Hunt Group Busy Position.............................................................................................. 177
Automatic Callback........................................................................................................ 177
Priority Call................................................................................................................... 178
Voicemail...................................................................................................................... 178
Malicious call tracing...................................................................................................... 180
Pre-configuration of keys............................................................................................... 180
Active call shortcut keys................................................................................................. 183
No Hold Conference...................................................................................................... 184
Calling party number blocking........................................................................................ 185
Calling party number unblocking..................................................................................... 185
WML browser................................................................................................................ 185
Chapter 8: Security............................................................................................................... 188
Security overview................................................................................................................ 188
Access control and security.................................................................................................. 189
Certificate management....................................................................................................... 190
Phone identity certificates.............................................................................................. 191
Trusted certificates........................................................................................................ 193
OCSP trust certificates................................................................................................... 193
Configuration for secure installation...................................................................................... 194
Chapter 9: Data Privacy Controls Addendum.................................................................... 196
Purpose.............................................................................................................................. 196
Data categories containing personal data (PD)...................................................................... 196
Personal data human access controls................................................................................... 197
Personal data programmatic or API access controls......................................................... 197
Personal data at rest encryption controls............................................................................... 198
Personal data in transit encryption controls............................................................................ 198
Personal data retention period controls................................................................................. 199
Personal data export controls and procedures....................................................................... 199
Personal data view, modify, delete controls and procedures.................................................... 200
Personal data pseudonymization operations statement.......................................................... 200
Chapter 10: Failover and survivability................................................................................ 202
Redundancy with IP phone and Avaya Aura
®
......................................................................... 202
Detection of loss of connection............................................................................................. 202
Failover to a backup proxy................................................................................................... 203
Restoring the phone to the primary proxy.............................................................................. 203
Proxy determination when the connection to the primary proxy is lost...................................... 204
Simultaneous registration..................................................................................................... 204
Limitations during failover or failback..................................................................................... 205
Preserved call..................................................................................................................... 205
Limitations of call preservation........................................................................................ 205
Limitations after a successful failover.................................................................................... 206
Indications of redundancy.................................................................................................... 207
Supported non Avaya Aura
®
proxies for redundancy.............................................................. 207
Contents
July 2019 Installing and Administering Avaya J100 Series IP Phones 8
Comments on this document? infodev@avaya.com