• The Park/Pickup key with the same destination may be configured on several phones.
• then any of these phones can park or retrieve calls from the same destination.
• Multiple calls may be parked on the same destination.
• If in a call, the call will be added to the queue of parked calls.
• If not in a call, the first parked call on this destination will be retrieved.
• Parked calls will recall the person who parked the call after a timeout
• Phantom destinations use the new Park Recall Timer (default 180s, range 30-600s)
• Hunt Groups use the existing Hunt Group Recall Timer (default 180s, range 1-65'535s)
• If a call is parked on a Park/Pickup key, the key will flash.
• except if the Hunt Group has the ‘Group Call Pick-up’ flag disabled.
• Additional Notes:
• Phones without a Park/Pickup key can use the features 'transfer' and 'reverse transfer'
to park and retrieve calls from destinations like "Park Location 1". Therefore it is rec-
ommended to give simple numbers to such Phantom or Hunt Group destinations.
• Assigning a Park/Pickup key to a Hunt Group destination is an enhancement to the
existing Group Pick-up feature, allowing Group Pick-up using a single key press, whilst
also allowing for a visual indication.
Until now, Audiotex recordings could only be recorded using a phone with access to the Voice
Mail System Administrator’s Mailbox. Each recording is associated with a recording number
and assigned to the application(s) in Database Programming.
From release 6.2, you can now import audio files and use them for Audiotex applications,
including Auto Attendant (AA) and Call Routing Announcement (CRA) features. This will
13
Features and Programming Guide
improve the quality and fidelity of the recordings and allow pre-recorded, professional
recordings for auto attendant greetings and announcements.
The MiVoice 5624 Wireless Phone is Mitel’s first VoWiFi (Voice over Wi-Fi) handset operating
on 802.11n network; it supports the deployment of voice over a Wireless LAN (WLAN) without
degrading the performance of an existing .11n network capacity. A MiVoice 5624 Wireless
Phone-based solution delivers trouble-free WLAN vendor interoperability and scalability, as
well as the capacity to integrate and communicate with a comprehensive range of external
sources.
Notes:
• MiVoice 5624 Wireless Phone is already available outside North America.
• In North America the regulatory approval and introduction is in progress with MiVoice
Business and will then also be available for MiVoice Office 250
• MiVoice 5624 Wireless Phone is Mitel’s rebranding of the earlier certified Ascom i62 and
is technically the same. (Mitel SIP Center of Excellence specifications, 14-4940-00310).
OTHER ENHANCEMENTS
• Security improvements for SSL connections (Webserver, SSH) used on the system.
• Open SSH 7.1
• OpenSSL 1.0.2a
• Web services are only accessible via TLS 1.2 encryption
To change from Ringback to MOH for Parked Calls, two configurations are needed:
14
New Features
Change the ‘Audio for Calls Ringing at this Device’, from Ringback to Music, at the Park
Phantom(s)
Change the ‘Audio for Transfer to Ring’ from ‘Ringback’, to ‘Use Next Device’s Audio Source’,
at the Trunk Group.
OTHER ENHANCEMENTS
15
Features and Programming Guide
The MiVoice Office 250 Release 6.1 SP1 supports the following features.
• Video calls between SIP clients connected to different nodes.
• Backward compatibility. A P2P video call from 6.1 SP1 node to 6.1/6.0/5.1 node is modified
to an audio call.
• SIP video devices as remote extensions via MBG.
• Video calls across the network like any other desktop device.
When enabled, Alarm 149 will be generated each time a SIP Phone registers with the MiVoice
Office 250, where the password used for the registration is either the same as the SIP Phone
extension number or it is left empty. The alarm is raised against the SIP phone group to which
the SIP Phone belongs. The SIP Phone will still able to register and operate, however the alarm
will notify the Administrator that security needs to be reviewed immediately for this SIP Phone
Group. This alarm will be cleared automatically by the system as soon as the SIP Phone
registers again using new credentials. Note that the Administrator first has to make the password
secure and cannot simply clear this alarm.
This feature is enabled by default. Mitel recommends that you do not disable this feature. The
Alarms Notification Feature within System Administration and Diagnostics is used to send an
email to an administrator when a System Alarm is generated.
16
New Features
PRODUCT RE-BRANDING
Mitel has introduced new product naming as follows:
For products related to releases prior to 6.1, naming will reference their previous,
NOTE
non re-branded names.
The re-branded interfaces for Database Programming, System Administration and Diagnostics,
Administrator Web Portal, and the User Web Portal are updated with the new Mitel logo and
color scheme. Additionally, the re-branding includes, but is not limited to, the following other
MiVoice Office 250 interfaces:
• MiVoice Office 250 Installation Wizards
• MiVoice Office 250 Private Networking
• MiVoice Office 250 PS1 Server
VIRTUALIZED PS1
The PS1 can now be deployed as a virtual appliance running in a VMware environment. Please
see the MiVoice Office 250 Installation Manual for details regarding the installation and upgrade
to virtualized PS1.
Note: Throughout this document, PS-1 refers to either the physical dedicated hardware
component or the virtual appliance, unless specified.
17
Features and Programming Guide
The R220 Server supports the MiVoice Office 250 PS1 software, and it is capable of running
the 32-bit Debian 4.0 based distribution with the MiVoice Office 250 components.
As of 2014 new drivers for the Sentinel HASP are available from SafeNet Inc., and are
compatible with a variety of 64-bit Windows versions, including Windows 7 and Windows 8.
The MiVoice Office 250 Attendant Console Release 3.5 can read data from valid HASP keys
on the following Windows Operating systems:
• Windows 7 (32- and 64-bit)
• Windows 8 (32- and 64-bit)
• Windows 8.1 (32- and 64-bit)
• Windows 10 (32- and 64-bit)
No new features are added to the refreshed series of Digital Telephones. To the end-user there
are no differences in the installation and operation between the refreshed Digital Telephones
and the previous versions.
The refreshed MiVoice 8568 and 8528 Digital Telephones are supported on all Mitel 5000 CP
/ MiVoice Office 250 systems that currently support these phones.
18
New Features
BT CLIP supports the delivery of Caller ID information on analog trunks in the UK, and the
standard is commonly known as BT CLIP. BT CLIP is an on-hook capability that provides the
user with information about the caller before actually answering a call.
A new trunk Service Type and timer parameters are added in MiVoice Office 250 Database
Programming to support BT CLIP. BT CLIP replaces ETSI DTMF Caller ID. When configuring
a Loop Start trunk, the Service Type options now include Bellcore FSK Caller ID and British
Telecom FSK.
See “Caller ID, DNIS, and ANI“ on page 188 for details.
SIP phones can be added to a Basic or UCD Hunt Group member list. Calls routed to a particular
Hunt Group may be directed to a SIP phone.
For a SIP phone to use the ACD features (Log in, Log out, Wrap-Up Terminate), an OAI
application must be used in conjunction with the SIP phone. Mitel Phone Manager is the
recommended application.
See Table 113 and Table 114 for a full list of system features and phone features compatible
with each type of SIP phone.
19
Features and Programming Guide
There are no impacts to any of the 5000 CP documents or help files as a result of the following
new features in release 6.0 SP3.
The 5000 CP v6.0 SP3 has included a series of fixes to prevent the Shellshock vulnerabilities
from affecting the system.
20
New Features
Database Programming now allows the DTMF Payload type to be selected for SIP Peers, from
a range of values that correspond to those supported by the SIP service provider.
The default DTMF Decoding Payload value applies to North American, UK, and Australian
systems.
See “Configuring SIP Peer Programming Options“ on page 742, and “DTMF Decoding Payload“
on page 752 for details.
See“Propagate Original Caller ID“ on page 551, and “Do Not Propagate Original Caller ID to
P-Asserted Identity“ on page 552 for details.
If the flag is set to No, the to/from/contact headers in the SIP register correspond to the out-
bound username. If the flag is set to Yes, the to/from/contact headers in SIP register correspond
to the trunk group Caller ID.
21
Features and Programming Guide
22
New Features
Mid-Call Features are only supported with other networked 5000 CPs running Release v6.0
NOTE
SP1 and higher software.
See “Audio for Calls Holding for this Device“ on page 545
This will allow the called party to redial the external number back successfully, and it will allow
incoming calls to match System Speed Dial numbers.
23
Features and Programming Guide
24
New Features
CONFIGURATION WIZARD
The Configuration Wizard has been updated to make start-up easier, and to easily configure a
variety of system level parameters including IP and e-mail settings, expansion modules, IP
phones, voice processor options, and a variety of devices.
“Configuring SIP Peer Programming Options“ on page 742, including the following:
• “Use Registered Username“ on page 751
• “Disable Domain Validation“ on page 752
• “Supports Display Updates“ on page 752
• “Supports Ad Hoc Conferencing“ on page 752
25
Features and Programming Guide
DHCP SERVER
The 5000 CP now has an embedded DHCP server. The embedded DHCP server makes the
5000 CP capable to automatically provide the proper DHCP Options for programming IP
phones, thereby reducing the chances of misconfiguration, and reducing installation time.
The DB Test and Repair and DB Converter user interfaces will be redesigned and incorporated
into the new Backup Utility window. Scheduled backups will be updated to allow for a bundled
save.
CONNECTION WIZARD
If the Configuration Wizard is not displayed at startup, a new dialog listing connection tips for
the Processing Server to connect with the Base Server will display instead of the Connection
Wizard. This dialog will only be displayed when connecting to a Processing Server in online
mode that is disconnected from the Base Server.
26
New Features
When configuring a Loop Start trunk, the Service Type options now include Bellcore FSK Caller
ID and ETSI DTMF Caller ID.
See “Caller ID, DNIS, and ANI“ on page 188 for details.
Depending on whether an MBG is connected to the 5000 CP network, and remote 53xx series
phones are outside the network, the appropriate NAT Address Type setting needs to be
programmed. See “NAT Address Type“ on page 673.
27
Features and Programming Guide
INACTIVITY TIMER
System Administration & Diagnostics and Database Programming now use the same timer for
inactivity. The timer is programmed in the Options window on the Advanced Tab in System
Administration & Diagnostics.
With the popularity of hosted e-mail providers, the purpose of this enhancement is to extend
the capabilities to include Gmail and Office 365.
See the MItel 5000 Communications Platform Unified Voice Messaging E-Mail Synchronization
Administrator Guide (available on eDocs at http://edocs.mitel.com/default.htm#5000_anchor)
for details.
28
New Features
TERMINOLOGY CHANGES
To accommodate changes in technology and/or to better align with the overall corporate
marketing strategy, the following product terminology changes have been implemented in the
v6.0 release:
• The Database Operations menu is renamed Operations
• System Administrative Accounts is renamed Maintenance Accounts
• The Administrative Web Session (AWS) is renamed the Administrative Web Portal (AWP)
29
Features and Programming Guide
30
Chapter 2
ABOUT DATABASE PROGRAMMING
Features and Programming Guide
INTRODUCTION
This guide provides descriptions and procedures for performing common administrative tasks
using the MiVoice Office 250 Database (DB) Programming application. This includes
instructions to complete system configuration and perform system adds, moves, and changes
after installation.
The guide assumes that the system is installed and that test calls have been placed to verify
that the system is properly connected to Central Office (CO) lines. It does not cover installation
programming, which includes hardware programming, system upgrades, and licensing.
For more information about installation programming, refer to the following resources:
• MiVoice Office 250 Installation Manual
• MiVoice Office 250 DB Programming Help
32
About Database Programming
• SIP Peers: Provides programming instructions for SIP peer (SIP-enabled) phones, trunk
groups, and voice mails.
• System Settings: Describes features that you can use to customize your system settings.
• Users: Provides programming instructions for creating Users in the Users folder.
• Voice Processor Features and Programming: Describes voice processing system fea-
tures and programming for the MiVoice Office 250.
• Subscriber Mailboxes: Provides information to create and configure subscriber mailboxes
for Unified Voice Messaging (UVM) systems.
• Voice Processing Management: Describes tools that you can use for UVM maintenance
and how to save or restore UVM databases.
• Voice Processor Reports: Provides information to generate customized system voice
processing reports.
• System Diagnostics: Provides fundamental instructions for interpreting the output data
from the system diagnostic utilities.
Mitel MiVoice Office 250 Database (DB) Programming is installed as part of the System
Administration & Diagnostics application along with other supporting system management tools
and utilities. After installing the System Administration & Diagnostics application, administrators
can quickly launch any of the following:
• DB Programming
• Administrative Web Portal (AWP)
• Secure Shell (SSH) Connection (PuTTY)
• MiVoice Office 250 Database Utilities (which includes Database Test and Repair)
• MiVoice Office 250 MOH Utility (the Music on Hold utility)
• Upload Utility
After establishing a connection to a MiVoice Office 250 node, System Administration &
Diagnostics queries call, resource/device, system, and system status data from the node. It
then uses a variety of content controls to display this information in a well-organized manner
that allows administrators to easily read and understand the data. The data can be refreshed
manually, or the application can be configured to refresh it automatically every so often.
The System Administration & Diagnostics installation includes an option to uninstall previous
installations of DB Programming. This option appears only when previous installations are
detected. Mitel highly recommends that you allow previous DB Programming versions/utilities
to be uninstalled, as this will prevent any confusion as to which versions of the applications are
33
Features and Programming Guide
being used. The older versions of DB Programming can then be re-installed using the DB
Programming “plug-ins” concept, as described below.
Plug-Ins
After the v4.0 release, newer versions of DB Programming will be installed as “plug-ins” so that
the main System Administration & Diagnostics application does not have to be re-installed just
to get a newer version of DB Programming. Note that you cannot install a plug-in release unless
the full System Administration & Diagnostics release is already installed.
The correct method for deployment on a new PC, or to update a PC with the application already
installed, is to install the most recent version of the System Administration & Diagnostics
application (which will usually include the most recent Database Programming version), then
add the required plug-ins for all previous Database Programming versions.
For complete information on this application, refer to both the Mitel System Administration &
Diagnostics Guide and the help accessible from the application’s user interface.
TECHNICAL SUPPORT
You can search the following Knowledge Base (KB) Center regarding DB Programming issues:
The KB is a current repository for resolved issues and common questions involving Mitel
products. If the problem persists, contact Technical Support.
NOTICE
The following certification is required to install this equipment and to receive technical support:
• MiVoice Office 250 Basic certification
• Convergence Technology Professional (CTP) certification
Technical support is provided for authorized products only.
PROGRAMMING WIZARDS
DB Programming includes several wizards that allow you to quickly program different parts of
the system without having to navigate to separate areas in DB Programming. Wizard details
and instructions are included in the appropriate sections.
34
About Database Programming
The Configuration Wizard allows you to quickly configure a system with enough basic
information to get the system up and running. Verify the system type to make sure it matches
the system you have. If there is a difference, either the hardware is incorrect or the license type
is incorrect. See “Launching the Configuration Wizard“ on page 75 for instructions on how to
launch the wizard. For complete information about the Configuration Wizard, refer to the MiVoice
Office 250 DB Programming Help.
The Networking wizard allows you to quickly configure IP networking or T1/E1 PRI networking
for existing or new nodes. See “Launching the Networking Wizard“ on page 115 for instructions
on how to launch the wizard. For complete information about the Networking Wizard, refer to
the MiVoice Office 250 DB Programming Help.
The Connection Wizard is a troubleshooting tool that helps you to establish a connection to the
Base Server. If the Configuration Wizard is not displayed at startup, a new dialog listing
connection tips for the Processing Server to connect with the Base Server will display instead
of the Connection Wizard. This dialog will only be displayed when connecting to a Processing
Server in online mode that is disconnected from the Base Server.
For complete information about the Connection Wizard, refer to the MiVoice Office 250 DB
Programming Help.
35
Features and Programming Guide
PROGRAMMING CHECKLIST
After all system hardware and software is installed, perform the programming in the order
discussed here.
t
36
About Database Programming
Authentication
When launching v4.0 or later DB Programming, the system asks for a username and password
if you are not already authenticated through System Administration & Diagnostics. If the
username or password is not valid, an error message appears, and the system asks for a
username and password again. If authentication fails three times, DB Programming shuts down.
37
Features and Programming Guide
Beginning in Release 5.1, the DB Programming window has been updated to reflect the
following design elements:
• Windows Vista style controls
Although the DB Programming window displays using the Windows Vista style folders
view by default, you can revert back to the Classic Style. Windows Vista style controls
NOTE (such as dialogs and buttons) remain.
Some of the graphic representations in this guide are shown using the Windows Vista
style.
• Several icons updated using current standards, modern styling and standard Microsoft
images wherever possible and appropriate
• Tool bar buttons updated:
- As noted above
- The Refresh button has been removed but this option is still available in the View
menu
- The Collapse All button has been removed but this option is still available in the View
menu
- The Help button has been removed but this option is still available in the Help menu
• Navigation bars replaced with Windows 7 styling
• A drop-down list added for easier navigation to recently visited folders
• Yes/No options changed to drop-down lists
• Bread crumb trails added to directly navigate to folder in a searched path
• Unneeded animation removed from some dialogs
• Use of the newer Explorer Style Tree View using folders and arrows
If the DB Programming session is slow to respond, shut down any other programs—including
antivirus programs—that may be running. If this action does not improve response speed,
NOTE make sure the computer meets the minimum requirements. For more information about
computer requirements, refer to the Specifications chapter in the MiVoice Office 250
Installation Manual.
38
About Database Programming
1
2
3
5
6
1 Header Shows the title of the DB Programming application. See page 40.
5 Status bar Shows system and connection information. See page 45.
39
Features and Programming Guide
HEADER
The header displays the title of the DB Programming application, “<name>[(Offline)] - Mitel DB
Programming,” where:
• the <name> indicates the name of the session.
• the (Offline) appears if the session is Offline (previously known as Local).
• Mitel DB Programming is the name of the application.
MENU BAR
Menus include the File, View, Operations, Tools, Favorites, and Help menus.
FILE MENU
This menu contains the Exit option only, which ends the DB Programming session.
VIEW MENU
40
About Database Programming
52xx/53xx IP phones awaiting PIN activation do not appear in the IP Device Status dialog box.
NOTE See “Using PIN Activation for 52xx/53xx Phones“ on page 387 for details about the PIN
Activation feature.
OPERATIONS MENU
The Operations menu provides several options to help manage the system, as described in
the following sections:
• Backup Operations on page 1031
• DHCP Server Options on page 640
• Error Information on page 83
• Export/Import Devices on page 116
• IP Device Status on page 629
• Software License Operations on page 69
• System Manager CA Certificate Upload on page 123
• Voice Processor Operations on page 1031
• Default Database on page 82
• Reset Call Processing Application on page 89
• Reset System on page 89
TOOLS MENU
FAVORITES MENU
From the Favorites menu, you can add shortcuts to your most frequently visited folders. The
menu also has options for sorting the list and deleting entries.
41
Features and Programming Guide
HELP MENU
TOOLBAR BUTTONS
Table 2 shows Mitel DB Programming toolbar buttons.
Table 2: Toolbar Buttons
ICON NAME DESCRIPTION
Back and Move backward and forward between views. You can also use the
Forward Back or Forward options in the View menu.
Recent This drop-down list allows you to jump to any of the twenty most
recently visited folders. A maximum of 20 folders will be listed.
Up This button allows you to move up a level in the folder hierarchy. The
button is disabled if you are at the top level of a folder.
Bread Crumb These buttons allow you to access any of the folders in the current
Trail folder path. Click on any folder name to go directly to that folder.
DIRECTORIES
The following subdirectories are shown in the Directory:
Although the DB Programming window displays using the Windows Vista style folders view
by default, you can revert back to the Classic Style. Windows Vista style controls (such as
NOTE
dialogs and buttons) remain.
Some of the graphic representations in this guide are shown using the Windows Vista style.
• Maintenance Accounts: For more information about configuring system accounts, see
“Maintenance Accounts“ on page 64.
• Software License: For more information about software licensing, see “System Software
Licenses“ on page 65.
• System: The System directory features include most of the MiVoice Office 250 features
and are discussed throughout this guide.
42
About Database Programming
• Users: For more information about Users, see “Users“ on page 813.
• Voice Processor: For more information about voice processor features, see “Voice Pro-
cessor Features and Programming“ on page 863.
SYSTEM DIRECTORY
Table 3 shows System subdirectories and folders. Option shortcuts appear in parentheses. For
more information about shortcuts, see “Tools Menu“ on page 41.
43
Features and Programming Guide
44
About Database Programming
Table 4 shows Voice Processor subdirectories and folders. Option shortcuts appear in
parentheses. For more information about shortcuts, see “Tools Menu“ on page 41.
STATUS BAR
The status bar at the bottom of the window shows:
• the description and number of the Node being programmed.
• the type of programming session.
• the region that the system is installed. The supported regions are North America and United
Kingdom.
• the name assigned to the programming session.
It also displays status and error messages when applicable. The status bar also displays a
description if you click and hold the cursor over the menu or menu option.
45
Features and Programming Guide
SELECTION WIZARDS
Any list in DB Programming that you use to add or move items through the shortcut menu uses
a Selection Wizard (for example, adding members to a hunt group). The figure below shows
an example Selection Wizard.
46
About Database Programming
DB PROGRAMMING TIPS
The following sections describe general tips when using DB Programming.
Right-click to add
a description to the left pane.
2. Click Add <option> To Folder Name. The option name appears in the folder name in the
left pane, as shown below. To remove the field, repeat the procedure and select the option
to remove the field. (The recommended limit is three fields.)
47
Features and Programming Guide
Description
Appears Here
The movement of the programming focus—that part of the screen where you want to make
changes—is primarily controlled by the arrow keys and by the TAB and SHIFT + TAB keys.
These keys move the programming focus right and left. The ENTER key takes the place of a
single click, and CTRL + ENTER takes the place of a double-click.
• Arrow Keys: With the selection in the left pane, navigate using the arrow keys. Placing the
selection on any item on the left pane automatically shows the contents of that item in the
right pane, whenever applicable. For example, place the selection on “System” in the left
pane and the computer displays the system contents in the right pane: Controller, Devices
and Feature Codes, Flags, and so forth. At this point, the programming focus is on the
words “System” in the left pane.
• Expand (+) and Collapse (-): If the item in the left pane is expandable (which is indicated
by a “+” sign to the left of the item), it is possible to expand it to show the contents in the
left pane, by pressing the plus (+) key on the numeric keypad. The numeric keypad must
be used for this function. Likewise, to collapse an expanded left pane list (indicated by a “-
” sign to the left of the item), press the minus (-) button on the numeric keypad.
• Tab/Shift to Change Focus Between Panes: To shift the programming focus between
panes, use TAB or SHIFT + TAB key. To select items, use CTRL + ENTER.
48
About Database Programming
d. At this point, your programming focus and selection is in the right pane on Devices
and Feature Codes. If you want to select the Devices and Feature Codes area in the
right pane, press CTRL + ENTER. (This is the equivalent of a double-click.) On the
right side of the screen, Devices and Feature Codes expands showing Extension Lists,
Feature Codes, Hunt Groups, etc. Notice that the programming selection has moved
back to the left pane. This is because you have selected Devices and Feature Codes,
but nothing below it. There is no selection in the right pane.
e. Now move the selection to the right pane using TAB and expand Extension Lists by
pressing CTRL + ENTER while the selection is on it. Again, the selection will automat-
ically move back to the left pane.
f. Put the selection back in the right pane, and use the arrow key to move down to Keyset
and press CTRL + ENTER again. A list of Keyset Extension Lists appears in the right
pane. Notice that the selection has again moved to the left pane. Move it back to the
right pane using TAB.
