Professional Documents
Culture Documents
COMMUNICATIONS
DIRECTOR (MCD)
NOTICE
The information contained in this document is believed to be accurate in all respects but is not
warranted by Mitel Corporation (MITEL). The information is subject to change without notice and
should not be construed in any way as a commitment by Mitel or any of its affiliates or
subsidiaries. Mitel and its affiliates and subsidiaries assume no responsibility for any errors or
omissions in this document. Revisions of this document or new editions of it may be issued to
incorporate such changes
All other trademarks mentioned in this document are the property of their respective owners,
including Mitel Networks Corporation and Inter-Tel (Delaware), Incorporated. All rights reserved.
Personal use of this material is permitted. However, permission to reprint/republish this material
for advertising or promotional purposes or for creating new collective works for resale or
redistribution to servers or lists, or to reuse any copy righted component of this work in other
works must be obtained from Mitel Networks Corporation.
MCD Basic Installation and Maintenance Course
Table of Contents
1. Course Resources
9. Telephone Directory
i
MCD Basic Installation and Maintenance Course
Appendices
B. Interconnect Restrictions
C. Tenanting
D. Speed Calls
E. Intercept Handling
F. Account Codes
G. Traffic Reporting
H. Scheduler
Punctuality
Classes begin promptly at the time designated by your instructor. Students are required to
return from breaks and lunch promptly, as the instructor specifies. Instructors will begin lectures
promptly at the scheduled times.
Appropriate Behavior
Students are expected to participate in class as professionals. Disruptive behavior will not be
tolerated.
Disruptive behavior is any action interfering with the instructor’s presentation or action
distracting from another student’s ability to participate in the class. If, at the instructor’s
discretion, a student is being disruptive, the following steps will be taken:
• 1st Occurrence: Verbal warning. The student will be advised that his or her behavior is
disruptive.
• 2nd Occurrence: Verbal warning. The student and the student’s manager or supervisor will
be informed that this is the final warning.
• 3rd and Final Occurrence: The student will be dismissed from the remainder of class and
the student’s manager or supervisor will be informed that the student has been released
from class. The only option available to the student is to take the course exam at a
proctored testing center, at the student’s expense, or retake the course, in its entirety, at full
tuition. No refund will be issued.
Training Equipment
Mitel Training has made every effort to provide a “state-of-the-art” training facility and training
equipment. Every effort has been made to provide the technology and equipment necessary to
provide students with a real-world environment. All training systems and equipment (including
PCs and the PC Network) are provided as tools to enhance the training experience. Equipment
is only to be accessed and utilized for the completion of class lab exercises as the instructor
indicates. Unauthorized exploring of, or experimenting with the training equipment will be
considered disruptive behavior and will not be tolerated.
iii
MCD Basic Installation and Maintenance Course
This MCD Basic Installation and Maintenance course covers fundamental tasks involved in
installing, configuring, and troubleshooting a single standalone MCD.
This course qualifies new technicians as MCD Basic System Installers with MCD Release 6.0
Basic certification.
Important Note
Certification in this course requires:
Although not required, it is recommended that students with no previous telephony or VoIP
experience should complete the Voice and Data Technology Primer Self-Study course. It is
available free of charge in the course catalogue.
To get the maximum benefit from this course, it is recommended that student spend some On-
Job-Training time both prior to and after this course.
Important Note
Before registering for this course, it is imperative that students have a working
knowledge of IP based LANs including routers, switches, DHCP, FTP, and
Telnet. It is equally important that students be very comfortable with PCs,
including network configuration and IP utilities.
Please note that instructors will not spend extra time with students who do not have the
necessary knowledge. Instructors may, at their discretion, dismiss students who do not meet
prerequisite requirements. Should this happen, course fees will prevail and the student will not
receive certification for the course.
v
MCD Basic Installation and Maintenance Course
Resources
• Student Manual
• Online Help
• Technician’s Handbook
• Engineering Guidelines
• Troubleshooting Guide
Student Manual
This Student Manual, located on the USB Drive, contains all courseware needed to successfully
complete this course. It is your primary resource.
The printed Lab Workbook contains all labs needed to successfully complete this course.
This section provides a brief introduction to your student manual and lab workbook.
Course Modules
This Student Manual contains a series of course modules. Each module allows you to
accomplish a specific goal or task associated with MCD. The course modules are organized in a
logical manner. Once you successfully complete the first module’s objectives, proceed to the
next module. Continue until all required modules are complete.
Module Content
Each course module will typically contain:
1-3
MCD Basic Installation and Maintenance Course
Module Icons
The icons used in the modules and their general meanings are:
Reference
Directs you to additional reference information in the technical documents,
Online Help, or other product support documents. It may also refer you to
reference material outside the classroom.
Note
Identifies a key point of interest or a message set off from the text.
Caution
Identifies a potentially hazardous or very important situation that may result in
injury to you or damage to the equipment.
Remote Training
Identifies situations or limitations that may apply when accessing a lab training
environment through a remote network connection.
Lab Workbook
The following is an example of how the labs are structured. Check off the steps as they are
successfully completed. This will help the instructor monitor your progress. If you do not get the
expected results, check the previous steps or ask your instructor for assistance.
Use the MOL web site to get the most recent information and documentation. An MOL account
is required. MOL can be accessed at www.mitel.com and logging in.
For example, to view or download the latest Technician’s Handbook, follow these steps.
1. Navigate to the MOL web page and log in.
2. Hover over Support and select Product Documentation. The Technical Documents window
opens.
3. Select the Technician’s Handbook for the appropriate release. The Technician’s Handbook
is displayed.
Other
important
technical
documents
Note
Some documents may only appear under an older release. This does not
affect the validity of the document.
Technician’s Toolbox
The Technician’s Toolbox has resources and is available on MOL. Hover over Training and then
select Technician’s Toolbox.
1-5
MCD Basic Installation and Maintenance Course
You have been provided a USB drive to use as a reference during this course. It contains the
Student Manual plus various files added at the instructor’s discretion. Files may also be located
on your student PC or an FTP server. Consult the instructor regarding the location of these files.
The following figure shows how to use the Contents view in the System Administration Tool help
file. The top-level books are shown open to reveal the content structure.
Click here to
access the
Technical
Documentation
1-7
MCD Basic Installation and Maintenance Course
The following figure shows how to use the Index in the System Administration Tool help file to
locate ACD first, and then select ACD Programming.
Note
The Contents view and the Index view are related. Selecting a topic in one
view allows you to access the same topic in the other view.
The following figure shows how to use the Glossary in the System Administration Tool help file.
Accessing the
Glossary retains
the topic view
The following figure shows how to use the Search and Search Tips in the System Administration
Tool help file.
Searching tips
1-9
MCD Basic Installation and Maintenance Course
The following screen shows the location of information on how to use ESM.
The following screen shows the location of information on the installation sequence.
1-11
MCD Basic Installation and Maintenance Course
The following screen shows the location of information on the ESM forms.
The Group Administration Tool and Desktop Tool have context-sensitive user instructions.
When an item is selected, a brief description is automatically displayed in a separate pane.
Select here
1-13
MCD Basic Installation and Maintenance Course
Select button
Here.
Along with the System Administration Tool Help file, use these documents to plan an
installation, install a system, and maintain a system. Many can be accessed by clicking the PDF
icon in the System Administration Tool Help.
Reference
The Technician’s Handbook is a valuable resource. If you can’t find the
desired information in this student manual or the Online Help file, you will
likely find it in the Technician’s Handbook.
• General Information Guide – provides an overview of the system and its peripherals and
applications. It is good information for a new user and is often used in sales proposals.
• Troubleshooting Guide – lists problem symptoms, possible causes, and corrective actions
for installation and configuration issues.
• Mitel Voice Cluster Design and Implementation Document - provides instructions on how to
set up a cluster of MCD systems on a new site to support remote telephone directory
number synchronization and Multi-Node Management applications.
• User and Installation guides for the phones (sets), consoles, etc.
1-15
MCD Basic Installation and Maintenance Course
Reference
Some public forums available to you are:
http://www.tek-tips.com/threadminder.cfm?pid=1329
http://www.mitelforums.com/forum/index.php
http://www.sundance-
communications.com/forum/ultimatebb.php?/ubb/forum/f/6.html
http://pbxinfo.com/mitel/
Term or
Definition Description
Acronym
AA Auto Attendant Replaces a live operator and directs callers to the appropriate
extensions or voice mailboxes
ACD Automatic Call Distribution Calls are routed to groups of agents based on the type of
information or service required by the caller
ADI Alternate Digit Inversion Even bits are inverted
A-law A-law European standard companding algorithm
AMB Analog Main Board Provides embedded analog capability with Loop Start, ONS, Music
On Hold, and Paging circuits
AMC Application Management Mitel's licensing web site
Center
AOB Analog Option Board Expands on the AMB, providing support for four more ONS phones
and six more LS/CLASS trunks
ARID Application Record ID A value obtained from the Mitel AMC, used to license software on a
specific MCD controller.
ARS Automatic Route Selection Routes outgoing calls based on digits dialed by the caller
ASU Analog Services Unit A component of the 3300 ICP that provides analog connectivity to
the system
AX Analog Switch Mitel controller type
BCC Bay Control Card Interface card in an SX-200 bay that connects to an MXe
BLF Busy Lamp Field Identifies busy or idle status of circuits assigned to the keys
BRI Basic Rate Interface ISDN digital I/F carried over one or two twisted-pair copper wires.
Provides two B-channels (voice, at 64 Kbps) and one D-channel
(control, at 16 Kbps)
CAS Channel Associated Signaling information is transmitted over the traffic channels
Signaling themselves
CCS Common-Channel Signaling The signaling information for a number of traffic channels is passed
as messages over one channel on a multi-channel digital link
CDE Customer Data Entry When data particular to a specific customer installation is entered
into the system
CEID Cluster Element ID A digit string used to identify an element in a cluster
CEPT European Conference of A coordinating body for European state telecommunications and
Postal and postal organizations
Telecommunications
Administrators
CESID Caller Emergency Service A number that uniquely identifies the device that dialed 911. The
Identification CESID is fed into the Automatic Location Identification (ALI)
database at the Public Safety Answering Point (PSAP) so that
emergency services can be dispatched to the correct location.
CIM Copper Interface Module Provides a copper communications link between the control cabinet
and a peripheral cabinet or a PRI card bay
CLASS Custom Local Area Permits advanced voice features such as Calling Line ID digits and
Signaling Service CLASS Name to accompany or precede the telephone call across
multiple switches
CLI / CLID Calling Line Identification Caller Identification in Europe
CLIP Calling Line Identification Caller Identification for wireless
Presentation
Cluster Cluster A grouping of MCD systems that share common dialing plans, or
common directory information, such as Remote Directory Numbers
with Telephone Directory
1-17
MCD Basic Installation and Maintenance Course
Term or
Definition Description
Acronym
CO Central Office Where switching of phone calls is accomplished, local and toll
(Switching Center or Exchange), provides local phone service
connections
COR Class of Restriction Limits a station's access to specified numbers
COS Class Of Service Defines a station or trunk's feature and timer options
COV Control Over Voice Used by the voice mail system to perform most of its signaling
functions
CP Call Processing Hardware/software that performs call-handling
CPN Calling Party Number CPN substitution is typically used to show the customer's corporate
name and number for all outgoing calls to the public network.
CSV Comma-Separated Values Used for moving tabular data between two different computer
programs, such as between MCD database programming and a
spreadsheet program such as Excel
CX Compact Switch Mitel controller type
CXi Compact Switch w/ Mitel controller type
Integrated Layer 2 Switch
DBMS Database Management Turns on the DBMS_Initialized flag which tells the system to save
System the database, and all future changes, to the hard drive. It makes
sure the programmed database is correctly loaded from the hard
disk when the system starts up or resets and ensures the database
is free from errors by performing a routine check. It starts the
underlying DHCP server service on MCD.
DDI Direct Dialing Inward European DID
DHCP Dynamic Host Configuration Automates the assignment of IP addresses of devices on a network
Protocol from a central server
DID Direct Inward Dialing Trunk from CO to PBX that allows calling directly to inside
extension without operator intervention
DISA Direct Inward System Feature allowing outside party to dial into system from an external
Access DTMF phone, then access internal system resources or stations
DMP DNIC MOH Pager Unit that connects to a port on a Peripheral Cabinet DNI Line Card,
and provides an external music source for MOH and an external
paging amplifier for Paging
DN Directory Number Any dialable number
DND Do-Not-Disturb Station feature preventing callers from ringing phone
DNI Digital Network Interface Allows the programming of Mitel digital devices
DNIC Digital Network Interface Provides a digital interface from the system to Mitel SUPERSET
card telephones and SUPERCONSOLE 1000 attendant consoles
DNIS Dialed Number Identification Identifies which 800 number was called; identifies called party's
Service number
DPNSS Digital Private Network Industry standard interface defined between a PBX and an access
Signaling System network. Expands the facilities normally only available between
extensions on a single PBX to all extensions on PBXs that are
connected together in a private network
DSCP Differentiated Services A method that attempts to guarantee QoS on large networks by
Code Point assigning priority to traffic based on packet type (e.g., voice or data)
DSP Digital Signal Processors Allows certain functions to be performed digitally on phones;
processes digital information to be used in an application
DSS Direct Station Selection Allows attendant to transfer call to selected station with one of many
buttons
DTMF Dual-Tone Multi-Frequency Tone pairs from touch-tone buttons 0-9, #, and *
DTS Direct Trunk Select A private line to the public network, allows individual digital trunks to
be assigned to line keys on multiline sets
Term or
Definition Description
Acronym
E1 E1 Similar to the North American T-1, E1 is the European format for
digital transmission. 30 digitized voice channels, or it can carry data
at a rate of 2.048 megabits per second
E2T Ethernet-to-TDM Ethernet to TDM converter, serves as a gateway between the
traditional circuit-switched, TDM telephone systems and IP devices
on the Ethernet
E&M Ear & Mouth Also called "tie" lines, trunks that tie two distant phone systems
together
EDT Embedded Digital Trunk Maintenance commands that provide diagnostic information for
embedded digital trunks
EHDU External Hot Desk User A caller only needs to dial the extension number assigned to the
user and the system automatically rings the user's cell phone, home
phone or other device of choice—including an extension on another
private network or PBX
EMEA Europe, Middle East, and A regional designation used for government, marketing and
Africa business purposes
ESM Embedded System A web browser interface used to program the system database and
Management perform maintenance functions
EUM Embedded Unified Allows MCD users to manage their voice messages with one or
Messaging more IMAP-enabled e-mail clients.
EVM Embedded Voice Mail MCD includes a complete voice mail system.
FAC Feature Access Code A code, dialed by a subscriber, used to turn a feature on or off
FD DSU Fiber Distributed Digital Holds up to four DSU cards and two FIMs. The DSU cards provide
Services Unit digital trunk interfaces for public or private network access and
specialized digital functions. Interfaces with an MXe via Dual FIM.
Discontinued but still supported.
FD PER Fiber Distributed Peripheral Each peripheral cabinet holds up to 12 peripheral interface cards
Cabinet and provides up to 192 ONS or DNI ports. Interfaces with an MXe
or AX via a Dual FIM. Discontinued but still supported.
FIM Fiber Interface Module A MMC that supports the transmission of voice and data signals
over fiber optic cables
GARID Group Application Record A value obtained from the AMC, used to license software on two or
ID more MCD systems that are grouped into a single entity on the
AMC for licensing purposes.
GIG General Information Guide An overview of the system and its associated peripherals and
applications, intended for new users
GS Ground Start Signaling method between two machines, one grounds one side of
the line, the other detects the ground
HST Handoff Services Type Shell commands used to perform various resiliency-related
maintenance and troubleshooting operations
IC Intercom Call Internal station-to-station call
ICP IP Communications Mitel product family that uses IP for communications
Platform
IMAT ISDN Maintenance and A tool developed by Mitel Networks for programming ISDN onto
Administration Tool their NSUs and Peripheral Cabinets
ISDN Integrated Services Digital International standard for digital data and voice services throughout
Network the world, allowing them to connect
LBN Location Based Numbers DNs for services or destinations considered to be location-based,
such as Emergency (911), Directory Assistance (411), Security,
Help Desk, etc.
LBR Location Based Routing A call from an extension to a service or destination, such as
Emergency (911), Directory Assistance (411), or a corporate Help
Desk is sent to the service situated in the same network zone as
the originating device.
1-19
MCD Basic Installation and Maintenance Course
Term or
Definition Description
Acronym
LS Loop Start Usual method of detecting off-hook where one end closes the loop
and the other end detects the resulting current flow
MAC Media Access Control A computer's or IP phone's unique hardware number, hard coded
into the NIC
MAS Mitel Application Suite A software solution for MCD that provides co-residency features for
applications, such as NuPoint Unified Messaging, Teleworker,
Unified Communicator Mobile, and Audio and Web Conferencing.
MAS supports the co-residency of multiple applications
MCD Mitel Communications Call control software on the 3300 ICP, or industry standard Sun
Director Microsystems, HP, and IBM servers, or in a virtual environment.
MUG Multi-Device User Group A Personal Ring Group (PRG) that requires just one license for the
entire group.
MGCP Media Gateway Control Internal protocol used within a distributed VoIP system appearing to
Protocol the outside world as a single VoIP gateway. A client-server protocol
used by telephony providers to control subscribers.
MiCD Multi-Instance Multiple instances of MCD call control software on an industry
Communications Director standard server platform
MiCW Mitel Configuration Wizard Allows you to perform initial system setup and user commissioning
of an MCD system
MiNET Mitel Network Mitel's proprietary signaling protocol used to control Mitel IP and
TDM telephones
MiTAI Mitel Networks Telephony Used by applications to communicate with Mitel PBXs
Application Interface
MMC Mitel Mezzanine Cards Expansion cards for ICP products
MNM Multi-Node Management A series of applications that allow you to maintain a group of
network elements from an MCD System Administration Tool
session on any of the elements in the group. These applications are
supported for network elements that are grouped together within an
SDS Administrative Group.
MOH Music-on-Hold External music source is used to play music while caller is on hold
MOL Mitel OnLine A secure global website for Authorized Mitel Solution Providers,
Channel Partners, Developers, Consultants, and User Groups
MSDN Mitel Superswitch™ Digital Mitel proprietary network protocol used on digital trunk lines to
Network directly inter-connect two Mitel PBXs. Digital signaling scheme is
used within a private network to pass call information between the
system nodes in the network. Uses CCS.
Mu-law Mu-law North America/Japan standard companding algorithm
MXe / MXe II Medium Switch - Embedded Mitel controller type
NPUM NuPoint Unified Messaging A powerful, server-based voice processing system that provides call
processing along with voice messaging and paging support.
NSU Network Service Unit Hardware on which a T1 or E1 trunk terminates
NTP Network Time Protocol Allows system to set time from the network
ONS On-Premise Station Stations installed on the same premise as the PBX
ONSp On-Premise Station System ONS ports that are protected from surges and lightning
Protected
PCM Pulse-Code Modulation A method used to digitally represent sampled analog signals
PDN Portable Directory Number Extension number that is not restricted by the PBX to which it is
connected. A user can keep their extension number when moving
from one system to another. Also referred to as Remote Directory
Number (RDN)
PFT Power Fail Transfer Also known as emergency switching. Ensures that external trunks
are connected to several single line telephones in the event that the
power fails on the phone system
Term or
Definition Description
Acronym
PKM Programmable Key Modules Adds programmable keys to some IP phones, installs in the back to
allow the 12- or 48-button IP PKM to connect to the IP phone
without using an additional LAN port
PLID Physical Location Identifiers Four digits identifying the cabinet number, shelf number, slot
number and circuit number
PMS Property Management Provides a center for managing a hotel business. Can interface with
System a front desk system to provide reservation control, centralized
accounting and billing, and call logging
PRG Personal Ring Group An association of two or more devices for a single user under a
common DN. The devices ring simultaneously.
PRI Primary Rate Interface ISDN digital interface, similar to T1, carried over twisted-pair copper
wires. 24 B-channels (voice), or 23 B and one data channel
QoS Quality of Service In the fields of packet-switched networks and computer networking,
refers to control mechanisms that provide different priority to
different users, or guarantee a certain level of performance to a
data flow in accordance with requests from the application program.
QoS guarantees are important if the network capacity is limited,
especially for real-time streaming multimedia applications, for
example VoIP.
QSIG Q Reference Point Signaling Signaling system to enable communications between PBXs
System
RAC Record-A-Call A voice processor application that allows a user to record an
ongoing call as a mailbox message
RAD Recorded Announcement Automatically answers a call and delivers a pre-recorded message.
Device RAD is often used to inform a caller that they are in a queue and
their call will be dealt in due order. No longer an actual device, it's
simply a stored recording.
RAID Redundant Array of Data storage scheme using multiple hard drives to share or
Independent Disks replicate data among the drives. Used to increase data integrity,
fault-tolerance, throughput and/or capacity
RDN Remote Directory Number See PDN.
Resiliency Resiliency Network elements that provide reliable fail-over mechanisms-either
within the device or through working in conjunction with other
network elements to ensure that all network devices can be used
simultaneously
RLT Release Line Trunk Feature allows the attendant to make a call by using the same
incoming trunk
RTC Real Time Complex A card that is used for the IP phones signaling, and for the ESM,
DHCP, FTP and TFTP servers, among others. Call progress,
device status and screen updated messages are sent between the
IP Phones and the RTC.
SAC Switch Application Mitel protocol that allows communications between applications on
Communications the IP Phones and the MCD or 5000 switches.
SDS System Data Shares system programming data among a network or cluster of
Synchronization elements (MCD systems) and synchronizes the system data of
those elements with the data of a master element
SFT System Fail Transfer Allows selected stations to be transferred to certain trunks
automatically in the event of a failure of the main power supply
SI Software Installer Mitel installation software
SIP Session Initiation Protocol Peer-to-peer protocol, a standard signaling protocols for VoIP,
along with H.323
SMDR Station Message Detail Provides detailed record of incoming and outgoing calls
Report/Recording
SWAS Software Assurance and Mitel’s Software Assurance program and access to Mitel’s
Support Technical Support Network (TSN) are combined into SWAS.
1-21
MCD Basic Installation and Maintenance Course
Term or
Definition Description
Acronym
T1 Transmission Level 1 Standard for non-ISDN digital interface, 24 digitized voice channels
or data at a rate of 1.544 megabits per second
TDM Time Division Multiplex Method for sending multiple digital signals along a single
telecommunications transmission path
TFTP Trivial File Transfer Protocol Very simple file transfer protocol, with the functionality of a very
basic form of FTP, no security
TUI Telephony User Interface The System Administrator menu used from the user's phone
UR Update Release An interim software upgrade to fix high-profile problems
VLAN Virtual LAN A collection of nodes grouped together in a single broadcast
domain that is based on something other than physical location. By
splitting a single physical LAN into a number of VLANs, each VLAN
behaves as its own entity and data packets on one VLAN do not
delay data packets on another. VLANs are important for
provisioning voice because voice is very sensitive to delay.
VxWorks VxWorks A real-time operating system designed for use in embedded
systems
XNET Switched MSDN/DPNSS Allows customers to switch their private network over ISDN PRI
Networking trunks on a call-by-call basis eliminating the costly dedicated point-
to-point trunks. MSDN over ISDN.
At the factory, each system hard drive is set and tested with the following settings:
• IP address = 192.168.1.2
• Subnet mask = 255.255.255.0
• DHCP is programmed and disabled (3300 ICP only)
• No license options are programmed
• DBMS_Initialized turned off
Communication between MCD and your PC is via Category 5 cable over an Ethernet network.
You can connect the PC directly to one of the Ethernet ports, or you can connect MCD and your
PC to a layer 2 switch.
To communicate with a default MCD in the examples on this page, your PC IP address must be
on the same subnet as MCD. To adjust the computer’s network card IP address, access the PC
network properties in the Control Panel.
Note
The 3300 ICP could also be an instance of MCD.
2-3
MCD Basic Installation and Maintenance Course
Use this connection in combination with a VT-100 application such as HyperTerminal or PuTTY
to monitor the boot up sequence.
Serial cable
Bits per second = 9600
Data Bits = 8
Parity = None
Stop Bits = 1
Flow Control = None
The VT-100 application should be configured as shown in the above diagram. This gives you
access to the VxWorks operating system shell.
The following are the only commands authorized to be used without assistance from Technical
Support:
• dosFsShow – Used to check available free disk space for the voicemail partition
Note
This is NOT the recommended way to reboot the system. The system reboot
process can be viewed from the VxWorks screen. It is a good way to
determine when the process is complete.
Reference
Please refer to your lab workbook.
2-5
MCD Basic Installation and Maintenance Course
Password: password
Caution
At this point in time, the system is still using the default Username and
Password and could be vulnerable. Once connected via ESM, you will be
required to change the Password.
Reference
Please refer to your lab workbook.
Caution
Outside of the classroom and this lab, always perform a database backup
prior to changing the System IP Address. When saving the backup, it is
recommended that a record of the local System IP address be part of the
backup filename; perhaps the Backup File Prefix.
If you must restore that backup onto a system that has a different IP address,
temporarily set the IP address of the target system to match the IP address in
the backup filename. Once the restore has completed, change the IP address
back to its original.
If this is not done, when a backup is restored onto a system that has a local IP
address different than the local IP address in the backup, a new local Element
is produced in the Network Elements form during the restore.
Reference
Please refer to your lab workbook.
Reference
Please refer to your lab workbook.
2-7
MCD Basic Installation and Maintenance Course
System Alarms
If the indicator on the front of the controller indicates an alarm, the cause of the alarm must be
determined. The two ways to do this are:
Note
Always use both methods to determine the cause of an alarm. Some alarm
categories only show up in the Alarm Details form and some only show up
when using the commands.
Reference
Online Help > Contents > Maintenance > Overview > Alarms
When a new system is being installed, you may encounter an alarm condition until further
programming is completed.
On a new MXe III with an E2T card, the system displays an E2T Comms alarm because the
E2T card needs an IP address to communicate with the system. The recommended way for the
E2T to get an IP address is from a reserved address on a DHCP server. The DHCP Server
service is disabled on a new 3300 ICP system.
Note
The MXe III is the most current platform available.
Using the Show Stat Alarm command, a Sysid Mismatch alarm is present because licensing has
not yet been associated with the system’s Hardware ID.
Reference
Please refer to your lab workbook.
2-9
MCD Basic Installation and Maintenance Course
The Hardware Modules form displays the type and position of MMCs in the 3300 ICP chassis.
In addition to embedded resources, you can see which modules have been installed without
opening the controller chassis.
RTC
E2T
When a new system is installed, the MAC address of the E2T card
should be noted prior to installing the card. The MAC address is
listed on the card and on its shipping box.
2-11
MCD Basic Installation and Maintenance Course
Licensing Overview
Reference
Online Help > Contents > System Programming > Licenses and Dimensions
For smaller implementations, individual MCDs can be licensed as standalone systems. For
larger implementations, a number of MCDs can be licensed collectively within an Application
Group.
License Models
The Application Management Center (AMC), Mitel's license key and product administration
service, supports the following license models:
• Standalone System – single MCD that lacks support for clustering, IP trunks, or resiliency.
All other MCD features, with the exception of XNET trunks, are supported. A standalone
system cannot share its licenses with other systems.
• Non-Shared Enterprise System – a networked MCD that supports the full range of MCD
features and options, including clustering, IP trunks, and resiliency. A non-shared enterprise
system cannot share its licenses with other systems.
• Shared Enterprise System – a networked MCD that supports the full range of MCD features
and options, including clustering, IP trunks, and resiliency. Because it belongs to an
Application Group in the AMC, a shared enterprise system can share licenses with other
group members.
For example, if the Application Group has three members, and each group member has
100 IP User Licenses, the Application Group has a total of 300 pooled licenses. These
licenses can be removed from one group member and allocated to another.
License Manager
All systems, regardless of which licensing model they use, will include a License Manager
which:
Standalone System
Because MCD #1 and MCD #2 are Non-Sharing Enterprise systems, they can take
advantage of networking features such as clustering, IP trunks and resiliency, but they
cannot pool and share their licenses.
Non-Sharing Enterprise
2-13
MCD Basic Installation and Maintenance Course
Use the Application Group Licensing form to enable a DLM for an AMC Application Group that
is sharing licenses.
The form is divided into two parts. Use the top part to program the local system as the DLM and
enter the Group Application ID (GARID) for the application group. Use the bottom part to track
the total the number of licenses that are being shared by the group.
Note
System Data Synchronization (SDS) is covered in another module.
2-15
MCD Basic Installation and Maintenance Course
Because the three MCDs are Shared Enterprise systems, they constitute an Application
Group. This enables them to take advantage of networking features and share licenses
amongst themselves, subject to their individual core package limits and restrictions.
Sharing Enterprise
Notes
• A System Core Package is required for every system that is sold and licensed through
the AMC. In addition to defining the system type, standalone or enterprise, the core
package controls the limits and restrictions for each license type that may be added to
the system.
• Only systems running MCD 5.0 can be added to an Application Group or configured as a
DLM.
• The DLM must be able to communicate with the Application Group members via SDS.
• After being added to an Application Group, a system's licenses belong to the group. If
the system is downgraded by having its application record removed from the group, all of
its licenses remain with the group with the exception of its core package licenses.
• Once an application record has been assigned to an Application Group, its licenses are
permanently moved to the group.
• It is possible to change the DLM to another group member by resetting the hardware ID
of the application record in the AMC.
• Use the Application Group License Distribution form to track the number of licenses that
have been purchased, allocated, and used by the individual members of an Application
Group.
• Once the systems have registered with the DLM, licenses can be freely allocated and
moved around the group without changing anything at the AMC. All the systems within
the Application Group will contact the DLM every 60 minutes to ensure the license
integrity of the solution. If this License communication fails three times in succession, the
solution will fall into License Violation.
License Features
The following licensing features are available:
• Trusted Services
• Over Allocation
When the trail ends, an Over Allocation error message is received as the system enters
into Major license violation mode. Purchase additional licenses or delete the services, as
a new trial for the same license type cannot be restarted.
Trusted Services
Trusted services are applications that do not require an MCD license to register and
access telephony services. Instead, they validate themselves to the MCD using an
encrypted handshake.
Applications that use the MiNet protocol can be programmed as a Trusted Service by
selecting the appropriate Service Level for a Directory Number (DN) in the User and
Device Configuration form. In future releases, applications that use SIP will be
programmable as Trusted Services.
