Features
443
System functions and features as of R3.0
syd-0367/1.3 – R3.0 – 03.2013
If B is making an exchange all, Silent intrusion will only work if this feature is also en-
abled for exchange calls, throughout the system.
Notes:
– In connection with the Silent intrusion feature, relevant national data
protection regulations must be observed.
–One Silent Intrusion licence is required to be able to use the Silent intru-
sion feature.
– Silent intrusion is not possible in all cases and in certain cases may
cause a crackling sound (see Tab. 234).
– Analogue terminals cannot switch directly from the Silent intrusion
state to Intrusion. The microphone is always active with these termi-
nals.
Connections overview
Silent intrusion is not possible in all cases and not absolutely silent. For IP-IP, IP-SIP
and SIP-SIP connections, the media is switched directly and not via the system. In
these cases the connection must first be fetched into the system for the intrusion,
causing a faint crackling. Prerequisites for this procedure are sufficient VoIP licenses
and DSP resources.
Tab. 234 Silent intrusion: Connections
Intruding terminal
Existing connection combination DSI, DECT, IP, FXS ISDN, SIP
External (ISDN, FXS) — internal (any) Silent Not possible
External SIP — internal (DSI, DECT, ISDN, FXS) Silent Not possible
External SIP — internal (IP, SIP) Audible crackling Not possible
Internal (IP, SIP) — internal (IP, SIP) Audible crackling Not possible
Internal (DSI, DECT, ISDN, FXS) — internal (DSI, ISDN, FXS, IP,
SIP)
Silent Not possible
Internal (DECT) — internal (DECT) Not possible Not possible
External (any) — external (any) Not possible Not possible