Tag Archives: broken

Change of behaviour with TRAN (Transfer) key after upgrading Yealink T3X and Yealink T2X Firmware to V70

I have noticed a change of behaviour with TRAN (Transfer) key after upgrading Yealink T3X and Yealink T2X to the new V70 firmware along with upgrading 3CX Version 11 to Service Pack 3.

It appears that the default DSS Key Transfer Mode is changed from Attended Transfer to Blind Transfer.  An Attended Transfer was always performed when you used the BLF/DSS Keys to perform the Transfer in previous Yealink firmware versions.  For example A calls B wanting to speak with C, B presses TRAN button and then presses the BLF/DSS Key for C.  In this instance B should be able to speak with C (Attended Transfer) to see if they want to take the call rather than A just being passed straight to C (Blind Transfer).

yealink blind transfer

 

You need to login to the Yealink HTTP Interface and then navigate to Phone->Features->Transfer Settings and Change “Transfer Mode via DSSKey” to “Attended Transfer” by using the drop down menu.

yealink attended transfer

So by changing this simple setting you can restore the Attended Transfer function whilst still taking advantage of the V70 Firmware for your Yealink Phone.

Rpcrt4.dll – Revision History for Windows Vista SP2, Windows Server 2008 SP2 and Windows Small Business Server 2008 (SBS 2008)

Rpcrt4.dll – Revision History for Windows Vista SP2, Windows Server 2008 SP2 and Windows Small Business Server 2008 (SBS 2008)

10-Jul-2013 – 6.0.6002.23155 – Rpcrt4.dll – x86/x64 – http://support.microsoft.com/kb/2849470 – MS13-062: Vulnerability in remote procedure call could allow elevation of privilege: August 13, 2013

10-Jul-2013 – 6.0.6002.18882 – Rpcrt4.dll – x86/x64 – http://support.microsoft.com/kb/2849470 – MS13-062: Vulnerability in remote procedure call could allow elevation of privilege: August 13, 2013

13-Mar-2011 – 6.0.6002.22611 – Rpcrt4.dll – x86/x64 – http://support.microsoft.com/kb/2521448 – RPC returns an out-of-memory error incorrectly when you use an RPC over HTTP client to connect to an RPC over HTTP server in Windows Server 2008 or in Windows Vista

04-May-2010 – 6.0.6002.22398 – Rpcrt4.dll – x86/x64 – http://support.microsoft.com/kb/2023170 – An access violation exception occurs in the “NdrClientCall2” function in Windows Vista or in Windows Server 2008

18-Jul-2009 – 6.0.6002.22180 – Rpcrt4.dll – x86/x64 – http://support.microsoft.com/kb/973780 – Some TCP connections between an NLB server that is running Windows Server 2008 and its clients are broken after the Port Scalability feature is enabled on the NLB server

23-Apr-2009 – 6.0.6002.22120 – Rpcrt4.dll – x86/x64 – http://support.microsoft.com/kb/970238 – MS09-026: Vulnerability in RPC could allow elevation of privilege

23-Apr-2009 – 6.0.6002.18024 – Rpcrt4.dll – x86/x64 – http://support.microsoft.com/kb/970238 – MS09-026: Vulnerability in RPC could allow elevation of privilege