8
Contents
Privacy/security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .104
User password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Locking the telephone to prevent unauthorized use . . . . . . . . . . . . . . 105
Activating/deactivating "Do not disturb". . . . . . . . . . . . . . . . . . . . . . . . 106
Activating/deactivating "Speaker call protect" . . . . . . . . . . . . . . . . . . . 107
Caller ID suppression. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Identifying anonymous callers (trace call) . . . . . . . . . . . . . . . . . . . . . . 108
More functions/services. . . . . . . . . . . . . . . . . . . . . .109
Using another telephone in the same way as your own . . . . . . . . . . . 109
Logging on to another phone. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Logging off from another phone . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Making calls with multiple lines . . . . . . . . . . . . . .111
Line keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Line utilization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Preview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Answering calls with the line keys . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Answering calls in the sequence in which they are offered . . . . . 114
Answering calls preferentially . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Deactivating/activating ringing (call). . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Dialing with line keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Saved number redial for a specific line . . . . . . . . . . . . . . . . . . . . . . . . 117
Last number dialed for a specific line . . . . . . . . . . . . . . . . . . . . . . . . . 117
Saving phone numbers for "Redial on a line" . . . . . . . . . . . . . . . . . . . . 118
Line mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Retrieving messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Identifying the line used . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Making calls on multiple lines alternately . . . . . . . . . . . . . . . . . . . . . . 120
Ending the connection on a line key . . . . . . . . . . . . . . . . . . . . . . . 121
Entering a call on a line
(three-party conference) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Allowing or blocking a party from joining a call . . . . . . . . . . . . . . . . . . 121
Allowing a party to join a call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Blocking other parties from joining a call . . . . . . . . . . . . . . . . . . . . 122
Ending the connection on a line key . . . . . . . . . . . . . . . . . . . . . . . 122
Third-party monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Holding and re-accepting a call on a line key. . . . . . . . . . . . . . . . . . . . 124
Exclusively holding and re-accepting a call on a line key . . . . . . . . . . 124
Accepting a specific held line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Forwarding calls on lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Ring transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126