EasyManuals Logo

Avaya JEM24 User Manual

Avaya JEM24
353 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #8 background imageLoading...
Page #8 background image
Hunt Group Busy Position.............................................................................................. 177
Automatic Callback........................................................................................................ 177
Priority Call................................................................................................................... 178
Voicemail...................................................................................................................... 178
Malicious call tracing...................................................................................................... 180
Pre-configuration of keys............................................................................................... 180
Active call shortcut keys................................................................................................. 183
No Hold Conference...................................................................................................... 184
Calling party number blocking........................................................................................ 185
Calling party number unblocking..................................................................................... 185
WML browser................................................................................................................ 185
Chapter 8: Security............................................................................................................... 188
Security overview................................................................................................................ 188
Access control and security.................................................................................................. 189
Certificate management....................................................................................................... 190
Phone identity certificates.............................................................................................. 191
Trusted certificates........................................................................................................ 193
OCSP trust certificates................................................................................................... 193
Configuration for secure installation...................................................................................... 194
Chapter 9: Data Privacy Controls Addendum.................................................................... 196
Purpose.............................................................................................................................. 196
Data categories containing personal data (PD)...................................................................... 196
Personal data human access controls................................................................................... 197
Personal data programmatic or API access controls......................................................... 197
Personal data at rest encryption controls............................................................................... 198
Personal data in transit encryption controls............................................................................ 198
Personal data retention period controls................................................................................. 199
Personal data export controls and procedures....................................................................... 199
Personal data view, modify, delete controls and procedures.................................................... 200
Personal data pseudonymization operations statement.......................................................... 200
Chapter 10: Failover and survivability................................................................................ 202
Redundancy with IP phone and Avaya Aura
®
......................................................................... 202
Detection of loss of connection............................................................................................. 202
Failover to a backup proxy................................................................................................... 203
Restoring the phone to the primary proxy.............................................................................. 203
Proxy determination when the connection to the primary proxy is lost...................................... 204
Simultaneous registration..................................................................................................... 204
Limitations during failover or failback..................................................................................... 205
Preserved call..................................................................................................................... 205
Limitations of call preservation........................................................................................ 205
Limitations after a successful failover.................................................................................... 206
Indications of redundancy.................................................................................................... 207
Supported non Avaya Aura
®
proxies for redundancy.............................................................. 207
Contents
July 2019 Installing and Administering Avaya J100 Series IP Phones 8
Comments on this document? infodev@avaya.com

Table of Contents

Other manuals for Avaya JEM24

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Avaya JEM24 and is the answer not in the manual?

Avaya JEM24 Specifications

General IconGeneral
BrandAvaya
ModelJEM24
CategoryIP Phone
LanguageEnglish

Related product manuals