2-17
MCD Basic Installation and Maintenance Course
Note
Trusted Service DNs can be programmed on the same forms and fields as
Full Service DNs.
Over Allocation
Over allocation allows expansion of the system, thus using more licenses than actually
purchased. MCD will enter into license violation and start License Violation Event
Escalation. This is a gradual process that gives more time to purchase the additional
licenses required.
• Move T1/E1 Links – instead of having to purchase an extra Digital Link License or
reconfigure the PSTN connection, which would cause an outage, simply provision a new
link and then disable the existing link.
• Add New Users – add users before purchasing additional IP User Licenses.
• Move SIP Links – instead of having to purchase an extra SIP Trunk License or
reconfigure the PSTN connection, which would cause an outage, simply provision a new
link and then disable the existing link.
• Exceed System Core Package Limitations – certain core packages have limitations on
the number of licenses they support. For example, the Survivable Branch Office
Gateway and the 3300 MXe Media Gateway do not allow Enterprise user licenses to be
added to them. Over allocation allows you to license users for these systems on a
temporary basis.
Some license types, such as Active ACD Agent Licenses, cannot be over-allocated. If
they are mistakenly over-allocated, such as due a database being restored from another
MCD, the system immediately enters into Major license violation mode.
Reference
For details on License Violation Handling:
Online Help > Contents > System Programming > Licenses and Dimensions >
License Violation Handling
2-19
MCD Basic Installation and Maintenance Course
Maintenance Command
The License Status maintenance command provides detailed information regarding license
events. It provides the following license status information:
Log in to MOL with your MOL password. Select the AMC link to access the AMC News Page.
Select Customers. See the AMC Help for more details about the AMC licensing process.
2-21
MCD Basic Installation and Maintenance Course
Enter the search criteria and select Retrieve. Select and expand the desired customer from the
Customer List.
Locate and select the Application Record for the system in question.
Scroll down within the Application Record Information view to verify the license information.
Select to manually
download the license in a
Zip file format.
2-23
MCD Basic Installation and Maintenance Course
Offline Licensing
Offline licensing is performed using the MCD Software Installer Tool. When the MCD Software
Installer is unable to connect to the AMC via the internet, you will be prompted to license the
system offline. Offline licensing requires access to a PC with internet connectivity and the SI
Tool. If the local system is going to be the Designated License Manager (DLM) for an
application group, you must run this procedure twice; once to synchronize its ARID, and again
to synchronize its GARID.
Select the system ARIDs you would like to add to the Group ARID. You will receive a warning
about permanent attachment to the Group ARID.
2-25
MCD Basic Installation and Maintenance Course
2-27
MCD Basic Installation and Maintenance Course
License and Option information is not applied by default and must be applied before the system
database can be configured. In the License and Option Selection form, enter the system’s
Application Record ID (ARID), program the Configuration Options, and then select Retrieve
Licenses.
To retrieve the Purchased Options from the AMC, either with ESM or the Software Installer (SI)
tool, the system needs to connect to the AMC Server.
By using the AMC Application Record process to retrieve the purchased option online, you will
retain the ability to reassign the purchased options to other systems owned by the same
customer.
For the system to query the AMC Server, it must be physically connected to the Internet. It may
also be necessary to adjust the system’s IP address and default gateway for the system to work
on the local network.
You must complete the DNS Configuration fields in the System IP Properties form with the
Primary and Secondary DNS Servers. This allows you to establish a connection from the
controller to the AMC Server.
If the system is behind a firewall, the firewall must allow TCP connections from the system to
TCP port 443 on the AMC.
Once the system has been configured to communicate with the AMC, simply type in the
Application Record, select the country, and then select Retrieve Licenses.
Note
If there are problems making the connection to the AMC, check the DNS
settings by pinging register.mitel-amc.com.
2-29
MCD Basic Installation and Maintenance Course
Country Variants
• North America
• United Kingdom
• Latin America
• Germany
• Italy
• Spain
• Portugal
• Holland
Different countries sometimes use different:
• Languages
• Tone plans
• Telephony protocols
Language translations include:
• IP Console GUI
• License agreements
• Safety instructions
• End-User Guides
Use License and Option Selection to select the required country variant.
2-31
MCD Basic Installation and Maintenance Course
The first language will be the default language for that country, and the others will be alternate
languages.
You can override the choice of languages, but English is retained as one of the three languages
to enable correct functioning of the embedded voice mail.
The language is applied to the interfaces of the sets and consoles and the embedded voice mail
prompts. For example:
Not all languages are displayed in the drop down list. Languages can also be set by using the
Language Select maintenance command.
The language seen during the logon process is dictated by the system option default language.
The language during the selection of a programming interface is set through the language
option on the user account. User accounts are covered in another module.
A Dynamic Host Configuration Protocol (DHCP) server is used to support Mitel IP phones. The
DHCP server can be one of the following:
• 3
• 66
• 67
The DHCP server(s) supporting the IP phones needs to have the following DHCP Option IDs
defined in their scope:
• 3
• 125
For example:
2-33
MCD Basic Installation and Maintenance Course
In a multi-subnet network, different DHCP servers may be used, or different IP scopes may be
defined for each subnet. It is important that the options in each scope be defined correctly for
use by the E2T and IP phones. The Option definitions are:
• DHCP Option ID 3 – IP address of the default gateway used by the PC, IP Phone, and the
E2T card. Phones need this for two-way audio.
• DHCP Option ID 66 – IP address of a TFTP server that contains the E2T card’s boot files.
This usually references the TFTP server built into MCD.
• DHCP Option ID 67 – filename that the E2T card should request from the TFTP server. It is
/sysro/e2t8260
• DHCP Option ID 125 – Vendor specific parameters, a list of Mitel-specific values that IP
Phones use during the boot process.
| id – Mitel IP phone identifier, and must be ipphone.mitel.com so the phone will accept an
IP address from this DHCP server
| sw_tftp – IP address of the TFTP server that has the IP phone’s software, which is
downloaded to the phone.
| call_srv – IP address of the RTC. The phone uses this to register with the controller.
| dscp – Differentiated Services Code Point Value, used for voice streaming and signaling
Quality of Service (QoS).
Note
The 3300 ICP MXe, CX/CXi, and AX controllers in a standard configuration
use a single processor for a combination RTC/E2T.
The E2T parameters, which are DHCP Option IDs 66 and 67 and a reserved
IP address, are only needed for the E2T on the 3300 ICP MXe and AX
controllers in expanded mode.
The LAN Policy form provides values for Differentiated Services Code Point (DSCP) and Layer
2 Priority for IP connections for the E2T. It has evolved to allow differentiated treatment of voice
media and voice signaling.
The LAN Policy form provides quality of service configuration using DSCP or DiffServ for traffic
originating at the E2T. DSCP is typically used across a WAN link.
Use the form to give Layer 2 priority to voice media and voice signaling traffic and to map DSCP
to Layer 2 (L2) Priority. Mapping ensures that voice priority is maintained in networks that use
the L2 Priority QoS mechanism.
Note
Changes to the DSCP values require a system reboot to take effect.
2-35
MCD Basic Installation and Maintenance Course
The following tasks assume DHCP will be configured on the 3300 ICP for use by the IP phones
and E2T. This figure shows reserving the IP address for the E2T on an MXe running in
expanded mode.
Note
Program all static IP reservations outside the DHCP IP address range.
Caution
If connected to an existing network, consult with the Network Administrator
and/or Mitel Instructor before activating DHCP on the 3300 ICP. Multiple
DHCP servers on a single network may create conflicts.
Default gateway
2-37
MCD Basic Installation and Maintenance Course
Note
Ensure that the E2T receives DHCP Option ID 3, the Router, from the DHCP
server. When programming DHCP options, set the scope field for DHCP
Option ID 3 to Subnet.
Note
For the IP sets to access the Internet, DHCP Option ID 6 must be
programmed with the IP address of a valid DNS server.
The DHCP options l2p and dscp provided to the IP sets allow differentiated treatment of voice
media and voice signaling.
v and s
specify values
for voice
media and
signaling
respectively
2-39
MCD Basic Installation and Maintenance Course
Note
The E2T card retrieves its IP configuration from a DHCP server. The DHCP
server used for the E2T must provide the following:
• IP Address/Subnet Mask
Because the E2T card should have an IP address that won’t change
when the controller reboots, the DHCP server is programmed to give it
a reserved address that is tied to its MAC address. In MCD, this is
done in the DHCP Static IP Address form.
Note
The numbered items are shown in the diagrams.
1. The subnet on the left is 10.120.7.0 /24. MCD has been configured with IP address
10.120.7.254 /24.
2. The customer’s DHCP Server on this subnet is 10.120.7.200.
3. The default gateway is 10.120.7.250.
4. The subnet on the right is 192.168.50.0 /24. The customer has a second DHCP server for
this subnet at 192.168.50.200.
5. The default gateway on this subnet is 192.168.50.250.
2-41
MCD Basic Installation and Maintenance Course
6. On the 10.120.7.254 DHCP server, the following settings are necessary to support IP
phones and an E2T card in the controller:
• Subnet – subnet 10.120.7.0 with mask 255.255.255.0
• IP Address Range – 10.120.7.10 through 10.120.7.199. It should be a range that
contains sufficient addresses but does not overlap those already assigned to devices on
the network, such as the RTC, DHCP server, or default gateway.
• IP Address Reservation for the E2T Card – create a DHCP reservation to make sure that
the E2T card always gets the same IP address from the server instead of a dynamic
address from the IP Address Range. Phones can handle a dynamic address that may
change across reboots, but E2T cards and Admin Consoles require a stable IP address.
• DHCP Option ID 66 – IP address of a TFTP server that contains the E2T card’s boot
files. This usually references the TFTP server built into MCD, in this case 10.120.7.254.
• DHCP Option ID 67 – filename that the E2T card should request from the TFTP server,
/sysro/e2t8260
• DHCP Option ID 3 – IP address of the default gateway to be used by the E2T card and
IP Phones, 10.120.7.250.
• DHCP Option ID 125 – list of Mitel-specific values that IP Phones use during the boot
process. The list includes addresses for a TFTP server containing firmware and a call
control server, both built into MCD. In this scenario, we follow the usual practice of using
the built-in TFTP and Call Control servers, so DHCP Option ID 125 will contain the
address of MCD, 10.120.7.254.
7. The 192.168.50.200 DHCP server only supports IP Phones. We can leave out DHCP
Options IDs 66 and 67, which are only used for E2T cards.
• Subnet – subnet 192.168.50.0 with mask 255.255.255.0
• IP Address Range – 192.168.50.10 through 192.168.50.199
• DHCP Option ID 3 – default gateway, 192.168.50.250
• DHCP Option ID 125 – points the phones to the TFTP and Call Control servers built into
MCD, 10.120.7.254. Note that these do not need to be on the same subnet as the
phones.
8. Once both DHCP servers are programmed and enabled, the devices on each subnet will
receive their network configuration from their respective DHCP servers.
2-43
MCD Basic Installation and Maintenance Course
Under certain circumstances, IP phones can cause a lot of router traffic because all phones are
competing for the TFTP server at the same time. For example, if there has been a recent
software upgrade to the controller and there are different firmware versions stored on the
controller versus what is on the phones, a power outage and/or reset of all IP phones can cause
a lot of router traffic.
As a possible solution for this, DHCP Option ID 125 programmed on the 10 subnet’s DHCP
Server can point to MCD for the phone’s software, while an existing TFTP server on the 192
subnet can be used to provide the software to phones on the 192 network.
Now the Mitel IP Phones on the 192 subnet can get the TFTP information from the TFTP Server
192.168.50.235, but still get all call processing from the 3300 on the 10 subnet.
Use FTP to copy the phone software onto the TFTP server on the 192 subnet.
Note
It is a manual process to place the new firmware onto the TFTP server.
Note
The software files for the sets are in the /sysro/tftp directory. These must be
present on the specified TFTP server. They can be obtained via FTP from
MCD and then sent to the remote TFTP server. They can also be downloaded
from MOL.
2-45
MCD Basic Installation and Maintenance Course
Scenario #3 – Two Subnets, One With a 3300 DHCP Server and One
With an External DHCP Server
In this scenario, the external DHCP Server on the 10 subnet has been replaced with the internal
DHCP Server on the 3300 ICP. All DHCP Server programming would be the same. Once the
3300 ICP DHCP Server is programmed and enabled, the devices on the 10 subnet will receive
their IP addresses.
Note
DORA = Discovery Offer Request Acknowledge
2-47
MCD Basic Installation and Maintenance Course
2-49
MCD Basic Installation and Maintenance Course
• Turns on the DBMS_Initialized flag, which tells the system to save the database, and all
future changes, to the hard drive and RAM.
Note
Beginning in MCD 4.1 SP2, the DBMS_Initialized flag is set to On
automatically when a valid license key is applied to the system and the
system is reset.
• Makes sure the programmed database is correctly loaded from the hard disk when the
system starts up or resets. It ensures the database is free from errors by performing a
routine check.
Caution
With the DBMS_Initialized flag turned off, a blank database will be loaded into
the system memory on each system reset.
Note
The License and Option information, IP Network programming, and DHCP
programming are retained if the system is reset when the DBMS_Initialized
flag is turned off.
This is to ensure that the system saves the database changes you have made and does not
default the database during a system reset. Once the flag is on, all future changes are saved to
the hard drive.
Reference
Please refer to your lab workbook.
Reference
Please refer to your lab workbook.
Reference
Please refer to your lab workbook.
Reference
Please refer to your lab workbook.
2-51
MCD Basic Installation and Maintenance Course
The customer wants to have 5320 IP sets, 5340 IP sets, and 5550 IP Consoles installed. In
addition, MCD must be assigned an IP address on the same subnet and the E2T of the 3300
ICP will be served by the internal DHCP.
• The subnet allowed by the LAN Administrator is subnet 101: 10.120.101.0 with a subnet
mask: 255.255.255.0.
• The IP address for the RTC must be programmed in the System IP Properties form with a
value of 10.120.101.2.
Reference
Please refer to your lab workbook.
Reference
Please refer to your lab workbook.
2-53
MCD Basic Installation and Maintenance Course
Engineering of the customer’s network is important to ensure that voice quality is maintained.
Because the IP set is a real-time device and delayed packets are not retransmitted, it is
important that the voice packets arrive at the destination in a timely fashion with minimal packet
loss. If IP phones and PCs exist on the same subnet, congestion can cause both delay and
packet loss.
One way to ensure voice quality is to physically or virtually separate the voice and data
networks. The network administrator creates two IP subnets. IP phones connect to one layer 2
switch on a voice network, and PCs, servers, and IP printers connect to a second layer 2 switch
on a data network. A router can be used to connect the two subnets.
This scenario would successfully separate voice and data traffic and ensure that congestion on
the data network would not affect the voice. But the cost of this implementation is increased
because:
• Two cable drops are required for each end-user, one for the PC and one for the IP phone.
• Twice as many layer 2 switch ports are required to manage the PCs and IP phones.
In the following diagram, voice is on one subnet, 10.120.7.0 /24, and data is on a separate
subnet, 192.168.50.0 /24. Voice has been separated from data at OSI Layer 3 using a router.
The router allows a user or administrator access from the PCs to MCD for programming
purposes.
Note
The diagrams in this section do not show connections to the outside world.
3-3
MCD Basic Installation and Maintenance Course
With the 2-port IP sets, you can have a PC connected to the second port of the phone, so only
one LAN drop is required at the user desktop. The set supports a 10/100 Mbps connection from
the LAN to its built-in layer 2 switch and extends a 10/100 Mbps connection to its secondary
LAN port. The customer will likely want to reduce costs by taking advantage of dual port IP
phones as shown in the next diagram.
• Advantages
| Reduce the number of layer 2 switches by half
| Reduce the amount of cabling by half
• Disadvantages:
| Voice and data share one broadcast domain
| Can cause congestion and contention on the network
The DHCP server in the next diagram is the 3300 ICP, providing IP addresses to the IP phones.
It can also provide addresses to the PCs, but then all devices would be on the same subnet and
share a single broadcast domain. Congestion and contention can cause degradation of voice
quality.
To separate voice and data at OSI Layer 3, put the PCs on a different subnet, creating two
separate broadcast domains. This implies that another DHCP server might be required to
support the PCs, or program two subnets on one DHCP Server.
• The 3300 ICP’s DHCP Server and the IP phones are on the 10.120.7.0 /24 subnet, which is
one broadcast domain.
• The External DHCP Server and the PCs are on the 192.168.50.0 /24 subnet, which is a
second, separate broadcast domain.
The layer 2 switch needs to recognize and switch traffic on these two different subnets. The
layer 2 switch does not look at IP addresses, but does look at the layer 2 header of the IP
packet.
Separating traffic at layer 2 is accomplished by using Virtual LANs (VLANs). To separate voice
and data on the network and to provide voice priority, the VLAN solution is recommended.
Layer 2 IP packets have a layer 2 header that includes the source and destination MAC
addresses. In the following diagram, the source MAC address of the voice packet is the IP
phone’s MAC address. The source MAC address of the data packet is the PC’s MAC address.
The destination MAC address is the MAC address, if known, of the device to which
communication is intended.
Note
The entire frame is not shown in the remaining diagrams.
3-5
MCD Basic Installation and Maintenance Course
VLAN programming can only be accomplished within a managed switch, or a switch which is
802.1 p/Q compliant, capable of VLAN ID and VLAN Priority handling. On most switches, all
ports reside in the default VLAN 1. The customer’s site may be different.
To implement VLAN on the customer’s network, the network layer 2 switches must be:
As data traffic arrives at the port connected to the PC, the layer 2 switch adds 4 bytes of
information to the layer 2 header. This is a VLAN tag, and includes two pieces of information:
• VLAN Identifier
• VLAN Priority
Because the port is programmed as VLAN 1 – Untagged, when IP traffic leaves the layer 2
switch, the VLAN 1 tag is removed.
As voice traffic arrives at the port from the IP phone, the layer 2 switch adds 4 bytes of
information to the layer 2 header. The 4-byte VLAN tag, containing VLAN ID and a VLAN
Priority, is added. Again, because the port is programmed as untagged, when IP traffic leaves
the layer 2 switch, the VLAN tag is removed. The VLAN 1 tag is used to identify to the layer 2
switch that both the voice and the data traffic belong to a single VLAN, VLAN 1.
To separate voice and data traffic at OSI Layer 2, voice traffic should be on a different VLAN. It
is possible to manually change the layer 2 switch port programming so that some ports are on
one VLAN and other ports are on another VLAN. In this diagram, the IP phone is connected to a
port programmed as VLAN 25 – Untagged. The PC is connected to a port programmed as
VLAN 1 – Untagged.
3-7
MCD Basic Installation and Maintenance Course
As before, data traffic arrives at the port from the PC and the layer 2 switch adds a VLAN 1 tag
to the header. When voice traffic arrives at the port from the IP phone, the layer 2 switch adds a
VLAN 25 tag to the header. Now voice and data can be separated at OSI Layer 2. Voice traffic
will be on VLAN 25 and data traffic will be on VLAN 1.
The port connected to the IP phone will only accept VLAN 25 traffic, so when the PC broadcasts
on the network, the IP phone will not receive the broadcast packets.
The port connected to the PC will only accept VLAN 1 traffic, so when the IP phone broadcasts
on the network, the PC will not receive the broadcast packets.
The port connected to the PC can also be programmed to tag incoming packets with a low
priority, which is the default priority 0. Likewise, the port connected to the IP phone can also be
programmed to tag incoming packets with a high priority. Priority 6 is recommended for voice
traffic. Priority leaving the switch is given to IP packets programmed with a higher priority. In this
diagram, if voice and data were attempting to leave the switch through the same port, priority
would be given to the voice traffic.
3-9
MCD Basic Installation and Maintenance Course
Previous diagrams show the IP phone and the PC connected to two separate ports on the layer
2 switch. The customer will likely want to take advantage of dual port IP phones, as shown in
the following diagram.
Because of the layer 2 switch port programming, when voice traffic arrives at the port from the
phone it is tagged as VLAN 25, Priority 6.
However, when the PC connected to the IP phone sends IP packets to the layer 2 switch, they
will also be tagged as VLAN 25, Priority 6.
The solution is to program a dual configuration on all layer 2 switch ports connected to both an
IP phone and PC. This will allow traffic through on both VLAN 1 and VLAN 25. Notice that the
port is programmed as tagged on VLAN 25 and untagged on VLAN 1. Each port on the layer 2
switch can only be programmed as untagged on a single VLAN.
3-11
MCD Basic Installation and Maintenance Course
IP phones are VLAN capable devices and have the ability to obtain VLAN information from a
DHCP Server. The phones use the new VLAN information and add a VLAN tag to their packets.
DHCP Option ID 125 – Vendor specific or DHCP Option ID 43 - Vendor specific is used to notify
the IP phones of their VLAN ID and VLAN Priority. The 3300 ICP DHCP server uses DHCP
Option ID 125 by default.
Note
These numbered items are shown in the diagrams that follow.
1. When an IP phone is powered on or reset, it follows a boot routine defined in its firmware,
which includes the Discovery, Offer, Request, and Acknowledge (DORA) sequence. The
phone performs a DHCP Discovery by broadcasting for an IP address. At this point, the
phone does not know that it should be tagging its packets. The Discover packets arrive at
the layer 2 switch as untagged packets.
2. The layer 2 switch port connected to the phone has a dual configuration, VLAN 1 –
Untagged and VLAN 25 – Tagged. When the layer 2 switch receives an incoming untagged
packet, it will add a VLAN 1 tag to the header of the packet.
3. A DHCP Server is required for devices on VLAN 1. The layer 2 switch port to which the
DHCP Server is connected must be programmed as VLAN 1, Untagged so the server
receives all DHCP Discoveries made on VLAN 1. This server only responds to DHCP
broadcasts coming from VLAN 1.
4. When the DHCP Discovery packet leaves the layer 2 switch, the VLAN 1 tag will be
removed.
5. The VLAN 1 DHCP Server must have a subnet defined. In this diagram, devices on VLAN 1
are on the 192.168.50.0 /24 subnet. On the server, program:
• DHCP Option ID 3 – gateway to communicate with devices on other subnets. In this case,
192.168.50.250.
• DHCP Option ID 125 – tells the phones to accept the DHCP Offer and learn their VLAN ID
and VLAN Priority, as shown in the diagram.
3-13
MCD Basic Installation and Maintenance Course
6. The DHCP Server packages the DHCP information into a DHCP Offer.
7. The DHCP Offer arrives at the layer 2 switch without a tag. A VLAN 1 tag is added due to
the port programming,
8. Since the port connected to the IP phone has a dual configuration, including VLAN 1 –
Untagged, it will accept VLAN 1 traffic.
9. As the DHCP Offer exits the switch, the VLAN tag is removed from the packet because the
port is programmed as VLAN 1 – Untagged.
10. The phone accepts the Offer because of the ID information programmed in DHCP Option ID
125. The phone learns it should be on VLAN 25, Priority 6 for voice, or set to set
communication, and Priority 3 for signaling, or call setup and processing.
From now on, the phone tags its own IP packets with a VLAN 25, Priority 6 tag for voice
media and VLAN 25, Priority 3 tag for voice signaling.
11. The phone’s firmware instructs the phone to rebroadcast another DHCP Discovery for an IP
address on the new VLAN 25.
12. The phone’s DHCP Discovery arrives at the layer 2 switch port with a VLAN 25 tag already
in the packet header. The layer 2 switch will leave the tag intact so the packet will be on
VLAN 25.
13. The DHCP Server is connected to a VLAN 1 – Untagged port. The VLAN 1 port will not
accept VLAN 25 traffic, so it will not pass the new DHCP Discovery to the DHCP Server.
3-15
MCD Basic Installation and Maintenance Course
14. A DHCP Server is needed for VLAN 25 devices. In this diagram, the 3300 ICP internal
DHCP Server is used and its port is programmed VLAN 25 – Untagged.
Note
The VLAN ID is programmed in the System IP Properties form.
The differentiated VLAN Priorities and DSCP values are programmed in the
LAN Policy (QOS) form.
Caution
If the VLAN ID is changed from the default of 1 in the System IP Properties
form, MCD must be connected to a port programmed as voice VLAN –
Tagged and the default VLAN – Untagged.
15. Since it is tagged as VLAN 25, the layer 2 switch accepts the DHCP Discovery from the
phone and passes it to the 3300 ICP’s DHCP Server.
16. The tag is stripped from the packet as it exits the layer 2 switch because the port is
programmed as VLAN 25 – Untagged.
17. The 3300 ICP DHCP Server is programmed with a different subnet than the VLAN 1 DHCP
Server. In this diagram, the 3300 ICP DHCP Server is programmed on the 10.120.7.0 /24
subnet. On the 3300 ICP, program:
• Range – a range of addresses available for DHCP enabled devices on VLAN 25.
• DHCP Option ID 3 – gateway to communicate with devices on other subnets. In this case,
10.120.7.250.
• DHCP Option ID 125 – tells the phones to accept the DHCP Offer, download their operating
software, and communicate with Call Control.
3-17
MCD Basic Installation and Maintenance Course
18. The 3300 ICP DHCP Server packages the DHCP information into an Offer and sends it back
to the phone.
19. The DHCP Offer enters the layer 2 switch on a port programmed as VLAN 25 – Untagged.
All untagged packets entering the switch on this port will have a VLAN 25 tag added to the
header.
20. The phone is connected to a port that has a dual configuration. The port is programmed as
VLAN 25 – Tagged, so all VLAN 25 tagged packets leaving the switch through this port will
retain their tag in the header.
21. The phone receives the DHCP Offer, recognizes the VLAN tag and its own MAC address in
the header, and realizes that the packet is addressed to itself.
22. The phone sees DHCP Option ID 125 and accepts the DHCP Offer, downloads its software,
and communicates with Call Control.
23. When the PC broadcasts for an IP address, it sends the DHCP Discovery to the layer 2
switch without a tag.
24. Because the DHCP Discovery arrives at the layer 2 switch without a tag, the port adds a
VLAN 1 tag to the header.
25. The 3300 ICP DHCP Server does not receive this broadcast because its port only accepts
VLAN 25 tagged packets.
26. The VLAN 1 DHCP Server is connected to a layer 2 switch port programmed as VLAN 1 –
Tagged, so it passes the DHCP Discovery to the VLAN 1 DHCP Server.
27. The VLAN 1 tag is removed as the packet leaves the switch.
3-19
MCD Basic Installation and Maintenance Course
28. The VLAN 1 DHCP Server packages all DHCP information and returns a DHCP Offer to the
PC. DHCP Option ID 125 is not needed for the PC.
29. As the DHCP Offer enters the layer 2 switch, the port is programmed to add a VLAN 1 tag to
the header.
30. The DHCP Offer arrives at the phone and PC’s port, which is programmed as VLAN 1 –
Untagged, allowing the packet through to the PC.
31. The VLAN 1 tag is removed from the header at the layer 2 switch port. The phone
recognizes that the destination MAC address belongs to the device connected to its second
port, so the phone passes the Offer to the PC.
32. The PC accepts the DHCP Offer and receives its IP address. Now all phones are on the
10.120.7.0 /24 subnet and all PCs are on the 192.168.50.0 /24 subnet
33. For one subnet to communicate with another subnet, a router, or layer 3 switch, is required.
Perhaps PCs on the 192.168.50.0 /24 subnet need to communicate with the 3300 ICP on
the 10.120.7.0 /24 subnet for programming and maintenance purposes. The router address,
or default gateway, on the 192.168.50.0 /24 subnet, is 192.168.50.250. The layer 2 switch
port for devices on the 192.168.50.0 /24 subnet are programmed as VLAN 1 – Untagged.
34. The router address, or default gateway, for the 10.120.7.0 /24 subnet is 10.120.7.250. The
layer 2 switch port for the router and the 3300 ICP on the 10.120.7.0 /24 subnet are
programmed as VLAN 25 – Untagged.
35. To communicate with MCD, ESM is used. The user launches Internet Explorer and types in
the IP address of MCD.
36. The layer 2 switch adds a VLAN 1 tag to the header because the packets from the PC arrive
at the layer 2 switch port untagged.
37. The packets are sent to the PC’s default gateway because the IP address of the 3300 ICP is
on a different subnet.
38. The layer 2 switch removes the VLAN 1 tag from all packets leaving through this port
because it is programmed as VLAN 1 – Untagged.
39. The router strips off the layer 2 header and looks at the layer 3 header to determine the
destination IP address. The router determines that the request to view ESM is destined for
the 10.120.7.0 /24 subnet and sends the packet to its port programmed as 10.120.7.250.
40. Because the packet re-enters the layer 2 switch through a port programmed as VLAN 25 –
Untagged, a VLAN 25 tag is added.
41. The 3300 ICP is connected to a layer 2 switch port programmed as VLAN 25 – Untagged,
so it passes the IP packet through to the 3300 ICP.
42. The VLAN 25 tag is removed as the IP packet leaves the layer 2 switch.
3-21
MCD Basic Installation and Maintenance Course
43. The 3300 ICP web server responds with the login page of ESM.
44. A VLAN 25 tag is added to the header because the packet enters the layer 2 switch through
a port programmed as VLAN 25 – Untagged.
45. Since the 3300 ICP response is going to the PC, which is on the other subnet, it sends the
response to its default gateway, 10.120.7.250.
46. The tag is removed from the header because the packet leaves the switch through a port
programmed as VLAN 25 – Untagged. The router strips off the layer 2 header and looks at
the layer 3 header to determine the destination IP address.
47. The router determines that the response is destined for the 192.168.50.0 /24 subnet and
sends it to its port programmed as 192.168.50.250.
48. Since the packet enters the layer 2 switch on a port programmed as VLAN 1 – Untagged, a
VLAN 1 tag is added to the header.
49. The phone and PC’s port has a dual configuration, including VLAN 1 – Untagged. The port
accepts the response because it now has a VLAN 1 tag in the header.
50. The layer 2 switch port removes the VLAN 1 tag from the packet. The phone sees that the
destination MAC address of the packet is connected to its second port and passes the
response to the PC.
This section explains how to configure the CXi in an existing network, the CXi programming,
and VLAN programming for both voice and data. The example below shows the CXi connected
to a customer’s layer 2/3 switch and is also used as an internet gateway to benefit from the
firewall capabilities of the CXi.
In this example, the phones are members of VLAN 25 and the data devices are members of
VLAN 1. The CXi LAN port 17 is connected to the external layer 2/3 switch, and the CXi WAN
port will be connected to the router. Two DHCP servers are used. One is external for VLAN 1
and the second one uses the CXi internal DHCP server for VLAN 25. Routing must be done
between VLAN 1 and VLAN 25 using a layer 2/3 switch. If there is no router, VLANs should not
be used, but the CXi can still prioritize voice over data.
