06 NCG PDF
06 NCG PDF
BCM50 2.0
Business Communications Manager
Trademarks
Nortel, the Nortel logo, and the Globemark are trademarks of Nortel Networks.
Microsoft, MS, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation.
All other trademarks and registered trademarks are the property of their respective owners.
List of procedures 3
List of procedures
Managing modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
To enable or disable a bus ............................................................................................87
To turn a port channel on or off .....................................................................................87
Lines overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
NN40020-603
List of procedures 5
IP Subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
To modify an IP address..............................................................................................456
To modify a subnet ......................................................................................................459
To add a new IP Static Route......................................................................................463
To modify an existing IP Static Route..........................................................................463
To delete an existing IP Static Route ..........................................................................463
NN40020-603
List of procedures 7
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551
NN40020-603
Contents 9
Contents
Chapter 1
Getting started with BCM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
About this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
About BCM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Symbols and conventions used in this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
How to get Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Getting Help from the Nortel Web site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Getting Help over the telephone from a Nortel Solutions Center . . . . . . . . . . . . . 31
Getting Help through a Nortel distributor or reseller . . . . . . . . . . . . . . . . . . . . . . . 32
Chapter 2
System telephony networking overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Basic system configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Tandem calling to a remote PSTN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Private network parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Lines used for networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Types of private networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Routing-based networks using T1 E&M lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
PRI networking using Call-by-Call services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
PRI SL-1/Q.Sig/DPNSS and VoIP trunk networking . . . . . . . . . . . . . . . . . . . . . . . 42
System dialing plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Creating tandem private networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Understanding Nortel Voice Networking (MCDN) network features . . . . . . . . . . . . . . 46
Network Call Redirection Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
ISDN Call Connection Limitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Trunk Route Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Trunk Anti-tromboning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Networking with ETSI QSIG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
ETSI Euro network services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
DPNSS 1 services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
DPNSS 1 capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
DPNSS 1 features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Private networking with DPNSS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
BRI Euro Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Naming convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Application level differences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Protocol level differences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Chapter 3
Telephony programming: Configuring call traffic . . . . . . . . . . . . . . . . . . . 63
Incoming calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Outgoing calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Chapter 4
Application Resources overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Types of resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Total and Reserved Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Setting values for application resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Chapter 5
Application Resources panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Chapter 6
Module configuration: Trunk modules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Configuring the trunk module parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Module parameters list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Chapter 7
Managing modules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Disabling or enabling a bus or module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Disabling or enabling a port channel setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Trunk module metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Chapter 8
Lines overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Understanding how the system identifies lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Determining which lines you need to program . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
BRI loops programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Line record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Line characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Line restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Remote restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Voice message center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Line Job Aids . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Determining line numbers and destination codes . . . . . . . . . . . . . . . . . . . . . . . . . 95
Line pool tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Using loss packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Turn Privacy on or off for a call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
NN40020-603
Contents 11
Chapter 9
Configuring telephony resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Telephony Resources table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Media bay module panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Trunk Module Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Call-by-Call Service Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Port details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Provisioning module lines/loops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
IP telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
IP Terminal Global Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
IP telephone set details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Voice over IP trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Routing table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
H323 Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
H323 Media Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
SIP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
SIP Media Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
SIP URI Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Chapter 10
Configuring lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Trunk/Line data, main panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Preferences (lines) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Restrictions (Line and Remote) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Assigned DNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Chapter 11
Configuring lines: Target lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Configuring Target line settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Chapter 12
Configuring lines: PRI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Configuring PRI line features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Configuring PRI Call-by-Call services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Chapter 13
Configuring lines: T1-E&M . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Configuring E&M line features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Chapter 14
Configuring lines: T1-Loop start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Configuring digital (T1/E1) loop start lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Chapter 15
Configuring lines: T1-Digital Ground Start . . . . . . . . . . . . . . . . . . . . . . . . 163
Configuring digital ground start line features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Chapter 16
Configuring lines: T1-DID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Configuring DID line features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Chapter 17
Configuring lines: DASS2 lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Configuring DASS2 line features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Chapter 18
Configuring lines: DPNSS lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Configuring DPNSS line features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Chapter 19
BRI ISDN: BRI loop properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Configure loop type and general parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
T-loop general settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
T-loop SPIDS and network DNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
T-loops D-packet service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
S-loops assigned DNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Chapter 20
BRI ISDN: BRI T-loops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Configuring BRI T-loop parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Configuring BRI lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Chapter 21
Programming BRI S-loops, lines, and ISDN devices . . . . . . . . . . . . . . . . 201
Setting BRI properties for ISDN device connections . . . . . . . . . . . . . . . . . . . . . . . . . 201
DN records: ISDN devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Configuring an ISDN telephone DN record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
NN40020-603
Contents 13
Chapter 22
Configuring CLID on your system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Programming incoming CLID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Using alpha tagging for name display (incoming) . . . . . . . . . . . . . . . . . . . . . . . . 207
Programming outgoing CLID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Chapter 23
CLID: Name display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Business name display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Alpha tagging for name display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Name display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Incoming and outgoing call display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Chapter 24
Dialing plans. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Creating dialing plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Public and Private Received numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Private network dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Setting up public network dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Outgoing call routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Incoming call routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Processing incoming calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Determining line access dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Understanding access codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Call Park codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Creating Direct Dial sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Tips about access codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Using the MCDN access codes (tandem calls) . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Line pool access codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Using Carrier codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Configuring call routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Configuring Call-by-Call services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
Call-by-Call services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Switches supporting Call-by-call limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Provisioning for Call-by-Call limits with PRI . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
Call-by-Call service routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
PRI routing protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Using destination codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Why use destination codes? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
Deciding on a code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Adding Carrier access codes to destination codes . . . . . . . . . . . . . . . . . . . . . . . 242
Routing schedules and alternate routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Chapter 25
Dialing plan: Routing configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Destination code numbering in a network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Setting up a destination for local calling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Setting up a route through a dedicated trunk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
Grouping destination codes using a wild card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
Programming for least-cost routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Using multiple routes and overflow routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Dialing plan using public lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
Programming the PRI routing table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Adding Carrier access codes to destination codes . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Using the MCDN access codes to tandem calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Chapter 26
Dialing plan: Routing and destination codes . . . . . . . . . . . . . . . . . . . . . . 259
Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Destination codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
Alternate routes for routing schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
Second Dial Tone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Chapter 27
Dialing plan: System settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Common dialing plan settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
DN length constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
Received number notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Tips about access codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
Call Park codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Chapter 28
Dialing plan: Public network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Public dialing plan settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Public Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
Public network DN lengths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Carrier Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Chapter 29
Dialing plan: Private network settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Private Network dialing plan settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Private Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Private Network - MCDN network (PRI SL-1, PRI ETSI, VoIP) . . . . . . . . . . . . . 283
VoIP-specific private network dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
NN40020-603
Contents 15
Chapter 30
Public networking: Setting up basic systems. . . . . . . . . . . . . . . . . . . . . . 289
Public networks: PBX system setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Public network: DID system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Chapter 31
Public networking: Tandem calls from private node . . . . . . . . . . . . . . . . 293
Programming for tandem dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Caller access on a tandem network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Chapter 32
Private networking: MCDN over PRI and VoIP . . . . . . . . . . . . . . . . . . . . . 297
Using MCDN to network with a Meridian system . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Meridian system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Meridian MCDN call features over PRI SL-1 lines . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
MCDN networking checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
UDP-specific programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
CDP-specific programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
VM programming with Meridian 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
Meridian TRO programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
An example of a private network with Meridian 1 . . . . . . . . . . . . . . . . . . . . . . . . 307
Configuring fallback over a VoIP MCDN network . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
MCDN functionality on fallback PRI lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Networking with ETSI QSIG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Chapter 33
Private networking: Basic parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Private networking protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Keycode requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Remote access to the network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Other programming that affects private networking . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Types of private networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Chapter 34
Private networking: MCDN and ETSI network features . . . . . . . . . . . . . . 319
Configuring MCDN network features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
Configuring ETSI Euro network services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Chapter 35
Private networking: PRI and VoIP tandem networks . . . . . . . . . . . . . . . . 323
Routing for tandem networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Routing calls through a tandem network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Calls originating from the public network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Calls originating in the private network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Using VoIP to tandem systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Chapter 36
Private networking: DPNSS network services (UK only) . . . . . . . . . . . . . 331
Using the diversion feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Using the Redirection feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Executive intrusion, Intrusion protection level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Call offer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Route Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Loop avoidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Private networking with DPNSS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Chapter 37
Private networking: Using destination codes . . . . . . . . . . . . . . . . . . . . . . 339
Chapter 38
Private networking: PRI Call-by-Call services. . . . . . . . . . . . . . . . . . . . . . 343
Chapter 39
Configuring voice messaging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
Centralized Voice Messaging (external voice mail) . . . . . . . . . . . . . . . . . . . . . . . . . . 347
Programming MWI and MWC strings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
Local voice messaging access (CallPilot Manager) . . . . . . . . . . . . . . . . . . . . . . . . . 349
Chapter 40
Configuring centralized voice mail. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
Local system as host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
Meridian system as host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
System set up for host system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
System set up for satellite systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
Configuring the system for centralized voice mail . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
Chapter 41
Dialing plan: Line pools and line pool codes . . . . . . . . . . . . . . . . . . . . . . 357
Line pools (and access codes) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Line pools: DNs tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
Line pools: Call-by-Call Limits tab (PRI only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
NN40020-603
Contents 17
Chapter 42
VoIP overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
IP telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
VoIP trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
Creating an IP telephony network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
Telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Gatekeepers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
SIP Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
IP Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Key VoIP concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
Chapter 43
VoIP trunk gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Pre-installation system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
How VoIP trunks make a network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
Local gateway programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
Routing Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
PSTN call to remote node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
Fallback to PSTN from VoIP trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Describing a fallback network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
How fallback routing works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
Optional VoIP trunk configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Gatekeeper call scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Operational notes and restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
Chapter 44
Configuring VoIP trunk gateways. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Configuring VoIP trunk media parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Setting up the local gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Setting up remote gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Configuring a remote gateway (H.323 trunks) . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Configuring VoIP lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Configuring VoIP line features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
Chapter 45
VoIP interoperability: Gatekeeper configuration . . . . . . . . . . . . . . . . . . . 389
Using CS 1000 as a gatekeeper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
CS 1000 configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
Chapter 46
Setting up VoIP trunks for fallback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
Configuring routes for fallback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
Activating the VoIP schedule for fallback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
Chapter 47
T.38 fax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
Enabling T.38 fax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
Lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Media gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
T.38 Fax restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Operational notes and restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Chapter 48
Port ranges overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
RTP over UDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
UDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Signaling Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Chapter 49
Port Ranges panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
RTP over UDP Port Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Adding new RTP over UDP Port Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
Deleting RTP over UDP Port Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
Modifying RTP over UDP Port Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
UDP Port Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Signaling Port Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
Chapter 50
Media gateways overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
Chapter 51
Media Gateways panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
Chapter 52
Call security and remote access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
Defining restriction filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
Notes about restriction filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
Default filters (North America) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Default filters (other) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
Restriction filter examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
Remote call-in programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
Creating Direct Inward System Access (DISA) . . . . . . . . . . . . . . . . . . . . . . . . . . 420
Defining remote access packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
Defining CoS passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
External access tones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
NN40020-603
Contents 19
Chapter 53
Call Security: Configuring Direct Inward System Access (DISA) . . . . . . 427
Remote access overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
Setting up remote access on lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Remote access on loop-start trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Remote access on T1 DID trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Chapter 54
Call security: Restriction filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Restriction filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Adding a restriction filter and exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
Default filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Chapter 55
Call security: Remote access packages . . . . . . . . . . . . . . . . . . . . . . . . . . 439
Configuring remote access packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
Chapter 56
Configuring CoS passwords for remote access . . . . . . . . . . . . . . . . . . . . 443
Class of Service table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
Adding or modifying a CoS password values . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
External access tones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
Chapter 57
LAN overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
What is a LAN? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
LAN settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
DHCP configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Chapter 58
Configuring the BCM with a DHCP address . . . . . . . . . . . . . . . . . . . . . . . 451
Chapter 59
Data networking overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
What is data networking? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
About the BCM VoIP capability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
Network routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
Configuring the BCM with data networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
Chapter 60
IP Subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
Main panel tabs: General settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
IP settings options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
DNS Settings options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456
Chapter 61
Data network prerequisites checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Network diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Network devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
Network assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
Keycodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
System configuration for IP telephony functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
VoIP trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468
IP telephone records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468
Chapter 62
Router overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
ADSL and Ethernet configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Router features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Chapter 63
Router panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
Accessing your router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
Chapter 64
VLAN overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
Choosing DHCP for VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
Specifying the site-specific options for VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
Chapter 65
DHCP overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Understanding DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
DHCP on the BCM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Router DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Main Module DHCP client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Main Module DHCP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
DHCP network scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Default configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
NN40020-603
Contents 21
Chapter 66
DHCP Server Settings panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Main panel tabs: General Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Main panel tabs: IP Terminal DHCP Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
Main panel tabs: Address Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
DHCP subnets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
Main panel tabs: Lease Info . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
Chapter 67
DHCP configuration with router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Changing the default router DHCP configuration . . . . . . . . . . . . . . . . . . . . . . . . 491
Configuring the BCM with a DHCP address . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Configuring the BCM to act as a DHCP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Determining the status for the DHCP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
Using the BCM as a standalone DHCP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
DHCP for IP sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
Disabling the DHCP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
Chapter 68
Firewall configuration resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
Chapter 69
Dial Up overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Remote Access Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498
Automatic Data Dial-Out Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499
WAN Failover Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
Modem compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
Chapter 70
Dial Up Interfaces panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Dial-out Interfaces panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
ISDN interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502
ISDN Dial-out Channel Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
ISDN Dial-out Link Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
ISDN Dial-out IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
Modem interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
Modem Dial-out Link Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
Modem Dial-out IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512
Global Settings panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512
WAN failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
Modem Dial-In Parameters panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514
Additional configuration to allow network access functionality . . . . . . . . . . . . . . 517
ISDN Dial-In Parameters panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518
Appendix A
VPN overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
IPSec tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
IPSec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
Appendix B
Silence suppression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
Silence suppression on half-duplex links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
Silence suppression on full-duplex links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
Comfort noise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
Appendix C
ISDN overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535
Welcome to ISDN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535
Services and features for ISDN BRI and PRI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537
PRI services and features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538
BRI services and features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538
Service provider features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
Network name display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
Name and number blocking (ONN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
Call-by-Call Service Selection for PRI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
Emergency 911 dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
2-way DID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
Dialing plan and PRI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
ISDN hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542
PRI hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542
BRI hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542
Clock source for ISDN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544
ISDN BRI NT1 equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544
ISDN standards compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
Planning your ISDN network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
Ordering ISDN PRI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
Ordering ISDN BRI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546
Supported ISDN protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547
Appendix D
NN40020-603
Contents 23
NN40020-603
25
Chapter 1
Getting started with BCM
Purpose
The concepts, operations, and tasks described in this guide relate to the BCM software. This guide
provides task-based information about how to assign features and provide basic programming for
the BCM.
Use Element Manager, Startup Profile, and Telset Administration to configure various BCM
parameters.
In brief, the information in this guide explains:
• global telephony settings
• steps to configure DNs
• product features and how to assign them
Audience
The Networking Configuration Guide is directed to installers who install, configure, and maintain
BCM systems.
To use this guide, you must:
• be an authorized BCM installer or administrator within your organization
• know basic Nortel BCM terminology
• be knowledgeable about telephony and IP networking technology
Acronyms
The following is a list of acronyms used in this guide.
Table 1 Acronyms
Acronym Description
Organization
This guide is organized for easy access to information that explains the concepts, operations, and
procedures associated with the BCM system.
About BCM
The BCM system provides private network and telephony management capability to small and
medium-sized businesses.
The BCM system:
• integrates voice and data capabilities, VoIP gateway functions, and QoS data-routing features
into a single telephony system
• enables you to create and provide telephony applications for use in a business environment
NN40020-603
Chapter 1 Getting started with BCM 27
BCM features
BCM50 supports the complete range of IP telephony features offered by existing BCM products:
Note: You enable the following features by entering the appropriate keycodes (no
additional hardware is required).
BCM applications
BCM50 supports many applications provided on the existing BCM platforms.
Note: You enable the following features by entering the appropriate keycodes (no
additional hardware is required).
Caution: Alerts you to conditions where you can damage the equipment.
Danger: Alerts you to conditions where you can get an electrical shock.
Warning: Alerts you to conditions where you can cause the system to fail or work
improperly.
Tip: Alerts you to additional information that can help you perform a task.
Warning: Alerts you to remove the BCM main unit and expansion unit power
cords from the ac outlet before performing any maintenance procedure.
NN40020-603
Chapter 1 Getting started with BCM 29
The following conventions and symbols are used to represent the Business Series Terminal display
and dialpad.
Word in a special font (shown in Pswd: Command line prompts on display telephones.
the top line of the display)
Underlined word in capital letters PLAY Display option. Available on two line display
(shown in the bottom line of a telephones. Press the button directly below the
two-line display telephone) option on the display to proceed.
The following text conventions are used in this guide to indicate the information described.
Convention Description
bold Courier Indicates command names and options and text that you must enter.
text
Example: Use the info command.
Example: Enter show ip {alerts|routes}.
italic text Indicates book titles.
plain Courier Indicates command syntax and system output (for example, prompts
text and system messages).
Example: Set Trap Monitor Filters
FEATURE Indicates that you press the button with the coordinating icon on
HOLD whichever set you are using.
RELEASE
Related publications
This section provides a list of additional documents referred to in this guide. There are two types
of publications: Technical Documents on page 29 and User Guides on page 30.
Technical Documents
System Installation
BCM50 2.0 Installation and Maintenance Guide (NN40020-302)
Keycode Installation Guide (NN40010-301)
System Programming
Administration Guide (NN40020-600)
Digital Mobility
T7406 Cordless Handset Installation Guide (P0606142)
IP Telephony
BCM IP Softphone 2050 Installation Guide (N0022555)
WLAN IP Telephony Installation and Configuration Guide (N0060634)
User Guides
NN40020-603
Chapter 1 Getting started with BCM 31
Digital Mobility
DECT 413X/414X Handset User Guide (N0028550)
DECT 4145Ex/4146Ex Handset User Guide (XXXXX)
Digital Mobility Phone 7420 User Guide (N0000635)
Digital Mobility Phone 7430/7440 User Guide (N0028550)
T7406 Cordless Telephone User Card (P0942259)
IP Telephony
IP Audio Conference Phone 2033 User Guide (N0060623)
IP Phone 2001 User Guide (N0027313)
IP Phone 2002 User Guide (N0027300)
IP Phone 2004 User Guide (N0027284)
IP Phone 2007 User Guide (N0064498)
BCM WLAN 2210/2211/2212 Handset User Guide (N0009103)
http://www.nortel.com/support
This site enables customers to:
http://www.nortel.com/callus
When you speak to the telephone agent, you can reference an Express Routing Code (ERC) to
more quickly route your call to the appropriate support specialist. To locate the ERC for your
product or service, go to:
http://www.nortel.com/erc
NN40020-603
33
Chapter 2
System telephony networking overview
The system supports both public and private networking for telephony traffic.
• The public network is created by PSTN trunk connections from a Central Office terminating
on a telephone system such as the BCM.
• A private network is created when the system is connected through dedicated PSTN lines or
VoIP trunks to other systems. This system may take several forms. At the simplest level, your
system may be behind a private PBX, which connects directly to the Central Office. A more
complicated system may be a node in a network of systems of various types, where calls not
only terminate at the system, but calls may need to be passed through the system to other
nodes unconnected to the originating node.
Refer to the following information:
PBX system
This setup is for larger offices which have fewer CO lines than telephones. In this case the lines are
pooled, and the line pool access is assigned to all DNs. There may also be a designated attendant
with a telephone that has all lines individually assigned.
CO line 1
CO line 2
All telephones CO line 3
are assigned
access to the line CO line 4
pool for outgoing
calls
Receptionist
Assigned all lines/
appearance and
ring
Incoming calls
1 A call comes in on a line.
2 The receptionist answers the call and finds out who the call is for.
3 The receptionist transfers the call to a specific telephone (DN).
4 The person can pick up the call at that DN only.
Outgoing calls
1 User selects the intercom button or dials a line pool access code, which selects a line in the line
pool.
2 The user dials the outgoing telephone number.
DID system
This setup allows you to assign a dedicated phone number to each telephone. The CO assigns a list
of available numbers for each DID (Direct Inward Dial) line. You can change your DN range to
match these numbers, and you use target lines to match each number with a DN.
NN40020-603
Chapter 2 System telephony networking overview 35
Incoming calls
1 DID trunks are assigned to be auto-answer.
In a basic configuration, simple access codes (for example Line Pool Codes) are used to access the
PSTN network.
In a more complex configuration, more advanced destination codes are required to access multiple
PSTNs, private network resources, and remote nodes. Access to these resources enables advanced
features, such as tandem routing.
• select an outgoing line to access features that are available on the private network
NN40020-603
Chapter 2 System telephony networking overview 37
• call into BCM and select an outgoing TIE line to access a private network
• call into BCM and select an outgoing central office line to access the public network
• call into BCM and select an outgoing TIE line to access other nodes in a private network
• call into BCM and select an outgoing central office line to access the public network
• DPNSS
• T1: E&M
BCM systems can be networked together using T-1, PRI or VoIP trunks. PRI SL-1 lines and VoIP
trunks also offer the opportunity to use the MCDN protocol, which provides enhanced trunking
features and end-to-end user identification. If a Meridian 1 is part of the MCDN network, the
network can also provide centralized voice mail and auto attendant off the Meridian.
MCDN note: MCDN networking requires all nodes on the network to use a common Universal
Dialing Plan (UDP) or a Coordinated Dialing Plan (CDP).
Keycode requirements
Keycodes are required to activate the protocols that are used to create private networking,
including:
• an MCDN, DPNSS, or Q. Sig keycode, if you want to use a networking protocol between the
systems
You must purchase and install these keycodes before you can create any of the networks described
in this chapter. Consult with your Nortel distributor to ensure you order the correct keycodes for
the type of network you want to create.
Authorized users can access TIE lines, central office lines, and features from outside the system.
Remote users accessing a private network configured over a large geographical area can avoid toll
charges.
NN40020-603
Chapter 2 System telephony networking overview 39
• DTMs configured for PRI are used for incoming and outgoing calls (two-way DID). Incoming
calls are routed directly to a BCM DN that has a properly configured and assigned target line.
All outgoing calls made through PRI, are initiated using the destination codes.
• DTMs configured for T1 can have digital lines configured as Groundstart, E&M, Loop,
or DID.
Target lines are virtual communication paths between trunks and telephones on the BCM system.
They are incoming lines only, and cannot be selected for outgoing calls or networking
applications. With target lines, you can concentrate incoming calls on fewer trunks. This type of
concentration is an advantage of DID lines. BCM target lines allow you to direct each DID number
to one or more telephones. VoIP trunks also require target lines to direct incoming traffic. Target
lines are numbered 125 to 268.
Telephones can be configured to have an appearance of analog lines or multiple appearances of
target lines.
Pool H Pool N
Pool M Pool B
T1 E&M
T1 E&M
Santa Clara
Network # 4221
Received # 4221
Internal # 4221
Each system must be running BCM software. Each system must be equipped with target lines and
a BCM expansion unit with a DTM with at least one T1 E&M line.
NN40020-603
Chapter 2 System telephony networking overview 41
The call appears on the auto answer line on the BCM in Santa Clara as 6-221. Because 6 is
programmed as a destination code for Toronto on the Santa Clara system, another call is placed
using route 002 from Santa Clara to Toronto. At the Toronto system, the digits 6-221 are
interpreted as a target line Private received number. The call now alerts at DN 6221 in Toronto.
Note: Network calls that use routes are subject to any restriction filters in
effect. If the telephone used to make a network call has an appearance of a line
used by the route, the call will move from the intercom button to the Line
button. The telephone used to make a network call must have access to the line
pool used by the route. Network calls are external calls, even though they are
dialed as if they were internal calls. Only the features and capabilities available
to external calls can be used.When programming a button to dial a Network
number automatically (autodial), network calls must be treated as external
numbers, even though they resemble internal telephone numbers. Routes
generally define the path between your BCM switch and another switch in
your network, not other individual telephones on that switch.
BCM BCM
TIE Connection
PRI PRI
Public Network
Central Central
Office Office
To reduce long distance costs, and to allow for a coordinated dialing plan between the offices,
private lines are used to handle inter-office traffic.
If call-by-call services were not used, each BCM system might have to be equipped with the
following trunks:
NN40020-603
Chapter 2 System telephony networking overview 43
• With MCDN, you can tie a set of BCM systems together with PRI SL-1 (MCDN)/ETSI-QSIG,
DPNSS, or VoIP trunks to create a tandem network. This type of network provides the
additional advantage of providing private line access to local PSTNs for all the nodes on the
network.
Note: The PRI and VoIP trunks are en bloc dialing lines, so all dialed digits
are collected before being dialed out.
NN40020-603
Chapter 2 System telephony networking overview 45
• Call Transfer
• Call Forward
NCRI adds the ability to redirect a call across an MCDN network using Call Forward (All Calls,
No Answer, Busy) and Call Transfer features. The call destination also receives the necessary
redirection information. This feature allows the system to automatically redirect calls from within
a BCM system to the mail system, such as Meridian Mail, which resides outside the BCM system
on the Meridian 1.
Figure 6 shows an example of this situation, where user A calls user B on the same BCM. If user B
is busy or not answering, the call automatically gets transferred to a Meridian Mail number
(user C) across an MCDN link between the BCM system and the Meridian 1 system where the
mailboxes are set up.
NN40020-603
Chapter 2 System telephony networking overview 47
SL-1 MCDN
Telephone A
Original call
Telephone B
Call forwarded to Meridian Mail
BCM BCM
Meridian 1
BCM
Meridian 1
Telephone A
• Select Configuration > Dialing Plan > Private Network, and select the check box beside
TRO.
• Configure call forward (All Calls, No Answer, Busy) or Selective Line Redirection to use the
optimal routes.
This feature avoids the following situation: A call originating from a BCM system may be
networked to a Meridian system, which, in turn, is networked to another Meridian system, which is
the destination for the call. If the call routes through the first Meridian (M1) to reach the second
Meridian (M2), two trunks are required for the call. An optimal choice is a straight connection to
M2. This finds these connections and overrides the less-efficient setup.
Figure 8 shows two call paths. The first route, through the Meridian, demonstrates how a call
might route if TRO is not active. The second route, that bypasses the Meridian, demonstrates how
TRO selects the optimum routing for a call.
NN40020-603
Chapter 2 System telephony networking overview 49
Meridian 1
PRI SL-1
Trunk Anti-tromboning
Trunk Anti-Tromboning (TAT) is a call-reroute feature that works to find better routes during a
transfer of an active call. This feature acts to prevent unnecessary tandeming and tromboning of
trunks.
Figure 9 shows how TAT reduces the line requirements. The solid line shows Telephone A calling
Telephone B and being transferred over an additional PRI line to Telephone C. With TAT active,
the same call is transferred to Telephone C over the same PRI line.
BCM BCM
NN40020-603
Chapter 2 System telephony networking overview 51
PRI/BRI
PRI/BRI ETSI QSIG ETSI QSIG
PBX
BCM West end branch BCM East end branch
DN 4221
Central
Office
Table 6 lists the settings for some of the hardware parameters for ETSI QSIG networking example
shown in Figure 10.
• redirect calls over the ETSI ISDN BRI/PRI line to the outside network
DPNSS 1 services
The Digital Private Network Signaling System (DPNSS 1) is a networking protocol enhancement
that extends the private networking capabilities of existing BCM systems. It is designed to offer
greater centralized functionality for operators, giving them access to BCM features over multiple
combined networks.
You can use DPNSS 1 features on any BCM telephone. On most BCM telephones, you must use
specific keys and/or enter a number code to access the features.
NN40020-603
Chapter 2 System telephony networking overview 53
DPNSS 1 capabilities
A single BCM node, acting as a terminating node on the network, supports the following
capabilities over DPNSS 1 lines:
• Terminal Line Identification (TLI) for incoming and outgoing calls. Referred to as Called Line
Identification.
• Selective Line Redirect (SLR) and External Call Forward (ECF) implemented on calls
between DPNSS 1, and BRI/PRI, DASS2, and analog lines.
• These remote access features are supported on DPNSS: DDI, line pool access code,
destination codes and remote page feature codes.
Keycodes are required to enable DPNSS 1.
• Destination or line pool codes are programmed for the DPNSS to Embark link.
Also, during programming for Call Forward No Answer and Call Forward on Busy, when you
enter the Forward to: digits, the system does a validation check with the switch on the number.
(Configuration > Telephony > Sets > Active Sets > Line Access)
DPNSS 1 features
The following features are available and can be programmed over DPNSS lines:
• Line type
• Prime set
• CLID set
• Auto privacy
• Answer mode
• Auxiliary ringer
• Full autohold
Some features are transparent to the user, but must be programmed to be activated. Others are
available for end-user programming at the telephone. Details about these features are given below.
Three Party Service is a DPNSS 1 feature for BCM that is similar to the BCM Conference feature.
The Three Party Service allows a user, usually an operator, to establish a three-party conference by
calling two other parties from one telephone. Once the connection is made, the controlling party
can hang up, leaving the other two connected. The controlling party can even put one party on
hold, and talk to the other party.
Note: BCM does not support Hold over the DPNSS link itself. This means
that the conferenced party on the distant end of the network cannot place a
Three Party Service call on Hold.
This feature is designed to allow operators to assist in the connection of calls from one main
location.
NN40020-603
Chapter 2 System telephony networking overview 55
To initiate or disconnect from a conference call on a BCM system over DPNSS 1, use the
procedure described in the Device Configuration Guide (NN40020-300).
Diversion is a DPNSS 1 feature for BCM that allows users to forward their calls to a third party on
the DPNSS 1 network. This feature is similar to Call Forward on BCM but takes advantage of the
broader capabilities of DPNSS.
There are five variations of Diversion: Call Diversion Immediate, Call Diversion On Busy, Call
Diversion On No Reply, Bypass Call Diversion, and Follow-me Diversion. These variations are
described below:
• Diversion Immediate diverts all calls to an alternate telephone. This function is programmed
by the user at their telephone.
• Diversion On Busy diverts all calls to an alternate telephone when a telephone is busy. This
feature is programmed in the Element Manager.
• Diversion On No Reply diverts calls that go unanswered after a specified amount of time. This
feature is programmed in the Element Manager.
• Bypass Call Diversion overrides all call forward features active on a telephone over a DPNSS
line. An incoming call to the telephone will not be forwarded; instead, the telephone will
continue to ring as if call forward were not active. This feature is used to force a call to be
answered at that location. Bypass Call Diversion is a receive-only feature on BCM and cannot
be used from a BCM telephone.
Note: BCM CFAC must be active, and the destination set/PBX system must
support the feature.
For example, user A forwards all calls to telephone B, a temporary office. Later, user A moves
on to location C. The user does not have to be at telephone A to forward calls to location C.
Using telephone B and Follow-me Diversion, the user can forward calls from A to location C.
• Diversion on Busy and Diversion on No Reply cannot be cancelled from the forwarded
telephone. These are programmable only by an installer and not by the user.
• If multiple telephones are programmed to take a call, the first telephone to respond will act. All
other telephones responding are ignored. Therefore, if the first telephone to respond has
Diversion enabled, this feature will be invoked.
• ISDN—all variations supported on ISDN telephones, except Diversion on Busy and CFWD
Busy
Setting Diversion
You set Diversion for DPNSS in the same way as Call Forward. You will need to enter the end DN
when prompted. You may also need to include the DPNSS 1 routing number.
Redirection is a DPNSS 1 feature similar to BCM Transfer Callback. With Redirection, a call
awaiting connection, or reconnection, is redirected by the originating party to an alternate
destination after a time-out period. Failed calls can also be redirected. Priority calls are not
redirected.
Note: The address to redirect depends on the history of the call. Calls that
have been transferred are redirected to the party that transferred them. In all
other cases, the address to redirect is the one registered at the PBX system
originating the redirection.
Note: BCM does not support the redirection of BCM-originated calls, even
over DPNSS 1.
NN40020-603
Chapter 2 System telephony networking overview 57
Setting redirection
The timer used for the network Callback feature is also used for redirection.
Executive intrusion
Executive Intrusion (EI) is a DPNSS 1 feature that allows an operator, or other calling party, to
intrude on a line when it is busy. An example of the use of this feature is to make an important
announcement when the recipient is on another call.
EI is similar in functionality to BCM Priority Call, but it is a receive-only feature on BCM
telephones. EI cannot be initiated from a BCM telephone. The person using this feature must be on
another PBX system on the DPNSS 1 network.
When EI is used to intrude on a call in progress, a three-way connection is established between the
originating party and the two parties on the call. The result is very much like a conference call.
When one of the three parties clears the line, the other two remain connected, and EI is terminated.
• ISDN—not supported
The telephone receiving the intrusion displays Intrusion Call. A warning indication tone
will sound after intrusion has taken place, and the standard conference call tone will sound every
20 seconds.
Intrusion levels
Whether a telephone accepts or rejects an Executive Intrusion request depends on the level of
intrusion protection programmed. Each telephone (DN) has an Intrusion Capability Level (ICL)
and four Intrusion Protection Levels (IPL).
When the ICL of the intruding telephone is higher than the IPLs of both telephones on the active
call, EI occurs. Nortel recommends that you set the IPLs of most BCM telephones to the default of
None, or Low or Medium.
Intrusion levels are described as follows:
• ICL: determines the ability of the attendant to intrude. As long as the ICL is higher than the
IPL of the wanted party, EI is allowed. Because EI is a receive-only feature, the ICL cannot be
set on BCM.
• IPL: determines the ability of the attendant to refuse intrusion. If the IPL is lower than the ICL
of the originating party, EI is allowed. For general purposes setting the IPL to None, Low or
Medium is recommended, unless intrusion is not wanted.
Call Offer
Call Offer over DPNSS 1 allows a calling party to indicate to the wanted party that there is an
incoming call available, even though there is no answer button available to present the call on the
telephone. The intended recipient can ignore, accept, or decline the offered call. Call Offer is
useful in increasing the call-coverage capability of a BCM system, and helps to lift the network
processing load. It is a receive-only capability on BCM; incoming calls are initiated at another
PBX system on the DPNSS 1 network.
An example of Call Offer in use is an operator or attendant who has a number of calls coming in at
once. The operator can call offer one call and move to the next without waiting for the first call to
be answered.
• ISDN—not supported
Note the following general conditions and restrictions:
• Clear the DND on busy check box (DN ##/Capabilities) for a telephone to accept Call Offer.
• The target line for the telephone must be set to: If busy: busy tone, which is the default.
• Call Offer does not work if sent over Manual answer lines. It is recommended that the lines be
left at the default: Auto.
User actions
The party receiving a Call Offer has three choices:
• Ignore it. After a programmed time interval, the Offer request is removed.
NN40020-603
Chapter 2 System telephony networking overview 59
• Reject it. If the user activates Do Not Disturb on Busy (DND) when the Call Offer request is
made, the request is removed from the telephone. The calling party is informed of the
rejection.
Note: A call cannot be offered to a telephone with DND active. The line
indicator for external incoming calls still flashes.
Note: Forward on Busy takes priority over DND on Busy. Call Offer cannot
be accepted by putting an active call on hold.
Route Optimization
Route Optimization is a DPNSS 1 feature for BCM that allows calls to follow the optimum route
between two end PBXs. This allows efficient use of network resources.
Route Optimization is initiated by the system and is transparent to the user. However, the user may
see a call switch from an appearance on the telephone to another appearance key or from an
intercom button to the appearance key or vice versa. This occurs when BCM receives a Route
Optimization request and initiates a new call to follow the optimal route.
If a telephone is active on a private line call, the Route Optimization call being established may go
on a public line. This will cause a loss of privacy on that line.
Data calls are rejected by Route Optimization in order to ensure the data transmission is not
affected.
