News Stay informed about the latest enterprise technology news and product updates.

SIP telephones for VoIP platforms

Aastra's 5i Series of SIP telephones comprises four telephones and two expansion modules, offering choice and flexibility to customers looking for standards-based IP telephones.

Aastra's 5i Series of SIP telephones comprises four telephones and two expansion modules, offering choice and flexibility to customers looking for standards-based IP telephones.

The Aastra 5i series has been designed to interoperate with leading IP telephony platforms, featuring elegant styling, large LCD screens, programmable function keys and expansion modules for operator consoles. Productivity is enhanced via embedded XML browsers and full duplex speakerphones.

The 5i Series telephone and expansion module range is:

  • 53i 3 line/16-character display and six programmable keys
  • 55i Advanced Feature set with 144 x 75 backlit LCD, up to 20 programmable function capability
  • 57i Full Feature set with 144 x 128 backlit LCD display, up to 30 programmable function capability
  • 57i CT Features of 57i plus integrated radio base station supporting up to four cordless handsets
  • 536M Expansion Module with 36 programmable keys
  • 560M Expansion Module with LCD Screen and 60 programmable keys

Organisations that are migrating to a converged IP environment whether it is hosted VoIP, a premised-based IP-PBX/hybrid PBX or open source PBX will be able to find an Aastra IP telephone perfectly suited to meet their needs.

For further information visit www.nextip.com.au

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Voice networking and VoIP

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close