Contents
Using call forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Activating and deactivating forwarding using features settings . . . 57 System call forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Call forwarding via code numbers . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Delayed
Storing a destination for another
telephone/activating call forwarding . . . . . . . . . . . . . . . . . . . . . . . . 61 Storing a destination for fax, PC or busy/activating call forwarding . 62 Checking/deactivating call forwarding for another telephone . . . . . 63 Checking/deactivating call forwarding for fax, PC or busy . . . . . . . . 64 Changing call forwarding for another terminal . . . . . . . . . . . . . . . . . 64
Saving Functions and Appointments . . . . . . . . . . . 65
Saving individual speed dialing numbers . . . . . . . . . . . . . . . . . . . . . . . . 65 Saving a function on a key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Appointments Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Creating timed reminders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Timed reminders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Making project calls . . . . . . . . . . . . . . . . . . . . . . . . . 68
Setting up a project call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Call duration display (cost display) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Private Sphere/Security . . . . . . . . . . . . . . . . . . . . . 70
Activating/deactivating do not disturb . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Suppressing your number on called party’s display . . . . . . . . . . . . . . . 71 Malicious call holding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Locking your telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Using Other Functions . . . . . . . . . . . . . . . . . . . . . . . 73
Using a different telephone
in the same way as your own . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Logging on to a different telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Identifying yourself with PIN and dialing . . . . . . . . . . . . . . . . . . . . . 73 Deactivating identification at the other telephone . . . . . . . . . . . . . . . . . 74
5