3-23
MCD Basic Installation and Maintenance Course
• Voice VLAN ID – 25
• Domain – mitel.com
Note
The controller needs the DNS setting to access the internet for licensing with
the AMC server at install time or for other functions that need internet access.
IP Routing Form
If there is an external router, disable the ICMP Router Discovery Server setting.
• WAN IP Address Method – set the WAN access method to the appropriate method, and
then program the rest of the form depending on the WAN access you have.
IP Address – 192.168.5.0
Start – 192.168.5.10
End – 192.168.5.50
Upload Port:
• VLAN 1 – Untagged
• VLAN 25 – Tagged
IP Phone Port:
• VLAN 1 – Untagged
• VLAN 25 – Tagged
External DHCP Server Port – no VLAN setup.
3-25
MCD Basic Installation and Maintenance Course
IP Address – 192.168.1.0
Start – 192.168.1.10
End – 192.168.1.100
Note
If there is no router to route between VLANS, then use one VLAN for voice
and data and use one DHCP server, but add DHCP Option ID 125. DHCP
Option ID 125 will be VLAN =1 and Priority=6. The CXi’s L2 switch will
prioritize voice packets, but there will be no priority in the external L2 switch.
In order for the PCs in the network to access the internet through the CXi, the
default gateway of the PCs must be the CXi’s L2 switch IP address. In the
example above, that would be 192.168.5.4
LLDP – MED is an extension of the LLDP core standard used by endpoint devices to discover
each other on the same network link, or segment.
Certain Mitel IP Phones can use LLDP – MED to obtain the VoIP-specific configuration
information that they require when they first communicate with their layer 2 port. This includes
information such as VLAN ID, COS Priority, and DSCP values. Some of the information can
also be gathered using Cisco Discovery Protocol (CDP) and DHCP, or entered at the phone.
The IP phone looks for this and other information such as IP address, default gateway, and
subnet mask, from all of these sources in the following priority:
1. Manual entry
2. LLDP – MED
3. CDP
4. DHCP
The order of learning the LAN Policy (VLAN ID and Priority) is:
1. LLDP – MED
2. CDP
3. DHCP
4. Manual entry
The binding order of the LAN Policy is a “Last in win” approach, meaning that LLDP LAN policy
can be overridden by DHCP setting, for example.
LLDP – MED also allows the IP phone to transmit its power requirements and detailed inventory
information about itself to the switch to which it is attached. This information includes vendor
name, model number, plus firmware, software, and hardware revisions.
When a switch receives the information, it stores it in a Management Information Base (MIB). A
network management system can then access the MIB for inventory reporting purposes.
Reference
For more information, see the Appendix C in the Engineering Guidelines.
3-27
MCD Basic Installation and Maintenance Course
• Configure an ASU
This figure shows the Controller Module Configuration form. To access this form, navigate to the
Hardware > Modules > Controller Module Configuration form.
4-3
MCD Basic Installation and Maintenance Course
Each device connecting to a 3300 ICP system has a Device ID (IP telephones) or a Physical
Location Identifier (analog and digital devices, analog and digital trunks). A Physical Location
Identifier (PLID) is a four-digit number used by the 3300 software to identify the specific circuit
that an end device or trunk is connected to.
The PLID is used to identify which pair of wires will be used at the punch down block for each
TDM circuit. This allows movement of devices by moving patch wiring at the punch down rather
than having to move an entire cable run.
In this example, it is a cabinet number and is used to determine which peripheral cabinet
a device is connected to.
Note
The terms Unit and Cabinet refer to the associated hardware used to expand
resources on the 3300 ICP.
For another example, in a cabinet assigned as unit 12 on shelf 1, card slot 3, circuit 8 would be
designated 12 1 3 8.
4-5
MCD Basic Installation and Maintenance Course
Two analog boards – the Analog Main Board (AMB) and the Analog Option Board (AOB) –
provide embedded analog capability for the 3300 controller.
The AMB for the MXe, CX and CXi provides six Loop Start, four ONS, one Music On Hold, and
one Paging circuit.
The AOB on the CX/CXi only is installed on the AMB to provide an additional six Loop Start and
four ONS circuits.
Programming
In the Analog Services Units form, port 0 is the AMB, and has the programmed type of 3300
Embedded Analog.
To include an AOB on the CX or CXi controllers, use the Expanded Analog type.
Units 2 through 16 can be used for CIM-connected ASUs, Universal ASUs or ASU IIs.
Four
imbedded
CIM ports
Reference
Please refer to your lab workbook.
4-7
MCD Basic Installation and Maintenance Course
An Administrator Policy controls access to forms in the System Administration Tool. When you
create a policy, you set permissions that grant Read Only or Read/Write access to forms. You
can also deny access to forms, which hides them from the user’s view.
One policy is assigned to each user in the User Authorization Profiles form and can be
distributed to all of the customer’s MCD systems that are using System Data Synchronization
(SDS).
• Permissions
Level Form Access Allowed Permissions Granted
Note
SDS Administrators on systems upgraded to Release 8.0 are automatically
assigned Root Administrator access rights.
5-3
MCD Basic Installation and Maintenance Course
• Read/Write
• Read Only
• No Access
The policy access rights can be further refined by selecting individual forms and using the
Change Member buttons to change the access type.
Note
Access to Maintenance commands as well as FTP and Telnet connectivity are
excluded from policy control.
5-5
MCD Basic Installation and Maintenance Course
• System Admin
• Group Admin
• Desktop Admin
MCD allows multiple user access. As long as the sessions are logged in using different user
names and passwords, you can have:
On a system where the SDS feature is disabled, the SDS Shared Data Updates, SDS Form
Comparison, and SDS Form Sharing forms do not appear in the list of forms that the System
Administrator can access.
You can prevent a Root Administrator on a local system from having Root Administrator access
rights on specific remote systems. Use the SDS Form Sharing form to restrict the sharing of the
Root Administrator's profile with the remote systems.
In the User Authorization Profiles, change the default username and password for the System
User Profile login ID. Ensure that any other user profile login IDs that are created only have the
required access level.
Note
Users are required to change the default password used to log into the
System Administration, Group Admin, and Desktop Tools.
Caution
Because of the nature of SDS, an administrator can indirectly modify data in a
remote MCD without having administration rights programmed on that system.
With all security features in place, customers become responsible for their PBX security and are
expected to do the following when the PBX is installed.
• The username and password for the system profile should be restricted to only responsible
personnel, at the owner’s discretion. As a general rule of thumb, System Level access
should not be assigned to routine service personnel.
• Create the necessary user profiles. When installing MCD, login as System with correct
username and password in ESM and create the required profiles needed for access to
MCD. Remember to change these on a regular basis to help keep the system as secure as
possible.
• Make and keep a backup copy of new usernames and passwords. Whenever usernames
and passwords are changed, make sure that the updated usernames and passwords are
recorded and saved in a secure area. These records should be accessible to any service
personnel, if needed.
• Backup your database. Backup the database regularly and whenever there have been
changes made to it.
Caution
All applications that connect to MCD (via MiXML, FTP and secure Telent)
should have their own login account and never use the system login account.
Applications attempting to connect to MCD using the system login account
may eventually lockout the system account if the password for the system
login account is changed.
The logs will show the application, which will have an IP address that is
different from the MCD system.
5-7
MCD Basic Installation and Maintenance Course
The period of inactivity after which the current System Administration Tool session is
automatically terminated is configurable in the System Security Management form.
Maintenance commands to reset passwords to the factory defaults for individual users or for all
users, and to log out hot desk users are:
• Reset_Login_Password
• Reset_All_Login_Passwords
Note
A Class of Service (COS) option, User Inactivity Timer, automatically locks
5300-series phones after a configurable period of inactivity.
Reference
Please refer to your lab workbook.
Reference
Please refer to your lab workbook.
5-9
MCD Basic Installation and Maintenance Course
Reference
Online Help > Contents > Maintenance > Procedures > Healthy System
Checklist
A healthy system means that everything is operating as expected. There are a number of
system checks that should be done before leaving the system unattended.
Caution
Mitel recommends this checklist be used both before and after working on a
system.
• There are no error logs. More details about the logs are discussed in the Troubleshooting
the System and the Sets module.
• There are no failed data distribution updates if System Data Synchronization (SDS) is
configured. SDS is discussed in the advanced class.
• The Programmed Reboot Resource Recovery schedule is programmed for the desired date
and time.
Reference
Technician’s Handbook > Maintenance > Check System
6-3
MCD Basic Installation and Maintenance Course
Alarm Check
Check for the presence of any alarms. You can observe the alarm status by:
Note
It is important to always check both the Alarm Details form and issue the
SHOW STATUS ALARMS command. Some alarm categories only show up in
the Alarm Details form and some only show up when using the commands.
• Console windows.
Database Check
MCD stores database information such as the hardware and user specifics of the system, both
in its RAM memory and on its hard drive. The stored data can become corrupt and unusable.
Note
You should always perform a DBMS CHECK FULL after any lengthy ESM
session. It gives more information about the database than BRIEF. BRIEF
simply performs the check and displays a summary. It does not display the
status of each form like FULL does. Both commands give the same end
result, and there should be no Table or View Errors. It is recommended to use
the DBMS CHECK FULL command for the remainder of the class.
Database Errors
Whether the database is truly corrupted at the time of the DBMS Check or unavailable due to
access by another database process, such as a database backup, the DBMS Check results
appear the same.
It is best to repeat the check after a conflicting database process has completed.
Whether a database error is detected during a manual or a scheduled check, the DBMS
CHECK FULL command should be repeated to confirm the error and to view details about the
areas of database unavailable for access.
You may also attempt to select a database form and view its contents. A failure, with a system
error message as a reply, confirms a corrupted database.
When a database error has been confirmed, begin a database recovery from a known healthy
database backup. Database backups are discussed later.
6-5
MCD Basic Installation and Maintenance Course
Database errors may also occur if someone or something is accessing the database. For
example, if someone else is accessing a form, MCD cannot check that form and displays an
error. The same is true if a hospitality Property Management System (PMS) is accessing the
database, such as someone being checked in or wakeup calls are being input. If this is the
case, simply wait, check there is no other access, and try again.
n is the hour, from 0 to 23, at which the system performs the check. Specifying minutes is not
possible. The set hour must be at least 10 minutes from the current time, or set to the next hour,
for the event to occur on the current day.
If the system detects a database error via the automatic DBMS CHECK, it will raise a MAJOR
alarm.
The DBMS CHECK OFF command turns the automatic checking off. On a newly installed
system, the default is 5AM and check is off. If the default time of 5AM is the desired hour to be
used for the DBMS CHECK, type the command DBMS CHECK ON.
Use the DBMS STATUS command to see the status of the DBMS CHECK and DBMS CHECK
TIME settings.
Reference
Please refer to your lab workbook.
6-7
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
Note
Beginning in MCD 4.1 SP2, the DBMS_Intialized flag is set to On
automatically when a valid license key is applied to the system and the
system is reset.
6-9
MCD Basic Installation and Maintenance Course
Note
Beginning in MCD 4.1 SP2, the DBMS_Intialized flag is set to On
automatically when a valid license key is applied to the system and the
system is reset.
• A live copy of the database is stored on the hard disk and in RAM.
• A pointer is set to ensure the database will be recovered if the system resets.
• Future database changes are automatically stored in the live copy on the hard disk.
When the DBMS_INITIALIZED flag is off:
Reference
Please refer to your lab workbook.
6-11
MCD Basic Installation and Maintenance Course
A backup of the system’s data should be done on a regular basis. If the system loses its
database or there is a serious database corruption as indicated by the inability to access ESM
forms, the database can be restored from a recent backup.
When backing up the system, you copy it from the system hard drive to another media. The
backup procedure lets you back up the database files alone or with Call History records and/or
voice mail messages. This procedure should be done whenever a number of changes have
been made to the database.
Reference
Technician’s Handbook > Maintenance > Back Up a Database
Reference
See the Scheduler Module to schedule automatic backing up of the system
database.
• An external FTP server. This is useful in a multi-node environment. The External FTP Server
form needs to be programmed.
To perform a backup, your current user account on the PC being used must have the
appropriate version of a Java Plug-in installed. If you do not have the correct version, the
Browse button will remain grayed out, and there will be a link at the top of the form. Selecting it
will expand the form to give additional information about Java. Go to the www.java.com website
and download the latest copy of Java. Once it is installed, the expanded version of the form will
no longer be available, and the Browse button will become available.
Use the Browse button to launch the Save As dialog box, and then navigate to the location on
your local drive where you want to save the backup file. You have the choice of where to store
the backup, locally on your client PC or on a file server on the LAN.
If Call History and Voice Mail Messages are included in the backup, it can add a significant
amount of time to the backup.
Caution
For a full backup with the voice mail messages, you will need a significant
amount of available space at the target location.
During a system backup, no other users can access any of the web-based tools, such as IP
Appliance Online Services, Visual Voice Mail, Desktop Tool, Group Administration Tool, or
System Administration Tool. It is recommended to perform system backups outside of business
hours. Call process will continue normally while the backup occurs.
Whether or not voice mail is backed up along with the database backup depends on how often
the site performs backups. For example, if database backups are only done when new
programming has been done to the DBMS database and this is only done on a random basis,
then the customer may not want the backup to contain the voice mail messages. If this backed
up database is ever restored, then the messages would be completely out of date. If a nightly
backup is being done, then the messages would only be, as a worst case, one day out of sync.
If a database is restored and it does not have the voice mail messages as part of its backup,
then the original messages on the hard drive are not affected.
6-13
MCD Basic Installation and Maintenance Course
Rotating three generations of database backups permits you to go further back to find the
database configuration you desire or the error-free database you need.
It is recommended to set up three separate backup locations and to keep a log book or file
recording of when each was last created. Make sure that all who need to know are aware of the
location of the backups. It is a good idea to use a location on a customer’s server, or use
rewritable CD/DVDs or USB flash drives.
Caution
When saving the backup, it is recommended that a record of the local
system’s IP address be part of the backup filename; perhaps the Backup File
Prefix.
If you must restore that backup onto a system that has a different IP address,
temporarily set the IP address of the target system to match the IP address in
the backup filename. Once the restore has completed, change the IP address
back to its original.
If this is not done, when a backup is restored onto a system that has a local IP
address different than the local IP address in the backup, a new local Element
is produced in the Network Elements form during the restore.
Reference
Please refer to your lab workbook.
6-15
MCD Basic Installation and Maintenance Course
Database Restore
If a DBMS CHECK finds errors, you can fix possible database errors using the backup that you
created. The length of time required to restore a customer database can vary depending on
whether or not the backup you are restoring included voice mail messages and/or call history
records.
Reference
Technician’s Handbook > Maintenance > Restore a Database
• If the saved file is older, database changes made since that backup will be lost after the
restore. Performing regular backups should eliminate this problem.
• If the backup is corrupted or errors were saved to the backup, BAD DATA is detected.
During the restore, this corrupted data will be eliminated from the system, but the eliminated
data will likely represent programming information. This lost data will have to be manually
reprogrammed. Check the logs within Maintenance and Diagnostics to view any possible
errors.
Caution
When saving the backup, it is recommended that a record of the local System
IP address be part of the backup filename; perhaps the Backup File Prefix.
If you must restore that backup onto a system that has a different IP address,
temporarily set the IP address of the target system to match the IP address in
the backup filename. Once the restore has completed, change the IP address
back to its original.
If this is not done, when a backup is restored onto a system that has a local IP
address different than the local IP address in the backup, a new local Element
is produced in the Network Elements form during the restore.
Reference
Please refer to your lab workbook.
6-17
MCD Basic Installation and Maintenance Course
• PCM TOTALS – lists the assigned PCM links and indicates, for each, the number of isolated
or unisolated faults.
• Reset the system. The system checks for logical errors, maps out bad sectors, and runs a
hard disk surface test. The system identifies the capacity of the hard drive as well as the
used/free space.
• Check for Disk Space alarms. This is important for systems that use Embedded Voice Mail.
Note
For Embedded Voice Mail, a major alarm is raised when the hard drive is 90%
full and a critical alarm at 95% full.
Verifying Disk Space for Voice Mail and RAM Space for Music on
Hold
To determine how much hard drive space is left for voice mail greetings and messages and for
embedded Music on Hold files, use the dosFsShow command issued from within VxWorks. You
should already have a HyperTerminal ready from a previous module.
The voice mail greetings and messages are stored in the /vmail partition. Check the /vmail
partition to determine if you have ample storage space for voice mail greetings and messages.
To check the available free disk space for /vmail, connect to VxWorks and enter:
dosFsShow “/vmail”
This is an example with 14.5 GB of free space, shown at the end of the system response.
14.5 GB
There are two other methods to determine the voice mail disk size:
6-19
MCD Basic Installation and Maintenance Course
To check the available RAM space for embedded Music on Hold files and to determine if a
recorded file size will have enough storage room, navigate to the Music on Hold > System Audio
Files Update form. The available space is tracked and displayed in this form.
RAM space on a
CX/CXi is 4 MB.
A system reset:
• Prevents the accumulation of file fragmentation errors in the system’s memory, which can
cause unpredictable results in system operation.
A reset can be accomplished by a:
• Controlled Reset – with the VxWorks line command, reboot, from the serial interface to the
3300 controller or by using the Reset System command in ESM. The Reset System
command requests all software components to shut down and monitors the progress of the
shut down. The Reset System command is the desired means of manually resetting a
system.
• Hard Reset – pressing the reset button on the controller. It is considered the last alternative
and is used when the controlled reset has failed. It should be used with caution as database
corruption can occur. This is equivalent to powering down the system.
• Resource Reboot – can be set to occur if system resources fall below a defined threshold.
The resource reboot is on by default and occurs according to the scheduled programmed
reboot schedule. The monitored resources include:
| If the amount of free memory becomes less than:
50 MB, a warning maintenance log is generated and a minor alarm is generated.
The alarm is generated to notify the system maintainer that the system memory is
getting low and the system should be restarted. Under normal circumstances, the
system should remain up for 2 to 4 days after the alarm is generated. If configured,
the system will be reset at the next programmed resource recovery reboot time.
25 MB, a warning maintenance log is generated and a major alarm is generated.
The alarm is generated to notify the system maintainer that the system memory is
getting dangerously low and the system should be restarted. Under normal
circumstances, the system should remain up for 1 to 2 days after the alarm is
generated.
15 MB, a warning maintenance log is generated and a major alarm is generated. If
configured, the system will be reset at the next programmed resource recovery
reboot time.
2 MB, a warning maintenance log is generated and a critical alarm is raised on the
system. The system resets immediately.
6-21
MCD Basic Installation and Maintenance Course
| Memory fragmentation
If the largest memory fragment becomes less than 2 Mbytes, a log is generated and
a major alarm is raised to notify maintenance personnel that the system should be
rebooted. Under normal circumstances, the system should remain up for 2 to 4 days
after the alarm is generated. If configured, the system will be reset at the next
resource monitoring reboot time.
If the largest memory fragment becomes less than 500 Kbytes, a log is generated
and a critical alarm is raised on the system. The system will reset immediately.
| Stale tasks/components
If a non-critical task is suspended, a log is generated and Major alarm is raised. If
configured, the system will be reset at the next resource monitoring reboot time.
If a critical task is suspended, a log is generated and a critical alarm is raised on the
system. The system will reset immediately.
Note
The thresholds for Memory Consumption, Memory Fragmentation, and Stale
Tasks/Components are hard-coded and cannot be changed.
The Programmed Reboot Courtesy On command enables the courtesy reboot option. When
courtesy reboot is enabled, the system waits for all calls to clear before rebooting. Use the
Courtesy qualifier to minimize the impact of reboots on system users. This is disabled by
default.
The Resource Recovery Reboot is automatically set for 2:15 am daily and is on by default.
The Scheduled Program Reboot is scheduled for 2:15 am daily and is off by default.
During a reboot, the system shuts down its processor and automatically restarts, clearing its
memory and allowing a fresh copy of the operating software and database to be loaded from the
hard drive.
Note
The system will run in a stable fashion providing full level of functionality
without scheduled programmed reboots for systems running 4.1.9.4 or
greater.
Verify that the PROGRAMMED REBOOT RESOURCE RECOVERY is scheduled and enabled.
Note
Mitel recommends that it is not necessary to enable a regular
PROGRAMMED REBOOT. All that is necessary is to adjust the scheduled
time to suit the particular installation. Leave the PROGRAMMED REBOOT off
and the RESOURCE RECOVERY REBOOT on.
Reference
For more information, see Knowledge Base Article 07-4409-00027.
6-23
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
Multiline IP Phones
Multiline IP phones are proprietary telephones that connect to a TCP/IP Ethernet LAN. They
have Personal Keys that can be used as:
• Feature keys.
• Direct Trunk Select keys, to directly access a CO trunk (3300 ICP only).
In this module, you will program Multiline Sets in a number of typical business applications.
7-3
MCD Basic Installation and Maintenance Course
IP phones are real-time sensitive network devices that must be installed in a LAN
environment that meets certain minimum delay, jitter, and packet traffic requirements.
Reference
See the MCD Engineering Guidelines for further details on LAN/WAN criteria.
• Upgrades its firmware from the TFTP server if required. This is normally not required
unless the MCD software has just been upgraded. Normally, this is defined as MCD’s
system IP address.
• Downloads its main operating software from the TFTP server, which is defined by
DHCP. Normally, this is defined as MCD’s system IP address.
• Registers its MAC address with a Directory Number (DN) on the defined MCD system. It
communicates via the system IP address to do this.
Registering IP phones
MCD call control will only communicate with registered IP phones. The Single Line or
Multiline IP Sets forms associate a MAC address of an IP phone with a programmed DN
and Device ID. This assignment allows registration of the IP phone with the system.
To have IP phones register with the system, you can associate the phones MAC with a
DN in one of two ways:
• Manually enter the valid IP phone’s MAC address prior to connecting the set to the LAN.
When connected, the set will register immediately.
• Connect the set to the LAN and you are prompted to enter a PIN. Enter a Set
Registration Access Code, the DN to be assigned to the set, followed by the Superkey or
Hold button. The appropriate forms will automatically be updated. The DN must already
be programmed in the MCD database in the appropriate forms.
PIN Numbers
Use the System Options form to specify the:
• Set Registration Access Code – used to register a new IP phone into the system.
• Set Registration Security – specifies how many registration attempts a user is allowed.
These codes, along with the desired DN, form a Personal Identification Number (PIN) to
be entered during the phone's initial boot up. When properly entered, the MAC Address
of the device will be automatically programmed in the appropriate forms.
The Set Replacement Access Code must be programmed. It is used when replacing a
defective set with a new one. It should be used with caution. It is meant to take the MAC
address of a new IP set, which is unknown to the database, and overwrite the MAC
address of an existing set in the database.
The replace activity will not be rejected if the DN specified belongs to a set that is still in
service, even one engaged in a call. The set being replaced must be of the same type.
7-5
MCD Basic Installation and Maintenance Course
• 5220 IP phone.
• 5224 IP phone.
• 5235 IP phone.
• 5324 IP phone.
• 5330 IP phone.
• 5340 IP phone.
Note
You can chain 2 PKMs on the 5220/5224/5235/5324 IP sets.
5412 PKM
5448 PKM
When a multiline set user calls a display phone or a console from its Prime Line, it is the Prime
Line DN that appears on the other phone’s or console’s display.
In the following example, the customer wants to have four IP phones installed according to the
planner.
Note
The system supplies the Device IDs.
7-7
MCD Basic Installation and Maintenance Course
Note
Class of Service (COS) is discussed later.
Template Forms
The three template forms available are:
• Key Templates Form – program line key settings for multiline phones and SIP devices.
• User and Device Templates Form – program a subset of the information normally added
on the User and Device Configuration form.
• User Roles Form – link templates with roles. When you add a new user, you are
prompted to select a role and its associated template.
Default Templates
The system has two default templates that can be used in place of customized
templates:
• Default User and Device template – used if you do not specify a role for a user and
device.
• Default Key template – used if you do not specify a device type, or if you specify a
device type that does not have a customized key template.
You can update the default templates, but you cannot rename or delete them.
Managing Templates
You can add, copy, change, and delete templates. You can also import data from a .
CSV file into templates.
For example, to use templates to program users in your enterprise, follow these steps:
1. Add a Key template for each device type.
2. Add a User and Device template for each department or work unit. To integrate a Key
template with the User and Device template, select the appropriate device type.
3. Associate a User Role to each User and Device template.
4. Add users, selecting the appropriate User Role and associated template for each entry.
When the system is first installed, a key template named Default Keys is created. You can
update the field values for this template, but you cannot rename or delete it.
The key template settings are applied when the device type is selected for a new user.
Changing the device type for an existing user has no impact.
When adding a new user, the default key template is used if:
• A key template has not yet been added for the selected device type.
Note
You can also create a new key template on the User and Device Templates
form. After selecting a Device Type, go to the Keys tab and program the keys.
Then save your work to create the new key template for the device.
Note
Follow similar steps to change or delete Key templates.
7-9
MCD Basic Installation and Maintenance Course
Reference
See the User and Device Configuration form later in this module.
A user and device template can be associated with multiple roles, or with no role.
When the system is first installed, a single user and device template named Default is created.
You can update the field values for this template, but you cannot rename or delete it.
Using the Hot Desking User field, you can specify whether the template applies to a regular user
and device or to hot desk users.
Using the Service Level field, you can specify whether the template applies to Full Service, IP
Device Only, Multi-Device, or Trusted Service DNs.
To program a hot desk set, clear the Hot Desking User box and select IP Device
Only as the Service Level.
To program a regular user and device, clear the Hot Desking User box and select
Full Service as the Service Level, and then select a Device Type.
The Keys tab is pre-programmed if you select a Device Type that has a key
template. If you select a Device Type that does not have a key template, or if you
select No Device as the Device Type, the Keys tab is programmed with information
from the default key template.
You can work on key templates directly from the Keys tab. To update the default key
template, select Use Default Key Template. To add or update the key template for a
device, clear Use Default Key Template.
3. Select Save.
Note
Follow similar steps to change or delete User and Device templates.
7-11
MCD Basic Installation and Maintenance Course
A user role can be associated with only one template. A template can be associated with
multiple roles.
• Select <New template> to create a new user and device template with default
settings and the same name as the role.
4. Enter a Note.
5. Select Save.
Note
Follow similar steps to change or delete a user role.
7-13
MCD Basic Installation and Maintenance Course
The User and Device Configuration form does not display entries for consoles, Hunt Groups,
remote DNs, and telephone directory-only entries.
• Search for a user based on specific criteria. For example, search for entries with a specific
DN or name.
• Quickly add, copy, change, or delete user and device data using a single form.
• Import user configuration information into the database. Using the import functionality, you
can quickly import large amounts of user configuration data.
The User and Device Configuration form is data from a number of other system forms, but it
does not replace those forms. For example, to create user authorization profiles, you can
choose to use either the User Authorization Profiles form or the User and Device Configuration
form. The advantage of using the User and Device Configuration form to manage user data is
that you can modify a wide range of user data, such as Telephone Directory, Department, or
Personal Speed Call assignments, without having to navigate through a large number of forms.
It is possible to add an unlicensed device by designating its Service Type as IP Device Only on
the User and Device Configuration form. Unlicensed devices can be used for basic functions,
such as emergency and attendant calls, and for hot desking login.
You can obtain the DNs of unlicensed devices and pending Hot Desk ACD agents by running
the Locate IP License command.
• Default User and Device – creates an entry based on the Default Template.
Selecting the Add or Change buttons will cause the form to display the following tabs:
• Profile – personal information, telephone directory information, user role, and service profile
7-15
MCD Basic Installation and Maintenance Course
The Service Level of the user or device is defined on the Profile tab. To assign a Service Level
to a record, use the Service Level field to define the features and licensing characters
associated with the DN. Four options, from least to most service- restricted, are available:
• Full Service – indicates that the DN is assigned to a standard user and device with full
telephony functionality.
• Trusted Service – indicates that the DN is assigned to a trusted Mitel application that has full
telephony service once it registers with the system. Although the DN can be programmed on
the same forms as a Full Service user/device, it does not use an IP User License.
Note
With Mitel Application Suite (MAS) release 4.0 and above, the NuPoint Unified
Messaging blade is supported as a Trusted Service application when using
MCD release 5.0 SP1 and above.
• Multi-Device – indicates that the DN is assigned to a user that has only basic telephony
functionality, such as emergency or attendant calls, until programmed as a member of a
Multi-Device User Group or Multi-Device Suite. There are two types of Multi-Device groups
that consume licenses differently.
| Standard Group – the DN does not consume an IP User license, but the group or suite
consumes a Multi-Device User or Multi-Device Suite license. Only one member of the
group or suite at a time can receive fully telephony service.
| External Twinning Group – the DN consumes an IP User license. The non-prime
member uses an External Hot Desk User license.
• IP Device Only – indicates that the DN is assigned to an unlicensed device that has only
basic telephony functionality, such as emergency or attendant calls. The device becomes
functional when a hot desk user or hot desk ACD agent logs into it.
Until a Service Level is assigned, the record consists of a user without a DN.
Once a DN is assigned a Service Level, you can only reassign it to the next level up, meaning to
a less restricted level, or to an equivalent level. Thus, from IP Device Only, you can go to any of
the other service levels. For the purposes of service level reassignment, Full Service and
Trusted Service are equivalent.
The table below lists the device and user types that can be programmed for each of the four
Service Levels. Hot Desking, ACD, and SIP are discussed in later modules. ACD and SIP are
advanced topics.
• Service Details – COS, Class of Restriction (COR), external hot desking information,
personal speed call allocations, interconnect number, and more. These features are
discussed later.
7-17
MCD Basic Installation and Maintenance Course
• Voice Mail – enable and program voice mailbox information, message notification type,
message management, and forwarding to e-mail
• Access and Authorization – user PN, wireless PIN, and authorize Desktop Tool access.
Enter a passcode for the hot desking user, hot desk ACD agent, generic SIP user, or Phone
Lock feature. PINs must be from 0 to 10 digits in length. Only digits (0 to 9) are permitted.
The PIN code cannot be read.
Note
Both NuPoint rules and MAS rules for PIN strength apply when the Hot Desk
PIN Security feature is enabled.
7-19
MCD Basic Installation and Maintenance Course
• Keys – device key programming. The Keys tab appears after Profile programming and
selecting Apply.
