Saving functions and appointments, Making project calls, Private sphere/security – Siemens OptiPoint 410 User Manual
Page 5: Using other functions
Contents
5
Activating and deactivating forwarding using features settings . . . 57
System call forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Call forwarding via code numbers . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Call-forwarding via call-forwarding key. . . . . . . . . . . . . . . . . . . . . . . 59
Storing a destination for another
telephone/activating call forwarding . . . . . . . . . . . . . . . . . . . . . . . . 61
Storing a destination for fax, PC or busy/activating call forwarding . 62
Checking/deactivating call forwarding for another telephone . . . . . 63
Checking/deactivating call forwarding for fax, PC or busy . . . . . . . . 64
Changing call forwarding for another terminal . . . . . . . . . . . . . . . . . 64
Saving Functions and Appointments . . . . . . . . . . . 65
Saving individual speed dialing numbers . . . . . . . . . . . . . . . . . . . . . . . . 65
Saving a function on a key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Appointments Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Creating timed reminders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Timed reminders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Making project calls . . . . . . . . . . . . . . . . . . . . . . . . . 68
Setting up a project call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Call duration display (cost display) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Private Sphere/Security . . . . . . . . . . . . . . . . . . . . . 70
Activating/deactivating do not disturb . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Suppressing your number on called party’s display . . . . . . . . . . . . . . . 71
Malicious call holding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Locking your telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Using Other Functions . . . . . . . . . . . . . . . . . . . . . . . 73
Identifying yourself with PIN and dialing . . . . . . . . . . . . . . . . . . . . . 73
Deactivating identification at the other telephone . . . . . . . . . . . . . . . . . 74