hit counter script

Advertisement

1
EFT Draft 1—Cisco Confidential—Do Not Distribute
Cisco
DX80
User
Guide
D1510401 User Guide
Cisco Collaborate Desk DX80
Produced: April 2014, All contents © 2014
Cisco Systems, Inc. All rights reserved.

Advertisement

Table of Contents
loading

Summary of Contents for Cisco DX80

  • Page 1: User Guide

    EFT Draft 1—Cisco Confidential—Do Not Distribute Cisco DX80 User Guide D1510401 User Guide Cisco Collaborate Desk DX80 Produced: April 2014, All contents © 2014 Cisco Systems, Inc. All rights reserved.
  • Page 2: Table Of Contents

    EFT Draft 1—Cisco Confidential—Do Not Distribute Contents What’s in this guide All entries in the table of contents are clickable hyperlinks that will take you to the corresponding article. To go between chapters, you may also click on any of the icons in the sidebar.
  • Page 3 EFT Draft 1—Cisco Confidential—Do Not Distribute Introduction D1510401 User Guide Cisco Collaborate Desk DX80 Produced: April 2014, All contents © 2014 Cisco Systems, Inc. All rights reserved.
  • Page 4: Introduction

    EFT Draft 1—Cisco Confidential—Do Not Distribute Introduction Best Practice Other Tips Brightness control • To adjust brightness, colors or other A successful video conference provides Noise sources like computers placed showing the presenter—or the group of settings of your system, use the...
  • Page 5: Introduction

    EFT Draft 1—Cisco Confidential—Do Not Distribute Introduction Tour the DX80 About Operating Modes Your DX80 may operate in one of two modes; Phone Only Mode or Standard Mode. In Standard Mode the DX80 acts as an Android tablet. Operating modes are set up by your Administrator.
  • Page 6: Set Up Your Phone For The First Time

    Set Up Your Phone for the First Time About Setup Provided that self-provisioning is allowed in your organization, your DX80 will automatically prompt you to enter the usernames and passwords needed for the appropriate accounts. Note! This wizard will not appear for units running in Phone Only Mode.
  • Page 7: Security

    EFT Draft 1—Cisco Confidential—Do Not Distribute Security Set a PIN Code or Password to Restrict Access About PIN and Password The system will normally prompt you to enter a PIN code or password to prevent unrestricted access to your system.
  • Page 8: If You Forget Your Pin Code Or Password

    Emergency calls. Note that locked screens still let you place emergency calls. Tap the ? in the upper right corner. You will now need to log in with your credentials. Tap Cisco Enter username and password. User or Google. D1510401 User Guide...
  • Page 9: Lock And Unlock Screen

    EFT Draft 1—Cisco Confidential—Do Not Distribute Security Lock and Unlock Screen About Locking Screen Screen locking is a way to block unauthorized access to your system. Make sure your screen is locked whenever you leave your system for a while.
  • Page 10: Set Or Change Screen-Lock Timeout

    EFT Draft 1—Cisco Confidential—Do Not Distribute Security Set or Change Screen-Lock Timeout Setting Timeout Screen locking is a way to block unauthorized access to your system. Make sure your screen is locked whenever you leave your system for a while.
  • Page 11: Calling Tasks

    EFT Draft 1—Cisco Confidential—Do Not Distribute Calling Tasks D1510401 User Guide Cisco Collaborate Desk DX80 Produced: April 2014, All contents © 2014 Cisco Systems, Inc. All rights reserved.
  • Page 12: Common Call Tasks

    EFT Draft 1—Cisco Confidential—Do Not Distribute Common Call Tasks Answer Call A Few In-Call Tips • If parties on a call hear a beep, the call may be monitored or recorded. Contact your system administrator for more information. • If you work in a contact center...
  • Page 13: Disconnect Call

    EFT Draft 1—Cisco Confidential—Do Not Distribute Common Call Tasks Disconnect Call More Than One Call? If you have more than one call active and you want to hang up one of the calls, but preserve another call on the same line, you may need to remove the call that you want to end from hold first.
  • Page 14: Hold And Resume