The .csv format for importing files is different than the .csv format used to export files.
When importing, use the .csv format described in the Import Spreadsheet form.
You need a Zip archive application like WinZip® installed on your programming PC to
open the Import Spreadsheet form after downloading it.
Note
If you have a multi-system site, you must complete a separate Import
Spreadsheet for each system. Do not create one spreadsheet containing all
new configuration data for the entire multi-system site.
Download the Import Spreadsheet from MCD by selecting the User and Device
Configuration form and then selecting the Import button.
7-21
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
Reference
Please refer to your lab workbook.
Reference
Please refer to your lab workbook.
Like the User and Device Configuration form, the User and Device Attributes form collects a
single user’s or device’s attributes from many different database forms and presents them in a
single form.
The User and Device Attributes form provides the system manager with a facility to make
changes to an operational database for multiline and industry-standard telephones. Use this
form to change a user’s or device’s attributes.
Fields shown as fixed text are read-only, but fields in text boxes are programmable.
7-23
MCD Basic Installation and Maintenance Course
Reference
For more information about Mitel sets, see www.mitel.com or MOL.
Types of Keys
Multiline sets have:
• Fixed Function Keys - designed to provide quick access to functions frequently performed
on a multiline telephone, such as a hold button, a transfer/conference button, and a redial
button. Fixed Function keys cannot be reprogrammed.
• Softkeys - the function at any given time appears in the LCD display next to the key. Their
functions change dynamically depending on the state of the call.
| On 5224 and 5324 IP phones, they are the three buttons under the display.
| On a 5330 IP phone, they are the top three buttons on the left.
| On a 5340 IP phone, they are the top three buttons on the left and right.
Single Lines
A Single Line is a DN that only appears on one key in the entire system. Single Lines may be:
• Non-Prime Lines, appearing on any key other than the first key.
In the example below, the boss’s phone is assigned a non-prime single line appearance on
1014. With this secondary line, the boss can make or receive calls even while engaged in a call
on the Prime Line on 1004. The planning would look like this.
Parameter
Prime DN 1004
Key Number 2
DN 1014
Line Type Single Line
Ring Type Ring
7-25
MCD Basic Installation and Maintenance Course
Multicall Lines
A Multicall Line appearance is a DN that may appear on more than one set and/or on two or
more keys of the same set and can support simultaneous separate conversations at each of its
appearances. When a new call rings into the number, all idle appearances will ring. If one set
answers, all other appearances of the same number become idle and are available for use.
With the exception of new calls ringing all appearances, multicall lines cannot be used to
monitor the state of other lines or devices.
A set acting as a backup to an Attendant Console can use this functionality when
rerouting incoming calls to various departments.
In the following example, keys one and four are programmed on the same set with DN
1004.
Parameter
Prime DN 1004
Key Number 3
DN 1004
Line Type Multicall
Ring Type Ring
7-27
MCD Basic Installation and Maintenance Course
By default, if a non-prime line is ringing at a multiline set, it is necessary to press that line
in order to answer the call. It is possible to enable Ringing Line Select in the set’s COS
to answer the non-prime line call simply by going off hook.
If a multicall line appears on two or more keys, there may be as many simultaneous calls
to the number as there are key appearances. For example, if there are six keys, six calls
can be handled.
Multicall keys programmed to a configured PKM ring the set on incoming calls, even
when the PKM is not physically connected to the telephone.
7-29
MCD Basic Installation and Maintenance Course
In this example, multicall line appearance 1560 will appear on sets 1002 and 1003.
Parameter
Prime DN 1002 1003
Key Number 4 4
DN 1560 1560
Line Type Multicall Multicall
Ring Type Ring Ring
7-31
MCD Basic Installation and Maintenance Course
Reference
Online Help > Contents > System Features > Features D to G > Direct Station
Selection/Busy Lamp Field (DSS/BLF)
• Single line
• Multicall line
Two more line types are available
• DSS/BLF
• Secretarial.
When a Personal Key is configured as a DSS/BLF key, it can have four different functions:
• Secretarial Transfer - dial-free, the key allows you to transfer calls without placing the call on
soft hold to that DN. Press the DSS/BLF key and the call is automatically transferred.
• Directed Call Pickup - the key allows you to answer calls that are ringing at that DN.
The monitored device may be on the same PBX or another PBX within the same cluster linked
via Mitel Services Digital network (MSDN) / Digital Private Network Signaling System (DPNSS).
These concepts are discussed later.
When you program the line type as DSS/Busy Lamp, the key is a DSS key of the associated DN
while the corresponding appearance displays the status of the monitored device.
When you program the line type as secretarial, the key allows all of the functions of DSS/Busy
Lamp as well as secretarial transfer of calls on soft hold to the associated DN.
The PKMs and the 5000/5200 and 5300 series sets support busy lamps.
7-33
MCD Basic Installation and Maintenance Course
If you use the System Administration Tool to program a DSS/BLF key on one key and then use
the Group Administration Tool to program a second DSS/BLF key for the same key, it won’t
work. Only one DSS key per alternate phone is allowed.
In this example, keys 5 and 6 are programmed on multiline set 1003 as Secretarial and
DSS/BLF keys.
Programming DSS/BLF
Feature Keys
You can assign features such as Camp-on, Auto Answer, and Do Not Disturb to any unassigned
Personal Key on the set or PKM. The key becomes a Feature Key. Pressing that key activates
the assigned feature. In most instances, the key works as a toggle key. Pressing the key
enables the feature with a visual indication. Pressing the key again disables the feature.
The 5020/5220/5224 IP Phones have many of these features, such as Callback, Call Forward,
Camp-on, Music, Night Answer, Override, Privacy Release, and Swap, available on their
softkeys, and many accessed by using the Superkey. Features unavailable on the softkeys can
be programmed against any spare Personal Keys.
The 5010/5212/5215 IP phones do not have feature softkeys. You can assign any of the
features to spare Personal Keys on these sets.
In this example, the features Auto Answer, Do Not Disturb, and Callback are programmed on
keys 7, 8, and 9 respectively using DN 1002.
Parameter
Prime DN 1002 1002 1002
Key Number 7 8 9
DN
Line Type Auto Answer Do Not Disturb Callback
Ring Type
7-35
MCD Basic Installation and Maintenance Course
On many phones, you only need one Ethernet drop to the desktop for both your voice and data
devices.
You can consolidate the drop because the phones incorporate a 2-port Ethernet switch that
provides LAN connectivity to both the phone and a second data device, such as a PC.
The second port supports connection to a 10/100 Base-T Ethernet network. The PC Port on IP
Phone - Disable option in the Class of Service Options form allows you to enable or disable the
PC ports.
7-37
MCD Basic Installation and Maintenance Course
The LOCATE ALL FREE command, with its qualifiers, identifies DNs or location IDs that
have not been assigned.
For example:
Use the TYPE *.LOCATE.FREE_DN command to view the free DNs listed in this file.
The LOCATE FEATURE EXT <NNNN> command provides a list of active features for a
specified extension number or PLID.
For example:
Use the LOC NUM 4000 command to see the device, hunt group, and path to which the
DN is associated.
IP Device ID: 1
Circuit Location: 1 3 1 1 1
Extension: 4000
Active Features:
Do Not Disturb
MAC Address: 08:00:0F:00:A2:FC
For example:
LOAD IPDEVICE 1
Caution
Be very careful with the Load command. If your syntax is not specific, you
may reboot the controller itself. DO NOT use the LOAD 1 command!
7-39
MCD Basic Installation and Maintenance Course
Reference
Online Help > Contents > Forms Reference > Forms A to C > Class of Service
Options
The Class of Service Options form is a template of feature and timer options that you assign to
all:
• Stations
• Trunks
COS allows enabling or disabling of features, not apply toll control. Some of these features can
stop access to outside calls. Class of Restriction (COR) is used as a means of applying toll
control, and is discussed in another module.
Enabling a feature usually involves assigning a COS option or timer to one or more devices.
Feature options are easier to manage if separate COS numbers are assigned for different users
and their devices, or groups of users. To reduce the chance of error, it is important that you
have an overall plan to follow.
Note
MCD provides a maximum of 110 COS records.
• COS 100 should be reserved for use by ARS for routing calls over Direct
IP Routes.
• COSs 101-110 are reserved records. Do not program.
COS values above 96 should not be used in networks unless the entire
network is upgraded to MCD 5.0 or higher.
• Every set that is added to the database is assigned COS number 1 by default. The
administrator customizes COS 1 with minimal features enabled to limit new employees from
accessing advanced features.
• COS numbers 2 through 5 are reserved for general employees that use single line phones.
The administrator may only use COS 2 initially, and then customize the features and timers
according to general employee needs. However, COS 3 through 5 are reserved for future
use in the event that subtle differences are required for certain individuals who use single
line phones.
• COS numbers 6 through 10 are reserved for attendant consoles. Again, the administrator
may only use COS 6 initially, and then customize it according to an attendant’s role.
However, COS 7 through 10 are reserved for future use in the event that subtle differences
are required for certain attendants.
• This same plan continues for other set types within the company. At this point, the
administrator will ensure that they have labeled each COS with a comment identifying the
COS according to the plan.
8-3
MCD Basic Installation and Maintenance Course
• Create a COS plan to suit the customer’s needs. Label all COS numbers in use for easy
administration.
• According to the plan, enable or disable features and adjust timers in each COS that will be
used.
8-5
MCD Basic Installation and Maintenance Course
• Day mode
• Night 1 mode
• Night 2 mode
Certain aspects of the system can be configured to behave differently based on the
operational mode.
A COS can be assigned to each of the three modes allowing for varied functionality
based on the time of day.
For example, it is possible to configure the incoming trunk answer point to be the
attendant console when the system is in day mode and to be the guard’s desk when it is
in Night 1 mode.
Reference
See the Scheduler Module to schedule a system to switch from day to night
service and vice versa.
Technicians frequently use this feature during trunk programming to verify trunk
functionality. It is enabled by default in all COSs.
8-7
MCD Basic Installation and Maintenance Course
8-9
MCD Basic Installation and Maintenance Course
8-11
MCD Basic Installation and Maintenance Course
The Telephone Directory is an information database of all the directory numbers in the system.
Each directory number has information associated with it, such as name, department, and
location.
Display set users can use the Phonebook feature to search the telephone directory for names.
They can scroll through the directory on their LCD displays until they get the name they want,
and can call the desired party by pressing a softkey.
Attendant Console Operators access the Telephone Directory through the Phonebook feature.
They can search for a person by name, department, location, number, or any combination of
these. All search matches are listed on the screen. The Operator can then select the required
party and place the call with one keystroke.
The preferred way to enter names in the Telephone Directory is Lastname,Firstname, with no
space before or after the comma.
If you use this format, the attendant can search for names by using either the first or last name.
Display phone users can search for names by using the last name followed by the first name or
initial.
Note
Setting the Phonebook Lookup – Display User Location to Yes in the user’s
COS options allows the phonebook search function to display the user’s
location after displaying the DN and name.
Prime Name
If multiple names are assigned to the same directory number, the Prime Name field can be used
to define the prime name, or displayed name, for that extension.
Only one name may be prime for an extension. The Prime Name field is ignored if the
Telephone Number field is blank. The first name entered in the Telephone Directory for any
extension is the prime name, unless this form is used to specifically designate an alternate user
of the directory number as the prime name.
In the Telephone Directory Form, select Yes to indicate that this name is the prime name. Select
No or leave the entry blank to indicate that the name is not the prime name. The default for this
field is No.
Privacy
Any extension number in the system telephone directory can be designated as private so that
this number is not displayed on other users’ telephones.
9-3
MCD Basic Installation and Maintenance Course
During a call, a caller’s name and number normally appear in the display of the called set.
However, if the caller’s directory number is programmed as private, only the caller’s name
appears. Private numbers are not displayed on other telephones during any call processing
state. In addition, users cannot use the Phonebook directory to display private numbers or call
users with private numbers.
Private numbers are displayed on attendant consoles. An icon of a lock appears in the attendant
console display to indicate that the number is private. Attendant consoles can also display
private numbers in the Phonebook.
In the Telephone Directory Form, select Yes to indicate that the associated telephone number is
to be a private extension. The default setting for this field is No.
In this example, the customer wants to have names, departments, and locations associated with
each telephone directory number.
The Telephone Directory form is used to label more than prime extension numbers. Some
examples are:
• External numbers
• ACD paths
9-5
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
References
5540 IP Console User Guide
• 5550 IP Console
• 5540 IP Console
Most installations include one or more Attendant Consoles.
5550 IP Console
The Attendant console optimizes call handling and system administration. The 5550 IP Console
is sold with all the parts and software that enable it to run on a customer supplied PC
10-3
MCD Basic Installation and Maintenance Course
5540 IP Console
The 5540 IP Console is a dual-port, MiNET attendant console. Designed for use on the IP
network, it supports PoE, cordless headsets and resiliency. The 5540 IP Console does not
support print functions, macro keys, or the application menu, and it lacks a printer port. It is an
economical answering position for small and medium-sized businesses, departmental
administrative assistants, or hospitality enterprises.
Reference
Please refer to your lab workbook.
Remote Training
This lab may not be possible when training in a remote environment.
http://training.mitel.com/cw/T-FT-5550-1-0-EU-SS/modules/player.html
10-5
MCD Basic Installation and Maintenance Course
In this example, the customer wants to have two Attendant Consoles installed and programmed
with prime numbers 1000 and 1030 on softkey 7. The remaining softkeys should be
programmed as Answer Points. Softkey 1 is reserved for Recall.
10-7
MCD Basic Installation and Maintenance Course
By directing various call types to different console softkeys, you permit the Attendant to handle
calls on a priority basis and answer them appropriately.
In this example, two call types arrive at the Attendant Console at the same time. The softkeys
enable the Attendant to differentiate between the two call types.
• Toll-free calls arrive on softkey F5 labeled ABC Co. The Attendant responds, “Good
morning... ABC Company.”
• Internal dial 0 calls arrive on softkey F2 labeled Operator. The Attendant responds, “Good
morning... Operator.”
The Softkey labels enable the Attendant to answer external toll-free calls before internal
operator calls to provide better customer service.
10-9
MCD Basic Installation and Maintenance Course
Remote Training
This lab may not be possible when training in a remote environment.
http://training.mitel.com/cw/T-FT-5550-1-0-EU-SS/modules/player.html
There are other ways to change department names and locations without needing to change the
individual entries. Navigate to the:
• Users and Devices > Telephone Directory Management > Locations form.
• Users and Devices > Telephone Directory Management > Departments form.
From here, you can:
• List all of the Departments and Locations programmed in your Telephone Directory.
• Change a Department or Location name. The name will be changed for all users associated
with it.
• Use the Telephone Directory form to change the Department or Location for one user.
10-11
MCD Basic Installation and Maintenance Course
In an attendant group where the DN of each attendant console appears as a softkey on the
other consoles, recalls are presented to all attendants.
By enabling Recall If Transferred to Original Call Destination in the attendant’s COS, recalls are
presented only to the attendant who originally handled the call.
This behavior applies to DID/DDI calls to extensions that are rerouted to attendants, or sets,
using Call Rerouting. Call Rerouting is discussed later.
Note
The system can support up to 16 attendant consoles.
In the Class of Service Options form, enable Allow Directed Call Pickup of Attendant Call to
allow an extension user to answer calls to an attendant console, except recalls and callbacks,
by using the Call Pickup - Directed feature and dialing the console prime line number. The
console must have Call Pickup - Directed Accept enabled in its COS for its calls to be picked up.
10-13
MCD Basic Installation and Maintenance Course
The attendant has the ability to set DND on user’s extensions if Do Not Disturb is set to Yes in
the set’s COS and Do Not Disturb - Access to Remote Phones is set to Yes in the console’s
COS.
The 5550 Attendant Console can support BLF notification, but only when a BLF key is
programmed against a monitored DN. The console cannot automatically detect the BLF status
of devices on its own.
There are three ways of supporting BLF notification on the attendant console:
• Program a new user and device with a PKM and program the keys. The drawback is that a
license is consumed just to support PKM keys.
• Program a phantom FD PER cabinet with line cards. You can have many DNIC sets and
PKM devices, but now you have to start adjusting the alarm thresholds to mask the bay and
device alarms.
• The best solution is to take an existing device, like a lobby phone or cafeteria or server room
and add a phantom PKM against them. Using a phone that is programmed against a
location instead of a user so it remains static.
The 5550 IP Console allows an attendant to monitor the Busy Lamp Field (BLF) status of
extensions from the Busy Lamp Field Tools panel. Before transferring an incoming call to an
extension, an attendant can view the status of the extension and determine if the extension is
available to accept the call.
The attendant can press the F12 Call button to call an extension selected in the BLF table, or
select the entry.
You can create and add multiple lists of BLFs to the BLF window and then edit the lists to add
and remove directory numbers or change their list membership.
10-15
MCD Basic Installation and Maintenance Course
When the IP Console application starts, the system sends a list of all monitored DNs, meaning
any DN that appears on a DSS/BLF key on any set or PKM in the MCD database. The PC
caches this data.
The BLF feature is enabled by default on the 5550 IP Console. Access the BLF settings by
selecting Tools and then Options on the 5550 Console menu bar. By default, BLF files are
shared among multiple 5550 IP Consoles, but in the BLF settings pop-up window, it is also
possible to point to a private BLF file folder.
10-17
MCD Basic Installation and Maintenance Course
In this example, the attendant has selected the BLF list for everyone. All sets are idle.
The console operator ID is used to stagger the requests. Combine the 5 o'clock hour with the ID
to form the hour/minute time.
For example, the console with ID 11 will request the data at 5:11 am. Note the ID of an
attendant is the first two reoccurring digits of the Hold index numbers found in the Hold Window,
which are 111, 112, and so on, in the figure below.
• Monitored DN
• Privacy flag
• Name
• Department
• Location
10-19
MCD Basic Installation and Maintenance Course
The BLF status is displayed in the Phonebook view if the DN returned from a phonebook search
matches a cached monitored DN.
A monitored DN is any DN that appears on a DSS/BLF key on any set or PKM in the system,
and can be any of the following:
• Real
• Virtual
• Local
• Remote.
The sets and PKMs need not be physically installed and can remain as virtual devices. A virtual
device is programmed in the system and isn't physically connected.
Note
You can program the virtual PKMs against any IP phone extension in the
system that is capable of supporting PKMs. Therefore, you should record
which IP phones provide the busy lamp field indication.
There is no programming associated between the phones with the virtual PKMs and the 5550 IP
Consoles.
To provide a BLF list that has the default maximum of 439 entries, at least four 5224 IP sets are
needed. Each set, with a Dual PKM assigned and 23 available programmable set keys, can
provide a total of 119 possible DSS/BLF keys per set.
You can use Resource Dimensioning to increase this maximum to 5000 BLF groups.
10-21
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
Remote Training
This lab may not be possible when training in a remote environment.
http://training.mitel.com/cw/T-FT-5550-1-0-EU-SS/modules/player.html
Identify alarms.
Use location IDs.
Use maintenance commands to troubleshoot problems.
Display maintenance logs.
Change alarm thresholds.
Use Audit Trail logs.
Understand how to use the debug diagnostic button (3300 ICP only).
Troubleshoot peripheral devices.
Use system commands and IP commands.
Isolate system or LAN faults affecting IP set devices.
MCD Basic Installation and Maintenance Course
Reference
Technician’s Handbook > Maintenance
System Alarms
The system monitors its own performance by comparing the actual status of a device to the pre-
programmed alarm threshold levels. When a threshold level is exceeded, the system raises an
alarm which you can see on the:
• Attendant Consoles
• Controller Unit.
You can also query the system for alarm status.
Your ability to recognize an alarm condition, determine its severity, and correct its cause are all
skills necessary to ensure the system is operating properly.
Note
It is important to always check the Alarm Details form and to view alarms by
using the Maintenance Commands. Not all alarms will appear in both
locations.
11-3
MCD Basic Installation and Maintenance Course
• Critical LED – Red when there is a total loss of service, which demands immediate attention.
A critical alarm invokes system-fail transfer. This LED is on when there is a critical alarm,
during power up, during a reset, or during initialization.
• Major LED – Orange when there is a fault which affects service to many users. This may
result in a major degradation in service and needs attention to minimize customer
complaints. This LED is on when there is a major alarm, during power up, or during a reset.
• Minor LED – Yellow when there is any fault which does not fall in either of the above two
classes. Whenever the system is not 100% operational, a minor alarm is raised. This may
require the attention of a crafts person but is not urgent. Examples of a minor alarm include
the loss of a single line or trunk circuit or the loss of one circuit switch link. This LED is on
when there is a minor alarm, during power up, or during a reset.
E-mail Notification
If the system detects an alarm, it can send an e-mail message containing details about the
alarm to as many as ten different addresses. The alarms can be filtered by level so that e-mails
are sent for any or all alarms, such as for Major and Critical alarms or on Critical alarms only.
The e-mail subject line contains the system name if it exists, the system IP address and the
system alarm status. For example:
System Name: ipbx182 System IP: 10.37.140.20 System Alarm Status: Critical
The alarm details are in the body of the e-mail and consist of:
• Category name
• Unavailable percentage
• Alarm level
• Threshold information
Note
The system always displays the sending time zone of GMT-5, so some e-mail
servers may display an incorrect e-mail arrival time.
• Enter the e-mail server IP address and the sender's e-mail address in the System Options
form.
• Enter the system name you want to appear in the subject line of the notification e-mail in the
Network Elements form.
• In the Alarm E-mail Notification form, set the Alarm E-mail Feature Enabled to yes, enter
email addresses of the recipients, and specify the system alarm levels that will trigger the
system to send an email.
E-mails are triggered by alarm level changes at the system level, not at the category level. For
example, suppose the System Alarm Status in the Alarm E-mail Notification form is set to major,
but the alarm status is at critical. If a category alarm at the major level occurs, no e-mail will be
sent, since the overall system alarm level is at critical. To ensure an e-mail is sent for all alarm
events, enable all the System Alarm Status levels <Clear, Minor, Major and Critical>.
If the sender's e-mail address is omitted, the e-mail messages will display
systemname@domain as the sender in the e-mail header, where systemname is the name from
the Network Elements form and domain is the host name from the System IP Properties form. If
the address and system name are both omitted, the sender displays as ipaddress@domain,
where ipaddress is the IP Address from the System IP Properties form. If the domain name is
blank, no e-mail is sent and an error log is posted.
11-5
MCD Basic Installation and Maintenance Course
Maintenance Commands
In most cases the system identifies the cause of the alarm and keeps a record of it. Here are
some simple maintenance commands that you can use to troubleshoot problems if your system
raises an alarm. Use them systematically in the order that they are listed. However, these
commands do not display the status of all system devices, such as an E2T failure.
The Maintenance Command dialog provides Auto-fill, History and Favorites functions.
Auto-Complete Function
History Function
Favorites Function
Use the
Favorites button
to create a list of
frequently used
commands.
11-7
MCD Basic Installation and Maintenance Course
Maintenance Logs
Maintenance Logs are used to record all maintenance-related information, including anything
that affects the functioning or capacity of the system. Examples of typical Maintenance Log
entries are those reporting the busying of circuits or those listing circuits that failed diagnostic
tests.
Software Logs are used to record unusual activities within the system.
Each log has a date and time stamp to indicate the time at which the recorded event occurred.
Use the LOGSYS READ maintenance command to filter and display maintenance logs entries,
or the LOGS browser page.
Details of occurrence.
11-9
MCD Basic Installation and Maintenance Course
• Station Message Detail Recording (SMDR) logs that contain information about call times,
duration, digits dialed, etc.
• Software logs that contain information about software events, mostly used by Mitel support
personnel.
• ACD logs that identify events related to ACD. These are not maintenance logs, and output is
not viewable via the maintenance screen.
• Login/Logout audit logs that identify who has accessed the system.
• Caller Emergency Service Identification (CESID) logs that enable you to monitor and
troubleshoot IP device moves and automatic CESID updates.
• All login/logout attempts and any action from any user interface or application connected to
MCD that results in a change to the system database is logged.
• Audit trails are presented in this form for viewing, printing, and exporting. The Scheduler can
be used to archive the Audit Trail Logs to an external FTP server on a recurring basis. The
information logged includes the user who performed the operation, operation type,
date/time, application involved, and the actual data value changed.
• Logs can be viewed in this form as a continuous file going back 5000 log entries. Older
entries are archived in xml files that can be exported for viewing.
11-11
MCD Basic Installation and Maintenance Course
• Desktop Tool
• MiCW
Audited Actions
The following operations are logged.
• Maintenance command usage from both the System Administration Tool and CDE
interface.
• Scheduler operations.
• SDS operations.
• IDS operations.
The following are excluded from Audit Trail logs.
• MiTAI
• Telnet E2T – Telnet to the Ethernet to TDM (E2T) processor to access a call control
maintenance session
• Telnet RTC – Telnet to the Real Time Controller ( RTC) processor to access VX Works
session
• FTP – File Transfer Protocol session to the RTC processor to access logs and files
11-13
MCD Basic Installation and Maintenance Course
System Diagnostics
If the system fails, diagnostic information about the failure is written to a series of files. After you
reboot the system, you can export this information to a compressed .tar file. The information
includes xrtc, pstswlog.db, hdrwswlog.db logs, call control statistics, and other information that
can be used to diagnose system problems. The form allows you to send the information to Mitel
for analysis to determine problems and investigate system performance.
Caution
Use this only under the direction of Mitel Product Support. Collect the
information after a system lockout or unscheduled system reset.
Diagnostics information is kept through system reboots. Use the following form to collect and
send system diagnostics information. The files are collected as a .tar file then compressed in
gzip format. The filename is SD_<system name or ID>_<ISO date and time>.tar.gz.
The system diagnostics file can be downloaded to your computer or sent via FTP or e-mail. You
can program automatic e-mail of the diagnostics files if needed, up to 10 times.
11-15
MCD Basic Installation and Maintenance Course
While the System Administration Tool is compiling and sending the information, no other users
can access any of the web-based tools. To avoid blocking other users, it is recommended that
you gather system diagnostic information outside of business hours.
• Desktop Tool
• PC Companion Tool
• The IP Appliance keys, such as Online Services, Personal Directory, Call Logs, and Visual
Voice Mail, will also be unavailable.
Depending on the amount and type of data being exported, there could be a delay of a few
minutes while data is being retrieved from the system database and sent.
Before e-mailing the file, make sure your e-mail server and e-mail source address are
programmed in the System Options form. The file is sent as an attachment to an empty e-mail.
The e-mail subject line reads System Diagnostics info from <system name>.
You can program the system to e-mail the diagnostics information file once or automatically at a
regular interval, from one to seven days, up to a maximum of ten times. The file will be sent
every day at midnight for the specified number of times.
Self Diagnostics
System self-diagnostics run during power-up and background diagnostics run on a regularly
scheduled basis. Faults can be reviewed at the maintenance terminal via the maintenance log.
The system self diagnostics run at 12:00am, 6:00am, 6:00pm, and 9:00pm are automatic and
the timers are not programmable.
If a system locks up in the field, the logging system is probably not going to work. Being able to
run diagnostic tests is very beneficial in determining what has happened.
You can use the Remote On/Off button to force a diagnostic test that is followed with a
controlled system restart. When the button is pressed, it will continue to toggle the Remote
Alarms relay to an On or Off condition.
If you press and hold the Remote On/Off button for 3 seconds, a special set of diagnostics will
run and be followed by a restart. All of the alarm lights on the switch will light to indicate that the
procedure has been invoked.
• MXe controller
• AX controller
Once the system is restarted, you can use System Diagnostics to send system diagnostic
information for analysis to determine problems and investigate system performance.
11-17
MCD Basic Installation and Maintenance Course
You can use the following tools to isolate and correct a fault:
• Troubleshooting Guide
Fault Locations
All set problems fall into one of three categories:
• For IP devices, Network Faults – isolated to LAN/WAN issues such as network traffic,
network routing, and DHCP handling
• Internal Faults – isolated to the system hardware components and ESM programming.
Peripheral Devices
Peripheral devices include IP Phones, IP Consoles, and IP Conference Units.
On a PC, using network DOS commands, such as ping or arp, and network diagnostics tools,
you can isolate system or LAN faults affecting IP set devices.
An additional tool is the Remote Ping capacity of the IP Telephones maintenance page. Use this
tool to direct an IP set to ping an alternate IP device.
Using troubleshooting tools available on the IP sets, you can isolate LAN faults affecting the IP
devices.
11-19
MCD Basic Installation and Maintenance Course
Pinging extension
1003 from 1002
• What type of alarms and indicators does your system display? What do they mean?
11-21
MCD Basic Installation and Maintenance Course
Note
Automatic Call Distribution (ACD) is another type of group and is referenced in
this module. ACD may be covered in another course.
To provide better customer service, several phones can be programmed into a single group. A
call directed to a group is more likely to be answered than a call directed to one phone.
The system supports three types of groups used to alert called parties:
• Hunt Groups
| Terminal
| Circular
• Ring Groups
| Ring All
| Cascade
| Personal
12-3
MCD Basic Installation and Maintenance Course
Group Presence
Group Presence allows members of call groups to make themselves absent or present in a
group. Only members who are present in a group are offered calls to that group.
With Personal Ring Groups (PRGs), Group Presence lets users choose which of their personal
answer points they want to receive their calls at by making it Present and the others Absent.
Users can also be permitted to change the presence status of other users, allowing ACD
supervisors, for example, to control which agents are available to take calls to a particular ACD
group.
Users belonging to multiple groups can control their presence in each group separately through
the use of feature keys, with one for each group, or by dialing a FAC followed by the group pilot
number. ACD agents can join or leave all the ACD groups they belong to by dialing a single
FAC.
• Enable Group Presence Third Party Control to permit a user to control the status of other
users.
• For Group Presence, the group number, or pilot number, of the group that the set is in.
12-5
MCD Basic Installation and Maintenance Course
Pickup Groups
Members of a pickup group can answer each other’s calls. Callers are routed to the extension
number they dialed, but any member of the pickup group is authorized to answer.
If the Auto Pickup feature is enabled, the system automatically directs the call to the first
member of the pickup group to go off hook.
If Auto Pickup is disabled, another member of the pickup group may answer the call by pressing
a Call Pickup key or by entering the Dialed Call Pickup FAC.
If the Call Pickup - Directed feature is enabled, any user, regardless of pickup group
membership, can answer calls by dialing the Call Pickup - Directed FAC followed by a ringing
phone’s DN.
