background image

I

NTUITY

™ Messaging Solutions

Enhanced-List Application
Release 1.0

585-310-575
Comcode 107975674
Issue 1
July 1997

Summary of Contents for INTUITY Messaging Solutions

Page 1: ...INTUITY Messaging Solutions Enhanced List Application Release 1 0 585 310 575 Comcode 107975674 Issue 1 July 1997...

Page 2: ...ul interference in which case the user will be required to correct the interference at his own expense Part 68 Network Registration Number This equipment is regis tered with the FCC in accordance with...

Page 3: ...t Application Overview 1 Audience 1 What You Should Know 1 Enhanced List Application 2 What ELA Can Do for You 2 ELA Administration 3 Basic Concepts 3 Planning with Professional Services 3 Things to C...

Page 4: ...ted Server Access 26 Defining Two ELA Trusted Servers 28 Before You Begin 28 4 Administering ELA for AUDIX Overview 33 Defining the AUDIX server and Administering Access 33 Before You Begin 33 Guideli...

Page 5: ...dministrator s Log 51 Checking the Delivery Failure Log 52 Delivery Failure Codes 54 Troubleshooting ELA 55 6 Alarms Overview 59 DELIVTS Resource Type 59 REGISTRY Resource Type 61 SHADOW Resource Type...

Page 6: ...Contents iv Issue 1 July 1997...

Page 7: ...esponsible for installing and configuring the system and performing initial administration and acceptance testing Secondary audiences include the following from Lucent Field support Technical Service...

Page 8: ...istered trademark of Lucent Technologies INTUITY is a trademark of Lucent Technologies Lotus Notes is a registered trademark of Lotus Development Corporation MEGAPORT is a trademark of Equinox Systems...

Page 9: ...Inc SUPERSET is a trademark of Mitel Corporation SX 100 is a trademark of Mitel Corporation SX 200 is a trademark of Mitel Corporation SX 2000 is a trademark of Mitel Corporation Telephony OneStip is...

Page 10: ...our suggestions for improving this book Please complete and return the reader comment card that is located behind the title page If the reader comment card has been removed send your comments to Lucen...

Page 11: ...ITY AUDIX Release 4 system What You Should Know The procedures in this chapter assume you know basic Lucent INTUITY commands and navigation such as logging in and out of the system the difference betw...

Page 12: ...Up to 100 enhanced lists can be created on an INTUITY AUDIX machine Nesting embedding an enhanced list within another Enhanced List enables a total recipient population of nearly 150 000 Changes in an...

Page 13: ...n does For the purposes of ELA a domain is a logical boundary defined by the application INTUITY AUDIX voice fax mail messaging is one domain and ELA is another domain The two domains are linked toget...

Page 14: ...dministration Define the AUDIX server to the ELA servers and administer access Select shadow mailbox extension Create and administer the Enhanced List s Record a name for the enhanced list optional Th...

Page 15: ...ing messages for delivery to an e mail or Message Manager recipient or to TCP IP networked remote machines If none of these are valid for your site ELA will not cause any LAN traffic See Chapter 6 in...

Page 16: ...must consider security from both an internal and an external perspective External security involves administration to prevent access from an unauthorized source such as an e mail or AMIS Analog messa...

Page 17: ...LA mailboxes are no more vulnerable to unauthorized use than other voice mailboxes However the impact on system performance can be many times greater than the potential for harassment when sending mes...

Page 18: ...ruses before use IMAPI Session Requirements An IMAPI session is invoked when an e mail trusted server Message Manager or the ELA trusted server needs to communicate with the AUDIX server The AUDIX ser...

Page 19: ...A package is provided on a tape labeled Enhanced List Application To install ELA on a Lucent INTUITY R4 2 or higher system 1 Log in to the Lucent INTUITY system using craft or tsc 2 Starting from the...

Page 20: ...ot remove the tape The following packages are available 1 ELA Enhanced List Application Package Select package s you wish to process or all to process all packages default all q NOTE If you receive a...

Page 21: ...pe 8 Enter q 9 Press F6 repeatedly to return to the main menu 10 Continue with the next procedure Rebooting the System Rebooting the System Rebooting is a 2 step process First the voice system must be...

Page 22: ...mediate shutdown 8 Press F3 The system displays the following message Shutdown started When the system is completely shut down the system displays the message The system is down Press Ctrl Alt Del to...

Page 23: ...led for your system Increase the number of mailing lists AUDIX allows on the system Define an ELA Class of Service Set up ELA and shadow mailbox Community IDs Administer TCP IP on the AUDIX server Def...

Page 24: ...A feature continue with the next procedure NOTE You must log off the system and log back on to get enhanced lists to display as an option on the Lucent INTUITY main menu Verifying that ELA is Enabled...

Page 25: ...imits to support ELA 1 Starting from the main menu Figure 3 1 on page 3 14 select 2 At the enter command prompt enter either The system displays the System Parameters Limits screen 3 Tab to the Lists...

Page 26: ...k for explanations of the other fields on these screens and their implications NOTE ELA can take up to 12 hours to show the changes you make to subscriber information in INTUITY AUDIX Before you begin...

