94 eud-1280/1.0 – R1.0 – 12.2010Symbols*/# Procedures ................................................................81AAbsence key ................................................................3, 39Accessories (Safety information) ................................ 6Alphasearch .....................................................................26Ambient conditions (Safety information) ............... 6Announcement:Protection setting ...................................................72receiving .....................................................................34starting ........................................................................33Answering a call .............................................................13Audio ..................................................................................67BBrokering ..........................................................................36CCall duration ....................................................................13Call Forwarding on No Reply .....................................42Call Forwarding Unconditional ......................... 41, 44Call key ................................................................................. 3Call list ........................................................................ 28, 29Call routing .......................................................................57Call waiting:answering ..................................................................32on an internal user ..................................................31Protection setting ...................................................72Callback:answering ..................................................................31requesting .................................................................30Changing the PIN ...........................................................70Charges ...............................................................13 , 34, 54CLIP .....................................................................................56CLIR .....................................................................................56Communication system ..............................................71Conference call ...............................................................36Configurable key .............................................................. 4Configuring presence ...................................................76Configuring the DTMF mode .....................................69Connect .............................................................................37Connecting:IP phone .....................................................................89IP phone to the LAN ...............................................90Phone ..........................................................................88Power supply ............................................................90to the system ............................................................88Connections (Safety information) ............................. 6Correcting your input ...................................................21Correction key ................................................................... 3Cost control (Safety information) .............................. 6DData protection (Safety information) ....................... 6Deflect ................................................................................49Deflect a call during the ringing phase .................49Desk phone ......................................................................84Dialling by name ............................................................26Dialling:by name ......................................................................25from call list of answered calls ...........................29from call list of unanswered calls ......................28from external phone books ................................27from the phone book ............................................26with a configurable key ........................................30with phone number ...............................................14with redial .......................................................... 14 , 29Digit keys ..........................................................................19Discreet ringing ..............................................................56Dismantling .....................................................................87Display symbols ............................................................... 5Display:Display contrast .......................................................66Display symobls .......................................................17Display text ...............................................................17set .................................................................................66Disposal (Safety information) ...................................... 6Do not disturb:Protection setting ...................................................72Document information .................................................. 9DTMF .......................................................................... 53 , 69EEnd key ................................................................................ 3Ending a call ....................................................................13Index