Security settings, Closed user group (cug), Activating a closed user group – Samsung SGH-R220 User Manual

Page 46

Advertising
background image

89

S

Se

ettttiin

ng

gss

88

S

Se

ettttiin

ng

gss

CLIR (Calling Line Identification Restriction) /
COLR (Connected Line Identification Restriction)
If these network functions are active, your phone
number is not displayed on the called person’s phone.

Closed User Group (CUG)

This network service allows incoming and outgoing
calls to be restricted to a selected user group. You
may be a member of up to 10 user groups.
For details on how to create, activate and use a
closed user group, contact your service provider.

Example: A company lends SIM cards to its

employees and wants to restrict outgoing
calls to members of the same team.

Activating a Closed User Group

If you select the Closed User Group menu, you are
asked if you wish to activate the CUG function. Press
the Yes soft key. You can now access the following
options.

Deactivate: deactivates the CUG function.

Index List: lets you list, add or delete CUG index
numbers. The list of current CUG indexes appears.
Add a new CUG index (as advised by your service
provider) or delete a selected group.

To...

Then press the...

Scroll through the

or

key.

existing CUG indexes

Add a new CUG index

Options soft key, select
Add and enter the index.

Delete a CUG index

or

key to select

the index to be deleted,
press the Options soft key
and select Delete.

Outside Access: enables you to allow or prohibit
calls to numbers other than those nominated for the
Closed User Group. This feature depends on the
nature of your CUG subscription. Please check with
your service provider.

Default Group: you may communicate a default
CUG to your service provider. If you have done so,
you can enable the Default Group option on your
phone. When making a call, you will be given the
option of using your default CUG, instead of
selecting one from the list.

Security Settings

Menu 4-3

The Security feature enables you to restrict the use
of your phone to:
• The people of your choice
• The types of calls of your choice

Various codes and passwords are used to protect the
features of your phone. They are described in the
following sections (also see page 114).

Advertising