Page 27: ...eld under PERMISSIONS Otherwise enter none NOTE If you administer your system such that ELA mailboxes are to be accessible only by direct addressing and later decide you would like some ELA mailboxes...

Page 28: ...Ordinarily there are no old or unopened messages ELA will forward old unopened messages in the event service is interrupted 14 in the Retention Times days Unopened field The same explanation holds tr...

Page 29: ...e purpose and implementation of Community IDs in more detail Things to Consider ELA mailing lists are a powerful messaging tool that all users in your AUDIX network can access However should your busi...

Page 30: ...ot go to the shadow mailbox Also you will have to administer the rest of your user population to belong to a community restricted from sending messages to the enhanced list mailbox community for examp...

Page 31: ...Things to Consider on page 3 19 Sender Community 9 would be blank horizontally from left to right and Recipient Community 10 would be blank vertically from top to bottom 5 If all users are to have ac...

Page 32: ...the example discussed under Things to Consider on page 3 19 Recipient Community 11 would contain r s vertically from top to bottom 7 Press F3 to save the information in the system database The system...

Page 33: ...usted server to communicate with AUDIX Before You Begin You will need to know the Network IP address Host Identifier AUDIX server name Subnet mask Gateway Identifier ID to administer TCP IP Your PC LA...

Page 34: ...r_1 is allowed 3 Enter the IP Internet Protocol address in the IP Address field and press This is the Lucent INTUITY system s address Your PC LAN system administrator should have this information If y...

Page 35: ...then F2 The system displays the Ethernet Board Configuration window Figure 3 7 Figure 3 7 Ethernet Board Configuration Window Administering TCP IP for Enhanced List Application ELA 7 Press F2 to displ...

Page 36: ...erved for use by ELA The following procedure administers the maximum number of IMAPI sessions you will allow trusted servers to use simultaneously but does not guarantee that an IMAPI session will be...

Page 37: ...value For example if the field currently reads 30 enter 32 This number includes sessions for users who are logged into their mailboxes using Message Manager or an e mail application supported by INTUI...

Page 38: ...nown as a trusted server SECURITY ALERT The procedures in this section include setting a password the trusted server must use to access AUDIX There is a secondary layer of security in addition to a tr...

Page 39: ...e INTUITY AUDIX server 1 Starting from the main menu Figure 3 1 on page 3 14 select 2 At the enter command prompt enter either The system displays the Trusted Server Profile screen Figure 3 9 To see a...

Page 40: ...s display but will appear as a series of asterisks after you save 5 Enter the TCP IP address of this Lucent INTUITY in the form w x y z where each letter is a number 0 to 255 See page 3 23 for informa...

Page 41: ...minister an IMAPI password If yes follow the procedures for setting the IMAPI password in your INTUITYMessaging Solutions Release 4 Administration book before proceeding to the next section If no go t...

Page 42: ...Administering AUDIX for ELA 32 Issue 1 July 1997...

Page 43: ...he enhanced lists optional Defining the AUDIX server and Administering Access To allow communication between ELA and AUDIX you must perform some initial ELA administration Before You Begin To administ...

Page 44: ...page 3 16 To administer the ELA server 1 Starting from the main menu Figure 3 1 on page 3 14 select The Set Up Enhanced List System Data window displays Figure 4 1 Figure 4 1 Set Up Enhanced List Sys...

Page 45: ...AUDIX Some AUDIX functions do not require passwords If a password is required then the one you enter here must match that password exactly If a password is not required you can delete any existing pa...

Page 46: ...rd Valid Input 1 to 15 alphanumeric characters Enter the delivery trusted server password SHADOW MAILBOX ATTRIBUTES Mailbox Extension Valid Input 3 to 10 numeric characters Enter the extension to be u...

Page 47: ...Manager does not differentiate between an enhanced list and a person s name Examples of names to avoid Jane_Doe Doe_Jane DEFAULT ENHANCED LIST MAILBOX ATTRIBUTES Class of Service Valid Input a number...

Page 48: ...stern_District_Salesforce Begin the name with the number 1 Example 1_McDonnell_List Users can reach the enhanced list mailbox through Numbers Addressing as well as Names Addressing Since there are no...

Page 49: ...97 39 Figure 4 2 Administer Enhanced Lists Window 2 Press F4 The system displays the New Enhanced List window Figure 4 3 Figure 4 3 New Enhanced List Window 3 Complete the fields in this window using...

Page 50: ...know this extension Password Valid Input 5 to 15 numeric characters Enter the password for this list mailbox This password is for administrative purposes only Users who send messages to the ELA mailb...

Page 51: ...servers including Lotus Integrated Messaging AMIS pre administered subscribers The following cannot be members of an enhanced list Public or private subscriber owned lists AMIS casual addresses Broad...

Page 52: ...4 5 Add Member Window Adding Members to an Enhanced List 3 Enter one of the following The user s name as it appears in the AUDIX system This name can be another enhanced list The user s extension This...

