Configuring modem settings, Checking for software updates, Configuring voice mail – Nortel Networks BCM200/400 User Manual
Page 221: Customizing security policies
Chapter 18 Completing the initial installation (optional)
221
BCM200/400 4.0 Installation and Maintenance Guide
6
Select the type of MBM that you installed in that location.
7
Click Enable.
8
Repeat steps 4 to 7 to enable each MBM in your system.
You can set other parameters for the MBMs depending on the type of MBM you installed.
Configuring modem settings
Your system modem is either enabled or disabled, depending on the configuration you chose
during your basic configuration. If you plan on using the modem for management tasks, you can
customize its settings, including dial-in and dial-out settings, depending on your specific needs.
Refer to the BCM 4.0 Networking Configuration Guide for information on configuring the modem.
Checking for software updates
Nortel frequently updates the BCM software. Therefore, a standard part of any installation is to
ensure your system has the latest version of the software.
Refer to the BCM 4.0 Administration Guide for information on checking for and installing
software updates.
Configuring voice mail
Your voice mail system was initialized during the basic configuration of your BCM system. You
must still configure your voice mail to take advantage of the many feature available.
If you need to perform further configuration tasks, refer to the documentation for your voice mail
system.
Refer to the CallPilot Manager Set Up and Operation Guide for information on using the
web-based interface to configure your voice mail system, or refer to the CallPilot Telephone
Administation Guide for information on using Telset Administration to configure your voice mail
system.
Customizing security policies
You configured a system password and security settings during the basic configuration of your
BCM system. Depending on your needs, you can choose to perform further configuration of the
security policies.
Refer to the BCM 4.0 Administration Guide for information on customizing the security policies.