    EFT Draft 1—Cisco Confidential—Do Not Distribute Common Call Tasks Hold and Resume About Hold and Resume You can hold and resume calls. This can be used to call someone while a call already is active. When you put a call on hold, the Hold icon appears on the right in the call information area.
  • Page 15: Place Call

    EFT Draft 1—Cisco Confidential—Do Not Distribute Common Call Tasks Place Call About Placing Calls You may call someone who is not listed in your list of contacts by keying in their name, address or number using the virtual keyboard of the screen.
  • Page 16: Place Call Using Contacts Or Recents

    EFT Draft 1—Cisco Confidential—Do Not Distribute Common Call Tasks Place Call Using Contacts or Recents About Using Lists To locate an entry in the Contacts or Recents list, scroll through that list in the same way as on a smart phone (i.e.
  • Page 17: Place Call Using Speed Dials

    EFT Draft 1—Cisco Confidential—Do Not Distribute Common Call Tasks Place Call Using Speed Dials About Speed Dial When you have defined Speed Dials (see the section Contacts for more), these will appear in the left column of your Call menu. Tap a Speed Dial entry to place a call using the feature.
  • Page 18: Video Call Basics

    EFT Draft 1—Cisco Confidential—Do Not Distribute Common Call Tasks Video Call Basics About Video Calls Video calls should be regarded as an extension of regular phone calls. You may adjust some camera settings, such as exposure and bandwidth allocated to your call. This is discussed in the Settings section.
  • Page 19: Activating Selfview

    EFT Draft 1—Cisco Confidential—Do Not Distribute Common Call Tasks Activating Selfview About Selfview The selfview shows what others see In a call: from your system, i.e. your outgoing video. Note that you will see a mirror image of the outgoing video.
  • Page 20: Visual Voicemail

    EFT Draft 1—Cisco Confidential—Do Not Distribute Visual Voicemail Send a Voicemail About Visual Voicemail The Visual Voicemail tool lets you manage your voice messages. Tap Messages in the left column, then Select New Message from the drop-down Tap Record. tap More ( ... ) in the upper right corner, as list.
  • Page 21: Listen To A Voicemail

    EFT Draft 1—Cisco Confidential—Do Not Distribute Visual Voicemail Listen to a Voicemail About Visual Voicemail The Visual Voicemail tool lets you manage your voice messages. Tap Messages, as outlined. New Voicemails are indicated by the red Tap Play ( ) to listen to the voice message.
  • Page 22: Reply To A Voicemail

    EFT Draft 1—Cisco Confidential—Do Not Distribute Visual Voicemail Reply to a Voicemail About Visual Voicemail The Visual Voicemail tool lets you manage your voice messages. If a Voicemail has been sent to a multitude of recipients, you may use the Reply All feature to reach them all with a single reply.
  • Page 23: Forward A Voicemail

    EFT Draft 1—Cisco Confidential—Do Not Distribute Visual Voicemail Forward a Voicemail About Visual Voicemail The Visual Voicemail tool lets you manage your voice messages. When you forward a message, you may also include your own message. Tap Messages, as outlined and select a Tap Forward ( ).
  • Page 24: Delete A Voicemail

    EFT Draft 1—Cisco Confidential—Do Not Distribute Visual Voicemail Delete a Voicemail About Visual Voicemail The Visual Voicemail tool lets you Delete a Voicemail from the list: manage your voice messages. Messages can either be deleted directly from the list of messages or while you are inside the Playback menu.
  • Page 25: Call Park

    EFT Draft 1—Cisco Confidential—Do Not Distribute Call Park Store and Retrieve Active Call with Call Park About Call Park You park a call when you want To retrieve the call from any other to store the call so that you or phone, just call that number.
  • Page 26: Call Transfer