Certain situations result in Route Optimization not taking place. For example, calls that are using
Hold, Parking or Camp features do not undergo Route Optimization, and if a Route Optimization
call undergoes Diversion, the Route Optimization is dropped.
Loop avoidance
Errors in the configuration of a network may make it possible for a call to be misrouted, and arrive
at a PBX system through which it has already passed. This would continue, causing a loop which
would eventually use up all of the available channels. The Loop Avoidance service permits
counting of DPNSS 1 transit PBXs and rejecting a call when the count exceeds a predetermined
limit.
• a Private Access Code, programmed into the system as part of the destination code table to
prevent conflicts with the internal numbering system. (Access Codes)
• a Home Location Code (HLC) assigned to each PBX system, and configured as part of the
destination code (a maximum of seven digits). For each HLC, a destination code must be
programmed in the system. (Configuration > Telephony > Dialing Plan > Private
Networking)
• a Directory Number (DN) assigned to each extension as a line appearance. The DN appears as
the last string segment in a dialed number. In the number 244-1111, 1111 is the DN.
A typical Private Number, using a private access code and dialed from another site on the network,
appears below.
Private Access + Home Location + Directory = Calling Party
Code Code Number Number
6 + 848 + 2222 = 6-848-2222
In this networking example, a private network is formed when several systems are connected
through a Meridian 1 and a terminating BCM system. Each site has its own HLC and a range of
DNs. Figure 11 illustrates this example.
Table 7 shows examples of the construction of numbers used when dialing within the example
network. Note that 6 is the Private Access code.
Table 7 Calling numbers required for DPNSS network example
Calling Site LOC/HLC Calling Party Called Site Dialing String Called Party
Number Number
Site A 244 244 1111 Site B 6 668 2222 668 2222
Site B 668 668 2222 Site D 6 848 2222 848 2222
Site D 848 2222 Site D 2229 2229
Site C 496 496 3333 Public DN 9 563 3245 563 3245
NN40020-603
Chapter 2 System telephony networking overview 61
Private
Network
DPNSS DPNSS
Terminating BCM Site C
BCM Site A DN # 3333
DN # 111 LOC # 496
LOC # 244
DPNSS DPNSS
Meridian M1
LOC # 563
BCM Site D
BCM Site B DN # 2229
DN # 2222 Extension 2222
LOC # 668 LOC # 848
Naming convention
Choose the protocol type for consistency with PRI trunk configuration. The PRI protocol type can
be either User (Slave) or Network (Master). The BRI protocol type can be extended with T-T
(Network). You can connect two BCMs through a BRI link.
S-T refers to a far end which has an S interface (Line in M1 terminology).
T-T refers to a far end which has a T interface (Trunk in M1 terminology).
In both cases, User is the user or slave end of the connection.
• The S-T user type has the existing functionality which does not support
PROGRESS_MESSAGE.
• After the destination telephone starts to ring in the S-T user, BCM does not send a message to
the network.
• After the tandem occurs in the T-T user, BCM sends a message to the network.
• In the S-T user type, the BRI call is answered prior to the tandem, while in the T-T user type,
the message is sent when the call is tandemed and answered only when the destination
telephone answers the call.
• When the S-T user type is chosen, this can impact the billing in tandem cases. The billing
metrics start once the call is tandemed and not when the destination telephone is answered. But
in the case of the T-T user type, the billing is triggered when the far end answers the call and
not when the call is tandemed.
NN40020-603
63
Chapter 3
Telephony programming: Configuring call traffic
Telephony call traffic has a number of configuration requirements. Some configuration is common
to both incoming and outgoing traffic. Other settings are specific to the call direction.
In the case of private networking, call configuration becomes more complex, as remote systems
send calls over the private network to other nodes or to your system PSTN network and your local
PSTN handles calls directed to remote nodes through your system.
Line programming and number planning both play critical roles in controlling call traffic for your
system.
See also:
Although many of the tasks involved in programming both areas can be performed in any order,
work flow falls generally in the following order:
NN40020-603
Chapter 3 Telephony programming: Configuring call traffic 65
Incoming calls
For incoming calls, you can have a central reception point, or you can specify target lines to one or
more telephones to receive directed calling.
You can arrange your telephones in Hunt groups, ringing groups, or call groups that use
system-wide call appearance (SWCA) assignments to share calls.
You can also configure lines for use by system users who call in from outside the system. You can
give them direct access to the system with an Auto DN, or you can configure the line so they hear
a stuttered dial tone, at which point they need to enter a password (CoS) to gain access
(DISA DN).
NN40020-603
Chapter 3 Telephony programming: Configuring call traffic 67
Figure 1
15 Incoming call configuration - part B
NN40020-603
Chapter 3 Telephony programming: Configuring call traffic 69
Outgoing calls
For outgoing calls, you can assign one or more intercom keys to directly link to a line pool or
prime line, or allow line pool access codes, destination codes, or internal system numbers to direct
the call. Telephones without intercom keys on the telephone have intercom keys assigned, but the
user must pick up the handset to access calls. In this case, the intercom key is an assigned DN.
For calls within the system, all telephones are virtually linked within the system. To call another
telephone inside the system, lift the handset and dial the local DN. In this case, the prime line has
to be set to intercom or none.
For calls going outside the system:
• If you assign the prime line to a line pool, all the lines in that line pool must be assigned to the
telephone. When you pick up the handset, the telephone automatically grabs the first available
line from the assigned line pool. In this configuration, you must ensure that the outgoing
number is allowed by the line pool.
• If you assign the prime line to an intercom button, when you press the intercom button you get
system dial tone. Then, you enter a line pool access code or a destination code to direct the
outgoing call to the appropriate line pool, where it exits the system on any available line in that
pool.
NN40020-603
Chapter 3 Telephony programming: Configuring call traffic 71
NN40020-603
73
Chapter 4
Application Resources overview
Application Resources is a management tool for allocating system resources such as signalling
channels, VDI channels, media channels, and DSP resources. While the BCM manages resources
for different services by making resources available as they are needed, you can manage the
resources by setting minimums and maximums for each service.
For information on configuring application resources, see “Application Resources panel” on
page 77.
Types of resources
There are four types of resources managed by the Application Resources panel:
• Signalling channels
• VDI channels
• Media channels
• DSP resources
Different applications require different resources. For example, each media gateway requires one
DSP Resource and one media channel, but does not require any signalling channels or VDI
channels. Use the Application Resources Reservations table to see what resources are required by
each application. Whenever an entry contains N/A, the application does not use that resource.
Changes pending
In some cases, a change you make to the application resources panel may not be able to take effect
immediately. For example, if you change the number of conference calls allowed from three to
two, while there are three calls in progress, the resource allocations will not change until after one
of the calls has been disconnected. In a situation where the changes cannot be made immediately, a
checkmark appear in the Changes Pending box, and you can view details of these changes by
clicking on the application and viewing the details below.
IP set resources
Because there is no circumstance where the number of IP sets on the system would exceed the
available resources, there is generally no need to modify the resources for this application.
However, if you want to limit the number of IP set connections, you can change the maximum
value.
IP trunk resources
Because there is no circumstance where the number of IP trunks on the system would exceed the
available resources, there is generally no need to modify the resources for this application.
However, if you want to limit the number of IP trunk connections, you can change the maximum
value.
Media gateways require DSP resources. Because there is often a slight delay in allocating the DSP
resources, you may want to set the minimum to 2 or more. This will ensure that there is generally
no delay in setting up the media gateway.
NN40020-603
Chapter 4 Application Resources overview 75
These resources require DSP resources. Because there is often a slight delay in allocating DSP
resources, you may want to set the minimum to 2 or more. This setting generally ensures that there
is no delay occurs in setting up the application.
Fax
Fax has a maximum of 2. Each fax uses three DSP resources, so if you find that your system is
always running low on resources, you may want to limit fax to 1.
Conf. Parties
The total number of parties across all simultaneous conferences cannot exceed 18, and a single
conference can contain up to 18 parties.
Conf. Mixers
A conference mixer allows several conference parties to be mixed into a conference. BCM
supports up to 9 simultaneous conferences.
SIP Trunks
Because there is no circumstance where the number of SIP trunks on the system would exceed the
available resources, there is generally no need to modify the resources for this application.
However, if you want to limit the number of SIP trunk connections, you can change the maximum
value. BCM supports a maximum of 12 SIP trunks.
Digital Trunks
Because there is no circumstance where the number of digital trunks on the system would exceed
the available resources, there is generally no need to modify the resources for this application.
However, if you want to limit the number of digital trunk connections, you can change the
maximum value. BCM supports a maximum of 2 digital trunks.
NN40020-603
77
Chapter 5
Application Resources panel
The application resources panel allows you to modify resources allocated to applications on the
BCM. While the panel tracks four types of resources, DSP resources are generally the only type of
resources that affect performance on the BCM. For more information on planning your application
resources, see “Application Resources overview” on page 73.
Note: Do not change these settings unless you want to restrict resources.
• Total Resources
• Reserved Resources
Total Resources
The total resources options show the maximum resources available for each type of resource.
Reserved Resources
The Reserved Resources options show the resources currently reserved or in use.
NN40020-603
Chapter 5 Application Resources panel 79
NN40020-603
81
Chapter 6
Module configuration: Trunk modules
This following describes the Element Manager headings that define and control the settings for the
trunk media bay modules installed on your system.
The following paths indicate where to access the trunk modules in Element Manager and through
Telset Administration:
Task: To confirm settings for the trunk media bay modules installed in the system.
• Confirm that all prerequisites are complete. Refer to “Configuring the trunk module
parameters” on page 83.
Prerequisites
Complete the following prerequisites checklist before configuring the modules.
NN40020-603
Chapter 6 Module configuration: Trunk modules 83
• That bus determines what line numbers are supported by the module.
If your module supports other types of trunks, configure each line record. Refer to
“Configuring lines” on page 129.
• Module mode: The mode for the type of line being supported (DS/CLID, Global, Legacy).
• Disconnect Timer: Enter the time delay for disconnect supervision for lines supplying
supervised external lines. This setting must match the CO setting.
• Clock Source: Determine how the module functions for timing on the network (Primary
External, Secondary External, Internal).
• CO fail: Use the carrier failure standard used by the service provider (TIA-5474, TR62411).
• Interface levels: Choose the loss plan setting supported on the lines (ISDN, PSTN).
• Framing: Choose the framing format supported by the service provider (ESF, SF).
Warning: Disable the module before changing the internal CSU setting.
• CSU line build (Internal CSU set to ON): Set the gain level of the transmitted signal (0, 7.5,
15 dB)
• DSX1 build (Internal CSU set to OFF): Set the distance between the system hardware and the
external channel service unit (000-100, 100-200, 200-300, 300-400, 400-500, 500-600, or
600-700 feet)
• Line coding: Select the encoding signal used by the service provider (B8ZS, AMI)
• CRC4 (E1 lines only): Set the parameter to match the setting at the other end of the line.
Warning: Always confirm the line protocol with the head office. Failure to set the
correct protocol could result in erratic service or service failure on the lines.
PRI-T1 supports: NI-2, DMS-100, DMS-250, 4ESS, SL-1
PRI-E1 supports: ETSI QSIG, Euro, SL-1
• Protocol type (for SL-1): Select the setting that applies to the way in which the system is
viewed by the network. Default is User (Slave) (the CO or another network node controls the
network).
If you want this system to control the network protocol, select Network.
NN40020-603
Chapter 6 Module configuration: Trunk modules 85
• NSF Extension: None (DMS-100/250 switches); WATS (Siemens, ESWD, Lucent 5ESS
switches); ALL (GTD5 and DMS-10 switches).
• B-channel selection sequence: choose how B-channel resources are selected for call
processing.
• Clock Source: Determine how the module functions for timing on the network (Primary
External, Secondary External, Internal)
• Send Name Display: select check box to activate outgoing name display (OLI).
• Remote Capability MWI (SL-1): Select the check box only if connecting to a Meridian 1, or
other compatible endpoint, with the appropriate MWI package and RCAP set to MWI.
• Maximum transits (SL-1): Default: 31. Set the number of times a call will be transferred
within the private network before being dropped.
• CO fail: Use the carrier failure standard used by the service provider (TIA-5474A, TR62411)
• Interface levels: Choose the loss plan setting supported on the lines (ISDN, PSTN)
• Framing: Choose the framing format supported by the service provider (ESF, SF)
• DSX1 build (Internal CSU set to OFF): Set the distance between the system hardware and the
external channel service unit (000-100, 100-200, 200-300, 300-400, 400-500, 500-600, or
600-700 feet)
• Clock Source: Determine how the module functions for timing on the network (Primary
External, Secondary External, Internal). When the BRI module is configured as a T-loop this
parameter is configured under Configuration > Telephony > Loops.
• Send Name Display (BRI-QSIG): select check box to activate outgoing name display (OLI).
When the BRI module is configured as a T-loop this parameter is configured under
Configuration > Telephony > Loops.
• Clock Source: Determine how the module functions for timing on the network (Primary
External, Secondary External, Internal)
• Host node: Choose the type of switch the lines connect to, to ensure correct call forwarding
(M1, Embark, IDPX, DSM).
NN40020-603
87
Chapter 7
Managing modules
When you need to find out information about a module, you can determine the status of any of the
settings under the media bay module headings. To correct a problem or change a module setting,
you may need to enable or disable a bus/module or select ports on the module. Refer to the
following procedures:
NN40020-603
89
Chapter 8
Lines overview
Telephony signals into the system, within the system, and out of the system are carried over
channels. For consistency, these channels are all called lines or trunks. This designation includes:
• circuit switched lines (PSTN): connect to the system through media bay modules
• target lines, internal channels: connect PRI, T1 and VoIP trunks to specific devices
• intercom lines: connect all internal telephones together through the DN numbers, and allow
the user to access line pools for making outgoing calls, as well as being required for other call
features such as conference calling and system-wide call appearance (SWCA) calls. Intercom
designations are assigned in the DN record, or automatically by the system for each telephone.
Prerequisites
You must configure the media bay modules and/or the VoIP trunk parameters before you can set
up line programming.
• The position on the system bus of the trunk media bay modules determines the line numbers
that are available. See the Installation and Maintenance Guide (NN40020-302).
• The position on the system bus of the station media bay modules determines which DNs are
available, although DN numbers can be changed.
• Available VoIP lines are determined by the number of VoIP keycodes entered on the system
(between 01 and 12), starting with line 001 and ending at line 012.
See the following information:
• BRI loops require configuration and provisioning before the BRI lines can be configured.
• The BCM50 does not support the DDIM (Digital Drop Insert MBM).
• Inactive Lines
• All Lines
NN40020-603
Chapter 8 Lines overview 91
Target lines
Target lines are internal communications paths that directly connect auto-answer trunks to system
telephones. These lines are incoming only.
Target lines allow you to make more efficient use of DID line resources.You can map a range of
target lines for each DID line. The incoming call is routed according to the mapped dialed digits,
rather than a one-to-one line assignment. Systems configured using the DID template
automatically assign target lines to all assigned DNs.
You also require target lines when you use PRI, T1 or VoIP trunks.
Target lines use line numbers 125 to 268. To view these lines, select Configuration > Telephony
> Lines > Target Lines. Record this information in your system Programming Records so you
have a clear view of where each line is assigned.
Other features:
Programming note: The following trunks use one or both of these settings to route calls:
• DPNSS lines use the Private received number to route calls in the system.
• BRI ETSI-QSIG, PRI ETSI-QSIG, MCDN, DMS-100, DMS-250, and VoIP trunks route calls
on a per-call basis to either the public or private received digits.
• BRI (ETSI-Euro, NI), PRI (ETSI-Euro, NI, 4ESS), T1 (LoopStart, E&M, DID, GroundStart),
Analog LEC (LoopStart), and DASS2 trunks route calls using the Public received number.
Physical lines
Physical lines are the central office (CO) trunks assigned to the trunk media bay modules. See the
Installation and Maintenance Guide (NN40020-302) for information about which lines are
enabled.
You can change the line types to suit your system. For instance, BRI and DTM modules can be
designated to a number of line types, depending on the type of line service provided through the
central office (CO). However, the line numbers are associated for specific tasks or to specific
DS30 bus numbers.
The line record allows you to program settings for lines that affect how the lines operate in the
network and with other switches, as well as how the system uses the line.
Trunk types:
• VoIP
• DTM (digital): TI types (Loop, E&M, DID, Ground, or fixed data channel), PRI, DASS2,
DPNSS.
• Target lines
Programming links
Determine line assignments for routing: “Line Job Aids” on page 94.
NN40020-603
Chapter 8 Lines overview 93
Line record
The line record allows you to:
• Assign a voice message center, if the line connects to a remote voice-mail system, either on
another node on the private network or at the central office.
Line characteristics
Line type determines what features are available. Some features must be coordinated with the
settings at the other end of the line.
Programming links
Alternate-click the Line Assignment panel tab to see a list of the line feature settings, and to see
which lines have each setting.
Line restrictions
Restrictions prevent certain kinds of calls from occurring over specific lines. You can also restrict
some features.
If you want different restrictions to apply at different times of the day or week, you can set up the
line restriction schedules to that effect. The Normal schedule runs when no other schedule is
specified or if fallback is used for VoIP trunks.
The default restriction filters are listed in Table 9.
Note: When a remote user places an external call on a line, any filters
used with the line still apply.
Programming links
The template has a set of default restrictions in Restriction 02 only. You must create your own
restriction files if you want to use other settings.
Remote restrictions
Your system can accommodate users who call in from outside the system to access system
features. Calls coming in over the Private network that are routing out of the system to remote
systems or to the PSTN are also considered to be remote call-ins.
To restrict the access remote callers have, or to control outbound private network calls, specify the
appropriate filter for the line.
If you want different restrictions to apply at different times of the day or week, you can set up the
line restriction schedules to that effect. The Normal schedule runs when no other schedule is
specified or if fallback is used for VoIP trunks.
The default restrictions are shown in Table 10
Table 10 Default remote restrictions
Note: The remote restriction restricts the numbers a user can dial on an
incoming auto-answer line. If a remote user then selects a line to place an
external call, any filter used with the line still applies.
NN40020-603
Chapter 8 Lines overview 95
• Line pools must never contain a mixture of lines. All lines in a given line pool should go to the
same location.
NN40020-603
Chapter 8 Lines overview 97
• Avoid putting unsupervised loop start lines in a line pool. These lines can become unusable,
especially when a remote user uses the line pool to make an external call.
• To assign line pool access to telephones, select Configuration > Telephony > Dialing Plan >
Line Pools.
• To assign system-wide line pool access codes, select Configuration > Telephony > Dialing
Plan > General (not applicable to Bloc pools).
• A telephone can be administered to search automatically for an idle line from several lines that
appear on the telephone. Assign a line pool as the prime line. When the user lifts the receiver
or presses Handsfree, any one of the lines, if idle, can be selected by Automatic Outgoing Line
selection.
• Changes in the settings for trunk type on a system that is in use can result in dropped calls.
• When assigning lines to line pools, consider your network configuration. You can create a
unified dialing plan by assigning lines to the same location to the same line pool on each of
your systems. For example, if system A and system B each have TIE lines to system C, assign
the TIE lines to pool D on each of the systems. You cannot assign target lines to a line pool, as
they are incoming-only.
Note: The Auto privacy setting does not apply to target lines, PRI lines
or VoIP trunking lines.
• Even when you use line pools, it is possible that a line pool will be unavailable for outgoing
traffic. To alleviate this, you can determine overflow paths for any routes that you designate.
• Incoming lines can be assigned to telephones as individual lines or through target lines,
depending on the type of trunk supplied from the central office (CO). Incoming lines do not
need to have an appearance on the telephone. Target lines are for incoming calls only.
Two-way single lines, such as analog lines, allow the user to make an outgoing call by pressing
the (idle) assigned line button or, if the line is part of a line pool, by entering a line pool access
code or destination code to access the line pool. These lines can also be redirected on a
per-trunk basis through Element Manager or from the telephone by using FEATURE 84.
• PRI lines are always configured into line pools. These lines require a destination code for
outgoing calls. Incoming calls use target line assignments.
NN40020-603
Chapter 8 Lines overview 99
• Voice over IP (VoIP) trunks use the data network to provide line service in and out of the
system. VoIP trunk configuration is described in the. VoIP trunks use target lines for incoming
calls, and require line pool codes or destination codes for outgoing calls.
Incoming calls
For incoming calls, you can have a central answering position, or you can specify lines to one or
more telephones to receive directed calling.
You can arrange your telephones in Hunt groups, ringing groups, or call groups that use
system-wide call appearance (SWCA) assignments to share calls.
You can also configure lines for use by system users who call in from outside the system. You can
give them direct access to the system with an Auto DN, or you can configure the line so they hear
a stuttered dial tone, at which point they need to enter a password (CoS) to gain access
(DISA DN).
Outgoing calls
For outgoing calls, you can assign one or more intercom keys to access a line pool or prime line,
destination code, or internal system numbers to direct the call. Telephones without intercom keys
do require intercom paths assigned, but to access calls, users must pick up the handset to connect.
For calls within the system, all telephones are virtually linked within the system. To call another
telephone inside the system, you can lift the handset and dial the local DN. In this case, the prime
line must be set to intercom.
For calls going outside the system:
• If you assign the prime line to a line pool — When you pick up the handset, the telephone
automatically grabs the first available line from the assigned line pool. In this configuration,
you must ensure that the outgoing number is allowed by the line pool.
• If you assign the prime line to an intercom button — You can enter a line pool access code or a
destination code followed by the telephone number to direct the outgoing call where it exits
the system on any available line in that pool.
NN40020-603
101
Chapter 9
Configuring telephony resources
The Telephony Resources panel allows you to view and configure the information for the modules
that support the digital/analog/ISDN lines for the system and the gateways that support the Voice
over IP (VoIP) trunks. This provides a cohesive view of your telephony communications channels
for the system.
The following paths indicate where to configure telephony resources in Element Manager and
through Telset Administration:
• Element Manager: Configuration > Resources > Telephony Resources
• Telset interface: **CONFIG > Hardware (you cannot configure VoIP trunks or IP
telephones)
The following table provides links to descriptions of each subpanel.
Panel Tasks
The top frame of this panel displays a table showing each type of module and the VoIP trunks that
are assigned to the system, either through connections to a media bay module or by applying the
required keycodes (VoIP trunks).
Selecting a table listing provides access to the special settings for each type of resource in tabbed
panels that appear in the lower window.
NN40020-603
Chapter 9 Configuring telephony resources 103
Location <read-only>
Module type <read-only> This field indicates the type of module assigned to each
DID4 location.
DID8 DID4
ASM/ASM+ DID8
GATM4 ASM/GASM: Analog and Global Analog Station Modules
provide four connections for four analog telephones.
DSM16
GATM8: Global Analog Trunk Module with four trunk line
DSM32/ connections.
DSM32+
DSM16 or DSM32/DSM32+: Digital Station Module with 16
4X16 Combo and 32 telephone connections, respectively.
8X16 Combo 4X16 Combo: A module with 4 analog trunks and 16 digital
DTM-T1 stations.
DTM-PRI 8X16 Combo: A module with 8 analog trunks and 16 digital
CTM4/GATM4 stations.
CTM8/GATM8 BRI-ST
BRIM DTM-T1
Empty DTM-PRI
Empty: No module is currently connected.
Bus <read-only> This number indicates the virtual bus to which the module is
1-XX assigned. For trunk modules, this position determines the
default line numbers available to the trunks attached to the
module.
For station modules, this position determines the DN range
that will automatically be assigned to telephones plugged
into the module.
State Enabled Indicates the state of the module or bus:
Disabled Enabled: module is installed and working
Unequipped Disabled: module is installed but has been disabled or is
down for another reason
Unequipped: there is no module installed on this bus
Devices Set Lists the type of device configured on the bus.
Lines
Low <digits> This field indicates the lowest setting for one of the following:
The range of lines the module/VoIP supports
The range of loops the module supports (BRI)
The range of DNs the module/IP telephony supports.
High <digits> This field indicates the highest setting for one of the
following:
The range of lines the module/VoIP supports
The range of loops the module supports (BRI)
The range of DNs the module/IP telephony supports.
Total <XX> Lines, This field indicates the total number of lines, loops or DNs
loops or Sets that the module supports.
Busy 1-X This field indicates the current activity for the devices or lines
attached to the module.
Table 14 describes the possible fields, trunk module parameters, and an indication of which types
of modules use each setting.
Table 14 Module parameters values (Sheet 1 of 4)
Indicates the type of trunks. This field is read-only for all modules except DTM modules.
Trunk mode DS/CLID, Global,
Legacy Loop
NN40020-603
Chapter 9 Configuring telephony resources 105
• DS/CLID: displays for old North American LS/DS or CLID analog trunk modules, the old analog
MBM, or the GATM with North American DIP switch settings.
• Global: displays for the GATM MBM with no regional DIP switches set.
• Legacy: displays for all other (old) analog trunk modules
Protocol NI-2, DMS-100,
DMS-250,
AT&T4ESS, SL-1,
Euro, ETSI Q.Sig PRI
The Network Specific Facilities (NSF) information element is used to request a particular service from
the network. Settings are based on the type of switch to which the line connects.
Suggested settings:
DMS-100/250: NONE
Siemens ESWD, Lucent 5ESS: WATS
GTD5, DMS-10: ALL
When you select NONE, the NSF extension bit is not set for any service.
When you select WATS, the NSF extension bit is set for unbanded OUTWATS calls.
When you select ALL, the NSF extension is always set for all CbC services.
Appears only for NI protocol.
Protocol type User, Network PRI
When you select SL-1 protocol, an additional setting, Protocol type, appears.
SL-1 protocol is a private networking protocol. Use this protocol to designate a BCM node as a
Network (controller). The default setting is User (client). In public network configurations, the CO is
generally considered the Network side or controller.
Applies to SL-1 protocol only.
B-channel Ascending Sequential
selection Descending
sequence Sequential PRI
Set the minimum duration of an answer signal before a call is considered to be answered.
Designates whether the DTM/BRI acts as a primary or secondary timing component for an external
timing source or as the internal timing source.
Note: A BRI module can be programmed with primary/secondary clock source, however, it is
recommended that a BRI module always be set to Internal if a DTM exists on the system to be the
Primary External clock source.
Warning: Changing the clock source may disconnect calls.
If you change the clock source for your system, you may cause your system DTM interface(s) to reset,
resulting in dropped calls. Choose a suitable time to change the clock source and use the Page
feature to inform users of possible service disruptions.
Send Name Select or clear PRI *BRI
Display QSIG
When you select this check box, the system sends a specified outgoing name display (OLI) from the
calling telephone.
Appears only for Protocols: SL-1, NI, DMS-100, DMS-250, or PRI QSIG.
Remote Select or clear PRI
Capability MWI
Use this setting to indicate MWI compatibility on the specific loop(s) that you are using to connect to
the central voice mail system on a Meridian 1, that has the MWI package installed, with the RCAP
setting set to MWI.
Appears only for SL-1 protocol.
Host node M1, Embark, IDPX, DNPSS
DSM
DPNSS cards connected to Embark switches have a different way of handling call diversion, therefore,
when you provision a DTM for DPNSS, you must indicate what type of switch the lines are connected
to.
When you select the Embark switch, calls are diverted using the Call Forwarding feature instead of
call diversion.
Local Number DPNSS
Length
This number allows the system to determine how many digits to read on an incoming call to determine
that the call is meant for this system.
Maximum Default: 31 PRI
Transits
Indicate the maximum number of times that a call will be transferred within the SL-1 network before
the call is dropped. Protocol must be set to SL-1 to display this field.
NN40020-603
Chapter 9 Configuring telephony resources 107
T1 parameters
CO fail T1 PRI
Define a loss plan setting. For more information, see “Interface levels” on page 107.
Framing ESF, SF T1 PRI
Select the framing format used by your T1 or PRI service provider: Extended Superframe (ESF) or
Superframe (SF). Contact your T1 or PRI service provider for the proper setting. (SF or Superframe is
sometimes known as D4.)
Line coding B8ZS, AMI T1 PRI
Define the encoding signals on a T1 line. Select the standard used by your T1 service provider.
Contact your T1 service provider for the proper setting.
Internal CSU <check box> T1 PRI
Turn the internal T1 channel service unit (CSU) on or off. For more information, see “Internal CSU” on
page 108.
CSU line build 0, 7.5, or 15 dB T1 PRI
Set the gain level of the transmitted signal. This setting appears only when the Internal CSU is
Enabled.
DSX1 build 000-100, 100-200,
200-300, 300-400,
400-500, 500-600, or
600-700 feet T1 PRI
Set the distance between BCM and an external channel service unit. This setting appears only when
the Internal CSU is Disabled. Contact your service provider for the proper settings.
CRC4 <check box> E1
PRI
Ensure this is enabled or disabled to match the service provider Cyclic Redundancy Check (CRC4)
setting for the trunk.
Interface levels
The default Interface levels are the ISDN loss plan settings. Also refer to “ISDN overview” on
page 535.
Check with your telecommunications service provider to determine if your BCM system is
connected to a central office (CO) with digital network loss treatment (ISDN I/F levels) or analog
network loss treatment (PSTN I/F levels).
The ISDN setting requires digital access lines (DAL) that have digital network loss treatment. On
a DAL network, the PBX system administers the dB loss, not the CO. DALs may have ISDN
signaling or digital signaling (for example, T1). The loss plan follows the Draft TIA-464-C loss
plan, which uses a send loudness rating (SLR) of 8 dB. You must contact your service provider to
get DAL network loss treatment on a line with digital signaling.
The PSTN setting requires analog access lines (AAL) that have analog network loss treatment and
digital signaling. On an AAL(D) network, the CO administers the dB loss.
The loss plan follows the Draft TIA-464-C loss plan. The ISDN loss plan uses a send loudness
rating (SLR) of 8 dB and a receive loudness rating (RLR) of 2 dB. The PSTN loss plan uses an
SLR of 11 dB and an RLR of -3 dB. If you choose the wrong setting, the voice signal can be too
loud or too soft.
Internal CSU
Internal CSU allows you to turn the internal T1 channel service unit on or off. The channel service
unit gathers performance statistics for your T1 lines or PRI with public interface. Contact your
service provider for the correct settings.
You can view the performance statistics for your T1 lines in Maintenance under the CSU stats
heading. Before you set the internal CSU to off, you must ensure there is an external CSU
connected to your T1 lines.
NN40020-603
Chapter 9 Configuring telephony resources 109
Table 15 describes the fields shown on the Call-by-Call Service Selection tab panel.
Table 15 Call-by-Call Service selection panel fields
Service Type Foreign Exchange Refer to “CbC services available by switch protocol” on
Inwats (1-800) page 110.
Intl-800
Digital (SDS)
900
Translation Mode None Define how the incoming digits get mapped to line numbers
All (target lines or DISA/AUTO DNs) within the system.
By SID
By Number
Translate All Calls To Enter the appropriate information for the mode chosen.
Actions
Add 1. On the Modules table, select the PRI module you want to configure.
2. Select the Service Type record to which you want to add Digit translations
3. Under the Translate table, click Add.
4. Enter the appropriate information in the From and To fields on the dialog box.
5. Click OK on the dialog to save the translation range.
Delete 1. On the Modules table, select the PRI module record you want to delete.
2. Select the Service Type record from which you want to delete Digit translations
3. On the Translate table, select one or more ranges to delete.
4. Click Delete.
5. Click OK on the confirmation dialog to delete the digit translation range.
Services Available
Port details
Both trunk and analog modules show port details. Ports settings are directly related to the physical
ports into which the PSTN lines or telephony devices connect on the media bay modules.
The station module Port Details panel is illustrated in Figure 25. The trunk module Port Details
panel is illustrated in Figure 26.
NN40020-603
Chapter 9 Configuring telephony resources 111
Table 17 describes the fields shown on the Port Values tab panel.
Table 17 Port Values tab
IP telephones
The following tabbed panels appear when you select an IP terminals entry on the Telephony
Resources table.
• “IP Terminal Global Settings”
• “IP telephone set details” on page 114
NN40020-603
Chapter 9 Configuring telephony resources 113
Table 19 defines the fields on this panel and indicates the lines.
Table 19 IP terminal Global panel fields (Sheet 1 of 2)
Enable registration <check box> Select this check box to allow new IP clients to register with the
system.
Warning: Remember to clear this check box when you finish
registering the new telephones.
Enable global <check box> If selected, the installer will be prompted for the global registration
registration password password when registering a new IP client. If cleared, the installer
will be prompted for a user ID and password combination that has
“Installer” privileges. See the Administration Guide (NN40020-600)
for information on accounts and privileges.
Global password <10 alphanumeric> If the Enable global registration password check box is selected,
Default: bcmi (2264) enter the password the installer will enter on the IP telephone to
connect to the system.
If this field is left blank, no password prompt occurs during
registration.
Auto Assign DN <check box> If selected, the system assigns an available DN as an IP terminal
requests registration. It does not prompt the installer to enter a set
DN. Note: For this feature to work, Registration must be selected.
If not selected, the installer receives a prompt to enter the assigned
DN during the programming session.
Advertisement/Logo <alphanumeric Any information in this field appears on the display of all IP
string> telephones. For example, your company name or slogan.
Default Codec Auto If the IP telephone has not been configured with a preferred codec,
G.711-aLaw choose a specific codec that the IP telephone will use when it
connects to the system.
G.711-uLaw
If you choose Auto, the system will select the most appropriate
G.729 Codec when the IP telephone is on a call.
G723 If you are unsure about applying a specific codec, ask your network
G.729 + VAD administrator for guidance.
G.723 + VAD
Default jitter buffer None Choose one of these settings to change the default jitter buffer size:
Auto None: Minimal latency, best for short-haul networks with good
Small bandwidth.
Medium Auto: The system dynamically adjusts the size.
Large Small: The system adjusts the buffer size, depending on CODEC
type and number of frames per packet to introduce a 60-millisecond
delay.
Medium: 120-millisecond delay
Large: 180-millisecond delay
G.729 payload size 10, 20, 30, 40, 50, 60 Set the maximum required payload size, per codec, for the IP
(ms) Default: 30 telephone calls sent over H.323 trunks.
Note: Payload size can also be set for Nortel IP trunks. Refer to
G.723 payload size 30 “Configuring VoIP trunk media parameters” on page 382.
(ms)
G.711 payload size 10, 20, 30, 40, 50, 60
(ms) Default: 20
NN40020-603
Chapter 9 Configuring telephony resources 115
Routing table
Both H.323 and SIP trunks are automatically assigned to line pool BlocA. The decision about
whether a given call is through SIP or H.323 is made from the information in the Routing Table.
Calls can be routed directly from entries in the Routing Table, or can use the services of a redirect
proxy or gatekeeper.
Note: If BCM has keycodes for H323 and SIP, check the BCM DNS configuration to prevent
issues in enabling VoIP trunks in H323 or SIP protocols.
NN40020-603
Chapter 9 Configuring telephony resources 117
GW Type BCM Choose the type of system that is accessed through the
BCM35 remote gateway:
IPT BCM: BCMs running 3.6 or later software and CallPilot with
Other compatible versions of H.323.
BCM35: for BCMs running 3.5 software.
IPT: Meridian 1 system running IP software.
GW Protocol SL1 Select the gateway protocol that the trunk expects to use.
CSE None: No special features.
None SL1: Use for BCM 2.5 systems only that require MCDN over
VoIP trunks.
CSE: MCDN protocol for gateways that provide VoIP
service through Meridian 1 IPT (BCM 3.6 and newer
software) or CSE1000 gateways (BCM 3.0 and newer
software)
VoIP Protocol H323 Select the routing protocol for your network.
SIP
QoS Monitor <check box> If you intend to use a fallback PSTN line for this gateway,
ensure that this check box is selected.
Ensure that QoS Monitor is also enabled on the remote
system.
Otherwise, leave the check box empty.
Tx Threshold <0-5> Indicate the level of transmission at which the signal must
be maintained. If the signal falls below this level the call falls
back to PSTN.
Default: 0
Actions
H323 Settings
Figure 30 H323 Settings
Telephony Settings
Fallback to Enabled-All Your choice determines how the system will handle calls if
circuit-switched Enabled-TDM the IP network cannot be used.
Disabled • Enabled-All: All calls are rerouted over specified PSTN
trunks lines.
• Enabled-TDM: All TDM (digital telephones) voice calls
will be rerouted over specified PSTN trunks lines.
• Disabled: Calls will not be rerouted.