• CTRL + N to Add Items In The Right Pane: To add an item to a list, press CTRL + N, to
open the prompt that allows you to add to the list. Pressing the down arrow key selects this
prompt. Pressing ENTER (equivalent of a single click) creates a new item.
• CTRL + M to Edit An Existing Item: To edit an existing item, use the arrow keys to select
the entry, and then press CTRL + M. This opens the dialog box allowing you to explore
(open) or delete the item.
• ESC Closes Without Change: Pressing ESC tells the system that you do not want to make
a change. If a pop-up dialog box is present on the screen, it will be closed.
• Changing A Flag: Flags have two states (on/off, yes/no, and so forth). Note the following
when changing flags:
• When viewing a list of flags, press TAB to move the selection to the right pane.
• Use the down arrow key to move to the desired flag. The selection is currently on the
name of the flag, not the flag itself.
• Move the selection to the flag to change it by pressing the right arrow key. You can see
the focus of the selection move from the name of the flag to the state of the flag.
• Press ENTER (single click) and the check box for the flag appears.
• Change the status using the SPACE BAR to toggle between the choices.
• When the check box shows the desired status, press ENTER.
• Selecting From A Drop-Down List:
a. Move the programming focus to the list box, as described above for changing a flag.
b. With the programming focus on the box, press ENTER to select this area to program.
The box will “open up” and select the current Value.
c. Use the up and down arrow keys to increment or decrement the value by 1. You can
also type in a value directly.
d. When the desired value is shown, press ENTER. An example of a drop-down list is
the Controller programming folder.
49
Features and Programming Guide
To filter a list:
1. From the Add to <list type> dialog box, select the list type from the 1. Select Types to
Include list.
2. Do one of the following:
50
About Database Programming
In the 2. Pick Filtering Option area, select Use Filter to view filtering options. The following
dialog box appears.
3. Select the filtering options from the 3. Specify a Filter and Available fields boxes. See “Using
SQL Statements to Filter Lists“ on page 51 for information about using Structured Query
Language (SQL) commands.
The Available Fields box (see step 2 on page 50) lists the available SQL fields. Double-click a
field to move it to the Specify a Filter box.
51
Features and Programming Guide
The “extension” field to be searched is in square brackets. The value to be matched in that field
(the number 1234), is placed in quotes. The spaces on either side of the equal sign are not
required but help make the statement easier to read.
You combine SQL commands and Available Fields to construct a SQL expression. For example,
assume that you want to specify extension number 1234. The SQL expression to do this is:
[extension] = “1234.”
You can use the equal (=) and less than (<) or greater than (>) commands to widen a search.
For example, assume a database consists of eight phones with the extension numbers 1001
through 1008. To narrow the list, use the commands in Table 7.
You can also use Boolean operators. Table 8 assumes the same database of eight phones.
Notice how the last two expressions return the same result. You can use either the < and >
symbols or you can use the Boolean expression BETWEEN for the same things.
52
About Database Programming
The second expression returned nothing, even though it seems like it should have returned
1005 and 1006. The reason it returned nothing is because that expression requests a list of
phones that have the extension number 1005 and the extension number 1006. To satisfy this
expression, both numbers would have to be assigned to the same phone. This is not allowed
by DB Programming. The correct expression would be to use the operator “OR,” which would
request a list of phones having the extension 1005 or the extension 1006.
Some of the fields do not require quotes around the values. These values are considered to
be numbers, not string expressions. String expressions, such as extension numbers and user
names must always be in quotes. Numeric expressions, such as node and port numbers, should
not be placed in quotes. Table 5-31 specifies the type of each field.
[node_number] Number No
[port] Number No
[slot_number] Number No
If you forget which type it is, an error message alerts you that you have a “Data type mismatch,”
and you must return to the statement and enter it correctly.
Because filtering uses statements consisting of letters as well as numbers, the equal sign means
that an exact match must be present. Therefore, the expression <username> = “FRED*” only
returns a user name that has the letters F, R, E, D, and an asterisk; that is, an actual asterisk
as the fifth character of the username. It would not return “FREDDY” or “FRED SMITH.” To
use the wildcard, the SQL statement must tell the search engine to locate something that does
not exactly equal the search string specified in the quotes. To do this, use the SQL command
“LIKE.”
The expression <username> LIKE “FRED*” returns user names of “FRED,” “FREDDY,” “FRED
SMITH” or any other username that starts with the letters F, R, E, D.
53
Features and Programming Guide
Similarly, the question mark is used to indicate only a single character space is a wildcard.
Table 10 shows some additional examples.
Table 10: SQL Statements and Search Results
SQL STATEMENT SEARCH RESULT
[username] = “FRED?” FRED?
[username] LIKE “FRED?” FRED plus any single character
[username] LIKE “FRED*” FRED followed by any or no additional characters
[username] LIKE “FRED??” FRED followed by any two characters
[username] LIKE “FRED?*” FRED plus at least one more character
[username] > “b” Any username except those beginning with the letter A
[username] < “a” Any username that would appear before those beginning with the letter
A, (for example, blanks)
[extension] LIKE “12??” Extensions in the range 1200 through 1299 inclusive
You can combine search patterns using the Boolean operators previously discussed, as shown
in Table 11.
Table 11: Combined SQL Statements and Search Results
SQL STATEMENT SEARCH RESULT
[username] = “FRED” AND [extension] = “1234” Only 1234 with a username of FRED
[username] = “FRED” OR [username] = Any phone with a username FRED or WILMA
“WILMA”
[username] = “FRED” OR [extension] = “1234” Extension 1234 as well as any with FRED as the
username
[extension] LIKE “12*” AND [username] LIKE Extensions beginning with the digits 1 and 2 that
“F*” have usernames beginning with the letter F
[extension] < “1234” AND [username] = “FRED” Extensions with a number lower than 1234 that also
have a username of FRED
[bay_number] = 1 AND [extension] >= “1000” Phones on module number 1 having extension
numbers 1000 and higher
USING THE CLEAR FILTER, SAVE FILTER, AND LOAD FILTER COMMANDS
54
About Database Programming
DATABASE UTILITIES
MiVoice Office 250 utilities are incorporated into the System Administration & Diagnostics
application. For information about how to launch the following utilities, refer to the System
Administration & Diagnostics Guide, part number 550.8125:
• Database Converter Utility
• MOH Converter Utility
• DB Test and Repair Utility
• Upload Utility
Note that the Diagnostics Monitor utility is no longer available or needed in v4.0 or later DB
Programming, as its functionality is incorporated into the System Administration & Diagnostics
application. For complete information about utilities, refer to the appropriate utility Help.
55
Features and Programming Guide
56
Chapter 3
SYSTEM MANAGEMENT
Features and Programming Guide
INTRODUCTION
This chapter describes features that you can use to manage and maintain your MiVoice Office
250. System management options include:
• Security Enhancements on page 59
• Maintenance Accounts on page 64
• System Software Licenses on page 65
• Backup Operations on page 76
• Launching the Configuration Wizard on page 75
• Backing Up the Database on page 80
• System Error Information on page 83
• System Maintenance Options on page 84
• System Resets on page 89
• on page 105
NOTICE
System Performance. Perform the following system management options after hours, when
system usage is at a minimum.
• Imports (with a large database, especially with off-node devices). For example, performance can
also be affected when other nodes export to the local node.
• DB backup saves (with a large database, especially with off-node devices).
• Paging to a large number of phones.
• All-ring hunt groups to a large number of phones.
• Abusive/intention actions (user runs a “die macro” on their phone).
• Change extension logic (DB Programming performs a batch modify/delete extension (the larger
the database, the slower the action).
58
System Management
SECURITY ENHANCEMENTS
The v4.0 and later software release includes a number of security enhancements related to
system accounts, passwords, password policies, encrypted connections, security key strength,
certificate management, and Secure Socket Layer (SSL) usage. See the following sections for
details.
SSL ENHANCEMENTS
Security improvements for SSL connections (Webserver, SSH) are used on the system.
SYSTEM ACCOUNTS
Beginning with 5000 Release 6.0, System Accounts has been renamed Maintenance Accounts.
This folder shows only the Administrator and Support accounts for Database Programming.
No other accounts are listed in this folder. User accounts that have been given administrative-
related access privileges will have an Administrator-Related Information folder in their
respective Users folder.
The support account is disabled by default, and it can only be enabled by an admin account
user (for example, when a system administrator requests technical assistance from Mitel
Technical Support). This feature gives the system’s designated administrator(s) control over
who can log on to the system. See page 64 for details.
The DB Programming “System Accounts” folder (previously called the “Passwords” folder) that
allows different levels of DB Programming access now requires a user name and password
pair instead of just a password.
The first four policies are mandatory and will be applied by the system on every connection.
Policies five and six are configurable by the administrator.
59
Features and Programming Guide
Changing Passwords
When the System Administration & Diagnostics application connects to a MiVoice Office 250
for the first time using the default “admin/itpassw” credentials, the system prompts the
administrator to change the password for the admin account. (The new password is stored in
System Administration & Diagnostics so that subsequent online sessions will not prompt for a
password.) Likewise, when the support account is enabled for the first time, the administrator
is prompted to change the password for this account.
After restoring a database to a system, the username and password stored in System
Administration & Diagnostics may need to be changed to match username and password in
the restored database in order to successfully connect to the system.
If the system is configured with a Processing Server (PS-1), all password changes must be
NOTE synced up between the Base Server and the PS-1. Passwords cannot be changed if the Base
Server and the PS-1 are not connected.
ENCRYPTED CONNECTIONS
With v4.0 or later software, the following applications use an encrypted connection for inbound
communication with the MiVoice Office 250:
• System Administration & Diagnostics Tools/Utilities: server TCP port 44000 and 443
(configurable)
• Database Programming: server TCP port 44000 (configurable)
• Web Browsers: server TCP port 443 (configurable)
These applications use either SSLv3 or TLSv1 for the encrypted channel.
Users of these applications will now receive certificate notifications as the client application
attempts to verify the identity of the connected device.
SSL CERTIFICATE
The system uses the Internet X.509 Public Key Infrastructure (PKI) Certificate Management
Protocols for all relevant aspects of certificate creation and management.
Since Release 6.3, it is possible to upload Customer’s own Certificate in Administration Web
Portal (AWP).
You can generate a Certificate Signing Request (CSR) and then upload/import a Customer’s
own Certificate.
When using the Administrator Web Portal during a new installation, the certificate for the Web
Page displays There is a problem with this website's security certificate.
60
System Management
The Generate Certificate Signing Request and Upload SSL Certificate links are used to
create a CSR and upload the Customer’s own Certificate to the system.
Figure 6: Generating a Certificate Signing Request
61
Features and Programming Guide
The Download SSL Certificate link allows use of the Certificate on other systems.
62
System Management
TROUBLESHOOTING
In the case when authority SSL certificate is uploaded before upgrade the system.
SCENARIO CAUSE RESOLUTION
A warning appears on the AWP Authority SSL certificate has been Upload authority SSL certificate.
page stating the site is not lost during system upgrade.
secure, after system upgrade.
Do not select Generate Certificate Signing Request (CSR) if you already have the
IMPORTANT authority SSL certificate, which has been lost during upgrade process. Generating CSR
leads to the authority SSL certificate becoming invalid.
System and desktop OAI applications and System Manager continue to use port 4000. An
attempt to connect via SSL on a non-SSL port (4000 by default) will result in connection failure.
Likewise, an attempt to connect without SSL on an SSL port (44000 by default) will result in
connection failure.
63
Features and Programming Guide
MAINTENANCE ACCOUNTS
Beginning with 5000 Release 6.0, System Accounts has been renamed Maintenance Accounts.
This folder shows only the Administrator and Support accounts for Database Programming.
No other accounts are listed in this folder. User accounts that have been given administrative-
related access privileges will have an Administrator-Related Information folder in their
respective Users folder.
A User’s access can be changed by opening the Users folder and right-clicking on the user
and selecting Edit User. The User Creation Wizard dispalys to allow any changes for the user.
The password can be edited for both accounts, and support accounts can be enabled/disabled.
64
System Management
For a complete list of alarm messages, refer to the Message Print Diagnostics Manual, part
no. 550.8018.
For information obtaining software licenses, refer to the AMC Help or the Mitel Web site (http:/
/edocs.mitel.com).
65
Features and Programming Guide
Select Software License. Software licenses are shown in the right pane.
The detailed information about software license features is shown in Table 12. The values
shown are for offline mode. In online mode, the values match the software license that is loaded.
If there is no license loaded or the current license on the system is invalid, the fields display
with a red “X.”
You can create as many IP phones as the system can support (up to 250). Call Processing
uses the various Phone licenses to determine which phones come online. Note that licensing
is per online phone, not per phone usage.
Beginning with the v5.0 software release, Primary Rate Interface (PRI) capability no longer
requires a premium feature license. All enabled ports on the Single and Dual-Port T1/E1/PRI
Modules (T1M and T1M-2) may be configured for the PRI protocol without additional charge.
(Note that a license is still required to enable the second port on a T1M-2).
NOTICE
You must upgrade system software before loading the license.
66
System Management
67
Features and Programming Guide
The MiVoice Office 250 requires a version-specific license. You can install and run DB
Programming, but you are prompted to upload the license file. For information about uploading
a software license and for a list of features that require licenses, see “Uploading Software
License“ on page 69.
68
System Management
All features currently licensable using a USB key can be made available for licensing using a
compact flash-type card. The license file from the AMC can be associated with either medium–
but not both concurrently. For details, refer to the Product Description chapter in the MiVoice
Office 250 Installation and Adminstration Manual.
69
Features and Programming Guide
4. Click Finish at the Compare Software License screen. If you upload a software license
that does not support your current programming, a warning message appears.
If you click Yes, the view is changed to the System – Controller – IP Settings – IP Resource
Allocation folder so you can change the IP resources allocated to UVM.
If you click No, you return to the folder you were viewing, prior to the software license upload,
and the upload is canceled.
You must license additional UVM ports. If you downgrade a license to support fewer UVM ports,
DB Programming performs a check on the Time Slot Groups (see “Time Slot Groups“ on
page 896). If the Time Slot Groups currently have a Maximum Channel Allocation greater than
the new license supports, a warning message appears, preventing you from uploading the
license. You are prompted to go to the Time Slot Groups folder and change the Maximum
Channel Allocation fields to a value that is supported in the new license. If you do not go to the
Time Slot Groups or you click Cancel, you are returned to DB Programming and the new license
is not loaded.
UVM ports, IP Phone Categories, and Node Capacity are displayed in the Compare License
dialog box.
When a new license is loaded, the dialog box showing the comparison between the old license
and the new license shows the License Type. The available license types are:
• USB (for the old software keys)
• Compact Flash (for the new way of storing a license)
• Unknown (for old licenses that did not have this field)
The following illustration shows an example of the Compare Software License dialog box that
appears during the software license upload process.
70
System Management
For details about using System Manager, refer to the System Manager Installation Manual.
CHANGING RECORDS
If problems occur with the security device, you may have to change a record from one system
to another. See Table 14, “Invalid License Upload Errors,” on page 73 for a list of error
messages.
For information on changing records, refer to the Application Management Center (http://
www.ebiz.mitel.com/amclogin.jsp).
CHANGING LICENSES
If necessary, you can upload a new license that provides a different set of features. If the new
license, however, supports new capacities, you must make sure that you have the appropriate
hardware installed.
To change a license, obtain a new license, as described on page 65, then upload the license.
The system compares the new license to the existing license.
71
Features and Programming Guide
In this screen, the areas of the license that are changing are selected. The status line indicates
whether the system requires a reset once the license is uploaded. After you have verified you
want to upload the new license, click Finish. The new software license is loaded, and the old
software license is stored on the system. The system may require a reset.
DOWNGRADING LICENSES
Mitel strongly recommends against downgrading a software license.
Uploading a software license where the number of licenses is different than the current license
count. Before accepting the new software license, DB Programming displays where the license
field in question is different than the existing license field and warns that the system will reset.
When uploading a new software license, upload the latest generated .isl license file to ensure
that the software license does not downgrade.
If a system has continuous license key failures, Alarm 132 is posted on all administrator phones.
After the system successfully recognizes the license key, upon the next reset, the system checks
for a valid software license.
If the license key is functional but the system does not have a software license, the system
posts alarm 125 every 5 minutes, then resets after 4 hours.
The system resets due to a The user has uploaded a Mitel recommends not
“Major Reset Due To an IP software license that causes the downgrading a software license.
Phone Licensing Error.” number of online Advanced IP Before committing the new
phones to exceed the number of license, a message pop-up in DB
licensed Advanced IP phones. Programming indicates that the
system will reset if the new
license is installed.
Alarm 127 appears on the An IP phone cannot come online The customer needs to upload a
administrator phone display and because the appropriate license license to support the phone
on the Base Server LCD display. is not available. model type.
A software license is created for a specific system type, so if you attempt to load a software
license that does not match the system type, an error message displays. If you attempt to load
an invalid license, the following error message appears. This event may occur when using the
Upload Software License feature, which is accessed by selecting Operations and then Software
License Operations in DB Programming.
72
System Management
If the license is invalid, an error message is displayed, indicating why the upload failed. A license
may be considered invalid for a variety of reasons, as described in Table 5-2.
Corrupted Software License. The software license is Connect to the Mitel Applications
Unable to load Software corrupted. Management Center (AMC) and
License. download the file again. If this error
occurs again, contact the Software
Maintenance Center.
Note that when using the virtual PS-1, a
“Security key is either invalid or missing”
error may appear if the USB device is not
mapped to the correct virtual server. See
the MiVoice Office 250 Installation and
Adminstration Manualfor details.
The specified Software The serial number on the Load a license that has the correct serial
License is not valid for this does not match the number number.
specific CPU. Unable to load in the license.
Software License.
The specified Software The software license is no Load (or request) a new Software
License has expired. Unable longer valid or has expired. License.
to load Software License.
Too many devices equipped. The current database is Either use local mode to unequip some
Unable to load software programmed for more devices or upgrade the capacity limit on
license. devices than the software the license.
license allows.
Software License version is The license you have Either install the correct version of
not supported. Unable to attempted to load is for a system software or upload a software
load Software License. different version of system license that specifies the correct system
software. version.
Software License is already A valid software license is If the software license you are attempting
loaded. Unable to load already loaded on the to load is the correct license, start a new
Software License. system. DB Programming session with a default
database. Then upload the software
license before restoring the database.
Software License is not valid The CPU type identified in Upload a license that identifies the
for the current CPU type. the software license does installed CPU type.
not match the CPU type
detected in the system.
Page 1 of 2
73
Features and Programming Guide
Security key is either invalid The software license serial Make sure the security key is present and
or missing. number does not match the properly seated in the USB port. If the key
serial number on the is present, make sure the license reflects
security key, or the security the correct serial number. If necessary,
key is not present on the transfer the license to the correct serial
server. number (see page 71).
The specified Software The software license Either install the correct system version
License is not valid for this product version does not or upgrade the license to reflect the
software version. Unable to match the version installed correct system version.
load Software License. on the system.
The specified Software An unidentified error Contact the Software Maintenance
License encountered an occurred. Center.
unknown upload error.
Unable to load Software
License.
Page 2 of 2
74
System Management
The Configuration Wizard opens when Database Programming is started for a default system.
A Show this wizard at DB Programming startup check box on the main welcome page allows
you to have the Configuration Wizard start whenever Database Programming starts up.
You can program the following settings using the Configuration Wizard:
• IP Settings
• Email Gateway Configuration
• Date and Time Settings
• Controller Expansion Module Installation for the following modules:
- Digital Expansion Interface Module
- Voice Processor
• Users/IP Phones (a Create User wizard appears when creating a user)
For complete information about the Configuration Wizard, refer to the MiVoice Office 250 DB
Programming Help.
In addition to having the Configuration Wizard starting when opening Database Programming,
from the DB Programming menu bar, select Tools, and then select Configuration Wizard.
The Configuration Wizard Welcome screen appears.
75
Features and Programming Guide
BACKUP OPERATIONS
Backup operations now include the ability to to perform a bundled save where all available
system data (Voice, HTML Applications, and File-based Music on Hold files) will be retreived
from the system and saved in a backup file at a specified location.
Beginning in Release 6.0, the Database Operations menu was renamed Backup Operations.
Backup save and restore options are available under the OperationsBackup Operations
menu.
After the System and Voice Processor databases have been programmed for the first time,
perform a database save. Store this database in a safe place so it can be used should the
current the database become corrupted and must be re-entered. This saved database can be
used as a starting point for the re-entry. In addition, keep a current copy of the database that
you can update every time you make changes.
SAVE BACKUP
Four options are provided when saving a backup.
Performing a Save or Restore operation will cause the system to slow down. If at all
IMPORTANT possible, these operations should not be performed during normal business hours
when the system is being used to place and receive calls.
Database Programming will use the Web Listening Port defined in the System
NOTE Connection to save the additional data. If the Web Listening Port is not open, a
warning message dispalys.
3. In the Save to filed, enter the location to where the backup will be saved, or click the ellipses
at the end of the field and navigate to the location.
4. Select the Encrypt data check-box to encrypt the backup.
76
System Management
5. Click Start.
The "Backup Summary" will list what will be restored once selections are made.
RESTORE BACKUP
This option is located under OperationsBackup Operations. As part of the bundled save/
restore feature, Restore Backup will perform a bundled restore operation of all available system
data (Voice, HTML, Applications, and File-Based Music on Hold files) from the backup file at
a specified location.
1. Possible Database Corruption. Poor line quality may cause data transmission
problems when the modem connection exceeds 19200 baud. For this reason, Mitel
recommends not using the modem to restore the database. If you attempt a restore
NOTE using the modem, the database may become corrupt.
2. Possible Modem Reconfiguration. If the Database Restore feature is used
during a remote programming session, all calls are disconnected except the
modem connection. Before restoring the database, make sure the modem
connection will not be reconfigured during the restoration.
Performing a Save or Restore operation will cause the system to slow down. If at all
IMPORTANT possible, these operations should not be performed during normal business hours
when the system is being used to place and receive calls.
Database Programming will use the Web Listening Port defined in the System
NOTE Connection to save the additional data. If the Web Listening Port is not open, a
warning message dispalys.
3. In the Restore from field, enter the location from where the backup will be restored, or
click the ellipses at the end of the field and navigate to the location.
77
Features and Programming Guide
4. Click Start.
If the data is encrypted, it will be necessay to enter the username and password in
NOTE the accompanying dialog. If an incorrect username or password is entered, the
restore must be cancelled.
The "Restore Summary" will list what will be restored once selections are made.
If the data is encrypted, DB Programming will try to use the username/password to
decrypt the data after you click Start, but if this combination does not work, a dialog will
NOTE
be presented asking for the correct username/password. If the correct username/
password is not entered, the restore must be cancelled.
When a database is restored, the system checks the following information against the currently
loaded license:
• System type
• Number of devices
• Features
If one or more of these items in the database differ from what is programmed in the license, an
error message is displayed, and the database is not restored. If the license is valid for the
database to be restored, the system checks the current IP settings for the server. If any
differences are detected, a screen similar to the following one displays.