Page 53: ...ships 6 Review the Administer Enhanced Lists window If you want to change or delete any information you just entered a Press The Enhanced List Membership window displays b Select the member name you w...

Page 54: ...ons menu displays Select Find List and press Enter the name or extension of the list you would like to add or change and press F3 The Administer Enhanced Lists window will re display with the specifie...

Page 55: ...ame trusted servername b Press F3 to save this information in the system database c Continue entering names extensions e mail addresses until all new members have been added d Press F6 to return to th...

Page 56: ...Enhanced List 7 Press F8 An Actions menu displays a Select Print List Membership and press The system displays the message Printing List Membership for Listname listextension and sends the list to the...

Page 57: ...the specified list highlighted 3 Press F7 The system displays the Confirm Deletion of Enhanced List window Figure 4 7 Figure 4 7 Confirm Deletion of Enhanced List Window 4 Do you want to delete the a...

Page 58: ...n 3 Press The system prompts with Please enter the extension and pound sign 4 Enter the extension for the enhanced list mailbox The system prompts with When finished recording press pound to approve o...

Page 59: ...est users and test telephones 3 Using the procedures in the Installation manual specific to your platform use the test 1 telephone to create and send a voice mail message to the ELA mailbox Record the...

Page 60: ...Administering ELA for AUDIX 50 Issue 1 July 1997...

Page 61: ...an administration event Check the status line at the top of the AUDIX Administration screen at least once a day Other events besides those generated by ELA create administrative log entries but you ca...

Page 62: ...dministration Checking the Delivery Failure Log The delivery failure log contains entries for all failed deliveries along with descriptive data regarding cause for the failure and other information Ch...

Page 63: ...ess The system truncates addresses that are longer than 21 characters Parent List The list mailbox to which a user originally addressed the message Child List The last list mailbox a message reached p...

Page 64: ...The login announcement already exists AMIS wrong number This is the wrong number for this AMIS analog recipient Too many AMIS xmits Too many transmission attempts for AMIS analog resulted in a transmi...

Page 65: ...permit Reply to Sender Administer the enhanced list to allow Reply to Sender if appropriate Educate your users about ELA functionality Community IDs for the user or recipient incorrectly administered...

Page 66: ...k the Administrator s Log for related alarms If an alarm warrants further action see Lucent INTUITY Messaging Solutions Release 4 Alarm and Log Messages 585 310 566 Verify network capabilities with yo...

Page 67: ...working problems between originator system and recipient system Perform networking troubleshooting See Lucent INTUITY Messaging Solutions Digital Networking 585 310 567 for more information You inadve...

Page 68: ...Preventative Maintenance and Troubleshooting 58 Issue 1 July 1997...

Page 69: ...data lost re enter or restore Repair Action There are two recovery methods Access the Set Up Enhanced List System Data window and re enter all field information Restore data from the most recent backu...

Page 70: ...our remote maintenance center Alarm Code 3 Event ID ELA delivts03 Alarm Level Warning Description Trusted server data corrupt re enter or restore Repair Action There are two recovery methods Access th...

Page 71: ...Go to the Administer Enhanced Lists window b Use F4 NEW E LIST to re enter the name of each Enhanced List one at a time The individual members do not need to be re entered See Lucent INTUITY Messaging...

Page 72: ...ructions about restoring data If you would prefer to have assistance with this restore contact your remote maintenance center Alarm Code 2 Event ID ELA shadow02 Alarm Level Warning Description Shadow...

Page 73: ...recent backup of system data See Chapter 3 Common System Procedures in your maintenance book for instructions about restoring data If you would prefer to have assistance with this restore contact you...

Page 74: ...le and to generate a log entry for a delivery failure Repair Action You can correct single instances of this problem by deleting messages from the shadow mailbox To access the shadow mailbox 1 In AUDI...

Page 75: ...ough ELA badreca12 Description Bad record deleted from E List registry Check for missing lists extension ELA detected a corrupt record and took the following action If the message displays an extensio...

Page 76: ...enhanced list did not contain any members In such a case ELA will delete the message Repair Procedure Perhaps you forgot to add the members to the Enhanced List or perhaps the enhanced list is no lon...

Page 77: ...ted Enhanced Lists 2 Search for the extension of the other Enhanced List 3 Use F7 DELETE E LIST to delete the Enhanced List See Lucent INTUITY Messaging Solutions Release 4 Administration 585 310 564...

Page 78: ...es unavailable for delivery trusted server The trusted server that delivers ELA messages cannot access AUDIX The message shows the amount of elapsed time in 30 minute increments since ELA has stopped...

Page 79: ...ts 2 server name 24 C community IDs 19 21 36 37 40 COS administering 16 37 40 D delivery failure 52 codes 54 domains 3 E ELA activating 14 administering COS 16 alarms 51 59 characteristics 2 community...

Page 80: ...11 S security e mail 6 external access 6 passwords 6 trusted servers 6 virus prevention 6 service degradation ports and 6 shadow mailbox 8 19 22 36 software requirements 5 system limits AUDIX 15 syst...

Reviews: