User guide

8
Contents
Privacy/security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111
Voice encryption (only for HiPath 2000/3000/5000/OpenOffice EE) . . 111
Notes on voice encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
User password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Turning ringer cutoff on and off. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Deactivating the ring tone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Do not disturb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Suppressing your phone number on the called party’s phone . . . . . . 114
Monitoring a room. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Trace call: identifying anonymous callers (not for U.S.). . . . . . . . . . . . 116
Locking the telephone to prevent unauthorized use . . . . . . . . . . . . . . 117
Locking another telephone to prevent unauthorized use . . . . . . . . . . 118
Saving your PIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
More functions/services. . . . . . . . . . . . . . . . . . . . . .120
Appointments function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Saving appointments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Using timed reminders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Sending a message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Creating and sending a message. . . . . . . . . . . . . . . . . . . . . . . . . . 122
Viewing and editing incoming messages. . . . . . . . . . . . . . . . . . . . 123
Leaving an advisory message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Deleting advisory messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Displaying the number of waiting calls/overload display . . . . . . . . . . . 125
Using another telephone like your own for a call . . . . . . . . . . . . . . . . 125
Using a mobile connection at another phone . . . . . . . . . . . . . . . . . . . 126
Mobility variants. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Logging on to the "guest telephone" . . . . . . . . . . . . . . . . . . . . . . . 128
Moving the connection to the next telephone. . . . . . . . . . . . . . . . 129
Logging off the "guest telephone" . . . . . . . . . . . . . . . . . . . . . . . . . 129
Fax details and message on answering machine . . . . . . . . . . . . . . . . 130
Resetting services and functions
(system-wide cancellation for a telephone) . . . . . . . . . . . . . . . . . . . . . 130
Activating functions for another telephone . . . . . . . . . . . . . . . . . . . . . 131
Using system functions from outside
DISA (direct inward system access) . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Using functions in ISDN via code dialing (keypad dialing) . . . . . . . . . . 134
Controlling Connected Computer or
Their Programs/Tel. Data Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Communicating with PC applications over a CSTA interface . . . . . . . 136
Controlling relays (only for HiPath 3000) . . . . . . . . . . . . . . . . . . . . . . . 137
Sensors (HiPath 33x0/35x0 only). . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Radio paging (not for U.S.). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138