Note: Enabled-TDM-only enables fallback for calls originating on digital telephones. This is
useful if your IP telephones are connected remotely, on the public side of the BCM network,
because PSTN fallback is unlikely to result in better quality of service in that scenario.
NN40020-603
Chapter 9 Configuring telephony resources 119
Forward redirected OLI <check box> If the check box is selected, the OLI of an internal telephone
is forwarded over the VoIP trunk when a call is transferred to
an external number over the private VoIP network.
If the check box is cleared, only the CLID of the transferred
call is forwarded.
Send name display <check box> When selected, the telephone name is sent with outgoing
calls to the network.
Remote capability MWI <check box> This setting must coordinate with the functionality of the
remote system hosting the remote voice mail.
Normal route fallback None Select None or Prime set. If Prime set is selected and the
to Prime set outgoing IP trunk leg of the call in a tandem scenario cannot
be completed, the call will terminate on the prime set for the
line.
Default: None
Gateway protocol None Both these protocols require a keycode.
SL1 SL1: Use this protocol only for BCM 2.5 systems
CSE CSE: Use this protocol for BCM 3.0 and later systems. This
protocol supports Meridian 1 IPT.
Otherwise, use None.
Gatekeeper digits <0-9> If dialed digits match gatekeeper digits, the call is routed via
H323 protocol.
If the digits do not match, the call is routed via SIP protocol.
Gatekeeper wildcard <check box> If selected, all dialed digits match gatekeeper digits and
VoIP calls will be routed through the gatekeeper.
Ignore in-band DTMF <check box> If selected, the BCM ignores audible in-band DTMF tones
in RTP received over VoIP trunks after the BCM connects the
remote end to a locally hosted call center application, or a
locally hosted CallPilot application such as auto attendant,
voice mail or IVR.
Note: This setting is useful (should be selected) when the
far end is a Call Server 2000 (CS2K) & Packet Voice
Gateway (PVG) combination where the PVG is provisioned
for OOBDTMFSupp=FullSupport resulting in the PVG +
CS2K sending out-of-band, as well as in-band, DTMF tones
at the same time to the BCM. The PVG MAY not send both
tone notifications depending on whether the call is using
G711 and the version of the CS2K software release (i.e.
SNxx).
This setting should be co-coordinated with the CS2K
administrator.
Default: Cleared
Configuration
*Call signaling Direct Direct: call signaling information is passed directly between
Gatekeeper Resolved endpoints. The remote gateway table in the Element
Manager defines a destination code (digits) for each remote
Gatekeeper Routed system to direct the calls for that system to route. In each
Gatekeeper Routed no RAS system, the Nortel IP Terminals and H.323 Terminals
records map IP addresses to specific telephones.
Gatekeeper Resolved: all call signaling occurs directly
between H.323 endpoints. This means that the gatekeeper
resolves the phone numbers into IP addresses, but the
gatekeeper is not involved in call signaling.
Gatekeeper Routed: uses a gatekeeper for call setup and
control. In this method, call signaling is directed through the
gatekeeper.
Gatekeeper Routed no RAS: Use this setting for a
NetCentrex gatekeeper. With this setting, the system routes
all calls through the gatekeeper but does not use any of the
gatekeeper Registration and Admission Services (RAS).
Enable H245 tunneling <check box> If Enabled, the VoIP Gateway tunnels H.245 messages
within H.225. The VoIP Gateway service must be restarted
for a change to take effect.
Default: Disabled.
Primary Gatekeeper IP <IP address> If Gatekeeper Routed, Gatekeeper Resolved or Gatekeeper
Routed no RAS are selected under Call Signaling, type the
IP address of the machine that is running the gatekeeper.
Backup Gatekeeper(s) <IP address> NetCentrex gatekeeper does not support RAS; therefore,
<IP address> any backup gatekeepers must be entered in this field.
Note: Gatekeepers that use RAS can provide a list of
backup gatekeepers for the end point to use in the event of
the primary gatekeeper failure.
NN40020-603
Chapter 9 Configuring telephony resources 121
Alias Names Alias names are comma delimited, and may be one of the following types:
E.164 — numeric identifier containing a digit in the range 0-9. Identified by the keyword
TEL: Example: the BCM is assigned an E.164 and an H323 Identifier: Alias Names:
TEL:76, NAME:bcm10.nortel.com
• NPI-TON — also referred to as a PartyNumber alias. Similar to E164 except that the
keyword indicates the NPI (numbering plan identification), as well as the TON (type of
number). Identified by one of the following keywords: PUB (Public Unknown Number);
PRI (Private Unknown Number); UDP (Private Level 1 Regional Number (UDP)); CDP
(Private Local Number (CDP)).
• H.323Identifier — alphanumeric strings representing names, e-mail addresses, etc.
Identified by the keyword NAME:
Example: The BCM is assigned a public dialed number prefix of 76, a private CDP
number of 45, and an H323 Identifier alias: Alias Names: PUB:76, CDP:45,
NAME:bcm10.nortel.com
• H.225 (Q.931) CallingPartyNumber (NetCentrex gatekeeper) — The NetCentrex
gatekeeper uses the H.225(Q.931) CallingPartyNumber to resolve the call originator for
billing purposes. This number must then contain a unique prefix, or location code that is
unique across all endpoints that are using the NetCentrex gatekeeper. Identified by the
keyword src:. Example for private networks: CDP alias = src:<DN>; UDP alias =
src:<LOC><DN>. Example for public network: src:<public OLI>
Note: E164 or NPI-TON alias types are commonly used since they fit into dialing plans. A
BCM alias list should not mix these types. Also, the type of alias used should be consistent
with the dialing plan configuration. Use the same alias naming method on all BCMs within a
network.
Configuration note: Refer to “Using CS 1000 as a gatekeeper” on page 389 for specific information about
configuring the gatekeeper for H.323 trunks.Network note: If your private network contains a
Meridian 1-IPT, you cannot use Radvision for a gatekeeper.
If Gatekeeper Routed, Gatekeeper Resolved, or Gatekeeper Routed no RAS are selected under Call Signaling, enter
one or more alias names for the gateway.
Call signaling port 0-65535 Default: 1720
This field allows you to set non-standard call signaling port
for VoIP applications that require special ports.
0 = The first available port is used.
Ensure that you do not select a port that has been assigned
elsewhere in the BCM. To ensure the port is not in use, run
netstat-a from the command line.
RAS port 0-65535 Default: 0
This field allows you to set a non-standard Registration and
Admission (RAS) port for VoIP applications that require
special ports.
0 = The first available port is used.
Ensure that you do not select a port that has been assigned
elsewhere in the BCM. To ensure the port is not in use, run
netstat-a from the command line.
Registration TTL (s) Default: 60 seconds This TimeToLive parameter specifies the intervals when the
VoIP gateway sends KeepAlive signals to the gatekeeper.
The gatekeeper can override this timer and send its own
TimeToLive period.
Gatekeeper TTL (s) The actual time used by the gatekeeper for the registration
process.
Status <read-only> Indicates if the device is online.
Modify <button> Click to modify the parameters.
Note: All active H.323 calls are dropped if these settings are
changed.
NN40020-603
Chapter 9 Configuring telephony resources 123
Preferred Codecs
Preferred Codecs None Select the Codecs in the order in which you want the system to
G.711-uLaw attempt to use them.
G.711-aLaw Performance note: Codecs on all networked BCMs must be
consistent to ensure that interacting features such as Transfer
G.729 and Conference work correctly.
G.723 Systems running BCM 3.5 or later software allow codec
negotiation and renegotiation to accommodate inconsistencies in
Codec settings over VoIP trunks.
Note: The G.723 codec can be used between IP endpoints. If
other types of connections are required, ensure one of the other
codecs is also selected.
Actions
1. On the Available list, click the codec you want to add to the Selected list.
2. Click the button to move the codec to the Selected list.
1. Select a codec that you want to remove from the Selected list.
2. Click this button to move the codec back to the Available list.
1. Select a codec on the Selected list.
2. Click the appropriate arrow to move the codec up or down in the Selected list.
Settings
Enable Voice <check box> The voice activity detection, also known as silence suppression
Activity Detection identifies periods of silence in a conversation, and stops sending
IP speech packets during those periods. In a typical telephone
conversation, most of the conversation is half-duplex, meaning
that one person is speaking while the other is listening. For more
information refer to “Silence suppression” on page 529.
If voice activity detection is enabled, no voice packets are sent
from the listener end. This greatly reduces bandwidth
requirements.
G.723.1 and G.729 support voice activity detection.
G.711 does not support voice activity detection.
Performance note: Voice activity detection on all networked
BCMs and IPT systems (VAD setting on IPT systems) must be
consistent to ensure that interacting features such as Transfer
and Conference work correctly. As well, the Payload size on the
IPT must be set to 30ms.
Default: Disabled
Jitter buffer Auto Select the size of jitter buffer you want to allow for your system.
None Default: Auto
Small
Medium
Large
G.729 payload size 10, 20, 30, 40, 50, 60 Set the maximum required payload size, per codec, for the VoIP
(ms) Default: 30 calls sent over H.323 trunks.
Note: Payload size can also be set for Nortel IP telephones. See
G.723 payload size 30 the BCM 4.0 Telephony Device Installation Guide (N0027269).
(ms)
G.711 payload size 10, 20, 30, 40, 50, 60
(ms) Default: 30
Incremental payload <check box> When enabled, the system advertises a variable payload size
size (40, 30, 20, 10 ms)
Enable T.38 fax <check box> Enabled: The system supports T.38 fax over IP.
Disabled: The system does not support T.38 fax over IP
Caution: Operations note: Fax tones that broadcast through a
telephone speaker may disrupt calls at other telephones using
VoIP trunks in the vicinity of the fax machine. Here are some
suggestions to minimize the possibility of your VoIP calls being
dropped because of fax tone interference:
Locate fax machine away from other telephones.
Turn the speaker volume on the fax machine to the lowest level,
or off, if that option is available.
Force G.711 for 3.1k <check box> When enabled, the system forces the VoIP trunk to use the
Audio G.711 codec for 3.1k audio signals such as modem or TTY
machines.
Note: This setting can also be used for fax machines if T.38 fax is
not enabled on the trunk.
NN40020-603
Chapter 9 Configuring telephony resources 125
SIP Settings
Figure 32 SIP Settings tab
Telephony Settings
Fallback to circuit-switched Enabled-All Your choice determines how the system will handle calls if the
Enabled-TDM IP network cannot be used.
Disabled • Enabled-All: All calls will be rerouted over specified PSTN
trunks lines.
• Enabled-TDM: All TDM (digital telephones) voice calls will
be rerouted over specified PSTN trunks lines.
• Disabled: Calls will not be rerouted.
Default: Enabled-All
SIP Settings
Proxy Support
Proxy <IP address> Specify the IP address of the SIP proxy server.
Status <read-only> Indicates the status of the gateway.
Preferred Codecs
Preferred Codecs None Select the Codecs in the order in which you want the system to
G.711-uLaw attempt to use them.
G.711-aLaw Performance note: Codecs on all networked BCMs should be
consistent to ensure that interacting features such as Transfer
G.729 and Conference work correctly.
G.723 Note: The G.723 codec can be used between IP endpoints. If
other types of connections are required, ensure one of the other
codecs is also selected.
Actions
1. On the Available list, click the codec you want to add to the Selected list.
2. Click the button to move the codec to the Selected list.
1. Select a codec that you want to remove from the Selected list.
2. Click this button to move the codec back to the Available list.
1. Select a codec on the Selected list.
2. Click the appropriate arrow to move the codec up or down in the Selected list.
NN40020-603
Chapter 9 Configuring telephony resources 127
Settings
Enable Voice <check box> The voice activity detection (silence suppression) identifies
Activity Detection periods of silence in a conversation, and stops sending IP
speech packets during those periods. In a typical telephone
conversation, most of the conversation is half-duplex, meaning
that one person is speaking while the other is listening. For more
information refer to “Silence suppression” on page 529.
If voice activity detection is enabled, no voice packets are sent
from the listener end. This greatly reduces bandwidth
requirements.
G.723.1 and G.729 support silence suppression.
G.711 does not support silence suppression.
Performance note: voice activity detection on all networked
BCMs and IPT systems (VAD setting on IPT systems) must be
consistent to ensure that interacting features such as Transfer
and Conference work correctly.
Default: Disabled
Jitter Buffer Auto Select the size of jitter buffer you want to allow for your system.
None
Small
Medium
Large
G.729 Payload Size 10, 20, 30, 40, 50, 60 Set the desired payload size, per codec, for VoIP calls sent over
(ms) Default: 30 SIP trunks.
Note: Payload size can also be set for Nortel IP telephones.
G.723 Payload Size 30 Refer to the Device Configuration Guide (NN40020-300).Refer to
(ms) the Telephony Device Installation Guide (NN40020-309).
G.711 Payload Size 10, 20, 30, 40, 50, 60
(ms) Default: 30
Enable T.38 <check box> Enabled: The system supports T.38 fax over IP.
Disabled: The system does not support T.38 fax over IP
Caution: Operations note: Fax tones that broadcast through a
telephone speaker may disrupt calls at other telephones using
VoIP trunks in the vicinity of the fax machine. Here are some
suggestions to minimize the possibility of your VoIP calls being
dropped because of fax tone interference:
Locate fax machine away from other telephones.
Turn the speaker volume on the fax machine to the lowest level,
or off, if that option is available.
e.164 / National national.e164 String to use in phone context to identify numbering plan type
e.164 / Subscriber subscriber.e164 String to use in phone context to identify numbering plan type
e.164 / Special special.e164 String to use in phone context to identify numbering plan type
e.164 / Unknown unknown.e164 String to use in phone context to identify numbering plan type
Private / UDP UDP String to use in phone context to identify numbering plan type
Private / CDP CDP String to use in phone context to identify numbering plan type
Private / Special special.private String to use in phone context to identify numbering plan type
Private / Unknown unknown.private String to use in phone context to identify numbering plan type
Unknown / Unknown unknown String to use in phone context to identify numbering plan type
NN40020-603
129
Chapter 10
Configuring lines
All the Lines panels show the same type of tabbed panels. The information on the tabbed panels
may vary, however, depending on the type of line.
The following paths indicate where to access the lines information in Element Manager and
through Telset Administration:
• The Properties tabbed panel provides the settings for individual line characteristics.
• The Restrictions tabbed panel allows you to define which restrictions will be active for
individual lines. Note that lines that are assigned to the same line pool will automatically
assign the same restrictions.
• The Assigned DNs tabbed panel provides a quick way to assign lines to telephones. You must
use the DN records panels to assign line pools to telephones.
Click one of the following links to connect with the type of information you want to view:
Panel tabs Tasks
“Trunk/Line data, main panel” on page 130 “Configuring lines: T1-Loop start” on page 157
“Properties” on page 132 “Configuring lines: T1-Digital Ground Start” on
page 163
“Restrictions (Line and Remote)” on “Configuring lines: T1-E&M” on page 151
page 137
“Assigned DNs” on page 138 “Configuring lines: T1-DID” on page 169
See also: Line Access - Line
Assignment tab in the Device
Configuration Guide (NN40020-300)
“Configuring lines: PRI” on page 145
“Configuring lines: DPNSS lines” on page 181
“Configuring lines: Target lines” on page 141
“Configuring BRI lines” on page 197
“Configuring VoIP lines” on page 385
“Call Security: Configuring Direct Inward System
Access (DISA)” on page 427
Click the navigation tree heading to access general information about user management.
NN40020-603
Chapter 10 Configuring lines 131
Table 27 describes the fields found on the Trunk/Line Data main panel.
Properties
The Properties tab shows basic line properties. Not all fields apply to all types of lines.
The Properties tab is shown in Figure 36 on page 133.
NN40020-603
Chapter 10 Configuring lines 133
Table 28 defines the fields on this panel and indicates the lines.
Preferences (lines)
The Preferences tab shows information that may vary from trunk to trunk. Most of this information
needs to coordinate with the line service provider equipment.
The Preferences tab is shown in Figure 37.
NN40020-603
Chapter 10 Configuring lines 135
Table 29 defines the fields on this panel and indicates the lines.
NN40020-603
Chapter 10 Configuring lines 137
Assigned DNs
The Assigned DNs tabbed panel displays the DN properties for lines that are assigned to
telephones.
This information can also be configured on the DN record. Any information added, deleted or
modified in this table reflects in the DN record.
Note: Lines that do not allow single-line assignment, such as PRI lines and VoIP lines,
will not display this tabbed panel.
NN40020-603
Chapter 10 Configuring lines 139
NN40020-603
141
Chapter 11
Configuring lines: Target lines
Target lines are virtual lines that allow the mapping of received digits to a line number over PRI
channel.
The following paths indicate where to access target lines in Element Manager and through Telset
Administration:
Prerequisites
Complete the following prerequisites checklist before configuring the modules.
Process map
Figure 40 and Figure 41 provide an overview of the target line feature configuration process.
NN40020-603
Chapter 11 Configuring lines: Target lines 143
NN40020-603
145
Chapter 12
Configuring lines: PRI
PRI are auto-answer lines. These lines cannot be individually assigned to telephones. They must
be configured into line pools. PRI line pools then are assigned routes and these routes are used to
create destination codes.
The following paths indicate where to access PRI line pools in Element Manager and through
Telset Administration:
Prerequisites
Complete the following prerequisites checklist before configuring the modules.
Process map
Figure 42 and Figure 43 provide an overview of the PRI line feature configuration process.
NN40020-603
Chapter 12 Configuring lines: PRI 147
• DMS-100 custom
• DMS-250
NN40020-603
Chapter 12 Configuring lines: PRI 149
NN40020-603
151
Chapter 13
Configuring lines: T1-E&M
Prerequisites
Complete the following prerequisites checklist before configuring the modules.
Process map
Figure 44, Figure 45, and Figure 46 provide an overview for configuring the line features for
T1-E&M lines.
NN40020-603
Chapter 13 Configuring lines: T1-E&M 153
NN40020-603
Chapter 13 Configuring lines: T1-E&M 155
• Redirect to: If you want to automatically direct calls out of the system to a specific
telephone, such as a headoffice answer attendant, enter that remote number here. Ensure
that you include the proper routing information.
4 Set the restriction and remote package scheduling (Restrictions tab):
• Use remote package: Enter a valid remote access package for the Normal schedule, and
any other schedules that you want this line to be part of (incoming calls from remote users
or private networks)
• Line restrictions: Enter a valid restriction filter for the Normal schedule, and any other
schedules that you want this line to be part of. (outgoing calls)
• Remote Restrictions: Enter a valid remote access package for the Normal schedule, and
any other schedules that you want this line to be part of (incoming calls from remote users
or private networks)
5 Assign the lines to DNs (Assigned DNs tab) (applicable to manual answer only)
If you have configured the DNs and know to which telephones the line needs to be assigned,
you can enter those DNs, here. The DN record also can be used to assign lines and line pools
for these lines.
• DN: Unique number.
• Appearance type: Choose Appr or Appr&ring if the telephone has an available button,
otherwise choose Ring only. Model 7000 and 7100 telephones have no programmable
buttons, so this must be set to Ring only. (Model 7000 phones, supported in Europe only.)
• Vmsg set: When activated, an indicator on the telephone appears when a message from a
remote voice-mail system is waiting. Check with your system administrator for the system
voice mail setup before changing this parameter.
6 Suggested next steps:
• Dialing plan
“Dialing plan: System settings” on page 267
“Dialing plan: Public network” on page 275
“Dialing plan: Routing and destination codes” on page 259)
• Networking
“Public networking: Setting up basic systems” on page 289
“Public networking: Tandem calls from private node” on page 293
“Private networking: Using destination codes” on page 339
NN40020-603
157
Chapter 14
Configuring lines: T1-Loop start
Loop start trunks provide remote access to the BCM from the public network. They must be
configured to auto-answer to provide remote system access. A loop start trunk must have
disconnect supervision if it is to operate in the auto-answer mode.
The following paths indicate where to access the loop start trunks information through Element
Manager and through Telset Administration:
Task: Configure the analog or digital loop start lines connected to the system.
• “Configuring digital (T1/E1) loop start lines” on page 161
Prerequisites
Complete the following prerequisites checklist before configuring the modules.
Process map
Figure 47, Figure 48, and Figure 49 provide an overview of the configuration process for T1-Loop
start lines.
NN40020-603
Chapter 14 Configuring lines: T1-Loop start 159
NN40020-603
Chapter 14 Configuring lines: T1-Loop start 161
NN40020-603
163
Chapter 15
Configuring lines: T1-Digital Ground Start
Prerequisites
Complete the following prerequisites checklist before configuring the modules.
Process map
Figure 50 and Figure 51 provide an overview of the line features for Ground Start lines.
NN40020-603
Chapter 15 Configuring lines: T1-Digital Ground Start 165
NN40020-603
Chapter 15 Configuring lines: T1-Digital Ground Start 167
• Remote Packages: Enter a valid remote access package for the Normal schedule, and any
other schedules that you want this line to be part of (incoming calls from remote users or
private networks)
4 Assign the lines to DNs (Assigned DNs tab)
If you have configured the DNs and know to which telephones the line needs to be assigned,
you can enter those DNs here. The DN record also can be used to assign lines and line pools
for these lines.
• Appearance Type: Choose Appr only or Appr&Ring if the telephone has an available
button, otherwise choose Ring only. Model 7000 and 7100 telephones have no
programmable buttons, so this must be set to Ring only. (Model 7000 phones, supported in
Europe only.)
• VMsg set: When activated, an indicator on the telephone appears when a message from a
remote voice-mail system is waiting. Check with your system administrator for the system
voice mail setup before changing this parameter.
5 Suggested next steps:
• Dialing plan
“Dialing plan: System settings” on page 267
“Dialing plan: Public network” on page 275
“Dialing plan: Routing and destination codes” on page 259
• Networking
“Public networking: Setting up basic systems” on page 289
“Public networking: Tandem calls from private node” on page 293
“Private networking: Using destination codes” on page 339
NN40020-603
169
Chapter 16
Configuring lines: T1-DID
DID (Direct Inward Dial) are lines on a digital trunk module on a T1. Inbound DID lines are
mapped through target lines.
The following paths indicate where to access the DID lines in Element Manager and through
Telset Administration:
Task: Configure the properties for DID (Direct Inward Dial) lines
Prerequisites
Complete the following prerequisites checklist before configuring the modules.
Process map
Figure 52 and Figure 53 provide an overview of the DID line features configuration process.
NN40020-603
Chapter 16 Configuring lines: T1-DID 171
NN40020-603
Chapter 16 Configuring lines: T1-DID 173
NN40020-603
175
Chapter 17
Configuring lines: DASS2 lines
Prerequisites
Complete the following prerequisites checklist before configuring the modules.
Process map
Figure 54 and Figure 55 provide an overview of the DASS2 line feature configuration.
NN40020-603
Chapter 17 Configuring lines: DASS2 lines 177
• Line type: Define how the line will be used. If you are using routing, ensure it is put into
line pool (A to O).
• Prime Set: If you want the line to be answered at another telephone if the line is not
answered at the target telephone, otherwise, choose None.
• Pub. Received #: Not applicable.
• Priv. Received #: Not applicable.
• Distinct ring: If you want this line to have a special ring, indicate a pattern (2, 3, 4 or
None).
• Use remote package: If this line is used for remote call-ins or is part of a private network,
ensure you specify a valid package.
2 Configure the trunk/line data (Properties tab):
• Answer mode: If this line is used for remote call-ins, determine how you want the line to
answer (automatically, or requiring more user input).
• Use auxiliary ringer: If your system is equipped with an external ringer, you can enable
this setting to allow this line to ring at the external ringer.
• Full autohold: This allows telephones to put a line on hold if the user picks up another line
or starts to dial out on another line.
• Voice Message Center: If the system is using a remote voice mail, select the center
configured with the contact number.
3 Set the restriction and remote package scheduling (Restrictions tab):
• Line restrictions: Enter a valid restriction filter for the Normal schedule, and any other
schedules that you want this line to be part of. (outgoing calls)
• Remote Packages: Enter a valid remote access package for the Normal schedule, and any
other schedules that you want this line to be part of (incoming calls from remote users or
private networks)
4 Assign the lines to DNs (Assigned DNs tab)
If you have configured the DNs and know to which telephones the line needs to be assigned,
you can enter those DNs, here. The DN record also can be used to assign lines and line pools
for these lines.
• Appearance type: Choose Appr or Appr&ring if the telephone has an available button,
otherwise choose Ring only. Model 7000 and 7100 telephones have no programmable
buttons, so this must be set to Ring only. (Model 7000 phones, supported in Europe only.)
• VMsg set: When activated, an indicator on the telephone appears when a message from a
remote voice-mail system is waiting. Check with your system administrator for the system
voice mail setup before changing this parameter.
5 Suggested next steps:
• Dialing plan
“Dialing plan: System settings” on page 267
“Dialing plan: Public network” on page 275
“Dialing plan: Private network settings” on page 281
“Dialing plan: Routing and destination codes” on page 259
NN40020-603
Chapter 17 Configuring lines: DASS2 lines 179
• Networking
“Public networking: Tandem calls from private node” on page 293
“Private networking: Using destination codes” on page 339
“Private networking: DPNSS network services (UK only)” on page 331
“Private networking: MCDN over PRI and VoIP” on page 297
NN40020-603
181
Chapter 18
Configuring lines: DPNSS lines
Prerequisites
Complete the following prerequisites checklist before configuring the modules.
Process map
Figure 56 and Figure 57 provide an overview of the DPNSS line feature configuration process.
NN40020-603
Chapter 18 Configuring lines: DPNSS lines 183
• Prime Set: If you want the line to be answered at another telephone if the line is not
answered at the target telephone, otherwise, choose None.
• Pub. Received #: Not applicable.
• Priv. Received #: Not applicable.
• Distinct ring: If you want this line to have a special ring, indicate a pattern (2, 3, 4 or
None).
• Use remote package: If this line is used for remote call-ins or is part of a private network,
ensure you specify a valid package.
2 Configure the trunk/line data (Properties tab):
• Answer mode: If this line is used for remote call-ins, determine how you want the line to
answer (automatically, or requiring more user input).
• Use auxiliary ringer: If your system is equipped with an external ringer, you can enable
this setting to allow this line to ring at the external ringer.
• Full autohold: This allows telephones to put a line on hold if the user picks up another line
or starts to dial out on another line.
• Voice Message Center: If the system is using a remote voice mail, select the center
configured with the contact number.
3 Set the restriction and remote package scheduling (Restrictions tab):
• Line restrictions: Enter a valid restriction filter for the Normal schedule, and any other
schedules that you want this line to be part of. (outgoing calls)
• Remote Packages: Enter a valid remote access package for the Normal schedule, and any
other schedules that you want this line to be part of (incoming calls from remote users or
private networks)
4 Assign the lines to DNs (Assigned DNs tab)
If you have configured the DNs and know to which telephones the line needs to be assigned,
you can enter those DNs, here. The DN record also can be used to assign lines and line pools
for these lines.
• Appearance type: Choose Appr or Appr&ring if the telephone has an available button,
otherwise choose Ring only. Model 7000 and 7100 telephones have no programmable
buttons, so this must be set to Ring only. (Model 7000 phones, supported in Europe only.)
• VMsg set: When activated, an indicator on the telephone appears when a message from a
remote voice-mail system is waiting. Check with your system administrator for the system
voice mail setup before changing this parameter.
5 Suggested next steps:
• Dialing plan
“Dialing plan: System settings” on page 267
“Dialing plan: Public network” on page 275
“Dialing plan: Private network settings” on page 281
“Dialing plan: Routing and destination codes” on page 259
NN40020-603
Chapter 18 Configuring lines: DPNSS lines 185
• Networking
“Public networking: Tandem calls from private node” on page 293
“Private networking: Using destination codes” on page 339
“Private networking: DPNSS network services (UK only)” on page 331
“Private networking: MCDN over PRI and VoIP” on page 297
NN40020-603
187
Chapter 19
BRI ISDN: BRI loop properties
• Telset interface: **CONFIG > Hardware > Module > TrunkMod > BRI - X > Loop XXX
This panel contains the following tab:
You can define BRI loops as either T-loops, for connecting to ISDN trunks, or S-loops, for
connecting to internal ISDN equipment. Both types of loops are displayed in the top frame in the
Loop Parameters panel. In the bottom frame, the settings displayed are specific to each type of
loop.
NN40020-603
Chapter 19 BRI ISDN: BRI loop properties 189
Table 33 defines the fields on the SPIDs tab and indicates the lines.
NN40020-603
Chapter 19 BRI ISDN: BRI loop properties 191
This panel enables you to configure D-Packet Service to T-loops. You must have both T-loops and
S-loops configured on the same module to allow this feature.
Figure 61 illustrates the D-Packet Service panel.
NN40020-603
Chapter 19 BRI ISDN: BRI loop properties 193
5. Enter a TEI.
6. Click OK.
7. Repeat for all the TEIs you want to assign.
Delete 1. In the top frame, click the loop where you want to delete TEI assignments.
2. In the bottom frame, click the TEI you want to delete.
3. Click Delete.
4. Click OK.
NN40020-603
195
Chapter 20
BRI ISDN: BRI T-loops
Prerequisites
Complete the following prerequisites checklist before configuring the modules.
Process overview
Figure 63 shows the process for configuring BRI loops.
NN40020-603
Chapter 20 BRI ISDN: BRI T-loops 197
• Element Manager: Configuration > Telephony > Lines > Active Physical Lines, Inactive
Lines, All Lines
Prior programming:
NN40020-603
Chapter 20 BRI ISDN: BRI T-loops 199
NN40020-603
201
Chapter 21
Programming BRI S-loops, lines, and ISDN devices
BRI modules support both trunk and station (telephone) services. The following describes the
process for configuring station/device (S) loops, which support devices that use an ISDN interface.
You can assign a single device to a loop, or multiple devices connected through an NT-1 interface.
The following paths indicate where to configure loops through Element Manager and through
Telset Administration:
• Telset interface: **CONFIG > Hardware > Module > TrunkMod > BRI - X > Loop XXX
Prerequisites
Complete the following prerequisites checklist before configuring the modules.
• S-loops do not supply any voltage for ISDN devices requiring power, such as video cameras.
Voltage for these devices must be supplied by an external source on the S-loop.
For detailed descriptions of the BRI module fields, refer to “BRI ISDN: BRI loop properties” on
page 187.
Task: Determine the programming for individual telephones and devices attached to BRI
module S-loops.
For a detailed description of DN record panels, and DN record procedures, see “DN records
parameters” in the Device Configuration Guide (NN40020-300).
ISDN devices have a DN range that is unique to ISDN devices.
Process map
Figure 64 provides an overview of the ISDN DN record configuration process.
NN40020-603
Chapter 21 Programming BRI S-loops, lines, and ISDN devices 203
Prerequisites
Ensure that the following prerequisites checklist is complete before configuring the devices.
NN40020-603
205
Chapter 22
Configuring CLID on your system
The following describes the various areas in the system that need configuration to allow incoming
or outgoing Calling Line Identification Display (CLID) information to display (incoming calls) or
transmit over the trunks (outgoing calls).
The following describes programming and setting up this feature.
Tasks:
Set up incoming display: “Programming incoming CLID” on page 207
Set up outgoing display: “Programming outgoing CLID” on page 208
Set up the method for blocking outgoing set identification: “ONN Blocking (North American
systems)” in the Device Configuration Guide (NN40020-300)
Process map
Figure 65 provides a quick view of the areas of the system that need programming to provide
incoming and outgoing CLID services.
NN40020-603
Chapter 22 Configuring CLID on your system 207
Digital, analog, and VoIP lines support CLID for incoming calls, and no special programming is
required for the feature on these lines for BCM digital or IP phones.
Note: You can increase the default number of system speed dials from 70 to 255 if you
want to provide an extensive CLID list.
2 To determine how many digits of the dialed number and the system speed dial must match
before a name is displayed, you set the Clid match length setting to the required number
(1 to 8).
3 In order for the telephone to display the name, it must have Caller ID set for the line assigned
to the telephone. Refer to “Line Access - Line Assignment tab” in the Device Configuration
Guide (NN40020-300).
4 Set First display to Name. Refer to “Capabilities and Preferences main tab” in the Device
Configuration Guide (NN40020-300).
Answered calls can display the name, incoming number, and line name/number for calls coming in
over lines that allow full CLID.
Lines are named by their number as a default. However, you can provide a more descriptive
identifier. The Name field is located on the main table under Configuration > Telephony > Lines
(“Trunk/Line Data, main panel” in the Device Configuration Guide (NN40020-300)).
On the Hunt group record (Configuration > Telephony > Hunt Groups > Hunt Groups table),
you can change the Hunt group Name field from the Hunt group DN to a more logical label for the
group. Note that only eight characters display. Refer to “Hunt Groups system setup” in the Device
Configuration Guide (NN40020-300).
Nortel recommends that you use a blank space for the last character of the Business name to act as
a separator between the Business name and telephone name.
Note that if you leave this field blank, no name appears.
To program the Business Name, select Configuration > Telephony > Global Settings > Feature
Settings.
NN40020-603
Chapter 22 Configuring CLID on your system 209
• The OLI number. Refer to “Line Access tab” in the Device Configuration
Guide (NN40020-300).
• The Auto Called ID must be selected. Refer to “Capabilities tab” in the Device
Configuration Guide (NN40020-300).
If you want to be able to see the CLID of internal telephones you call, ensure that Auto caller ID is
enabled under Configuration > Telephony > Sets > All DNs > Capabilities and Preferences.
Refer to “Capabilities and Preferences main tab” in the Device Configuration
Guide (NN40020-300).
You can determine what number displays at the other end of an outgoing call, if the outgoing line
allows name display and the receiving telephone has number display active.
The Outgoing Line Identification (OLI) can be set for each telephone for both private and public
network calls.
The Private OLI is used for CLID over private networks. It is usually set to the DN number as a
default, although this does not always occur if DN length changes have occurred. (Configuration
> Telephony > Sets > All DNs > Line Access table). Refer to “Line Access tab” in the Device
Configuration Guide (NN40020-300). If the system is running with a UDP dialing plan, you might
want to add the LOC to the DN. Refer to “Outgoing private calls routing” on page 286.
The Public OLI is used for CLID over public networks and for tandem calls over private networks
that terminate on the public network. The number of digits for this field is determined by your
local service provider. (Configuration > Telephony > Sets > All DNs > Line Access table). Refer
to “Line Access tab” in the Device Configuration Guide (NN40020-300).
To block outgoing name display at the media bay module level, you can configure module records
to disable the Send Name display check box, select Configuration > Resources > Telephony
Resources > Trunk Module Parameters (not available for all trunk types). Refer to “Trunk
Module Parameters” on page 104“Trunk Module parameters” in the Device Configuration
Guide (NN40020-300).
ONN is also enabled and disabled from a telephone, on a per-call basis, using FEATURE 819.
To allow FEATURE 819 to work correctly, you may need to specify an ONN blocking service
code.
The BCM alerts the CO by two methods. The method used depends on the type of trunk involved
in placing the outgoing call. This information is supplied by your service provider.
• Analog trunks use a dialing digit sequence called a Vertical Service Code (VSC). The VSC
differs from region to region and must be programmed. Analog trunks with both tone and
pulse dialing trunks can have separate VSCs.
• PRI trunks have only one VSC. No specific system programming is required.
ETSI note: ETSI lines may use the Calling Line Information Restriction (CLIR)
supplementary service to provide this feature.
ETSI PRI lines do not use a VSC. The line always uses Suppression bit to invoke the CLIR
supplementary service.
NN40020-603
211
Chapter 23
CLID: Name display
BCM displays the name of the calling party at the answering telephone when this information is
available on Private or Public PRI trunks, VoIP trunks, and analog trunks that support Calling Line
Identification (CLID). The displayed name can include the Receiving Calling Name, Receiving
Redirected Name, and/or Receiving Connected Name. Refer to “Receiving and sending calling
party name” on page 212.
If only a number is available for CLI on an incoming call, you can program a system speed dial in
such a way that a name displays when that number calls in. Refer to “Alpha tagging for name
display” on page 212.
Name and number information are also transmitted with outgoing calls. This can be blocked by the
user (FEATURE 819) on a per-call basis. As well, you can block this information on a per-trunk
basis. This is important if the connecting system cannot process name and number information.
Some service providers also may have different codes that need to be mapped so that the blocking
feature works.
