H2 DeskPhone   
H2P DeskPhone 
 
 
 
8AL90394ENAAed01  9  /111 
 
Figure 117 - Dialing rules table (3) ..................................................................................................... 89 
Figure 118 - Dialing rules table (4) ..................................................................................................... 89 
Figure 119 - Tone settings on the web................................................................................................ 97 
Figure 120 - Managing cloud phonebooks ......................................................................................... 98 
Figure 121 - LDAP setting ................................................................................................................... 99 
Figure 122 - Cloud phonebook browsing ......................................................................................... 100 
Figure 123 - Global key settings ....................................................................................................... 103 
Figure 124 - Programmable key settings ......................................................................................... 103 
Figure 125 - Web filter settings ......................................................................................................... 104 
Figure 126 - Web Filter Table............................................................................................................ 104 
Figure 127 - Certificate of settings ................................................................................................... 105 
Figure 128 - Device certificate setting .............................................................................................. 105 
Figure 129 - Network firewall settings .............................................................................................. 106 
Figure 130 - Firewall input rule table ................................................................................................ 107 
Figure 131 - Delete firewall rules ...................................................................................................... 107 
Figure 132 - Screenshot ................................................................................................................... 108 
Figure 133 - Web capture ................................................................................................................. 109