Hunt Groups
A Hunt Group is a collection of devices that share a common directory number, also called a
pilot number. Callers are routed to the pilot number or they can dial the pilot number directly.
Calls are routed to the first available extension in the hunt group. Extensions programmed in a
hunt group may be accessed directly by dialing the extension number. There are two types of
hunt groups:
• Terminal
• Circular
12-7
MCD Basic Installation and Maintenance Course
To program a pickup group, navigate to the Users and Devices > Group Programming > Pickup
Groups form and:
Note
Most other Groups forms are programmed the same way; add a group and
then add members to the group.
Auto Pickup automatically directs calls to the first member of a pickup group to go off-hook.
To allow any user, regardless of pickup group membership, to answer a call, set the Call Pickup
Directed Accept field to Yes.
12-9
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
12-11
MCD Basic Installation and Maintenance Course
To program a hunt group, navigate to the Users and Devices > Group Programming > Hunt
Groups form and:
The name is
assigned in the
Telephone
Directory form.
• ONS/OPS Internal Ring Cadence for External Callers, only if the first member is ONS/OPS
Note
If no hunt group COS is programmed, the COS of the first member of the hunt
group is used.
12-13
MCD Basic Installation and Maintenance Course
There can be 16 large hunt groups, but only one 240-member voice mail hunt group should be
programmed on a switch. A 240-member recorder hunt group can also be programmed. Do not
program any additional large groups of more than 64 members.
Reference
Please refer to your lab workbook.
12-15
MCD Basic Installation and Maintenance Course
Ring Groups
Ring groups cause a call to ring multiple telephones, stopping when any one of them picks up.
You can program a ring group to:
• Cascade Ring – rings one at a time, starting with the first member of the group and
continuing to other members in the order in which they are programmed in the group.
Other features of Ring Groups are:
• Calls unanswered within a specified period of time are sent to the group's designated
overflow destination.
• Member phones with large displays show both the group and caller name and number when
the group is called. Small-display phones show the ring group only.
The following types of numbers or devices can be programmed as a ring group member:
• Multicall numbers
• A night bell
The following types of numbers or devices cannot be programmed as a ring group member:
• Hunt group, Agent group, Path, Ring Group, Suite and Linked Suite pilot numbers
• ARS digits
• RDN numbers
The following directory numbers can be programmed as a ring group’s overflow destination. The
system does not check for invalid destinations.
• Station DNs
• Hunt group DN
• Ring group DN
Ring group calls that are forwarded to an overflow point will follow call forwarding, but not
system rerouting programmed for the overflow point.
Call handling when the overflow destination is unavailable or not programmed, and does not
have call forwarding enabled, depends on the state of the call:
• If ring group members are ringing, the call continues to ring until the caller hangs up or a
member answers, or until the applicable ringing timer expires and the caller hangs up.
• If the call is queued to a ring group, the call remains queued until the caller hangs up or
members start to ring—whichever happens first.
Calls transferred to a ring group that go unanswered either recall the transferring party or go to
the group's overflow destination. Whichever timer expires first—the ring group’s call ringing or
call queued timer—determines the behavior.
Call forwarding and system rerouting cannot be programmed against a ring group’s pilot
number.
Call forwarding or system reroute programming against ring group members is ignored for ring
group calls. But if ring group members have Call Forward No Answer (CFNA) programmed, the
Forward softkey prompt is displayed on ringing members’ phones. Pressing the softkey will
forward the call to the member’s CFNA destination.
Phones that support the call history application accumulate logs for all ring group calls for each
ring group in which the phone is a member. To avoid this, program a non-prime line appearance
on the phone, and then program the non-prime line to the ring group. The following scenarios
will generate missed call logs on devices that support the call history:
• When a ring all group caller calls the phone and is answered by another member
• When a cascade ring group caller rings the phone and subsequently rings another member
12-17
MCD Basic Installation and Maintenance Course
When there are calls ringing or queued to a ring group, the first member to become available is
offered the oldest ringing or waiting call. If a member belongs to more than one group when it
becomes available, they will get the call waiting longest of all groups.
Calls queued to a ring group and calls ringing a ring group will not survive a failover. But queued
and ringing calls to a ring group may survive a failback.
Calls can be parked to a ring group pilot number. Parked calls do not ring the members of a ring
group.
Ring Groups can function as answering points for emergency calls and trigger notifications on
Mitel Emergency Response Adviser.
• Enter the Pilot Number, Ring Group Mode and other information as required.
• Enter the DN of each member in the Ring Group Members section of the form.
Note
While ring groups can contain network members, only local group
membership is displayed in this form.
PRGs provide functionality that is similar to Ring Groups and Hunt Groups, but for a single user.
In contrast to Ring Groups, PRGs support Ring All, but not Cascade Ringing and support a
maximum of 8 as opposed to 32 members. In contrast to PRGs, Hunt Groups can include
Trunks.
Handoff Feature
The handoff feature for PRGs allows a call to be pushed or pulled from one group
member to another. A Handoff Line Type Feature Key is supported in the Multiline Set
Keys form to support pushing (sending) or pulling (retrieving) a call to or from a Personal
Ring Group. For example, if a user receives a call on their prime line, they can push the
call to another member of the Personal Ring Group using the Handoff key. The call can
also be pulled from another member using the Handoff key.
• Standard Groups – licensed collectively, consuming one Multi-device Users License per
group.
• External Twinning Groups – limited to two members. The most common example is a
desk phone and a cell phone.
12-19
MCD Basic Installation and Maintenance Course
Licensing
There are two methods to provide Personal Ring Group (PRG) functionality.
• Using the Personal Ring Groups form requires that each member be licensed
individually.
• Using the Multi-Device User Groups form requires just one license for the entire group.
Depending on the method, different license and service level settings are required and
are shown in the following table.
• The prime member has access to full telephone functionality despite being programmed
as a Multi-Device user. The prime can also be programmed in forms that are not
available to other Multi-Device users.
• When an inbound or outbound call is in progress, the phones belonging to other group
members are locked.
• When the group is deleted or the prime member ceases to be a member of the group,
the prime member becomes a Full Service user and consumes an IP User license and
possibly an EHDU license.
Multi-Device User Groups differ from regular PRGs in the following ways:
• All members, including the prime member, must have a Service Level of Multi-Device.
• When the group is deleted or the prime member ceases to be a member of the group,
the prime member becomes a Full Service user and consumes either an IP User
License or an External Hot Desk Users license.
Note
That same prime member cannot be made a Multi-device User Group prime
member again until its DN is deleted, and then re-added. Full Service is a less
restricted service level than Multi-Device, and going from a less to a more
restricted level is not allowed.
12-21
MCD Basic Installation and Maintenance Course
Add users as Multi-Device users in the User and Device Configuration form.
In the License and Option Selection form, add the required number of multi-device user licenses
as needed.
12-23
MCD Basic Installation and Maintenance Course
In the Multi-Device User Groups form, add the prime DN and then add the multi-device user
members.
Standard or
External Twin
Reference
Please refer to your lab workbook.
Reference
Please refer to your lab workbook.
12-25
MCD Basic Installation and Maintenance Course
Group Park
This feature allows group members to use a group park key to park a call that is on soft hold.
This call can then be picked up by any group member on the same controller node. When a call
is parked against this specific group park key, it gives a visual indication, such as a flash,
indicating that a call is parked on it.
More than one call can be parked against the same group park key, as well as more than one
group park key can appear on a set.
On MCD for 3300 ICP, you can program up to 64 group park keys that have the same park
destination DN.
Unlike the call park feature, when there is a call parked using group park, the LED will not be
solid, but will flash.
Any multiline set with a group park key will flash if there is a call parked against the park
destination DN.
Group park keys programmed on the primary controller will be shared on the set’s secondary
controller, and vice versa.
To allow users to park calls, enable the Call Park – Allowed to Park option in the COS for the
users.
User Actions
When the group park key flashes, it implies that there is minimum of one call parked against the
park destination DN programmed against the group park key.
A user can only retrieve a parked call from an idle set by pressing the flashing group park key.
The longest parked call is automatically retrieved.
When the user presses the flashing group park key but the call is no longer parked, the key
pressed is ignored and the key will stop flashing.
Maintenance
The LOCATE maintenance command allows you to list all devices that have group park keys
programmed against a given park DN.
The command will output all linked members of the list that correspond to devices that have the
same group park key programmed. It will also indicate if the park destination DN programmed
against the group park key is valid or not.
12-27
MCD Basic Installation and Maintenance Course
Reference
Online Help > Contents > System Programming > Devices > Program Printer
Support
Reference
Online Help > Contents > System Programming > Printers
From a configured system port, the system provides important information about its status,
which includes:
• SMDR records that log all calls made to and from system devices
• Traffic reports
• Hotel/motel reports
• Station Message Detailed Accounting (SMDA) machines that processes SMDR records
• Property Management Systems (PMS) devices that receive information from the system,
including status of hotel rooms and duration of calls.
• TCP/IP socket.
• Network port.
• The ports appear on COM port 1 of the 5550 console PC. They share the same device
ID as the console.
• The console printer ports must be defined with a name before any reports can be
directed to them.
13-3
MCD Basic Installation and Maintenance Course
You can name the printers whatever you want, but the LPR1 is a reserved name that
may not be changed or reused. Avoid using words that already exist in the system
command vocabulary, such as DATA, VOLUME, and PRINT.
Types of information
that can be printed
LPR1 is
associated with
the serial port
on the front of
the controller.
This particular
information is
printed to this
port, which was
named in the
System Ports
form.
13-5
MCD Basic Installation and Maintenance Course
The system streams system logs to TCP/IP clients that connect to the appropriate TCP/IP
socket on the system. The logs will not be sent to a socket that does not have a TCP/IP client
connected to it. For example, if the client is disconnected, the log records aren’t automatically
redirected to a file or other alternate source. The sockets are designated as outlined in the table
below.
Note
There are a maximum of three simultaneous client applications that may
connect to a specific TCP/ IP socket. Refer to the Technician’s Handbook for
additional information.
Network Printing
• Program the network printer connection parameters in the Controller Registry form.
Caution
With the exception of the Network Printer fields, do not change values in this
form without prior consultation with the Mitel Product Support group.
13-7
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
Another example of a single instance form is the Analog Sets form. This form lists all the analog
phone circuits in the system and shows the directory number for each.
13-9
MCD Basic Installation and Maintenance Course
The following print functionality is available for most forms in the System Administration Tool:
• You can print all records in the form, a current page, or a group of specified pages.
• In forms that contain large lists of records, such as the Telephone Directory or User and
Device Configuration forms, you can print a range of records.
• You can include the time stamp and system name on the printout.
• While it is printing, a form is locked, meaning you cannot Add, Change or Delete operations
on the form.
• The output can be streamed to the printer port on the front of the system and captured using
socket 1754 if desired. This functionality is programmed in the Application Logical Ports
form.
• If a local or network printer is configured on the PC that is requesting the print with the Print
button within ESM, the resulting printout will be directed to that printer.
Note
Not all forms support printing and not all forms support all printing options. If
print options are not supported for a form, the options will be disabled, or
grayed out, in the print dialog window.
13-11
MCD Basic Installation and Maintenance Course
• Comma separated value file (.csv) – comma-delimited file that can be imported into a
spreadsheet program.
Note
If Internet Explorer won’t let you export a .csv file, hold the Control key for the
duration of preparing the export and saving the file.
This feature is valuable if you need to update another application with data from the system. For
example, you could export the telephone directory entries from the Telephone Directory form to
a .csv file and then run a software script to import the file into a third-party application.
Not all forms support the exporting of data, and not all forms support all the export options. If
options are not supported for a form, they will be disabled, or grayed out, in the export dialog
window.
Note
You must change the file extension from .tar to either .txt or .csv.
• The external SMDR application allows trunk call data for individual stations to be collected
for outgoing and incoming trunk calls.
• Internal SMDR collects data for calls made between stations. Internal SMDR is not used as
often, but it can be enabled as required.
You can enable the system with external SMDR, internal SMDR, or both.
External SMDR
External SMDR keeps track of incoming and outgoing trunk calls. You can program the system
to generate a call record when a phone calls out on a trunk, when a trunk calls in to a phone,
and when a trunk calls a trunk. External SMDR is most commonly used because it monitors
expense-incurring calls over trunks.
Programming SMDR
To program External SMDR you must:
• Ensure that the SMDR options are enabled as required in the SMDR Options form.
• Assign a COS to the phones and trunks for which you want call records, with SMDR –
External set to yes.
• If using a physical printer, assign a port through which the system can dump the SMDR
records in the Application Logical Ports form, or use TCP/IP socket 1752 to collect the
records over the network.
13-13
MCD Basic Installation and Maintenance Course
For example, you may want to disable SMDR for tie trunks between two systems while you
enable it for CO trunks. To do this, set SMDR-External to yes in the COS of the stations and CO
trunks, and set it to no in the COS of the tie trunks.
Internal SMDR
Internal SMDR keeps track of calls between the phones on the 3300 ICP. It is not used as much
as External SMDR; it is typically used in high security installations or to monitor internal call
traffic patterns.
A record of calls made between the phones is kept as long as one of the devices in the call has
SMDR - Internal set to yes in its COS. Internal SMDR does not track external calls involving
trunks.
If a station receives prank calls, turn on internal SMDR for that station so the system keeps a
record of all the internal calls it receives. If you know the time of the prank call, it is easy identify
the calling station in the SMDR record.
Internal
Trunk Calls
Calls
IDs
system
in When enabled, the Time to Answer field is
reports expanded to four columns. Columns 29-32,
or 34-37 in extended digit length format.
When enabled,
SMDR file
transfer is
supported.
13-15
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
Reference
Online Help > Contents > System Programming > Trunks > Digital Trunks >
Program Embedded PRI/QSIG Trunks
Online Help > Contents > System Programming > Trunks > Digital Trunks >
Program PRI/QSIG Trunks
Digital Trunks
There are two primary methods of providing signaling over digital trunks.
ESM Forms
All digital link types, T1/D4, PRI, QSIG and MSDN use the same six ESM forms:
Installation Summary
The following is an installation summary, giving the major steps for installing T1 trunks on the
system. These procedures must be performed on each of the PBXs connected by the T1 link.
14-3
MCD Basic Installation and Maintenance Course
Physical Connections
The Dual T1/E1 Framer and T1/E1 Combo module have RJ45 connectors on the front of the
Dual T1/E1 Framer or T1/E1 Combo module. The links have status LEDs.
Protocols
Reference
Online Help > Forms Reference > Forms H to M > ISDN Protocol. Select the
options table in the Description column under Protocol and Protocol Variant.
The Dual T1/E1 Framer or T1/E1 Combo Module T1 links support the following protocols:
• ISDN PRI
• QSIG
• T1/D4
The following table summarizes the support capabilities of each type of hardware.
Dual T1/E1
Framer
T1/E1 Combo
T1 E1
Format
T1/D4
;
Digital E&M,
Digital CO,
Digital DID
T1/DS1
;
MSDN/DPNSS/DASSII
CEPT
;
MSDN/DPNSS/DASS II
ISDN PRI ;
Euro-ISDN PRI ;
Q.Sig ; ;
14-5
MCD Basic Installation and Maintenance Course
Programming PRI/QSIG
Programming a T1 link as PRI/QSIG is done by first programming the T1 digital links, and their
23 channels each, into the database. Then program the ISDN PRI or QSIG protocol onto the
link.
With the embedded modules, you program the PRI/QSIG protocol at the same time as the
digital trunks.
• Programming PRI/QSIG
Use the Controller Module Configuration form to configure the T1/E1 modules.
Use the Dual T1/E1 Framers form to assign the T1 protocol to the T1/E1 Modules.
14-7
MCD Basic Installation and Maintenance Course
Set the Interface Type for each port on the Dual T1/E1 Framer module.
• E1 in EMEA
• T1 in NA
• Digital Links
• Trunk Attributes
• Digital Trunks
• Network Synchronization
The T1 trunks need to have options set in their COS, and the extensions that will use the trunks
need options in their respective COS forms. Finally, ARS is programmed to allow outgoing calls
to be made.
14-9
MCD Basic Installation and Maintenance Course
Reference
Online Help > Contents > Forms Reference > Forms D to G > Digital Link
Descriptors
Parameter Description
Voice Only valid for programming the voice encoding method of the:
Encoding • CEPT Formatter II
• DS1/T1 Formatter II (Universal T1/E1)
Possible values are:
• Nil for no change
• ADI for alternate digit inversion (even bits inverted)
• Invert for all bits inverted
• Inverted ADI for odd bits inverted
NOTES:
Embedded PRI: T1 in NA and E1 in Europe are set to Nil by default.
However, if you experience garbling on the trunks, set Voice Encoding to
Invert.
E1 in NA or T1 in Europe must have voice encoding set to ADI.
Data Only valid for programming the data encoding method of the:
Encoding • CEPT Formatter II
• DS1/T1 Formatter II
Possible values are:
• Nil for no change
• ADI for alternate digit inversion (even bits inverted)
• Invert for all bits inverted
• Inverted ADI for odd bits inverted.
14-11
MCD Basic Installation and Maintenance Course
Caution
In the Trunk Attributes form, either fill out the three Non-dial In Trunk fields or
fill out the Dial In Trunk fields, but never both. For dial-in trunks, if no digit
absorption is required, you must put a zero in the Absorb field. If the Dial In
Trunks Incoming Digit Modification - Absorb field is left blank, all incoming
calls will be blocked.
If the DID range does not match the extension range at all, you may have to use the
System Speed Call tables, with 1000 entries, to provide a look up table.
If required, enter a voice mail hunt group DN in the Dial-In Trunks Answer Point field to
which incoming calls can be routed. The Dial-In Trunks Insert Forwarding Information
field must be enabled to program Dial-In Trunks Answer Point. This will allow the
forwarding information to be included.
14-13
MCD Basic Installation and Maintenance Course
Select the first circuit of the T1/E1 module. In this example, the T1/E1 module PLID 7 1 2
1 has been selected.
Select the first circuit, and then select Change. In this example, 23 trunks are being
added by using range programming. The first trunk is 100 and is incremented by 1. The
Trunk Service Number is 1 and the Circuit Descriptor Number is 5.
14-15
MCD Basic Installation and Maintenance Course
The Network Synchronization form can be programmed with multiple choices for the
clock source. If the system has only a T1 ISDN PRI connection, then only the first clock
source is programmed using the PLID of that link. If you have more than one T1 ISDN
link, then program them as second, third, and so on. In the event that the first link fails,
the system can still get the clock.
14-17
MCD Basic Installation and Maintenance Course
Similarly, all extensions dialing out on these trunks must have options set in their respective
COS.
Once the digital trunk programming forms are complete, continue with the ISDN menu options.
Follow each menu item to program the ISDN PRI/QSIG protocol onto the links.
14-19
MCD Basic Installation and Maintenance Course
st
Links are in increments of 8. So the 1 module
nd
links are 1 and 2, the 2 module links are 9
and 10, and so on.
The reason is that with an NSU, each module
could possibly hold links 1-8, or two chained
NSU's for each FIM port, for 8 total links.
In the Outgoing Call Characteristics folder, the necessary protocols for ISDN PRI are set against
the T1 Framer link. Use the defaults for:
• Bearer Capabilities
Create an index defining an extension range of who is making the outgoing call, and the number
that will actually be sent. See the following example.
The DID number range you have is 480-961-9xxx, but your extension numbering plan is 1xxx.
When an extension in the range of 1000 to 1150 makes an outgoing call, CPN Substitution
changes 1xxx to 9xxx. If the extension making the call is not in the index range, it is ignored. In
this case, either no number is sent or, if it is programmed, a Default Voice CPN is sent.
You can create as many indexes as required and use them on the same T1 link.
In the UK and most of Europe, the CPN number must match the DDI range. If you use a default
CPN, it must be a valid number for your business.
Note
The index numbers are programmed here but are not enabled by default. You
must enable them in the next form.
Select Change at the top of the form, and enter a default CPN number, if required. This number
is used when any extension that is not covered by the index range makes a call.
14-21
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
Reference
Please refer to your lab workbook.
Reference
Online Help > Contents > System Features > Features A to B > Automatic
Route Selection (ARS)
Dialing plans or numbering plans within the Public Switched Telephone Network (PSTN) vary
from country to country and can be specific within a given area of a country.
There are some common considerations regardless of the location. For example, a plan must
be considered for local calls, long distance calls, international calls and emergency and special
service numbers.
When using MCD, all external numbers must be planned for and programmed into the database
using ARS.
15-3
MCD Basic Installation and Maintenance Course
Local Calls
MCD phone users make calls into the PSTN in much the same way that you do from home. But
an MCD phone user may prefix the external directory number with a single digit, such as 9 from
a business phone or 8 from a phone in a hotel. This indicates to MCD that it is an external call.
From home, you dial 592-2122, but from an MCD phone, you dial 9-701-592-2122. See the
figure below.
Another difference between MCD users and home users is that some MCD users may be
restricted from making external calls or from making certain types of external calls, such as long
distance calls.
Also, when making a call from MCD, MCD has the additional tasks of choosing which outgoing
trunk to send the call out on and then deleting the 9.
The ARS programming forms are used to instruct MCD regarding which trunk to choose and
which digits to modify if required.
• It recognizes digit strings and wildcards, such as those starting with a leading digit 9, as an
indication that the call is to be an external call.
• It selects a trunk from within a group of trunks to send the call out on.
• It can modify the dialed digits, such as absorbing the 9, to convert the digits into what the
external network expects.
ARS digits can be specified with leading digits as well as dialed digits. These digits can be listed
explicitly, or wildcards can be used to specify predefined variables for a given ARS digit:
You may wish to call external numbers that start with 2, 3, 4, etc. In this case, you program ARS
with 9NXXXXXXXXX+ 0 additional digits.
Making an External Call
15-5
MCD Basic Installation and Maintenance Course
This is an ARS data collection table, giving a quick way to compile the information needed to
program external directory numbers. Associate the values in this table with those programmed
in the forms that follow.
This is 9
plus the
digit 0 that
the caller The Xs
dials after signify any
the 9. other digit.
The N is a
wildcard that
specifies a
digit
between 2
and 9
inclusive.
Note
MCD provides a maximum of 815 ARS Digit Modification plans.
• ARS Digit Modification plan number 805 is reserved for use by Direct IP
Routes.
• ARS Digit Modification plans numbers 806-815 are reserved. Do not
program.
The ARS Leading Digits form is automatically populated every time an entry is made to the ARS
Digits Dialed form. The ARS Leading Digits form is used to turn on a second dial tone.
This is the 9 that callers dial whenever This instructs the system to return dial tone to
they call external numbers. the user after the digit 9 has been received.
If the digits are not in the ARS Digits Dialed form, the system returns reorder tone to the caller. If
the digits are in the ARS Digits Dialed form, ARS software assigns the call a route. Use the
following programming forms when programming a route.
Note
To help minimize mistakes made when applying toll control rules to routes
(Class of Restriction), a best practice would be to keep the COR Group
Number the same as the Route Number. For example, Route 1 with COR
Group 1.
15-7
MCD Basic Installation and Maintenance Course
Programming a Route
To avoid this problem, we can make the system wait for dial tone before sending the digits. To
do this, add a Tone Marker to the Route’s ARS Digit Modification Plans form. If this is not done,
the system sends the dialed digits the instant that it seizes the trunk.
Programming a Tone Marker
15-9
MCD Basic Installation and Maintenance Course
Detectable Tones
Blank Speech
NA dial tone mod 120 UK 50 Hz dial tone
NA specialized carrier dial tone NA dial tone mod 133
NA priority ringback NA reorder tone
UK congestion tone UL dial tone
NZ number unobtainable UK NU tone
NA precise audible ringback NZ dial tone NA precise dial tone
UK precise audible ringback UK precise dial tone
NA busy tone NA audible ringback tone
UK busy tone UK audible ringback tone
NZ busy tone NZ audible ringback tone
IT dial tone MA dial tone
GE dial tone
If you apply Wait for Dial Tone on a trunk, make sure that the trunk is a type that returns
dial tone. Most digital E&M trunks connecting PBXs in North America do not send a dial
tone (Dial Tone on Incoming Seize). If you apply tone detection to these trunks, the
Maximum Wait for Tone timer expires and the system takes the programmed Action on
Timeout.
Programming ARS requires careful planning. Use the following diagram and planning sheets to
plan your ARS programming. The pyramid diagram represents the programming sequence.
Start programming at the bottom and move towards the top. Plan and troubleshoot problems
from the top down.
15-11
MCD Basic Installation and Maintenance Course
Program Forms
15-13
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
Reference
Please refer to your lab workbook.
Calling Privileges
There are usually different levels of calling privileges within an organization, from the executive
level who may call almost anywhere, to sales who may be permitted to call anywhere on the
continent, and so on, down to those phones restricted to make no external calls.
In the system, every device within the database that can dial requires a COR number, which is
assigned:
The following figure represents a general hierarchy of restrictions, with the center being the
least restrictive and the outer circles the most restrictive.
Note
MCD provides a maximum of 110 COR Numbers.
• COR Group 65 is for reserved for use by ARS for routing calls over Direct
IP Routes.
• COR Groups 66-75 are reserved. Do not program.
15-15
MCD Basic Installation and Maintenance Course
For example, if it is necessary to restrict directory number 1004 from calling a long distance
number, perform the following steps:
1. In the ARS Digits Dialed form, determine which route is used in order to call long distance
within North America. The figure shows Route 2.
2. In the ARS Routes form, verify which Class of Restriction Group is used by Route 2. The
figure shows COR group 2.
3. In the Station Attributes form, determine the COR number for extension 1004. The figure
shows COR number 7.
4. In the COR Groups form, program COR number 7 into the COR group 2. This will restrict
extension 1004 from making the long distance call.
Route 1 restricts calls from users with COR number 1, which is the only member in COR Group
1.
Route 2 allows all calls because there are no COR numbers in the COR Group associated with
Route 2. An example of this is emergency numbers.
Route 7 restricts calls from all users with COR number 1, 2, 3, 4, and 5, which are all members
in COR Group 7.
We use this in our example ARS program to block calls to 1-900 numbers.
Phones with any COR Number other than COR COR Group 1 contains
1 may use Route 1. 1 COR number 1.
COR Group 2
Route 2 uses COR Group 2
Phones with any COR Number may use COR Group 2 contains no
Route2. COR numbers.
COR Group 7
Route 7 uses COR Group 7
COR Group 7 restricts all users from using this 1, 2, 3, COR Group 7 contains
route. 4, & 5 COR numbers 1, 2, 3, 4 and 5.
15-17
MCD Basic Installation and Maintenance Course
COR Planner
The COR planning table lists:
• Various types of users and assigned COR numbers, listed in the center columns.
• COR numbers placed into COR Groups, listed in the right column.
To use the planner, follow each call type across the table and restrict the COR numbers that do
not have calling privileges for that call type. Notice that you can observe the restrictions
imposed on any COR number by the entries in its column.
9+Local R 1: 1
9+11 2:
9+911 3:
9+611 R R R R 4: 1-4
9+411 R R R 5: 1-3
9+0 (Telco) R R R R 6: 1-4
9+1-900 R R R R R 7: 1-5
9+1+Long Distance R R R 8: 1-3
9+011 R R R R 9: 1-4
9+1+212, 904, 907 R R 10: 1,2
9+1-900-592-2122 R R 11: 1,2
(Tech support)
9+839-1412 R R R R 12: 1-4
(Radio contest line)
9+1-800 R R R R 13: 1-4
The system operates in one of three modes, Day, Night1, or Night2. The attendant puts the
system in day mode during normal business hours, night1 mode after normal business hours,
and perhaps night2 during the late night hours.
A phone can be assigned different external calling privileges in each of these modes. The
Station Attributes form is shown below.
15-19
MCD Basic Installation and Maintenance Course
Note
More information can be found in the Technical Knowledge Base on the MOL
web site.
Caution
Mitel strongly recommends that PBX owners and/or the service personnel,
program an appropriate COR to all system ports to control external dialing
capabilities through Station Ports, Voice Mail Ports, DISA Trunks and all Dial-
In-Trunks. This approach has proven effective in implementing a system that
minimizes the occurrence of toll fraud.
MCD ESM forms are designed to offer a very flexible and highly customized
programming structure and must be carefully programmed to prevent users
from defeating your toll restriction plan.
Internal fraud is possible if employees are using External Call Forward, Trunk-to-Trunk
Connection Without Third Party, and 1-800 and 1-900 numbers.
ARS programming using COR group assignments is the only proper way to minimize toll fraud.
It is very important that only employees who require toll access be given telephone privileges.
For example, a lobby telephone would be denied toll access unless it is authorized through
attendants.
• Individual Trunk Access, which will bypass all ARS and COR restrictions
• Call Forwarding (External Destination), to allow extension users to forward their telephone to
external trunks.
15-20 Automatic Route Selection_rev10.doc
AUTOMATIC ROUTE SELECTION (ARS)
800-numbers are traditionally free calls, but some COS can allow the reversal of 800-charges.
So it may be necessary that programmers designate 800-calls as toll calls for the company.
900-numbers and any information service calls should be COR-restricted from all users except
those who require access for their job function.
SMDR can be used to track internal users and control their calls, which is a deterrent for toll
abuse by internal callers.
It is important to note that System Speed Calls can be subject to toll control. Access to system
speed calls should be controlled through the System Speed Calls form, where toll control can be
enabled. It is also important to note that Speed Call via the keys located on a set will be subject
to toll control only if the set is COR restricted.
Note
Speed Calls are discussed in a later module.
In most applications, users are allowed to access 911 without restriction. The DISA-trunk
automated attendant, which allows the transfer to an external call, should be considered to be
COR-restricted from dialing 911 to avoid any possibility of abuse from this source.
15-21
MCD Basic Installation and Maintenance Course
Example #1
A programmer expects that users dialing 901 would access route 2 only and that those
dialling 90 would access route 1.
Generally, the programming works, but there is a chance that users may be able to beat
the system by making a 901 call via route 1, with no SMDR record. Users dial 90, wait
for the inter-digit timer to expire, and then dial 1. After the inter-digit time-out, the closest
match to the digit string dialed is 90. The system then dials 0 via route 1 and connects
the station directly to the CO trunk with no further toll control. Digits dialed after the inter-
digit time-out will not be captured in the SMDR.
To prevent the system from accessing the undesired route, the Digits Dialled should be
programmed to avoid non-unique match or ambiguous entries, as shown below. 9-0
calls, with no further digits dialed, will be blocked because there is no match in the Digits
Dialed field after the inter-digit time-out.