Table 37 provides a list of the name/number display features and the list of ISDN interfaces that
support each feature.
Table 37 Call features/interface list
Interface
Feature NI PRI DMS SL-1 NI-BRI ETSI ETSI QSIG
Custom (MCDN) Euro
PRI (PRI/BRI)
Receiving Calling Name Supported Supported Supported Supported Supported
Receiving Redirected Supported Supported Supported
Name
Receiving Connected Supported Supported Supported
Name
Sending Calling Party Supported Supported Supported Supported
Name
Sending Connected Name Supported Supported Supported
Note: MCDN networks fully support name display features within the
private network environment.
Note: Lines that provide name and number CLID, such as PRI lines, use
that name for display, rather than the alpha tagging feature.
NN40020-603
Chapter 23 CLID: Name display 213
Limitations:
• Due to system resource limitations, only 30 telephones can be assigned to provide alpha
tagging CLID per line.
• If the incoming number only partially matches the CLID match length, no name displays.
• If the number matches more than one speed dial, and the matches have different names, the
telephone displays the name of the first match.
Name display
You can assign names to identify your company, external lines, target lines, and your colleagues’
telephones. During a call, the name (if programmed) appears on the telephone display instead of
on the external line number or internal telephone number of the caller.
Names can contain both letters and numbers, but cannot be longer than seven characters. You
cannot use the number (#) and star (*) symbols.
Note: You can give the same name to a telephone and a line in your
system. Use initials, abbreviations, or even nicknames to give each
telephone a unique name to avoid confusion.
You can also determine if the calling line ID (CLID) is received by a telephone, or if the CLID
information from a system telephone gets sent out over the network. Refer to “Incoming and
outgoing call display” on page 214.
Figure 66 illustrates an example of naming system components.
K9 Unit
5553465
K9 Unit
Public or
Private
Target line network
Trunks
K9help
Hunt group
NN40020-603
Chapter 23 CLID: Name display 215
DogFood
5556897
Line: 026 Business name *Public or
display: RCMP Private
network
K9 Unit
5552354 *Trunks
RCMP K9 Unit
5552354
Incoming Name, Number, Line display
NN40020-603
217
Chapter 24
Dialing plans
The BCM allows for flexible dialing plans using access codes, destination codes, PSTN trunks and
private network trunks that provide multiple options for customizing the dialing options to meet
each customers unique requirements. Refer to “Outgoing call routing” on page 222.
While the BCM can be plugged in and used immediately, it is recommended that you plan and
execute the appropriate dialing plan.
The dialing plan includes:
• the dialing plans that govern the expected dialing strings on a private network
• the access and destination codes that get dialed out as part of the dialing string
Also refer to “Call security: Restriction filters” on page 433. This section also discusses Class of
Service (CoS) passwords, which you can use so that users can access the system features over
public connections. Refer to “Call security and remote access” on page 415.
Remote access: When you set up lines that do not offer DISA directly on the line, you can
determine if remote access prompts with DISA or allows auto answering. This determines the
Public/Private Auto DN and Public/Private DISA DN settings, which are set under Configuration
> Telephony > Dialing Plan > Public Network and Private Network. These numbers will have
the same first number as you specified in the Start DN and be of the same length. Remote callers
dial the system public or private access number, and then dial either the Private/Public Auto DN or
Private/Public DISA DN, as determined by the line setup.
NN40020-603
Chapter 24 Dialing plans 219
Incoming calls: The Private Dialing Plan provides the special codes that identify the system to
calls coming over private PSTN or VoIP trunks. Calls that do not match the private dialing plan
information, are not accepted by the system.
Calls coming in over private networks or PRI/BRI termination target lines can be set up for each
telephone or group of telephones to which the calls are directed. As with other incoming calls,
these calls can have a public or private call type that matches to a public or private received
number assigned to a target line.
Outgoing calls: Other network codes include the information about public dialing codes that you
enter under Configuration > Telephony > Dialing Plan > Public Networks.
The public dialing plan defines which dialing string prefixes will be allowed over the public PSTN
lines. By defining these dial strings and the length of the prefix, the central office can direct the
calls to the correct public destination.
For private networks, if you are not using routing and destination codes, you need to identify an
access code that indicates an incoming call is destined for the private network.
MCDN special call types: If your system is networked to other types of systems, such as
Meridian 1, which sends calls through one or more BCM systems to the public network, you need
to specify specific call-type codes. These codes append to the incoming dial string, so that the
call-type remains intact as it passes through the BCM call processing:
Internal feature access: Meanwhile, you need to keep in mind that the leading digit of any of the
above dialing codes cannot conflict with the other system access codes that you want to use:
Line pool and destination access codes: Once these basic numbers have been picked, you can
decide what numbers to use for line pool access codes and/or destination codes. The system will
not allow these codes to start with any of the numbers currently assigned. If you are working with
an established dialing plan, you may want to ensure that the numbers that the users are familiar
with dialing are reserved for these codes.
For instance, if the users are familiar with dialing 9XXXXXXX to access numbers outside of their
own offices, you will want to reserve this number for the destination codes. If you are setting up a
new system, you could opt to use the location codes of the other systems as destination codes, or
you could define one number for local calls (but which are still outside the system) and one
number for long-distance calls. For example: The users may dial 6<DN number> for calls within a
local system, but dial 8<area code><office code><extension or “DN”> for calls in another city
over the public network.
Telephones use pool codes and destination codes to dial externally, because when the analog
device goes off hook, it seizes internal dial tone from the system. The external access code, is
either a line pool code, or destination code assigned to your system dialing plan.
Variable Example or default settings
External code 9
NN40020-603
Chapter 24 Dialing plans 221
• DPNSS lines use the Private received number to route calls in the system.
• BRI (ETSI-QSIG), PRI (ETSI-QSIG, MCDN, DMS-100, DMS-250), and VoIP trunks route
calls on a per-call basis to either the public or private received digits.
• BRI (ETSI-Euro, NI), PRI (ETSI-Euro, NI, 4ESS), T1 (LoopStart, E&M, DID, GroundStart),
Analog LEC (LoopStart), and DASS2 trunks route calls using the Public received number.
• UDP (Universal Dialing Plan) uses a destination code and a location code plus the set DN (that
is, 6-403-XXXX) to determine where a call gets routed. You specify a Private DN length to
allow all required digits to be dialed. Each node on the network has a unique location code.
• CDP (Coordinated Dialing Plan) uses a unique steering code that is transparent to the user and
is dialed as part of the destination set's DN (that is, 2XXXX for one node, 3XXXX for another
node, and so on) to determine where the call gets routed. Since each node on the network has a
unique code, no other routing is required.
• The Meridian system administrator, or the call control system, generates the Private Network
IDs. These IDs are unique to each node on a network. Both UDP and CDP must include this
code in programming.
A set of default Public DN lengths is included with the default template. In most cases it is not
necessary to change the default values.
• Each entry consists of a DN prefix string (1 to 10 digits) and a length value (two digits,
1 to 25).
• Several entries are predefined in the North America profile. These defaults can handle most
regions in North America without the need for additional programming. If required, you can
remove or modify these entries.
• The table always contains one default entry. You cannot remove this entry. You can only
modify the length parameter associated with this entry. The default entry specifies the length
of any dialing string that does not match one of the other table entries.
• Destination codes also provide access to line pools, but they also allow more flexibility in
dialing, which allows for more complex routing options, such as scheduling, fallback routing
(VoIP trunks), call definition, and multiple routing (least-cost routing). Routing also allows
you to minimize the dialout for the user, especially to systems on the same private network.
Outgoing calls can be either public or private, which is defined by the route. The public or private
designation determines which dialing plan is used to determine the validity of the call. Normally,
public calls are routed over PSTN trunks and private calls are routed over a private network.
However, MCDN trunks can also pass calls designated as public to allow remote nodes on the
network to call out of the PSTN of a local node. This is called tandem dialing.
• If the outgoing call is designated as private, the system checks the beginning of the string for a
destination code that routes to a private network. It also checks that the dial string is the correct
length. The destination code routing determines what the final dial string will be, adding or
removing digits, as required.
NN40020-603
Chapter 24 Dialing plans 223
• If the outgoing call is designated as public, the system checks the beginning of the string for a
destination code that routes to a PSTN or an MCDN trunk. If the call routes to a public route,
the system checks the public dialing table to ensure that the dialout string has legitimate
leading digits and is the correct length. If the call routes to an MCDN trunk, the call is passed
as dialed, minus the private networking codes. The call will pass through the system until the
system with the matching destination code receives it, at which point it will be sent through the
local PSTN of that system.
How the system identifies the call depends on the type of trunk chosen for the route. Refer to the
table below.
MCDN trunks also allow public call types when tandeming calls from another system on the
private network. Some of these systems use specific call types that the BCM needs to recognize to
pass on correctly. Also refer to “Using the MCDN access codes (tandem calls)” on page 232.
Defining DN length
The DN lengths setting allows you to change the number of digits for the Received number length
and the DN length, which are used by the system to determine if an incoming call is valid for the
system.
Each increase in length repeats the first digit in front of any existing DN. For example, if DN 234
was increased to a length of four, the new DN would be 2234.
NN40020-603
Chapter 24 Dialing plans 225
Warning: If your system is running with a PBX telephony template, the Public and
Private received # length are by default 3 (digits) at startup. Increasing the DN length after
system startup does not change these digits, so you will need to manually change the
Public and Private Receive Number length.
Private OLIs are automatically assigned to the DN records if the DN length and the Private
Received Number length are the same. If this changes, the Private OLIs are cleared, or are
not assigned (PBX template).
Network note: If your system is part of a private network, ensure that you confirm the
dialing plan for the network before changing this length. If you change the length, ensure
that you check all DN-related settings after the change.
If you change the DN length of your system, you may need to change the Received # length.
Private and public networking, and the access codes to determine a route for an incoming call over
an auto-answer trunk.
On systems running the DID telephony template, the Private and Public Received # length is set to
the same length as the DN length for the system. On systems running the PBX telephony template,
the Private and Public Received # length default to 3, unless the DN length is changed during the
Startup procedure.
These digits identify target lines (“Processing incoming calls” on page 225), Auto DNs, and DISA
DNs.
The received number can be shorter if network or central office constraints require this. This
number cannot be greater than the system DN length on a networked system using a coordinated
dialing plan (CDP) or a universal dialing plan (UDP). On a standalone system it is possible that the
received number length would be greater than the DN length.
Warning: Decreasing the received number length clears all programmed received digits
that are longer than the new settings.
• If the call is from ETSI-QSIG, MCDN, NI, DMS-100, or DMS-250 and tagged as
Private/Subscriber, the system prepends the Private access code, if the dialing plan is UDP.
• If the call is tagged as Unknown/Unknown or Private/Unknown (ETSI-QSIG, MCDN, N1,
DMS-100, or DMS-250 trunks), no access code is added.
• For all other call types, the system truncates the trailing digits to the Public Received #
Length. (Go to step 4)
Private calls:
• If the call is tagged as Private/Subscriber or Private/UDP, the system prepends the Private
access code.
• If the call is tagged as Private/CDP, no access code is added.
3 The system tries to match the first digits of the dial string to a destination code. If the digits
match, the dial string is routed out of the system.
4 If the system cannot match the first digits to a destination code, the system tries to match the
dial string to a target line (Public or Private Received Number). If the dial string does not
match any target lines, the call is routed to the prime set for the line.
Figure 68 is a graphic illustration of incoming call processing.
NN40020-603
Chapter 24 Dialing plans 227
Extension 2246
Line pools
PSTN
Private Network
E&M, T1,
Long Distance MCDN, PRI
tandem, VoIP
PSTN
Extension 2280
NN40020-603
Chapter 24 Dialing plans 229
Task:
Set up access codes for internal features:
• park prefix
• Private Auto DN
• Public Auto DN
• Private DISA DN
• Public DISA DN
Set up access codes that affect calls coming in over the private network:
• Destination codes
• Carrier codes
The default settings shown in Table 38 can help you plan your access codes so there are no
conflicts.
Table 38 Default codes table
Note: The Park prefix must not conflict with the following:
• external code
• direct dial digit
• private access code
• Public/Private Auto DN
• Public Private DISA DN
• line pool code/destination code, or
• telephone DN
NN40020-603
Chapter 24 Dialing plans 231
The system assigns Call Park codes to calls in sequence, from the lowest to the highest, until all
the codes are used. The use of different of codes ensures a call reaches the right person, especially
when more than one incoming call is parked.
The highest call number (the Call Park prefix followed by 25) is used by model 7000 and 7100
telephones, analog telephones, or devices connected to the system using an ATA2. Analog
telephones or devices cannot use the other Call Park codes.
When parking a code on an analog telephone, the call is parked on the highest park code. When
retrieving a call, any phone can retrieve the call by entering the park code.
Calls are retrieved by pressing the intercom button and dialing the retrieval code. On model 7000
and analog telephones, pick up the receiver, if the call is parked by the analog phone, use the
<parkcode>25; otherwise, use <parkcode><parknumber>.
You also need to program the park timeout. The park timeout determines when external parked
calls that are not answered return to the originating telephone. See the Device Configuration
Guide (NN40020-300) for information on programming park timeout.
You can disable Call Park by setting the Park prefix to None.
• External line access code: If the DN length is changed, and the changed DNs conflict with the
external line access code, the setting changes to None.
• Direct dial telephone: Another direct dial telephone, an extra dial telephone, can be assigned
for each schedule in Services programming.
If the DN length is changed, and the changed DNs conflict with the Direct dial digit, the
setting changes to None.
• Public/Private Auto DN: The length of the Auto DNs are the same as the Public or Private
Received Number Lengths specified under Configuration > Telephony > Dialing Plan. The
public/private Auto DN is cleared if the corresponding Received Number Length is changed.
• Public/Private DISA DN: The length of the DISA DNs are the same as the Public or Private
Received number length specified under Configuration > Telephony > Dialing Plan. The
public/private DISA DN is cleared if the corresponding Received number length is changed.
NN40020-603
Chapter 24 Dialing plans 233
Calls tandeming to the public network through the private network need to retain their dialing
protocol throughout the private network. This means that the BCM node receives a call from an
M1 node tagged as a local call and recognizes the call intended for the public network, but also
recognizes the call that needs to maintain the local call tag until it gets to the BCM node that is
directly connected to the PSTN. This is accomplished by ensuring that the destination code, which
starts with this access code, passes the call on using the route designated with the correct call type.
Figure 70 charts this process.
Meridian user
Dialout: 9-823-2222
823-2222
Dialout: <local call>-823-2222
Local
PSTN
Dialout: 9-823-2222
The system knows 9823 is the route to the next system and
routes the call through private network.
Calls coming in from the public network need to be translated to their private network destination
before routing/tandeming through the private network. In this case, the route used is defined with
the call type of Private.
• Two entries will be predefined in North America, but you can remove these defaults.
• Each entry consists of an equal access identifier code prefix (one to six digits) and a carrier
identification code length (one digit, 1 to 9).
NN40020-603
Chapter 24 Dialing plans 235
• deciding which line pool to use according to the time and day
You can set up routing to take advantage of any leased or discounted routes using information
supplied by the customer. The system cannot tell what lines are cheaper to use.
For Call-by-Call service selection (PRI only), the installer defines destination codes for various
call types over PRI lines (for example, Foreign Exchange, TIE Trunk, or OUTWATS). The user
dials a number using the intercom button without entering any special information. For more
information see “Provisioning for Call-by-Call limits with PRI” on page 238.
Routing configuration
The settings for a call routing include:
• a line pool
• a schedule (optional)
Supporting protocols
The following protocols support Call-by-call limits:
• DMS-100 custom
• DMS-250
Call-by-Call services
BCM supports the Call-by-Call Services listed in Table 39.
Table 39 Call-by-Call Services available on the system
Service Description
Public Public calls connect BCM and a Central Office (CO). BCM supports both
incoming and outgoing calls over the public network. Dialed digits conform to
the standard North American dialing plan (E.164 standard).
Foreign Exchange (FX) Foreign exchange service connects a BCM site to a remote central office
(CO). This provides the equivalent of local service at the remote location.
TIE TIE lines are private incoming and outgoing lines that connect Private Branch
Exchanges (PBXs) such as another BCM.
OUTWATS Outward Wide Area Telecommunications: This outgoing call service allows a
BCM user to call telephones in a specific geographical area referred to as a
zone or band. Typically, a flat monthly fee is charged for this service.
INWATS Inward Wide Area Telecommunications: This long-distance service allows a
BCM user to receive calls originating from specified areas without charge to
the caller. A toll-free number is assigned to permit reverse billing.
International INWATS An international long-distance service that allows a BCM user to receive
international calls originating from specified areas without charge to the caller.
A toll-free number is assigned to permit reverse billing.
Switched Digital This service provides premises-to-premises voice and data transport with call
management and monitoring features.
Nine Hundred This service is commonly referred to as fixed-charge dialing.
Private Private incoming and outgoing calls connect BCM to a virtual private network.
Dialed digits can conform to the standard North American dialing plan (E.164
standard) or the dialed digits can use a private dialing plan.
NN40020-603
Chapter 24 Dialing plans 237
• provision a DTM as PRI, if one is not already configured as part of the system
• select a protocol
• program routes that use the PRI pools, see “Configuring call routing” on page 234.
• Select Configuration > Sets > All DNs to assign the line pool.
• Select Configuration > Telephony > Dialing Plan > Routing to assign a pool for routing,
and assign the service type and service id, if required.
• Select Configuration > Telephony > Dialing Plan > Loops > Call-by-Call Limits tab to
specify the minimum and maximum values for the pools.
Note: This type of routing applies only to those PRI trunks set with a
protocol of NI, DMS-100, DMS-250 or 4ESS.
NN40020-603
Chapter 24 Dialing plans 239
The service identifier (SID) depends on the selected service type (for example, with
NI-2 protocol).
When you select or change a PRI protocol, the Service Type and Service ID fields automatically
clear for each entry in the routing table for that PRI.
NN40020-603
Chapter 24 Dialing plans 241
Deciding on a code
When deciding on which digits to use to start your destination codes, consider the following:
• Ensure that the digit or digits you want to start your destination codes with do not match any of
the access codes, including the line pool codes that already exist in your system.
You may find that you need to delete line pool codes and create a route and destination code
instead. This could occur if you want to set up fallback to a public line, for instance. If the
public line is accessed by a line pool code, you would have to change access to a route so you
could create a fallback schedule with the destination code used for the primary line (or lines, if
you have more than one outgoing line pool that requires fallback).
• Decide how much of the common part of a dial string you want your users to have to dial, and
how much you can put in the dial string.
• If you want specific dial strings to use specific routes, map these out first.
For instance, if you want users to dial between BCMs over VoIP lines, you create destination
codes specific to those systems that use the VoIP line pool, using the digits with which the
users are familiar. You can then create a unique destination code for the call you want to route.
Example: If users are used to dialing 9-1-555-1234-<DN number> to reach another system
(whose DN codes start with 6), you create a destination code of 915551236A, using the VoIP
line pools (users dial the destination code plus the DN of the telephone they want to reach on
the other system). The letter A at the end of the code represents any number from 0 to 9 which
is not used by any other destination code.
If you need to use PSTN lines for a specific connection on the other system, you can create a
destination code specific to that destination number and attach it to the route set up with the
PSTN line pool (for example, 915551236333, 6333 being the DN of the device on the other
system. When the user dials that specific number, the call will always go over the PSTN line).
Note that by entering this code, users dialing with the code in the previous paragraph could
never dial any DN that started with 63XX.
• If you want to use VoIP lines as your main lines, but you want to program one or more PSTN
lines as fallback lines, you need to configure the routing and routing schedules so that the user
dials the same number, regardless of which routes get used. You use the external number
dialout string and absorb digits fields under the schedules in Destination code programming
for this purpose.
• If a company wants to use VoIP lines between sites for interoffice calls, but not necessarily for
all the voice traffic, they can configure specific destination codes for the VoIP routes. In this
case, the destination code contains the same digits as a user would dial for a PSTN line, thus,
making the shift transparent to the user and, at the same time, ensuring that the most
economical route is being used. Depending on how many exceptions there are, you can use the
wild card at the end of the string to save yourself from the necessity of entering a number of
destination codes with the same leading digits.
The digit absorption setting (Absorbed Length) applies only to the destination code digits.
When the Absorbed Length is at 0, the actual digits dialed by a caller are preserved in the dialout
sequence. As you increase the absorbed length the equivalent number of digits are removed from
the beginning of the destination code.
NN40020-603
Chapter 24 Dialing plans 243
When a user dials, and the telephone cannot capture the preferred line (First Route), the system
tries each successive defined route (Second Route, then Third Route). If none of these routes have
available lines, the call reverts to the Normal mode. When the call switches from the preferred
routing mode (First Route, Second Route, Third Route) to Normal mode, the telephone display
flashes an “expensive route” warning. VoIP trunking uses a similar process for setting up fallback
from the VoIP trunk to a PSTN line.
Note: Overflow routing directs calls using alternate line pools. A call
can be affected by different line filters when it is handled by overflow
routing.
NN40020-603
Chapter 24 Dialing plans 245
IP network
BCM50 B
BCM50 A
PSTN
In a network configured for PSTN fallback, there are two connections between a BCM and a
remote system.
• The fallback line is a PSTN line, which can be the public lines or a dedicated T1, BRI, PRI or
analog line, to the far-end system.
When a user dials the destination code, the system checks first to see if the connection between the
two systems can support an appropriate level of QoS. If it can, the call proceeds as normal over the
VoIP trunk. If the minimum acceptable level of QoS is not met, the call is routed over the second
route, through the PSTN line.
For PSTN fallback to work, you must ensure that the digits the user dials will be the same
regardless of whether the call is going over the VoIP trunk or the PSTN. In many cases, this
involves configuring the system to add and/or absorb digits.
NN40020-603
247
Chapter 25
Dialing plan: Routing configurations
This following describes how you can configure the lines and loops to allow system users to dial
out of the system over a public or private network.
The following paths indicate where to access the route lines and loops in Element Manager and
through Telset Administration:
• Element Manager: Configuration > Telephony > Dialing Plan > Routing
• Telset interface: **CONFIG > Services > Routing Service > Routes
Prerequisites
Complete the following prerequisites checklist before configuring the modules.
Media bay modules/VoIP trunks are installed and configured.
Create an access code/route map to understand how the numbering
works for the system.
NN40020-603
Chapter 25 Dialing plan: Routing configurations 249
In Table 43, 4 is used as the initial digit for the coordinated dialing plan, but 5, or 6 can also be
used for this purpose.
3 Set up the Normal schedule with the route number you defined in step 1.
An office can have leased lines or private network trunks that provide cheaper to long distance
calls by routing through the dedicated lines to remote systems, then using the local PSTN from that
system to make the call. The routing should take place automatically when the number of the
outgoing call begins with 1.
NN40020-603
Chapter 25 Dialing plan: Routing configurations 251
If you do not use wild cards, you would need to create a separate destination code for each unique
dialout, as shown in Table 45.
If you use the wild card character A (ANY), you can reduce the number of destination codes you
require to two, as shown in Table 46.
]]\
Tips: To minimize the effort involved in preparing destination codes, set the digit
absorption to 0. When digital absorption is set to 0, the actual digits dialed by a caller are
preserved in the dial-out sequence. The need to program a dial out sequence as part of the
route depends on the required dialout.
NN40020-603
Chapter 25 Dialing plan: Routing configurations 253
Note: You must also ensure that the route correctly absorbs or passes dialed digits so that
the number dialed for each line is the same from the user perspective.
When a user dials, and the telephone cannot access the preferred line (First Route), the system tries
each successive defined route (Second Route, then Third Route). If none of these routes have
available lines, the call reverts to the Normal mode. When the call switches from the preferred
routing mode (First Route, Second Route, Third Route) to Normal mode, the telephone display
flashes an “expensive route” warning.
Note: Overflow routing directs calls using alternate line pools. A call can be affected by
different line filters when it is handled by overflow routing.
VoIP trunking uses a similar process for setting up fallback from the VoIP trunk to a PSTN line.
This following deals with applying the programming in network situations.
NN40020-603
Chapter 25 Dialing plan: Routing configurations 255
Note: Carrier code service must be supported from the Central Office.
NN40020-603
Chapter 25 Dialing plan: Routing configurations 257
Calls tandeming to the public network through the private network need to retain their dialing
protocol throughout network. This means that a call from an M1 node tagged as a local call gets
received by the local node and is recognized as a call intended for the public network, but also as a
call that needs to maintain the local tag until it gets to the local node that is directly connected to
the PSTN. This is accomplished by ensuring that the destination code, which starts with this access
code, passes the call on using the route designated with the correct DN type. Refer to “Setting up a
route through a dedicated trunk” on page 250.
Calls coming in from the public network need to be translated to their private network destination
before routing/tandeming through the private network. In this case, the route used is defined with
the DN type of Private.
Figure 80 charts the process for a call tandeming through a BCM to the local public network.
IP Phone
Dialout: 9-823-2222
The system knows 9823 is the route to the next system and
routes the call through private network.
NN40020-603
259
Chapter 26
Dialing plan: Routing and destination codes
A large system usually requires a number of destination codes to ensure that calls are directed to
the correct trunks, either on the private or public network.
The following paths indicate where to access destination codes in Element Manager and through
Telset Administration:
• Element Manager: Configuration > Telephony > Dialing Plan > Routing
• Telset interface: **CONFIG > Services > Routing Service > Routes
The following panels allow you to:
• create routes
• create destination codes for the routes, and the Normal schedule
Routes
The first step to setting up call routing is to define line pools into uniquely named routes. A route
can be used with more than one destination code, but a line pool should only be used with one
route.
Figure 81 illustrates the Routes tab.
NN40020-603
Chapter 26 Dialing plan: Routing and destination codes 261
Table 48 lists the service/DN type choices available for PRI lines.
Table 48 PRI Service type/DN type values
Destination codes
Once you have the routes configured, set up the dialing plan destination codes that allow users to
access the routes. You can use a route for more than one destination code, as you may require
different codes for the same route to define restrictions or special call designators.
Figure 82 illustrates the Destination codes panel.
NN40020-603
Chapter 26 Dialing plan: Routing and destination codes 263
Note: The destination codes must not conflict with the following:
• park prefix
• external code
• direct dial digit
• Auto DN
• DISA DN
• Private access code
• line pool codes
• telephone DN
• public target line received digits
• other routing codes
NN40020-603
Chapter 26 Dialing plan: Routing and destination codes 265
Tips: Entries can match destination or access codes for outgoing lines.
The following paths indicate where to configure the Second Dial Tone in Element Manager and
through Telset Administration:
• Element Manager: Configuration > Telephony > Dialing Plan > Routing > Second Dial
Tone
• Telset interface: **CONFIG > Services > Routing Service > 2nd Dial Tone
Actions
Note: Second dial tone is not provided on outgoing lines for remote
access users and for ISDN terminal users when the Call Transfer feature
is activated.
NN40020-603
267
Chapter 27
Dialing plan: System settings
The panels described in the following information define various common system settings that
affect, or that are affected by, number planning.
The following paths indicate where to access system settings for dialing plans in Element Manager
and through Telset Administration:
• Element Manager: Configuration > Telephony > Dialing Plan > General
• Telset interface: **CONFIG > System Programming > Access codes; System Programming
> General > Direct Dial sets
NN40020-603
Chapter 27 Dialing plan: System settings 269
Access Codes
Park prefix None The Park prefix is the first digit of the call park retrieval code that
<one-digit a user enters to retrieve a parked call. If the Park prefix is set to
number> None, calls cannot be parked.
Refer to “Call Park codes” on page 273 before choosing a
number.
SWCA note: If this field is set to None, the system-wide call
appearance (SWCA) feature will not work. Refer to “System
Wide Call Appearances” in the Device Configuration
Guide (NN40020-300).
External code None The External code setting allows you to assign the external line
<one-digit access code for 7100 and 7000 digital phones and analog
number> telephones attached to ATA 2s or to analog modules to access
external lines. Note: Model 7000 phones are supported in Europe
only. When the caller picks up the handset, the system tone
sounds. The caller then enters this number to access an external
line. Note: This number is overridden by line pool or starting with
the same digit(s).
Refer to “Tips about access codes” on page 272 before choosing
a number.
Change DN
Change DN <button> Click to reidentify a DN.
Note: This method is faster than reidentifying the DNs under
Configuration > Telephony > Dialing Plan > DNs
Direct Dial
Direct Dial digit None The Direct dial digit setting allows you to specify a single
<one-digit system-wide digit to call a direct dial telephone.
number>
Define Direct Dial Sets: Refer to “To define a direct dial set” on page 270.
Set <1-5> This tags the telephone to the system.
Type Internal This is the type of number for the direct-dial set.
External
None
Internal DN DN The DN number of the telephone to be designated as the direct
dial set. (Internal sets).
External No. <external dial The actual phone number, including destination codes, of the
string> direct dial set (External sets).
Note: The BCM cannot verify that the number you assign as an external direct
dial set is valid. Check the number before assigning it as a direct dial set by
calling the direct dial you have assigned.
DN length constraints
NN40020-603
Chapter 27 Dialing plan: System settings 271
Warning: If your system is running with a PBX telephony template, the Public and
Private received number length are set to 3 (digits) at start-up. Increasing the DN length
after system startup does not change these digits, so you will need to manually change the
Public and Private received number length.
Private OLIs are automatically assigned to the DN records if the DN length and the Private
received number length are the same. If this changes, the Private OLIs are cleared, or are
not assigned (PBX template).
Network note: If your system is part of a private network, ensure that you confirm the
dialing plan for the network before changing this length. If you change the length, ensure
that you check all DN-related settings after the change.
Note: If the line pool code and the external code start with the same digit, the
line pool code programming supersedes the external code.
• If the DN length is changed, and the changed DNs conflict with the external line access code,
the setting changes to None.
• Direct dial telephone: Another direct dial telephone, an extra dial telephone, can be assigned
for each schedule in Services programming.
If the DN length is changed, and the changed DNs conflict with the Direct dial digit, the
setting changes to None.
• Public/Private Auto DN: The length of the Auto DNs are the same as the Public or Private
Received Number Lengths specified under Configuration > Telephony > Dialing Plan >
Public or Private. The public/private Auto DN is cleared if the corresponding Received
Number Length is changed.
NN40020-603
Chapter 27 Dialing plan: System settings 273
• Public/Private DISA DN: The length of the DISA DNs are the same as the Public or Private
Received number length specified under Configuration > Telephony > Dialing Plan >
Public or Private. The public/private DISA DN is cleared if the corresponding Received
number length is changed.
Note: The park prefix must not conflict with the following:
• park prefix
• external code
• Direct dial digit
• Private access code
• Public/Private Auto DN
• Public/Private DISA DN
• line pool code/destination code
• telephone DN
Note: Other programmable settings may affect what numbers appear in the window
during programming. Although the numbers 0 to 9 are valid Park prefix settings, some
may already be assigned elsewhere by default or by programming changes.
If the DN length changes, and the changed DNs conflict with the Park prefix, the setting
changes to None.
The system assigns Call Park codes to calls in sequence, from the lowest to the highest, until all
the codes are used. A round-robin method means the use of different of codes ensures a call
reaches the right person, especially when more than one incoming call is parked.
The highest call number (the Call Park prefix followed by 25) is used by model 7000 and 7100
telephones, analog telephones, or devices connected to the system using an ATA2. Analog
telephones or devices cannot use the other Call Park codes.
Calls are retrieved by pressing the intercom button and dialing the retrieval code. On model 7000
and analog telephones, pick up the receiver, and then dial <parkcode>25.
You also need to program the delay timer that determines when external parked calls that are not
answered return to the originating telephone. Refer to “Timers” in the Device Configuration
Guide (NN40020-300).
You can disable Call Park by setting the Park Code to None.
NN40020-603
275
Chapter 28
Dialing plan: Public network
The panel described in the following information defines the number planning required for calls
exiting the system to the public telephone network.
The following paths indicate where to access the dialing plan for public network in Element
Manager and through Telset Administration:
• Element Manager: Configuration > Telephony > Dialing Plan > Public Network
• Telset interface: **CONFIG > System Prgrming > Dialing Plan > Public Network
NN40020-603
Chapter 28 Dialing plan: Public network 277
Note: If the values for Public Network DN length are set too short, digits will
be stripped from the dialing string. Conversely, if the values are set too large,
the dialing will take longer to process.
The Public Network DN Lengths/Carrier Codes panel allows you to define DN prefixes and define
the length of the prefixes for public dialing. Figure 87 illustrates this panel.
• Each entry consists of a DN prefix string (1 to 10 digits) and a length value (two digits, 1 - 25).
• Several entries are predefined in the North America profile. These defaults can handle most
regions in North America without the need for additional programming. If required, you can
remove or modify these entries.
• The table always contains one default entry. You cannot remove this entry. You can only
modify the length parameter associated with this entry. The default entry specifies the length
of any dialing string that does not match one of the other table entries.
Modifying a DN prefix
You can only change the DN length for a prefix. To change the prefix itself, delete the existing
prefix and enter a new one.
1 On the Public Network DN Lengths panel, click the DN prefix you want to modify.
2 Click in the DN length field for that prefix and enter the new value.
NN40020-603
Chapter 28 Dialing plan: Public network 279
Deleting a DN prefix
Note: Dialing prefixes are used system-wide for users to make calls. Delete
prefixes with caution.
1 On the Public Network DN Lengths panel, click the DN prefix you want to delete.
2 Click Delete.
3 Click OK on the confirmation dialog.
Carrier Codes
The Carrier Codes table allows you to enter a maximum of five carrier code prefixes.
• Entries may be predefined for a specific country profile, but you can remove these defaults.
• Each entry consists of an equal access identifier code prefix (one to six digits) and a carrier
identification code length (one digit, 1 to 9).
NN40020-603
281
Chapter 29
Dialing plan: Private network settings
The panels described in the following information define various system settings that affect or that
are affected by number planning for private networks.
The following paths indicate where to access the dialing plan for private networks in Element
Manager and through Telset Administration:
• Element Manager: Configuration > Telephony > Dialing Plan > Private Network
• Telset interface: **CONFIG > System Prgrming > Dialing Plan > Private Network
Panels/Subpanels Tasks/Features
“Private Network dialing plan settings” on page 281
“Private Network Settings” on page 282 “Outgoing private calls routing” on page 286
“Private Network - MCDN network (PRI
SL-1, PRI ETSI, VoIP)” on page 283
“ETSI-specific network features” on
page 286
“Configuration notes and tips” on page 270
Also refer to:
• “Dialing plan: System settings” on page 267
• “Dialing plan: Public network” on page 275
• “Private networking: Basic parameters” on page 315
• “Private networking: Using destination codes” on page 339
• “Private networking: PRI Call-by-Call services” on page 343
• “Private networking: PRI and VoIP tandem networks” on page 323
• “Private networking: MCDN over PRI and VoIP” on page 297
• “Private networking: MCDN and ETSI network features” on page 319
• “Private networking: DPNSS network services (UK only)” on page 331
Click the navigation tree heading to access general information about dialing plans.
• “Private Network - MCDN network (PRI SL-1, PRI ETSI, VoIP)” on page 283
Note: When configuring a private network, ensure the numbering plan does
not conflict with the public telephone network. For example, in North
America, using “1” as an access code in a private network, conflicts with the
PSTN numbering plan for long distance calls.
NN40020-603
Chapter 29 Dialing plan: Private network settings 283
NN40020-603
Chapter 29 Dialing plan: Private network settings 285
TRO <check box> Trunk Route Optimization occurs during the call
setup. This feature finds the most direct route through
the network to send a call between nodes.
TAT <check box> Trunk anti-tromboning works during an active call to
find the optimum routing.
These features require compatible programming on the remote system.
Use Table 57 to determine the settings you want to define network services feature availability.
Use Table 58 to determine the settings you want to define network services feature availability.
Table 58 ETSI, MCDN, and VoIP trunk private network settings fields
NN40020-603
Chapter 29 Dialing plan: Private network settings 287
NN40020-603
289
Chapter 30
Public networking: Setting up basic systems
Public networks are the connection between the BCM and the public network (PSTN network).
This following provides examples of two basic types of systems.
CO line 1
CO line 2
All telephones CO line 3
are assigned
access to the line CO line 4
pool for outgoing
calls
Receptionist
Assigned all lines/
appearance and
ring
Programming:
Lines
• Lines are assigned individually and as a line pool to the central answer position (set to appear
and ring).