78
System Management
This screen displays the current IP settings (Current Value column) and the settings detected
in the database to be restored (Restore Value). If you click Current Settings, the current
settings, as shown in the Current Value column, are retained. Any other settings will be restored
from the selected database. If you click Restore Settings, the IP settings are automatically
changed to those shown in the Restore Value column, overwriting the current settings.
If, however, you defaulted the database or uploaded new software, the system considers the
static database as “corrupt.” When the system is powered up, a backup database is not
detected, and the IP settings programmed in the restored database are automatically used.
79
Features and Programming Guide
This backup database is designed to recover in the event of a total power failure—it is not
designed to replace the static database. Changes made to the static database are not reflected
in the backup database until the database is backed up. For example, if you default the
database, the static database is defaulted, not the backup database.
If the static database is corrupted, the system attempts to restore the backup database. If the
system detects problems with the backup database, it may default the static database instead
of restoring the backup database. The database will be defaulted if one of the following occurs:
• There is no backup database available.
• The system was saving the backup database when the power down occurred.
• The system repeatedly attempted to restore a backup database but was interrupted by
power ups. The system will default the database after it has exceeded the number of restore
attempts. If this occurs, the backup database remains in flash memory for troubleshooting
purposes.
If desired, you can force DB Programming to save the backup file immediately, as described
in “Save Backup“ on page 76. To set Backup Database Save parameters, see page 81.
80
System Management
• Periodic Backup Database Save Retry Attempts: The number of times that DB Program-
ming attempts to save the database. If the database is not saved before the system retries
the number of times specified in this field, the database is not saved until the next day. The
range is 0–10; the default is 3.
• Enable Periodic Backup Database Save: Enable this option to save the database at the
time indicated in the Periodic Backup Database Save Time option. This option must be
enabled to backup the database at the scheduled time. By default, the option is enabled.
81
Features and Programming Guide
If the system detects that the database has not changed since the last backup, the save is
NOTE
not performed.
SCHEDULED BACKUPS
Refer to the MiVoice Office 250 System Administration & Diagnostics Guide for information
about scheduled backups.
DEFAULT DATABASE
You can default the database to return the call processing and voice processor databases to
default values. When you select Default Database, a window appears, as shown below, that
warns that defaulting the database overwrites the current database and prompts you to
continue.
Defaulting the database ends the programming session and drops all calls. It also causes
NOTE voice processing to stop. Voice processing restarts after the database default operation is
complete.
If you are programming in offline mode when you select Default Database, the following
warning message appears.
You can also default the database using the LCD panel. Refer to the MiVoice Office 250
Installation and Adminstration Manual, for more information.
82
System Management
When you select Network Diagnostics option before you complete a system freeze, the
freeze includes a Network Diagnostics Log file with an .ndl extension. This log file captures
settings call processing, IP resource, and IP settings, as well as insufficient bandwidth
alarms. This information can be obtained using System Administration & Diagnostics. For
more information, refer to the MiVoice Office 250 System Administration & Diagnostics
Guide.
3. If the system is not already frozen, select Freeze. Otherwise, continue to the next step.
4. Click Retrieve Timestamps to view the timestamps associated with the history and Mes-
sage Print queues. The blocks are listed based on the time intervals.
5. Select the timestamps that you want to save (you can use the SHIFT and CTRL key to
select more than one item).
6. Click Save. The standard Windows browse screen appears.
7. Select the destination for the files (maximum 65 characters, including the freeze file names),
and then click OK.
83
Features and Programming Guide
System Maintenance options are under System – Maintenance, as shown in the figure below.
CALL COSTS
This section contains the following information:
• Feature Description below
• Programming Call Costs on page 86
FEATURE DESCRIPTION
The system Call Cost Accounting feature provides a cost estimate that is applied to the
various classes of calls. Due to the wide variation in charges among network carriers, the
NOTE
system's call cost calculation cannot be used as a prediction of actual charges. This feature
can only be used as a management tool to estimate call costs.
The Call Cost Accounting feature estimates the cost of outgoing and incoming calls, displays
it on the phones, and prints it in the SMDR records. The cost is based on the type of call,
telephone number dialed, the elapsed time of the call, the day of the week, and the time of day.
A table in the database supplies the rates for all types of calls, including multiplicative factors
for evening and weekend rate changes on outgoing calls. The equation for calculating call cost
is:
The multiplicative factor adjusts the daytime per-minute call cost for evening and weekend rates
of outgoing calls. For example, the evening call cost multiplier is 0.65 if calls are 35 percent
less expensive after 5:00PM. The daytime rate (D), evening (E) multiplicative factor, and night/
weekend (N/W) multiplicative factors are used on the following schedule:
84
System Management
8 AM TO N/W D D D D D N/W
5 PM
5 PM E E E E E E N/W
TO
11PM
If call cost is set to zero, call cost will not display during the call and the SMDR record will show
$00.00.
In a network setting, the call cost shown on the display and SMDR output use the factors and
rates for the node on which the trunk resides. In other words, if a phone on Node 1 dials what
is considered a long-distance number on Node 1, but the call is routed to Node 2 where the
number is considered local, the phone will use the local call cost rate from Node 2. The call
rate used for calls between nodes will be based on the Network call rate.
All outgoing calls using a trunk that is not subject to toll restriction are classified as one of the
following call types for call cost calculation (call cost type is programmed in the database).
• Free (000 or FOC)
• Local (LOC)
• Toll Local (TLC)
• Toll Long Distance (TLD or NAT)
• Operator (OP)
• International (INT)
• Operator and International (O/I)
• DISA (DSA)
• Conference (CNF)
• DID/DNIS (non-DISA) (DID or DI)
• Incoming (IN)
• Network (NET)
When a trunk that is subject to toll restriction is used, call cost type is determined according to
the digits dialed, as follows:
• Local: The following calls are classified as local calls:
• Calls to N11 or 1N11 (where N is 2–9), except 411 or 1411
• Any call to a toll-free area code
• All 7-digit or 10-digit calls within a local area code to office codes that are allowed in
User Group 1
85
Features and Programming Guide
• Any call that does not begin with 1, and does not fall into any of the other call cost
categories
• Toll Local: The following calls are classified as toll local calls:
• Any calls to 411 or 1411
• All 7-digit or 10-digit calls within a local area code to office codes that are restricted in
User Group 1
• Any call that begins with 1, that does not fall into any of the other call cost categories
• Toll Long Distance: Any call to an area code other than a local area code is classified as
a toll long distance call.
• Incoming: Any call, except DID/DNIS calls, that rings into the system and is answered is
classified as an incoming call.
• Network: Any call placed to or received from a network node is classified as a network call.
• Free: Any call within a PBX (a trunk access code is not dialed) is a free call.
• Operator: Any call starting with 0 or containing only 0 is classified as operator (0, 0+).
• International: Any call starting with 01 is classified as international (01+, 011+).
For U.S. systems: The multiplicative factor adjusts the daytime per-minute call cost for
evening and weekend rates of outgoing calls. For example, the evening call cost multiplier
86
System Management
is 0.65 if calls are 35% less expensive after 5:00PM. The evening (E) multiplicative factor
and night/weekend (N/W) multiplicative factors are used on the following schedule:
5 PM TO 11PM E E E E E E N/W
For European systems: The multiplicative factor adjusts the peak per-minute call cost for
standard and cheap rates of outgoing calls. For example, the call cost multiplier is 0.65 if
calls are 35% less expensive after 6:00PM. The standard (S) and cheap (C) multiplicative
factors are used on the following schedule:
1 PM TO 6 PM C S S S S S C
6 PM TO 9 AM C C C C C C C
FREEZE ZONES
You can freeze the system to “lock” the current state of the system fault history queue, which
is a sequential list of all system commands and inputs. You can use this list, when decoded,
to determine a series of events which may have resulted in an error. Unfreezing the system
“unlocks” the current state of the history queue, and resumes event collection.
Using freeze zones, you can determine which nodes in the network are frozen during each
freeze request. There can be up to 10 freeze zones in the database.
Double-click an individual zone to view nodes, if any, assigned to the freeze zone.
87
Features and Programming Guide
Method A
a. In the Value column, select the current value, and then type the new value in the box.
b. Press ENTER. A screen appears displaying what is associated with the number
entered.
c. Click OK. The new number appears in the field.
Method B
a. Right-click anywhere in the right pane, and then select Add To List. A window appears
prompting for the device type to include.
b. Select the node types (you can use the SHIFT or CTRL key to select more than one
item), and then click Next. The items with details appear. To view items in a list only,
click List.
c. Select the appropriate nodes, then select Add Items.
d. When you have added all the necessary nodes, click Finish. The selections appear
in the list. To view programming options, double-click the extension number.
Select one or more nodes from the list, right-click, and then select Remove Selected Items.
88
System Management
SYSTEM RESETS
This section describes system resets and how to reset the system on demand or to schedule
a reset. The system does not require a reset as a result of configuration in a DB Programming
session.
NOTICE
Possible Service Interruption. A system reset terminates all calls in progress. Schedule resets
to occur after normal business hours.
A Call Processing reset affects call processing and all related applications. To avoid Call
Processing issues, you can schedule a delayed reset, as described in the following sections.
89
Features and Programming Guide
If Daylight Saving Time is enabled, Mitel recommends that you do not schedule resets to
occur at 2:00 AM. If you do, the system may not perform the reset when the time changes.
NOTE Make sure the Scheduled Reset Time value (it defaults to 12:01AM) is AFTER the Periodic
Backup Database Save Time (it defaults to 11:00PM); otherwise any Database changes
since the previous backup database save will be lost.
(Read Only) Indicates if Call Processing requires a reset. If the field shows Yes, the system
resets at the time indicated in the System Delayed Major Reset field. If the field shows No, a
delayed major reset does not occur, even if one is scheduled.
If the System Requires Reset option is turned on, this field determines the default time for
scheduled system resets. Scheduled major resets can be scheduled when system
administrators program the database or when Reset System is selected from the Operations
menu.
Normally, the system does not perform a major reset if there are any active calls. However, if
this option is turned on, the system forces a major reset at the specified time, as programmed
in the previous section. A major reset causes all active calls on the system to be dropped. The
option should be used only on systems which are busy 24 hours each day and, therefore, do
not have a consistent time when all resources are idle and a normal delayed major reset can
be performed. This option affects any request to perform a major reset, whether it be by the
system itself for resource reconciliation, or requested through DB Programming.
When enabled, this option drops all active calls at the specified time, should a major reset be
NOTE necessary. This does not happen every day, but it does happen occasionally. Be aware of
this so you do not mistake the reset for a system failure.
90
System Management
Select the days of the week on which you want automatic resets to occur. Resets occur on the
days of the week that are selected, provided the Always Reset On Days Of Week option is
turned on. By default, all days of the week are turned off.
To select days:
1. Select System – Maintenance – Major Reset Scheduling – <day>.
2. In the Value column, select the check box. The field changes to Yes. To deselect the day,
clear the check box.
3. Press ENTER or select another field to save the change.
Set this option to Yes to have resets occur on the specified days of the week. If this option is
disabled, resets do not occur on the specified days. By default, this option is set to No. If a red
“X” appears next to Always Reset On Days Of Week, you have not selected any of the days
of the week. You must have at least one day of the week selected; otherwise, resets do not
occur. When finished, the system resets as programmed.
REBOOT SYSTEM
The Reboot System flag causes scheduled delayed resets to reboot the entire system. For
systems equipped with a PS-1/vPS-1, this option reboots the PS-1/vPS-1 and the Base Server.
It is set to No by default.
91
Features and Programming Guide
When you make a change that requires a reset, the Reset System dialog box appears when
you exit DB Programming.
You can use the scroll box to change the scheduled reset time to a different time (within
24 hours). For example, if the system is programmed to reset on Wednesdays at 11:30
PM, and you schedule a manual override time for 10:00 PM on a Wednesday, the
system resets at 10:00 PM and then again at 11:30 PM. By default, this is 12:01 AM.
Note that the Manual Override Time is only used when the system requires a reset.
This option can also be accessed from the Major Reset Scheduling folder in OLM mode.
• Force Reset If Not Idle: Turn on this option to force a reset, even if there are active
calls. If turned off, the reset is not performed until the system is idle. By default, this is
set to No. This option can also be accessed from the Major Reset Scheduling folder.
(This field was previously called Forced Delayed Major Reset.)
• Reset now: Performs an immediate system reset. Do not select this option if the system
is currently backing up the database; otherwise, the backup is aborted.
2. Click OK when finished.
92
System Management
MESSAGE PRINT
System messages can be printed to give service personnel and Mitel engineers information
about system status during troubleshooting. You may enable any combination of the error
message types. The available message types are:
• Alarm Messages: Indicate that a minor alarm has occurred, but that general system op-
eration was not affected.
• Information Messages: Provide information concerning system operation.
• Severe Messages: Indicate that a severe error has occurred in the system.
• Warning Messages: Indicate that a condition exists which may affect system performance.
• Network Dump: Provides information concerning network operation.
The fields you must program to set up Message Print include the following:
• Output Port And Local Backup Port below
• Message Print Output Active on page 94
• Output Device Line Width on page 94
• Print Options on page 94
For more information about Message Print, refer to the Message Print Diagnostics Manual.
Each node has its own Message Print programming, Message Print output port, and Message
Print output port backup. There should be a Message Print terminal at each node to monitor
node and network performance and aid in troubleshooting.
• If a node Message Print output port is a node, the network sends Message Print records
to the specified node.
• You cannot select a node as the backup Message Print output port.
• If Message Print output programming forms a loop, the system sends the output to the node
backup Message Print port. For example, if the Message Print port on Node 1 routes to
Node 2 and the Message Print port on Node 2 routes to Node 1, the configuration causes
an infinite loop. Message Print reports for Node 1 would be printed to the backup serial port
on Node 2 and vice versa.
To select ports for the Message Print reports, use one of the following methods:
Because a serial interface is not available on the MiVoice Office 250, the output to Message
Print is sent over IP to a remote node.
NOTE
This remote node can only be an Axxess system, and supported networking with Axxess
systems ended with Release 6.0.
Method A
1. Select System – Maintenance – Message Print – Output Port or Local Backup Port.
93
Features and Programming Guide
2. In the Value column, select the current value, and then type the new value in box. The port
number must be a port on a remote node.
3. Click out of the field or press ENTER. A screen appears showing what is associated with
the number entered.
4. Click OK. The new number appears in the field.
Method B
1. Select System – Maintenance – Message Print – Output Port or Local Backup Port.
2. Right-click the existing port. An option box appears.
3. Select Change Port. A window appears prompting for the device type to include.
4. Select None or Remote Node, and then click Next. The list of ports or nodes appears. To
view items in a list only, click List.
5. Select the desired port, and then click Finish. The selection appears in the appropriate
port field.
When enabled, activates the error/message reporting feature. This option is enabled by default.
Indicates whether the output device has 64, 80, or 132 character columns.
PRINT OPTIONS
Determine the types of error messages to be included in the error report. By default, the following
options are included in the error report (set to Yes):
• Print Alarm Messages: Indicate that a minor alarm has occurred, but that general system
operation was not affected.
• Print Information Messages: Provide information concerning system operation.
• Print Severe Messages: Indicate that a severe error has occurred in the system.
94
System Management
• Print Warning Messages: Indicate that a condition exists which may affect system
performance.
• Print Network Dump: Provide information concerning network operation.
FEATURE DESCRIPTION
Station Message Detail Recording (SMDR) is a system feature that provides a detailed record
of outgoing and incoming calls. The system records only valid calls. Outgoing answered calls
become valid when, depending on system programming, the Valid Call timer expires or polarity
reversal is detected. Outgoing Unanswered calls never become valid. Outgoing calls become
valid immediately if placed on hold or transferred. Incoming calls are always valid immediately.
Phone call data can be retrieved into a IP-compatible SMDR report-generating device.
You can also send SMDR information to the System Manager server. Defining sockets for either
output is programmed through the Administrative Web Portal (see “Administrative Web Portal“
on page 1190), but only one output port for SMDR can be active at any time. In a network, each
node has its own SMDR programming, SMDR output port, and SMDR output port backup. You
can enable or disable network call records on each node. When network calls are enabled, the
following applies:
• The system generates SMDR records for outgoing calls on the node where each trunk used
resides. For example, if a caller on Node 1 places a call using a trunk group on Node 2,
the SMDR report for Node 1 shows the outgoing call to Node 2 and the SMDR reports on
Node 2 shows the incoming call from Node 1 and the outgoing call on the trunk group.
• The call record type for network SMDR records is NET.
• If a node’s SMDR output port is a node, the network sends SMDR records to the specified
node.
• You cannot select a node as the SMDR output port backup.
• If SMDR output programming forms a loop, the system will send the SMDR output to the
node’s backup SMDR port. For example, if the SMDR port on Node 1 routes to Node 2 and
the SMDR port on Node 2 routes to Node 1, the configuration will cause an infinite loop of
SMDR routing. SMDR reports for Node 1 would be printed to the backup serial port on
Node 2 and vice versa.
95
Features and Programming Guide
Selectable SMDR options include any combination of the calls listed on page 101. For a
definition of call cost types see “Call Costs“ on page 84:
The system administrator can determine whether absorbed digits, equal access digits, and/or
toll field digits appear in the SMDR printout. As an example, assume the following number was
dialed: 89 (other system’s trunk access code) + 10288 (equal access code) + 1 (toll field) +
602 (area code) + 961-9000 (seven-digit number). The following programming options can be
used (see page 102 for a definition of suppress digit options):
• Suppress Absorbed Digits
• Suppress Equal Access Digits
• Suppress Toll Digits
Any combination of the above can be used. If all three fields are suppressed, only 602-961-
9000 will print. The system administrator can also suppress or allow call information in the
SMDR report “Dialed Digits” field. The following options are available:
• Suppress Outside Party Number
• Suppress Trunk Number
The system administrator can determine which equipped phone(s) and/or trunks will be included
in the report, and whether off-node devices will be included in reports. However, for incoming
calls, DISA calls, conference calls, and/or ring-in diagnostics, all calls are recorded even when
they involve phones not in the programmed phone list.
SMDR can be programmed to record the elapsed time of calls in seconds (S=XXXXXX) or
hours and minutes (HH:MM). If programmed to record elapsed time in seconds, the ELAPSED
TIME field will show “S=XXXXXX” (XXXXXX represents the number of seconds) for calls up to
999999 seconds long. For calls lasting longer than 999999 seconds, ELAPSED TIME will show
“HH:MM” (hours and minutes rounded up to the nearest minute).
The SMDR output record is printed as shown in the following example. A page heading (with
the day, date, month, year and column headings) is generated just after midnight to show the
change in date. A header is also printed after output from another system source (alarm,
informative message, and so forth), using the same output device, interrupted the SMDR output.
Figure 5: SMDR Output Example
26.05.2015
TYP EXT# TRUNK DIALED DIGITS START ELAPSED COST ACCOUNT CODE
XX XXXX XXXXXXX <28 characters> HH:MM HH:MM:SS $XX.XX XXXXXXXXXX *
In the upper left of the beginning of the SMDR Output, the date for which the data was collected
is shown.
TYP
96
System Management
EXT
The extension number (XXXXX) of the last phone to handle the call is shown. For a CO-to-CO
call, this field shows the extension number of the second trunk involved. For a conference call,
it shows the phone that initiated or answered the call. For an unanswered ring-in, it shows *****.
An outgoing call that has been initiated by another trunk shows the initiating trunk’s number.
TRUNK
The extension number of the trunk used during the call. For an IP network call (using the
networking IPRA), this field shows the extension number of the IP connection used for the call.
DIALED DIGITS
For an outgoing call: The first 28 digits of the telephone number are shown (if ARS was used
to place the call, the modified number, not the dialed digits, are shown). A “>” at the end of the
number indicates that more than 28 digits were dialed. Some digits may be suppressed (see
the previous page for an explanation). For a conference call, this field shows the phone that
brought the trunk into the conference unless the conference ends as a call with only one phone
and one trunk or if all conference parties are put on Individual Hold, in which case the field
shows the last party to handle the call.
For an incoming call: This field is determined by the service type of the trunk that was used
for the call and whether the digits are being suppressed. If the information is not suppressed,
it is included in the record, as shown in Table 15.
START
Shows the time that the call became valid. For an unanswered ring-in, it shows the time the
call began ringing. It is shown in 24-hour time (00:00–23:59).
ELAPSED
Shows the call length from the START time (above) until disconnect or the length of time an
unanswered call was ringing. If the option is enabled that shows call duration in seconds, calls
up to 999999 seconds long appears as S=XXXXXX (XXXXXX represents the number of
seconds) and calls lasting longer than 999999 seconds appear as HH:MM (hours and minutes).
97
Features and Programming Guide
COST
Displays an estimated cost of the call ($XX.XX), based on the database information. If cost
exceeds $99.99, it is printed without the decimal point ($XXXXX). If it exceeds $99999, $$$$$$
is shown instead. If there is no cost, the field is blank.
ACCOUNT CODE
Shows the standard, forced, or optional account code (up to 16 digits). An optional account
code overrides standard or forced account codes. The field is blank if no account code was used.
(RESULT)
PROGRAMMING SMDR
Devices
To assign the phones and trunks to be included in the SMDR output, double-click Devices. A
list of current devices, if any, appears. You can add or delete devices as follows:
To add devices:
1. Select System – Maintenance – SMDR – Devices.
2. Right-click anywhere in the right pane, and then select Add To Devices List. A window
appears prompting for the device type to include.
98
System Management
3. Select the device types (you can use the SHIFT or CTRL key to select more than one item),
and then click Next. A list of devices appears. To view details, click Details.
4. Select the appropriate items, and then select Add Items. When you have added all the
desired devices, click Finish. The selections appear in the list. To view programming
options, double-click the extension number.
To delete devices:
Select the item(s) in the list, right-click, and then select Remove Selected Items.
Each node has its own SMDR programming, SMDR output port, and a local (backup) SMDR
output port. You can turn on/off network call records on each node. By default, the system
suppresses network call records. However, when they are turned on, the following applies:
Because a serial interface is not available on the MiVoice Office 250, the output to SMDR is
sent over IP to a remote node.
NOTE
This remote node can only be an Axxess system, and supported networking with Axxess
systems ended with Release 6.0.
• If the node SMDR output port is a node, the network sends SMDR records to the specified
node.
• If SMDR output programming forms a loop, the system sends the SMDR output to the node
local SMDR port. For example, if the SMDR port on Node 1 routes to Node 2 and the SMDR
port on Node 2 routes to Node 1, the configuration causes an infinite loop of SMDR routing.
SMDR reports for Node 1 would be printed to the local SMDR-associated IP address on
Node 2 and vice versa.
To select the output port and local port for the Message Print reports:
1. Select System – Maintenance – SMDR – Output Port or Local Backup Port.
2. Right-click the existing port. An option box appears.
3. Select Change Port. A window appears prompting for the device type to include.
4. Select None or Remote Node, and then click Next. The list of ports or nodes with details
appears. To view options in a list only, click List.
5. Select the port that you want to use, and then click Finish. The selection appears in the
port field.
The SMDR Output Active option activates the SMDR reporting feature. It is enabled by default.
99
Features and Programming Guide
If the Output to System manager option is turned off, SMDR information is not available to
System Manager users. If turned on, System Manager users can run call reports for this node.
