Aastra 5361 User manual Aastra 5361/5361ip - Page 112

Index, A, B, C, D - ip

Page 112 highlights

Index A Aastra Alarm Server 73 Absence information 52 Accessories (Safety information 6 Acknowledging an appointment call 63 Actions following an alarm 63 Alarm melodies 82 Alpha search 33 Ambient conditions (Safety information 6 Announcement: Protection setting 86 receiving 43 starting 42 Answering a call 20 Audio 81 B Brokering 45 C Call duration 20 Call forwarding: on No Reply 54 Protection setting 86 to text message 56 to voice mail 55 Unconditional 53 Call key 16 Call list 36 Call routing 68 Call waiting: answering 41 on an internal user 40 Protection setting 86 Callback: answering 39 requesting 38 Changing the PIN 84 Charges 20, 43, 64 Clearing a key 95 CLIP 67 CLIR 67 Communication system 85, 111 Conference call 45 Configurable key 16 Configuring: key 92 presence 90 presence profile 90 voice mail 88 Connect 46 Connecting: IP phone 106 Phone 105 the power supply 107 your IP phone to the LAN 106 your phone to the system 105 Connections (Safety information 6 Contact 87 Correcting your input 27 Correction key 15 Cost control (Safety information 6 Creating a new phone book entry 87 D Data protection 10 Data protection (Safety information 6 Deflecting: a call during the ringing phase 39 voice messages 60 Deleting a phone book entry 88 Desk phone 102 Dialling: by name 32 from external phone books 35 from private contacts 34 from the call list of answered calls 36 from the call list of unanswered calls 36 from the phone book 33 with a configurable key 37 with redial 21, 37 with the phone number 21 Digit keys 26 Direct response 73 112 Aastra 5361/Aastra 5361ip eud-1280/1.2 - R3.0 - 04.2013

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115

112
Aastra 5361/Aastra 5361ip
eud-1280/1.2 – R3.0 – 04.2013
A
Aastra Alarm Server
.......................................................
73
Absence information
....................................................
52
Accessories (Safety information)
................................
6
Acknowledging an appointment call
.....................
63
Actions following an alarm
........................................
63
Alarm melodies
...............................................................
82
Alpha search
....................................................................
33
Ambient conditions (Safety information)
...............
6
Announcement:
Protection setting
...................................................
86
receiving
.....................................................................
43
starting
........................................................................
42
Answering a call
.............................................................
20
Audio
..................................................................................
81
B
Brokering
..........................................................................
45
C
Call duration
....................................................................
20
Call forwarding:
on No Reply
...............................................................
54
Protection setting
...................................................
86
to text message
.......................................................
56
to voice mail
..............................................................
55
Unconditional
...........................................................
53
Call key
...............................................................................
16
Call list
................................................................................
36
Call routing
.......................................................................
68
Call waiting:
answering
..................................................................
41
on an internal user
..................................................
40
Protection setting
...................................................
86
Callback:
answering
..................................................................
39
requesting
.................................................................
38
Changing the PIN
...........................................................
84
Charges
...............................................................
20
,
43
,
64
Clearing a key
..................................................................
95
CLIP
.....................................................................................
67
CLIR
.....................................................................................
67
Communication system
....................................
85
,
111
Conference call
...............................................................
45
Configurable key
............................................................
16
Configuring:
key
................................................................................
92
presence
.....................................................................
90
presence profile
.......................................................
90
voice mail
...................................................................
88
Connect
.............................................................................
46
Connecting:
IP phone
..................................................................
106
Phone
.......................................................................
105
the power supply
.................................................
107
your IP phone to the LAN
..................................
106
your phone to the system
.................................
105
Connections (Safety information)
..............................
6
Contact
..............................................................................
87
Correcting your input
...................................................
27
Correction key
.................................................................
15
Cost control (Safety information)
..............................
6
Creating a new phone book entry
...........................
87
D
Data protection
..............................................................
10
Data protection (Safety information)
.......................
6
Deflecting:
a call during the ringing phase
..........................
39
voice messages
........................................................
60
Deleting a phone book entry
....................................
88
Desk phone
...................................................................
102
Dialling:
by name
......................................................................
32
from external phone books
.................................
35
from private contacts
............................................
34
from the call list of answered calls
....................
36
from the call list of unanswered calls
..............
36
from the phone book
............................................
33
with a configurable key
........................................
37
with redial
..........................................................
21
,
37
with the phone number
.......................................
21
Digit keys
..........................................................................
26
Direct response
...............................................................
73
Index