Nokia 6301 - Security

background image

Security

When security features that restrict calls are in use (such as call restriction, closed
user group, and fixed dialing), calls may be possible to the official emergency number
programmed into your device.

Select Menu > Settings > Security and from the following options:

PIN code request — to set the phone to ask for your PIN or UPIN code every time the
phone is switched on. Some SIM cards do not allow the code request to be turned off.

Call restrictions — to restrict incoming calls to and outgoing calls from your phone
(network service). A restriction password is required.

Fixed dialing — to restrict your outgoing calls to selected phone numbers if this function
is supported by your SIM card. When the fixed dialing is on, GPRS connections are not
possible except while sending text messages over a GPRS connection. In this case, the
recipient’s phone number and the message center number must be included in the
fixed dialing list.

Closed user group — to specify a group of people whom you can call and who can call
you (network service)

Security level > Phone — to set the phone to ask for the security code whenever a new
SIM card is inserted into the phone. If you select Memory, the phone asks for the
security code when the SIM card memory is selected, and you want to change the
memory in use.

background image

78

Access codes — to change the security code, PIN code, UPIN code, PIN2 code, or
restriction password

Code in use — to select whether the PIN code or UPIN code should be active

PIN2 code request — to select whether the PIN2 code is required when using a specific
phone feature which is protected by the PIN2 code. Some SIM cards do not allow the
code request to be turned off.

Authority certificates or User certificates — to view the list of the authority or user
certificates downloaded into your phone. See "Certificates," p. 32.

Security module sett. — to view Secur. module details, activate Module PIN request, or
change the module PIN and signing PIN. See also "Access codes," p. 9.