To allow SMDR to give a more accurate representation of elapsed time, the Display Elapsed
Time in Seconds option can be turned on to record the elapsed time of calls in seconds instead
of minutes. For calls up to 999,999 seconds in length, the ELAPSED TIME field shows
“S=XXXXXX” (XXXXXX represents the number of seconds). For calls lasting longer than
999,999 seconds, ELAPSED TIME shows HH:MM. Hours and minutes rounded up to the nearest
minute.
If turned on, operator and international calls are displayed in SMDR as one entry under the
call-type abbreviation “O/I.” If turned off, operator and international calls are displayed
separately in SMDR: operator calls under “OP,” and international calls under “INT.” By default,
this is turned on.
To turn off the Display “O/I” for Operator and International Calls option:
1. Select System – Maintenance – SMDR – Display “O/I” for Operator and International
Calls.
2. In the Value column, select the check box. The field changes to No. To enable the option,
clear the check box.
3. Click out of the field or press ENTER to save the change.
100
System Management
A phone that transfers or manually forwards a call to the public network can be recorded in the
SMDR report. To display redirected information for trunk-to-trunk calls, add the trunks and
phones to the SMDR list. If the trunks and phones are not listed, the phones that transfer or
manually forward CO calls are not recorded in the SMDR report for redirected calls. This option
is disabled by default.
When enabled, SMDR displays a “T” in the output when a Two B-Channel Transfer (TBCT)
occurs. This option is disabled by default. For more information about TBCT, see ISDN PRI
Two B-Channel Transfer on page 284.
Record Calls
The Record Calls options determine the content of the SMDR output. Options include the
following:
• Record All Incoming Calls: Records all incoming calls that are answered, except DID/
DNIS calls.
• Record All Local Calls: Records all calls that use the “local” call cost.
• Record All Free Calls: Records all calls that use the “free” call cost.
• Record All Ring-in Diagnostics: A ring-in message is recorded for every incoming call
(whether answered or unanswered) to indicate how long it rang. All incoming calls are
recorded, even those involving phones not listed in the phone list.
• Record All Toll Local Calls: (U.S. only) Records all calls that use the “toll local” call cost.
• Record All Toll Long Distance Calls: (U.S. only) Records all calls that use the “toll long
distance” call cost.
• Record All Toll (National) Calls: (Europe only). Records all valid long distance toll calls.
• Record All Operator Calls: Records all calls that use the “operator” call cost.
• Record All International Calls: Records all calls that use the “international” call cost.
101
Features and Programming Guide
The Suppress Digits options determine which digits, if any, are suppressed when the dialed
digits are reported. To choose an option, select its current Value and place a check mark in
the box. To remove an option, select remove the check mark. Options include the following:
• Suppress Absorbed Digits: Absorbed digits (on local or PBX lines) do not appear in the
report if this option is selected. In the sample above, the absorbed digits (the other system
trunk access code) would be suppressed so that only 10288-1-602-961-9000 appears. If
absorbed digits are repeatable on a local line, the absorbed digits do not appear in the
SMDR report, even when repeated.
• Suppress Equal Access Digit: (U.S. only) Equal access digits will not appear in the report
if this option is selected. In the sample above, the equal access code field would be sup-
pressed to print only 89-1-602-961- 9000.
• Suppress Outside Party Number: Caller information that is received through ANI or Caller
ID [CLID] does not appear if this option is selected.
102
System Management
• Suppress Toll Digits: When this option is selected, toll digits do not appear in the report.
In the sample above, the toll field is suppressed so that only 89-10288-602-961-9000 prints.
• Suppress Trunk Number: Information received through DID or DNIS [DDI] is not included
in the report if this option is selected.
With the MiVoice Office 250, you can directly access the SMDR socket.
To establish a connection, the client must first establish a TCP/IP socket connection. After a
valid connection has been established, which is independent of any user data actually being
sent or delivered, the client must send a particular login sequence as its first message to the
server. This message must take the following format.
For example, a client with the password 12345678 could use the following to log in.
Figure 7: SMDR Login Message Example
0x0E 0x00 0x00 0x00 0x84 0x31 0x32 0x33 0x34 0x35 0x36 0x37 0x38 0x00
103
Features and Programming Guide
The follow example is an SMDR record in hex format as it is sent from the MiVoice Office 250.
Note that the first four bytes is the length, and the last two bytes are a carriage return (CR) and
a line-feed (LF).
Figure 8: SMDR Record in Hex Format
0x52 0x00 0x00 0x00 0x54 0x4C 0x43 0x20 0x31 0x31 0x32 0x30 0x32 0x20 0x39 0x34
0x30 0x30 0x33 0x20 0x39 0x36 0x31 0x2D 0x39 0x30 0x30 0x30 0x20 0x20 0x20 0x20
0x20 0x20 0x20 0x20 0x20 0x20 0x20 0x20 0x20 0x20 0x20 0x20 0x20 0x20 0x20 0x20
0x20 0x30 0x38 0x3A 0x33 0x36 0x20 0x30 0x30 0x3A 0x30 0x30 0x3A 0x30 0x33 0x20
0x24 0x30 0x30 0x2E 0x30 0x30 0x20 0x20 0x20 0x20 0x20 0x20 0x20 0x20 0x20 0x20
0x20 0x20 0x20 0x20 0x0D 0x0A
The following example is the ASCII representation of the previous SMDR Record. Note that
first row of bolded numbers represents the column (from 1 to 80) in which the specific SMDR
field is located (e.g., the dialed digits field 961-9000 starts at column 17, which is represented
by a 7).
Figure 9: SMDR Record in ASCII Format
12345678901234567890123456789012345678901234567890123456789012345678901234567890
TLC 11202 94003 961-9000 08:36 00:00:03 $00.00
SMDR Formatting
Each SMDR record contains 80 ASCII characters followed by a carriage return (CR) and a line-
feed (LF). Each field of information (for example, Type, Start Elapsed, Cost, etc.) starts in the
same column number, and a space is used to separate the fields.
After the SMDR application connects to the MiVoice Office 250 or at the start of each day, the
MiVoice Office 250 sends two lines of header information. Note that the first row of bolded
numbers represents the column in which the specific SMDR field is located (from 1 to 80) and
is not part of the SMDR output.
Figure 10: SMDR Output Format 1
12345678901234567890123456789012345678901234567890123456789012345678901234567890
Station Message Detailed Recording HH:MM:SS MM-DD-YYYY
A normal SMDR record has the following format. Note that the first row of bolded numbers
represents the column in which the specific SMDR field is located (from 1 to 80) and is not part
of the SMDR output.
Figure 11: SMDR Output Format 2
12345678901234567890123456789012345678901234567890123456789012345678901234567890
ccc eeeee ttttt dddddddddddddddddddddd hh:mm hh:mm:ss $cc.cc aaaaaaaaaaaa*
A ring record has a slightly different format. Note that the first row of bolded numbers represents
the column in which the specific SMDR field is located (from 1 to 80) and is not part of the
SMDR output.
Figure 12: SMDR Output Ring Record
104
System Management
12345678901234567890123456789012345678901234567890123456789012345678901234567890
***** ttttt RING........ hh:mm hh:mm:ss
TYP EXT# TRUNK DIALED DIGITS START ELAPSED COST ACCOUNT CODE
LOC 11201 94003 961-9000 09:28 00:00:05 $00.00
TLD 11205 94002 1-212-555-5346 10:29 02:05:06 $12.50*
LOC 11202 94006 961-9000 10:39 01:10:03 $00.00
***** 94000 RING......480-555-9911 11:37 00:00:06 *
The information provided in this section is limited to the description of the SMDR socket
connection to the MiVoice Office 250. For additional SMDR feature and programming
information, see page 95.
Membership in the Mitel Solutions Alliance (MSA) at the Developer Basic or Developer
Advanced member level is required to obtain Developer Support regarding MiVoice Office 250
SMDR use and troubleshooting. See www.mitel.com/msa for additional information or to apply
online.
105
Features and Programming Guide
106
Chapter 4
PRIVATE NETWORKING AND SYSTEM
NODES
Features and Programming Guide
INTRODUCTION
This chapter provides information to help you configure network settings or add system nodes
to a private IP or T1/E1 PRI network.
For more information about private networks and nodes, refer to the following chapters in the
MiVoice Office 250 Installation Manual :
• Appendix A: Private Networking
• Appendix B: Network IP Topology
108
Private Networking and System Nodes
The Internet Protocol Resource (IPRA) application relies on a unique numbering plan to make
connections across the network. You must assign each Processor Module (and if applicable,
the Processor Expansion Card) in the network a unique extension that the other Processor
Modules must be able to recognize. For this reason, Mitel strongly suggests that you use the
P6XXY numbering convention, where XX is the node number and Y is the IPRA number.
For example, the Processor Module on Node 1 would be P6011 and the Processor Expansion
Card on Node 1 would be P6012.
For example, the Processor Module on Node 2 would be P6021 and the Processor Expansion
Card on Node 1 would be P6022.
You should also complete the IP Networking Planning Sheet (see Appendix A: Private
Networking in the MiVoice Office 250 Installation Manual ) before you begin programming IP
networking. The Private Networking section includes programming examples. If you do not
follow a numbering convention and identify the extensions before you program the IPRAs, it
will be difficult to successfully set up your network.
If necessary, choose a “P6XXY” extension where XX is the node number where the IP
resource resides and Y is the IP resource number. A default extension (P6000) is provided,
but it may need to be changed if the same extension already exists. If using the Processor
Expansion Card (PEC), the default extension is P6001.
The extension you assign to each IP resource must reflect the node where the IP resource
resides. If it does not, it will be difficult to establish the IP connections between IP resources
NOTE
on a multi-node system. This numbering convention also limits the number of networking IP
resources within a private network to 1000.
2. Program the IP Connection: The IP resource screen contains a link to the IP resource
IP connection. Whenever the system creates an IP connection, the system broadcasts the
IP information to the other nodes as a database update, and the new IP connection be-
comes an off-node device on the other nodes (provided the remote node does not block
the database change such as when a DB Programming session is active on the remote
node). This does not automatically configure the IP resources for use by the network. You
must manually program networking parameters locally as well as on each remote node.
3. Program the IP Connection for the remote node: You can also create IP connections
to represent IPRAs on other nodes within the network. To see these off-node IP connection
fields, you must have a node created in System\Devices and Feature Codes\Nodes.
4. Create an off-node IP connection in the IP Connections field.
109
Features and Programming Guide
5. Enter the “P6XXY” extension of the off-node IP connection. Again, you must assign a unique
extension to each IP connection within the network. When creating off-node connections
and other IP-related extension numbers, use a numbering plan that associates the exten-
sion to the device and the node on which it resides. For example, the first IP resource on
node 2 would be P6021 (P6 followed by the node number, then the IP resource number).
The second IP resource would be P6022, and so forth.
6. Program a remote IP address, remote audio receive port, and remote listening port in the
IP Connection screen.
7. Program the Node IP Connection Group: The off-node IP connection screen also con-
tains a link to the Node IP Connection Group field to which the IP connection belongs. The
system automatically creates a node IP connection group for each remote node you pro-
gram. A node IP connection group corresponds to an IP network connection between the
local node and a remote node. Changes to the Node IP Connection Group parameters do
not take effect until the next call. Changes do not affect existing calls.
110
Private Networking and System Nodes
NODES
The following sections describe local and remote nodes, as shown in the figure below, and how
to create and program them. You must restart DB Programming when you create a node.
You can also use the Networking Wizard to quickly add and configure new nodes. See
“Launching the Networking Wizard“ on page 115 for instructions on how to launch the wizard.
For complete information about the Networking Wizard, refer to the MiVoice Office 250 DB
Programming Help.
LOCAL NODES
The local node is automatically created in DB Programming when the system is installed. For
the local node, you can only assign the description, username, and node number.
REMOTE NODES
Remote nodes are Mitel Advanced Communication Platform systems, such as the MiVoice
Office 250 which are connected to the local node. You must program each remote node with
a node number, node trunk groups, and a search algorithm.
111
Features and Programming Guide
To program the node trunk or node IP connection groups included in this node:
1. Select System – Devices and Feature Codes – Nodes – <node>.
2. Double-click Node Trunk/IP Connection Groups.
3. Do the following:
Note that this is an ordered list. Place the trunk or IP connection groups in the order you
want them to be accessed when the hunt group (if applicable) receives calls.
112
Private Networking and System Nodes
• To add to the bottom of the list: Do not select any existing trunk or IP connection groups.
• To add to the list above an existing trunk group: Select the trunk or IP connection group.
a. Right-click in the right pane, and then click Add To Node Trunk/IP Connection
Groups List. A window appears prompting for the device type to include.
b. Select Node Trunk Group or Node IP Connection Group, and then click Next.
c. The items with details appear. To view items in a list only, click List. Select the items
(you can use the SHIFT or CTRL key to select more than one item), and then click
Add Items.
d. When you have added all the node trunk groups necessary, click Finish. The selections
appear in the list. To view programming options, double-click the extension number.
• To move a trunk or IP connection group to another location in the list:
Drag and drop the trunk or IP connection group to the new position. Or, select the trunk
or IP connection group to move and press CTRL + the up/down arrow to move the
trunk or IP connection group up or down in the list.
The search algorithm determines whether the node trunk groups are accessed in linear or
distributed order:
• Linear: The system first attempts to route a call through the first node trunk group listed.
If it is unable to route through that node trunk group, it attempts to route the call through
the second node trunk group in the node. The system continues to attempt to route the call
through the subsequent node trunk groups listed in the node until it successfully routes the
call or exhausts all node trunk groups in the list.
• Distributed: The system equally distributes the first node trunk group used with each call.
For example, if the system routed the first call through the first node trunk group in the node,
it routes the second call through the second node trunk group in the node.
Determining the order to list the Node Trunk or IP Connection Groups in a node and when to
use Linear or Distributed search type depends on your system configuration and traffic. For
example, if the Node Trunk or IP Connection Group List has more than one trunk group that
connects to the same node, you should use the Linear search type instead of Distributed. For
more information, refer to “Appendix A: Private Networking,” in the MiVoice Office 250
Installation Manual .
113
Features and Programming Guide
The Audio for Calls Camped onto this Device field defines the audio that callers hear when
camped-on to the node trunk or IP connection group. For more information about audio settings,
see “Device Audio for Calls Settings“ on page 438.
To program the Audio for Calls Camped onto this Device field:
1. Select System – Devices and Feature Codes – Nodes – <node> – Audio for Calls Camped
onto this Device.
2. In the Value column, select the option from the list.
3. Click out of the field or press ENTER to save the change.
114
Private Networking and System Nodes
From the DB Programming menu bar, select Tools, and then select Networking Wizard. The
Networking Wizard Welcome screen appears.
For complete information about the Networking Wizard, refer to the MiVoice Office 250 DB
Programming Help.
115
Features and Programming Guide
In the default state, the Enable Voice Processor flag is enabled. If you do not have an
NOTE external voice processing system connected to the MiVoice Office 250, disable this
flag before attempting to import or export information over the network.
If the network is unable to export or import an extension to a node (automatically or using the
Export/Import feature) because there is an active programming session on that node, the node
is unable to communicate with its Voice Processor port, the node is down, or the links to the
node are down, the new extension will not be added to or changed on that node. (If Message
Print is enabled, error messages will indicate any unsuccessful broadcasts.) You must manually
add or change the new extension in the node database or try to export or import it later. You
may want to check each node to verify that their off-node device lists are programmed properly
to allow access between the nodes.
Extension numbers that exist before the network is established will not be automatically
broadcast to other nodes, until they are modified. They must be exported or imported using the
Export/Import option or programmed manually at each of the other nodes. Also, each node can
have only 8000 off-node device entries in its database. When that limit has been reached, new
devices received through network broadcasts cannot be added to that node database.
116
Private Networking and System Nodes
3. Select the following information, and then click Export or Import. Or, click Close to cancel
the operation without exporting or importing any information.
• Remote Node Number: Select the node(s) you want to export the information to or
import the information from, by placing checks in the appropriate boxes. Click Select
All or Unselect All to select or unselect all of the nodes.
• Device Type: Select any combination of device types you want to export or import by
checking the appropriate boxes. IP device information is automatically included if you
import or export all phones. In addition, IP SLAs are automatically included if you import
or export all single line sets. Click Select All or Unselect All to select or unselect all
of the device types.
NOTE ACD agents may be imported or exported the same as the other device types.
When you click to begin the export or import operation, the upper panel shows the export or
import status.
If you are exporting information, the node you are exporting from is listed as “Node X: Export
Source.” The destination node or nodes will show the node number and the current status of
the export. Once the import from a node is completed, either successfully or unsuccessfully,
the import source node displays the final status of the import. The screen will show messages
as explained in Table 16 on page 118.
117
Features and Programming Guide
If the local node cannot communicate with the remote node, the export or import will fail.
Before you attempt to export or import information, verify that you can reach the remote
node by dialing the extension assigned to the remote node. If you hear dial tone, you should
be able to successfully export or import information. If you receive a NOT REACHABLE
message, you must determine why calls are not properly being routed to the specified
remote node before you can export or import information. If you camp on to a node while
trying to reach the remote node, wait for the node trunk group to become available so that
you can guarantee the remote node can be reached.
5. After attempting to export or import information, check Message Print output for error
messages:
• If a programming session is active on the remote node, you cannot export information
to that node until the programming session has been terminated. Also, if the remote
node has a Voice Processor and the link is down, the export will fail on the remote node.
• If an existing extension on the remote node conflicts with an exported extension num-
ber, you will see one of the error messages listed in the following table. The error
message indicates the resulting action on the remote node. In the example used in
Table 17 on page 119, the device information was exported from local node 1 to remote
node 2.
118
Private Networking and System Nodes
119
Features and Programming Guide
MODEMS
You can create off-node devices for modems on the other nodes and program individual
modems on the Local node, as shown in the figure below.
NOTICE
Possible Database Corruption. Poor line quality may cause data transmission problems when
the modem connection exceeds 19200 baud. For this reason, Mitel recommends that you do not
use the modem to restore the database. If you attempt a restore using the modem, the database
may become corrupt.
OFF-NODE MODEMS
You cannot program off-node modems across an IP connection. Also, you must
IMPORTANT program a remote node on the system before you can create an off-node modem
extension.
Off-node modems allow access to modems on other nodes. When you double-click a remote
node, a list of its existing off-node page modems with extensions, descriptions, and usernames
appears. You can create or delete off-node modems. After you create the modems, you can
change modem extensions and enter descriptions and usernames. When programming
modems, follow a universal numbering plan (for example, the extensions must be unique).
NOTICE
System Instability. Do not create or delete more than 2000 off-node devices at a time. Batch
creating more than 2000 off-node devices may cause system problems.
120
Private Networking and System Nodes
4. For each extension, program the description (using up to 20 characters) and the user name
(using up to 10 characters). After you program the off-node modem extension, you can
use the off-node modem extension for the same functionality as the local modem extension.
LOCAL MODEMS
You can program local modems.
121
Features and Programming Guide
SYSTEM MANAGER
System Manager is a server-based application that centralizes the management functions of
the system and its peripheral products. To interface with System Manager:
• Call Processing requires a System Manager agent account for each node that will connect
to the System Manager server.
• You must upload the Certification Authority (CA) certificate for System Manager. If you do
not upload the CA certificate, you will not be able to access DB Programming through the
System Manager Web interface.
• You must configure DB Programming to connect to System Manager.
For details about agent accounts and DB Programming requirements, refer to the System
Manager Installation and Maintenance Manual, part no. 835.2743.
122
Private Networking and System Nodes
• Password: Identifies the password for the agent account that is programmed in System
Manager. System Manager has been replaced by System Administration and
Diagnostics.
The Username and Password fields must match the information that is programmed in
NOTE System Manager. If these fields do not match the agent account information, the node will
not connect to System Manager.
123
Features and Programming Guide
124
Private Networking and System Nodes
PRIVATE IP NETWORKING
This section describes how the MiVoice Office 250 handles Private IP Networking:
• IPRA Resources below
• Compatibility with Existing Products below
• Resource Allocation on page 125
• Resource Reservation on page 127
• IP Device Resource Manager on page 127
• Data Connections on page 127
• Audio Connections on page 128
• IP Connections and IP Connection Groups on page 128
• QoS on page 128
• Audio Connections to IP Devices on page 128
• DTMF Configuration on page 129
• Diagnostics on page 129
• NAT Traversal for IP Phones on page 129
• Automatic NAT Detection on page 130
IPRA RESOURCES
The Internet Protocol Resource Application (IPRA) supports both IP devices and private
networking. IPRA supports up to 32 IP resources, including MGCP trunks, SIP gateway trunks,
multi-protocol phones, or IP networking ports.
For example, an IPRA on one node can communicate directly with an IPRA on another node,
but not with a T1M or T1M-2 module or with an IP Networking Resource. While the IPRAs, T1M
or T1M-2s, and IP Networking Resources cannot communicate directly, they can still be used
in the same system multi-node network.
RESOURCE ALLOCATION
System resources for Private IP Networking are allocated in the following manner:
• IP Networking Resources: The system allocates IP Networking resources upon call setup.
If the resources necessary to complete a call are not available, the call camps-on to the
125
Features and Programming Guide
resources and the system does not deliver the call to its destination until the resources are
available.
• Camp On: Similar to private networking using T1/PRI or E1/PRI, the system first attempts
to route a call using every programmed route. If all routes fail, the system then camps on
to the first programmed route.
• Transfers: The system does not release IP Networking resources following a transfer, even
if those resources are no longer needed for the current audio configuration.
For example, device A on node 1 calls device B on node 2 using IP Networking Resource
W on node 1 and IP Networking Resource X on node 2.
Device A Device B
IP IP
Networking Networking
Resource Resource
W X
Node 1 Node 2
Device B transfers the call to device C on node 3 using IP Networking Resource Y on node
2 and IP Networking Resource Z on node 3 for the transfer announcement call.
When device B hangs up to complete the transfer, the system may optimize the route such
that the system uses only IP Networking Resource W on node 1 and Resource Z on node
3 to make the audio connection. However, the system does not release Resources X and
Y on node 2 for use by other calls.
• Multiple Ring-In Calls: The system reserves IP Networking Resources for each leg of a
complex call. However, once the call is answered, the system releases all Resources that
are allocated for legs that no longer exist.
For example, device A on Node 1 calls an All-Ring Hunt Group with three members on
Node 2. The system reserves three IP networking resources on each node, allowing each
member to receive an incoming call ring.
126
Private Networking and System Nodes
Node 1 Node 2
If only two IP networking resources are available on one of the nodes, the system reserves
the two available IP networking resource pairs and rings only two members, applying Camp
On to the third resource pair. Once a Hunt Group member answers the call, the system
releases the extra resources such that only one resource on Node 1 and one resource on
Node 2 are used.
NODE 1 Node 2
RESOURCE RESERVATION
The Resource Reservation Tool provides the interface for reserving IP resources for devices
or applications in an oversubscribed system. After IP resources are reserved for particular
purposes, the remaining resources are shared on a first-come, first-served basis. See page 675
for details.
DATA CONNECTIONS
The following data connections are maintained by the Private IP Networking feature:
• Data Channels: The system maintains one data connection between each node pro-
grammed for Private IP Networking. The system uses this data connection for call control
and datagram messaging. When a data connection fails, the system attempts to establish
a new connection using alternative IPR application resources if they are available. If all
data connections fail, the system may drop calls in progress, and further call attempts using
the connection are blocked.