NN40020-603
Chapter 30 Public networking: Setting up basic systems 291
Programming:
Lines
• Assign lines as auto-answer. Note: DID lines are incoming only. PRI lines can be used for both
directions.
• Configure target lines for each telephone, indicating public received number (769-4006 in the
example above).
Routing
• Set call forward no answer and call forward on busy to attendant or voice mail system, if
available.
NN40020-603
293
Chapter 31
Public networking: Tandem calls from private node
If your system is connected by a private network to another system that does not have PSTN line
access, or which is not located within the local dialing range, you can set up a routing plan that
allows the users of the private network to dial into your system, and through your system to the
PSTN network. This type of call feature is referred to as tandem dialing. Refer to “Programming
for tandem dialing” on page 293.
The reverse is also true. You can set up routing so that calls from the PSTN can be passed through
your system and over the private network to the remote node. Also refer to “Private networking:
PRI and VoIP tandem networks” on page 323.
Dialing plan/Routing:
• Create destination codes for the private network node, and the public network, using the
appropriate routes. On public route, drop the public network access code off the dial string. On
the private route, drop the private network access code off the dial string.
Telephones:
• System telephones are not involved in tandem transactions. However, for calls destined for the
system, ensure that the telephones have the appropriate line/line pool assignments to receive
calls from both the public and private networks.
• select an outgoing line to access features that are available on the private network
• call into BCM and select an outgoing TIE line to access a private network
• call into BCM and select an outgoing central office line to access the public network
NN40020-603
Chapter 31 Public networking: Tandem calls from private node 295
• call into BCM and select an outgoing TIE line to access other nodes in a private network
• call into BCM and select an outgoing central office line to access the public network
NN40020-603
297
Chapter 32
Private networking: MCDN over PRI and VoIP
The following describes how to network BCMs together in a private network using PRI lines with
MCDN protocol. When BCMs are networked with other call services, such as Meridian 1, using
the MCDN protocol, the network can also support centralized voice mail.
This chapter discusses MCDN networking based on North American trunks (PRI SL-1).
ETSI-QSIG private networking is configured very similarly, although network features may be
supported slightly differently.
The following describes the different aspects of MCDN private networking.
• provide the correct software version to allow MCDN features. If your Meridian system
administrator cannot confirm this, call your technical support center (TSC) or
1-800-4NORTEL.
• provide routing tables that direct incoming calls to the correct nodes on the network, including
DID calls from the public network
• recognize the destination code (usually 9) that indicates a public network call, regardless of
where in the network the number was dialed from
Note: For MCDN over VoIP trunks, the Meridian uses the IPT trunk
card. Both systems must have remote gateways pointed to correct system
types and protocols. Refer to “Configuring VoIP trunk gateways” on
page 381 for information about Remote Gateways for the BCM system.
Software requirements
These additional software packages may be required to activate all the options on the Meridian.
For a new M1 (option 81C, 61C or 51C) on X11 Rls 25, the following additional packages are
required to provide the software options listed above:
• SW0059B
• SW0052D
• SW0221C
• SW0051B
For a new M1 Option 11C or 11C Mini or X11 Rel. 25, order one of the following:
NN40020-603
Chapter 32 Private networking: MCDN over PRI and VoIP 299
MWI allows the voice mail host system (Meridian 1) that is designated to receive messages to
notify a target telephone on the BCM of a call waiting using the native MCDN MWI or MIK/MCK
message indicators on the Meridian telephones. This feature works for both Nortel and third-party
voice mail systems. Messages are received at a centralized location, to a predetermined telephone,
where they are processed and forwarded to the target telephone.
MWI allows the user to reply or call back to the message center. The procedure for retrieving
messages is described in the Telephone Features Handbook.
Figure 95 demonstrates how the Meridian responds when a call is forwarded to a CallPilot
mailbox.
MCDN
Telephone A Message
Telephone B
Original call
Programming notes
Configuration > Telephony > Sets > Active sets > Line
access > Line assignment:
• assign target line to each set
• in target line, select VMsg
NN40020-603
Chapter 32 Private networking: MCDN over PRI and VoIP 301
Camp-on
A call received by the Meridian attendant can be assigned to a telephone anywhere in the MCDN
network, when the following situations are valid:
Line XXX
Break-in
The Meridian attendant can use the break-in feature to interrupt an ongoing call from a telephone
in the system.
Figure 97 demonstrates the call path for a Meridian attendant to break into a call between
telephones in the system.
Meridian 1
BCM
Telephone A
(rings busy)
Attendant
Break-in path
• Target system telephone is busy but still has a free intercom or line key.
• prime set is also busy, with no free key, and with DND turned on.
• Attendant capability is high (2), and higher than either the target telephone or the caller the
target telephone owner is busy with.
Only post-dial break-in is supported by MCDN:
1 Attendant dials destination number.
2 If a busy tone is heard, the attendant presses the BKI button.
Attendant is given access to the conversation.
You can set a level of priority that will determine if a telephone will allow an attendant to break in.
This is referred to as setting the Intrusion level. Use the following rules to configure the break-in
feature.
• Set the Intrusion level for each telephone (under Capabilities on the DN record). Refer to
“Capabilities tab” in the Device Configuration Guide (NN40020-300).
How the intrusion hierarchy works:
— Break-in is allowed if Attendant telephone is High and caller telephone is Medium.
— Break-in is not allowed if Attendant telephone is Medium and caller telephone is high.
NN40020-603
Chapter 32 Private networking: MCDN over PRI and VoIP 303
• BCM Programming
— Configure the system DN length to match the DN length used in the rest of the private
network.
— Program the private Route: Type=Private, Dial=None.
— Program the public Route: Type=Public, Dial=None.
— Enable the MCDN Supplementary Services; TRO=selected, ICCL=selected,
TAT=selected.
— Program telephones with a target line that specifies the system DN of the telephone in the
Private received number field.
Note: If you have public DNs set up for your telephones that are
different from the system-assigned DN, each telephone needs to use the
public and private received digits on the target line.
• Meridian 1 Programming
— Program the system PNI and the PNIs for the routes.
— Program the Meridian voice mailboxes (if required).
— Enable the MCDN Supplementary Services: RCAP=[ND2,TRO,MWI], NASA=YES.
Set up the specific programming the system requires for the dialing plan. Refer to the following
tables.
UDP-specific programming
BCM UDP programming
• Private Dialing Plan: Type=UDP, HomeLoc=<three-digit prefix>
• Private Access Code <unique code>
• Private DN length <total of Private Access Code + Location Code + DN length>
Example: if dialing string is 6 393 2222, then set private DN to 8
• Program the DestCodes for AccessCode plus the ESN, absorb the AccessCode.
the other nodes Example: For AccessCode=6; DestCode=6393[Absorb=1]
M1 UDP programming
• Private Access Code Overlay 86, LD 86 To change Private Access
REQ: PRT Code:
CUST: 0 Overlay 86, LD 86
FEAT: ESN REQ: CHG
CUST: 0
FEAT: ESN, keep pressing
until you reach the AC1 prompt
At the AC1 prompt, make your
choice
• Check UDP programming Overlay 90, LD 90
REQ: PRT
CUST: 0
FEAT: NET
TYPE: LOC
LOC: press enter, all the programmed location codes are listed
HLOC is the home location of the M1
• Program UDP values to Overlay 90, LD 90
route REQ: CHG
CUST: 0
FEAT: NET
TYPE: AC1
LOC: (enter a number)
RLI: (enter the RLI corresponding to the route)
NN40020-603
Chapter 32 Private networking: MCDN over PRI and VoIP 305
CDP-specific programming
BCM CDP programming
• Private Dialing Plan: Private Type=CDP
Access Code <unique
code>.
• Private DN length <system DN length>
• PNI <number assigned from M1 (1-127)>
• Program the DestCodes for use Steering code as part of dial string
the other nodes
M1 CDP programming
• PNI LD 16, RDB - PNI in M1
programming
LD 15 - Net - PNI in M1
programming set to PNI of
switch
• Distant Steering Codes Overlay 87, LD 87
REQ: PRT
CUST: 0
FEAT: CDP
TYPE: DSC (Distant Steering Code)
DSC: press enter (lists all DSC programmed)
• Check RLI (Route Line Overlay 86, LD 86
Index) REQ: PRT
CUST: 0
FEAT: RLB
PLI: press enter (displays all the RLIs)
• Program new CDP value to Overlay 87, LD 87
route REQ: CHG
CUST: 0
FEAT: CDP
TYPE: DSP
DSC: enter number (enter common BCM system number, for
example if DNs are 4XX, enter 4)
RLI: enter the RLI that corresponds to the route
M1 programming in LD 17
• NASA selected
• NCRD selected
Verifying NASA is Active
• Overlay 22, LD 22
• REQ: PRT
• TYPE: ADAN DCH (slot number)
• NASA should be selected
If NASA is not on: Disable the D Disable the loop Program the D channel
channel • Overlay 60, LD • Overlay 17, LD 17
• Overlay 96, LD 60 • REQ: CHG
96 • REQ: CHG • TYPE: ADAN
• REQ: CHG • TYPE: DISL (slot • ADAN: CHG DCH (slot
• TYPE:DISDCH number) number)
• Keep pressing enter until
you get to NASA
• TYPE: yes
• TYPE: end
Verifying NCRD If NCRD is set to no
• Overlay 20, LD 20 • Overlay 16, LD 16
• REQ: PRT • REQ: CHG
• TYPE: TIE • TYPE: RDB
• CUST: 0 • CUST: 0
• Route: Enter the route defined in LD 20 • ROUT: (route number) from LD 20
• Keep pressing enter until all values are • Keep pressing enter until you get NCRD and
displayed. Check if NCRD is yes. type Yes
• Keep pressing enter until you get the REQ
prompt again
• TYPE: end
NN40020-603
Chapter 32 Private networking: MCDN over PRI and VoIP 307
DN: 4221
Voice mail or
Auto Attendant PRI (public protocol)
Central
Office
This example could represent a large head office (the Meridian 1) connected to several smaller
branch offices (the two BCMs). In this network, only the head office has trunks connected to the
public network.
The branch offices access the public network through the PRI to the head office. This
configuration allows for cost savings by consolidating the public access trunks. Users at all three
locations access the public network by dialing 9, followed by the public number. For example, a
user in the West End branch might dial 9-555-1212 (for a local call) or 9-1-613-555-1212 (for a
long-distance call). The BCM routing table routes these public calls to the Meridian 1. Routing
tables at the Meridian 1 will then select an appropriate public facility for the call.
Note that the Private Network Identifier (PNI) is programmed at each end of the links. The PNI
identifies the BCM to the Meridian 1 system.
Routing is set up such that network calls are made by dialing a four-digit private network DN. For
example, if a user in the West End branch wishes to call a user in the East End branch within the
private network, they dial 6221. Figure 98 illustrates this example.
The implications on the configuration on each node to access the PSTN through one network node:
• Each node must have the Private Network Access Code set to the value 9.
• Each node must have destination codes that match the Private Network Access Code plus
digits corresponding to calls terminating in the local PSTN. For example, if the Private
Network Access Code is 9, the node in Ottawa would require a destination code of 91613.
Similarly, Toronto would require the following destination code: 91416.
NN40020-603
Chapter 32 Private networking: MCDN over PRI and VoIP 309
BCM module settings: Table 60 lists the module settings that are required to set up the network
described in Figure 98.
BCM dialing plan settings: Table 61 lists the dialing plan settings that are required to set up the
network described in the figure in the previous section.
BCM routing information: Table 62 lists the lines and routing information required to set up the
network shown in Figure 98.
NN40020-603
Chapter 32 Private networking: MCDN over PRI and VoIP 311
Intranet
VoIP trunk Router
Router
Company
server
2004
IP telephone
• Ensure SL-1 (MCDN) keycodes are entered on the BCM and the PRI line is set up for SL-1
protocol.
NN40020-603
Chapter 32 Private networking: MCDN over PRI and VoIP 313
For a detailed description of setting up fallback, refer to “Setting up VoIP trunks for fallback” on
page 391.
Note: Features for ETSI Q.sig are basic compared to MCDN. Only
basic call and calling number is supported as opposed to the many
MCDN features.
PRI/BRI
PRI/BRI ETSI QSIG ETSI QSIG
PBX BCM EastEnd
BCM branch
West End branch
DN 4221
Central
Office
Settings for some of the hardware parameters for the ETSI QSIG networking example shown
above are as follows.
NN40020-603
315
Chapter 33
Private networking: Basic parameters
The following provides an overview of the values in the system that affect private networking,
including:
• T1: E&M
• VoIP: MCDN
BCM systems can be networked together using TIE lines or E&M connections. Larger networks,
or networks that are geographically spread out, can be chained together through faster PRI SL-1
connections or with voice over IP (VoIP) trunk lines. SL-1 lines and VoIP trunks also offer the
opportunity to use the MCDN protocol, which provides enhanced trunking features and end-to-end
user identification. If a Meridian 1 is part of the MCDN network, the network can also provide
centralized voice mail and auto attendant off the Meridian.
MCDN note: MCDN networking requires all nodes on the network to use a common Universal
Dialing plan (UDP) or a Coordinated Dialing Plan (CDP). Refer to “Dialing plan: Public
network,” on page 275 and “Dialing plan: Private network settings,” on page 281.
Keycode requirements
Keycodes are required to activate the protocols that are used to create private networking,
including:
• an MCDN keycode, if you want to use the MCDN protocol between the systems
You must purchase and install these keycodes before you can create any of the networks described
in this chapter. Consult with your Nortel distributor to ensure you order the correct keycodes for
the type of network you want to create.
NN40020-603
Chapter 33 Private networking: Basic parameters 317
The services provided within networks is based on the type of trunks and the protocols assigned to
the trunks. All trunks within the network should be running the same protocols, to provide a
consistent look and feel to the users.
These are the main types of private networking, listed from the simplest to the more complex PRI/
ETSI and VoIP routing using MCDN protocols:
• “Private networking: Using destination codes,” on page 339
• “Private networking: PRI Call-by-Call services,” on page 343
• “Private networking: PRI and VoIP tandem networks,” on page 323
• “Private networking: MCDN over PRI and VoIP,” on page 297
• “Private networking: DPNSS network services (UK only),” on page 331
NN40020-603
319
Chapter 34
Private networking: MCDN and ETSI network features
If the MCDN protocol is added to a PRI SL-1 or VoIP private network, the network provides
additional network-management features and provides available centralized voice mail features to
all nodes on the network.
ETSI lines (UK profile) also have network features available from the central office that can be
enabled or disabled.
The following describes the different aspects of SL-1 and MCDN private networking.
NCRI provides call information in the network when calls are redirected from one system to
another. NCRI builds on the following BCM features:
• Call Transfer
• Call Forward
The ICCL feature piggybacks on the call initiation request and acts as a check at transit PBX
points to prevent misconfigured routes or calls with errors from blocking channels.
To configure ICCL
1 Click Configuration > Telephony > Dialing Plan > Private Network.
2 Locate the Private Network/MCDN subpanel.
3 Select the Network ICCL check box.
4 Click Configuration > Resources > Telephony Resources.
5 From the Modules table, select the required module.
6 Locate the Details for Module subpanel.
7 Click the Trunk Module Parameters tab.
8 Enter the Maximum transits in the Maximum transits field.
TRO finds the most direct route through the network to send a call between nodes. This function
occurs during the initial alerting phase of a call.
To enable TRO
1 Click Configuration > Telephony > Dialing Plan.
2 Locate the MCDN subpanel.
3 Select the TRO check box.
TAT is a call-reroute feature that works to find better routes during a transfer of an active call. This
feature acts to prevent unnecessary tandeming and tromboning of trunks.
To enable TAT
1 Click Configuration > Telephony > Dialing Plan > Private Network.
2 Locate the MCDN subpanel.
NN40020-603
Chapter 34 Private networking: MCDN and ETSI network features 321
• redirect calls over the ETSI ISDN BRI/PRI line to the outside network
NN40020-603
323
Chapter 35
Private networking: PRI and VoIP tandem networks
You can use PRI trunks and VoIP trunks to create a private network between other BCMs. This
tandem network provides you with the benefits of end-to-end name display and toll-free calling
over the PRI or VoIP private link. Each BCM becomes a node in the network.
Refer to the following information about tandem networks:
Public:
Public: Node A Node C 613-763-XXXX
403-761-XXXX
PRI or VoIP line
PRI or VoIP line
Node B
Also refer to “Using VoIP to tandem systems” on page 327 for other examples of tandem systems
using VoIP trunks.
The following tables show the routing tables for Node A and Node C for external and internal
terminating calls.
Table 65 Node A destination code table, external termination
Route Absorb length Destination code (public DNs)
4 (PSTN) 1 91604
3 (Node B) 0 91403762 (Node B)
4 (PSTN) 1 9140376* (not internal network)
4 (PSTN) 1 914037* (not internal network)
4 (PSTN) 1 91403* (not internal network)
4 (PSTN) 1 9* (not internal network)
* This wild card represents a single digit.
NN40020-603
Chapter 35 Private networking: PRI and VoIP tandem networks 325
Table 69 Call originating from the public network to a tandem network (Sheet 1 of 2)
Node A receives it and identifies it as being for node B. Uses private trunk to route it to B.
Incoming interface: Public
Destination: Remote Node
Outgoing interface: Private
Node B receives the call and identifies it as terminating locally. Uses target line to route
call (Private received #).
Incoming interface: Private
Destination: Local (target line)
Node A Node C An external user in Calgary dials a 761-xxxx number which is answered with DISA.
Incoming interface: Public
DN type: Public
Destination: Local (DISA DN)
Node A receives it and identifies it as being for C. Uses the private trunk to route the call
to C.
Incoming interface: (DISA user)
Destination: Remote node
Node C receives the call and identifies it as terminating locally. Uses target line to route
call. (Private received #)
Incoming interface: Private
Destination: Local (target line)
Table 69 Call originating from the public network to a tandem network (Sheet 2 of 2)
Node A Ottawa An external user in Calgary dials a 761-xxxx number which is answered with DISA. User
PSTN enters a CoS password and an Ottawa public network number.
Incoming interface: Public
DN type: Public
Destination: Local (DISA DN)
Node A receives it and identifies it as being for C. Uses the private trunk to route the call
to C.
Incoming interface: Local (DISA user)
Destination: Remote PSTN
Node C receives the call and identifies it as a public number and routes it out over the
local PSTN.
Incoming interface: Private
Destination: Local PSTN
Table 70 Calls originating from the private network within a tandem network (Sheet 1 of 2)
NN40020-603
Chapter 35 Private networking: PRI and VoIP tandem networks 327
Table 70 Calls originating from the private network within a tandem network (Continued) (Sheet 2 of 2)
System System
telephone telephone
BCM50 BCM50
PSTN
(fallback
route)
router router
Intranet
VoIP trunk
2050 IP phone
2004 router
Company IP phone 2004
server IP phone
Remote Office
remote
2004 IP phone
NN40020-603
Chapter 35 Private networking: PRI and VoIP tandem networks 329
Figure 103 demonstrates an example of routing all public calls through one BCM50.
System System
PSTN telephone
telephone
BCM50 BCM50
router router
Intranet
VoIP trunk
2050 IP phone
2004 router
Company IP phone 2004
server IP phone
Remote Office
remote
2004 IP phone
NN40020-603
331
Chapter 36
Private networking: DPNSS network services (UK only)
Programming note: software keys are required to enable DPNSS 1. DPNSS 1 is not available on
all profiles.
The following features are available and can be programmed over DPNSS lines:
• MWI is discussed with central voice mail setup (“Configuring centralized voice mail” on
page 351)
• Diversion Immediate diverts all calls to an alternate telephone. This function is programmed
by the user at their telephone.
• Diversion On Busy diverts all calls to an alternate telephone when a telephone is busy. This
feature is programmed in the Element Manager.
• Diversion On No Reply diverts calls that go unanswered after a specified amount of time. This
feature is programmed in the Element Manager.
• Bypass Call Diversion overrides all call forward features active on a telephone over a DPNSS
line. An incoming call to the telephone will not be forwarded; instead, the telephone will
continue to ring as if call forward were not active. This feature is used to force a call to be
answered at that location. Bypass Call Diversion is a receive-only feature on BCM, and cannot
be used from a BCM telephone.
• Follow-me Diversion is also a receive-only feature. It allows the call forwarded destination to
remotely change the BCM call-forwarding programming (Call Forward All Calls (CFAC)
feature) to a different telephone.
For example, user A forwards all calls to telephone B, a temporary office. Later, user A moves
on to location C. The user does not have to be at telephone A to forward calls to location C.
Using telephone B and Follow-me Diversion, the user can forward calls from A to location C.
Follow-me diversion can be cancelled from the forwarded location.
• Diversion on Busy and Diversion on No Reply cannot be cancelled from the forwarded
telephone. These are programmable only by an installer and not by the user.
• If multiple telephones are programmed to take a call, the first telephone to respond will act. All
other telephones responding are ignored. Therefore, if the first telephone to respond has
Diversion enabled, this feature will be invoked.
• ISDN—all variations supported on ISDN telephones, except Diversion on Busy and CFWD
Busy
Setting Diversion
You set Diversion for DPNSS in the same way as call forward. You will need to enter the end DN
when prompted. You may also need to include the DPNSS 1 routing number.
• Destination or line pool codes are programmed for the DPNSS to Embark link.
NN40020-603
Chapter 36 Private networking: DPNSS network services (UK only) 333
Also, during programming for Call Forward No Answer and Call Forward on Busy, when you
enter the Forward to: digits, the system does a validation check with the switch on the number.
(Configuration > Telephony > Sets, All DNs panel, Line Access tab, and then double-click the
required field to enter the DN).
• For telephones with single line displays, the # key acts as MORE and the * key acts as VIEW
• ATA2/ASM8+—not supported
Setting redirection
The timer used for the network Callback feature is also used for redirection.
• ATA2/ASM8+—supported
• ISDN—not supported
To program IPL
1 Click Configuration > Telephony > Sets.
2 On the panel, locate and click the Capabilities and Preferences tab.
3 Select the DN of the telephone set being programmed.
The Details subpanel for that DN appears in the lower portion of the panel.
4 Click the Capabilities tab.
5 Locate the Intrusion protection level and select the required option from the drop-down menu.
Call offer
Call Offer over DPNSS 1 allows a calling party to indicate to the wanted party that there is an
incoming call available, even though there is no answer button available to present the call on the
telephone.
• model 7000 telephone — associated LED or LCD flashes, and a tone is heard
• ISDN—not supported
Note the following general conditions and restrictions:
• The target line for the telephone must be set to: If busy: busy tone, which is the default.
Refer to “Configuring lines: Target lines” on page 141.
• Call Offer does not work if sent over Manual answer lines. It is recommended that the lines be
left at the default: Auto.
Note: Forward on Busy takes priority over DND on Busy. Call Offer
cannot be accepted by putting an active call on hold.
NN40020-603
Chapter 36 Private networking: DPNSS network services (UK only) 335
Route Optimization
Route Optimization is a DPNSS 1 feature for BCM that allows calls to follow the optimum route
between two end PBXs. This allows efficient use of network resources.
No system programming is required for the feature when BCM is working as a terminating PBX
system. However, BCM must have a private access code programmed that maps to a valid
destination code or line pool code on DPNSS lines. Further, Allow redirect must be set to selected.
For more information, see Capabilities tab” in the Device Configuration Guide (NN40020-300).
Loop avoidance
• a Private Access Code, programmed into the system as part of the destination code table to
prevent conflicts with the internal numbering system. (Configuration > Telephony > Dialing
Plan > Private Network > Private Access Code)
• a Home Location Code (HLC) assigned to each PBX system, and configured as part of the
destination code (a maximum of seven digits). For each HLC, a destination code must be
programmed in the system. (Configuration > Telephony > Dialing Plan > Private Network
> Location code)
• a Directory Number (DNs) assigned to each extension as a line appearance. The DN appears
as the last string segment in a dialed number. In the number 244-1111, 1111 is the DN.
A typical Private Number, using a private access code and dialed from another site on the network,
appears below.
In this networking example, a private network is formed when several systems are connected
through a Meridian M1 and a terminating BCM system. Each site has its own HLC and a range of
DNs. Figure 104 illustrates this example.
Calls are dialed and identified to the system as follows:
• To reach a telephone inside the Private Network, at the BCM site, the user dials the DN of
choice.
• To reach a telephone inside the Private Network, from another site, the user dials HLC + DN.
• To reach a telephone outside the Private Network, the user dials an Access Code + HLC + DN
Each node has its own destination (dest) codes which includes the appropriate access and HLC
codes to route the call appropriately.
Table 71 shows examples of the construction of numbers used when dialing within the example
network. Note that 6 is the Private Access code.
Calling Site LOC/HLC Calling Party Called Site Dialing String Called Party
Number Number
Site A 244 244 1111 Site B 6 668 2222 668 2222
Site B 668 668 2222 Site D 6 848 2222 848 2222
Site D 848 2222 Site D 2229 2229
Site C 496 496 3333 Public DN 9 563 3245 563 3245
NN40020-603
Chapter 36 Private networking: DPNSS network services (UK only) 337
Private
Network
DPNSS DPNSS
Terminating
BCM 50 Site A BCM 50 Site C
DN # 111 DN # 3333
LOC # 244 LOC #496
DPNSS DPNSS
Meridian M1
LOC # 563
BCM 50 Site B
BCM 50 Site D
DN # 2222
DN # 2229
LOC #668
Extension 2222
LOC # 848
Table 105 shows examples of the routing required to set up the network shown in Figure 104. Note
that 6 is the Private Access code.
• When creating HLCs for the nodes in your system, avoid numbering conflicts between
network nodes and internal DNs, Hunt group DNs.
• Program a Private Access Code into your destination routing tables to avoid conflicts with
your internal HLC and dest code dialing plan. For example, if a dialout HLC is 848, but this
number already exists in the BCM system for an extension, the routing tables should add a
Private Access Code to the dest code. If the code is programmed as 6, the dest code becomes
6848. 6848 uses a route to dial out 848 using the DPNSS line pool, allowing the call to be
placed.
Note that a Private Access Code is required only for specific DPNSS features such as
Diversion, Route Optimization, and Redirection.
• Direct Inward Access (DIA) lines allow incoming calls on private circuits to be directed to
telephones without going through the normal call reception. Each DIA line is assigned to one
or more extensions and is given a distinct Private Received number. When someone on another
system on the network dials the Private Received number on a DPNSS line, the BCM system
checks all received digits, compares the digits to an internal table and routes the call to the
appropriate DIA line. All extensions programmed to have access to that DIA line will then
alert for the incoming call.
• Dialing restrictions can be added to lines in line pools. Filters can restrict the use of the line to
specific area codes.
• You can use host system signaling codes (“External call codes” in the Device Configuration
Guide (NN40020-300)) as part of the dial out for a route. Routing can also be used as an
alternate method for a direct-dial digit. For example, create a destination code 0 and program
the number of the internal or external destination as the dial out. Digit absorption should be set
to 1. Because overflow routing directs calls using alternate line pools, a call may be affected
by different line restrictions when it is handled by overflow routing.
NN40020-603
339
Chapter 37
Private networking: Using destination codes
By properly planning and programming routing tables and destination codes, an installer can
create a dialing plan where VoIP lines between BCM are available to other systems in the network.
Figure 106 shows a network of three BCMs. Two remote systems connect to a central system.
Pool BlocA
Pool BlocA
VoIP
VoIP
Santa Clara
Network # 4221
Received # 4221
Internal # 4221
Each system must be running BCM software. Each system must be equipped with target lines and
a VoIP keycodes with at least one IP Trunk line. Programming information for this network is
shown in Table 72.
NN40020-603
Chapter 37 Private networking: Using destination codes 341
If a user in New York wants to call Toronto within the network, they dial 6221. The local BCM
checks the number against the routing tables and routes the call according to the destination
code 6, which places the call using Route 001.
The call appears on the routing table on the BCM in Santa Clara as 6-221. Because 6 is
programmed as a destination code for Toronto on the Santa Clara system, another call is placed
using route 001 from Santa Clara to Toronto. At the Toronto system, the digits 6-221 are
interpreted as a target line Private received number. The call now alerts at telephone 6221 in
Toronto.
Note: Network calls that use routes are subject to any restriction filters
in effect.
If the telephone used to make a network call has an appearance of a line
used by the route, the call will move from the intercom button to the Line
button.
The telephone used to make a network call must have access to the line
pool used by the route.
Network calls are external calls, even though they are dialed as if they
were internal calls. Only the features and capabilities available to
external calls can be used.
When programming a button to dial a Network number automatically
(autodial), network calls must be treated as external numbers, even
though they resemble internal telephone numbers.
Routes generally define the path between your BCM and another call
server in your network, not other individual telephones on that call
server.
NN40020-603
343
Chapter 38
Private networking: PRI Call-by-Call services
The example shown in Figure 107 highlights the use of PRI Call-by-Call services. It shows two
offices of a company, one in New York and one in Toronto. Each office is equipped with a BCM
and a PRI line. Each office must handle incoming and outgoing calls to the public network. In
addition, employees at each office often have to call colleagues in the other office.
BCM
TIE Connection
PRI PRI
Public Network
Central Central
Office Office
To reduce long distance costs, and to allow for a coordinated dialing plan between the offices,
private lines are used to handle interoffice traffic. Refer to “Dialing plan: Public network” on
page 275 and “Dialing plan: Private network settings” on page 281.
If Call-by-Call services were not used, each BCM system might have to be equipped with the
following trunks:
The total required is thus 28 lines. If the BCM systems were using T1 trunks, then two T1 spans
would be required at each office. Note that the total of 28 lines represents the worst case value for
line usage. In reality, the total number of lines in use at any one time will generally be less than 28.
For example, during periods of peak incoming call traffic, the demand for outgoing lines will be
low.
With PRI Call-by-Call services, it is not necessary to configure a fixed allocation of trunks. Each
of the 23 lines on the PRI can be used for DID, private TIE, or outgoing public calls. This
consolidation means that it may be possible for each office to use a single PRI span, rather than
two T1 spans. With PRI Call-by-Call services, the only limitation is that there are no more than
23 calls in progress at any one time.
The dialing plan at each BCM site is configured to determine the call type based on the digits
dialed by the user. If a user in Toronto wishes to dial a colleague in New York, they dial the
four-digit private DN (such as 6221). The dialing plan recognizes this as a private network DN,
and routes the call using TIE service with a private dialing plan.
Incoming TIE calls are routed to telephones based on the digits received by the network, which in
this case will be the four-digit private DN.
If a user in either location wishes to dial an external number, they dial 9, followed by the number
(such as 9-555-1212). The dialing plan recognizes this as a public DN, and routes the call using
Public service.
Incoming DID calls will be routed to telephones, based on the trailing portion of the digits
received by the network. For example, if a public network user dials an employee in the Toronto
office, the network delivers digits 4167632221. The BCM routes the call using the last four digits,
2221, to the BCM50.
Refer to Table 73 for a description of the settings required for this type of routing service.
Table 73 PRI Call-by-Call services routing information (Sheet 1 of 2)
Parameter Home System Settings
Hardware
DTM PRI
Protocol NI-2
Trunk/Line Data
Line 125 Target line
Private/Public Received # 2221
Line Access
DN 2221 L125:Ring only
Line pool access Line pool BlocA
Routing Services Private Network Public network
New York: Public network
Route 001 002
External # No number No number
Use Pool BlocA Pool BlocA
Service type TIE Public
NN40020-603
Chapter 38 Private networking: PRI Call-by-Call services 345
NN40020-603
347
Chapter 39
Configuring voice messaging
You can have either an internal voice message service, or you can connect your system to an
external voice message service, either over the PSTN network to a message center at the central
office or through a private network to another system. This panel allows you to choose the type of
voice messaging service you want to use. If you choose an external service, you can enter the
contact numbers to the Centralized Voice Messaging table.
The following paths indicate where to access the loop start trunks through Element Manager and
through Telset Administration:
• Element Manager: Configuration > Applications > Voice Messaging > Contact Center
Panels/Subpanels Tasks/features
“Centralized Voice Messaging (external voice “Configuring centralized voice mail” on page 351
mail)” on page 347
“Local voice messaging access (CallPilot Refer to the CallPilot documentation for task and
Manager)” on page 349 feature details.
Click the navigation tree heading to access general information about Hospitality services.
Only the YYYYY.. # portion of the string must be programmed for MWI and MWC. The
procedure is similar to Set Name/Line Name.
The following criteria must be met when programming NSI strings for MWI/MWC:
NN40020-603
Chapter 39 Configuring voice messaging 349
NN40020-603
351
Chapter 40
Configuring centralized voice mail
The BCM supports voice-mail configuration either from the local source or by accessing a remote
voice mail system located on another BCM, located on a BCM50, or attached to a Meridian 1
system. The system can be configured to more than one voice mail system. However, each
telephone can only be configured to one system.
Refer to the following information:
• “Local system as host” on page 351
• “Meridian system as host” on page 352
• “System set up for host system” on page 352
• “System set up for satellite systems” on page 353
• “Configuring the system for centralized voice mail” on page 355
DMS-100/SL100 centralized voice mail: The BCM can also support centralized voice mail on a
DMS-100/SL100 switch through a PRI-DMS-100 connection. The system also supports
centralized voice mail on the switch through an indirect connection through an M1, where the
DMS-100/SL100 is connected by PRI-DMS-100 to the M1, and the M1 is connected to a BCM
through a PRI-MCDN connection. The DMS-100/SL100 can use either the Public number or
Private number of a BCM telephone to designate the mailbox number on the voice mail system.
To configure centralized voice mail, the system must be using a CDP dialing plan and be running
on a private network created using either DPNSS (UK profile), PRI SL-1 or VoIP trunking set up
with MCDN. Private network configuration and features are discussed in “Private networking:
MCDN over PRI and VoIP” on page 297.
For details about setting up the CallPilot parameters and features, refer to the CallPilot Manager
Set Up and Operations Guide and the other CallPilot supporting documentation.
CallPilot compatibility
If you are planning to use M1-based CallPilot software for the voice mail system, there are no
compatibility issues.
NN40020-603
Chapter 40 Configuring centralized voice mail 353
• CallPilot or auto attendant is set up and is running for the local system.
• You have obtained a list of DNs from the remote systems that require mailboxes.
• Private network has been set up, with MCDN, between the satellite and host system.
• The correct routing to the host system is set up and working.
• You have supplied a list of DNs to the host system administrator that require mailboxes.
NN40020-603
Chapter 40 Configuring centralized voice mail 355
Apart from line configuration, MCDN over VoIP has the same system configuration.
NN40020-603
357
Chapter 41
Dialing plan: Line pools and line pool codes
• assign lines pools to telephones (and view which telephones have line pool assigned)
• Element Manager: Configuration > Telephony > Dialing Plan > Line Pools
• Telset interface: **CONFIG > System Prgrming > Access Codes > Line pool codes
Click one of the following links to connect with the type of information you want to view:
Note: You cannot assign Bloc line pools with a line pool access code. You must define
Bloc line pools under routing, and create destination codes for the routes.
Note: A line pool access code cannot conflict with the following table.
NN40020-603
Chapter 41 Dialing plan: Line pools and line pool codes 359
Note: The line pool number must not conflict with the following:
• park prefix
• external code
• direct dial digits
• private access code
• Public/Private Auto DN
• Public/Private DISA DN
• Telephone DN
If the line pool code and the external code start with the same digit, the line pool code
programming supersedes the external code.
NN40020-603
Chapter 41 Dialing plan: Line pools and line pool codes 361
NN40020-603
363
Chapter 42
VoIP overview
On the BCM, the LAN configuration consists of two components: Router LAN configuration,
which determines how the router communicates with devices on the LAN, and Main Module LAN
configuration, which determines how the Main Module of the BCM communicates with other
devices on the LAN.
IP telephones
IP telephones offer the functionality of regular telephones but do not require a hardwire connection
to the BCM. Instead, they must be plugged into an IP network, which is connected to the LAN or
WAN on the BCM. Calls made from IP telephones through the BCM can pass over VoIP trunks or
across a Public Switched Telephone Network (PSTN).
Nortel has several types of IP telephones that connect to the BCM through Ethernet. The IP
softphone 2050, which runs as a client application on a PC or PDA, also connects to the BCM
through the Ethernet.
VoIP trunks
VoIP trunks allow voice signals to travel across IP networks. A gateway within the BCM converts
the voice signal into IP packets, which are then transmitted through the IP network to a gateway on
the remote system. The device at the other end reassembles the packets into a voice signal.
