NEC NEAX2400 IPX Programming Manual page 647

Feature programming manual
Hide thumbs Also See for NEAX2400 IPX:
Table of Contents

Advertisement

P-18
Service Conditions (cont'd)
f.) While engaged in a multiple-party call, the user presses the line appearance of a busy station.
g.) While engaged in calling a station by INTERCOM [I-9] call or Intercom Bridge call, the station
presses the line appearance of busy station.
h.) After placing a call on CONSULTATION HOLD [H-17], the station originates a call to a station
or trunk and then presses the line appearance of a busy station.
15.
The following features cannot be activated by any station in a multiple-party call:
CALL TRANSFER-ALL CALLS
CALL HOLD
CONSULTATION HOLD-ALL CALLS
DATA PRIVACY ON DEMAND
NON-EXCLUSIVE HOLD
EXCLUSIVE HOLD
16.
The following features are restricted to all stations in a multiple-party call:
ATTENDANT CAMP-ON WITH TONE INDICATION
ATTENDANT OVERRIDE
BOSS-SECRETARY OVERRIDE-D
CALL WAITING-ORIGINATING
CALL WAITING-TERMINATING
EXECUTIVE RIGHT-OF-WAY
MESSAGE REMINDER-D
Designated trunk seizure by Attendant
17.
Eight-party conference trunk (PA-CFTB circuit card) assignments are as follows:
a.) For all ports of the 8-party conference trunk, any telephone number of up to 16 digits can be
assigned. Also, a phantom number can be assigned to Port 0 (L = 0).
b.) Ports 1 through 7 (L = 1-7) in the same conference trunk must be grouped in the same Circular
Hunting Group.
c.) When only one 8-party conference trunk is available for a Tenant, the telephone number or
phantom number of Port 0 (L = 0) should be assigned to system data as the trunk seizure number.
When several trunks (maximum of 20) are available, the telephone number or phantom number of
Port 0 (L = 0) in one of the trunks should be assigned as the trunk seizure number.
18.
Eight-party conference trunk seizure:
a.) When only one trunk is available for a Tenant, the trunk cannot be seized unless all of the eight
ports of the trunk (where trunk seizure number corresponding to the Tenant is assigned) are in
idle status.
b.) When multiple trunks are available for a Tenant, the trunk in which all of the eight ports in the
Hunting Group (pilot telephone number = trunk seizure number corresponding to the Tenant) are
in an idle state, is hunted and seized.
c.) If an 8-party conference trunk seizure number corresponding to the Tenant is not assigned, the
following method of trunk seizure is also available:
i.)
The trunk that contains Port 0, whose telephone number or phantom number is AB (A =
number determined by system data, B = the last number of the overridden telephone number),
and all of the eight ports in an idle state are seized.
ii.)
If a Hunting Group (pilot telephone number = AB) is assigned among the first Ports of
multiple trunks, the trunk in the Group where all of the eight ports are in an idle state is hunted
and seized.
Page 604
Privacy Release
term
term
[C-11]
[C-6, C-6D]
[C-17]
[D-17]
[N-7D]
[E-4D]
[A-1]
[A-7]
[B-5D]
[C-31]
[C-12]
[E-1]
[M-19D]
NEAX2400 IPX Feature Programming Manual
NDA-24297, Issue 1

Advertisement

Table of Contents
loading

Table of Contents