Instruction manual

System Features
INTER-TEL
®
5000 ADMINISTRATOR GUIDE Issue 2.3, September 2007
System Capacities for Phantom Devices
Page 261
System Capacities for Phantom Devices
Phantoms consume the same software resources as a regular endpoint or IP endpoint, with the
exception of the voice paths. Therefore, they can have an impact on system performance. The
default capacities for phantoms are shown in Table 38.
Practical Uses
The following scenarios describe phantom configuration uses:
A phantom can be configured as a stand-alone device. An employee could have a cell
phone to use when they are not in the office but still need to be on the office communi-
cations system. The administrator could program a phantom for them and the employee
(or administrator) could forward the phantom to the cell phone, using UC. That way,
callers could still call an extension on the office switch and be able to get the employee
on his or her cell phone. In the extreme case, all devices on the switch could be phan-
toms for users with cell or other phones that are not physically connected to the switch.
A phantom can be configured as a monitoring device. For instance, a user may put a
phantom device in a hunt group and program an endpoint button to map to that phantom
extension. With this setup, a user can monitor when the phantom is ringing, etc., and
even answer the call either via a reverse transfer or a secondary extension key.
A phantom can be configured as a call-park extension. The user may want to set up one
or two (or more) phantoms to be extensions at which a call can be parked.
A phantom can be configured as a general mailbox because phantoms can have associ-
ated mailboxes. When a caller calls the phantom, if the phantom is set up to go to voice
mail, the caller can leave a message in this “general” mailbox. However, this configura-
tion is not much different from an unassociated mailbox, with the exception that a phan-
tom mailbox can be accessed off-node, but an unassociated mailbox cannot. Note that
unassociated mailboxes can be accessed off-node if a caller calls the appropriate voice
mail application and enters the unassociated mailbox extension.
Table 38.
Phantom Devices Default Capacities
System Type
Maximum
Phantoms
CS-5200
75
CS-5400
175
CS-5600
250