Ascotel IntelliGate 2025/2045/2065
512 Features Part 2
connection and the call charges are charged to his charge counter: The called
party sees the caller's subscriber number and not the number of the terminal
being used by the caller.
In this way an authorized user can use even unlocked terminals with his own set-
tings.
For reasons of data protection no entry is made in the redial register.
See also:
"Making calls with your own settings on a third-party telephone", page
489
Unlocking a third-party terminal
An authorized user unlocks someone else's terminal. After unlocking it, he can
either dial directly within the next 12 seconds or hang up and prefix dial a number
within 60 seconds.
The following remain locked and inaccessible:
• Operation of terminal settings
• Use of the terminal's private phone book
• Dialling by name
Typical application: Unlocking non-personal terminals in publicly accessible
premises (meeting rooms, entrance lobbies, coffee-break areas).
Tip:
Configure a key with the unlock function.
Unlocking your own terminal
An authorized user unlocks his own terminal. After unlocking it he can either dial
directly within the next 12 seconds or hang up and dial a number within
60 seconds using prefix dialling or dialling by name. Both the terminal settings
and the private phone book are available during those 60 seconds.