User's Manual
Table Of Contents
- Gigaset DX800A all in one - your perfect companion
- Base overview
- Display icons
- Contents
- Safety precautions
- First steps
- Operating the base
- Menu tree
- Making calls
- Making calls using network services
- Using lists
- Using directories
- Using the local base directory
- Directory entries
- Saving number(s) in the directory - new entry
- Order of directory entries
- Searching for a directory entry
- Dialling with the directory
- Managing directory entries
- Exchanging directory/entries with handsets
- Transferring the directory/entries as a vCard with Bluetooth
- Receiving a vCard with Bluetooth
- Adding a displayed number to the directory
- Copying a number or e-mail address from the directory
- Saving an anniversary in the directory
- Using online directories
- Using the private net directory
- Using the Gigaset.net directory
- Using the local base directory
- Making cost-effective calls
- E-mail notifications
- Info centre - continuous Internet access from your phone
- Operating the base's answering machine
- Operating via the base
- Activating/deactivating and setting answering machine mode
- Recording a personal announcement/advisory message
- Playing back announcements
- Deleting announcements/advisory messages
- Playing back messages
- Deleting messages
- Accepting a call from the answering machine
- Diverting an external call to the answering machine
- Activating/deactivating two-way record
- Activating/deactivating call screening
- Setting the recording parameters
- Operating when on the move (remote operation)
- Operating via the base
- Using the network mailbox
- ECO DECT: Reducing energy consumption and radiation
- Setting an appointment (calendar)
- Setting the alarm clock
- Connecting/using other devices
- Registering handsets
- De-registering handsets
- Locating a handset (paging)
- Making internal calls
- Changing the name of an internal party
- Changing the internal number of an internal party
- Using Bluetooth devices
- Activating/deactivating Bluetooth mode
- Registering Bluetooth devices
- Editing the list of known (trusted) devices
- Rejecting/accepting an unregistered Bluetooth device
- Changing the Bluetooth name of the base
- Using a Bluetooth headset
- Using data devices
- Using GSM mobiles (Link2mobile)
- Simultaneous Bluetooth connections
- Connecting a fax machine
- Connecting and using a wire-bound headset
- Setting up the base
- Configuring the system settings
- Setting the date and time manually
- Protecting against unauthorised access
- Setting your own area code
- Setting the base's IP address in LAN
- Setting up/deleting connections (MSNs)
- Configuring VoIP connections
- Assigning send and receive connections to internal parties
- Updating the phone firmware
- Activating/deactivating the DECT interface
- Activating/deactivating the FAX port
- Restoring the base to the default settings
- Checking the base's MAC address
- Changing the default connection
- Connecting the base to a PABX
- Industry Canada Certification
- FCC / ACTA Information
- Service (Customer Care)
- Environment
- Appendix
- Glossary
- Accessories
- Index
170
Glossary
SIP proxy server
IP address of your VoIP provider's gateway
server.
Static IP address
See
Fixed IP address.
STUN
Simple Transversal of UDP over NAT
NAT control mechanism.
STUN is a data protocol for VoIP telephones.
STUN replaces the private IP address in the
VoIP telephone data packets with the public
address of the secure private network. To
control data transfer, a STUN server is also
required on the Internet. STUN cannot be
implemented with symmetric NATs.
See also:
ALG, Firewall, NAT, Outbound
proxy
.
Subnet
Segment of a Network.
Subnet mask
IP addresses consist of a fixed line number
and a variable subscriber number. The net-
work number is identical for all
Network
subscriber
s. The size of the network number
part is determined in the subnet mask. In the
subnet mask 255.255.255.0, for example, the
first three parts of the IP address are the net-
work number and the last part is the sub-
scriber number.
Symmetric NAT
A symmetric NAT assigns different external
IP addresses and port numbers to the same
internal IP addresses and port numbers –
depending on the external target address.
T
TCP
Transmission Control Protocol
Transport protocol. Session-based trans-
mission protocol: it sets up, monitors and
terminates a connection between sender
and recipient for transporting data.
TLS
Transport Layer Security
Protocol for encrypting data transmissions
on the Internet. TLS is a superordinated
Transport protocol.
Transmission rate
Speed at which data is transmitted in the
WAN or LAN. The transmission rate is meas-
ured in data units per unit of time (Mbit/s).
Transport protocol
Controls data transport between two com-
munication partners (applications).
See also:
UDP, TCP, TLS.
U
UDP
User Datagram Protocol
Transport protocol. Unlike TCP, UDP is a
non session-based protocol. UDP does not
establish a fixed connection. The data pack-
ets ("datagrams") are sent as a broadcast.
The recipient is solely responsible for mak-
ing sure the data is received. The sender is
not notified about whether it is received or
not.
URI
Uniform Resource Identifier
Character string for identifying resources
(e.g., e-mail recipient, http://gigaset.com,
files).
On the
Internet, URIs are used as a uniform
identification for resources. URIs are also
described as SIP addresses.
URIs can be entered in the phone as a
number. By dialling a URI, you can call an
Internet subscriber with VoIP equipment.