SECURITY ......................................................................................... 8
Security information .................................................................................8
Power connection .....................................................................................8
Telephone connection ..............................................................................8
INSTALLATION ............................................................................... 9
Power supply ..........................................................................................10
Test .........................................................................................................10
Redial list ................................................................................................15
Purpose .........................................................................................................15
Deleting an entry ..........................................................................................16
Storing an entry ............................................................................................17
Call log ...................................................................................................20
Identifying the caller .....................................................................................20
Call log function ...........................................................................................20
Viewing the call log ......................................................................................20
key .......................................13
Contents
Contents
1