    EFT Draft 1—Cisco Confidential—Do Not Distribute Call Transfer Transfer a Call About Call Transfer Transfer redirects a call. The target is the name, number or address (URI) to which you want to transfer the call. Note that you cannot use the transfer function to redirect a call that is on hold.
  • Page 27: Ad Hoc Conference

    EFT Draft 1—Cisco Confidential—Do Not Distribute Ad Hoc Conference Create Conference About Create Conference To expand an ongoing call into a conference, just add participants. These participants can be added by dialing their number, name or address; or by using the list of Contacts;...
  • Page 28: Meet Me Conference

    EFT Draft 1—Cisco Confidential—Do Not Distribute Meet Me Conference About Meet Me Start or Join a Meet Me Conference Conference Start a Meet Me Conference: Meet Me conferencing enables you to start or join a conference by calling the conference number as opposed to call specific recipients one by one to create a conference.
  • Page 29 EFT Draft 1—Cisco Confidential—Do Not Distribute Share Content D1510401 User Guide Cisco Collaborate Desk DX80 Produced: April 2014, All contents © 2014 Cisco Systems, Inc. All rights reserved.
  • Page 30: Webex Meetings

    EFT Draft 1—Cisco Confidential—Do Not Distribute Your video system may be connected to a management system capable of scheduling video meetings for you. Any meetings scheduled will then appear in a List of Meetings on your Touch device. WebEx Meetings...
  • Page 31: Start A Scheduled Webex Meeting

    EFT Draft 1—Cisco Confidential—Do Not Distribute WebEx Meetings Start a Scheduled WebEx Meeting Meeting List Basics Cisco WebEx is a standalone application, but also integrates into the Calendar, Phone, Chat, and Contacts applications. During a Cisco WebEx meeting, participants can join the audio...
  • Page 32 EFT Draft 1—Cisco Confidential—Do Not Distribute Contacts consists of three parts; a Directory, which typically is your corporate phone book; Recents which is a list of recent calls and finally Favorites, which is your personalized list of people you call frequently or otherwise need to get easy access to.
  • Page 33: Contacts

    EFT Draft 1—Cisco Confidential—Do Not Distribute Contacts Make Someone a Contact From Call History About Contacts The Contacts serves as your phone book. You may also turn someone into a Favorite to make them appear on the Home screen of the phone app.
  • Page 34: Make Someone A Favorite

    EFT Draft 1—Cisco Confidential—Do Not Distribute Contacts Make Someone a Favorite About Contacts The Contacts serves as your phone book. You may also turn someone into a Favorite to make them appear on the Home screen of the phone app.
  • Page 35: Allocating Numbers To Speed Dial

    EFT Draft 1—Cisco Confidential—Do Not Distribute Contacts Allocating Numbers to Speed Dial About Speed Dial Speed Dial is a convenient shortcut to contacts that you use often. You allocate a speed dial code (typically a number) to the entry and use that to call that person.
  • Page 36: Camera

    EFT Draft 1—Cisco Confidential—Do Not Distribute Camera D1510401 User Guide Cisco Collaborate Desk DX80 Produced: April 2014, All contents © 2014 Cisco Systems, Inc. All rights reserved.
  • Page 37: Setting The Camera Exposure Level

    EFT Draft 1—Cisco Confidential—Do Not Distribute Camera Setting the Camera Exposure Level About Camera Settings You can set the cameras exposure level in the Settings menu associat- You can adjust the ed with the Call window. camera’s exposure level by means of the Settings menu accessed from here.
  • Page 38: Settings

    EFT Draft 1—Cisco Confidential—Do Not Distribute Settings D1510401 User Guide Cisco Collaborate Desk DX80 Produced: April 2014, All contents © 2014 Cisco Systems, Inc. All rights reserved.
  • Page 39: Gain Access To The Settings

    EFT Draft 1—Cisco Confidential—Do Not Distribute Settings Gain Access to the Settings About Settings There are several types of Settings available with your DX80. There are System Settings, like those shown here, and there are context sensitive settings applying to your current task.
  • Page 40 Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco’s trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the...

Table of Contents