User Manual smar-tel-i
59
Progr
am
mi
ng
When operating on the network terminal of your Euro-ISDN connection “Malicious Caller
Identification“ allows you to have the switching location determine the telephone number of
a malicious caller. The following requirements must be met:
앫
The “Malicious Caller Identification“ feature (MCID) must be requested from and con-
firmed by your provider.
앫
The “Malicious Caller Identification“ function must be activated in your smar-tel-i.
앫
One of the targeted dialing keys
_
through
}
must be installed as the “malicious
caller identification“ key. In order to catch a malicious caller, press this key during the call
or up to 30 seconds after replacing the receiver.
Example: Activate the “Malicious Caller Identification“ function.
Example: Put the “Malicious Caller Identification“ function on the target dial key
}
.
The programming of the target dial key can not be changed until the “Malicious Caller
Identification“ function has been deactivated.
5. 8. 5
Malicious Caller Identification
Search for the function under the menu-group
USEFUL
APPLICATIONS
(refer to page 31).
change
A
Open the menu.
on
A
Activate “Malicious caller identification“.
ok
A
Store the setting.
}
Select the target dial key.
change
A
Open the menu.
**1
Enter the following symbols.
(Inputting Numbers: refer to page 32)
ok
A
Store the setting.
This function is not available when operating an AUERSWALD PBX.
Trace Caller OFF
change next
Trace Caller OFF
ok on
Trace Caller ON
ok off
13.08.97 14:15
--> MSN
M6:
ok change
M6: _
ok < > del
M6: **1_
ok < > del