• Route Optimization: Call control route optimization using IP works almost identically to
call control route optimization using T1/E1/PRI. The system identifies instances where a
call passes through the same node twice (a route loop) and eliminates the loop. The system
releases all resources within the loop, including DSPs.
127
Features and Programming Guide
AUDIO CONNECTIONS
The system monitors the following audio connections:
• Audio Connection Status
• Audio Connection Parameters
• Audio Route Optimization
• Insufficient Bandwidth
QOS
The system sets the ToS (Type of Service) bits in the IP packet headers to aid the network in
implementing Quality of Service (QoS). The system uses the Audio RTP Type of Service and
Data Type of Service flags to set the appropriate ToS bits in the header. For programming
instructions, see “Local Processor Module and Expansion Card IP Settings“ on page 645.
128
Private Networking and System Nodes
Sometimes the system may not detect that a call is connected over an IP network. If this
NOTE situation occurs, the system may allow users to enable enhanced speaker phone mode,
which will degrade the call quality.
DTMF CONFIGURATION
You can program the IPR application to use a specific set of values that affect DTMF detection.
This configuration allows you to make the system more or less sensitive to DTMF tones, which
ultimately affects the amount of talkoff. In general, the more sensitive the system is to DTMF
tones, the more likely talkoff is to occur. For programming instructions, see “DTMF Detection
Information“ on page 964.
DIAGNOSTICS
The IP Networking application includes several tools for performing diagnostics when
troubleshooting. These tools are separate from call processing and can display only information
local to the IPR application. There are also programming displays to control how the call
behaves.
The MiVoice Office 250 supports connecting with IP phones over the Internet while allowing
networking to utilize a customer's wide area network (WAN) behind a Network Address
Translation (NAT)/firewall. This system enhancement was not available in the initial v1.0
release.
This enhancement permits a system residing behind a NAT/firewall to utilize a static IP address
to allow IP phones from the Internet to traverse, or bypass, the NAT. This capability is useful
because NAT does not translate IP addresses in the payloads of IP packets, and VoIP traffic
on the Internet is subject to Quality of Service (QoS) problems.
The MiVoice Office 250 can be programmed to use the appropriate address for each IP phone—
Native (internal to the WAN) or NAT (external to the WAN). In other words, instead of depending
on NAT, the MiVoice Office 250 can be programmed to use the appropriate IP address when
communicating with external IP phones.
129
Features and Programming Guide
For instructions to implement near-NAT traversal for IP phones, see “NAT Address Type“ on
page 260.
The preferred method to deploy remote phones (teleworker phones) is to connect a Mitel Border
Gateway to the MiVoice Office 250.
For more information about networking options in general, refer to “Appendix B: Network IP
Topology,” in the MiVoice Office 250 Installation Manual .
Automatic Network Address Translation (NAT) Detection allows Mitel IP phones to operate
inside or outside a private network NAT or firewall without having to change the NAT Address
Type field in the IP Settings folder in DB Programming every time the phone is relocated. The
feature enables Mitel hard IP phones and the Mitel 8602 IP softphone to place and receive
calls either from inside or outside a Mitel private network. An example NAT configuration is
shown in the figure on page 115.
To accomplish this near-end NAT traversal capability, the MiVoice Office 250 is programmed
with both its Native IP address and the corresponding statically NATed public IP address. The
platform being programmed with both addresses allows system-defined IP phones calling in
from the Internet to traverse the NAT/firewall.
If the default Auto NAT Type is designated for an IP phone in DB Programming, the Auto NAT
Detection feature determines the correct IP address to use when the phone comes online.
Once the NAT type is determined, the IP phone uses the setting for all calls. However, the NAT
IP address associated with the system must be programmed manually in order for the NAT
detection test to run.
130
Private Networking and System Nodes
Firmware on these phones cannot run the Auto NAT Detection test. For these phones, manually
select the NAT Type setting in DB Programming.
Neither automatic nor manually selected NAT traversal applies to the 8601 SoftPhone for Pocket
PC application.
The figure below shows the configurations of phones programmed for the three NAT Types in
DB Programming.
IP Phone IP Phone
or Softphone or Softphone
application application
IP Phone
or
131
Features and Programming Guide
Mitel recommends that you use these versions if you are using the 99 Nodes feature, so you
NOTE
should upgrade to the latest non-chargeable upgrade available.
V4.0 OR
MIVOICE OFFICE 250 VERSION V2.3 V2.4 V3.0 V3.1 V3.2 LATER
Applications
CT Gateway 4.30x 4.40x or Later
Auxiliary Applications
Attendant Console 3.004 3.1x or Later
Devices
52XX/53XX Not Supported 1.06.00.04 or Later
Page 1 of 2
132
Private Networking and System Nodes
V4.0 OR
MIVOICE OFFICE 250 VERSION V2.3 V2.4 V3.0 V3.1 V3.2 LATER
8528/8568 Not Supported All Versions
8660 8.2.2 8.3.0 or Later
8664/8665/8668 1.0.0.4 or Later
8600/8620/8662 2.2.02 2.2.04 or Later
8690 1.1.8 or Later
IP PhonePlus 8.1.0 or Later
IP SLA 8.1.0 8.2.0 or Later
Page 2 of 2
Increased Node Capacity: A system The node that is resetting is running Upgrade the node to v2.1 or
is continuously experiencing software an invalid software version. After the later.
exceptions and resetting. The system network is operating at a 63+ node
resides in a network of 63+ nodes. The network, nodes cannot downgrade to
node is running earlier than v2.1 earlier than v2.1.
software.
Attendant Console Causes Slow- This is a “brute force” OAI command Leave the Attendant Console
Downs: The system slows down when that requests all the off-node device running continuously rather
an Attendant Console application information from the system. The slow than shutting off the
connects to a system. down is directly related to the number application during non-work
of off-node devices in the system. hours. This will reduce the
number of refreshes the
console performs to get status
of the devices in the network.
“Brute Force” Network Broadcasts: Insufficient IP networking resources. This condition of oscillating on
The system uses the last IP resource. the last IP resource is
The system sends a broadcast undesirable. If the system is in
message to all nodes in the network to this state, upgrade to a
inform them that it cannot handle IP Processor Expansion card to
networking calls. As an IP resource increase the number of IP
frees up, the system sends a resources, or attempt to
broadcast message to all nodes in the reduce the number of IP
network again to inform them that it phones to allow more
can handle IP networking calls. If the networking IP resources. Note
system oscillates between this last IP that v2.1 or later system has
resource, it can cause a tremendous been modified to prevent the
amount of IP traffic on the entire “brute force” network
network. broadcasts.
133
Features and Programming Guide
IP NETWORKING
Table 19 summarizes the troubleshooting strategies recommended for resolving discrepancies
that may occur with IP networking.
Page 1 of 4
134
Private Networking and System Nodes
Page 2 of 4
135
Features and Programming Guide
Page 3 of 4
136
Private Networking and System Nodes
Page 4 of 4
NETWORK NODE
Table 20 summarizes the troubleshooting strategies recommended for resolving discrepancies
that may occur with a network node.
Page 1 of 2
137
Features and Programming Guide
Page 2 of 2
138
Chapter 5
NUMBERING PLANS
Features and Programming Guide
INTRODUCTION
This chapter provides information to program MiVoice Office 250 Numbering Plan options, as
shown in the figure below. The system Numbering Plan determines how the system manages
outgoing calls. Numbering Plan programming options include the following:
• Area Flags on page 141
• Classes of Service (COS) on page 143
• Device Baseline Extensions on page 148
• Automatic Route Selection (ARS) on page 150
• Dial Rules
• Facility Groups
• Route Groups
• Emergency Calls on page 166
• Home Area Codes on page 168
• Toll Strings on page 169
• User Groups on page 172
140
Numbering Plans
AREA FLAGS
U.S. installations only. If your system office codes (digits 4, 5, and 5 in a 10-digit number) and
area codes (digits 1, 2, and 3 in a 10-digit number) overlap, or if toll digits are allowed on toll
calls or long distance calls, you can change the area and office code flags.
The first two flags from the bulleted list below determine how area and office codes overlap.
Table 21 shows the difference between the standard North American Numbering Plan (NANP)
and each of the overlap flags, which are represented by the following variables:
• N = 2–9
• Z = 0 or 1
• X = 0–9
The following are system Area Flags used for Numbering Plans:
• Office Codes Used as Area Codes: An area code in another location uses an NXX pattern
that matches an office code within the system site area code. Because the system cannot
differentiate between an office code and an area code when the second digit dialed is 0–
9, it will wait for the Interdigit timer to expire or another digit to be dialed before assuming
that dialing is completed.
• Area Codes Used as Office Codes: One or more office codes within the system site area
code use an NZX pattern that is the same as an area code in another area. Because area
codes do not resemble office codes (NXX), end-of-dialing detection is not affected by this
flag.
• Local 7/10 Digit Dialing: When this flag is enabled, outgoing calls are identified as having
reached the end of dialing if the first digits are not a toll field, equal access field, operator
access field, or a local area code. This function speeds up placement of local seven-digit
calls in an area where some local calls require 10 digits.
• Toll Digit Allowed On Toll Local Calls: This option applies only if the area and office
codes overlap. Callers in the site area code usually dial a 1 when placing a call within the
local area code(s).
• Toll Digit Required On Toll Long Distance Calls: This option applies only if the area and
office codes overlap. Callers in the site area code must dial a 1 when placing a call outside
of the local area code(s).
141
Features and Programming Guide
142
Numbering Plans
FEATURE DESCRIPTION
Class of Service (COS) is used for toll restriction, which prevents system users from placing
outgoing calls. COS designations (01–09 or 01–07) have default values and COS designations.
COS designations 10–16 or 08–16 are blank. Classes of service 02–16 have programmable
dialing patterns, and all have programmable day and night lists of devices.
Exact (complete) pattern matches with classes of service marked as “allowed” always override
exact (complete) pattern matches with classes of service marked as “denied.” Also, partial
(incomplete) pattern matches with classes of service marked as “allowed” always override
partial (incomplete) pattern matches with classes of service marked as “denied.” The only time
a pattern in a denied class of service overrides a pattern in an allowed class of service is when
the match with the denied pattern is exact (complete) and the match with the allowed pattern is
The following are COS designations for U.S. systems (for European systems, see page 144):
• COS 01 – ARS Only: (This is a phone COS only. It is not used for trunk groups.) When
enabled, users must use Automatic Route Selection (ARS) to place calls. Users hear re-
order tones when attempting to place a call using any other method. A restricted user can
still select individual trunks if the trunks are designated as “exempt from ARS Only” (see
page 540), were transferred, were placed on hold, or are recalling or ringing. Trunk restric-
tion determines which trunks in the ARS route group can be selected by the phone or voice
processing application.
• COS 02 – Deny Area/Office: This restriction is divided into eight user groups (see
page 172) to allow the use of varying area and office code restriction tables. This reduces
restrictions for some of the phones, voice processing applications, or trunk groups while
increasing restrictions for others. Each phone, application, and trunk group is assigned a
day mode and a night mode user group. Within each user group, you can designate area
codes as restricted, allowed, or extended. Restricting an area code prevents users from
placing calls to that area code. Allowing an area code allows all office codes within that
area code. You can designate an area code as extended to determine which office codes
(up to 800) are allowed or restricted within that area code. For each user group, you can
mark up to 800 area codes as allowed or restricted in the database list, and up to six area
codes can be marked as extended.
• COS 03 – Deny Operator: Calls to numbers that match the dial patterns for this class of
service (defaults to [Q]RN+, [Q]R0, and [Q]RE) are restricted, unless the number also
matches a dial pattern in an “allowed” class of service that is assigned to the phone, voice
processing application, or trunk group.
143
Features and Programming Guide
• COS 04 – Deny Toll Access: Calls to numbers that match the dial patterns for this class
of service (defaults to [Q]TN+ and [Q]TE) are restricted, unless the number also matches
a dial pattern in an “allowed” class of service that is assigned to the phone, voice processing
application, or trunk group.
• COS 05 – Deny International: Calls to numbers that match the dial patterns for this class
of service (defaults to [Q]I+) are restricted, unless the number also matches a dial pattern
in an “allowed” class of service that is assigned to the phone, voice processing application,
or trunk group.
• COS 06 – Deny Equal Access: Calls to numbers that match the dial patterns for this class
of service (defaults to Q+) are restricted, unless the number also matches a dial pattern in
an “allowed” class of service that is assigned to the phone, voice processing application,
or trunk group.
• COS 07 – Deny Local Calls: Calls to numbers that match the dial patterns for this class
of service (defaults to N+) are restricted, unless the number also matches a dial pattern in
an “allowed” class of service that is assigned to the phone, voice processing application,
or trunk group.
• COS 08 – Denied Numbers: Calls to numbers that match the dial patterns for this class
of service (defaults to 1900NXXXXXX+ and 976XXXX+) are restricted, unless the number
also matches a dial pattern in an “allowed” class of service that is assigned to the phone,
voice processing application, or trunk group being used. Calls are only restricted if the
dialed patterns match the denied pattern exactly and that is the only class of service you
have. Allowed numbers (as follows) always override denied patterns, even if the numbers
are similar.
• COS 09 – Allowed Numbers: Calls to numbers that match with the dial patterns for this
class of service, defaults to 1(800, 888, 877, 866, 855, 844, 833, and 822)NXXXXXX+, are
allowed, even if number also matches a dial pattern in a restricted class of service that is
assigned to the phone, voice processing application, or trunk group being used.
The following are COS designations for European and Australian systems (for U.S. systems,
see page 143):
• COS 01 – ARS Only: (This is a phone COS only. It is not used for trunk groups.) Calls can
only be placed using the Automatic Route Selection (ARS) feature when this restriction is
assigned. The user will hear reorder tones when attempting to place a call using any other
method. A restricted user can still select individual trunks if the trunks are designated as
“exempt from ARS Only” (see “Toll Restrictions“ on page 539), were transferred, were
placed on hold, or are recalling or ringing. Trunk restriction determines which trunks in the
ARS route group can be selected by the phone or Voice Processing application.
• COS 02 – Deny Operator: Calls to numbers that match the dial patterns for this class of
service (defaults to R+) are restricted, unless the number also matches a dial pattern in an
“allowed” class of service that is assigned to the phone, voice processing application, or
trunk group being used.
• COS 03 – Deny Toll Access: Calls to numbers that match the dial patterns for this class
of service (defaults to TN+, TE, 010+, and T1+) are restricted, unless the number also
144
Numbering Plans
matches a dial pattern in an “allowed” class of service that is assigned to the phone, voice
processing application, or trunk group being used.
• COS 04 – Deny International: Calls to numbers that match the dial patterns for this class
of service (defaults to I+) are restricted, unless the number also matches a dial pattern in
an “allowed” class of service that is assigned to the phone, voice processing application,
or trunk group being used.
• COS 05 – Deny Local Calls: Calls to numbers that match the dial patterns for this class
of service (defaults to N+) are restricted, unless the number also matches a dial pattern in
an “allowed” class of service that is assigned to the phone, voice processing application,
or trunk group being used.
• COS 06 – Denied Numbers: Calls to numbers that match the dial patterns for this class
of service (defaults to 0891+ and 0898+) are restricted, unless the number also matches
a dial pattern in an “allowed” class of service that is assigned to the phone, voice processing
application, or trunk group being used. Calls are only restricted if the dialed patterns match
the denied pattern exactly and that is the only class of service you have. Allowed numbers
(as follows) always override denied patterns, even if the numbers are similar.
• COS 07 – Allowed Numbers: Calls to numbers that match with the dial patterns for this
class of service, defaults to 0345+, 0500+, 0645+, and 0800+, are allowed, even if number
also matches a dial pattern in a restricted class of service that is assigned to the phone,
voice processing application, or trunk group being used.
145
Features and Programming Guide
6. Select the appropriate items, and then select Add Items. When you have added all the
devices, click Finish. The selections appear in the list. To view programming options,
double-click the extension number.
Select the device, right-click, and then select Remove Selected Items.
Select the dialing pattern, right-click, and then select Remove Selected Items. (You can use
the SHIFT or CTRL key to select more than one item.)
146
Numbering Plans
If you want the dialing patterns to be “allowed,” enable this option. If you want the dialing patterns
to be “restricted,” disable the option.
147
Features and Programming Guide
To support the MiCollab Unified Messaging (UM) voice processing system, Device Baseline
NOTE Extensions include new Session Initiation Protocol (SIP) options. For more information about
MiCollab Unified Messaging (UM), see page 864.
When you add a system device, the system checks the Device Baseline Extension list for the
starting extension, as shown in the following example.
In this example, the Device Baseline Extension for a phone is 1000. However, extensions 1000
and 1001 were previously assigned, so the system shows the first available extension,
extension 1003, in the Starting Extension box. The number of digits is maintained. That is, if
the Device Baseline Extension were 10000 instead, the system would show the first available
extension after 10000. Note that wildcard extensions (for example, 12XXX) are not valid.
148
Numbering Plans
You can also use the Configuration Wizard to program the following devices with starting
baseline extensions:
• Phones
• Hunt Groups
• Voice Processor Applications
• Page Zones
• Trunk Groups
• Trunks
See the MiVoice Office 250 Database Programming Help for details.
149
Features and Programming Guide
FEATURE DESCRIPTION
Automatic Route Selection (ARS) is a money-saving feature that allows the system to be
programmed to select the least expensive route for placing outgoing calls. It can be used for
placing outgoing calls and transferring or forwarding calls to outside telephone numbers.
Phones can be restricted to using only ARS for placing outgoing calls. Also, because users do
not have direct access to trunks on other nodes, ARS is the only way users can place calls
using the other nodes’ trunks.
Each node has its own Automatic Route Selection (ARS) programming, which the system uses
to select the least expensive route for outgoing calls. Because users do not have direct access
to trunks on other nodes, ARS is the only way users can place calls to trunks on other nodes.
ARS calls are limited to one “hop” to another node. For example, if the system routes an outgoing
call to another node, the other node cannot route the outgoing call to any other node. This
prevents the possibility of an infinite loop when the system searches for a node to route the
outgoing call.
Make sure the phones that use ARS have outgoing access for the trunk groups and nodes.
For more information about trunk group programming, see “Programming Trunk Group Options“
on page 534. For more information about node trunk group programming, see “Viewing or
Changing Node Trunk Group Information“ on page 576.
You program ARS using route groups and facility groups with dialing rules:
Route Groups: A route group contains dialing patterns and facility groups.
• The dialing patterns are used to determine the calls that will be routed through the route
group. For example, the default dial pattern for Route Group 1 is N+, any number of digits
beginning with digit 2–9 for the U.S. (digit 2–9, 345+, 0500+, 0645+, and 0800+ for Europe).
If a number is dialed that begins with 1, it will not be routed through this route group.
• Each route group has an ordered list of facility groups that contain lists of local trunk groups
and/or nodes. There can be 100 facility groups in the system. You should program facility
groups so that the least-expensive route is checked and, if available, is selected first. If the
least-expensive facility group is not available the system checks the other groups in the list
until it finds an available trunk.
Facility Groups: A facility group contains trunk group or node lists and dial rules.
• The list can include local trunk groups or nodes. They cannot contain node trunk groups.
• The dial rules tell the system what to dial. The system can have up to 32 dial rules, 26 of
which are programmable. Each facility group can use up to 32 dial rules. For example, if
150
Numbering Plans
the selected route group requires that the number contain “1” but no area code (national
dialing in Europe), the dial rules include the 1 and drop the area code (national dialing).
The modified number can contain up to 32 digits. (If SMDR is enabled, the modified number,
not the digits dialed, will appear in the SMDR call record.) When programming ARS, you
can use preset dial rules or create new dial rules that add up to 16 digits each. For more
information about Dial Rules, see “Programming ARS Dial Rules“ on page 155.
When ARS is selected, the user dials the number—including the Area Code, if needed—and
the system performs the following actions:
1. Checks the dialed number and matches the dialing pattern to a route group: The
system checks the route groups in numerical order and selects the first group that applies
to the dialing pattern of the number that was dialed.
If the Emergency Call feature is programmed to use ARS, the emergency calls will always go
NOTE
through Route Group 1, regardless of route group programming.
2. Selects a facility group: If all of the trunks are busy, and the phone is enabled for ARS
camp on, the call will camp on to the facility group until a trunk is available.
3. Checks for toll restrictions and outgoing access: Before the number is modified by the
facility group’s dial rules, the system checks the phone toll restrictions and outgoing access
to determine whether the call is allowed. (All calls placed using ARS are toll restricted,
regardless of whether the selected trunk is subject to toll restriction. However, Emergency
Call feature calls are never toll restricted.) If allowed, the system continues to the next step.
If not allowed, the system sends reorder tones and the call is not placed.
4. Adds or deletes digits according to the facility group chosen: Each facility group has
a programmed set of dial rules that tells the system what to dial. For example, if the selected
route group requires that the number contain “1” but no area code, the dial rules include
the 1 and drop the area code.
5. Dials the modified telephone number: If the number is allowed, the system seizes an
idle trunk in one of the selected trunk groups, waits for the Dialing Wait After Connect timer
to expire, and then dials the number.
When ARS is used, the phone user hears dial tone when the feature code is entered (manually
or automatically using a CALL button, the ARS button, or the OUTGOING button). The user
then dials the number and hears silence until the trunk is seized and dialing is completed. (The
user will not hear the digits being dialed.) The call appears under an available CALL button or
trunk button.
151
Features and Programming Guide
1
11
Phone user enters 1234 2
account code and dials ARS does the following:
1-602-961-9000
• Checks the number and finds
dialing pattern 602+ in Route
Group 2.
SYSTEM • Selects a facility group with an
available trunk.
• Checks toll restriction and
outgoing access.
• Uses dial rules to modify the
CO number:
Echo 3 Digits After Toll
Echo Local Address
Add Account Code
OUTGOING CALL
DIALED = • Dials the modified number.
1-602-961-9000-1234
ARS ON A NETWORK
Each node has ARS programming. All trunk groups and nodes in a facility group must reside
on the same node as the facility group. Using ARS is the only way a user can access trunks
on other nodes. If the system routes an outgoing call to another node using an intermediary
node, the intermediary node ARS cannot use the nodes in its facility group to move the outgoing
call to another node. This eliminates the system from getting into an infinite loop searching for
a node to route the outgoing call.
When determining toll restriction for an ARS outgoing call, the network checks the phone toll
restriction based on the database information on the node on which the phone resides, not the
node that contains the trunk which the system uses to place the call. The system does not
check the trunk COS for ARS calls.
For the purposes of the telephone call cost display and SMDR output, the network computes
call cost using the factors and rates on the node on which the outgoing trunk resides. In other
words, if a phone on Node A dials what is considered a long-distance number on Node A, and
the call is routed to Node B where the number is considered local, the phone will see the local
call cost rate which equals the value on Node B.
152
Numbering Plans
NODE
1 ROUTE GROUP LOCAL
NODE 1 TO NODE 2 NODE 2 TRUNK
CO
(IN 714 AREA CODE) Digits sent (IN 602 AREA CODE)
Phone user dials 1-602-961-9000
1-602-961-9000 4
Local call placed
2 3 to 961-9000
ON NODE 1: ARS routes call to Node 2 echoing ON NODE 2: ARS routes call to its Local route group (dial
all of the digits (no other dial rule modification). pattern 602+) and uses dial rules to remove the toll field and
Call is sent using the route group with dial area code (use only the Echo Local Address dial rule). Call is
pattern 602+ and the facility group with route to placed using an available trunk in the Local route group’s
Node 2. facility group.