Note
The selection of Alternate second dial tone is not designed for N.A. operation.
COR Groups
The COR Groups form is used to gather COR numbers into groups to enforce toll restriction. A
COR group number, not a COR number, is assigned to the ARS Routes form in ARS
programming.
The following examples show how to restrict internal, local, and long distance calls, using COR.
Note
These examples do not imply that ARS should be programmed this way.
15-23
MCD Basic Installation and Maintenance Course
In the Station Attributes form, DNs 1000, 1001, and 1002 have been COR restricted in
day and night service:
In the ARS Routes form, the route number that is to be COR-restricted should be
assigned a COR Group Number that contains the COR Number.
15-25
MCD Basic Installation and Maintenance Course
In the ARS Leading Digits form, the system is programmed so that leading digits 0 and 1
take route 2, restricting any member in COR group 2 from accessing route 2.
With this level of security, whether stations with a COR of 2 and 3 are COR-restricted
from accessing route 2 or not, they will be prevented from making long-distance calls
because they cannot dial more than 10 digits.
Note
This example does not apply to areas where users must dial an area code to
make a local call.
Trunk CORs
All dial-in-trunks including DISA, TIE, DID and ISDN should be considered for COR restriction.
If these dial-in-trunks are accessible by external users, then these trunks should be treated like
an extension and should only be allowed certain privileges. If we follow this rule then the trunk
attributes would have the following set up.
Based on the above ARS programming, once COR restriction is applied to trunk service number
1 and 2, any trunk assigned to either service number will be restricted from placing long-
distance calls beginning with 0 or 1. If possible, the programmer should also limit the maximum
number of digits to be dialed on another trunk.
15-27
MCD Basic Installation and Maintenance Course
All dial-in trunks must be COR restricted from directly placing external calls. In most
applications, only a limited number of digit strings will ever be dialed inward on E&M or
DID trunks, but it is important to be aware that these trunks can directly access ARS.
It is very important to note that if the system is programmed to allow users to call into the
switch and then call back out, no matter how complex the dialing process is, maximum
protection from fraudulent calls cannot be achieved without the implementation of COR,
COS, and Independent Account Codes against the incoming trunk, with the provision
that there can be no guarantees when dealing with fraudulent behavior.
If DISA is only used to call internal extensions, then Interconnect Restrict the DISA trunk
from all outgoing trunks. When enabling COS options, caution should be given to
Individual Trunk Access and Independent Account Codes. COR assignments must be
enabled for dial-in trunks. Forced Account codes must be used wherever possible and
the maximum account code digit string length should be used. The maximum number of
digits dialed, which is defined by COR, should also be considered.
Trunk protocol errors can be encountered during the release state initiated by the PBX,
resulting in toll fraud. These errors occur when the internal PBX port hangs up, but the
external party stays off-hook longer than the Release Acknowledge Timer, as
programmed in the trunk’s Circuit Descriptor on the PBX, and shorter than the release
timer of the CO equipment. The PBX treats this as a new call, opening the door for
hackers.
Caution
The appropriate COR and COS must be programmed against the incoming
trunks as described here to minimize toll fraud. In addition, the trunk circuit
descriptor can be adjusted for proper trunk protocol handling with the Telco by
increasing the Release Acknowledge Timer to a value that exceeds that of the
release timer of the CO equipment.
Let’s assume that the DISA trunk is COR-restricted and cannot access any toll trunks,
and the DISA trunk is not forced to dial account codes. If legitimate users access the
DISA trunk, they would dial the feature access code for the account code, which can be
up to four digits in length and can include * and #, and then the independent account
code, which can be up to 12 digits in length. When the proper account code is entered, it
changes the COR and allows a toll call. So an authorized caller is required to dial up to
16 digits, including a feature access code, before making a toll call. This does not
prevent hackers from breaking in, but it makes it more difficult.
Note
The DISA trunk will only allow three attempts at the correct password. After
that, the user will be restricted from dialing any more digits until the next time
the trunk is accessed.
15-29
MCD Basic Installation and Maintenance Course
If a customer wishes to make it more difficult for the DISA trunk to access the ARS
network, then the COS for that account code could force a user to enter yet another
account code, thus adding more digits for the user to dial.
For example, a user accesses the DISA and receives dial tone. The system is set up for
a 12-digit account code. The user dials 057912543349 and receives a second dial tone.
The COS in the Independent Account Code form forces the user to enter a second
account code, so the user must now dial the same 12-digit account code or a different
code. This creates a total of 24 digits that the DISA user must dial to access the toll
network.
15-31
MCD Basic Installation and Maintenance Course
Hot Desking
Hot Desking allows a number of users to share one or more hot desk enabled IP phones. The
system associates the user’s settings, such as DN, COS/COR, language, and feature key
programming with the IP phone.
For emergency call purposes, the system continues to use the Customer Emergency Services
ID (CESID) programmed for the set's registration DN. For example, if someone makes an
emergency call from a hot desk device, the system sends the CESID associated with the hot
desk device regardless of which profile (device or user) is active on the phone. If the device's
registration DN is not available, the system sends the default CESID.
For networked Hot Desking, Location Based Routing (LBR) can be used to identify the location
of hot desk user calling from across the network. For example, LBR allows you to program the
system to route emergency calls to services local to the device from which the user dials.
Note
CESIDs are discussed in the Emergency Services module in the MCD
Advanced I&M course.
16-3
MCD Basic Installation and Maintenance Course
Logging In
Each hot desk user is assigned a DN and 96 programmable feature keys.
By using a softkey or feature access code, the hot desk user can log in to a hot desk enabled IP
phone.
Once the hot desk user logs in, their hot desk user DN and key programming are now
associated with that IP phone. While the hot desk user is logged in, the DN of the hot desk
enabled IP phone is treated by the system as out of service.
Hot Desk users are locked out from the system for 15 minutes if they enter an invalid PIN three
times within five minutes. The number of attempts and the length of the lockout are
programmable using the DISA values in the System Options form.
If the PIN Security feature is enabled in the Call Coverage Services form, a hot desk user who
logs in with a weak PIN is automatically routed to the NuPoint Interactive Voice Response (IVR)
system for a PIN change. They will receive restricted telephone service, similar to IP Only
devices or Phone Lock, and the users are able to call NuPoint voicemail.
Note
The users of this feature must have a NuPoint on MAS voicemail mailbox.
16-5
MCD Basic Installation and Maintenance Course
Logging Out
A hot desk user logs out by again using a softkey or feature access code.
An administrator with remote logout permission can log out a user remotely by using an access
code and the user’s DN.
When a hot desk user is logged out, their hot desk user DN follows out-of-service handling, and
the hot desk enabled IP phone reverts back to the programming associated with its profile.
Hot desking is supported on Mitel Multiline IP and SpectraLink Wireless IP Phones. Each hot
desk user consumes an IP user license.
Hot desk users are assigned DNs and PINs through the Multiline IP Sets or User and Device
Configuration form. When programming feature keys for hot desk users, keep in mind that hot
desk user profiles support 96 programmable keys.
To ensure that all keys are available to the user, the hot desk IP phone should also have 13
programmable feature keys, but any other supported IP phone can be selected. If the user logs
into a device that supports fewer keys, the extra keys are hidden but remain operational.
16-7
MCD Basic Installation and Maintenance Course
If one of the inaccessible keys is programmed as a line appearance, calls for the line
appearance will still ring at the phone.
Note
To avoid phantom ringing on hidden line appearances, enable Ringing Line
Select in the COS for the hot desk user, allowing the user to answer any
ringing non-prime line appearance by simply going off-hook.
• Program FACs for login, logout, and remote logout. Remote logout is optional.
• Set a default device type for the Desktop Tool. This is optional.
In the Cluster Elements form, create a Cluster. Enter the PBX Number that was entered
in the ICP/PBX Networking form as the CEID Number.
The hot desking functionality requires the home element to be part of a cluster, even if
the local element is the only member of the cluster, such as in a standalone
configuration.
Note
Clustering is discussed in the MCD Advanced I&M course.
Note
You can use the Desktop Tool to change the IP device presented to each hot
desk user when they access their Desktop Tool.
• Set the Hot Desk Remote Logout Enabled field to Yes. This is optional.
16-9
MCD Basic Installation and Maintenance Course
Select the Access and Authentication tab, enter the User PIN field. Enter a 0-8 character
password using digits 0-9. Re-enter the password in the Confirm User PIN field.
Select Save.
Note
Certain features are not applicable to the hot desk user because they are
defined for the hot desk enabled device.
Note
For more secure PINs, enable Hot Desk PIN Security in the Call Coverage
Services form. When enabled, a hot desk user who logs in with a weak PIN is
automatically routed to the NuPoint IVR for a PIN change. For Hot Desk PIN
Security to work, each hot desk user must have a voice mailbox on NuPoint
on a MAS system.
16-11
MCD Basic Installation and Maintenance Course
• Assign access codes for Hot Desk Login and Hot Desk Logout.
• Assign an access code for Hot Desk Remote Logout. This is optional.
The LOCATE REMOTE command is used to determine the prime host of a specified hot desk
user DN.
The LOCATE HOT_DESK_USER command is used to list hot desk user’s DNs. All, Active, or
Inactive, can be specified. It can also be used to list hot desk enabled devices with logged in
users.
When the LOCATE command includes a hot desk user’s DN in its output, it provides the last
known user DN only. Because maintenance commands apply to the controller where they are
executed, you must run the command from each controller that the set has registered with.
Use the BUSY RESET command to log out a logged in user before replacing a set. Set
replacement is not allowed while a user is logged in.
Alarm thresholds are not affected by out of service hot desk users or phone DNs.
• Logs in to a device
• The hot desk user is improperly configured. For example, the user's COS has Suite Services
or Hotel Extension enabled.
• A hot desk device is not supported on a remote cluster element. For example, the phone's
host controller only supports nodal hot desking.
Note
Hot Desk user devices, including ACD Hot Desk Agents and External Hot
Desk Users, always display the local time of the physical device that the user
is logged on to. Timestamps for voice mail messages reflect the time zone of
the directory number receiving the message.
16-13
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
External Hot Desking extends hot desking capabilities to an external device, which makes it
appear as an extension on the system. When the External Hot Desk User (EHDU) is logged into
MCD, a caller only needs to dial the extension number assigned to the user and the system
automatically rings the user's cell phone, home phone or other device of choice, including an
extension on another private network or PBX.
Hot Desk functionality can be extended to external devices, such as cell phones, allowing such
devices to:
Users can then log in using the external device and receive calls from anybody dialing its hot
desk DN. Calls to the hot desk DN will be redirected to the external number stored against the
user when they are logged in.
As a PBX extension, the external device user has access to extension dialing along with select
PBX features and enterprise CLID on all calls originated through the system. When a call is
extended from the system to an EHDU, the internal state of the user is updated to reflect the
busy condition. Since the state of the user is known, an EHDU can be monitored by DSS/BLF
keys on other devices. Call diversion features and group features, such as hunt groups, follow
the normal treatments for busy, out of service, etc. For example, if an EHDU is a member of
hunt group, and is active on a call, the hunting algorithm will skip the busy EHDU and try the
next member.
16-15
MCD Basic Installation and Maintenance Course
• Remotely changing the external device number and the login PIN.
• Accessing mid-call features by dialing fixed single-digit codes or system feature access
codes, as determined in the System Options form, while active on a PSTN trunk.
| Hold/Retrieve
| Transfer
| Conference
| Swap/Camp-on Retrieval
| Handoff
| Cancel Call
| Remove Digit Detector
• Access to select system features, such as Call Forward Setup, Paging, Group Presence,
through the use of FACs.
• A Call Recognition Service that simplifies or eliminates the need to log in by authenticating
them based on their calling line ID.
• Push-to-answer, which requires the EHDU to press a DTMF key to accept an incoming call.
This COS option is used when the trunk terminating on the EHDU device fails to provide
answer supervision.
• Group membership, including hunt groups, ring groups, personal ring groups, and hospitality
suites.
• A Callback service that recognizes that an EHDU is calling, hangs up on the user, and then
calls them back. Mobile phone users can take advantage of this service to save on the
charges normally associated with outgoing calls.
• Device resiliency.
The maximum number of EHDU licenses is equal to the maximum number of IP User Licenses
allowed for the specific system type.
Emergency Services
When a user logs into a hot desk device, the system associates the user's settings, such as DN,
COS/COR settings, display preferences, and button programming, with the device.
For EHDUs logged on to private trunks, the system uses the CESID associated with the user’s
mobile DN.
For EHDUs logged on to public trunks, the system uses the external party’s public number as
the CESID.
For EHDUs logged on to public trunks that provide no calling line identity, the EHDU configured
external number is used as the CESID.
For EHDUs logged in internally, the CESID associated with the originating set is used.
Note
CESIDs are discussed in the MCD Advanced I&M course.
For local notification in SMDR logs and at attendant consoles, the system displays the DN and
name of the active profile, if available. If a hot desk user is logged in, the user's DN and name
are displayed.
Caution
Emergency calls should not be made from an EHDU device since the call
cannot be guaranteed to contain the correct location information. Mitel
assumes no legal, financial or personal responsibility for users or persons
performing such actions.
16-17
MCD Basic Installation and Maintenance Course
EHDU Operation
The EHDU can:
• Log In.
• Log Out.
Logging In
To log in from an external location:
1. Dial the Hot Desking Access Number
2. Enter a hot desk user DN
3. Enter a User PIN.
If the Hot Desking Access Number, DN, and PIN are valid, then the external device is
logged in and confirmation tone is returned. Otherwise, the user hears reorder tone.
Once logged in, the user may make a new call or hang up and remain logged in.
Users with Permanent Login enabled in their COS are not required to log in.
Logging Out
To log out from an external location:
1. Dial the Hot Desking Access Number.
2. Enter the hot desk user DN.
3. Enter the User PIN.
4. Enter the Hot Desk Logout FAC.
If the Hot Desking Access Number, DN, and PIN are valid, then the external device is
logged out and confirmation tone is returned. Otherwise, the user hears reorder tone.
• Logout is immediate if initiated from an idle phone. If the external device is busy or has a
call on hold on any line, the user can still initiate a logout by doing a mid call transfer and
dialing the Hot Desk Logout FAC. After the external device returns to an idle state, the
logout takes effect.
• An external hot desk user cannot be logged out if there are any ringing line appearances
of the external device.
16-19
MCD Basic Installation and Maintenance Course
A valid external number is 1 to 26 digits in length and can include * and #. To use #, the
Disable End of Dial Character (#) system option must be set to No, which is the default.
The 26-digit maximum includes the prefix digits required to access an outgoing trunk.
Upon going off-hook, the user hears internal message waiting tone if messages are
waiting and the COS option Message Waiting – Audible Tone Notification is enabled. If
features such as Do Not Disturb or Call Forwarding are in use, the user will hear feature
active dial tone.
By default, calls to an external hot desk user's DN are answered by the user going off-
hook and pressing any key on the dial pad. The alternative, which is controlled by the
External Host Desk User - Push to Talk COS option, requires only going off-hook.
Hold or 1 • The external hot desk user is given camp-on tone to indicate
Retrieve that the hold request was successful. Subsequent camp-on
tones are applied at intervals specified by the Camp-on
Repetitive Tone Timer in the System Options form.
• While the call is no hold, the only mid-call feature available is
Retrieve. All other key presses are ignored.
• Only the external hot desk user can retrieve the held call. Other
appearances of the held line cannot be used to pick up the call.
• If an external hot desk user hangs up while they have a call on
hold, they will be recalled. No recall indication is provided to the
user, only the calling party ID.
Transfer 2 • Both supervised and unsupervised transfers are supported.
• To return to the call on soft hold while listening to dial tone,
such as before dialing the transfer destination, the user must
dial the Call Hold – Retrieve FAC.
Conference 3 • The user may add more parties to an established conference
by selecting Transfer, and then calling the additional party.
Upon answering, the user presses the Conference DTMF key
to add the party to the conference.
• Conferences established by external hot desk users cannot be
split.
• Swap is not supported on conference calls and is ignored if
attempted.
Swap/Camp- 4 • Swap - alternates between two calls.
on Retreival • Camp-on Retrieval – connects the EHDU to a camped on call.
Handoff 5 Pushes the call back to the user's Personal Ring Group.
Cancel Call # Terminates the current call and returns dial tone. Typically used
when the called party is not answering or when encountering a
busy signal.
16-21
MCD Basic Installation and Maintenance Course
This feature greatly reduces charges to EHDUs in different local calling areas than their
home MCD or on a mobile calling plans that charge for outgoing calls. In both cases, the
user avoids charges for calls to the system since they can't be completed due to busy
condition.
Programming
This section discusses the programming forms for EHDUs.
16-23
MCD Basic Installation and Maintenance Course
In the User and Device Configuration form, select the Add drop-down menu and then
select Default User and Device. See the following screens.
Enter a name.
Check Hot
Desking User. Assign a DN.
Enter and
confirm a User
PIN.
16-25
MCD Basic Installation and Maintenance Course
• If the EHDU requires access mid-call features, set Hot Desk External User - Allow Mid-
Call Features to Yes.
• If he EHDU needs dial tone when the other party hangs up, set Hot Desk External User
– Dial Tone upon Call Completion to Yes.
• To use the Message Waiting Indication (MWI) feature, program the Hot Desk External
User – Remote MWI Enable Feature Access Code and Hot Desk External User – MWI
Disable Feature Access Code.
• Set Hot Desk External User – Answer Confirmation as required, depending on whether
the trunk terminating at the External Hot Desk User provides true answer supervision. If
not provided, ensure that Fake Answer Supervision After Outpulsing and Ignore Answer
Supervision are set to Yes in the trunk's circuit descriptor.
• To provide CLID information on internal calls to EHDUs, enable Hot Desk External User
– Display Internal Calling ID.
• Hot Desk External User - Reseize Timer – applies to EHDUs and EHDA devices that are
members of any of the following call groups:
| Ring Group
| Personal Ring Group
| ACD
| Hunt Group
| Suite or linked suite
The timer starts when a call to the group fails to ring the device. The device must be
logged in and available to trigger the timer. The timer value determines the interval
between offers.
• Hot Desk User External Number - Store - allows the user to change their external
number, not including the prefix.
• User PIN Store – allows the user to change the login PIN from their phone.
16-27
MCD Basic Installation and Maintenance Course
If the callback feature will be used, in the Hot Desking – Callback Before Digit Collection
Number, program a DN that termintaes the DID number dialed by the EHDU to request
callback.
For Blackberry® users and users of devices that support smart dialing, in the Hot
Desking – Callback After Digit Collection Number, users can store the callback DID
number.
Note
To create an outbound-only EHDU, omit the PIN in the Multiline IP Sets or
User and Device Configuration form and enable the Permanent Login -
External Only COS option. This is the recommended method of including non-
Mitel extensions in a Mitel hunt group or other type of group.
Outbound-only EHDUs cannot originate calls from MCD and have their
corporate telephone directory name and number presented to the called party.
When Personal Ring Groups or Multi-Device User Groups (Standard or External Twinning) are
used in conjunction with External Hot Desking, the full benefits of both are realized. PRG
benefits are best seen after implementing EHDU, where you dial the prime DN and both the
internal and external devices start ringing. You can complete a handoff with mid-call facilities
from the external set to the internal device. For example, answering a call to your cell phone,
coming into the office on the call, then seamlessly handing the call off to the desk device.
16-29
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
MCD provides users with effective ways to ensure their calls are answered. If a called set is
busy or fails to answer, the system can reroute the call to an alternate set. If the alternate set is
busy or fails to answer, the system can reroute the call to a second alternate set.
Note
Program the Post Call Destination feature in the Call Coverage Services form
to automatically forward callers to a specified destination if the called party
hangs up.
17-3
MCD Basic Installation and Maintenance Course
• Call Forwarding - programmed and activated from the set, users can specify which phone
they wish incoming calls to go to. Calls can be forwarded to different phones based on:
| External or internal call
| A busy phone or an unanswered phone
| Nothing; Calls are forwarded no matter what.
• Call Rerouting - programmed in the system database, users cannot control the call rerouting
of their phone. This ensures that even when the user has not forwarded their phone, calls to
the set will follow the call rerouting path and be answered at the alternative answer points.
Call forwarding overrides call rerouting.
Note
Set the Maintain Original Forward or Reroute Reason option to Yes in the
Shared System Options form to enable the system to maintain and display the
original reason for forwarding or rerouting a call on the nominated party's
phone or console.
Since the number a call can be forwarded to may be different than the number that same call
can be rerouted to, an order of precedence is required. The system treats the calls with this
precedence:
1. Call Forward – Always
2. Call Reroute – Always
3. Call Forward – Busy/DND and/or No Answer
4. Call Reroute – Busy/DND and/or No Answer
Note
Set the Display Caller ID On Single Line Displays For Forwarded Calls to Yes
to display the original caller ID on a single-line display set when it receives a
forwarded/rerouted call. The default is No.
This diagram summarizes the options and decisions made when programming call rerouting.
17-5
MCD Basic Installation and Maintenance Course
• DID Trunks
• TIE Trunks
• CO Trunks
• Internal Sets
You may select all, or any subset of these, to reroute always. The calling source(s) you want to
reroute are selected in the Call Rerouting Always Alternatives form. Program Reroute to devices
you wish to reroute, and No Reroute to devices you do not wish to reroute. Rerouting can be set
to happen when the system is in Day, Night1, and/or Night2 service. Here is an example.
Always Rerouting Example
Always Alternative
Number 2 applies to
1003 during Night1
and Night2.
17-7
MCD Basic Installation and Maintenance Course
First and Second Alternative Rerouting depend on the condition of the set receiving the call.
You can independently reroute the four calling device types depending on whether the called
set is:
• Idle
• Busy
• Not answering.
First and Second Alternative rerouting do not depend on the Day/Night1/Night2 operating
modes like Call Rerouting – Always does.
Note
Best practice is to never use Call Rerouting First Alternative rule number 1, as
it affects all sets by default. Use another rule to forward calls to voice mail.
Always start with rule 2, or you will reroute all hunt groups, all multicall
numbers, voicemail ports, etc.
17-9
MCD Basic Installation and Maintenance Course
• Last = Reroute this device type to the Second Alternative’s designated DN.
If the first alternative, set 1200, does not answer, you can reroute the call to a second
alternative, such as voice mail at 1900. You can independently enable rerouting to the second
alternative for each of the four calling device types.
The example reroutes all trunk calls, but no internal calls, to the second alternative 1900.
Leaving internal calls as Normal for the second alternative means they will not reroute to the
second alternative. If the target set is idle and unanswered, the calls will remain ringing at the
first alternative.
Second Alternative Rerouting Example
• Last = Reroute this device type to the Second Alternative’s designated DN.
17-11
MCD Basic Installation and Maintenance Course
Once the Always, first, and second alternatives are defined, they can be applied to other
phones. In this example of sets sharing rerouting patterns, they are applied to sets other than
1003.
Reference
Please refer to your lab workbook.
17-13
MCD Basic Installation and Maintenance Course
When the target set and the first alternative set are busy, the call reroutes immediately to the
second alternative set. Timers are not required to limit the ringing duration since none of the
sets ring.
When the target set and the alternative sets are ringing but not answered, timers control how
long the call rings at each set before rerouting to the next alternative set.
The call rings at the target set for the duration of the Call Forward No Answer Timer. In the
following example, this timer is in 1003’s COS. Its default value is 15 seconds. When the 15
seconds is up, the call stops ringing at 1003 and begins ringing the first alternative set 1200.
The call rings at 1200 until the Call Rerouting Timer (CRR) or the Answer Plus System Reroute
Timer (A+SR) expires.
The Call Rerouting Timer is in the System Options form and the Answer Plus System Reroute
Timer is in the target set’s COS.
If the A+SR timer has any value greater than 0, the system uses it in place of the Call Rerouting
Timer. The default values are A+SR = 0 and CRR = 22 seconds.
Note
The A+SR timer is only available if ACD Agent licenses have been purchased.
Note
These timers start counting when the target set begins ringing rather than
when the first alternative set begins ringing. They must extend from the
beginning of the target set’s ringing to the end of alternative set’s ringing.
When the CRR or A+SR timer expires, the first alternative stops ringing and
the second alternative starts ringing.
If an Attendant Console or other station originally transferred a trunk call to the target set, and if
the final alternative fails to answer, the call returns to the Attendant Console or station that
made the transfer.
Before returning to the console or station, the call rings at the last alternative for the duration of
the No Answer Recall Timer (NART). The NART is in the incoming trunk’s COS. Its default is
17 seconds, and only applies to incoming trunk calls.
Programmed in
COS of the set.
Programmed in
Programmed in Programmed in COS of COS of
System Options target set. ACD licenses originating trunk.
form. required.
17-15
MCD Basic Installation and Maintenance Course
The rerouting first and second alternatives are only those programmed against the initial
destination set. They do not include rerouting first and second alternatives programmed against
other sets in the rerouting chain, such as against 1200 and 1250 in the example. But the call will
go to the Always Rerouting alternatives belonging to the first and second alternatives.
Rerouting Planner
1
2
3
4
17-17
MCD Basic Installation and Maintenance Course
Reference
On-Line Help > Contents > System Applications > Messaging > Voice Mail
(Embedded) > Programming
• The voice mail application supports up to 30 logical ports, with each port supporting a single
Auto Attendant and/or voice mail session.
• The 3300 ICP hard drive provides 14.5 GB of space and supports approximately 130 hours
of voice message storage.
The EVM is included at system start up. No installation is required. There are system defaults
that get you started quickly, but user mailboxes and access to the voice mail ports must be
programmed.
Callers directed to a user’s mailbox can record a message that the user can later review. A user
can also record and send messages to other mailbox users.
Greetings and voice mail messages are stored on the system hard drive and are backed up to a
file on the LAN. The messages are encrypted when they are backed up.
There is a Telephone User Interface (TUI) for control and navigation of the voice mail
commands as well as a Graphical User Interface (GUI) for management of EVM, the mailboxes,
and the Auto-Attendant functions.
VM Port Capacity
Program the number of ports for voice mail in the VM Port Capacity form by entering the
Number of Ports field. Up to 30 voicemail ports can be assigned on the MXe controller. The
base CX and CXi controllers allow up to 4 ports and, with increased DSP resources, up to 16
may be supported.
Note
Changing VM Port Capacity requires a system reboot.
18-3
MCD Basic Installation and Maintenance Course
Mailboxes can be added, deleted, or modified to suit the needs of the system users. These
activities can be accomplished from the System Administration Tool using either the User and
Device Configuration form or the VM Mailboxes form. Some of the activities can also be
accessed through the TUI.
Reference
On-Line Help > Contents > Forms Reference > Forms S to Z > VM Mailboxes
• Name
• Extension Number, which may or may not be required, depending on the mailbox type.
• Passcode
• Operator Extension
• Mailbox type
• Prompt Language
• Operator Extension
• Notification Type
• Notification Number
• User Access
• Notification Schedule
• Date/Time Stamp
• Forward to E-mail
• Messages Forwarded
18-5
MCD Basic Installation and Maintenance Course
In the following example, two new mailboxes are added using the System Administration Tool.
All of the screens necessary to assign voice mail parameters are located under Voice Mail.
To add, change, or delete your mailboxes, select VM Mailboxes. The VM Mailboxes form is
shown below.
The bottom of the screen lists all of the mailboxes. Use the Change button to view the details of
the highlighted mailbox. To create a new mailbox, select the Add button.
Mailbox 0 and 9999 are reserved for an operator’s mailbox and an administrator’s mailbox.
18-7
MCD Basic Installation and Maintenance Course
This is the same VM Mailbox being added using the User and Device Configuration form.
18-9
MCD Basic Installation and Maintenance Course
Before using the voice mail, record a greeting on the telephone and forward the unanswered
telephone calls to voice mail.
Note
Remember to program a Call Rerouting First Alternative number for all sets to
route to the voice mail hunt group. Do this on all sets that require voice mail.
To transfer the call to a voice mailbox, press the Message key and then dial the destination
extension, or use a DSS or Speedcall key. The call is transferred unsupervised to the mailbox
owner's personal greeting while the transferring party's phone receives dial tone or returns to
idle. During the transfer setup, the caller is placed on soft hold and presented with Music on
Hold. To abort the transfer and reconnect the caller, press Cancel any time before the last digit
in the transfer destination number is dialed.
A FAC is provided for use on phones that do not have a Message key or that are using the key
for Visual Voice Mail. Consoles are provided a softkey for initiating the transfer.
Using the Message key or FAC is equivalent to dialing the pilot number of the voice mail
system. The actual pilot number dialed for a given transfer destination is determined by Call
Coverage Services provisioned for the destination.
• 5140 IP Phone
• 5230 IP Phone
• 5235 IP Phone
• 5240 IP Phone
• 5340 IP Phone
• 5360 IP Phone
It is not available for guest mailboxes on 5140 or 5240 IP phones.
You are automatically logged out of the system after 5 minutes of inactivity. Visual Voice Mail
shows the caller information for internal extensions that have a voice mailbox. All other calls are
displayed as Unknown Caller.
18-11
MCD Basic Installation and Maintenance Course
A Distribution List allows mailbox subscribers to send messages to several people at one time.
There are two types:
• Global lists - set up by using the VM Distribution Lists form for use by all subscribers. Only
the system administrator can set up or change global lists.
Users can create up to 10 personal lists, numbered 050-059. Each list can have up to 750
contacts.
Up to 49 global lists can be created, numbered 001-049. A 50th list, number 000, is already set
up to broadcast messages to every local mailbox.
Select the Add button to add a new list. Select the Add Member button to add the mailboxes to
the selected distribution list.
From the Main Menu, press 7 for Distribution Lists. The TUI uses the Distribution list menu.
When prompted for the distribution list number, enter a two-digit number to represent one of the
lists, from 50 to 59.
18-13
MCD Basic Installation and Maintenance Course
The Administrator's Mailbox allows you to perform voice mail programming from a telephone.
Programming by phone cannot completely replace programming from the System
Administration Tool, but it is convenient for certain functions such as editing and deleting
mailboxes.
Caution
The Manager passcode should be given to the person who performs the day-
to-day operations, such as editing mailboxes and changing greetings. The
Manager passcode provides limited access to the database, thereby reducing
the likelihood of novice users causing serious disruptions to the system. Users
are still prompted to begin a new installation when they enter the Manager
Passcode but get the response Invalid Selection when they attempt to do
so. To protect system security, change the passcodes at first login and keep
them confidential.
The passcode used to log into the Administrator's Mailbox determines which functions can be
accessed.
