Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Make Linksys 3102 FXO go off hook

Posted on 2010-11-16
1
Medium Priority
?
588 Views
Last Modified: 2012-05-10
Application:  Linksys 3102 FXO --> Call Box system

When the button on the call box is pressed, the dial plan in the FXO page of the Linksys dials an ring group where end users can pick up the call and press a code to activate the door buzzer.

The issue is how to get the Linksys 3102 to go off hook on the FXO and get a dial tone when dialed from an inside extension.  The Linksys 3102 has an extension assigned to it.

Is there a config option to instruct the Linksys 3102 to go off hook on the FXO when that extension is dialed?
0
Comment
Question by:API_NOC
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 9

Accepted Solution

by:
Alex Bahar earned 1000 total points
ID: 34172717
FXO cannot provide dial tone, but it can detect dial tone and ringing tone.

If you want to provide dial tone, then you need an FXS.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In my office we had 10 Cisco 7940G IP phones that were useless as they were showing PROTOCOL APPLICATION INVALID when started. I searched through Google and worked for a week continuously on those phones, and finally got them working. This is a di…
As companies replace their old PBX phone systems with Unified IP Communications, many are finding out that legacy applications such as fax do not work well with VoIP. Fortunately, Cloud Faxing provides a cost-effective alternative that works over an…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question