ATTENDANT RECALL
When a call is placed on hold or is transferred from one phone to another, the Hold timer and
the Transfer timer limit the amount of time the call may remain unattended. After that timer
expires, the call recalls the phone that transferred it or placed it on hold, and the Recall timer
starts, which leads to one of the following possible events:
• If the call remains unanswered at the phone until the Recall timer expires, it recalls the
phone’s attendant and the Abandoned Call timer starts. If the system provides no attendant,
the call continues to recall at the phone that transferred it or placed it on hold.
• If the attendant phone is busy, the call camps on, and the display shows the source of the
recall.
• If the call is not answered before the Abandoned Call timer expires, the system disconnects
the call.
If an attendant phone transfers a call that is not answered before the Attendant Transfer timer
expires, it will recall the attendant phone.
If a phone user transfers or forwards an outside call to an outside telephone number, it becomes
an “unsupervised” CO-to-CO call because no inside parties are involved. The CO-to-CO call
is limited by the Unsupervised CO timer. When the timer expires, the call recalls the primary
attendant phone and causes the CNF button to flash. (Display phones show UNSUPERVISED
CNF RECALL.) This serves two purposes:
• It allows the attendant to monitor the length of CO-to-CO calls. When a CO-to-CO call
recalls, the attendant can disconnect the call or allow it to continue.
• If the callers hang up before the attendant receives the recall, the system may not have
disconnected the trunks because a disconnect was not received from the CO. The attendant
must disconnect the call.
When a recall rings at the attendant’s phone, a CALL or individual trunk button flashes at a
medium rate.
If the attendant has calls forwarded, recalls from phones follow internal call forward requests.
Recalls do not forward to outside telephone numbers but recall the attendant’s phone until they
are answered or the Abandoned Call timer expires. Placing the attendant’s phone in Do-Not-
Disturb mode does not block recalls or direct ring-in calls.
153
Features and Programming Guide
If there is not a primary attendant, recalls remain at the phones and ring until answered or
disconnected by the system.
When you see a hold or transfer recall display (XXXX RCL FROM YYYY) and hear a recall
ringing, lift the handset. Or, do one of the following:
• Outside call recall: Press the medium-flashing CALL button or individual trunk button. Or,
press the ANSWER button. (If more than one trunk is recalling, pressing the ANSWER
button selects the outside call indicated on the display.)
• Intercom call recall: Press the IC button or the ANSWER menu button. (If you are busy
when the intercom call recalls, it will camp on. The IC button flashes at the medium rate,
but you do not hear recall ring signals.)
• Conference call recall: Press the flashing CNF button to connect with the conference call.
The CNF button flashes slowly, and the display shows CONFERENCE IN PROGRESS. If
the parties are still talking, press the CNF button again and hang up to return the parties
to their conversation. The CNF button flutters. You can enter the conference at any time
by pressing the fluttering CNF button. If the Hold timer expires, the conference recalls your
phone again. If the parties have hung up, hang up to disconnect the call.
PROGRAMMING ARS
The following sections detail ARS programming.
• Planning ARS Requirements below
• Programming ARS Dial Rules on page 155
• Programming ARS Facility Groups on page 157
• Programming ARS Route Groups on page 161
Examples:
• U.S. systems: What are the best routes for each type of call? If you have nodes in
Phoenix and Los Angeles, would it be better to route calls from Phoenix to Southern
154
Numbering Plans
California through a node or over your long distance service? This will determine the
trunk groups and nodes included in each facility group.
• European systems: What are the best routes for each type of call? If you have nodes
in London and Kettering, would it be better to route calls from London to Glasgow
through a node or over your long distance service? This will determine the trunk groups
and nodes included in each facility group.
4. Determine the facility group order. That is, determine the trunks on this node or other nodes
that would be the best route for each type of call.
5. Determine facility groups dial rules. That is, determine what special characters, if any, need
to be added or removed from the dialed number when calls are placed? Determine this for
each trunk you are using.
Examples:
• U.S. systems: If a caller in Phoenix dials 1-714-XXX-XXXX, the system must remove
the toll digit and possibly the area code if the call is sent out over local trunks on the
Los Angeles node. However, if the call is routed through the long distance provider in
Phoenix, you probably need to include (echo) the toll and area code digits or even add
other digits as required by the long distance service.
• European systems: If a caller in London dials 020-8335XXX, the system must remove
the toll digit and possibly the national dialing code if the call is sent out over local trunks
on the Kettering node. However, if the call is routed through the long distance provider
in London, you will probably need to include (echo) the toll and national dialing code
digits or even add other digits as required by the long distance service.
U.S. Systems:
• Dial Rule 1 – ECHO Equal Access: Includes the equal access digits (wildcard Q, which
defaults to 10XXX and 101XXX) in the number, if dialed.
• Dial Rule 2 – ECHO Toll Field: Includes the toll field (1, 0, 01, or 011) in the number, if dialed.
• Dial Rule 3 – ECHO 3 Digits After Toll Field: Includes the three digits after the toll field
in the number. These digits are usually the area code.
• Dial Rule 4 – ECHO Local Address: Allows ARS to dial the rest of the digits that were
dialed by the phone user. Non-programmable.
• Dial Rule 5 – ECHO Account Code: Causes the system to dial the account code that is
associated with the call, if available before end of dialing. The account code can be entered
using any of the account code types, including All Calls Following, as long as the system
155
Features and Programming Guide
receives the account code before end of dialing. To use an optional account code, the code
must be entered before the number is dialed. Non-programmable.
• Dial Rule 6 – ECHO Extension Number: Requires the system to include the extension
number of the phone being used to place the call. Non-programmable.
• Dial Rule 7 – ADD #: Adds a pound/hash (#) to the dialed number. This dial rule is
programmable.
European Systems:
• Dial Rule 1 – ECHO Toll Field: Includes the toll field in the number, if dialed.
• Dial Rule 2 – ECHO Local Address: Allows ARS to dial the rest of the digits that were
dialed by the phone user.
• Dial Rule 3 – ECHO Extension Number: Tells the system to include the last three digits
of the extension number of the phone being used to place the call.
• Dial Rule 4 – ECHO Account Code: Causes the system to dial the last three digits of
account code that is associated with the call, if available, before end of dialing. The account
code can be entered using any of the account code types, including All Calls Following, as
long as the system receives the account code before end of dialing.
• Dial Rule 5 – ECHO Serial Number: Tells the system to dial the system-assigned serial
number of an ARS call. The serial number range is 000–998, excluding 112. The serial
number can be reset in dial rule programming.
• Dial Rule 6 – ADD #: Adds a hash (#) to the dialed number. This dial rule is programmable.
Dial Rules 3 (Echo Extension), 4 (Echo Account Code), and 5 (Echo Serial Number) will
always come after Dial Rules 1 and 2. If 3, 4, or 5 precedes Dial Rules 1 or 2, the SMDR
Call Type and Call Cost will be affected.
Australian Systems:
• Dial Rule 1 – Echo Toll: Includes the toll field in the number, if dialed.
• Dial Rule 2 – ECHO Local Address: Allows ARS to dial the rest of the digits that were
dialed by the phone user.
• Dial Rule 3 – ECHO Extension Number: Tells the system to include the last three digits
of the extension number of the phone being used to place the call.
• Dial Rule 4 – ECHO Account Code: Causes the system to dial the last three digits of
account code that is associated with the call, if available, before end of dialing. The account
code can be entered using any of the account code types, including All Calls Following, as
long as the system receives the account code before end of dialing.
• Dial Rule 5 – ECHO Serial Number: Tells the system to dial the system-assigned serial
number of an ARS call. The serial number range is 000–998, excluding 112. The serial
number can be reset in dial rule programming.
• Dial Rule 6 – ADD #: Adds a hash (#) to the dialed number. This dial rule is programmable.
Dial Rules 3 (Echo Extension), 4 (Echo Account Code), and 5 (Echo Serial Number) will
always come after Dial Rules 1 and 2. If 3, 4, or 5 precedes Dial Rules 1 or 2, the SMDR
Call Type and Call Cost will be affected.
156
Numbering Plans
1. Select System – Numbering Plan – Dial Rules. The list of rules 1–32 is shown in the right
pane. You can program rules 7–32, allowing you to add digits to a dialed number.
2. In the Digits column, type the digits for the dial rule. Dial rules can contain any digit (0–9,
*, #) hookflashes, and pauses. The number can have up to 32 digits.
3. If you are programming dial rules for a U.S. system, go to step 5.
4. If you are programming dial rules for a European system, complete the following:
a. (For European systems only). In the Hidden column, enable or disable the Hidden flag
to determine if the dial rules will be hidden. It is set to No by default.
b. (For European systems only). In the Absorbed column, enable or disable the Absorbed
flag to determine if the dial rules will be hidden. It is set to Yes by default.
c. (For European systems only). In the ARS Serial Number column, enter the serial
number (000-998, excluding 112) that you are using. This is only programmable for
Dial Rule 5 – ECHO Serial Number.
5. Click out of the field or press ENTER or to save the change.
U.S. systems:
• Local (P1500): Uses Trunk Group 1 and Dial Rules 3 and 4.
• Toll Local (P1501): Uses Trunk Group 1 and Dial Rules 2 and 4.
• Toll Long Distance (P1502): Uses Trunk Group 1 and Dial Rules 1, 2, 3, and 4.
• Operator (P1503): Uses Trunk Group 1 and Dial Rules 1, 2, 3, and 4.
• International Station-to-Station (P1504): Uses Trunk Group 1 and Dial Rules 1, 2, 3, 4,
and 7.
• International Operator (P1505): Uses Trunk Group 1 and Dial Rules 1, 2, 3, 4, and 7.
European systems:
• Local (P1500): Uses Trunk Group 1 and Dial Rules 1 and 2.
• National (P1510): Uses Trunk Group 1 and Dial Rules 1 and 2.
• Operator (P1512): Uses Trunk Group 1 and Dial Rules 1 and 2.
• International (P1513): Uses Trunk Group 1 and Dial Rules 1 and 2.
Australian Systems:
• Local (P1500): Uses Trunk Group 1 and Dial Rules 1 and 2.
157
Features and Programming Guide
• Toll Long Distance: Uses Trunk Group 1 and Dial Rules 1 and 2.
• Operator (P1512): Uses Trunk Group 1 and Dial Rules 1 and 2.
• International (P1513): Uses Trunk Group 1 and Dial Rules 1 and 2.
• Unassigned/Default: Uses Trunk Group 1 and Dial Rules 1 and 2.
Each facility group has a list of trunk groups and/or node trunk groups for routing calls. For
example, the “Local” facility group would contain trunk groups that include local trunks, but a
“Los Angeles” facility group might have node trunks groups that include local trunks on a node
in Los Angeles.
You must place facility groups in the in the order that you want them to be selected. Make sure
that the facility groups contain the proper type of trunks (local, FX, WATS, long distance, and
so forth) for the calls that are routed.
158
Numbering Plans
Select the dial rule, right-click, and then select Remove Selected Items.
Trunk groups and nodes must be placed in the list in the order that they should be selected.
Make sure that the trunk groups or nodes being used in the facility group contain the proper
type of trunks (local, FX, WATS, long distance, and so forth) for the calls that will be routed.
Trunk group toll restrictions will not apply when ARS is used; only phone toll restrictions are
checked.
159
Features and Programming Guide
To add the trunk groups and/or nodes to be used by this facility group:
1. Select System – Numbering Plan – Facility Groups. The current list of facility groups
appears in the right pane.
2. Double-click the facility group.
3. Double-click Trunk Groups/Nodes. The current list of trunks/nodes, if any, appears. This
is an ordered list. Place the trunks and nodes in the list in the order you want them to be used.
4. Do one of the following
Select the dial rule, right-click, and then select Remove Selected Items.
Select the trunk group or node, right-click, and then select Remove Selected Items.
160
Numbering Plans
All route groups are programmable. The default values are as follows:
U.S. systems:
• Local (P1000): Used for all calls that do not begin with a toll digit (1) or operator digit (0)
and for calls to Emergency Numbers (its default dial pattern is N+). It uses the Local facility
group.
NOTICE
When ARS is used to place an emergency call (see page 166), the system uses Route Group 1,
even if it contains nodes. This means that the network can access a trunk on a node other than the
user's node if the user accesses ARS and dials the emergency number. Mitel highly recommends
that local trunks be installed and used for emergency number trunk access and that nodes are not
used in Route Group 1.
• Toll Local (P1003): Used for calls with a toll digit (1) and a seven-digit number, and for
calls to 1N11 (N=Any digit 2–9). Its default dial patterns are TN11 and TXXXXXXX. It uses
the Local Facility Group.
• Toll Long Distance (P1011): Processes calls with a toll digit (1) and a 10-digit number.
The numbers may also include equal access digits. The default dial pattern is
[Q]TNXXXXXX+. This Route Group uses the Toll Long Distance Facility Group.
• Operator (P1013): Processes calls that begin with an operator digit (0) but do not begin
with an international access code (01 or 011). The numbers may also include equal access
digits. Its default dial patterns are [Q]RN+, [Q]RR, and [Q]R. This Route Group uses the
Operator Facility Group.
• International Station-to-Station (P1014): Used for calls that begin with an international
phone-to-phone access code (011) but do not begin with the international operator access
code (01). The numbers may also include equal access digits. The default dial pattern is
[Q]011+. This Route Group uses the International Station Facility Group.
• International Operator (P1015): Used for calls that begin with an international operator
access code (01). The numbers may also include equal access digits. The default dial
pattern is [Q]01+. This Route Group uses the International Operator Facility Group.
161
Features and Programming Guide
NOTICE
When ARS is used to place an emergency call (see page 166), the system uses Route Group 1,
even if it contains nodes. This means that the network can access a trunk on a node other than the
user's node if the user accesses ARS and dials the emergency number. Mitel highly recommends
that local trunks be installed and used for emergency number trunk access and that nodes are not
used in Route Group 1.
• Toll [National] (P1011): Processes calls with a toll digit (0 or 01). This Route Group uses
the National Facility Group.
• Operator (P1013): Processes calls that begin with an operator digit (1XX) but do not begin
with an international access code (00).
• International (P1014): Used for calls that begin with an international access code (00).
Dial patterns are assigned to the route group in the order they will be used. When checking
the route group, the system will look at the first dial pattern. If it does not match, the system
will continue checking the other patterns in the route group list. If a match is found, the route
group is selected. If not, the next route group is checked.
This procedure can be done only if there are fewer than 32 route groups.
162
Numbering Plans
The dial pattern tells the system which route group to select. When checking the route group,
the system looks at the first dial pattern. If it does not match, the system continues to check
the other patterns in the route group list. If a match is found, the route group is selected. If not,
the next route group is checked.Only the default route groups have default dial patterns, as
summarized in Table 22 and Table 23. A complete list of special characters and toll strings is
shown on page 169.
163
Features and Programming Guide
Select the dial pattern, right-click, and then select Remove Selected Items.
For each route group, select the facility group(s) to be used to route the calls. Facility groups
must be placed in the list in the order that you want them to be selected.
164
Numbering Plans
Audio for Calls Camped onto this Device defines the audio that a caller hears when camped-
on to the route group. For more information about audio settings, see page 438.
To program the Audio for Calls Camped onto this Device option:
1. Select System – Numbering Plan – Route Groups.
2. Double-click the route group.
3. Select Audio for Calls Camped onto this Device.
4. In the Value column, select the option from the list.
5. Click out of the field or press ENTER to save the change.
165
Features and Programming Guide
EMERGENCY CALLS
The Numbering Plan Emergency option is where you program the emergency numbers that
the system uses when users enter the Emergency Call feature code (for example, 911 in the
U.S.).
WARNING
POSSIBLE DELAY IN LOCAL EMERGENCY RESPONSE TO REMOTE SITES.
IP and SIP phone users should be alerted to the following hazardous situations:
• If an Emergency Call phone number is dialed from an IP or Session Initiation Protocol (SIP) phone
located at a remote site that is not equipped with a correctly configured gateway, the call will be placed
from the location where system chassis is installed rather than from the location where the emergency
call is made.
In this situation, emergency responders may be dispatched to the wrong location. To minimize the risk
of remote site users misdirecting emergency responders, Mitel recommends regular testing of MGCP/
SIP gateway trunks for dial tone.
• If uninterruptible power supply (UPS) protection has not been installed as part of the MiVoice Office
250, IP and SIP phones will not operate when electrical power fails either at remote sites or at the main
system location.
To place calls during a power failure in this situation, IP and SIP phone users can only use a single line
phone connected to one of the power failure bypass circuits built into the system chassis. If a phone
connected to a power failure bypass circuit is not available, users should make emergency calls from a
local phone not connected to the system. For details about the Power Failure Bypass feature, refer to
the Installation chapter in the MiVoice Office 250 Installation Manual .
NOTICE
It is the responsibility of the organization and persons performing the installation and maintenance of
Mitel Advanced Communications Platforms to know and comply with all regulations required for
ensuring Emergency Outgoing Access at the location of both the main system and any remote
communication phones. Remote IP and SIP phones may require gateway access to nearby emergency
responders. Emergency Call phone numbers include:
• 911, the default for Mitel systems located in the U.S.
• 999, the default for Mitel systems located in the European market and used primarily in the U.K.
• If applicable, 112, an emergency number used widely in Europe outside of the U.K, and Australia.
Any emergency number, such as for a police or fire station, that is appropriate for the location of the
main system and/or remote phones.
Emergency calls, by default, use the first local trunk group and are not sent through other nodes
using node trunk groups. However, when ARS is used to place an emergency call, Route Group
1 is used even if it contains nodes. This means that the network can access a trunk on a node
other than the user’s node if the user accesses ARS and dials the emergency number. Mitel
highly recommends that local trunks be installed and used for emergency number trunk
access and that nodes are not used in Route Group 1. When a user places an emergency
call, every administrator in the network receives an emergency alarm.
You can store up to 10 emergency numbers. For more information about the emergency call
feature, see “Emergency Calls“ on page 198.
166
Numbering Plans
167
Features and Programming Guide
The first area code is an area code that is always stripped from the dialing number. Other
home area codes serve to identify local calls, but are still dialed. If local 10-digit dialing is
NOTE always required despite the area codes, do not list an area code in the first home area code.
If a return call (callback feature) from voice mail is not working correctly, refer to the
Knowledge Base article 1224 for possible solutions. See “Technical Support“ on page 34.
168
Numbering Plans
TOLL STRINGS
This section contains the following information:
• Feature Description below
• Programming Toll Strings on page 170
FEATURE DESCRIPTION
Toll strings are dialing patterns that are abbreviated to single character “wildcards.” Wildcards
are used in COS and ARS programming. Toll strings can contain any digit from 0 through 9
and the keypad special characters # and *. You can also use a variety of characters to represent
particular digit strings, hookflashes (recalls in Europe), or special digit strings. Each of the
following toll string wildcards can be reprogrammed or renamed for your system.
Changing toll string dialing patterns affects all of the other parts of the system where they are
NOTE
used.
Table 24 shows the programmable toll string wildcards for U.S. systems.
Table 25 shows the programmable toll string wildcards for European systems.
169
Features and Programming Guide
Table 26 shows the special characters that may be used when specifying dialing patterns.
These characters are not programmable.
Table 26: Special Characters for Dialing Patterns
CHARACTER MEANING
X Any digit 0–9
A Any keypad entry (0–9, #, *)
N Any digit 2–9
Z Any digit 0 or 1
B # or *
H A hookflash (recall)
E End of dialing; the pattern will not match if any other digits are dialed beyond this
point
+ Any additional dialing will be accepted, from that point in the string, with no further
checking for a match. This also means that no further dialing is required beyond this
point.
[x] Indicates an optional pattern within another pattern. For example, with a U.S. system,
the International Access character (I) could be defined as 01[1]. (The 01 is followed
by an optional 1.)
(x-x) Indicates a range of digit strings within a pattern. The strings on either side of the
hyphen and all strings that fall within the numerical range are included in the match.
The strings on either side of the hyphen must be the same length, and the only digits
that may appear in the range are 0–9 (#, *, pauses, and flashes are not allowed).
<x> Indicates repeatable patterns within patterns. In other words, no matter how many
times the digit string within the brackets is dialed, the system considers the dialed
digits to match the pattern. Note that a repeatable pattern is an entire pattern; no
other characters are allowed before or after a repeatable pattern. In other words, a
repeatable pattern cannot be included within any other pattern.
170
Numbering Plans
Select the device below the location where you want the new entry, right-click, and then
click Add To List. A blank pattern appears above the pattern you selected.
171
Features and Programming Guide
USER GROUPS
This section contains the following information:
• Feature Description below
• Programming Area Codes on page 172
FEATURE DESCRIPTION
U.S. installations only. This section describes how to program area and office code restriction
used for the Deny Area/Office class of service.
You can set up area and office code tables of up to eight user groups to allow different area/
office code restriction to be used. This is useful for reducing restrictions for some users while
increasing restrictions for others. Each phone, application, and trunk group is assigned to a
user group.
Within each user group, area codes can be restricted, allowed, or extended:
• Restricting an area code prevents users from placing calls to that area code and all of its
office codes.
• Allowing an area code allows all office codes within that area code.
• Designating an area code as “extended” allows you to determine which office codes within
that area code are allowed or restricted. Up to six extended area codes can be identified
within each user group.
172
Numbering Plans
To allow users in the user group access to area codes, the codes must be placed in the Allowed
list.
Move the area code to the Restricted or Extended list in the user group.
You can use up to six extended area codes for each user group, and each of the six can support
an individual list of allowed and restricted office codes.
Move the area code to the Restricted or Allowed list in this user group.
173
Features and Programming Guide
You can prevent users from placing calls to certain area codes.
Only extensions with COS 02 can be placed in a user group day or night list.
Method A
Drag and drop the phone to the appropriate list. You can only move from Day list to Day list or
Night list to Night list. You cannot move phones between Day and Night lists.
Method B
1. Select System – Numbering Plan – User Groups.
2. Double-click the user group.
3. Right-click anywhere in the right pane, and then click Move To List. A window appears
prompting for the device type to include.
4. Select the device types (you can use the SHIFT or CTRL key to select more than one item),
and then click Next. The items with details appear. To view items in a list only, click List.
5. Select the appropriate items, and then select Move Items. When you have added all the
devices, click Finish. The selections appear in the list. To view programming options,
double-click the extension number.
You must move the item to another User Group or select Phone programming (see “Day and
Night Classes of Service“ on page 424) and remove COS 2 as a toll restriction.
174
Chapter 6
TRUNKS AND GATEWAYS
Features and Programming Guide
INTRODUCTION
This chapter describes how to program trunks and gateways for your system. A trunk is a
communication line between two switching systems. In this guide, the communication line is
either the connection between the MiVoice Office 250 Public Branch Exchange (PBX) and the
Central Office (CO), or it is the communication line between Mitel PBXs.
Your system may use a SIP or Media Gateway Control Protocol (MGCP) gateway, a device
that serves as an entrance and exit into a communications network, to connect trunks to the
CO or other networked systems.
For information about Service Provider SIP Trunks, see “Service Provider SIP Trunks and SIP
Trunk Groups“ on page 716.