• Manager Passcode - allows the user to perform all system administration, mailbox
management, and maintenance functions. They cannot add mailboxes, change the
administrator passcode, or change the passcode length.
• Administrator Passcode - allows the user to perform all the manager functions plus changing
the administrator passcode and passcode length.
• Technician Passcode - allows a technician to do all that the administrator can do, plus
adding mailboxes and changing the prompt languages.
Note
The three administrator mailbox passcodes are blank by default. All three
must be entered in the VM Options form to allow access to the mailbox.
Passcodes can be changed from the administrator mailbox once they are
entered in this form.
18-15
MCD Basic Installation and Maintenance Course
The passcode length is a system wide value. If passcode length is increased, all passcodes will
have zeros appended to them to match the new length. For example, if changing from 3 to 6
digits, 123 becomes 123000.
When decreased, passcodes are shortened starting with the last digit moving to the first. For
example, if changing from 6 to 3 digits, 123456 becomes 123.
Caution
Users should not attempt any other technician function codes other than the
one used above to change the passcode. Serious damage may result from
improper use. If the user changes the default technician passcode, they
should notify their service technician what the new passcode is.
Once the technician passcode has been changed, the technician should store
the new one for safe keeping.
Caution
The operator’s mailbox is mailbox 0 and the default passcode is 1234. It is
important that this passcode be changed at installation time.
18-17
MCD Basic Installation and Maintenance Course
EVM can support multiple prompting languages and reroute faxes to the programmed FAX
extension.
FAX Settings
EVM can detect a FAX tone and direct the call to an extension programmed as the FAX
extension. The FAX extension has to be an analog extension. The number could be across the
network.
• Softkey Support
• Notification Calls
Prompt Language
You can view and program system default and alternate prompt language, and you can enable
or disable bilingual prompting.
• Default Language
• Alternate Language
• Bilingual Enable
Note
Disable bilingual prompting if bilingual support is not being used. Otherwise,
you can receive duplicate prompts in English within the Telephony User
Interface (TUI).
18-19
MCD Basic Installation and Maintenance Course
The auto attendant replaces a live operator and directs external callers to the appropriate
extensions or voice mailboxes. There are several things needed to set up the auto attendant on
the system. These include setting:
• Company greetings
| Primary greeting
| Up to seven alternate greetings
| Which greetings are used for each port.
Use the administrator’s mailbox to record the primary and/or alternate greetings, or download
audio (.WAV) files to the system to use as auto attendant greetings. Greetings include:
• Primary greetings
• Alternate greetings
• RAD greetings
Caution
Once the company greetings have been recorded, they replace the default
system greetings. They can only be restored by performing Knowledge Base
Article 06-6748-00003, or if a backup had been completed before the defaults
were changed.
Note
Verify the quality and clarity of the audio file before uploading it to the system.
Audio quality varies depending on the program used for the conversion. To
avoid customer complaints of poor MOH quality, listen to it on your PC
speakers first.
Note
Because each greeting uses a mailbox, voice mailbox licenses are needed to
download audio files for system greetings.
18-21
MCD Basic Installation and Maintenance Course
The auto attendant feature is very similar to DISA in its operation. The only difference between
DISA and the auto attendant is that the caller listens to a recorded announcement instead of a
dial tone. This means that if the caller is on a dial-in trunk and is not COR-restricted, the caller
can dial ARS leading digits and place an outgoing call. Even a COR-restricted trunk can dial a
verified account code that could allow access to external trunks. For this reason, all sites with
auto attendant, dial-in trunks, and non-dial-in trunks should be toll controlled, with limited COS
options and a 12-digit account code to increase the level of difficulty encountered by
unauthorized callers attempting to place external calls.
If the auto attendant is not to permit external calls, use Interconnect Restrictions to control it.
Consideration should also be given to limiting the maximum digits dialed, as defined by the
COR number, to enhance the security.
There is a setting in the VM Options form called Restrict Numbers That Begin With. It is used to
prevent callers from accessing system resources, such as trunks and extensions, via the Auto
Attendant. Access is prevented by programming the system to deny transfers when the leading
digit dialed matches the leading digits of a trunk group access code, extension, or other system
resource.
For any type of interfaced Voice Mail/Auto Attendant, such as COV/ONS/E&M, proper
consideration should be made for toll control of COV and ONS VM/AA ports. Many peripheral
systems will simply perform a blind transfer to any digit sequence entered by the incoming trunk.
Some ONS VM/AA systems use station ports looped back onto loop-start trunks for message-
sending set-ups. All station ports used in loop-backs should be properly toll controlled, only
have the minimum required COS options, and be COR restricted.
External voice mail systems connected directly to a modem should also be connected to a
surveillance device.
Most voice mail systems require a password before access, so be sure this password is
complicated. It is important to change the passwords periodically, especially when anyone with
system access quits the job from either the site or the service provider.
Passcodes
In the VM Options form, enter passcodes to allow access to the administrator mailbox functions.
All three passcodes must be entered in order to access the mailbox. Passcodes must be digits
0-9 and be from three to six digits in length.
Passcodes can be changed from the administrator mailbox once they are entered in this form.
Upon restore of old EMEM database from previous version, the old pass-codes will be restored
in the system.
Mailbox security can be customized with these setting in the VM Options form.
Separate logs are generated for each login and logout event. The logs are ordered by their time
stamp from newest to oldest.
The logs, starting with the oldest, are overwritten when the maximum file size of 5000 records is
reached.
The audit log file is not saved when you perform a system backup.
18-23
MCD Basic Installation and Maintenance Course
Identify the steps and procedures to install, program and test MOH.
Use the Audio File Manager to install, program and test an embedded
MOH scenario.
Identify the various connection points and programming steps required to
install and program Paging.
List the various steps required to install and program a 5485 IP Paging
Unit.
MCD Basic Installation and Maintenance Course
Music On Hold (MOH) provides callers with music or information while they are waiting for a call
to complete. MOH is provided when a call is on hold, transferred to a busy party, or camped on
to an extension.
Note
The customer provides the MOH source .WAV file.
An audio file downloaded to a controller provides embedded MOH. Sites can use multiple
embedded music sources. Up to 65 sources of music can be connected to each system. One
music source is for the system MOH and up to 64 alternate audio sources can be used for
system and tenant MOH and ACD path recordings.
Maximum Number of
Platform Total RAM Total Hold Time
Embedded MOH Sources
MXe with 512 MB
(1400-user controller)
16 MB 32 min. 64
CX/CXi 4 MB 8 min. 8
AX 2 MB 4 min. 2
• Select the audio source you want to update. 0 = System MOH by default. When you
download an audio file, select an audio file ID number without an existing label unless you
want to overwrite an existing audio file.
• Enter the location / path of the audio file.
• Select Update to begin the download process.
• Dialog windows describe the status of the audio file download.
19-3
MCD Basic Installation and Maintenance Course
The Embedded Media Sources form lists the embedded audio files used for MOH. Use this form
to change the label on or delete an audio file. The files are listed by their audio file ID number.
The audio file ID numbers are used to identify embedded audio files when assigning them to
tenants or ACD paths. A label next to an audio file ID number indicates an existing audio file in
the system.
The Embedded Media Sources form also displays how much disk space is available in the
partitioned hard drive reserved for embedded MOH files.
Reference
Please refer to your lab workbook.
19-5
MCD Basic Installation and Maintenance Course
Paging
Paging lets you connect to customer-provided loudspeaker/paging equipment to access
individual paging zones or all paging zones simultaneously.
The controller can have 16 Paging Zones, numbered 00 through 15. Zone 00 is an All Page, so
technically you can have 15 external, customer supplied paging amplifiers.
IP Paging
The 5485 IP Paging Unit provides an interface from an external paging amplifier to a Layer 2
switch port on the network, providing communication via TCP/ IP with the system.
The 5485 IP Paging Unit uses a local power source. A single 25-pair Amphenol cable connects
to the external amplifier using the Main Distribution Frame (MDF). The unit can be wall-
mounted. Two LED indicators on the J2 and J3 ports provide basic paging status information.
Each 5485 IP Paging Unit supports one paging interface to a customer-provided amplifier. If
more than one paging interface is needed, you can use multiple units.
The 5485 IP Paging Units are accessed using directed or group page and cannot access
loudspeaker paging zones.
• Program the 5485 IP Paging Unit as a 5010 IP phone in the Multiline IP Sets form or User
and Device Configuration form.
19-7
MCD Basic Installation and Maintenance Course
• Connect the system to the Ethernet LAN Port on the 5485 IP Paging Unit.
• Attach the paging adapter interface to the 9th pair of the 5485 IP Paging Unit.
• If required, attach the page control inputs of the paging adapter via the MDF to the 11th and
12th pair of the 5485 IP Paging Unit.
• Connect the external speakers as required to the paging amplifier via the MDF.
Note
To reduce the risk of hum or other interference, install the 5485 IP Paging Unit
close to the paging amplifier and keep the cables to and from the unit as short
as possible. If unbalanced input or output equipment is used, you may need a
balancing transformer.
Direct Page
Direct Page allows you to page another telephone over its built-in speaker, even if the telephone
is in use. Direct Page makes the prime line of the paged telephone busy. A tone is heard at both
the paging telephone and the paged telephone before the Direct Page is established.
You can page another telephone when the paged telephone has placed the prime line on hard
hold.
If Handsfree Answerback is enabled for the paged telephone, a handsfree call can be
automatically established when a Direct Page is received. After Handsfree Answerback has
been enabled, the user can turn the feature on and off by pressing the Microphone or Mute key
on the telephone. When Handsfree Answerback is enabled and turned on, the Microphone or
Mute LED is on while the telephone is idle.
Reference
Technician’s Handbook > Software Installation chapter.
MCD Software
20-3
MCD Basic Installation and Maintenance Course
Select the
appropriate MCD
variant.
Select the
appropriate MCD
variant.
Reloading
The procedures for completely reloading the software are very similar to upgrading the software.
Due to time restraints in the classroom, a full install will not be performed.
Upgrading
Software provides the MCD call control with its full operational functionality.
Note
Upgrading system software is covered this early in the training process
because when a new system is installed, it may not have the latest version
preloaded from the factory.
Reference
See the Scheduler Module to schedule:
New software is released at various intervals, usually to introduce new functionality into the
operating software or to address known problems.
The MCD software is packaged in such a way that the customer only needs to purchase the
required licenses. The features can be upgraded as the customer grows or as their applications
change.
If you are maintaining an MCD system, you may be required to enable new feature options or
license settings, or you may need to upgrade the operating software.
• Stay Current – deploy the most recent software updates and maintain ongoing
supportability makes your job easier.
• Achieve life cycle cost certainty – savings on new software releases when compared to
the purchase price. Additional savings through discounts associated with pre-purchasing
multi-year options will also guarantee cost certainty for that extended term.
20-5
MCD Basic Installation and Maintenance Course
• Operating Software
• Options Licenses
Note
Before upgrading software, always read the appropriate version of Release
Notes.
Types of Upgrades
License Upgrades
• Usually involves modifying the total allowed users.
• A Mitel Options Password or the AMC Application Record corresponding to the selected
license and option changes is required for the customer’s SYSID.
Software Upgrades
The three Software Upgrade options available when using the Software Installer Tool
are:
1. Software Upgrade
2. Full Install
3. Apply a Patch
• Includes reinstalling the system software, reapplying the license and options, and
restoring your customer database.
• The software installation alone takes about an hour and restores the system to the
factory defaults.
• After completing a manual software upgrade, configure the licensing and restore the
database, which will also require a system reboot.
Note
During a full rebuild, the System IP address will remain unchanged; it will not
be defaulted back to 192.168.1.2 and 255.255.255.0, but the DHCP forms will
be defaulted to the 192.168.1.0 subnet.
Full Rebuild
The time spent on-site to rebuild an MCD system may take up to two hours.
Using the Software Installer Tool, an Upgrade or Full Install is reduced to approximately one
hour including a database backup, input of license and option information, and a database
restore.
During an offline upgrade, the system will be down for the entire duration of the upgrade
procedure. As a result, all telephony services from the system will be unavailable until the
upgrade is complete.
During an Online Upgrade, the bulk of the software upgrade occurs in the background on a
separate partition of the hard drive. The system continues to run call process during this time.
The only downtime is the single reboot required to swap the upgraded software to the active
partition.
An FTP server is provided within MCD. Choose the 3300 FTP Server option when using the
Software Installer Tool.
If an external FTP server is chosen, any FTP server application designed for the Windows
environment will work. Windows versions that can act as servers, such as Windows 2000, 2003
and XP, have one built into them within Internet Information Services (IIS). Other FTP servers,
such as GuildFTP and FileZilla, can be downloaded for free from the Internet. The PC hosting
the FTP server must connect to MCD through a LAN connection.
20-7
MCD Basic Installation and Maintenance Course
Any time that you upgrade MCD software to apply a patch, upgrade to a new Service Pack (SP)
load or a new release load, because the system is already operational, it must be instructed to
check for any newer loads for the boot ROM.
The command compares the firmware in the RTC/E2T boot ROM against the load on the hard
drive. If the loads are different, installation proceeds.
Partition Information
There is a partition scheme on the system hard drive that creates an Active partition and an
Inactive partition. The About Dialog shows the software version in each partition on the hard
disk.
Swap Command
Use the SWAP command from the Maintenance and Diagnostics window to revert back to your
original software load.
If there is no compatible software version on the inactive partition, the swap will not be allowed.
Using the MCD Software Installer tool, you can schedule when the swap to the new software
occurs if you are performing an online upgrade.
20-9
MCD Basic Installation and Maintenance Course
To prepare for a system upgrade or install, you must put the MCD software files on your PC,
network, or FTP server on the customer’s network. If you are using an external FTP server, be
sure to verify that the FTP server service is configured correctly and running.
You must put the MCD_Installation_<Latest Rel>.exe file from MOL in a location on your PC or
network. If using an external FTP Server, use the FTP root folder.
Use the MCD_Installation_<Latest Rel>.exe file to extract the software into the correct locations.
The default location is C:\Program Files\Mitel\3300ICP\<software revision folder>.
After an upgrade and the new load has become active, the original load remains in the inactive
partition.
Continue the
installation
wizard by
following the
prompts.
The MCD Software Installer Tool allows you to upgrade software on multiple systems
simultaneously, or it can install or upgrade one MCD at a time.
Up to 10 instances of the MCD Software Installer Tool interface may be launched from the main
window by clicking on the Configure button, assuming that the IP address data has changed
between each selection. The main window controls how many windows can be open at any
time, allowing you to perform simultaneous upgrades on multiple controllers.
Continue the
installation
wizard by
following the
prompts.
After the wizard has finished, start the SI Tool from the PC’s Start Menu.
20-11
MCD Basic Installation and Maintenance Course
Select the Perform Upgrade radio button and then input the FTP server IP address and FTP
Account Name and Password. If you are using the MCD FTP server, input the location of the
upgrade files.
To use MCD’s
FTP server,
specify where the
install files are
located on your
PC or network.
20-13
MCD Basic Installation and Maintenance Course
Failover Considerations
Failover of resilient devices to a secondary MCD occurs in smaller groups. This helps to
maximize system availability by reducing the number of sets trying to register at the same time.
You can delay the Software Installer initiated failover for a specified period to allow users to
complete their calls.
You can stop upgrades and full installations while in progress and resume later from any
Software Installer client. The ability to stop and resume an installation is especially useful for
Full Installs, as it allows you to complete an installation, except for the system reboot, during
office hours, and then reconnect to the system after hours to reboot.
Managed Handoff
Use the Handoff Services Type (HST) Courtesy Handoff commands to transfer resilient IP
phones to the secondary controller when the primary controller needs to be rebooted.
Use the Embedded Digital Trunk (EDT) Courtesy Handoff command to force 3300 ICP T1/E1
trunks to the secondary controller without dropping any calls in progress.
After installing new software using the online upgrade option in the Software Installer tool, use
the SWAP command to swap the active and inactive partitions.
You can also use SWAP to reboot from your original software load.
You can execute the swap command manually, or you can schedule it from the MCD Software
Installer tool.
Offline upgrades:
• Are faster.
• Make the controller downtime longer because of the number of system reboots required.
They should only be performed during off-hours to minimize the impact of service
disruptions.
Online upgrades:
With an online upgrade, you schedule when the Data Preservation and Software Activation
happens, such as after the File Transfer is completed or at a specified time thereafter.
A sixth step is required for controllers with resilient devices. To minimize service outage during
an upgrade, such devices are transferred to their secondary controller while the primary is
rebooted. If the Software Installer detects the presence of resilient devices, it will prompt you to
start the transfer either immediately or after a specified waiting period elapses. An immediate
transfer terminates any active calls. Waiting allows time for users to complete their calls before
they are terminated.
For an online upgrade, a backup is made to MCD’s hard disk. You can choose whether or not to
export a copy of the database from MCD.
Note
Because the hard drive is formatted during a full install, the system is out of
service for the duration of the installation.
An upgrade leaves the voice mail partition untouched, so a voice mail backup and restore is not
required.
20-15
MCD Basic Installation and Maintenance Course
Optional License and Options Configuration – existing license and option information is applied
to the new load. If the customer requires any license changes, you may alter the information as
part of this process.
Database Restore – the database stored above on the hard disk is always restored. You can
choose whether or not to restore Hotel/Motel options.
Licensing is validated at the beginning of the upgrade or installation process. If successful, the
process continues.
If you are performing an online upgrade, you can schedule when the Software Activation occurs,
causing a swap to the new software.
The CX/CXi supports the one step upgrade process. A one step upgrade process is possible on
an AX if the secondary 4 GB flash card has been installed, in addition to the primary 2 GB flash
card and the required 512 MB RAM.
20-17
MCD Basic Installation and Maintenance Course
To schedule when
the database backup
and restore occurs.
To
schedule
when the
system
reboot
occurs.
Licensing Configuration
If License and Option Configuration is selected, you have the opportunity to retrieve the current
license and option selections.
Requirements for the Software Installer Tool on the PC to query the AMC Server, the PC must
have:
• An Ethernet card.
• Connectivity to MCD.
20-19
MCD Basic Installation and Maintenance Course
If License and Option Configuration is selected, you have the opportunity to alter the following
option selections.
These are the windows displayed during an offline and online upgrade.
The installer monitors the progress and displays the following window. This window is for an
online upgrade. The offline window is similar.
20-21
MCD Basic Installation and Maintenance Course
The View Log button opens the log file in an appropriate text viewer, such as Notepad. Any
errors encountered during the installation are logged. If the upgrade was cancelled or fails, a
View Log selection displays the captured output from MCD.
The MCD Software Installer Tool can be used to install patches. Check the Release Notes to
verify.
Select Apply Patch to initiate a patch install. While Apply Patch is selected, the lower portion of
the window displays a text box and a corresponding Browse button. Use this text box and/or
Browse button to locate and specify where you have stored the patch load. The load must be
local to the client PC or a mapped network drive.
Use the radio buttons to choose whether to activate the reboot immediately following the patch
transfer or manually at a later time.
Prerequisites
• The operating software must be downloaded and installed on the FTP server.
• Be able to connect to the AMC and obtain licensing information that is tied to the SYSID and
ARID of the system being installed. The System IP Properties form will need the DNS server
information programmed.
Note
This executable will move all of the required files for the software installation
to the appropriate folder on the FTP server.
20-23
MCD Basic Installation and Maintenance Course
Commands of interest
10. Type c to change the current boot parameter settings. Typing cd will change the settings to
default. Be careful with this command, as the old settings will be gone.
Change the boot parameters so MCD functions as an FTP client, allowing MCD to
access the FTP server and request the transfer of the required files.
| boot device: motfcc
| file name: Boot_Install
| host inet: <IP address of the designated FTP server>
| The user and ftp password for the FTP server
20-25
MCD Basic Installation and Maintenance Course
Note
After you input the license information, restore the database and reboot. Keep
in mind that MCD will reboot a second time, after the restore is complete, in
order to load a fresh copy of the restored configuration into RAM.
There are several ways that you can find out when the available software has been updated:
• Register for emails at the MOL Product Support web page. Use the Register/Cancel Email
Notifications link
Anyone else should contact their Mitel dealer or Mitel product representative for further details
regarding software upgrades.
20-27
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
Reference
Online Help > Contents > System Programming > Using the Mitel Integrated
Configuration Wizard
After the system configuration is complete, save the file for future application to the controller
and server. Further customization can be done by importing .csv files using the wizard and by
using ESM and the MAS User and Services application.
Supported Installations
The Configuration Wizard supports the following installations:
A-3
MCD Basic Installation and Maintenance Course
• ACD Agents
• Attendant Consoles
• NSUs or external ASUs
• 52xx series sets
• DNIC phones
Reference
Online Help > Contents > System Programming > Using the Mitel
Configuration Wizard > Defaults Applied to the 3300 ICP
Services Pages
• VM Ports (3300 ICP Only)
• Hunt Groups
• Telephone Directory
Note
System IP Properties data, such as System Name and IP Address, are
entered on this page only if at least one application is selected on the
Services page; otherwise, the data is entered on the System Information
page.
• Network Elements*
License Page
• License Options Selection*
• DHCP Subnet*
A-5
MCD Basic Installation and Maintenance Course
Trunks Page
• Trunk Attributes
• Trunk Groups
ARS Page
• ARS Digits Dialed
• Station Attributes
• Call Rerouting
• Card Assignment*
Other Forms
• ICP/PBX Networking
• Cluster Elements
• System Options
• SMDR Options
A-7
MCD Basic Installation and Maintenance Course
Reference
Online Help > Contents > System Programming > Using the Mitel Integrated
Configuration Wizard
• Starting a Configuration
| Create a new configuration
| Open a previously saved configuration
• System Parameters
| System Name, System IP Address, and Platform Type
| MAS IP Address
| Site Information, including Country/Region. Upon selection of the Country/Region, the
prefixes and Local Emergency fields are automatically popluated. The email server is
defined here.
• Licenses and System Options
| Sync with AMC or configure manually
| Select Extended Agent Skill Group and/or Extended Hunt Group, change Max Elements
per Cluster, Max Configurable IP Devices, Extended Hunt Group, and 5560 extended
key lines.
| Select location of Help files.
• Local Area Network Connection – Subnet Mask, Gateway IP Address, L2 Switch IP
Address, DSCP Value, and DNS Server IP Addresses
• Date and Time – time zone, date, and time, and selection of date and time source
A-8 Mitel Integrated Configuration Wizard_rev9.doc
MITEL INTEGRATED CONFIGURATION WIZARD
• Embedded DHCP Server and Options (3300 ICP only) – enable embedded DHCP server
and program all DHCP settings and options
• Applications
| Single MCD or MCD Cluster information
Create New Cluster
Join Existing Cluster
Modify Existing Cluster Element
| Selection of Hot Desking Devices, DID Embedded on MCD, VM Embedded on MCD
(3300 ICP only), and Dynamic Extensions
• Controller Modules and Framers – module types and port types (3300 ICP only)
• Trunks (two screens)
| Configure Answer Point
| Configure SIP Trunks
| Configure Digital trunks
| Configure Analog Trunks
• Route Assignment – assign Type of Call, Trunk Group, and COR Group to Route Numbers
• Automatic Route Selection (ARS) – route calls based on digits dialed and digits to follow
• Applications Resources and Options
| Embedded VM (3300 ICP only)
| Dynamic Extensions
• Hot Desk Devices – adding and deleting
• Automatically Generate Users and Services
| User names
| Extension and/or Dynamic Extension
| Enable user VM
• User Information – define prime contact number, email address, and COR
• Office Extensions – define extension number and device type
• Dynamic Extensions-External Numbers – define prefix and external number for EHDUs
• Personal Ring Groups and Multi-Device User Groups – group programming
• Groups – Hunt Groups, Page Groups, Pickup Groups, and Ring Groups.
• Group Members – add members to the groups
• Advanced Configuration – import spreadsheet
A-9
MCD Basic Installation and Maintenance Course
Importing Files
The MiCW lets you import .csv files to further customize or extend the initial configuration.
• To import MCD data, create the required .csv import files using the ImportSpreadsheet.xls
file or load the spreadsheet into the wizard and let it generate all the .csv files in one shot.
• To import MCD and MAS users, create a .csv import file using the
UserServicesTemplate.csv file.
Importing files is covered in another module.
If you want to remove a .csv file from the list, select the file and click Delete.
Caution
If you import a .csv file associated with a form that is modified by the MiCW,
you will overwrite your wizard selections.
Interconnect Restriction
Interconnect restrictions are used to prevent certain devices from connecting to other devices,
such as phones, trunks, modems and fax machines. For example:
To make the restrictions effective, assign the Interconnect numbers to the devices you wish to
restrict in the appropriate device forms.
There are several device forms where you can assign interconnect numbers:
• Analog Sets
• Multiline IP Sets
• Analog/Digital Trunks
• VM Ports
The Interconnect number is used in:
• The Intercept Handling form, which allows you to program how the system is to treat various
intercept conditions as they arise in call processing.
• The Hospitality application in conjunction with the Curfew feature. Hospitality is covered in
another module.
Note
MCD provides a maximum of 75 Interconnect Restriction numbers.
B-3
MCD Basic Installation and Maintenance Course
As shown in the diagram, the multiline sets with interconnect number 1 are restricted from
calling multiline sets with interconnect number 5. Extensions 2151 and 2152 cannot call
extensions 2154 through 2156.
Interconnect restrictions cannot be overridden by user features. A third party can act as a bridge
to conference restricted devices. If the third party leaves the conference, all members are
dropped from the call due to the interconnect restrictions.
Reference
Please refer to your lab workbook.
B-5
MCD Basic Installation and Maintenance Course
C-2 Tenanting_rev8.doc
TENANTING
Introduction to Tenanting
Tenanting allows a single controller to be partitioned among a number of tenants and configured
to look like a separate system to each tenant. Up to 64 small businesses, or departments of a
larger business, can share features and capabilities of the system.
Consoles, CO trunks, and dial-in trunks can be allocated individually to each tenant or shared
between tenants as shown in the following diagrams. Switching to night service can be done
centrally, or on a tenant-to-tenant basis. Calls through the system can be blocked, so tenants
can only call each other on CO trunks.
Some system features are enabled for each tenant individually while other features are shared
by all tenants. You can define groups such as Attendant Groups, Trunk Groups, and Multiline
Appearances with devices belonging to different tenants.
C-3
MCD Basic Installation and Maintenance Course
C-4 Tenanting_rev8.doc
TENANTING
Planning Tenanting
Because tenants can be allowed to connect to each other, extension numbers must be unique
across the entire system.
You can have up to 64 tenants, including the landlord Tenant 1. Unless otherwise programmed,
all phones, consoles, and trunks are in the landlord group. Tenant 1 will always be able to
contact all the other tenants. No permissions need to be granted to Tenant 1.
Note
Tenanting is not supported on systems with:
• Resiliency.
• Hot Desking.
In addition, IP trunks are not tenantable resources.
Some tenants may be allowed to access only specific trunks. ARS checks the tenant
interconnection table to verify if a caller may access a particular trunk. If the first choice trunks
are not available to a particular tenant, the system skips them and takes the next choice trunks
instead. The system automatically searches available trunks from first choice to last choice as it
attempts to find a free trunk.
• Callers placed on hold will receive the MOH of the tenant of the call holder.
• External callers placed on hold by an attendant will receive the MOH of the tenant to which
the DID/DDI number or answer point is assigned.
• Group page, call park, and other similar features function for all sets independently of tenant
assignment.
• Calls cannot be forwarded or rerouted to a set in another tenant unless both tenants in
question have permission to call each other. This also applies to campon, trade, conference,
intrude, callback and other similar features.
C-5
MCD Basic Installation and Maintenance Course
Programming Tenanting
In the Tenants form, program the information for each tenant. All inter-tenant connectivity is
restricted except as defined under Permissions Granted.
For each device and trunk not in the landlord group, enter the tenant number in the appropriate
form:
• Digital Trunks
• IP Consoles
• Multiline IP Sets
• Wireless IP Sets
C-6 Tenanting_rev8.doc
TENANTING
C-7
MCD Basic Installation and Maintenance Course
Night Service
Switching to night service can be done centrally or by individual tenants. Central control means
that tenant 1, or default tenant, controls the system’s day/night service status. It is also referred
to as the Landlord group. For example, consider initial conditions like this.
When the leader goes into night service, the other tenants also go into night service.
C-8 Tenanting_rev8.doc
TENANTING
Individual tenants can control night service status by applying the day/night status to the phones
and trunks in that tenant group.
When a leader(s) goes into night service, the other tenants are not affected.
C-9
MCD Basic Installation and Maintenance Course
Another tenant designated as the night service leader can also control tenant night service.
When the night service leader changes the day/night status, the associated tenants’ night
service state is also changed. In this example, tenant 2 has been designated the leader.
When leader 2 goes into night service, the associated tenants are also put into night service.
C-10 Tenanting_rev8.doc
TENANTING
• If you selected an embedded music source, select the audio source ID assigned to the
tenant.
• If you selected an external music source, enter the Directory Number of the source assigned
to the tenant.
In a multi-tenant application, music is presented to the held parties in the following order:
• If no MOH has been programmed and configured, the held party hears silence.
C-11
MCD Basic Installation and Maintenance Course
Maintenance
The CP SERVICE DAY/NIGHT1/NIGHT2 maintenance command will put the default tenant into
the specified day/night service. Other tenants defining Tenant 1 as night service leader will be
affected the same way.
The new LOCATE TENANT 1-n | ALL command will list the names and status of the tenant
numbers specified.
C-12 Tenanting_rev8.doc
TENANTING
C-13
MCD Basic Installation and Maintenance Course
C-14 Tenanting_rev8.doc
SPEED CALLS
D
Objectives
When you finish this module, you will be able to:
Define the four speed call types and how they are used.
Program Speed Call – User.
Program Speed Calls - Personal.
Program Speed Calls - System.
Program Speed Calls – Customer Data Entry (CDE).
MCD Basic Installation and Maintenance Course
Reference
Online Help > Contents > System Features > Features S to V > Speed Call –
User
Online Help > Contents > System Features > Features S to V > Speed Call –
Personal
Online Help > Contents > System Features > Features S to V > Speed Call –
System
Online Help > Contents > System Features > Features S to V > Speed Call –
CDE Speedcall
Speed Calls
Speed Calls, also known as Speed Dialing, allows users to call specific numbers by pressing a
single, pre-programmed key, or dialing an abbreviated number. The system provides the end
user with four different types of Speed Calls:
• User Speed Call - Speed Call Keys allow you to store external numbers under feature keys
for faster dialing. You can press a Speed Call Key to dial a phone number or, during a call,
to outpulse DTMF tones.
