Aastra Telecom 41-001343-02 IP Phone User Manual


 
Configuration Methods
2-2 41-001343-02 REV04 – 05.2014
Configuration Methods
Description
You can use the following to setup and configure the IP phone:
IP phone UI
Aastra Web UI
Configuration files
The following paragraphs describe each method of configuring the IP Phone.
IP Phone UI
The IP Phone User Interface (UI) provides an easy way to access features and functions for using and configuring the IP
phone. Access to specific features and functions are restricted to the Administrator. A User can configure a subset of
these features and functions. Users of the IP phones should see their <Model-Specific> IP Phone User Guide for available
features and functions.
Reference
Refer to Chapter 1, the section “IP Phone Models” on page1-2 for keys specific to your phone model.
For more information about using the hard keys on each phone, see Chapter 5, the section, “Locking IP Phone Keys” on
page5-49.
For more information about the softkeys/programmable keys, see Chapter 5, the section, “Softkeys/Programmable
Keys/Feature Keys/Expansion Module Keys” on page5-104.
Options Key
The Options key allows you to access the "Options List" on the IP phone. Accessible options in this list are for both User
and Administrator use. The Administrator must enter a password for administrator options.
This document describes the administrator options only. For a description of the user options in the "Options List", see
your <Model-Specific> IP Phone User Guide.
Note:
Not all parameters are available from all three methods. For more information about configuring the phone, see Chap-
ter 4, Chapter 5, and Chapter 6.
Note:
An Administrator can apply a simplified options menu to the IP phones. An Administrator can also enable and disable
the use of an Administrator password protection in the IP phone UI. These features are configurable using the config-
uration files only. For more information about these features, see Chapter 3, the section, “Simplified IP Phone UI
Options Menu” on page page3-4, and Chapter 5, the section, “Administrator Passwords” on page5-7.