Telephones
The BCM can communicate using digital telephones (7000, 7100, 7100N, T7208, 7208, 7208N,
7316, 7316E, 7316E+KIMs, and 7310), cordless telephones (7406), and IP telephones and
applications (Nortel IP Phone 2001, IP Phone 2002, IP Phone 2004, and Nortel IP softphone
2050). With this much flexibility, the BCM can provide the type of service you require to be most
productive in your business.
While analog and digital telephones cannot be connected to the BCM system using an IP
connection, they can make and receive calls to and from other systems through VoIP trunks. Calls
received through the VoIP trunks, or other IP telephones, to system telephones are received
through the LAN or WAN card and are translated within the BCM to voice channels.
Gatekeepers
A gatekeeper tracks IP addresses of specified devices, and provides routing and (optionally)
authorization for making and accepting calls for those devices. A gatekeeper is not required as part
of the network to which your BCM system is attached, but gatekeepers can be useful on networks
with a large number of devices.
When planning your network, be sure to consider all requirements for a data network. Consult
your network administrator for information about network setup and how the BCM fits into the
network.
SIP Proxy
A SIP Entity that receives requests and sends them on to another proxy or to their final destination.
A Proxy uses the information retrieved from the Location Service in order to find an alias or an
actual destination address for the request. Alternatively, a Proxy can be statically configured, in
which case registration is not necessary.
IP Network
WAN
A Wide Area Network (WAN) is a communications network that covers a wide geographic area,
such as state or country. For CallPilot, a WAN is any IP network connected to a WAN card on the
CallPilot system. This can also be a direct connection to another CallPilot system.
If you want to deploy IP telephones that will be connected to a LAN outside of the LAN that the
BCM is installed on, you must ensure the BCM has a WAN connection. This includes ensuring
that you obtain IP addresses and routing information that allows the remote telephones to find the
BCM, and vice versa.
NN40020-603
Chapter 42 VoIP overview 365
LAN
A Local Area Network (LAN) is a communications network that serves users within a confined
geographical area. For BCM, a LAN is any IP network connected on the BCM system. Often, the
LAN can include a router that forms a connection to the Internet. A BCM can have up to two LAN
connections.
QoS
QoS (Quality of Service) is technology that determines the maximum acceptable amount of
latency, and balances that with the quality of the VoIP connection. BCM and network routers use
QoS to ensure that real time critical IP packets, such as voice packets, are given higher routing and
handling priority than other types of data packets.
Silence suppression
Silence suppression technology identifies the periods of silence in a conversation, and stops
sending IP speech packets during those periods. Telco studies show that in a typical telephone
conversation, only about 36% to 40% of a full-duplex conversation is active. When one party in
the conversation is quiet for more than a few hundredths of a second, voice packet transmission is
suppressed until the party starts talking again. This is half-duplex. There are important periods of
silence during speaker pauses between words and phrases. By applying silence suppression,
average bandwidth use is reduced by the same amount. This reduction in average bandwidth
requirements develops over a 20-to-30-second period as the conversation switches from one
direction to another. Refer to “Silence suppression” on page 529.
Codecs
The algorithm used to compress and decompress voice over IP networks and VoIP trunks is
embedded in a software entity called a codec (COde-DECcode).
Refer to “Codec rates” on page 549 for a listing of the supported codes and their transmission
rates.
• The G.711 Codec samples the voice stream at a rate of 64 kbps (kilo bits per second), and is
the Codec to use for maximum voice quality. Choose the G.711 Codec with the companding
law (alaw or ulaw) that matches your system requirements.
• The G.729 Codec samples the voice stream at 8 kbps. The voice quality is slightly lower using
a G.729 but it reduces network traffic by approximately 80%.
• The G.723 Codec should be used only with third party devices that do not support G.729 or
G.711.
Codecs with Silence Suppression, also referred to as VAD (Voice Activity Detection), make VAD
active on the system, which performs the same function as having silence suppression active. Also
refer to “Silence suppression” on page 529.
• packet loss
• Listening R
These metrics and supplementary information provide you with valuable insight into the real time
quality of the call from the end-user perspective. This information gives an indication of the type
of problem, and can be used to locate the source of the issue, thus accelerating the isolation and
diagnostics phase of problem resolution.
In addition to packet loss, inter arrival jitter and round trip delay, PVQM monitors the “listening
R” value. The R-Factor, as defined by ITU G.107 and IETF 3611, is a call quality index that
assesses network impairments such as packet drops, jitter and round trip delay with consideration
for the burstiness and recency of these impairments. The Listening R metric provides you with
definitive answers about the actual QoS delivered to the telephone user. With this metric, you see
the raw data (such as jitter or packet drop rate), and a summary of the effect of the data on the
quality experienced by the user.
For example, a Warning Threshold for the listening R-value might be set at 80. When voice quality
drops below this value as measured at the telephone set itself, an event is generated. The event
notification is augmented with other valuable state information, such as network loss rate, average
rate of discards due to jitter, average length of bursts, and presented as an alarm. Analysis of the
alarms and supplementary information in the alarm description helps you identify and troubleshoot
voice quality issues and proactively initiate responsive actions.
Refer to the Administration Guide (NN40020-600) for information on how to configure and use
PVQM functionality.
NN40020-603
367
Chapter 43
VoIP trunk gateways
You can use a VoIP trunk to establish communications between a BCM and a remote system
across an IP network. Each trunk is associated with a line record (lines 001-012), and are
configured in the same way that other lines are configured.
However, VoIP trunks have additional programming to support the IP network connection.
This system supports SIP trunks and H.323 trunks. Both types of trunks support connections to
other BCMs, a central call server such as Succession 1000/M, and trunk-based applications. SIP
trunks and H.323 trunks are assigned to a single Pool, and the routing decision to route calls via
H.323 or SIP is made based on the routing modes of the two services (Direct/Gatekeeper/Proxy)
and the combined routing table.
To access the Voice over IP (VoIP) trunk gateway in Element Manager, select:
• Element Manager: Configuration > Resources > Telephony Resources > IP Trunks >
Routing Table tab
Configuring a VoIP trunk requires the following:
Keycodes
Before you can use VoIP, you must obtain and install the necessary keycodes. See the Keycode
Installation Guide (NN40010-301) for more information about installing the keycodes. Talk to
your BCM sales agent if you need to purchase VoIP keycodes.
Each keycode adds a specific number of VoIP trunks. To activate trunking, you must reboot your
BCM after you enter VoIP keycodes.
If you want to use the MCDN features on the VoIP trunks, you will need an MCDN keycode. If
you have already deployed MCDN for your SL-1 PRI lines, you do not require an additional
keycode.
In order to maintain a level of quality during call setup, QoS monitor must be enabled and
configured.
If your network uses a gatekeeper (H.323 trunks only), there are also specific settings that must be
set on the H323 Settings panel to recognize the gatekeeper, and also within the gatekeeper
application, so that VoIP lines are recognized. Also refer to gatekeeper configuration “VoIP
interoperability: Gatekeeper configuration” on page 389.
If you plan to use H.323 trunking and you have a firewall set up, ensure that the ports you intend to
use have been allowed.
In order to maintain a level of quality during call setup, QoS monitor must be enabled and
configured.
SIP URI maps of both endpoints must match.
If you plan to use SIP trunking and you have a firewall set up, ensure that the ports you intend to
use have been allowed.
NN40020-603
Chapter 43 VoIP trunk gateways 369
Figure 112 Internal call from Meridian 1 tandems to remote PSTN line
Node B Node C
Calgary Ottawa
VoIP trunk
(with MCDN, optional)
Head office
Since the VoIP trunks are configured into line pools, you can assign line pool codes to users who
have been assigned access to the VoIP trunks. However, if you intend to set up your system to use
fallback, so that calls can go out over PSTN if the VoIP trunks are not available, you must use
routes and destination codes to access the VoIP trunk line pools.
• type of call signaling, either directly to the far end system or through a network gatekeeper
• the protocol the system will use for the gateway (must be compatible with remote system or
gatekeeper)
NPI-TON aliases store dialed number prefixes as well as information about the type of number. A
dialed number can be qualified according to its TON (type of number), as well as its NPI
(numbering plan identification). Nortel recommends this format over the E.164 format, for
encoding dialed numbers and aliases registered with a gatekeeper.
When using a gatekeeper, and attempting to place an outgoing VoIP trunk call, ensure that the
route and dialing plan configuration matches the NPI-TON aliases registered, by the destination,
with the gatekeeper. These requirements are summarized in Table 79.
Route (DN Dialing Plan used by calling Alias configured for calling gateway
type) gateway (“alias name” in Element Manager)
Public Public PUB:<dialedDigitsPrefix>
Private Private (Type = None) PRI:<dialedDigitsPrefix>
Private (Type = CDP) CDP:<dialedDigitsPrefix>
Private (Type = UDP) UDP:<dialedDigitsPrefix>
Routing Table
Since VoIP trunks are point-to-point channels, besides the local gateway information on your
system, you need to tell your system about the gateway at the remote end.
However, if the network has a gatekeeper or a SIP Proxy Server, it handles call traffic, so a routing
table is not required.
To configure a remote gateway, you need to define the following information:
NN40020-603
Chapter 43 VoIP trunk gateways 371
• whether QoS monitor is enabled (this is required if you plan to use PSTN fallback)
• transmit threshold so that the system knows when to activate the fallback feature
• the unique digit(s) that identify the remote system. (this is usually part of the destination code)
Dial in:
XXX-2244 Gateway: 3 Remote gateway set up
Gateway: 2
to Santa Clara
Dialout:
2244
CDP system code for
Ottawa: 2
Gateway destination digit: 2
Route 022 (VoIP)
DN type: Private IP network
Destination code: 2, using route 022 dedicated VoIP trunk private network
Absorb length: 0
Ensure VoIP trunk is set up with remote filters
Call process
Based on Figure 113, this is how the call would progress:
1 A home-based employee in Santa Clara wants to call someone in Ottawa, so they dial into the
local BCM network using the access code for an unsupervised trunk (not VoIP trunks) and the
destination code and DN for the person they want to reach on System B.
Dialin:
XXX-2244
2 When the call is received from the public network at System A (Santa Clara), the system
recognizes that the received number is not a local system number. The call is received as a
public call.
3 System A has a route and destination code that recognizes the received number and destination
code as belonging to the route that goes to System B (Ottawa). System A passes the call to
System B over a dedicated trunk, in this case, a VoIP trunk. This call is now designated as a
private call type.
NN40020-603
Chapter 43 VoIP trunk gateways 373
Dialout: Ottawa
2244
Gateway: 3
4 System B recognizes the code as its own, and uses a local target line to route the call to the
correct telephone.
On any IP gateway for which you want to allow fallback based on network quality, you need to
ensure that QoS monitor is enabled.
Warning: QoS monitor must be turned on at both endpoints. To enable the QoS Monitor
select Configuration > Resources > Telephony Resources > IP Trunks > Routing
Table panel.
IP network
BCM50 B
BCM50 A
PSTN
Public or Private Public or Private
PSTN line PSTN line
In a network configured for PSTN fallback, there are two connections between a BCM and a
remote system.
• The fallback line is a PSTN line, which can be the public lines or a dedicated T1, BRI, PRI or
analog line, to the other system.
When a user dials the destination code, the system checks first to see if the connection between the
two systems can support an appropriate level of QoS (if enabled). If it can, the call proceeds as
normal over the VoIP trunk. If the minimum acceptable level of QoS is not met, the call is routed
over the second route, through the PSTN line.
In many cases, this involves configuring the system to add and/or absorb digits.
For detailed information about inserting and absorbing digits, see “Dialing plans” on page 217.
NN40020-603
Chapter 43 VoIP trunk gateways 375
Figure 115 Setting up routes and fallback for call to remote system (CDP dialing code)
UDP network: The user dials 2233 (remote system DN: 2233; destination digits/private access
code: 555). The system then adds the private access code to the dialout digits.
If the call falls back to PSTN line, the system then dials out the private access code (private
network PSTN line) or public access number (public PSTN) to the remote system in front of the
2233.
NN40020-603
Chapter 43 VoIP trunk gateways 377
• Port settings (firewall): In some installations, you may need to adjust the port settings before
the BCM can work with other devices.
Firewalls can interfere with communications between the BCM and another device. The port
settings must be properly configured for VoIP communications to function properly. Using the
instructions provided with your firewall, ensure that communications using the ports specified
for VoIP are allowed.
A Nortel IP telephone uses ports between 51000 and 51200 to communicate with the system.
The system, by default, uses ports 28000 to 28255 to transmit VoIP packets.
BCM uses UDP port ranges to provide high priority to VoIP packets in existing legacy IP
networks. You must reserve these same port ranges and set them to high priority on all routers
that an administrator expects to have QoS support. You do not need to reserve port ranges on
DiffServ networks.
You can select any port ranges that are not used by well-known protocols or applications.
Each H.323 or VoIP Realtime Transfer Protocol (RTP) flow uses two ports, one for each
direction. The total number of UDP port numbers to be reserved depends on how many
concurrent RTP flows are expected to cross a router interface. In general:
— Include port number UDP 5000 in the reserved port ranges, for the QoS monitor.
— The port ranges reserved in a BCM system are also reserved by the remote router.
— You must reserve two ports for each voice call you expect to carry over the IP
network.
— You can reserve multiple discontinuous ranges. BCM requires that each range meet
the following conditions: Each range must start with an even number; each range must
end with an odd number; no more than 256 ports can be reserved.
A single gatekeeper manages a set of H.323 endpoints. This unit is called a Gatekeeper Zone.
A zone is a logical relation that can unite components from different networks (LANS). These
Gateway zones, such as the BCM, are configured with one or more alias names that are
registered with the gatekeeper. The gatekeeper stores the alias-IP mapping internally and uses
them to provide aliases to IP address translation services. Later, if an endpoint IP address
changes, that endpoint must re-register with the gatekeeper. The endpoint must also re-register
with the gatekeeper during the time to live (TTL) period, if one is specified by the gatekeeper.
Refer to the gatekeeper software documentation for information about changing IP addresses.
gatekeeper
IP:10.10.10.17
BCM50 Ottawa
DN 321
IP:10:10:10:18
BCM50 Calgary
DN 521
IP:10:10:10:20
This example explains how a call from DN 321 in Ottawa would be made to DN 421 in Santa
Clara. It assumes that call signaling is set to Gatekeeper Resolved and no pre-granted
AdmissionRequest (ARQ) has been issued:
1 BCM Ottawa sends an ARQ to the gatekeeper for DN 421.
2 The gatekeeper resolves DN 421 to 10.10.10.19 and returns this IP in an AdmissionConfirm to
the BCM Ottawa.
NN40020-603
Chapter 43 VoIP trunk gateways 379
3 BCM Ottawa sends the call Setup message for DN 421 to the gateway at 10.10.10.19, and the
call is established.
If call signaling is set to Gatekeeper Routed and no pre-granted ARQ has been issued:
1 BCM Ottawa sends an ARQ to the gatekeeper for DN 421.
2 The gatekeeper resolves DN 421 to 10.10.10.17.
3 BCM Ottawa sends the call Setup message for DN 421 to the gatekeeper (10.10.10.17), which
forwards it to the gateway at 10.10.10.19.
4 The call is established.
• Faxing over VoIP trunks: You can assign VoIP trunks to wired fax machines if you have
T.38 fax enabled on the local gateway. The BCM supports this IP fax feature between BCMs,
BCM200/400/1000 running BCM 3.5 and subsequent up-level versions of software, and a
Meridian 1 running IPT 3.0 (or newer) software, or a CS 1000/M.
The system processes fax signals by initiating a voice call over the VoIP line. When the T.38
fax packets are received at the remote gateway, the receiving system establishes a new path
that uses the T.38 protocol. Both the endpoints must be running a software version that
supports the T.38 fax.
Caution: Operations note: Fax tones that broadcast through a telephone speaker may
disrupt calls at other telephones using VoIP trunks in the vicinity of the fax machine. Here
are some suggestions to minimize the possibility of your VoIP calls being dropped
because of fax tone interference:
• Turn the speaker volume on the fax machine to the lowest level, or off.
Fax tones recorded in a voice mailbox: In the rare event that fax tones are captured in a
voice mail message, opening that message from an telephone using a VoIP trunk will
cause the connection to fail.
For a list of limitations and requirements for using T.38 fax, refer to “Operational notes and
restrictions” on page 379.
• CallPilot mailboxes
• Fax Transfer (calls transferred to a system fax device through the auto-attendant)
• Avoid the use of manual dial on the originating fax machine. In some fax machines,
manually dialing introduces a much shorter call time-out.
• If manual dial must be used, then the user should wait until the call is answered before
starting the fax session.
• If manual dial must be used, then the user should enter the digit 8 before initiating the fax
session. This ensures that the fax session is initiated by CallPilot before the fax machine's
timer is started.
• The call duration can be increased by adding a timed pause to the end of dialing string (for
example: 758-5428,,,,). This allows the call to ring at the destination before the fax
machine call duration timer starts.
• Since the problem is related to the delay in initiating the fax session, the number of rings
for fax mailboxes Call Forward No Answer (CFNA) should be minimized.
Table 80 is a list of restrictions and requirements for the T.38 fax protocol.
NN40020-603
381
Chapter 44
Configuring VoIP trunk gateways
The following explains how to configure voice over IP (VoIP) trunks on a BCM system for
incoming traffic. A VoIP trunk allows you to establish communications between a BCM and a
remote system across an IP network.
The following path indicates where to where to configure VoIP trunks in Element Manager:
• Element Manager: Configuration > Resources > Telephony Resources > IP Trunks
• Set up the media parameters for the gateway. (“Configuring VoIP trunk media
parameters” on page 382)
• Set up the local gateway parameters, including H323 gatekeeper or SIP Proxy
settings, if necessary. (“Setting up the local gateway” on page 383)
Prerequisites
Ensure that you have obtained the following information or familiarize yourself with the
requirements before continuing with VoIP trunk configuration:
• Keycodes: Obtain and install the necessary keycodes for the number of VoIP trunks you want
to support on the system. See the Keycode Installation Guide (NN40010-301) for more
information about installing the keycodes. Talk to your BCM sales agent if you need to
purchase VoIP keycodes.
Each keycode adds a specific number of VoIP trunks. You must reboot your BCM after you
enter VoIP keycodes to activate trunking.
The FEPS service will restart automatically after you enter the VoIP keycodes.
If you want to use the MCDN features on the VoIP trunks, you will need an MCDN keycode.
If you have already deployed MCDN for your SL-1 PRI lines, you do not require an additional
keycode.
• Media gateway parameters: Ensure that the gateway parameters are set correctly for the IP
trunks.
— If your network uses a gatekeeper (H.323 trunks only), there are also specific settings
that must be set on the your system to recognize the gatekeeper, and also within the
gatekeeper application, so that VoIP lines are recognized. Refer to “VoIP
interoperability: Gatekeeper configuration” on page 389. If there is a gatekeeper on
the network, you do not have to configure remote gateway settings.
— If you plan to use H.323 trunking and you have a firewall set up, ensure that the ports
you intend to use have been allowed.
• SIP network applications consideration:
— If you plan to use SIP trunking, and you have a firewall set up, ensure that the ports
you intend to use have been allowed.
“Using VoIP to tandem systems” on page 327, and “Configuring fallback over a VoIP MCDN
network” in the Device Configuration Guide (NN40020-300).
• Element Manager: Configuration > Resources > Telephony Resources > IP Trunks
For details about the fields on this panel, refer to “H323 Media Parameters” on page 122 and “SIP
Media Parameters” on page 126.
1 On the Modules panel, in the Module type column, select the IP Trunks line.
2 In the bottom panel, select the H323 or SIP Media Parameters tab.
3 Enter the information that supports your system. Ensure that these settings are consistent with
the other systems on the network:
• Preferred Codecs: Choose codecs in the same order for all remote equipment.
• Settings:
— Enable Voice Activity Detection: Disable or enable this feature, based on network
requirements. Also refer to “Silence suppression” on page 529.
— Jitter buffer - Voice: Either choose auto to let the system determine resource
availability, or choose a buffer size.
— Payload Size: Change the defaults to coordinate with other systems on the network.
Operations note: Fax tones that broadcast through a telephone speaker may disrupt calls at other
telephones using VoIP trunks in the vicinity of the fax machine. Here are some suggestions to
minimize the possibility of your VoIP calls being dropped because of fax tone interference:
— Locate fax machine away from other telephones.
— Turn the speaker volume on the fax machine to the lowest level, or off, if that option is
available.
NN40020-603
Chapter 44 Configuring VoIP trunk gateways 383
• Force G.711 for 3.1k audio - When enabled, the system forces the VoIP trunk to use the
G.711 codec for 3.1k audio signals such as modem or TTY machines.
4 Set up the local gateway parameters. (“Setting up the local gateway” on page 383)
• Element Manager: Configuration > Resources > Telephony Resources > IP Trunks.
1 In the bottom panel, select the H323 Settings or SIP Settings tab.
2 Choose the settings that you need for your system:
• Fallback to circuit-switched: define how you want the system to handle calls that the
system fails to send over the VoIP trunk.
• Forward redirected OLI - If the box is selected, the OLI of an internal telephone is
forwarded over the VoIP trunk when a call is transferred to an external number over the
private VoIP network. If the box is cleared, only the CLID of the transferred call is
forwarded.
• Send name display - When selected, the telephone name is sent with outgoing calls to the
network.
• Remote capability MWI - This setting must coordinate with the functionality of the remote
system hosting the remote voice mail.
• Call Signaling: Determine how the calls are delivered over the network:
— Direct: call signaling information is passed directly between endpoints.
Note: You will need to set up remote gateways (“Setting up remote gateways” on
page 385).
— Gatekeeper Resolved: all call signaling occurs directly between H.323 endpoints.
This means that the gatekeeper resolves the phone numbers into IP addresses, but the
gatekeeper is not involved in call signaling.
— Gatekeeper Routed: uses a gatekeeper for call setup and control. In this method, call
signaling is directed through the gatekeeper.
— Gatekeeper Routed no RAS: Use this setting for a NetCentrex gatekeeper. With this
setting, the system routes all calls through the gatekeeper but does not use any of the
gatekeeper Registration and Admission Services (RAS).
— Refer to “Using CS 1000 as a gatekeeper” on page 389 for specific information about
configuring the gatekeeper for H.323 trunks.
Network note: If your private network contains a Meridian 1-IPT, you cannot use
Radvision for a gatekeeper.
• Call signaling port: If there are VoIP applications that require non-standard call signaling
ports, enter the port number here. 0 = the system uses the first available port.
• RAS port: If the VoIP application requires a non-standard RAS port, enter the port number
here. 0 = the system uses the first available port.
• Enable H245 tunneling: Select or deselect the check box to allow or disallow H.245
messages within H.225. Note that the VoIP Gateway service must be restarted for any
change to take effect.
• Gatekeeper Support: Fill out these fields if the network is controlled by a Gatekeeper: Also
refer to “VoIP interoperability: Gatekeeper configuration” on page 389.
— Primary Gatekeeper IP: This is the IP address of the primary gatekeeper.
— Backup Gatekeepers: NetCentrex gatekeeper does not support RAS, therefore, any
backup gatekeepers must be entered in this field. Gatekeepers that use RAS can
provide a list of backup gatekeepers for the end point to use in the event of the primary
gatekeeper failure.
• In the Alias names field, enter all the alias names required to direct call signals to your
system.
• Gateway protocol - Select SL-1 for BCM 2.5 systems. Select CSE for BCM 3.0 and newer
systems. Or select None.
• Registration TTLs: Specifies the KeepAlive interval
• Gateway TTLs: This protocol should match all other systems on the network.
• Status: This field displays the current status of the gatekeeper.
3 Suggested next steps:
• Ensure router settings, firewalls and system ports are set correctly to support IP traffic over
the trunks.
• “Configuring lines” on page 129
• “Configuring lines: Target lines” on page 141
• “Setting up VoIP trunks for fallback” on page 391
• Ensure private network dialing plan and access settings matches the rest of the private
network: “Dialing plan: Private network settings” on page 281
• Private networking: “Private networking: Basic parameters” on page 315
• Assigning the VoIP line pools to system telephones: “Line Access - Line Pool Access tab”
in the Device Configuration Guide (NN40020-300).
NN40020-603
Chapter 44 Configuring VoIP trunk gateways 385
You must also set up target lines when you use these trunks.
The following path indicates where to set up target lines in Element Manager:
• Element Manager: Configuration > Telephony > Lines > Target Lines
Prerequisites
Complete the following prerequisites checklist before configuring the modules.
NN40020-603
Chapter 44 Configuring VoIP trunk gateways 387
NN40020-603
389
Chapter 45
VoIP interoperability: Gatekeeper configuration
The following describes the use of a gatekeeper for your H.323 VoIP trunks.
Refer to the gatekeeper software documentation for information about changing IP addresses.
Gatekeeper notes:
• The BCM has been tested by Nortel to be compliant with CS 1000 gatekeeper applications.
• A gatekeeper may help to simplify IP configuration or the BCM dialing plan; however, it does
not simplify the network dialing plan.
BCM requirements
Set the BCM Local Gateway IP interface to the following using BCM Element Manager (go to
Configuration > Resources > Telephony Resources > {Select IP Trunk} > H323 Settings tab):
• Set Call Signaling to GatekeeperRouted or GatekeeperResolved.
• Set Primary Gatekeeper IP to the IP address of the NRS.
• Set Alias Names to the Alias name that was used when the H.323 Endpoint for the BCM was
created on the NRS.
In order to make a BCM 3.01 (or later)-to-CS 1000 call, ensure that the BCM routes and dialing
plan (used to reach the CS 1000 systems) match the numbering plan entry assigned to the CS 1000
systems through NRS Manager.
Similarly, to make a CS 1000 system-to-BCM 3.01 (or later) call, ensure that the numbering plan
entry assigned to the BCM (through NRS Manager) matches the dialing plan information
configured on the CS 1000 systems.
CS 1000 configuration
You must use NRS Manager to configure the CS 1000.
The NRS server must be enabled and properly configured before any NRS data can be provisioned
using NRS Manager. Refer to IP Peer Networking: Installation and Configuration
(553-3001-213) for detailed information on configuring a CS 1000 gateway.
NN40020-603
391
Chapter 46
Setting up VoIP trunks for fallback
The following path indicates where to access setting VoIP trunks for fallback in the Element
Manager:
• Element Manager: Configuration > Resources > Telephony Resources > IP Trunks > H323
Settings tab
• “Adding the destination code for the fallback route” on page 393
Pre-configuration requirements
• If you have not already done so, remember to define a route for the local PSTN for your own
system so users can still dial local PSTN numbers.
• Ensure the PSTN and VoIP line pools have been configured before you continue with this
section. For information about creating a VoIP line pool, see “Configuring VoIP trunk
gateways” on page 381. To configure PSTN lines, select Configuration > Telephony > Lines
> Active Physical Lines.
Note: If you already have routes for your PSTN or VoIP line pools configured,
you do not need to configure new routes, unless you cannot match the dialed
digits.
NN40020-603
Chapter 46 Setting up VoIP trunks for fallback 393
Note: If you already have a line pool access code defined as 9, you will need to
delete this record before you create the destination code.
Example:
Destination code digit: If it is available, you might want to use the same number that you used for
the destination code of the gateway.
If you have multiple gateways, you could use a unique first number followed by the destination
digits, to provide some consistency, such as 82, 83, 84, 85 to reach gateways with destinations
digits of 2, 3, 4 and 5.
The number you choose will also depend on the type of dialing plan the network is using.
Networks with CDP dialing plans have unique system codes. However, with networks using UDP,
this is not always the case, therefore, you need to be careful with the routing to ensure that the
codes you choose are unique to the route. This will also affect the number of digits that have to be
added or absorbed. It is helpful to use the Programming Records to plan network routing so you
can determine if there will be any conflicts with the destination codes you want to use.
Examples:
Absorbed length, VoIP schedule: If the remote gateway destination digit is 2, which is part of the
remote system DN structure (CDP network), and you specified a destination code of 82, set this
field to 1, so that the 2 is still part of the dialout.
If the destination code is different from the remote gateway destination digits, and you entered an
External # into the route record (the destination digit for the remote system), set the absorbed
length to the number of digits in the destination code. The system will dial out the External # you
entered in front of the rest of the number that the user dialed. This would occur if the network is set
up with a UDP dialing plan.
Note: Do not add alternative routes (second or third). Since fallback is active, the
system immediately falls back to the Normal schedule if the first route is not
available.
NN40020-603
Chapter 46 Setting up VoIP trunks for fallback 395
Absorbed length, Normal schedule: If this is a private network PSTN line, and the network uses a
CDP dialing plan, and the remote system identifier is 2, which is part of the remote system DN
structure, and you specified destination digit of 2 for the remote gateway, then configured a
destination code of 82, set this field to 1, so that the 2 is still part of the dialout.
If the destination code is different from the private access code/destination digits for the remote
system (UDP dialing plan) or this is a public PSTN, enter private access code or the public access
number to the remote system into the External # field on the route record. In this case, set the
absorbed length to the number of digits in the destination code. The system will dial out the
External # you entered in front of the rest of the number that the user dialed.
To deactivate a schedule
1 Dial FEATURE #873. The phone prompts you for a password.
2 Type the password.
3 Press OK. The system returns to the Normal schedule.
NN40020-603
Chapter 46 Setting up VoIP trunks for fallback 397
DN 2244
DN 3322
Dialout: Dialout:
IP network
2244 3322
(Packet Data Network)
Ottawa Gateway: 3
Santa Clara Gateway: 2
Routing Routing
• Target DN 2244 (first digit is unique • Target DN 3322 (first digit is unique to
to system) system)
• Remote gateway destination digit: 2 • Remote gateway destination digit: 3
• Destination code: 2 • Destination code: 3
• VoIP/private network dialout: no • VoIP/private network dialout: no
external #, user dials 2244 (no external #, user dials 3322 (no
absorbed digits) absorbed digits)
The systems already communicate through a PRI line, which will be configured to be used for
fallback. Both systems already have all keycodes installed for eight VoIP lines, and resources
properly allocated for VoIP trunking. For information about keycodes, see the Keycode
Installation Guide (NN40010-301).
Each BCM has 10 telephones that will be using VoIP lines. In this setup, only eight calls can be
sent or received over the VoIP trunks at one time. If all 10 telephones attempt to call at the same
time, two of the calls will be rerouted to the PSTN or other alternate routes if multiple routing is
set up in the destination code schedule.
NN40020-603
Chapter 46 Setting up VoIP trunks for fallback 399
• 3 is the destination code. If a suitable level of QoS is available, the call is routed through the
VoIP trunks and through the remote gateway with a destination digit of 3. The call is sent
across the PDN using the IP address of the Santa Clara BCM.
If a user in Santa Clara wanted to make a local call in Ottawa, they would dial 29, followed by the
local Ottawa number. The digit 2 accesses the remote gateway for the VoIP line. The digit 9
accesses an Ottawa outside line.
NN40020-603
401
Chapter 47
T.38 fax
If you are using the T.38 fax protocol, it is assumed that you have already configured IP trunks and
gateways, and that they are functional. For more information on configuring VoIP trunks see
“Configuring lines” on page 129.
T.38 fax is a Fax over IP (FoIP) gateway protocol that allows standard (T.30 or Group3) fax
machines to make calls over IP-based networks. The T.38 fax protocol functions transparently
with standard fax machines because it emulates a normal T.30 fax connection. Each endpoint of
the IP trunk becomes a T.38 gateway. To use FoIP, you must have two or four MS-PEC III cards
installed in your MSC card. Both endpoints must support the T.38 fax protocol and have this
feature enabled.
5 Verify that the codecs are set at the default before performing T.38 sessions.
Lines
To enable T.38 fax protocol you must configure the following:
• Voice over IP (VoIP) lines (see “Configuring lines” on page 129)
• target lines (see “Configuring lines: Target lines” on page 141)
• call routing (see “Dialing plan: Routing configurations” on page 247)
• destination codes (see “Destination codes” on page 262)
Media gateways
T.38 UDP redundancy refers to the number of times IP packets (not fax pages) are sent, because
TCP/UDP does not support packet validation (unlike TCP/IP).
To configure media gateways, click Configuration > Resources > Media Gateways.
NN40020-603
Chapter 47 T.38 fax 403
Note: Fax tones can be recorded in a voice mail box. In the rare event that fax tones are
captured in a voice mail message, opening that message from a telephone using a VoIP
trunk can cause the connection to fail.
Voice mail and T.38 FoIP share a maximum of eight fax ports. Voice mail supports only two fax
ports.
If you allow fax messaging for the local VoIP gateway, you must be aware of the guidelines in
“Operational notes and restrictions” on page 403 when you send and receive fax messages over
VoIP trunks. For more information, see “VoIP trunk gateways” on page 367.
• If you must dial manually, wait until the call is answered before you start the fax session.
• For Mailbox Call Answering only, if you must dial manually, enter the digit 8 as soon as you
hear the mailbox greeting. This ensures that CallPilot initiates the fax session before the fax
machine timer starts.
Note: Enter the digit 8 for Norstar Voice Mail User Interface (NVMUI)
only. To enable fax call answering when using CallPilot User Interface
(CPUI), enter 707.
• Increase the call duration by adding a timed pause to the end of the dialing string. This
addition allows the call to ring at the destination before the fax machine call-duration timer
starts. Refer to your fax machine documentation for more information on how to insert pauses
into dial strings.
• Because the problem is related to the delay in initiating the fax session, reduce the number of
rings for fax mailboxes Call Forward No Answer (CFNA).
NN40020-603
405
Chapter 48
Port ranges overview
The Port Ranges panel provides a list of which Ports are currently being used for RTP/UDP, UDP,
and Signaling. In the case of RTP over UDP and UDP, it allows changes to the ports being used.
For information on configuring port ranges, see “Port Ranges panel” on page 407.
Warning: Port configuration should not be changed unless absolutely necessary, such as
in instances where port configurations are causing conflicts, or if a firewall is restricting
communications over certain ports.
UDP
UDP is used for T.38 Fax over UDP. By default, it uses the Range 20000 to 20255. You can
configure up to ten separate ranges of ports. While the system can function with 12 ports, it is
recommended that 256 ports are reserved.
Signaling Ports
Signaling ports are used by the system and cannot be modified. They are provided to show where
conflicts with UDP or RTP occur.
NN40020-603
407
Chapter 49
Port Ranges panel
The Port Ranges panel allows you to reserve ports for use by UDP (User Datagram Protocol). The
Port Ranges panel consists of three tables: RDP over UDP, UDP, and Signaling.
Warning: Do not change the ports unless necessary. If you do change the ports, make
sure you review the minimum requirements for each protocol. As well, make sure that you
configure your firewall to reflect any changes you make to the ports.
NN40020-603
Chapter 49 Port Ranges panel 409
Table 84 Signaling
NN40020-603
411
Chapter 50
Media gateways overview
Certain types of IP communications pass through Media Gateways on the BCM. You can control
the performance of these communications by adjusting the parameters for echo-cancellation and
UDP Redundancy.
For detailed information on configuring the Media Gateways, see “Media Gateways panel” on
page 413.
NN40020-603
413
Chapter 51
Media Gateways panel
The Media Gateways panel allows you to set basic parameters that control IP telephony. The
Media Gateways panel contains only two fields:
NN40020-603
415
Chapter 52
Call security and remote access
System restrictions are required to ensure that your system is used appropriately and not
vulnerable to unauthorized use.
Call security includes:
• remote access packages, which limit system call feature access for users calling in over the
Private or Public network
• Class of Service codes, which require remote system users to enter a password before they can
access the system. CoS passwords also can have restriction filters applied.
Refer to the following topics:
• There is no limit on the number of overrides that can be allocated to a restriction. However,
there is a maximum total of 400 restrictions and overrides allocated to the 100 programmable
filters.
• Entering the letter A in a dialing sequence indicates a wild card, and represents any digit from
0 to 9.
• You can use * and # in a sequence of numbers in either a restriction or an override. These
characters are often used as part of feature codes for other systems or for features provided by
the central office (the public network).
• When restricting the dialing of a central office feature code, do not forget to create separate
restrictions for the codes used for DTMF and pulse lines (for example, *67 and 1167).
• Do not string together a central office feature code and a dialing sequence that you want to
restrict. Create a separate restriction for each.
