Nokia 6233 - Security

background image

Security

When security features that restrict calls are in use (such as call barring, closed user group, and fixed dialing) calls still may
be possible to the official emergency number programmed into your device.

Select

Menu

>

Settings

>

Security

and from the following options:

PIN code request

and

UPIN code request

— to set the phone to ask for your PIN or UPIN code every time the

phone is switched on. Some SIM cards do not allow the code request to be turned off.

PIN2 code request

— to select whether the PIN2 code is required when using a phone feature that is protected

by the PIN2 code. Some SIM cards do not allow the code request to be turned off.

background image

74

Copyright © 2006 Nokia. All rights reserved.

Call barring service

— to restrict incoming calls to and outgoing calls from your phone (network service). A

barring password is required.

Fixed dialling

— to create, edit, and activate a list of phone numbers or prefixes. When the list is activated, you

can only call or send messages to the numbers on the list. If the SIM card does not support this option,

Fixed

dialling

is hidden.

Closed user group

— to specify a group of people whom you can call and who can call you (network service)

Security level

>

Phone

— to set the phone to ask for the security code whenever a new SIM card is inserted into

the phone. If you select

Security level

>

Memory

, the phone asks for the security code when the SIM card

memory is selected, and you want to change the memory in use.

Access codes

— to change the security code, PIN code, PIN2 code, or barring password

Code in use

— to select whether the PIN code or UPIN code should be active

Authority certificates

or

User certificates

— to view the list of the authority or user certificates downloaded

into your phone. See “Certificates,” p.

107

.

Security module settings

— to view

Security module details

, activate

Module PIN request

, or change the module

PIN and signing PIN. See also “Access codes,” p.

16

.