• Personal Speed Call - lets you store and dial frequently-used numbers by using access
codes and index numbers.
• System Speed Call - allows users to speed dial phone numbers that the administrator has
programmed into the system. Users initiate a system speed call by dialing an abbreviated
Speed Call Number. Only the administrator can store system speed calls, although all users
can dial them.
• Customer Data Entry (CDE) Speed Call - allows users to speed dial phone numbers that the
administrator has programmed into the system. The administrator programs the number into
a CDE speed call key on a user's set through the Multiline Set Keys form. Users initiate the
speed call by pressing the key.
D-3
MCD Basic Installation and Maintenance Course
The following diagram shows some examples of how speed calls can be used.
Speed Call Keys allow you to store external numbers under feature keys for faster dialing. You
can press a Speed Call Key to dial a phone number or, during a call, to outpulse DTMF tones.
When the system encounters a pause while dialing a Speed Call string, the system ceases
dialing for the duration of the pause. When the pause ends, dialing resumes. To create a longer
pause, use multiple pauses.
To add a pause while programming a Speed Call number, press Hold/Retrieve, Hold, or Pause.
Programming
Users can store speed calls directly under the personal keys on their sets. If a user makes a
speed call private, the speed call number is not displayed in the system administration tool
forms.
The system administrator can program User Speed Call keys for a user’s set from the Multiline
Set Keys or 5235 Idle Softkeys forms. User Speed Call keys cannot exceed 26 digits.
Operation
To operate, the user simply lifts the handset and presses the Speed Call key.
D-5
MCD Basic Installation and Maintenance Course
An administrator can assign personal speed calls to a station, allowing users to store and
retrieve frequently used numbers by dialing access codes and index numbers.
Each user can be assigned a maximum of 100 personal speed calls in blocks of 10. The total
number of personal speed calls in the system is listed in the System Capacity form. The speed
call index must be a two-digit number from 00 to 99.
Using the programmed access codes, a user can store up to 26 digits per speed call.
Programming
To program Personal Speed Calls:
• Assign a block of personal speed call numbers to the station. Assign up to 100 in multiples
of 10, on the Personal Speed Call Allocation form.
Operation
To dial a Speed Call number:
• Enter a two-digit personal speed call index number, from 00 to a maximum of 99.
For numbers 0 to 9, add a leading zero. For example, 00, 01, 02, 03 and so on.
D-7
MCD Basic Installation and Maintenance Course
D-9
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
The system administrator programs system speed call numbers. Access to a system speed call
number is available to all phones within the system.
System speed calls let users dial a short number in place of a longer one. All users have access
to system speed call numbers. The administrator defines the system speed call number entries.
In the following example, the user may dial the 3 speed call numbers shown to access offices in
the 3 remote locations.
The database administrator usually equates the speed call numbers to the telephone numbers
of commonly called business locations such as branch offices.
D-11
MCD Basic Installation and Maintenance Course
Programming
To program system speed call numbers:
• Enter the Actual Numbers to be dialed into the System Speed Calls form. This can be up to
26 digits.
• Enter the Speed Call Numbers that the user dials. This can be up to seven digits.
• To allow all users to dial the System Speed Call, even if they would normally be restricted
from doing so in the Class of Restriction, enable Overrides Toll Control in the System Speed
Calls form.
Operation
To operate, the user simply lifts the handset and dials the Speed Call number.
Reference
Please refer to your lab workbook.
D-13
MCD Basic Installation and Maintenance Course
This feature allows users to speed dial numbers that the administrator has programmed into the
system. The administrator programs the number into a CDE Speedcall key on a user's set
through the Multiline Set Keys or User and Device Configuration forms. Users initiate the speed
call by pressing the key.
CDE Speed Call numbers cannot exceed seven digits in length. Users cannot modify CDE
Speed Call numbers from their sets.
CDE Speed Call allows for special characters to be used in the dial string. This is helpful when
programming a digit string that will enable a call to be parked on a specific park zone. For
example, the access code for the park feature has been programmed as *51 and we want to
park all calls on park zone 1000. If the administrator programs a CDE Speed Call button with
the digit string *511000, it will allow a single button to be pressed to park the call to zone 1000.
Another example is the ability to utilize a single button to enter an account code. The button can
be programmed to include the feature access code followed by the account code to be
registered.
Programming
To assign a system speed call as a CDE Speed Call key on a user's set:
• In the User and Device Configuration form, double-click the user's DN.
• In the Button Directory Number field, enter the number. There is a maximum of seven digits.
For more than seven digits, the user can be provided a CDE Speed Call button by the
administrator. The CDE Speed Call button dials a System Speed Call number (7-digits max,
also by the administrator), which translates the digits up to 26-digits max.
Operation
To operate, the user simply lifts the handset and presses the CDE Speedcall Key.
Reference
Please refer to your lab workbook.
D-15
MCD Basic Installation and Maintenance Course
Intercept Handling
Intercept handling lets the system control what happens to a call when it cannot be completed to
the required destination.
E-3
MCD Basic Installation and Maintenance Course
By default, the system sends reorder tone to every intercepted call. Each error condition can be
treated individually. For example
• An invalid account code returns dial tone allowing additional attempts at entering a correct
account code
Note
MCD provides a maximum of 45 Intercept Handling numbers.
• Intercept Handling number 35 is for for use by ARS for routing calls over
the Direct IP Route.
• Intercept Handling numbers 36-45 are reserved. Do not program.
Note
Because most callers do not need to receive anything more than a reorder
tone, it’s a good idea to leave the first instance of the Intercept Handling form
in its default condition.
In the Trunk Attributes form, assign an Intercept Number to each Trunk Service Number.
Note
Trunks should have different intercept numbers than phones so that internal
and incoming calls are treated differently.
E-5
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
Program and use Account Codes to change the COS and the COR for a
call.
Program and use Account Codes to record calls in billing records.
MCD Basic Installation and Maintenance Course
Account codes allow you to access features that are normally not available at a phone. Before
making a call, enter an account code to change the COS and COR privileges at any phone.
When you hang up, the phone returns to its original operating parameters.
SMDR can track the use of account codes for billing purposes. Account codes can also be
reported in internal SMDR logs.
With verified account codes, you can change the COS and COR at any phone. When you enter
a valid account code number, the system assigns the phone the COS and COR associated with
that account code. This is also known as Travelling Class of Service and Class of Restriction.
Verified account code numbers can be tracked in SMDR.
F-3
MCD Basic Installation and Maintenance Course
• Verified
• Non-Verified
Using verified account codes, a company may want to provide some employees with access to
long distance calls and certain phone features. Verified account codes allow the user to change
user privileges on phones that normally do not have access to long distance calls or specific
phone features. As soon as a user hangs up after using the account code, the set returns to its
normal condition.
In this example, sales people must enter a verified account code before dialing a long distance
number in order to track and bill the calls. A user who enters the verified account code number
123456789012 will assume the characteristics of COS 1 and COR 6.
Planner
_______________________
Extension _______1002____________
Numbers _______1003____________
_______________________
COS Number for
Sets
3
Verified
(Independent) COS Number COR Number
Account Codes
123456789012 1 6
210987654321 1 4
888777666444 1 3
F-5
MCD Basic Installation and Maintenance Course
COS 1 ensures
that the external
calls are
recorded in the
SMDR records.
COS 3 allows
the set to dial a
Verified
Reference
Please refer to your lab workbook.
F-7
MCD Basic Installation and Maintenance Course
A customer may want to include account codes in SMDR records to record incoming and
outgoing calls for billing or call management purposes. For example, a law or accounting office
may want to bill clients who call for consultation. To do this, the SMDR record for the system
needs to include not only the telephone number of the phone that receives the call, but also an
account number to identify the customer.
If the customer wants to bill clients for consultation, they can assign an account number to each
client. When a client calls for a consultation, the consultant simply enters the account code
number of the customer while the call is in progress. The account code number creates an
SMDR record that includes the telephone number of the phone that receives the call, and the
account number that identifies the customer who called.
Account codes used for billing or management purposes change as client’s change and are not
verified by MCD. These non-verified account codes can be programmed as either forced or not
forced.
• The Non-Verified Account Code - Forced is entered at the beginning of the call. After the
user dials the external number, the system returns dial tone and does not extend the call
until the user enters an account code. This feature is useful when a law or accounting office
wants to make sure calls made on behalf of clients are always captured in the SMDR
records.
The system must be programmed to include Non-Verified Account Codes - Not Forced in its
SMDR records for all incoming and outgoing calls.
Planner
____1002_____
____1003_____
Extension Numbers
____1004_____
_____________
SMDR Options
F-9
MCD Basic Installation and Maintenance Course
These create
SMDR records for
both incoming and
outgoing calls.
F-11
MCD Basic Installation and Maintenance Course
• Verified
• Non-Verified
With forced verified account codes, you must enter the account code as soon as the phone
goes off-hook and before you dial a telephone number.
With forced non-verified account codes, you must enter the account code after you dial the
telephone number.
Caution
Forced verified account codes restrict the use of the phone, but users must be
able to dial emergency numbers. DO NOT enable the forced verified account
code feature in the COS form for any telephone. The ONLY time you might
want to use forced account codes is for certain DISA applications.
You can program the system to avoid entering a forced non-verified account code number when
making a call. For example, you could dial a leading digit, such as 8, to make a call without
entering an account code, and dial another leading digit, such as 9, to make a call that requires
an account code.
In this example, a law office wishes to track and bill calls made on behalf of clients. The system
must be set-up to include forced non-verified account codes in their SMDR records for incoming
and outgoing calls.
Planner
____1002_____
____1003_____
Extension Numbers
____1004_____
_____________
SMDR Options
Route Number 1
Route Type Non-Verified
Account
F-13
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
F-15
MCD Basic Installation and Maintenance Course
The maximum and default account code length is 12 digits. The minimum is two. If you use an
account code that is less than 12 digits long, use # at the end of the digit string. The # sign
signals to the system that there are no more digits to come and it makes it more difficult for
hackers to crack the account code.
• Fixed length account codes are automatically submitted to the system when you enter the
correct number of digits.
• Fixed length account codes do not work unless the optional Advanced Analog Networking
feature package is enabled on the system.
• The Fixed Account Code Length is entered in the COS Options form.
Default account codes are entered automatically by the system each time a user dials an
external number. Account codes may be used to segregate groups in SMDR for billing
purposes.
Conditions
• More than one station can be assigned the same default account code.
• If you enter an account code, it replaces the default account code on the SMDR record.
Programming
• Program account code numbers in the Default Account Codes form.
• Enter the associated account code index numbers in the Station Attributes form.
F-17
MCD Basic Installation and Maintenance Course
Traffic Reporting
Traffic reports are used to measure the maximum number of system resources used at one time
versus the total number of resources available.
Dynamics of Traffic
System traffic is dynamic, consisting of peaks and lulls. By measuring system traffic, you can
determine the pattern of usage and adjust your resources accordingly. Insufficient resources
result in degraded services. Excess resources are expensive.
System traffic shown in a graph format illustrates traffic fluctuations. This example graph
illustrates the number of call attempts made on a trunk group for the duration of one day. The
demand ranges from two call attempts to 35 call attempts and indicates that the trunk group
receives the heaviest demand during the peak hours from 2:00 to 2:30 PM.
G-3
MCD Basic Installation and Maintenance Course
Use the Traffic Report Options form to control the traffic report.
For an actual traffic report on Trunk Group Usage, see the following example.
This number represents the total
number of times this field was
successfully accessed during the period
indicated on the report.
Trunk Groups
Outgoing Trk Trunk Group Usage Maximum
Group Number Label Peg (CCS) Busy Peg In Use/Avl.
3 E&M TRUN 85 23.07 61 3/ 4
20 CEPT 53 7.11 70 1/ 1
22 T1/D4 E& 0 0.00 75 0/ 1
24 LOOP TRU 26 3.17 75 0/ 1
28 CO TRUNK 51 7.15 81 1/ 1
1 0 0.00 0
2 0 0.00 0
4 0 0.00 0
------ -------- ------
215 40.50 362
Trunks
Trunk Peg Usage In Peg Usage Out
Number Label In (CCS) Out (CCS) This number represents the number of
1 E&M TRU 1 0.33 32 7.74 times a call could not seize a trunk in the
6 XXXX E&M TRU 0 0.00 45 0.02 group due to a busy condition. If the trunk
14 E&M TRU 31 8.92 0 0.00
group is part of an ARS Route List, the
32 BBBB E&M TRU 0 9.03 0 0.00
60 LOOP TR 65 8.34 0 0.00 busy peg will reflect a count which applies
123 CEPT 0 0.00 53 7.12 to busy conditions encountered while
200 CO TRUN 0 0.00 51 7.16 scanning the Route List.
3 0 0.00 0 0.00
4 0 0.00 0 0.00
7 0 0.00 0 0.00
------ -------- ------ --------
97 26.32 181 22.0
G-5
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
Reference
Online Help > Contents > Maintenance > Procedures > Scheduling Events
H-2 Scheduler_rev5.doc
SCHEDULER
Scheduler Overview
To reduce management overhead and improve productivity, schedule common events to run
automatically.
• Backup
• Night Service
• File Transfer
• IDS Synchronization
• FTP Downloads
H-3
MCD Basic Installation and Maintenance Course
• Set this week as a holiday – programs the entire week, including the selected day, as a
holiday.
• Designate <DAY OF WEEK> as a holiday – programs this day of the week as a holiday
for the selected month.
H-4 Scheduler_rev5.doc
SCHEDULER
• Add an Event
• Edit an Event
• Delete an Event
• Copy an Event
• Execute an Event Immediately
Add an Event
Adding an event involves picking an activity, specifying a start date and time, and
indicating whether the event should occur repeatedly or only once.
6. Select Submit and then OK to save the new event. The new event is added to the event
list.
H-5
MCD Basic Installation and Maintenance Course
H-6 Scheduler_rev5.doc
SCHEDULER
H-7
MCD Basic Installation and Maintenance Course
Edit an Event
To edit events:
1. Navigate to the Maintenance and Diagnostics > Scheduler form.
2. Locate the event in the event list.
3. Select the event and then select Edit.
4. Select the Event Properties tab and update the Title, Start Date, Time and Repeats
fields as necessary.
5. Select the Activity Properties tab and update the Activity.
6. Select Submit and then OK to save the edited event. The event list is updated.
H-8 Scheduler_rev5.doc
SCHEDULER
Delete an Event
To delete events:
1. Navigate to the Maintenance and Diagnostics > Scheduler form.
2. Locate the event in the event list.
3. Select the event, select Delete, and then select one of the following options:
• Delete Just This Instance – deletes the selected instance of the event.
H-9
MCD Basic Installation and Maintenance Course
Copy an Event
To copy an event:
1. In the Scheduler form, locate the event in the event list.
2. Select the event and then select Copy. The Copy dialog is displayed with the event
settings already programmed.
3. Select the Event Properties tab and update the Title, Start Date, Time, and Repeats
fields as necessary.
4. Select the Activity Properties tab and update the Activity.
5. Select Submit and then OK to save the copied event. The copied event is added to the
event list.
Note
Executing an event immediately does not impact the event list. For example, if
an event is scheduled to run every day of the week at 4 PM and you execute
the event at 2 PM, the event will run again at 4 PM the same day.
H-10 Scheduler_rev5.doc
SCHEDULER
Scheduling Backups
You can schedule automatic backing up of the system database to an FTP server.
• Scheduled backups are supported on the local node only. If databases of member elements
of an SDS Administrative Group need backed up, perform a regular, unscheduled backup.
• While the backup is processing, SDS distribution updates sent by other data-sharing
elements are rejected by the local node.
• If SDS is enabled, resolve all pending updates and errors prior to the scheduled backup
event.
To create a backup event for the local system:
1. In the Scheduler form, select the day and then select Add.
2. Select the Event Parameters tab and complete the following fields:
• Title – enter a title for the event.
• Start Date – use the dialog box to select the Month, Day, and Year that the event is
scheduled to start.
• Time – use the dialog box to select the Hour, AM/PM, and Minute that the event is
scheduled to occur. Select Set to save your changes.
• Repeats – specify how often the event is to repeat - Once, Daily, Weekly, Monthly,
Yearly, or Repeats Interval.
If Daily, Weekly, Monthly, or Yearly is selected, the dialog expands for customization of
the repeat interval.
If Repeats Interval is selected, specify the number of minutes between repeat events
and whether the event is to be repeated continuously or a fixed number of times.
3. Select the Activity Parameters tab, and complete the following fields:
• Click on Select Activity and then select Backup.
• In the Backup file prefix field, enter a prefix to apply to the database file names. The
databases will be saved in this format: <prefix>_<node name>_<release
version>_<timestamp>.tar
• Select Call History and/or Voice mail messages they are to be included in the backup.
Including these records and messages can increase the backup time significantly.
4. Select Submit and then OK to save the new event. The new event is added to the event list.
H-11
MCD Basic Installation and Maintenance Course
Caution
When saving the backup, it is recommended that a record of the local
system’s IP address be part of the backup filename; perhaps the Backup File
Prefix.
If you must restore that backup onto a system that has a different IP address,
temporarily set the IP address of the target system to match the IP address in
the backup filename. Once the restore has completed, change the IP address
back to its original.
If this is not done, when a backup is restored onto a system that has a local IP
address different than the local IP address in the backup, a new local Element
is produced in the Network Elements form during the restore.
H-12 Scheduler_rev5.doc
SCHEDULER
You can schedule automatic importing and exporting of form data in .CSV format.
Import data is entered into an Excel spreadsheet supplied with MCD and saved as .CSV files for
import.
• Obtain the Import Spreadsheet or prepare your own spreadsheet file for import.
For security, passwords and PINs in exported forms are asterisks in the export file.
H-13
MCD Basic Installation and Maintenance Course
3. Select the Activity Parameters tab, and complete the following fields:
• Click on Select Activity and then select CSV File Import Application
• Select the file icon to open the Import Scheduler dialog box, and then select Browse.
• Navigate to the .CSV file and then select Next. A Validating Data dialog appears.
• Review and repair, if necessary, the data listed in the Import Preview window.
• Select Import. After the import is complete, select Submit and then OK to save the new
event. The new event is added to the event list.
• Ensure the File Name extension is correct. (.CSV, .TXT, .TAR, etc.).
• Select Submit and then select OK to save the new event. The new event is added to the
event list.
H-14 Scheduler_rev5.doc
SCHEDULER
You can schedule the system to switch from day service to night service and vice versa. Before
scheduling a night service event, complete basic programming for the Night Service feature:
• Click on Select Activity and then select Go to Day Service or Go to Night Service.
• Select Submit and then select OK to save the new event. The new event is added to the
event list.
H-15
MCD Basic Installation and Maintenance Course
• SMDR Records
• Audit Trail Logs
• Telephone Directory
• Traffic Logs
• IDS Synchronization Files
The files are saved to an FTP server in the network. Configure the FTP server parameters in the
External FTP Server form before scheduling a file transfer event.
Schedule file transfer events only for the local node. To schedule file transfer events for member
elements of an SDS Administrative Group, do so from the individual group members.
• In the Destination Directory, specify the location of the drive where the files are to be
stored.
• Select Submit and then select OK to save the new event. The new event is added to the
event list.
H-16 Scheduler_rev5.doc
SCHEDULER
After IDS has been programmed for a cluster or network, use the following procedures to
schedule data synchronization events.
• Full
• Incremental
Conditions
• The MCD contact point can perform queries in one domain or multiple domains, or it can
query the Global Catalog (GC) for all domains.
• If configured to query the GC, the MCD connects to the first GC server it finds and then
downloads the Partial Attribute Set (PAS). Where possible, the PAS should include the
LDAP attributes listed on the User Service Data to LDAP Attributes Mapping form. If
necessary, amend the schema to include attributes for important data.
• Full synchronization generates two comparison reports in LDAP Data Interchange Format
(LDIF):
| IncomingDSChanges_<date_timestamp>.ldf – contains instructions to modify existing
records, insert new records, and delete records that are no longer hosted by the queried
domain. Records that are not IDS-manageable are ignored.
| IDSManagedUsersWithNoDomain_<date_timestamp>.ldf – lists records that are IDS-
manageable but do not have a domain because they exist on MCD only. The
administrator can edit this file, adding distinguished names to the affected records, and
import it to the directory server.
• Incremental synchronization generates just the one comparison report in LDAP Data
Interchange Format (LDIF): IncomingDSChanges_<date_timestamp>.ldf
• The comparison reports are maintained in the /db /IDS/LDIF_query_results directory on
MCD, with the reports for each synchronization result saved in a separate sub-folder with a
unique date and time. Administrators can access the directory using FTP.
• By default, the system saves the five most recent comparison reports. To change this
setting, update the Maximum_Sets_of_IDS_Sync_Results field in the System Options form.
H-17
MCD Basic Installation and Maintenance Course
• Use Global Catalog If Configured – select to search for a GC server for all domains.
MCD connects to the first GC server it finds and downloads the Partial Attribute Set
(PAS). If MCD cannot find a GC server, it searches for directory servers in all domains.
You cannot enter a list of domains to query. All available will be queried.
• Domain Set – enter the domain names to query for LDAP updates. Use commas to
separate entries. Enter All or leave field blank to query all domains for directory servers
connected to the MCD contact point.
• Allow Delete Operation – select to allow records to be deleted from MCD. If the Sync
Type is Apply Updates, the system immediately deletes the records. If the Sync Type is
Detain Updates, the records are detained on the IDS Data Management form, where
they may then be deleted by the administrator. If the Sync Type is Compare Only, no
updates are applied to MCD, but the administrator may refer to the LDIF comparison
reports to determine which records have been deleted from the directory server.
• Select Submit and then select OK to save the new event. The new event is added to the
event list.
H-18 Scheduler_rev5.doc
SCHEDULER
4. Following completion of the scheduled synchronization event, check the IDS Data
Management form to resolve detained and failed updates. Check the Maintenance and
Software Logs to resolve problems with the synchronization process.
• Use Global Catalog If Configured – select to search for a GC server for all domains.
MCD connects to the first GC server it finds and downloads the Partial Attribute Set
(PAS). If MCD cannot find a GC server, it searches for directory servers in all domains.
• Domain Set – enter the domain names to query for LDAP updates. Use commas to
separate entries. Enter All or leave field blank to query all domains for directory servers
connected to the MCD contact point.
• Sync Records Modified Since Last Successful Sync – select to query for all updates
made since the last synchronization event. Clear to query for updates made since a
particular date and time.
H-19
MCD Basic Installation and Maintenance Course
• Sync Records Modified Since Date/Time – use to query for all updates made from a
particular date and time. The dialog boxes facilitate selection of the Month, Day and
Year, and the Hour, Minute and AM/PM. This date and time must be earlier than the
scheduled synchronization date and time.
• Use Default Query String – select to search for LDAP updates using the Default Query
String programmed on the IDS Connection form. The default value is objectClass=user,
which causes all user records to be queried. Clear to search for LDAP updates using a
particular, non-default query string.
• Query String – enter a non-default query string to search for LDAP updates. For
example, to search for all users in a research and development department, you may
enter "department = R and D". There is no restriction on the type of query string that you
enter, provided that it follows syntax rules outlined in RFC 2254. Only user objects are
queried, not invalid objects such as printers.
• Select Submit and then select OK to save the new event. The new event is added to the
event list.
4. Following completion of the scheduled synchronization event, check the IDS Data
Management form to resolve detained and failed updates. Check the Maintenance and
Software Logs to resolve problems with the synchronization process.
H-20 Scheduler_rev5.doc
SCHEDULER
The Scheduler can log out Hot Desk users at regular times, such as the end of every day.
Schedule the logouts to apply to all Hot Desk users, internal Hot Desk users only, or External
Hot Desk users only.
Only idle users are logged out at the scheduled time. Busy users are logged out when they
terminate their calls.
If an EHDU has the Permanent Login COS enabled, it is not logged out. If the user is currently
logged in to a MiNET device, then it is logged out that device and logged in as an EHDU.
• Select Submit and then select OK to save the new event. The new event is added to the
event list.
H-21
MCD Basic Installation and Maintenance Course
You can schedule the checking of a directory on an FTP server for software. If a new upgrade
or patch is available, the file is downloaded and made available for installation on the MCD as
part of another scheduled event. If nothing new is available, no files are downloaded.
In addition to software, you can also download licenses from the FTP server. Do this if the AMC
is inaccessible and MCD therefore needs to obtain licenses from an offline source.
If the AMC is inaccessible, you must generate the MCD's license file using the offline method
and then place the file on the FTP server.
The scheduled task will first determine if there is a new load available either on the persistent
storage media or the inactive partition. Assuming there is a new load, the upgrade will occur as
scheduled.
Note
Only one load can be present in the folder at a time.
H-22 Scheduler_rev5.doc
SCHEDULER
Optionally, you can create additional directories at the root level. This facilitates management
and distribution of software for individual business segments, customers, or physical sites. For
example, if you are a dealer with a customer named GENERIC and the new software load is
11.0.0.99 and a current software load is 11.0.0.98, you could create the following folder
structure:
GENERIC
MCD-3300
11
0
0
98
Only one file can be stored in each branch of the directory; the 98 folder in our examples.
The system searches the FTP server for software upgrades and patches. If a new load is found,
the download proceeds. Download does not proceed if:
H-23
MCD Basic Installation and Maintenance Course
3. Select the Activity Parameters tab, and complete the following fields:
• Host – enter the IP address or hostname of the FTP server. Proper DNS configuration is
required to use hostnames.
• Port – enter a port number between 0 and 65535 or use the default value for FTP, 21.
• Username – enter the login user name for the user account. This user account must be
programmed on the FTP server.
• Path – specify the root directory on the FTP server where you want to start searching for
software files.
| If no path is specified, the system assumes that a customer-level directory is not
present and begins searching for software in the mandatory directories of the file
structure, starting at the root directory.
| You can enter an FTP alias in place of a path if your FTP server supports it.
| In addition to regular ASCII characters, you may enter <, >, :, ", |, ?, and *.
• Select Submit and then select OK to save the new event. The new event is added to the
event list.
Provided that the FTP server can be accessed and there are no conflicting events, the
download will proceed as scheduled. To determine the current status of the event, examine the
status message list on the Scheduler form. Failed download events generate a maintenance
log.
H-24 Scheduler_rev5.doc
SCHEDULER
To activate the new software, the system reboots and swaps the active and inactive partitions.
Choose between three different activation options:
Optional email notification is available to inform personnel when each event in the upgrade
process is started and again when it ends. Email is also sent when an event in progress is
canceled from the Scheduler.
• A maintenance log is generated that describes changes to the system status caused by the
upgrade. For example, the status of alarms and the number of inactive devices is captured
in this log.
• A maintenance log is generated that describes whether the event was successful or
unsuccessful.
The software upgrade event can fail because:
H-25
MCD Basic Installation and Maintenance Course
If you specify a time for the software to be activated and the software is still being upgraded at
that time, activation will fail, the system will retain the original load, and a maintenance log will
be generated. To switch to the new software, issue the SWAP maintenance command.
Administrators can receive email notification of the system events by enabling the Alarm
Notification feature.
To license an offline system during an initial software installation, use the MCD Software
Installer to install the software. Refer to the Offline Licensing procedure in the MCD Software
Installer help for instructions on how to validate and install the license file.
H-26 Scheduler_rev5.doc
SCHEDULER
If Daily, Weekly, Monthly, or Yearly is selected, the dialog expands for customization of
the repeat interval.
If Repeats Interval is selected, specify the number of minutes between repeat events
and whether the event is to be repeated continuously or a fixed number of times.
3. Select the Activity Parameters tab, and complete the following fields:
• Select Submit and then select OK to save the new event. The new event is added to the
event list.
The event is performed as follows:
• When the event is scheduled to begin, the system checks to see that valid software is
available on the inactive partition, that there are no major or critical alarms, that the system
has sufficient RAM memory, and that neither a Programmed Reboot or Programmed
Failback have been programmed to occur during the event. If these conditions are met, the
system suspends any scheduled events that are currently taking place and proceeds with
the upgrade.
• The system installs and starts the latest version of MCD Software Installer within the ESM.
• The MCD Software Installer executes an online upgrade on the inactive partition. It backs up
the database, converts it into the format required by the new software, installs the software,
validates the licenses, and restores the database.
• If you have selected an activation option, the system reboots itself, either immediately or at
the time you specified, and then loads software onto the peripheral devices.
• The system performs a post-installation integrity check. If there are no problems, the
upgrade succeeds and processing switches to the newly active partition. If there are
unexpected IP devices or alarms, the upgrade fails and the system reverts back to the
original software on the original partition.
To determine the current status of the event, examine the status message list on the Scheduler
form. Upon completion of the event, a maintenance log is generated.
To view information regarding an event that is currently running, select View Trace. The Trace
Viewer opens, displaying a series of messages concerning the status of the upgrade.
H-27
MCD Basic Installation and Maintenance Course
• Another event is running. All active events, such as backups and CSV file imports, are
suspended while the activation proceeds.
• The new software cannot be switched from the inactive to the active partition.
• The software can be switched to the active partition, but is deemed to be unreliable due to
major or critical alarms or too many devices or trunks that may be left out of service.
Administrators can receive email notification of the system events by enabling the Alarm
Notification feature.
3. Select the Activity Parameters tab and complete the following fields:
• Click on Select Activity and then select Software Activation. Allow sufficient time for the
software upgrade to finish before it is activated.
• When the event is scheduled to begin, the system checks to see that software is not
currently being upgraded, that there are no major or critical alarms, that the system has
sufficient RAM memory, and that neither a Programmed Reboot or Programmed Failback
have been programmed to occur during the event. If these conditions are met, the system
suspends any scheduled events that are currently taking place and proceeds with the
activation.
• The system reboots itself and then loads new software onto the peripheral devices.
• The system performs a post-installation integrity check. If there are no problems, the
activation succeeds and processing switches to the newly active partition. If there are
unexpected IP devices or alarms, the activation fails and the system reverts back to the
original software on the original partition.
To determine the current status of the event, examine the status message list on the Scheduler
form. Upon completion of the event, a maintenance log is generated.
To view information regarding an event that is currently running, select View Trace. The Trace
Viewer opens, displaying a series of messages concerning the status of the activation.
H-29
MCD Basic Installation and Maintenance Course
Reference
Please refer to your lab workbook.
H-30 Scheduler_rev5.doc