• You can copy restrictions and overrides from one filter to another. You can use a restriction or
override in any number of filters. Each time you use a restriction or override, it counts as one
entry. For example, if restriction 411 exists in filters 01, 02 and 03, it uses up three entries of
the 400 entries available.
NN40020-603
Chapter 52 Call security and remote access 417
• Removing a restriction from a filter has no effect on the contents of other filters, even if the
restriction was copied to them.
• You cannot delete a filter. Removing the restrictions programmed on a filter makes it an
unrestricted filter but the filter itself is not removed.
Note: Default filters are loaded when the system is initialized. A cold
start restores the default filters.
Filters 02, 03, and 04, although not preset with restrictions and overrides, are the default filters in
these programming headings:
Tips: To restrict dialing from outside the system (once a caller gains remote access), apply
restriction filters to incoming external lines (as remote restrictions).
NN40020-603
Chapter 52 Call security and remote access 419
Line/Set
Line 5
restriction no long
distance
no long distance
except area
Line 5 codes 212, 718,
415
Figure 123, dialed digits must pass both the remote restriction and the line restriction. A remote
caller can override these filters by dialing the DISA DN and entering a CoS password.
• Setting up lines to allow users access to the system (“Creating Direct Inward System Access
(DISA)” on page 420.
• Setting up Remote Access Packages that determine what services the remote users can access.
• Setting up CoS passwords for users calling in through the PSTN on lines programmed with
DISA. (“Defining CoS passwords” on page 423)
• Auto-answer T1 loop start and T1 E&M trunks are configured to answer with DISA by
default.
• T1 DID trunks: You cannot configure T1 DID trunks to answer with DISA. If you want
incoming T1 DID calls to be answered with DISA, configure the system with a DISA DN.
Incoming T1 DID calls that map onto the DISA DN are then routed to a line that has DISA.
• You cannot program a DISA DN or Auto DN to VoIP trunks, because they act as auto-answer
lines for private networks. However, you still need to assign remote access packages to the
VoIP trunks, to ensure that remote access restrictions are properly applied to incoming calls
trying to access the system or the system network.
Also refer to the following information:
The remote access feature allows callers elsewhere on the private or the public network to access
your BCM by dialing directly and not going through the attendant. After the remote user is in the
system, they can use some of the system resources. You must enable remote access in
programming before callers can use it.
BCM supports remote system access on a number of trunk types which may require the remote
caller to enter a password for DISA.
NN40020-603
Chapter 52 Call security and remote access 421
The system resources, such as dialing capabilities, line pool access and feature access, that a
remote user may access depends on the CoS password assigned to them. See “Defining CoS
passwords” on page 423.
Loop start trunks provide remote access to BCM from the public network. They must be
configured to be auto-answer to provide remote system access.
A loop start trunk must have disconnect supervision if it is to operate in the auto-answer mode.
T1 E&M trunks always operate in disconnect supervised mode.
When a caller dials into the system on a line that has auto-answer without DISA, the system
answers with system dial tone and no CoS password is required. In this case, the remote access
package assigned to the line controls system capabilities.
When a caller dials in on a line that has auto-answer with DISA, the system answers with stuttered
dial tone. This is the prompt to enter a CoS password that determines which system capabilities are
available to the caller.
Remote system access on T1 DID trunks is similar to that of T1 E&M trunks connected to a
private network. The main differences are:
• A remote caller is on the public network dialing standard local or long distance telephone
numbers.
• DISA cannot be administered to a T1 DID and PRI trunk. You can program the dialed digits to
match those of a specific target line DN, the DISA DN or the Auto DN. If you program the
dialed digits to the DISA DN, only the incoming calls that match the programmed DN will
receive a DISA dial tone. Incoming calls with other digits will route to a target line.
A remote caller can access a BCM system dial tone, select a line pool that contains exchange lines
or DPNSS lines, then dial a number. The procedure is identical to dialing an outside number from
an extension in the local system. The main features are:
• Calls coming from another switch to the BCM system are routed in two ways, depending on
the Answer mode that you program. If the Answer mode is set to Manual, and the line is
assigned to ring at an extension, the incoming call automatically rings at the assigned
extension. If Answer mode is set to Auto, BCM automatically answers the incoming call.
Because most other DPNSS features are extension-specific, Nortel recommends that all
DPNSS lines are configured as auto-answer lines.
• The Page feature is available to both remote callers and callers within the system. A remote
caller must have DTMF capability to access the Page feature.
• The line redirection feature allows the originating party to redirect a call that is waiting a
connection or re-connection to an alternate destination after a time-out period. Failed calls can
be redirected. Priority calls cannot be redirected.
Systems connected to the private network deliver the last dialed digits to the destination BCM
system for interpretation. The destination BCM system matches the digits to a target line or
interprets the digits as a remote feature request. BCM then routes the call to the specified target
line or activates the remote feature.
• By default, T1 E&M trunks are set to answer with DISA. For auto-answer T1 E&M trunks
connected to a private network, change the default so that the trunks are not answered with
DISA. If an auto-answer T1 E&M trunk is configured to answer with DISA, the system tries to
interpret any received digits as a CoS password.
• The DISA DN and the Auto DN allow auto-answer private network and DID calls, in the same
way that calls on auto-answer loop start and auto-answer T1 E&M trunks can be answered,
with or without DISA. These DNs are described in “Understanding access codes” on
page 229.
• Answer with DISA cannot be administered to a PRI trunk. Instead, you can program the dialed
digits to match those of a specific target line DN, the DISA DN or the Auto DN on the other
system.
• Answer with DISA cannot be administer to voice over IP (VoIP), since they do not connect
systems outside the private network. However, a user calling in remotely on another system on
the network can use the trunk to access the system or a user calling in on a PSTN line can use
the trunk to access the private network. To provide control for this type of access, ensure that
you specify remote access packages for the trunk.
NN40020-603
Chapter 52 Call security and remote access 423
Create a remote access package by defining the system line pools remote users can access. You
then assign the package to individual lines, and to a particular Class of Service password (see
“Defining CoS passwords” on page 423).
• When an internal user enters a CoS password at a telephone, the restriction filters associated
with the CoS password apply instead of the normal restriction filters.
• Similarly, when a remote user enters a CoS password on an incoming auto-answer line, the
restriction filters and remote package associated with their CoS password apply instead of the
normal restriction filters and remote package.
The CoS password can define the set of line pools that may be accessed and whether or not the
user has access to the paging feature.
The class of service (CoS) that applies to an incoming remote access call is determined by:
• the CoS password that the caller used to gain access to BCM.
• in cases where DISA is not automatically applied to incoming calls, the remote caller can
change the class of service by dialing the DISA DN and entering a CoS password.
Remote users can access system lines, line pools, the Page feature, and remote administration. The
exact facilities available to you through remote access vary depending on how your installer set up
your system.
Note: If the loop start line used for remote access is not supervised,
auto-answer does not function and the caller hears ringing instead of a
stuttered tone or the system dial tone.
Security Note:
! CoS password security and capacity
• Determine the CoS passwords for a system randomly and change them on a
regular basis.
• Users should memorize their CoS passwords and keep them private.
Typically, each user has a separate password. However, several users can
share a password or one user can have several passwords.
• A system can have a maximum of 100 six-digit CoS passwords (00 to 99).
To maintain the security of your system, the following practices are recommended:
• Warn a person to whom you give the remote access number to keep the
number confidential.
• Warn a person to whom you give a CoS password, to memorize the password
and not to write it down.
NN40020-603
Chapter 52 Call security and remote access 425
NN40020-603
427
Chapter 53
Call Security: Configuring Direct Inward System Access
(DISA)
This following describes the telephony configuration that allows users to call from a remote site
into the system to access system features.
The following paths indicate where to access DISA settings in Element Manager and through
Telset Administration:
• Element Manager:
— Configuration > Resources > Telephony Resources
— Configuration > Telephony > Dialing Plan > Public Network
— Configuration > Telephony > Dialing Plan > Private Network
• Set up the system parameters for system users to call into the from a remote location. Note that
Remote Access Packages are required for private network trunks, as well.
• Auto-answer T1 loop start and T1 E&M trunks are configured to answer with DISA by
default.
• T1 DID trunks: You cannot configure T1 DID trunks to answer with DISA. If you want
incoming T1 DID calls to be answered with DISA, configure the system with a DISA DN.
Incoming T1 DID calls that map onto the DISA DN are then routed to a line that has DISA.
• You cannot program a DISA DN or Auto DN to VoIP trunks, because they act as auto-answer
lines for private networks. However, you still need to assign remote access packages to the
VoIP trunks, to ensure that remote access restrictions are properly applied to incoming calls
trying to access the system or the system network.
For specific line programming, refer to “Setting up remote access on lines” on page 430.
Figure 124 provides an overview of the remote access configuration process.
NN40020-603
Chapter 53 Call Security: Configuring Direct Inward System Access (DISA) 429
• A remote caller is on the public network dialing standard local or long distance telephone
numbers.
• DISA cannot be administered to a T1 DID trunk. You can program the dialed digits to match
those of a specific target line DN, the DISA DN or the Auto DN. If you program the dialed
digits to the DISA DN, only the incoming calls that match the programmed DN will receive a
DISA dial tone. Incoming calls with other digits will route to a target line.
NN40020-603
Chapter 53 Call Security: Configuring Direct Inward System Access (DISA) 431
Refer to “Configuring lines: T1-E&M” on page 151, “Configuring lines: T1-DID” on page 169.
Remote system access on PRI trunks is similar to that of T1 E&M trunks connected to a private
network.
The main differences are:
• A remote caller is on the public network dialing standard local or long-distance telephone
numbers.
• Answer with DISA cannot be administered to a PRI trunk. Instead, you can program the dialed
digits to match those of a specific target line DN, the DISA DN or the Auto DN.
• North America: Use incoming Call-by-Call (CbC) Service routing to map the call type to the
DISA DN.
With FX, INWATS, 900, and SDS service types, either a Service Id (SID) or a CDN is mapped
to Target Line Receive Digits. This is programmed under “Configuring PRI Call-by-Call
services” on page 148. DISA may be accessed by having the SID or CDN map to the DISA
DN. This example has a Receive Digit Length = 4, DISA DN = 1234, and CbC Routing with
(Service Type = FX, Map from SID = 2, Map to digits = 1234).
A call presented to the BCM system with service type FX and SID 2 will be handled as
follows:
— The ISDN setup message will specify FX with SID = 2
— The FX SID = 2 will be mapped to DISA DN digits 1234
— The call will be answered with DISA.
Refer to “Configuring lines: PRI” on page 145.
A remote caller can access a BCM system dial tone, select a line pool that contains exchange lines
or DPNSS lines, and then dial a number. The procedure is identical to dialing an outside number
from an extension in the local system. The main features are:
• Calls coming from another switch to the BCM system are routed in two ways, depending on
the Answer mode that you program. If the Answer mode is set to Manual, and the line is
assigned to ring at an extension, the incoming call automatically rings at the assigned
extension. If Answer mode is set to Auto, BCM automatically answers the incoming call.
Because most other DPNSS features are extension-specific, Nortel recommends that you
configure all DPNSS lines as auto-answer lines.
• The Page feature is available to both remote callers and callers within the system. A remote
caller must have DTMF capability to access the Page feature.
• The line redirection feature allows the originating party to redirect a call that is waiting a
connection or re-connection to an alternate destination after a time-out period. Failed calls can
be redirected. Priority calls cannot be redirected.
Refer to “Private networking: DPNSS network services (UK only)” on page 331.
Systems connected to the private network deliver the last dialed digits to the destination BCM
system for interpretation. The destination BCM system matches the digits to a target line or
interprets the digits as a remote feature request. BCM then routes the call to the specified target
line or activates the remote feature.
• By default, T1 E&M trunks are set to answer with DISA. For auto-answer T1 E&M trunks
connected to a private network, change the default so that the trunks are not answered with
DISA. If an auto-answer T1 E&M trunk is configured to answer with DISA, the system tries to
interpret any received digits as a CoS password.
• The DISA DN and the Auto DN allow auto-answer private network and DID calls, in the same
way that calls on auto-answer loop start and auto-answer T1 E&M trunks can be answered,
with or without DISA. These DNs are described in “Dialing plan: Private network settings” on
page 281.
• Answer with DISA cannot be administered to a PRI trunk. Instead, you can program the dialed
digits to match those of a specific target line DN, the DISA DN or the Auto DN on the other
system.
• Answer with DISA cannot be administer to voice over IP (VoIP), since they do not connect
systems outside the private network. However, a user calling in remotely on another system on
the network can use the trunk to access the system or a user calling in on a PSTN line can use
the trunk to access the private network. To provide control for this type of access, ensure that
you specify remote access packages for the trunk. This type of call is called a tandem call.
Other programming:
• “Call security: Remote access packages” on page 439
NN40020-603
433
Chapter 54
Call security: Restriction filters
The following describes the panels that are used to enter restriction filters and restriction overrides.
You can have a maximum of 100 restriction filters on the system.
The following paths indicate where to access restriction filter settings in Element Manager and
through Telset Administration:
• Element Manager: Configuration > Telephony > Call Security > Restriction Filters
Restriction filters
Restrictions are used to restrict outbound dialing. For example, restrictions can be applied to
restrict dialing 1-900 numbers.
The restriction filters panel contains three list boxes. You progress from left to right as you
populate the information.
4. Add exceptions.
1.Select a restriction filter. 3. If restricted digits have
exceptions, select the digit.
NN40020-603
Chapter 54 Call security: Restriction filters 435
Exceptions table
Digits <dialstring digit(s)> For each restriction digit, enter any numbers that should dial
out, despite the restriction.
Note: The wildcard A (Any) can be used as part of the
dialstring.
Actions:
Add Refer to “Adding a restriction filter and exceptions” on page 435
Delete 1. On the Filters table, select the filter where you want to delete information.
2. On the Restrictions table, select the restriction filter that has the exception that you
want to delete.
3. On the Exceptions table, click one or more of the exceptions.
4. Under the Exceptions table, click Delete.
5. Click OK.
The default values for restriction filters are based on country profile. Refer to “Default filters” on
page 436 and “Default filters for other common profiles” on page 437.
11 Click OK.
12 Next steps: Assign filters to lines, DN records and class of service (CoS) passwords for remote
access.
Default filters
The following provides a list of the default restriction filters for North America and other common
profiles:
NN40020-603
Chapter 54 Call security: Restriction filters 437
Note: Default filters are loaded when the system is initialized. A cold start restores the
default filters.
Filters 02, 03, and 04, although not preset with restrictions and overrides, are the default filters in
these programming headings:
NN40020-603
439
Chapter 55
Call security: Remote access packages
This panel describes the telephony configuration that is used to control access to system lines by
calls coming in from outside the system.The remote access package also allows remote paging
capabilities.
Note: Callers dialing into the system over private network lines are also
considered remote callers.
The following paths indicate where to access remote access packages in Element Manager and
through Telset Administration:
• Element Manager: Configuration > Telephony > Call Security > Remote Access Packages
Panels/Subpanels Tasks
“Configuring remote access packages” on “Restrictions (Line and Remote)” on page 137 (lines)
page 439
Also refer to: “Call Security: Configuring Direct Inward System
Access (DISA)” on page 427
“Configuring CoS passwords for remote access” on
page 443
Click the navigation tree heading to access general information about Hospitality services.
NN40020-603
Chapter 55 Call security: Remote access packages 441
Delete (line pool) 1. On the Packages table, select the remote package number where you want to
delete line pools.
2. On the Line Pool Access table select one or more line pools to delete.
3. Click Delete.
4. Click OK.
NN40020-603
443
Chapter 56
Configuring CoS passwords for remote access
The Class of Service panel allows you to configure passwords for system users who will be dialing
into the system over a PSTN/private network to use system features, or for users who must bypass
local restrictions on telephones.
The following paths indicate where to access the Class of Service settings in Element Manager and
through Telset Administration:
• Element Manager: Configuration > Telephony > Call Security > Class of Service
CoS passwords permit controlled access to the system resources by both internal and remote users.
• When an internal user enters a CoS password at a telephone, the restriction filters associated
with the CoS password apply instead of the normal restriction filters.
• Similarly, when a remote user enters a CoS password on an incoming auto-answer line, the
restriction filters and remote package associated with their CoS password apply instead of the
normal restriction filters and remote package.
!
Security Note: Change passwords frequently to discourage unauthorized access.
NN40020-603
Chapter 56 Configuring CoS passwords for remote access 445
The CoS password can define the set of line pools that may be accessed and whether or not the
user has access to the paging feature. The password all defines which restrictions are applied.
The class of service (CoS) that applies to an incoming remote access call is determined by:
• The CoS password that the caller used to gain access to BCM.
• In cases where DISA is not automatically applied to incoming calls, the remote caller can
change the class of service by dialing the DISA DN and entering a CoS password.
Remote users can access system lines, line pools, the Page feature, and remote administration. The
exact facilities available to you through remote access vary depending on how your installer set up
your system.
Security Note:
! CoS password security and capacity
• Determine the CoS passwords for a system randomly and change them on a
regular basis.
• Users should memorize their CoS passwords and keep them private.
Typically, each user has a separate password. However, several users can
share a password or one user can have several passwords.
• A system can have a maximum of 100 six-digit CoS passwords (00 to 99).
CoS passwords must be unique.
To maintain the security of your system, the following practices are recommended:
• Warn a person to whom you give the remote access number to keep the
number confidential.
• Warn a person to whom you give a CoS password, to memorize the password
and not to write it down.
CoS examples
NN40020-603
Chapter 56 Configuring CoS passwords for remote access 447
A sales representative out of the office needs to make long distance calls to the European office.
Your system has a leased line to Europe with reduced transatlantic charges. You provide the sales
representative with a Class of Service password that gives access to the transatlantic line. The sales
representative can telephone into the system (DISA DN) from a hotel, enter the Class of Service
password, and then use a destination code to access the leased transatlantic line to make calls.
NN40020-603
449
Chapter 57
LAN overview
On the BCM main unit, the LAN configuration determines how the Core Module of the BCM
communicates with other devices on the LAN. For the BCM with Router, the LAN configuration
also includes Router LAN configuration, which determines how the router communicates with
devices on the LAN.
The following explains the concepts of the LAN on the BCM. It contains the following topics:
What is a LAN?
The LAN (Local Area Network) is a group of IP devices that can all communicate directly with
each other over an IP network. Generally, all of these devices are in a small geographic range, such
as a single office or building. The BCM allows you to connect several IP devices together on a
LAN and then connect to the Internet or other LANs over a router.
LAN settings
LAN settings include determining IP and DNS settings and subnet settings.The LAN controls how
the BCM behaves as a device on the IP network.
To modify the LAN settings, refer to “IP Subsystem” on page 455.
DHCP configuration
By default, the BCM is set as a DHCP client. When the BCM is started, it sends a request for an
address to a DHCP server. If no server responds, it determines that there is no DHCP server on the
LAN, and it sets a static IP address of the last IP address received from the DHCP server. (The
default IP address is 192.168.1.2). Also refer to “DHCP configuration with router” on page 491.
NN40020-603
451
Chapter 58
Configuring the BCM with a DHCP address
NN40020-603
453
Chapter 59
Data networking overview
The BCM is a converged voice product, and can be connected to virtually any data network, to
provide Voice over Internet Protocol (VoIP) support in either a Local Area Network (LAN) or
Wide Area Network (WAN) environment. The BCM is also available with an integrated
Broadband Ethernet or ADSL Router, which is intended to provide basic data networking and
services, as well as Virtual Private Network (VPN) connectivity for small sites. Refer to “VPN
overview” on page 525 for more information. With the router, the BCM can handle all data
networking needs, including both VoIP and basic IP networking. The BCM is also available
without a router, to provide VoIP capabilities to networks that already have an existing IP network.
Network routing
The BCM is available with and without an internal router. With the router, it can handle all
external connections necessary for a data-network, as well as control security on these
connections. The standalone version of the BCM does not handle routing, but is suitable for IP
networks where a router is already in place. For information on the BCM router see “Router
overview” on page 469.
• Complete the pre-installation checklist. This will make sure that you’ve made all necessary
preparations for connecting the BCM. For information on completing the pre-installation
checklist, “Data network prerequisites checklist” on page 465.
• Configure your router. If you already have a router on your system, you must make some
modifications to its configuration for use with the BCM. If you have the BCM50a or BCM50e,
you must use the configuration guides for each of those products to set up your router. For
information about configuring the Router, refer to the BCM 4.0a Integrated Router
Configuration Guide (NN40020-500) or the BCM 4.0e Integrated Router Configuration Guide
(NN40020-501).
• Configure IP settings on the BCM. For information about configuring IP settings on the BCM,
refer to “LAN overview” on page 449.
• Configure DHCP on the BCM. For information about configuring DHCP on the BCM, refer to
“DHCP overview” on page 475.
NN40020-603
455
Chapter 60
IP Subsystem
The IP Settings define the basic and advanced IP address and DNS configuration for the BCM
main unit.
The panel tabs links provide a general description of each panel and definitions of each panel field.
Click one of the following links:
Panel tabs
“Main panel tabs: General settings” on page 455
“Main panel tabs: Internal subnets” on page 458
“Main panel tabs: Dial-out Static Routes” on page 461
IP settings options
The IP settings options include settings for modifying the IP address information for the BCM.
Warning: Modifying the IP address information for the BCM may cause the BCM to
temporarily lose connectivity to the network.
The IP address fields are read-only. However, you can modify their values using the Modify
button.
Warning: If any of the IP settings are changed in the modify window for IP settings, the
Element Manager will disconnect.
To modify an IP address
1 Click Configuration > System > IP Subsystem > General Settings tab.
2 Click Modify.
The Modify IP Settings dialog box appears.
3 Enter the appropriate values. See Table 94 for a description of these fields.
4 Click OK.
5 You may need to restart your Element Manager to reconnect with the BCM.
MTU option
BCM allows you to change the MTU based upon your network architecture.
NN40020-603
Chapter 60 IP Subsystem 457
NN40020-603
Chapter 60 IP Subsystem 459
The Internal LAN is an interface that is used internally by the BCM for digital signal processing.
Warning: Only modify a subnet if the address the subnets are currently set to are in-use
elsewhere on the network.
Modifying a Subnet
Warning: You should modify a subnet only if the address the subnet is currently set to are
in use elsewhere on the network.
To modify a subnet
1 Click Configuration > System > IP Subsystem > Internal Subnets tab.
2 Select the Subnet to modify.
3 Click Modify.
The Modify Internal Subnet Settings dialog box appears.
4 Change the settings.
5 Click OK.
NN40020-603
Chapter 60 IP Subsystem 461
NN40020-603
Chapter 60 IP Subsystem 463
NN40020-603
465
Chapter 61
Data network prerequisites checklist
Before you set up voice over IP (VoIP) trunks or IP telephones on a BCM, complete the following
checklists to ensure the system is correctly set up for IP telephony. Some items in the checklist do
not apply to all installations.
Network diagram
To aid in installation, a network diagram provides a basic understanding of how the network is
configured. Before you configure IP functionality, create a network diagram that captures all of the
information described in Table 97. If you are configuring IP telephones but not VoIP trunks, you
do not need to answer the last two questions.
Prerequisites Yes
1.a Are you using the BCM50a or BCM50e, and has a network diagram been developed? (If you
are not using the BCM50a or BCM50e, it is assumed that the BCM is being installed on an
existing network).
1.b Does the network diagram contain any routers, switches or bridges with corresponding
IP addresses and bandwidth values for WAN or LAN links?
1.c Does the network diagram contain IP Addresses, netmasks, and network locations for all BCM
systems and other BCM products?
1.d Answer this if your system will use IP trunks; otherwise, leave it blank: Does the network diagram
contain IP addresses and netmasks of any other VoIP gateways to which you must connect?
1.e Answer this only if your system will use a gatekeeper; otherwise, leave it blank: Does the network
diagram contain the IP address for any Gatekeeper that may be used?
Network devices
Table 98 contains questions about devices on the network such as firewalls, NAT devices, and
DHCP servers.
Prerequisites Yes No
2.a Is the network using DHCP?
2.b If so, are you using the DHCP server on the BCM Router?
2.d Are there enough public IP addresses to accommodate all IP telephones and the BCM?
2.e Does the system have a firewall/NAT device, or will the BCM be used as a firewall/NAT
device?
2.f If the BCM50a/BCM50e is to be used as a firewall/NAT device, do the firewall rules fit
within the 10 input rules and the 10 output rules that the BCM provides?
Network assessment
Answer the questions in Table 99 to ensure that the network is capable of handling IP telephony
and that existing network services are not adversely affected.
Prerequisites Yes No
3.a Has a network assessment been completed?
3.b Has the number of switch ports available and used in the LAN infrastructure been
calculated?
3.c Does the switch use VLANs? If so, get the VLAN port number and ID.
3.d Have the used and available IP addresses for each LAN segment been calculated?
3.f Has the speed and configuration of the LAN been calculated?
3.g Has the estimated latency values between network locations been calculated?
3.h Have the Bandwidth/CIR utilization values for all WAN links been calculated?
3.i Has the quality of service availability on the network been calculated?
NN40020-603
Chapter 61 Data network prerequisites checklist 467
Keycodes
All elements of VoIP trunks and IP telephony are locked by the BCM keycode system. Answer the
questions in Table 100 to ensure you have the appropriate keycodes. You can purchase keycodes
for the amount of access you want for your system. Additional keycodes can be added later,
provided there are adequate resources to handle them. For information about determining the
number of keycodes required, see the Keycode Installation Guide (NN40010-301).
Prerequisites Yes No
4.a Complete this question only if you are using VoIP trunks: Do you have enough VoIP
keycodes? H.323 trunks use VoIP keycodes.
4.b Complete this question only if you are using IP telephones: Do you have enough IP client
keycodes? (Note: IP clients and IP telephones are a 1:1 ratio. As soon as an IP telephone
is registered, it occupies an IP client, whether it is active or not.).
4.c If you are using VoIP trunks, do you need to activate MCDN features?
Note: If MCDN is already configured on your system for private networking over PRI lines,
you do not need a separate MCDN keycode for VoIP trunks.
Prerequisites Yes No
5.a Is the LAN functioning correctly with the BCM? You can test this by pinging
other addresses around the network from the BCM.
5.c Have you determined the published IP address for the system?
5.d Have the necessary media gateway, IP client, and IP trunks resources been set?
5.e Has a dialing plan been created, taking into account special considerations for IP
telephony and private and public networking?
5.f Have thresholds been set for desktop and soft client IP sets for voice quality
monitoring with Proactive Voice Quality Management?
VoIP trunks
Answer the questions in Table 102 if you are configuring VoIP trunks.
Prerequisites Yes No
6.a Have you confirmed the remote gateway settings and access codes required?
6.b Have you determined the preferred codecs required for each type of trunk and destination?
6.c Have you set up line parameters, determined line pools for H.323 trunks, and set up
destination codes? Have you determined which system telephones will have access to
these routes?
6.d If you have not already assigned target lines, have you defined how you are going to
distribute them on your system?
6.e Have you decided if you are going to employ the fallback feature?
If yes, ensure that your routing and scheduling are set up. Ensure that QoS is activated.
If either of these conditions is not met, your H.323 trunks will not work correctly.
IP telephone records
Answer the questions in Table 103 if you are installing i-series telephones.
Prerequisites Yes No
7.a Are IP connections and IP addresses available for all IP telephones?
7.b If DHCP is not being used, has all telephone configuration been documented and made
available for telephone installers?
Hint: Use the Programming Record form.
7.c If DHCP is not being used, or if you want to enter the port manually, has the VLAN port
number been supplied, if one is being used on the switch?
7.e Do computers that will be using the Nortel Software Phone IP softphone 2050 meet the
minimum system requirements, including headset?
Note: Additional details available on client page for BCM
7.f Have DN records been programmed for the corresponding IP clients? (Use when manually
assigning DNs to the telephones.)
NN40020-603
469
Chapter 62
Router overview
The following introduces the router, available with the BCM, and explains the two different types
of routers available. As well, it introduces the key features you must configure on your router.
For more information on the router, see your router documentation.
The router is a fully functional and powerful device that connects your LAN to an external data
network. In addition to configuring and connecting your LAN and WAN, it provides a wide range
of data services including Network Address Translation (NAT), Dynamic Host Configuration
Protocol (DHCP), firewalls, and Virtual Private Networks (VPN). See “VPN overview” on page
525 for more information.
• BCM50a: The BCM with an ADSL modem. This version connects to external networks over
an ADSL modem within the router.
• BCM50e: The BCM with Ethernet. This version connects to external networks over an
Ethernet connection.
Router features
The router offers a wide range of features ranging from DHCP, Firewall, NAT, and VPN. For
more information see the BCM 4.0a Integrated Router Configuration Guide (NN40020-500) and
the BCM 4.0e Integrated Router Configuration Guide (NN40020-501).
NN40020-603
471
Chapter 63
Router panel
Note: The Launch Router button will appear only if you have a
BCM50a/BCM50e.
Note: The BCM uses the default gateway setting as your router IP
address to launch the router WebGUI tool from Element Manager. If the
default gateway is not set to the router IP address, you must access the
router WebGUI directly from a web browser.
NN40020-603
473
Chapter 64
VLAN overview
A virtual LAN (VLAN) is a logical grouping of ports, controlled by a switch, and end-stations,
such as IP telephones, configured so that all ports and end-stations in the VLAN appear to be on
the same physical (or extended) LAN segment even though they may be geographically separated.
VLAN IDs are determined by how the VLAN switch is configured. If you are not the network
administrator, you must ask whoever manages the switch what the VLAN ID range is for your
system.
VLANs aim to offer the following benefits:
• VLANs are supported over all IEEE 802 LAN MAC protocols, and over shared media LANs
as well as point-to-point LANs.
• VLANs facilitate easy administration of logical groups of stations that can communicate as if
they were on the same LAN. They also facilitate easier administration of move, add, and
change in members of these groups.
• Traffic between VLANs is restricted. Bridges forward unicast, multicast, and broadcast traffic
only on LAN segments that serve the VLAN to which the traffic belongs.
• For IP telephony, VLANs provide a useful technique to separate and prioritize the telephony
traffic for L2 switches.
• VLAN also provides a shield from malicious traffic that may be targeted at the IP phone in
order to steal or disrupt service.
• As far as possible, VLANs maintain compatibility with existing bridges and end stations.
• If all bridge ports are configured to transmit and receive untagged frames, bridges will work in
plug-and-play ISO/IEC 15802-3 mode. End stations are able to communicate throughout the
Bridged LAN.
• Five choices 0x80, 0x90, 0x9d, 0xbf, 0xfb (128, 144, 157, 191, 251).
• Providing a choice of five types allows the IP Phone 2004 to work in environments where the
initial choice may already be in use by a different vendor. Select only one TYPE byte.
Length (1 octet): (variable depends on the message content)
Data (length octets):
• ASCII based
• format: VLAN-A:XXX,YYY.ZZZ.
where VLAN-A: uniquely identifies this as the Nortel DHCP VLAN discovery.
— -A signifies this version of this spec. Future enhancements could use -B, for example.
— ASCII , (comma) is used to separate fields.
— ASCII . (period) is used to signal end of structure.
— XXX, YYY and ZZZ are ASCII-encoded decimal numbers with a range of 0-4095. The
number is used to identify the VLAN Ids. A maximum of 10 VLAN Ids can be configured.
NONE means no VLAN (default VLAN).
The DHCP Offer message carrying VLAN information has no VLAN tag when it is sent out from
the DHCP server. However, a VLAN tag is added to the packet at the switch port. The packets are
untagged at the port of the IP phone.
NN40020-603
475
Chapter 65
DHCP overview
On the BCM, DHCP can be set up in a variety of configurations, based on your needs, your
existing network, and the version of the BCM that you have.
The following explains the various ways that you can configure DHCP on the BCM (including
router and main configuration).
Understanding DHCP
Dynamic Host Configuration Protocol (DHCP) is a protocol used to assign IP addresses to devices
on an IP network dynamically. With DHCP, each device obtains a new IP address every time it
connects to the network. DHCP allows a server to keep track of the IP addresses for all IP devices
on the network.
On the BCM, DHCP reduces the complexity of configuring IP devices, particularly IP phones. Not
only do IP phones receive an IP address through DHCP, they also receive additional information
such as gateway and port information.
If you intend to use the BCM50a or BCM50e as a DHCP server, configure the router to be the
DHCP server, as described in the BCM 4.0a Integrated Router Configuration Guide
(NN40020-500) or the BCM 4.0e Integrated Router Configuration Guide (NN40020-501). The
main module disables its own DHCP server if the route-embedded DHCP server is active.
With the DHCP Status set to Enabled (Automatic), which is the default, the BCM first attempts
to get a dynamic IP address from a DHCP server. When it does not get a response, it uses the IP
address 192.168.1.2/255.255.255.0. The system goes through the process of looking for a dynamic
IP address each time it reboots. By default, the DHCP server is setup to give out an address range
of 192.168.1.200 - 192.168.1.254.
The BCM DHCP server services all devices requesting DHCP information, such as NortelIP
phones and PCs. This is equivalent to setting the DHCP Status to Enabled (All Devices).
In this situation, the default VoIP settings are:
• S1 IP address: 192.168.1.2
• S1 Action: 1
• S1 Retry count: 1
• S2 IP address: 192.168.1.2
• S2 Port: 7000
• S2 Action: 1
NN40020-603
Chapter 65 DHCP overview 477
• S2 Retry count: 1
With the DHCP Status set to Enabled (Automatic), which is the default, the BCM first attempts
to get a dynamic IP address from a DHCP server. The external DHCP server responds with an IP
address, for example 47.166.50.108/255.255.255.192, as well as domain information such as
europe.nortel.com.
If the BCM receives an address assignment from a DHCP server, the BCM DHCP Server services
only Nortel IP Phones requesting DHCP information. It does not service PCs. This is equivalent to
setting the DHCP Status to Enabled (IP Phones Only).
The VoIP settings allow any Nortel IP telephone using DHCP to get the BCM address and connect
to the system:
• S1 IP address: 47.166.50.108
• S1 Port: 7000
• S1 Action: 1
• S1 Retry count: 1
• S2 IP address: 47.166.50.108
• S2 Port: 7000
• S2 Action: 1
• S2 Retry count: 1
In an instance where a BCM is unable to connect the DHCP server it had previously been using, it
uses configuration information that exists from the previous lease. After the BCM is unable to get
a dynamic IP address from a server, it uses the IP address saved from the previous lease. The VoIP
information remains unchanged, since the IP address for the BCM LAN has not changed. The
BCM still attempts to renew it’s dynamic IP address each time it reboots, so if the external DHCP
server becomes available again, it will get a new dynamic IP address.
If a BCM had been using a dynamic IP address, and is manually changed to use a static
IP address, the VoIP information for the BCM LAN changes as well.
For example, the BCM LAN IP address, S1 and S2 IP address were all set to 47.166.50.80. When
the BCM LAN IP address is changed to a static IP address 47.166.50.114, the S1 and S2 IP
addresses also change to 46.166.50.114. If the S1 or S2 IP addresses was set manually and is
different from the BCM customer LAN address, these addresses will not be updated.
The BCM50a and BCM50e include a router with a DHCP server. By default, this DHCP server
will provide a dynamic IP address to the BCM Customer LAN. The embedded router will
recognize the MAC address of the BCM and reserve an IP address (192.168.1.2 is the default
address).
When the BCM requests a dynamic IP address, the embedded router sends the reserved IP address,
and disables the DHCP server on the BCM.
The embedded router supplies DHCP information as well as the vendor information for IP sets. If
the reserved IP address for the BCM matches the S1 or S2 address and is changed, the VoIP
information changes as well. If the S1 or S2 IP address have been set manually and are different
from the BCM address, these addresses are not updated.
For example, a system has a BCM LAN IP address of 47.166.50.108, an S1 IP address of
47.50.22.34, and an S2 IP address of 47.166.50.108. If the BCM LAN IP address is changed, the
S2 IP address changes as well, because it had matched the BCM LAN IP address. The S1 IP
address does not change, because it had been set manually.
Whenever the BCM LAN IP address changes, the IP sets eventually detect this and reset
themselves if they are using DHCP. If they are manually configured, then each set must be
re-configured to point to the new BCM IP address. They will get the new VoIP information from
the embedded router, which provides them with the new IP address for the BCM.