176
Trunks and Gateways
For additional information about T1 trunks see “T1/E1 Spans and PRI“ on page 178.
• Primary Rate T1 trunks on the T1M or T1M-2 module: A digital transmission system that
clusters 24 T1 channels, 23 information-bearing (B) channels and one data (D) channel,
for signaling and control. The MiVoice Office 250 supports ISDN Primary Rate trunks on
up to three (CS Controller) or four (HX Controller) T1M or T1M-2 modules.
In Europe and Australia Primary Rate trunks consists of 30 B-channels and 2 D-channels
on an E1 line.
• Basic Rate Interface trunks on the Basic Rate module (BRM-2): The Basic Rate Module
(BRM-2) provides the Basic Rate 2-Interface ISDN service for communication. The module
fully implements the ISDN S/T interface. Each of the two BRI ports consists of two bearer
(B) channels and one data (D) channel with HDLC support. The ports provide full I.430 ITU
S/T ISDN support for trunks (TE mode). The BRM-2 does not support stations (NT) mode.
Each BRM–2 provides two circuits for connecting BRI trunks to the system.
The Basic Rate Module (BRM-2) supports only the trunk side of BRI capability. The BRM-
NOTE
2 does not support BRI phones or other BRI station-side phones.
The BRM-2 module is supported only in the Mitel European and Australian markets.
177
Features and Programming Guide
• Session Initiation Protocol (SIP): Trunks that allow the system to use Voice-over-IP (VoIP)
outside the network by using the same connection as the Internet connection. See page 187
for details.
The four-port Loop Start Module (LSM-4) provides four circuits for connecting loop start trunks
to the MiVoice Office 250.
For detailed information about installing an LSM-2 or LSM-4, refer to the “Installation” chapter
in the MiVoice Office 250 Installation and Administration Manual .
This feature requires a single-port or dual-port T1/E1/PRI module (T1M or T1M-2). The
NOTE
second port on the T1M-2 and the PRI feature require software licenses.
T1 Spans
The term “T1” refers to a specific digital method of transmitting voice and data; it is the basic
24-channel time-division multiplex (TDM), pulse code modulation (PCM) technology used in
the United States. Since each T1 span actually consists of 24 individual circuits (or channels)
multiplexed together, it is often less expensive to purchase a single T1 span than it is to purchase
multiple individual trunks.
178
Trunks and Gateways
Fractional T1 (FT1), which uses fewer than the standard 24 circuits, can be used on the Mitel
system. If FT1 is used, the unused circuits of the T1M or T1M-2 port must be unequipped.
The T1M-2 provides the same functional capability as the T1M. Equipped with two independent
digital trunk interfaces, the T1M-2 also provides a dedicated local processor, echo cancellation
options, and DTMF tone detection.
The local processor offloads real-time PRI functions from the Processor Module (PM-1). It
addresses interrupt latency issues and services the ISDN stack in a timely manner.
Integrated span-side and system-side echo cancellers on the T1M-2 support improved audio
quality. The span-side echo canceller addresses field problems when a span-side system is
generating echo. The system-side echo canceller works to eliminate echo that may be
transported over a T1, T1/PRI, or E1/PRI span from an on-board device.
Nonblocking DTMF tone detection supports a scalable architecture that allows system
resources to increase as trunk density increases.
179
Features and Programming Guide
For module installation procedures, refer to the “Installation” chapter in the MiVoice Office 250
Installation and Administration Manual .
When purchasing a T1 span, several variables are involved, depending on the T1 application
required. For details, see page 178. The following variables must be considered when ordering
a T1 span:
• Module framing type: The type of framing scheme used by the T1 spans connected to
the module can be D4 Superframe—normally used for voice transmissions—or Extended
Superframe (ESF). ESF is usually used for data transmissions.
• Zero code suppression scheme: The T1 span zero-suppression scheme, which limits
the number of consecutive zeroes in transmissions, for the trunks on the T1M or T1M-2
module can be AMI (Bit 7), Bipolar Eight Zero Substitution (B8ZS), or None. The T1M or
T1M-2 module supports B8ZS or None.
• ISDN switch type: (Used for PRI-equipped ports only.) The system supports the following
switch types: AT&T 4ESS and 5ESS Custom, AT&T National ISDN 2, Private Networking,
and IP Private Networking.
• Line build-out (LBO): The LBO attenuation of the T1 span connected to the port must be
designated in programming. This value is determined by the distance to the nearest public
network T1 repeater.
• Reference clock programming: If the T1M or T1M-2 port is connected to the public
network, the port should be designated as a slave clock. The public network always acts
as the master clock and one digital trunk port provides the system reference clock. If the
module is not connected to the public network, but is instead connected to another T1/EI
module or a module in another telephone system, it can be a master clock or a slave clock
in relation to the circuit on the other end.
• Timers: (Timers are programmed only for PRI-equipped ports.) The ISDN timer default
values have been carefully selected to ensure proper system operation under most circum-
stances. Occasionally, one or more of the timers may need to be adjusted.
• CO Provides Progress Tones: (Used for PRI-equipped ports only) When the system
provides local ringback, some central offices (particularly in the UK) take too long to send
the system the connect message when a call is received. When the CO connects a call too
slowly, the user can answer before the caller is on the line, causing the caller to miss the
greeting (such as “Welcome to Mitel. How may I help you?”). If the CO Provides Progress
Tones flag is enabled, the system does not provide local ringback. Instead, the system
connects the call to the line and the caller hears CO ringback. That way, when the called
party answers, the calling party is already on the line. The flag is disabled by default.
This flag should be enabled for PRI spans that are used for placing outgoing calls
from another node (for example, Node 2 uses ARS to place outgoing calls using the
NOTE PRI span on Node 1). If it is not enabled, some of the calls from Node 2 may not go
out to the public network properly. It is recommended that you enable this flag for all
nodes in a system.
• Connect On Call Proceeding: (Used for PRI-equipped ports only) This flag affects outgo-
ing Primary Rate ISDN calls. If it is enabled, the system will connect the B-channel as soon
180
Trunks and Gateways
as the Call Proceeding message is received from the CO interface. Some CO interfaces,
especially SS7 interfaces, do not send progress indicators when they are playing tones or
announcements on the B-channel. They play the tone or announcement prior to sending
the progress message, after the call proceeding. In this case, if the flag is disabled, the
user experiences audio clipping. If the flag is enabled, the channel is opened when the call
proceeding message is received and the system does not have to wait for a progress
indicator (indicating alerting, busy, reorder tones or announcements).
• Operator System Access: (Used for PRI-equipped ports set for National ISDN2 only)
When National ISDN 2 is used, there is an option to enable Operator System Access (OSA).
OSA is required by some central offices. If this flag is enabled, the user will be allowed to
request access to an operator services system.
If using ARS with National ISDN 2, and OSA is enabled, you must remove Dial Rule #2
NOTE
Echo Toll Field from the Operator and International Operator Route groups.
• Send International Toll Digits: If Enabled, which is the default state of this flag, the system
sends international toll digits such as “011” in the dial string in addition to the number type.
If Disabled, the toll digits are stripped from the dial string for international calls using ISDN
trunks. If the CO ignores the number type, make sure this flag is Enabled.
When ordering Primary Rate Interface services, see Table 28 for the parameter settings and
other information your carrier will need to know:
The system is designed to support only AT&T 4ESS Custom, AT&T 5ESS Custom, National
ISDN 2, and DMS-100 switch types or Private Networking. No other switch types are currently
supported by the Mitel system.
Primary Rate trunks that are not subject to toll restriction will not return dial tone. This is
because these unrestricted trunks are treated as if they are connected to another Mitel
NOTE
system. Therefore, no dial tone is provided, no digits are collected, and the setup is
immediate.
181
Features and Programming Guide
B-channel trunks can be combined with other types of trunks in any trunk group.
If a user attempts to place an outgoing call using an individual B-channel trunk, the system
sends a Setup Request to the network that requests that B-channel. If the network specifies a
different B-channel (possibly because of a glare condition), the system releases the call and
the user hears busy tone. The call camps on to the selected B-channel trunk. If the same
situation occurs when the user selects a B-channel through a trunk group or ARS, the system
will simply move to the next available trunk instead of camping on.
Available ISDN services that are supported and not supported by the system appear in Table
29. If the B-channel trunks provide a service that is not supported, the system will continue to
function properly. However, the system will not make use of the service.
Primary Rate Call Type: All Primary rate ISDN calls have a specific number type (International,
National, Network, or Local/Subscriber) and numbering plan field (ISDN, Telephony, or Private)
indicated in the call setup message to the public network peer. In certain cases, front end
equipment interfacing with the ISDN user (CPE) peer requires a specific number type and/or
numbering plan. The number type and numbering plan are programmable per call type for each
equipped primary rate circuit. The operation of this feature is transparent to the user. Once the
number type and numbering plan are programmed, the Primary rate call setup message will
include this information for each call. To set the Primary Rate Call Type for a T1M or T1M-2
module, select System and Chassis, then double-click on the module (or right-click and select
Explore Module). Then select Call Type.
System trunk groups provide limited access to PRI Call By Call services. Each trunk group that
contains B-channels can be assigned a PRI Call By Call feature to use for outgoing calls. The
supported Call By Call features include switched digital circuit services, foreign exchange, TIE
services, local exchange, OUTWATS, interexchange carrier services, and custom AT&T and
Nortel private networks, features, and services. If the customer wants to use more than one
PRI Call By Call feature, there can be multiple trunk groups, each programmed to use a different
feature. The customer then can select the Call By Call feature by selecting the trunk group
associated with the feature.
182
Trunks and Gateways
When the trunk group has a programmed Call By Call feature, all channels within the specified
trunk group will indicate the PRI Call By Call feature code in the outgoing ISDN message. Each
outgoing ISDN call sends a SETUP message on the Primary Rate D-channel that contains the
B-channel (voice channel) assignment, called digits information, and the network-specific
facility. The PRI Call By Call feature is specified within the network-specific facility, ISDN
information element which contains the Call By Call feature code.
To properly program the PRI Call By Call feature, the installer must analyze the customer’s
ISDN outgoing call traffic and configure the amount of B-channels needed to support a particular
Call By Call feature or service. In the service order, the installer must request the Call By Call
service for the PRI span or a subset of channels.
The installer selects the Call By Call feature during trunk group programming by selecting the
desired PRI Call By Call feature. After the trunk group has been created and assigned to a Call
By Call feature, the appropriate ISDN B-channels are programmed into the trunk group.
The phone user dials ARS or a PRI trunk group extension. The system selects the trunk group’s
programmed Call By Call feature. The system automatically inserts the Call By Call feature into
the ISDN call control message and transmits the message to the public network. The Public
Network accepts or rejects the requested Call By Call feature in the ISDN message. The PRI
Call By Call feature supports the following services:
• Call By Call Inactive
• AT&T ACCUNET Switched Digital
• AT&T Banded OUTWATS
• AT&T Carrier Operator
• AT&T DIAL-IT 900 / MultiQ
• AT&T Electronic Tandem Network
• AT&T Foreign Exchange
• AT&T International 800
• AT&T International LDS
• AT&T INWATS
• AT&T Local Operator
• AT&T MEGACOM
• AT&T MEGACOM 800
• AT&T National ISDN INWATS
• AT&T Private Virtual Network
• AT&T TIE Trunk
• AT&T Unbanded OUTWATS
• AT&T WATS Band
• AT&T WATS Maximal Band
• Nortel Foreign Exchange
• Nortel INWATS
• Nortel OUTWATS
183
Features and Programming Guide
With overlap sending, the system can send some or no called number digits in the setup
message and send additional digits (or overflow digits) in subsequent information messages.
You can also program the system to use the overlap sending protocol immediately. If this option
is selected, the setup message contains no called number digits, and all digits are sent in
subsequent information messages as the digits are dialed.
Currently, the overlap sending/receiving protocols are supported with PRI Net 5 and BRI Net
NOTE
3 switch types, which are prevalent in the European and Mexico markets.
With overlap receiving, the system can receive some or no called number digits in the setup
message, followed by overflow digits in information messages. The system will not route the
call based on these digits until it receives an indication from the network provider that all digits
have been sent. If the network provider does not send such an indication, the system waits
until the Overlap Receiving Timeout Timer has expired. Once this timer has expired, the call
is routed based on the digits received.
DID/DDI TRUNKS
Direct Inward Dialing (DID) [Direct DIaling Inward, DDI, in Europe] is available on T1M or T1M-
2 modules and Single-Line Adapter (SLA) interfaces. For more information about T1 modules,
refer to the “Installation” chapter in the MiVoice Office 250 Installation and Administration
Manual . E&M trunks on T1M or T1M-2 modules can also be designated as DID [DDI] trunks.
DID [DDI] allows an outside party to dial into the system without attendant intervention. To gain
direct access to the system, an outside party dials a number that was assigned by the telephone
company to the DID [DDI] trunks installed on the system. The system then provides ring signal
to the proper phone(s), hunt group, or DISA according to the programmed ring-in for that DID
[DDI] number.
DID [DDI] trunks are purchased with blocks of numbers. When a caller dials one of the numbers,
the central office rings the trunk that contains that number. When the system answers the call,
it handshakes with the central office and receives digits that tell it which DID [DDI] number was
dialed. The system then routes the call according to the call routing programmed for that number.
When a call is placed to a DID [DDI] trunk, one of three things will happen:
• If the receiving DID [DDI] trunk is programmed for “Immediate” start type, it will immediately
begin receiving the dialed digits to the receiving system.
• If programmed for “Wink” start type, the DID [DDI] trunk performs a “handshake” to signal
that it is ready to receive the incoming digits. (This is the default start type.)
• If programmed for “Delay Dial” start type, the DID [DDI] trunk will perform a handshake and
pause before receiving any digits.
Each DID [DDI] trunk is programmed with a base number and is programmed to collect a set
number of digits. The base number is made up of the digits that are dialed by the caller that
are not re-dialed by the central office after the handshake. For example, if the dialed number
184
Trunks and Gateways
is 961-9000 and the base number is 9619, the central office would send only 000 after the
handshake. The system would then send the call to the ring-in destination associated with 000
in the trunk’s call routing table. The number sent to the phone display could combine the base
number and the collected digits to show 961-9000 or can be programmed to show a name.
DID trunks are programmed into trunk groups. However, because DID trunks do not allow
outgoing calls to be placed, the outgoing access programming for the trunk group is ignored.
If a user attempts to seize a DID/DDI trunk for an outgoing call, the user will hear reorder tones
and the phone display will show OUTGOING ACCESS DENIED.
The DID/E&M Receive Busy Instead Of Camp-On phone flag determines whether E&M and
DID/DDI callers will receive busy signal or receive ringback and camp on when calling a busy
phone. In the default state, busy tones are disabled and the callers hear ringback while camped
on to the called phone. This flag is programmed on a phone-by-phone basis. For programming
instructions, see “Phone/Phantom/Hot Desk Profile Flags“ on page 441.
DID TRUNKS
CALL DISPLAY:
ROUTING 555-0444
CO TABLE RINGING IN
INCOMING CALL:
Caller dialed
555-0444
185
Features and Programming Guide
5. If the default state has been changed, enable call information for phone displays. For more
information, see page 190.
E&M TRUNKS
E&M trunks are special trunks that tie two distant telephone systems together. They allow the
users of either telephone system access to the users and resources of the other telephone
system. For details about programming overlap sending and receiving, see the previous section.
E&M trunks, like standard trunks, may be programmed to ring in to call routing tables, individual
phones, multiple phones, or hunt groups, or as a DISA call. If programmed to ring-in at a single
phone, the E&M call will follow any programmed forward.
When a call is placed over an E&M interface, one of the following events happens:
• If programmed for Immediate start type, the calling system immediately begins sending the
dialed digits to the receiving system.
• If programmed for Wink start type, the systems perform a handshake to allow the receiving
system to signal that it is ready to receive the digits dialed by the other system. Wink start
is the default type.
• If programmed for Delay Dial start type, the calling system waits until its E&M Dial Delay
timer expires before sending any digits to the receiving system.
• If programmed for Dial Tone start type, the calling system waits until it receives dial tone
from the other system before sending any digits.
E&M trunks can be programmed to support DI. Other options include DNIS and ANI. E&M
trunks are programmed into trunk groups. The trunk group programming determines day and
night mode outgoing access for the trunks.
When the system is in the default configuration, all E&M trunks are configured for DTMF
signaling. If necessary, some or all of the trunks can be reprogrammed for dial-pulse signaling
through database programming.
The DID/E&M Receive Busy Instead Of Camp-On phone flag determines whether E&M and
DID callers will receive busy signal or receive ringback and camp on when calling a busy phone.
In the default state, busy tones are disabled and the callers will hear ringback while camped
on to the called phone.
186
Trunks and Gateways
4. Create a trunk group that contains the E&M trunk(s) and program it to ring in to the Call
Routing Table created above. For programming instructions, see page 206.
5. Program the individual trunks (see page 252). If marked for DID service, program the
numbers to match the Call Routing Table created above.
BRI TRUNKS
The Basic Rate Module (BRM-2) provides the Basic Rate 2-Interface ISDN service for
communication. The module fully implements the ISDN S/T interface. Each of the two BRI ports
consists of two bearer (B) channels and one data (D) channel with HDLC support. The ports
provide full I.430 ITU S/T ISDN support for trunks (TE mode). The BRM-2 does not support
stations (NT) mode. Each BRM–2 provides two circuits for connecting BRI trunks to the system.
See page 209 for configuring a BRM.
SIP TRUNKS
The system supports SIP (Session Initiated Protocol) trunks to reach the CO. SIP trunks allow
the system to communicate with the CO via SIP-enabled gateways. As the SIP protocol
becomes more and more popular, it is important to be able to communicate to SIP gateways
in the IP-centric world. For more details, see the following pages:
• SIP Gateways on page 246
• Gateway SIP Trunks on page 248
• Service Provider SIP Trunks and SIP Trunk Groups on page 716
TRUNK FEATURES
This section explains the trunk functions and programmable features. For information about
trunk capacities, refer to the “Specifications” chapter in the MiVoice Office 250 Installation and
Administration Manual .
NOTICE
While this system is designed to be reasonably secure against CO trunk misuse by outside callers, there
is no implied warranty that the system is not vulnerable to unauthorized intrusions, toll fraud, or
unintended toll charges. If the central office does not provide supervision, it will not disconnect the call
when one party hangs up, making it possible for a caller to remain connected to a CO trunk circuit. If this
happens, and the outside caller remains connected, toll charges could continue to accrue until the
outside caller hangs up. Or, if this happens, and the outside caller begins dialing, the call could be placed
through the system and would then be billed to the system’s owner. The system cannot check this type
of call for toll restriction and may not register the call in SMDR. This problem could arise when a call is
connected to a phone or when a call is in an unsupervised conference.
187
Features and Programming Guide
Use the following feature codes when selecting a trunk to place an outgoing call.
For calls that are ringing or holding at the phone, the user may enter the Answer feature code
(351) or press the ANSWER button. When more than one call is ringing or holding, the following
priorities determine which call is answered first:
• Ringing calls (ring ins, recalls, callbacks, or transfers) are answered in the order they were
received.
• Calls on individual hold are answered in the order they were placed on hold.
The MiVoice Office 250 supports Automatic Numbering Identification (ANI), Caller ID for multi-
line phones, and Dialed Number Identification Service (DNIS).
For Release 6.1 and higher, MiVoice Office 250 allows the decoding of Calling Line Identification
(CLID) information in countries which use variations of BT CLIP (British Telecom Calling Line
Identification Presentation) signaling on analog trunks.
BT CLIP supports the delivery of Caller ID information on analog trunks in the UK, and the
standard is commonly known as BT CLIP. BT CLIP is an on-hook capability that provides the
user with information about the caller before actually answering a call.
A new trunk Service Type and timer parameters are added in MiVoice Office 250 Database
Programming to support BT CLIP. BT CLIP replaces ETSI DTMF Caller ID. When configuring
188
Trunks and Gateways
a Loop Start trunk, the Service Type options now include Bellcore FSK Caller ID and British
Telecom FSK.
When configuring a Loop Start trunk, the following Service Type options are supported:
• Bellcore FSK Caller ID
• British Telecom FSK
NOTICE
Your use of Mitel products and/or services, including but not limited to certain Caller ID features, may
be subject to US, UK, and Canadian regulations and laws. For example, transmitting misleading or
inaccurate caller ID information with the intent to defraud or deceive may be a violation of the Truth in
Caller ID Act of 2010. Mitel does not promote use of its products and/or services in such a manner and
any such use by you which knowingly contravenes local or national governments laws is at your own
risk. Mitel strictly disclaims any liability which may be associated with your wrongful use.
If the Loop Start trunk has been configured with one of the Service Type options above, and
caller ID does not work after it has been enabled in Database Programming, perform the
following:
1. Check the Connected to CO flag. The value should be Yes.
2. Run a Hybrid Balance Test (see page 1149).
3. Restart Database Programming.
4. Review the results of the test. If the Echo Return Loss (ERL) value is not the optimal setting
value, change it to the optimal value (see page 1152 and page 1153 for details).
Definitions
The following features provide information about the source of the call.
• ANI: Identifies the caller’s telephone number. The system receives a specified number of
digits.
• *ANI*: A form of ANI that does not have a specified number of digits. The system receives
a star (*) before the ANI digits to signal the beginning of the caller’s telephone number.
Another star after the digits signals the end of the ANI information.
• Caller ID: Provides the caller’s telephone number and/or name on multiline phones only.
• DNIS: Identifies the number that was dialed to reach your location. The system receives a
base number and a specified number of digits that identify the dialed number.
• *DNIS*: A form of DNIS that does not have a specified number of digits. The system receives
a star (*) before the DNIS digits to signal the beginning of the dialed number. Another star
after the digits signals the end of the DNIS information.
• *ANI*DNIS*: A two-stage address service that provides both the caller’s telephone number
and the dialed number. It combines the *ANI* and the *DNIS* features.
The network retains trunk and outside party information and passes that information along
when a call is routed from node to node. With the preceding features and call routing tables
activated, the system can identify each incoming call and send it to selected destinations. For
example, calls identified with Caller ID or ANI from specific regions of the country can be sent
189
Features and Programming Guide
to the appropriate sales representative or calls from specific locations can be sent to selected
individuals. Or, using DNIS information, responses to advertisements using one 800 number
can be sent to one hunt group and calls from other 800 numbers can be sent to other hunt
groups. Or, they can all be sent to the same destination with different identifying names for the
phone displays (such as Magazine Ad, TV Ad, and so forth).
Call information services (Caller ID, ANI, and DNIS) must be enabled for the individual trunks.
Loop start trunks can use Caller ID. T1 spans programmed for E&M or DID can use ANI and
DNIS. For more information, see “Unsuppressed SMDR Fields by Trunk Service Type“ on
page 97.
The system supports the transmission of Caller ID to single line phones that terminate on IP
Single-Line Adapters. This feature uses Automatic Number Identification (ANI), or Caller ID.
Once programmed, on-hook single line phones display the calling party’s telephone number
and name (if available) when receiving an incoming central office (CO) call. The Caller ID
information is also displayed if the single line phone receives a transferred call from another
phone that has calling party information. Caller ID is not transmitted to single line phones
attached to Single-Line Adapters (SLAs). However, Caller ID is transmitted to single line phones
connected to SLM-4 and SLM-8 ports. All SLM-8 module ports have Caller Identification transmit
(CID Tx) capability. Caller ID is transmitted to IP display phones and displayed after the first ring.
Phone Displays
Whether call information appears on the phone display, and what information appears, is
determined by phone flags in the database. The flags are:
• Expanded CO Call Information On Displays: This phone flag determines whether call
information (trunk name or call information) is displayed at the phone. If it is enabled, the
Outside Call Party Information Has Priority flag determines what is displayed. If it is disabled,
the programmed trunk group user name will appear on the display. In the default state, this
flag is enabled.
• Outside Party Call Information Has Priority: (not used on single line phones) If the
Expanded CO Call Information flag is enabled, this flag determines what information is
displayed at the phone. If enabled, any call that is received on a trunk that provides outside
call information (for example, Caller ID or ANI), will be identified on the phone display with
the call information. If disabled, the display will show the DID or DNIS information for the
call (if available). In the default state, is it enabled.
• Display Outside Name: If the Display Outside Name phone flag is enabled, the user can
switch between the outside party name and number when connected to a CO call with
outside party information. The user enters the Display Outside Party Name On/Off feature
code (379). In addition, the enhanced ring-in displays will provide the user with more infor-
mation such as both Caller ID name and number if available, or tell the user if a Caller ID
number is blocked or out-of-area. This is a phone-only flag. In the default state, this flag is
enabled.
The system will provide the user with advanced displays for direct ring-in calls, if the phone
has “Expanded CO Call Information On Displays” and “Outside Party Call Information Has
Priority” phone flags enabled (by default they are enabled).
190
Trunks and Gateways
A typical direct ring in display would look like the following: “TRNK GRP 1 RINGING IN.”
However, with the enhanced displays, the system will attempt to display the name of the outside
caller on line 1 and the number of the outside caller on line 2.
When a CO call rings into the system, the system uses the following criteria to determine the
name that will appear on the display phones. The criteria are listed from highest priority to
lowest priority.
Display Line 1
The following criteria are used to display the name on the top line of the ring-in display. This
assumes that all of the necessary phone flags are properly set and usernames are correctly
filled in or left blank (at the programmer’s discretion) for Call Routing Tables and Trunk Group
Names.
1. Outside Party Name provided by the Desktop Application, if available.
2. Outside Party Name provided by Caller ID, if enabled at the phone level.
3. Outside Party Name provided by System Speed Dial. If the collected number matches a
number in a Speed Dial bin, the system uses the name of the matching Speed Dial bin.
4. Outside Party Number provided by the Desktop Application.
5. Outside Party Number provided by Caller ID, if enabled at the phone level.
6. Outside Party Number provided by ANI service, if enabled at the phone level.
7. Call Routing Table Name, if the name is not blank.
8. Trunk Group Name, if the name is not blank.
9. Default Trunk Group Name (TG XXXXX).
Display Line 2
The following criteria are used to display the number on the bottom line of the ring-in display.
This assumes that all of the necessary flags are properly set.
1. Outside Party Number provided by the Desktop Application, if available.
2. Outside Party Number provided by Caller ID, if enabled at the phone level.
3. Outside Party Number provided by ANI service, if enabled at the phone level.
4. Number Absence Reason, such as Caller ID “OUT-OF-AREA” or “PRIVATE” (blocked)
message.
5. RINGING IN display.
ANI and Caller ID information is also sent to the Voice Mail application to provide the caller’s
telephone number as part of the message envelope.
191
Features and Programming Guide
CALLER ID PROPAGATION
Caller ID (CID) propagation allows Call Processing (CP) to send caller ID information from any
incoming services to the public or private network using Primary Rate Interface (PRI) or Basic
Rate Interface (BRI) Integrated Services Digital Network (ISDN) circuits. In the European
market, CID is known as Calling Line Identification [CLID]. When CID is enabled, the system
includes information that identifies the caller to the public or private network.
The CID/CLID information can be a phone username or extension, caller number (Calling Party
Number or Name), or incoming CID information. The system software can process any incoming
caller ID information and then re-send this information via an ISDN circuit with some limitations.
Basically, caller ID received via an ISDN, analog line, or T1 circuit can be processed and sent
out to an ISDN circuit. CID information can also be propagated between nodes.
CID information presented by the system results from any one of the following events:
• A call that is originated from a phone on the system.
• A call that is from the redirection of an external call.
• The system programmable fields in DB Programming:
• Send Station Extension/Username to Attached PBX on page 550 (for trunk groups)
• Propagate Original Caller ID on page 551 (for trunk groups)
• Do Not Propagate Original Caller ID to P-Asserted Identity on page 552
• Wait for ISDN Caller ID Information on page 553 (for trunk groups)
• Calling Party Name on page 435 (for phones)
• Propagate Original Caller ID on Transfer on page 446 (for phones)
• Propagate Original Caller ID on Transfer on page 947 (for voice mail)
The following table lists troubleshooting information for the Caller ID Propagation feature.
192
Trunks and Gateways
Page 1 of 2
193
Features and Programming Guide
Page 2 of 2
194
Trunks and Gateways
CALLER ID FORWARDING
The following table lists troubleshooting information for the Caller ID Forwarding feature.
Page 1 of 2
195
Features and Programming Guide
Page 2 of 2
Administrators can place any or all remote nodes into night mode or day mode. The default
feature code for Enable Network Night is 9861. The default feature code for Enable Network
Day is 9862. For more information, refer to the MiVoice Office 250 Phone Administrator Guide,.
The Night Ring On/Off feature code (9860) affects only the node on which the administrator
NOTE
resides.
Direct Inward System Access (DISA) is a programmable feature that allows an outside party
to dial into the system from an external DTMF telephone and then dial extension numbers, hunt
group pilot numbers, and off-node device extensions. DISA callers do not have access to
outgoing trunks or page zones.
Any of the trunk groups can be programmed to receive incoming DISA calls in day or night
mode. When not in use for DISA, the trunk group can be used for placing outgoing calls by
phones with outgoing access permission.
Due to the natural characteristics of the trunk, the volume level of DTMF tones transmitted over
the trunk may be substantially reduced before reaching the system. This natural degradation
in tone volume may adversely affect the reliability of the DISA feature. Other factors which can
affect DISA performance are trunk noise and the quality and strength of the DTMF tones
generated by the off premises phone itself. If the system cannot recognize a DTMF digit, the
call is automatically sent to the primary attendant.
When a DISA user calls a phone extension number, the call rings as a direct ring-in call, even
if the called phone is busy or in Do-Not-Disturb mode. The DISA caller hears music or ringing
(determined by a system-wide option in database programming) until the Transfer Available or
196
Trunks and Gateways
Transfer Busy timer expires. Then, if the call is not answered, it recalls the called phone’s
attendant. If the called phone is forwarded, the call follows the programmed forward.
When a hunt group pilot number receives a call through DISA, the call rings or circulates
according to how the hunt group is programmed; that is, linear or distributed. If a caller dials a
valid hunt group pilot number that has no members assigned to it, the call automatically rings
at the primary attendant phone until the Abandoned Call timer expires. If the call is not answered
before the Abandoned Call timer expires, the call is disconnected.
Security Codes
DISA trunks can be assigned security codes of up to eight digits that are required for access
to the system. The installer can program separate codes for each DISA trunk group to be used
during day or night modes.
To prevent unauthorized access to the outgoing trunks, all trunk groups using DISA should
NOTE
have a security code.
System administrators can determine the number of times that a caller may unsuccessfully
attempt to enter a security code and/or dial an extension number. If the user does not succeed
within the determined number of attempts, the call is disconnected if the security code is invalid
or, if the extension number is invalid, the call is transferred to the primary attendant.
Using DISA
If DTMF decoders are unavailable when a DISA call is received, the incoming DISA call is
NOTE
automatically sent to the primary attendant.
To use DISA:
From a DTMF telephone, the caller dials the telephone number of the DISA trunk. When the
call is answered by the system, the caller hears system intercom dial tone
DISA
1
SYSTEM
If a single progress tone is heard, the caller must enter the appropriate day or night DISA
security code, followed by the pound sign (#). caller dials an extension number or a hunt group
pilot number. To call the primary attendant, the caller dials 0. The caller will hear ringing, or
may hear music if the system is equipped with Music-On-Hold, until the call is answered or
routed in accordance with system programming.
197
Features and Programming Guide
Trunks can be designated for dual-tone multi-frequency (DTMF) signaling only through
database programming.
EMERGENCY CALLS
The MiVoice Office 250 allows immediate access to local emergency facilities whenever a
phone user enters the Emergency Call feature code. The dialing pattern defaults to:
• 911 on systems located in the USA
• 999 on systems located in Europe
• 112 on systems located in Australia
When activated, the Emergency Call feature selects a trunk or routes the call based on the
phone programming. When activated, the Emergency Call feature overrides all toll restrictions
and trunk access programming.
WARNING
Responsibility for Regulatory Compliance.
It is the responsibility of the organization and person(s) performing the installation and maintenance of
Mitel Advanced Communications Platforms to know and comply with all regulations required for ensuring
Emergency Outgoing Access at the location of both the main system and any remote communication
phones. Remote IP and SIP phones may require gateway access to nearby emergency responders.
Emergency Call phone numbers include:
• 911, the default for Mitel systems located in the U.S.
• 999, the default for Mitel systems located in the European market and used primarily in the U.K.
• If applicable, 112, an emergency number used widely in Europe outside of the UK, and Australia.
• Any emergency number, such as for a police or fire station, that is appropriate for the location of the
main system and/or remote phones.
Emergency Extensions can be programmed for each phone, and Day/Night Emergency
Outgoing Access lists are used to validate the extension making the emergency call.
When a user dials the Emergency Call phone number at intercom or CO dial tone, emergency
outgoing access is granted based on system programming and what the user dialed, as
described in the following scenarios:
• If the user dials the emergency feature code from a phone with a trunk or trunk group
programmed as the Emergency Extension, the Emergency Call feature routes the call
based on the phone’s Emergency Extension. The trunk or trunk group does not validate
the phone originating the emergency call against the trunk group’s Emergency Day/Night
Outgoing Access List. An idle trunk is seized, and the system automatically dials Emergency
Number 1.
• If the user dials the emergency feature code from a phone with ARS programmed as the
Emergency Extension:
a. The Emergency Call feature routes the call based on the phone’s Emergency
Extension.
198
Trunks and Gateways
If everything is denied due to Emergency Outgoing Access, the call is routed once
again to Route Group 1. The call then tries the first facility group in Route Group 1.
The trunk group or node trunk group does not validate the phone originating the emer-
gency call against the group’s Emergency Day/Night Outgoing Access List. If no trunks
are available, the call tries the next member in the facility group. If all of the members
are unavailable, the call camps-on to Route Group 1 until a trunk is available.
• If the user accesses a trunk or trunk group and dials any Emergency Number (1–10), the
trunk or trunk group does not validate the phone originating the emergency call against the
trunk group’s Emergency Day/Night Outgoing Access List. An idle trunk is seized, and the
system automatically dials the emergency number.
• If the user accesses ARS and dials any Emergency Number (1–10):
a. The call is routed to Route Group 1.
b. The call tries the first facility group in Route Group 1.
c. The trunk group or node trunk group validates the phone originating the emergency
call against the group’s Emergency Day/Night Outgoing Access List.
d. If the call is denied, the call tries the next member in the facility group. If each member
denies the call, the call tries the next facility group in the Route Group 1 list.
If everything is denied due to Emergency Outgoing Access, the call is routed once
again to Route Group 1. The call then tries the first facility group in Route Group 1.
The trunk group or node trunk group does not validate the phone originating the emer-
gency call against the group’s Emergency Day/Night Outgoing Access List. If no trunks
are available, the call tries the next member in the facility group. If all of the members
are unavailable, the call camps-on to Route Group 1 until a trunk is available.
Mitel recommends that only local trunks be installed and used for emergency trunk access
and that only local trunks be programmed in Route Group 1. Programming a node in Route
NOTE
Group 1 may cause the system to access a trunk on a separate node when ARS is used for
emergency access. If this occurs, Emergency Outgoing Access is no longer validated.
The system allows the Dialing Wait After Connect timer to expire and then dials the digit string
programmed in the database as the emergency number.
At the time the call is processed, a minor alarm will be generated by the system and sent to all
administrator phones. Also, if the Message Print option is enabled, the alarm message is sent
199
Features and Programming Guide
SYSTEM DATABASE:
EMERGENCY EXT. =
TRUNK GROUP 1 (92001)
OR ALARM #11
DIRECT TRUNK ACCESS DISPLAYED
Phone user EMERGENCY No. = 911
dials 911
The system supports two outgoing access lists called Emergency Day Outgoing Access and
Emergency Night Outgoing Access. These lists, which are similar to the Day/Night Outgoing
Access lists, are programmable for CO Trunk Groups, SIP Peer Trunk Groups and Node IP
Connection Groups” . These lists default to the Auto Extension List PP051: Auto: All Phones.
For programming instructions, see “Extension Lists and System Groups“ on page 527.
The system can store up to 10 emergency numbers that are dialed when the Emergency Call
feature is used.
If the system is installed in an area where emergency responder services such as 911 in the
USA, 999 in the European market, or 112 in Australia are not available, Mitel recommends
substituting the phone number for the local police or fire department or the telephone company
operator.
This feature can be made inoperative by removing all trunk access and/or by removing the
dialed digit string. If Emergency Call is not operational, the system presents a warning message
that the feature has been disabled. The programmer must acknowledge or change this condition
before system operation can continue.
Like other feature codes, the default Emergency Call feature code can be changed from 911,
999, or 112 to a different code, if necessary.
An emergency number will be blocked if there are no trunks or emergency numbers programed
in the database, or all trunks in a trunk group are busy.
If the Emergency Call feature is programmed to use ARS, route group 1 (local calls) will be
used even if its dial patterns are reprogrammed.
Emergency calls, by default, use the first local trunk group and will not be sent using node trunk
groups on other nodes. However, when ARS is used to place an emergency call, Route Group
1 is used, even if it contains nodes. This means that the network can access a trunk on a node
other than the user’s node if the user accesses ARS and dials the emergency number. Local
200
Trunks and Gateways
trunks must be installed and used for emergency number trunk access and nodes should
not be used in Route Group 1. When a user places an emergency call, every administrator
in the network receives an emergency alarm.
Each phone can be programmed to send an identifying number when a call is placed. This
information is required by government regulation for emergency calls in some areas. Up to 48
digits can be programmed in the Calling Party Number field. However, check with your service
provider to determine their specific requirements. This number is sent in the ISDN setup
message in the Calling Party Number Information Element. In addition, the system sends the
extension number of the phone in the Calling Party Number Subaddress Information Element.
The CO should ignore this information element if it does not support the feature.
No default number exists for this field. It is up to the system administrator to supply the correct
NOTE
Emergency Calling Party Number for each phone.
If an off-premises extension is used for dialing an Emergency Number such as 911 in the USA,
999 in the European market, or 112 in Australia, the emergency responder operators will see
the Calling Party Number or the address the system chassis location rather than the address
of the off-premises location. Off-premises personnel should be prepared to give the correct
address and other pertinent information if it is not programmed as the Calling Party Number.
The system supports SIP (Session Initiated Protocol) trunks to reach the CO. SIP trunks allow
the system to communicate with the CO via SIP-enabled gateways. As the SIP protocol
becomes more and more popular, it is important to be able to communicate to SIP gateways
in the IP-centric world.
For a more current list of compatible SIP gateways, refer to KB article 09-4940-00056 on the
Mitel Knowledge Base Center (http://domino1.mitel.com/prodsupp/prodsupkb.nsf/
WebSearchForm?OpenForm). Note that you must first log on to Mitel OnLine (http://
portal.mitel.com/wps/myportal/MOLHome) in order to access the KB.
201
Features and Programming Guide
WARNING
Possible Delay in Local Emergency Response to Remote Sites.
IP and SIP phone users should be alerted to the following hazardous situations:
• If an Emergency Call phone number is dialed from an IP or SIP phone located at a remote site that is
not equipped with a correctly configured gateway, the call will be placed from the location where the
system chassis is installed rather than from the location where the emergency call is made.
• In this situation, emergency responders may be dispatched to the wrong location. To minimize the risk
of remote site users misdirecting emergency responders, Mitel recommends regular testing of MGCP/
SIP gateway trunk(s) for dial tone.
• If uninterruptible power supply (UPS) protection has not been installed as part of the MiVoice Office
250, IP and SIP phones will not operate when electrical power fails either at remote sites or at the main
system location.
To place calls during a power failure in this situation, IP and SIP phone users can only use a single line
phone connected to one of the power failure bypass circuits built-in to the system chassis. If a phone
connected to a power failure bypass circuit is not available, users should make emergency calls from a
local phone not connected to the system. For details about installing phones to the Power Failure
Bypass circuits, refer to the “Installation” chapter in the MiVoice Office 250 Installation and Administration
Manual .
When configured with an MGCP Gateway or a SIP Gateway, the system can be programmed
so that when an Emergency Number is dialed from an IP phone, the calling name and number
associated with the IP phone—not the system—is sent to the emergency response operators.
To ensure this functionality works, the system must be programmed for remote loop termination.
The MGCP gateway is intended to connect to the PSTN. Connecting the MGCP gateway to
NOTE
single line ports on other systems is not supported.
Each trunk group has programmed lists of phones for outgoing-access, allowed-answer, and
ring-in assignments for day and night modes.
• Outgoing-access: Permits the phone user to place calls using trunks in that trunk group.
Each phone has a default outgoing access code programmed in the database. When the
user presses the OUTGOING button, presses an idle CALL button, or enters the Outgoing
Call feature code, 8 (0 in Australia), the system automatically selects an outgoing trunk.
Because the network does not allow users to directly access trunks on other nodes, each
NOTE trunk group’s Outgoing Access can contain only phones on the local node. Users must use
ARS to access trunks on other nodes.
• Allowed-answer: Permits the phone user to answer incoming calls on the trunks in that
trunk group (even if the phone does not have ring-in assignment for that trunk group).
Phones cannot have allowed-answer assignment for trunk groups on other nodes. On
phones, the individual trunk button flashes (if one exists) to indicate the ringing call. If a
phone is programmed with allowed Answer Access only (no ring-in) for a trunk group, direct
ring-in calls on that trunk group can be answered by entering the Automatic Trunk Answer
feature code (350) or pressing the flashing individual trunk button.
• Ring-in: Assigns ring-in destinations which can be one or more phones, modems, extension
lists, or Voice Processing applications; to a hunt group; to DISA; or to a call routing table.
202
Trunks and Gateways
A trunk can ring in to a phone or Voice Processing application on another node. The ring
in destination(s) for the trunk group will receive direct ring-in calls on trunks in that trunk
group. On phones with ring in, the individual trunk or CALL button flashes and the display
indicates a ringing call. Allowed answer for the trunk group is automatically assigned to a
phone with ring in.
When phones have outgoing-access or ring-in assignments, the associated individual trunk
buttons show the status of their trunks.
Phones that do not appear on any of the lists cannot place or directly receive outside calls; they
are limited to intercom calls, conferences, transferred calls, and retrieving calls on system hold.
(A call on system hold can only be picked up at the phone that placed it on hold or at a phone
that has an individual trunk button and has allowed-answer and/or outgoing access for that
trunk.)
A private trunk group with one or more trunks can be established by programming outgoing-
access, ring-in, and allowed-answer permission for the trunk group to only one phone.
For programming instructions, see “Extension Lists and System Groups“ on page 527.
TRUNK MANAGEMENT
This section describes the way the MiVoice Office 250 has been designed to facilitate efficient
management of trunk facilities.
TRUNK GROUPS
Each trunk is assigned to a trunk group. Trunk group feature codes and trunk group buttons
are used to select a trunk in one of the programmed trunk groups. Each trunk must be assigned
to a trunk group. For example, all local trunks could be in one group, while another group could
contain WATS trunks that are used for long distance calling. Unused trunks can be placed in
a single trunk group that is labeled “unused.”
All trunks in a trunk group must reside on the same node as the trunk group. The trunk group
is programmed to process outgoing calls in linear or distributed order:
• Linear trunk group: Requests for an outgoing trunk are always processed beginning with
the highest numbered trunk circuit on the list and move through the list until an available
trunk is found.
• Distributed trunk group: The first request will be processed beginning with the highest
numbered trunk circuit on the list. The next request will begin with the second highest
numbered trunk, and each subsequent request will begin one trunk lower on the list. When
the end of the list is reached, requests begin again with the highest numbered trunk on the
list.
The Camp On feature can be enabled or disabled for each trunk group. If the Camp-on feature
is disabled, callers will hear continuous busy signals when all trunks in the trunk group are in
use or unavailable. If Camp On is enabled, callers are able to camp on to the trunk group and
wait for an available trunk. See page 554 for details about trunk Camp-Ons.
203
Features and Programming Guide
IP GATEWAY TRUNKS
IP gateway trunks terminate on a SIP gateway in order to interconnect the MiVoice Office 250
to the public switch telephone network (PSTN). SIP gateway trunks can be programmed on
the MiVoice Office 250 without having an adequate number of IP gateway trunk licenses.
However, in this situation the system allows only the licensed number of IP gateway trunks to
come online, based on Call Processing’s IP gateway trunk order.
All SIP gateway trunks come online first, based on their hardware addresses, whether or not
a physical connection to the SIP gateway exists. This means the IPR Application uses the first
available IP networking resource to bring the SIP gateway trunks online.
From the end-user point of view, hardware addresses are not used. Internally, however, Call
Processing uses hardware addresses.
In online mode, DB Programming posts a warning if the user attempts to program more IP
gateway trunks than the number licensed.
The system allows only the number of licensed IP gateway trunks to come online. When more
that the licensed number attempt to come online, the Message Print log identifies the trunk
extensions that failed to come online. At the same time, Alarm #127 appears on the unit chassis’
LCD panel and on the Administrator phone display.
Node trunk groups: Are made up of PRI circuits that are programmed for private network use.
When a PRI-equipped module is programmed for networking (Private Networking switch type),
the system automatically creates a node trunk group. (All B-Channels residing on the same
T1M or T1M-2 module are in the same node trunk group.)
Node programming: Contains a list of node trunk groups used to access another node. For
each node in the network, you must define the routes to every other node. For example, in a
network with four nodes, you would define three routes for each node (one to each of the other
three nodes). For more information about private networking refer to “Appendix A: Private
Networking,” in the MiVoice Office 250 Installation and Administration Manual .
The nodes are programmed to select their node trunk groups in linear or distributed order:
• Linear: The node first attempts to route through the first node trunk group listed in the node.
If the node is unable to route through that node trunk group, it attempts to route through
the second node trunk group listed in the route. The node continues to attempt to route
through subsequent node trunk groups in the list until it successfully routes or exhausts all
node trunk groups in the list.
• Distributed: The node shifts the first node trunk group it attempts to use. For example, if
the node routed the previous call or communication through the first node trunk group listed,
the node routes the second call or communication through the second node trunk group
listed.
To prevent circular or excessive routes, the system limits the number of “hops.” A call or
communication can take up to 10 hops to other nodes. However, 2 or 3 hops maximum is
recommended.
204
Trunks and Gateways
T1 OPX SERVICE
Some sites may experience difficulties when using a loop start T1 line configured for OPX
service. This arrangement may be used