Default configurations
The DHCP component is designed with an automatic configuration that should work in most
environments.
If the BCM includes a router, the router is by default the DHCP Server.
The core module is by default a DHCP client. It attempts to obtain its IP address over DHCP.
The core module DHCP Server setting is by default set to ‘automatic’. The result of the DHCP
client’s request determines the functionality of the DHCP Server.
If it is successful in obtaining an IP address, the BCM turns on its DHCP Server to supply
addresses to IP sets only. It will ignore DHCP requests from other IP devices, allowing those
requests to be handled by the other DHCP Server on the network.
If it is unsuccessful in obtaining an IP address, the BCM turns off its DHCP client, and turns on its
DHCP Server to supply addresses to all devices that request IP addresses.
NN40020-603
Chapter 65 DHCP overview 479
NN40020-603
481
Chapter 66
DHCP Server Settings panel
The DHCP Server Settings contains fields for configuring the BCM core as a DHCP server.
Panel tabs
“Main panel tabs: General
Settings” on page 481
“Main panel tabs: IP Terminal
DHCP Options” on page 483
“Main panel tabs: Address
Ranges” on page 486
“Main panel tabs: Lease Info” on
page 489
Warning: Whenever you make changes to the default gateway, the DHCP server may
become unavailable to clients for a brief period of time. When making changes, consider
doing so at a time that will minimize the effect on users.
NN40020-603
Chapter 66 DHCP Server Settings panel 483
VLAN options
If you are using a router that supports VLAN, you can configure the BCM as a VLAN member by
entering a VLAN string into this field. This identifier is sent out to all IP terminals along with their
DHCP information.
NN40020-603
Chapter 66 DHCP Server Settings panel 485
The Address Ranges tab specifies IP addresses to be provided to DHCP clients. The Address
Ranges tab has two tables: Included Address Ranges and Reserved Addresses.The Included
Address Ranges specifies a range of IP addresses to be provided to DHCP clients.
DHCP subnets
By default, the DHCP server on the BCM must configure a range of IP addresses to supply the IP
sets. It defaults to use the top 20 percent of a subnet. For example, if an external DHCP server
supplies the following IP address to the BCM: 177.218.21.45/255.255.255.0, then the BCM
DHCP server configures itself to reserve the following range 177.218.21.200-177.218.21.254.
You can use Element Manager to check and change this default. The Reserved Addresses table
lists IP addresses that are reserved for specific clients. These IP addresses can fall within an
Included Address Range, or they can be outside any Included Address Ranges.
NN40020-603
Chapter 66 DHCP Server Settings panel 487
Note: You cannot exclude addresses in an address range. Instead, you can use multiple
address ranges:
1 Create one address range for the IP addresses below the excluded addresses.
2 Create a second address range for the IP addresses above the excluded
addresses.
For example, to create an address range from 10.10.10.10 to 10.10.10.49, but excluding
addresses from 10.10.10.20 to 10.10.10.29, create one address range from 10.10.10.10 to
10.10.10.19 and one address range from 10.10.10.30 to 10.10.10.49.
NN40020-603
Chapter 66 DHCP Server Settings panel 489
NN40020-603
491
Chapter 67
DHCP configuration with router
If you have a BCM with an embedded router (BCM50a or BCM50e), the BCM requests its IP
configuration from the router. By default, the IP address of the integrated router is 192.168.1.1. By
default it always reserves 192.168.1.2 for the BCM LAN. If the IP address of the router is
changed, the IP address of the BCM LAN also changes.
• The network is already using DHCP from another server, but the network contains devices that
require the BCM DHCP server, such as Nortel IP Phones.
• The network is already using DHCP from another server, and the network does not contain any
devices that require the BCM DHCP server.
• The network does not have a DHCP server, and the BCM DHCP server is required to provide
IP addresses to all DHCP clients.
If your network matches one of these configuration scenarios, ensure that the DHCP status is set to
enabled-automatic.
If the network configuration does not match any of these scenarios, you can either disable the
DHCP server, set the DHCP server to respond to requests from IP phones only, or set the DHCP
server to respond to requests from all DHCP clients.
• IP Address: 192.168.1.2
• Gateway: 192.168.1.1
The DHCP server on the BCM will provide all necessary information to DHCP clients on the
networks.
NN40020-603
Chapter 67 DHCP configuration with router 493
NN40020-603
495
Chapter 68
Firewall configuration resources
Table 108 shows the port configurations that must be allowed on a firewall for the BCM to
function properly.
NN40020-603
497
Chapter 69
Dial Up overview
• Remote Access allows users at a client station to connect to the BCM across a phone line
using Point to Point Protocol (PPP). This allows a person working from home or from a
remote location to connect to the BCM LAN through a modem and a phone line.
• WAN Failover is used in conjunction with the Integrated Router. The Integrated Router
monitors the status of the primary WAN link. When the primary WAN link is detected to have
failed, the Integrated Router will route the traffic to the WAN Failover dial-up interface. When
the WAN link recovers the dialled failover WAN connection is terminated and the IP traffic is
then routed over the primary WAN link.
The primary WAN link is located on the integrated router and the dialup links are located on the
CSC card.
Refer to the following information on Remote Access, Automatic Dial-Out, and WAN failover
services:
• To configure Dial-In:
“Modem Dial-In Parameters panel” on page 514
“ISDN Dial-In Parameters panel” on page 518
• To configure Dial-Out:
“Dial-out Interfaces panel” on page 501
The BCM can be configured with callback users along with their callback numbers. In this
scenario, the user can ask BCM to callback before establishing the PPP connection. The BCM will
validate the user name and use the callback number associated with the account where the user
name was found. The authentication will be made using the user name and password associated
with the account where the callback user name was found. The modem will try to call a
configurable amount of time, with a configurable delay between attempts.
The BCM modem or ISDN interface will automatically disconnect if there is no traffic on the IP
link for a configurable amount of time.
The IP addresses assigned to the BCM and the remote client are configurable.
• The default configuration for the modem dial-in is for the BCM to assign itself an address of
10.10.14.1 and assign to the remote client an address of 10.10.14.2. The settings can be
changed to have the remote client assign itself an address or even assign the BCM an address.
• The default configuration for ISDN dial-in is for the BCM to assign the first ISDN interface an
address of 10.10.18.1 and the second client an address of 10.10.18.2. The first remote client is
assigned 10.10.18.10 and the second client is assigned 10.10.18.11. The settings can be
changed to have the remote clients assign themselves an address or even assign the BCM an
address.
Finally, an administrator has the capability to disconnect a modem or ISDN call if they find that a
modem or ISDN call is in progress.
To program the RAS configurable options, select:
NN40020-603
Chapter 69 Dial Up overview 499
The BCM will use the user name and password associated with the configured account to
authenticate itself with the remote server.
The IP addresses assigned to the BCM and the remote server are configurable. Both must be
resolvable with the routes programmed for dialing out and the remote server address must match
the address supplied when programming the service that will attempt to deliver the packets. More
than one route can be programmed, but all will use the same phone number to reach the remote
server.
To program the Automatic Data Dial-Out configurable options in Element Manager, select
Configuration > Resources > Dial Up Interfaces > Dial-Out Interfaces.
Modem compatibility
The internal modem is compatible with all V.34 modems, and has been tested with the following
modems:
NN40020-603
501
Chapter 70
Dial Up Interfaces panel
Panel Task
Dial-out Interfaces panel Add and configure the dial-out interfaces
Global Settings panel Set the WAN Failover interface
Modem Dial-In Parameters panel Configure and check the status of the modem dial-in interface
ISDN Dial-In Parameters panel Configure and check the status of the ISDN dial-in interfaces
ISDN configuration
• “ISDN interfaces” on page 502
Modem configuration
• “Modem interface” on page 508
ISDN interfaces
ISDN interfaces can only be configured on a BCM50 with an integrated BRI module, or on a BCM
with a BRI MBM installed in the expansion unit. A maximum of two BRI-ISDN interfaces are
supported on each BCM. Each of these interfaces supports two ISDN B-channels.
NN40020-603
Chapter 70 Dial Up Interfaces panel 503
NN40020-603
Chapter 70 Dial Up Interfaces panel 505
NN40020-603
Chapter 70 Dial Up Interfaces panel 507
Modem interface
BCM supports one V.34 modem connection to, and from, the BCM50.
Caution: Do not modify any of the advanced modem settings on the integrated
router.
NN40020-603
Chapter 70 Dial Up Interfaces panel 509
NN40020-603
Chapter 70 Dial Up Interfaces panel 511
NN40020-603
Chapter 70 Dial Up Interfaces panel 513
WAN failover
The Integrated Router monitors the status of the primary WAN link. When the primary WAN link
is detected to have failed, the Integrated Router will route the traffic to the WAN Failover dial-up
interface, if one is configured. Refer to “WAN Failover Service” on page 500.
The following settings must be configured on the router for WAN failover to
function:
NN40020-603
Chapter 70 Dial Up Interfaces panel 515
NN40020-603
Chapter 70 Dial Up Interfaces panel 517
BCM50a/e
Customer LAN
CSC: 192.168.1.2
PC1 Router: 192.168.1.1 DIALIN_PC
(192.168.1.50) (10.10.14.2)
If you want DIALIN_PC to access PC1 (192.168.1.50) on the customer LAN, then you must
configure a static route on the integrated router to route all traffic for the dial-in IP address to the
CSC card on the BCM50 (192.168.1.2). The static route is configured as shown in Table 117:
Table 117 Static route configuration
Parameter Value
Active Selected
Destination IP Address 10.10.14.0
IP Subnet Mask 255.255.255.0
Gateway IP Address 192.168.1.2
Metric 1
You must also configure the firewall on the integrated router to Bypass Triangle Route. Using the
same example, if there is a ping request from DIALIN_PC (10.10.14.2) to PC1 (192.168.1.50):
• The CSC receives the ping request at 10.10.14.1 and forwards the packet through the customer
LAN (192.168.1.2) to PC1 (192.168.1.50).
• PC1 sends the ping reply to the integrated router (192.168.1.2) since this is the default gateway
for PC1. PC1 does not have a route to 10.10.14.2.
• If Bypass Triangle Route is not selected, the firewall blocks the ping reply and generates the
error message: out-of-order ICMP. This occurs because the integrated router does not see the
ping request. The ping request was sent directly from the CSC (192.168.1.2) to PC1
(192.168.1.50).
For more information about configuring static routes and configuring Bypass Triangle Route, see
BCM50a Integrated Router Configuration — Basics (N0115790) or BCM50e Integrated Router
Configuration — Basics (N0115788).
NN40020-603
Chapter 70 Dial Up Interfaces panel 519
NN40020-603
Chapter 70 Dial Up Interfaces panel 521
Caution: Select the Enable Dial Back-Up check box to enable Dial Back-up on
the router. Do not change the other Basic or Advanced Settings.
Management applications such as SNMP trap dial out, Scheduled Log transfer, Scheduled Backup,
and Scheduled CDR records transfer can use automatic dial-out over an ISDN or Modem
interface. To configure the automatic data transfer, the administrator must configure a static route,
with the auto dial-out field selected, and associate it with the application. When data is sent to the
destination address, the network recognizes the address of the application, and triggers the dial-out
to establish the connection.The packets are then sent over the link to the destination.
Notes:
• The dial-out interface must be enabled to configure static routes.
• The disconnect time for the interface must be greater than 60 seconds. This is configured on
the Link Parameters tab of the selected interface under Configuration > Resources > Dial
Up Interfaces.
• Auto dial-out routes cannot be added if the interface is already manually connected, unless the
interface is already connected with auto dial-out routes configured.
2 Enable the interface under Configuration > Resources > Dial Up Interfaces.
3 Select the Automatic Dialout check box for the interface.
4 Set the Idle timeout (s) on the Link Parameters tab to a value greater than 60 seconds.
5 Add a static route. Refer to “To add a new IP Static Route” on page 463.
6 Associate the route with an application.
NN40020-603
Chapter 70 Dial Up Interfaces panel 523
• software upgrades
The basic steps to set dial-up as the primary connection are:
1 Create or assign an account with remote access privileges.
2 Create a dial-up interface, and enter the username of the account with remote access privileges
as the dial-out username.
3 Create a static route for the dial-up interface, or assign a dial-out number, depending on the
type of device selected.
4 Tell the application to use the route.
The following example demonstrates how to configure the dial-up interface.
Note: The Host address must be the IP address of the static route created in
this procedure.
4 Click OK.
NN40020-603
525
Appendix A
VPN overview
A VPN (Virtual Private Network) is a group of systems connected across various data-transfer
technologies that form a secure and private network.
BCM uses the Internet and tunneling protocols to create secure VPNs. These secure extranets
require a protocol for safe transport from the BCM to another device through the Public Data
Network (PDN). BCM uses the IPSec tunneling protocols.
Extranets can connect:
• mobile users to a fixed private network at their office over the PDN
• private networks in the two branch offices of the same corporation over PDN
IPSec tunnels
In the IPSec Specification, there are two tunnel modes defined: tunnel mode and transport mode.
BCM supports only tunnel mode. Tunnel mode describes a method of packetizing TCP/IP traffic
to create a virtual tunnel.
Tunnels are created between servers, which are also known as gateways. This is called a Branch
Office Connection. The end nodes connect to each other through gateways. These gateways set up
the tunnel over the PDN on behalf of the end nodes. The establishment of the tunnel, and the PDN
in between, is transparent to the end nodes which behave as if they are interacting through a router.
Typically, the edge devices connecting the branches of a corporation to the ISP use VPN in this
mode.
BCM is compatible with the Nortel Services Edge Router (formerly known as Shasta 5000) and
the following versions of the Contivity VPN Client:
• V_05_01
• V_05_11
• V_06_01
• V_06_02
• V_07_01
The following describes configuring the tunnel portion of BCM using IPSec.
• Branch Office support that allows you to configure an IPSec tunnel connection between two
private networks.
NN40020-603
Appendix A VPN overview 527
IPSec
Nortel and other third-party vendors support the IPsec tunneling protocol. IPsec is an emerging
standard that offers a strong level of encryption (DES and Triple DES), integrity protection (MD5
and SHA), and the IETF-commended Internet Security Association & Key Management Protocol
(ISAKMP) and Oakley Key Determination Protocols.
Encryption
All of the following encryption methods ensure that the packets have come from the original
source at the secure end of the tunnel. Note that some of the encryption types will not appear on
some non-US models that are restricted by US Domestic export laws.
Table 119 shows a comparison of the security provided by the available encryption and
authentication methods.
Note: Using higher-level encryption, such as Triple DES, requires more system resources
and increases packet latency. You must consider this when designing your overall
network.
Note: If two devices have different encryption settings, the two devices will negotiate
downward until they agree on a compatible encryption capability. For example, if Switch
A attempts to negotiate Triple DES encryption with Switch B that is using 56-bit DES,
then the Switch B will reject Triple DES encryption in favor of the 56-bit DES.
Each of the systems must have at least one encryption setting in common. If they do not, a
tunnel is not negotiated. In the example above, both systems must have 56-bit DES
enabled.
• the protocol
Protocol
The protocol can be ESP or AH.
• ESP
Encapsulating Security Payload (ESP) provides data integrity, source authentication and
confidentiality for IP datagrams by encrypting the payload data to be protected. ESP uses the
Data Encryption Standard (DES) and Triple DES algorithms.
• AH
Authentication Header (AH) provides data integrity and source authentication. The AH
method does not encrypt data.
Note: The use of a NAT device in the IPSec tunnel path can sometimes cause the AH
method to report a security violation. This occurs because the NAT device changes the IP
Address of an AH authenticated packet causing the authentication of this packet to fail.
Encryption method
The encryption method can be Triple DES, 56-bit DES or 40-bit DES. Triple DES is the strongest
encryption and 40-bit DES is the weakest encryption.
• Triple DES
Triple DES is an encryption block cipher algorithm that uses a 168-bit key. It uses the DES
encryption algorithm three times. The first 56 bits of the key is used to encrypt the data, then
the second 56 bits is used to decrypt the data. Finally, the data is encrypted once again with the
third 56 bits. These three steps triple the complexity of the algorithm.
• 56-bit DES
56-bit DES is an encryption block cipher algorithm that uses a 56-bit key (with 8 bits of parity)
over a 64-bit block. The 56 bits of the key are transformed and combined with a 64-bit
message through a complex process of 16 steps.
• 40-bit DES
40-bit DES is an encryption block cipher algorithm that uses a 40-bit key (with 8 bits of parity)
over a 64-bit block. The 40 bits of the key are transformed and combined with a 64-bit
message through a complex process of 16 steps. Both 40- and 56-bit DES require the same
processing demands, so you should use 56-bit DES unless local encryption laws prohibit
doing so.
NN40020-603
529
Appendix B
Silence suppression
The following describes using silence suppression on half-duplex and full-duplex links:
Silence suppression, also known as voice activity detection, reduces bandwidth requirements by as
much as 50 percent. The following explains how silence suppression functions on a Business
Communications Manager network.
G.711 and G.729, support Silence suppression.
A key to VoIP Gateways in business applications is reducing WAN bandwidth use. Beyond
speech compression, the best bandwidth-reducing technology is silence suppression, also known
as Voice Activity Detection (VAD). Silence suppression technology identifies the periods of
silence in a conversation, and stops sending IP speech packets during those periods. Telco studies
show that in a typical telephone conversation, only about 36% to 40% of a full-duplex
conversation is active. When one person talks, the other listens. This is half-duplex. There are
important periods of silence during speaker pauses between words and phrases. By applying
silence suppression, average bandwidth use is reduced by the same amount. This reduction in
average bandwidth requirements develops over a 20-to-30-second period as the conversation
switches from one direction to another.
When a voice is being transmitted, it uses the full rate or continuous transmission rate.
The effects of silence suppression on peak bandwidth requirements differ, depending on whether
the link is half-duplex or full-duplex.
Conversation
Hello Fred. this is Susan Do you have a minute?
Tx
Fred Here. Hi! Sure!
Rx
Conversation
Bandwidth used
Tx + Rx Chan
Channel/Link max
Bandwidth
Time
When silence suppression is enabled, voice packets are only sent when a speaker is talking. In a
typical voice conversation, while one speaker is talking, the other speaker is listening – a
half-duplex conversation. The following figure shows the peak bandwidth requirements for one
call on a half-duplex link with silence suppression enabled. Because the sender and receiver
alternate the use of the shared channel, the peak bandwidth requirement is equal to the full
transmission rate. Only one media path is present on the channel at one time.
Conversation
Hello Fred. this is Susan Do you have a minute?
Tx
Fred Here. Hi! Sure!
Rx
Conversation
Bandwidth used Channel/Link max
Tx + Rx Chan
Bandwidth
Time
NN40020-603
Appendix B Silence suppression 531
The effect of silence suppression on half-duplex links is, therefore, to reduce the peak and average
bandwidth requirements by approximately 50% of the full transmission rate. Because the sender
and receiver are sharing the same bandwidth, this effect can be aggregated for a number of calls.
The following figure shows the peak bandwidth requirements for two calls on a half-duplex link
with silence suppression enabled. The peak bandwidth for all calls is equal to the sum of the peak
bandwidth for each individual call. In this case, that is twice the full transmission rate for the two
calls.
Conversation
Bandwidth used
Tx + Rx Chan
Channel/Link max
Bandwidth
Time
Conversation
Bandwidth used
Channel/Link max
Rx Channel
Bandwidth
Time
Channel/Link max
Tx Channel
Bandwidth
Time
Voice frames sent even when speaker is silent
When silence suppression is enabled, voice packets are only sent when a speaker is talking. When
a voice is being transmitted, it uses the full-rate transmission rate. Since the sender and receiver do
not share the same channel, the peak bandwidth requirement per channel is still equal to the full
transmission rate. The following figure shows the peak bandwidth requirements for one call on a
full-duplex link with silence suppression enabled. The spare bandwidth made available by silence
suppression is used for lower-priority data applications that can tolerate increased delay and jitter.
Conversation
Rx Channel
Bandwidth used
Bandwidth
Channel/Link max
Time
Channel/Link max
Tx Channel
Bandwidth
Time
Independent Tx and Rx bandwidth not shared by half-duplex calls.
Bandwidth available for data apps.
NN40020-603
Appendix B Silence suppression 533
When several calls are made over a full-duplex link, all calls share the same transmit path and they
share the same receive path. Since the calls are independent, the peak bandwidth must account for
the possibility that all speakers at one end of the link may talk at the same time. Therefore, the
peak bandwidth for n calls is n * the full transmission rate. The following figure shows the peak
bandwidth requirements for two calls on a full-duplex link with silence suppression. Note that the
peak bandwidth is twice the full transmission rate, even though the average bandwidth is
considerably less.
The spare bandwidth made available by silence suppression is available for lower priority data
applications that can tolerate increased delay and jitter.
Bandwidth used
Rx Channel
Channel/Link max
Bandwidth
Time
Channel/Link max
Tx Channel
Bandwidth
Time
Comfort noise
To provide a more natural sound during periods of silence, comfort noise is added at the
destination gateway when silence suppression is active. The source gateway sends information
packets to the destination gateway informing it that silence suppression is active and describing
what background comfort noise to insert. The source gateway only sends the information packets
when it detects a significant change in background noise.
NN40020-603
535
Appendix C
ISDN overview
The following provides some general information about using ISDN lines on your BCM system.
Detailed information about ISDN is widely available through the internet. Your service provider
can also provide you with specific information to help you understand what suits your
requirements.
Refer to the following:
• “Services and features for ISDN BRI and PRI” on page 537
Welcome to ISDN
Integrated Services Digital Network (ISDN) technology provides a fast, accurate and reliable
means of sending and receiving voice, data, images, text, and other information through the
telecom network.
ISDN uses existing analog telephone wires and multiplex it into separate digital channels which
increases bandwidth.
ISDN uses a single transport to carry multiple information types. What once required separate
networks for voice, data, images, or video conferencing is now combined onto one common
high-speed transport.
Refer to the following information:
ISDN offers significantly higher bandwidth and speed than analog transmission because of its
end-to-end digital connectivity on all transmission circuits. Being digital allows ISDN lines to
provide better quality signaling than analog POTS lines, and ISDN out-of band data channel
signaling offers faster call set up and tear down.
While an analog line carries only a single transmission at a time, an ISDN line can carry one or
more voice, data, fax, and video transmissions simultaneously.
An analog modem operating at 14.4K takes about 4.5 minutes to transfer a 1MB data file and a
28.8K modem takes about half that time. Using one channel of an ISDN line, the transfer time is
reduced to only 1 minute and if two ISDN channels are used, transfer time is just 30 seconds.
When transmitting data, the connect time for an average ISDN call is about three seconds per call,
compared to about 21 seconds for the average analog modem call.
Two types of ISDN services (lines) are available: Basic Rate Interface (BRI) and Primary Rate
Interface (PRI). Each line is made up of separate channels known as B and D channels which
transmit information simultaneously.
• BRI is known as 2B+D because it consists of two B-channels and one D-channel.
• PRI is known as 23B+D(in North America) or as 30B+D (in Europe). In North America,
23B+D consists of 23 B-channels and one D-channel (T1 carrier). In Europe, 30B+D consists
of 30 B-channels and one D-channel (E1 carrier).
B channels: B channels are the bearer channel and are used to carry voice or data information and
have speeds of 64 kbps. Since each ISDN link (BRI or PRI) has more than one B-channel, a user
can perform more than one transmission at the same time, using a single ISDN link.
D channels: The standard signaling protocol is transmitted over a dedicated data channel called
the D-channel. The D-channel carries call setup and feature activation information to the
destination and has speeds of 16 kbps (BRI) and 64 kbps PRI. Data information consists of control
and signal information and for BRI only, packet-switched data such as credit card verification.
ISDN layers
ISDN layers refer to the standards established to guide the manufacturers of ISDN equipment and
are based on the OSI (Open Systems Interconnection) model. The layers include both physical
connections, such as wiring, and logical connections, which are programmed in computer
software.
When equipment is designed to the ISDN standard for one of the layers, it works with equipment
for the layers above and below it. Three layers are at work in ISDN for BCM. To support ISDN
service, all three layers must be working properly.
NN40020-603
Appendix C ISDN overview 537
• Layer 1: A physical connection that supports fundamental signaling passed between the ISDN
network (your service provider) and the BCM system. When the LED on a BRI S/T Media
Bay Module configured as BRI is lit, your layer 1 is functioning.
• Layer 2: A logical connection between the central office or the far end and the BCM system.
BCM has one or two of these connections for each BRI link, and one for each PRI link.
Without Layer 2, call processing is not possible.
• Layer 3: Also a logical connection between the ISDN network (your service provider) and the
BCM system. For BRI lines, layer 3 is where call processing and service profile identifier
(SPID) information is exchanged. This controls which central office services are available to
the connection. For example, a network connection can be programmed to carry data calls.
The three layers mentioned in this section are important when you are installing, maintaining, and
troubleshooting an ISDN system. For information about troubleshooting ISDN, see the
Administration Guide (NN40020-600).
Bearer capability describes the transmission standard used by the BRI or PRI line so that it can
work within a larger ISDN hardware and software network.
The bearer capability for BRI and PRI is voice/speech, 3.1 kHz audio (fax), and data (unrestricted
64 kbps, restricted 64 kbps, or 56 kbps).
• video transmission
• data transmission at speeds up to 128 kbps per loop (depending on the bandwidth supported by
your service provider)
• shared digital lines for voice and data ISDN terminal equipment
BCM Basic Rate Interface (BRI) also support D-channel packet service between a network and
terminal connection. This allows you to add applications such as point-of-sale terminals (POSTA)
without additional network connections. Connecting a POSTA allows transaction terminals
(devices where you swipe credit or debit cards) to transmit information using the D channel of the
BRI line, while the B channels of the BRI line remain available for voice and data calls. A special
adapter links transaction equipment, such as cash registers, credit card verification rigs, and
point-of-sale terminals, to the X.25 network, which is a data communications network designed to
transmit information in the form of small data packets.
To support the D-packet service, your ISDN network and financial institution must be equipped
with a D-packet handler. To convert the protocol used by the transaction equipment to the X.25
protocol, your ISDN network must also be equipped with an integrated X.25 PAD which works
with the following versions of X.25: Datapac 32011, CCITT, T3POS, ITT and API. The ISDN
service package you order must include D-packet service (for example, Package P in the United
States; Microlink™ with D-channel in Canada).
NN40020-603
Appendix C ISDN overview 539
Your service provider supplies a Terminal Endpoint Identifier (TEI) and DN to support D-packet
service. The TEI is a number between 00 and 63 (in Canada, the default range is 21-63). Your
service provider may also supply you with a DN to program your D-packet device. The DN for
D-packet service becomes part of the dialing string used by the D-packet to call the packet handler.
• D-channel packet service (BRI only) to support devices such as transaction terminals.
Transaction terminals are used to swipe credit or debit cards and transmit the information to a
financial institution in data packets.
• Calling number identification (appears on both BCM sets and ISDN terminal equipment with
the capability to show the information).
• Multi-Line hunt or DN hunting which switches a call to another ISDN line if the line usually
used by the Network DN is busy. (BRI only)
• Subaddressing of terminal equipment (TE) on the same BRI loop. However, terminal
equipment which supports sub-addressing is not commonly available in North America. (BRI
only)
Transmission of B-channel packet data using nailed-up trunks is not supported by BCM.
Contact your ISDN service provider for more information about these services and features. For
more information about ordering ISDN service in North America, see “Ordering ISDN PRI” on
page 545 and “Ordering ISDN BRI” on page 546.
The terminal equipment (TE) connected to the BCM system can use some feature codes supported
by the ISDN service provider.
• Public: Public service calls connect your BCM set with a Central Office (CO). DID and DOD
calls are supported.
• Private: Private service calls connect your BCM set with a Virtual Private Network. DID and
DOD calls are supported. A private dialing plan may be used.
• TIE: TIE services are private incoming and outgoing services that connect Private Branch
Exchanges (PBX) such as BCM.
• FX (Foreign Exchange): FX service calls logically connect your BCM telephone to a remote
CO. It provides the equivalent of local service at the distant exchange.
• OUTWATS: OUTWATS is for outgoing calls. This allows you to originate calls to telephones
in a specific geographical area called a zone or band. Typically a flat monthly fee is charged
for this service.
• Inwats: Inwats is a type of long distance service which allows you to receive calls originating
within specified areas without a charge to the caller. A toll-free number is assigned to allow for
reversed billing.
Consult your customer service representative to determine whether or not this feature is
compatible with your provider.
NN40020-603
Appendix C ISDN overview 541
• In order for all sets to be reached from a Public Safety Answering Position (PSAP), the system
must be configured for DID access to all sets. In order to reduce confusion, the dial digits for
each set should be configured to correspond to the set extension number.
• The OLI digits for each set should be identical to the DID dialed digits for the set.
• If attendant notification is required, the routing table must be set up for all 911 calls to use a
dedicated line which has an appearance on the attendant console.
• The actual digit string 911 is not hard-coded into the system. More than one emergency
number can be supported.
If transmission of internal extension numbers is not required or desired, Nortel recommends that
the person in charge of the system maintain a site map or location directory so that emergency
personnel can rapidly locate a BCM set given its DID number. Keep this list up-to-date and readily
available.
IP telephony note: Ensure that you do not apply a 911 route to an IP telephone that is off the
premises where the PSAP is connected to the system.
2-way DID
With PRI the same lines can be used for receiving direct inward dialing (DID) and for making
direct outward dialing (DOD) calls.
The dialing plan configured by your customer service representative determines how calls are
routed. Consult your customer service representative to determine whether or not this feature is
compatible with your service provider.
• allows incoming calls to be routed to sets based on service type and digits received
• provides the ability to map user-dialed digits to a service type on a Call-by-Call basis
• allows long distance carrier selection through user-dialed Carrier Access Codes
Consult your customer service representative to determine how your dialing plan is configured.
ISDN hardware
To support connections to an ISDN network and ISDN terminal equipment, your BCM must be
equipped with a BRI S/T Media Bay Module (BRIM) or a Digital Trunk Media Bay Module
(DTM) card configured for PRI.
Refer to the following for a description of the BRI and PRI hardware:
PRI hardware
The Digital Trunk Media Bay Module (DTM) is configured for PRI. In most PRI network
configurations, you need one DTM configured as PRI to act as the primary clock reference. The
only time when you may not have a DTM designated as the PRI primary clock reference is in a
network where your BCM system is connected back-to-back with another switch using a PRI link.
If the other switch is loop-timed to your BCM system, your DTM (PRI) can be designated as a
timing master.
If your BCM has more than one DTM configured as PRI, you must assign the first DTM as the
primary external, the second DTM as the secondary reference.
BRI hardware
The loops on the BRI module can be programmed to support either network or terminal
connections. This allows you to customize your arrangement of lines, voice terminals, data
terminals, and other ISDN equipment. The following describes some basic hardware
configurations for network and terminal connections for each loop type.
A BRI module provides four loops. Each loop can be individually programmed as:
NN40020-603
Appendix C ISDN overview 543
S Reference Point
Insp
ect FOR
WARD
Cal lers
MXP
s
ISDN TE
BCM Insp
ect FOR
WARD
Callers
MXP
Insp
ect FOR
ISDN TE
(with terminating resistors)
WARD
Callers
MXP
ISDN TE
T Reference Points
The T reference-point connections provide a point-to-point digital connection between the ISDN
network and BCM. Refer to Figure 153.
A T loop provides lines that can be shared by all BCM telephones, peripherals and applications,
and ISDN TE.
ISDN network
connection T
BCM
A T loop can be used in combination with an S loop to provide D-packet service for a point-of-sale
terminal adapter (POSTA) or other D-packet device. D-packet service is a 16 kbps data
transmission service that uses the D-channel of an ISDN line. The T and S loops must be on the
same physical module.
• the loop preference order is: 201, 202, 203, 204 etc.
• the system skips S and analog loops, when selecting a network connection for synchronization
Systems with only S loops act as timing masters for the attached terminal equipment (TE), and are
not synchronized to the network. ISDN TE without access to a network connection (BRI lines) has
limited or no functionality.
If your system has both a BRI S/T configured as BRI, and a DTM configured as PRI, it is
recommended that you use PRI as the primary clock source. See “PRI hardware” on page 542.
NN40020-603
Appendix C ISDN overview 545
The NT1 converts and reformats data so it can be transmitted to and from the S or T connection. In
addition, it manages the maintenance messages travelling between the network and the NT1, and
between the NT1 and the BCM system.
The NT1 from Nortel is packaged two ways:
• a stand alone package which contains one NT1 card (NTBX80XX) and a power supply
(NTBX81XX)
• a modular package which contains up to 12 NT1 cards (NTBX83XX) and a power supply
(NTBX86AA)
Ordering ISDN PRI service outside of Canada and the United States
Outside Canada and the United States, order Euro ISDN PRI and/or BRI service from your service
provider. Set the BCM equipment to the Euro ISDN protocol.
If you want to transmit both voice and data and support D-channel packet service, order
package P. However, BCM does not support the flexible calling for voice and additional
call-offering features that are included in package P.
Multi-Line Hunt may be ordered with your package. When a telephone number (the Network DN)
in the group of numbers assigned by your service providers is busy, the Multi-Line Hunt feature
connects the call to another telephone number in the group. BCM supports the feature only on
point-to-point, network connections (T loop). Check with your service provider for more
information about Multi-Line Hunt.
Any of the ISDN packages will allow you to use sub-addressing, but your ISDN TE must be
equipped to use sub-addressing for the feature to work.
NN40020-603
Appendix C ISDN overview 547
NN40020-603
549
Appendix D
Codec rates
The information in the table below enables the administrator to determine the number of resources
that can be maintained on the available system bandwidth.
The packet transfer rate must also include the overhead.
Note: Using Silence Suppression on G.723 and G.729 can reduce the
overall bandwidth consumption by 40%.
Note: The totals in the bytes/s column represent one direction only.
G.729
10 1 58 68 54400 580.00 10
20 2 58 78 31200 290.00 20
*30 3 58 88 23467 193.33 30
40 4 58 98 19600 145.00 40
50 5 58 108 17280 116.00 50
60 6 58 118 15733 96.67 60
70 7 58 128 14629 82.86 70
80 8 58 138 13800 72.50 80
90 9 58 148 13156 64.44 90
100 10 58 158 12640 58.00 100
G.711
G.723
24 3 58 82 21867 173.33 30
20 3 58 78 20800 160.00 30
Note: *These are the default values.
NN40020-603
551
NN40020-603
553
NN40020-603
555
NN40020-603
557
NN40020-603
559
L lines
changing the name 213
LAN identifying 90
Business Communications Manager function 467 numbering 39
least cost routing 243, 252 programming overview 98
line access voice message center 136
call diagram 228 link
call-by-call services network 344 at CO, loop start analog lines 134
MCDN network 310 code (F71) 261
line coding signal 134
T1 parameters 107 link parameters
line filter, CoS programming 444 ISDN 506, 507
modem 510, 511
line pool
access code local
constraints 358 access code
programming 234 MCDN 284
network example 398 calling routing 249
numbering calls
overview 220 destination codes 249
plan overview 218 e.164 outgoing calls 223, 279
setting line type 131 local access code 284
VoIP trunk routing 391 local gateway
line programming Call Signaling 120
ANI number 135 gatekeeper
answer mode 136 IP 384
answer with DISA 136 Gatekeeper IP 120
auto privacy 135 Gateway Protocol 119
control set 131 gateway protocol 384
dial mode 133 Registration TTL 121, 384
DNIS number 135 location code
full autohold 135 numbering overview 219
if busy 136 UDP dialing plan 283
line type 131
long distance
link at CO 134
call
loss packages 97, 133
routes 250
name 131
using CoS password 447
prime set 132
dedicated trunks 250
private line 131
public line 131 long tones
received # 132 dialing code (F808) 261
redirect to 137 loop
restrictions 93 disconnect timer 106
signaling 134 loop programming
telco features 94 blocking state 188
trunk mode 133 overlap receiving 189
use auxiliary ringer 135 protocol 188
use remote package 138 sampling 188
line type 131 Loop start
line/set restrictions redirect to 137
remote access, CoS 444 loop start
NN40020-603
561
NN40020-603
563
NN40020-603
565
retrieving security
call park 230, 273 dialing restriction 415, 433
IPSec 527
route programming recommendations, remote access 424, 446
DN type 261 remote access on VoIP trunks 422, 432
external # 261
See ISDN
NN40020-603
567
NN40020-603