Enhanced-List Application
6
Issue 1 July 1997
Port Usage Impact
Voice port usage increases as recipients retrieve messages sent by ELA. Plan for
the increase with Professional Services when you purchase ELA. Refer to the
worksheets that were compiled at the time of the purchase to determine the port
usage impact.
You should monitor your system to determine if your Grade of Service (GOS) falls
below acceptable levels. If that happens frequently, particularly during the peak
busy hour, contact your Lucent account representative to purchase more ports, if
necessary. For more information about GOS and monitoring your system, see
your
I
NTUITY
Messaging Solutions Release 4 Administration
book.
NOTE:
If, in its application, ELA degrades service, you might suggest that those
users with access to enhanced lists schedule delivery of ELA messages for
off-peak hours, for example, at 10:00 p.m. or 4:00 a.m. That way, delivery of
messages will not conflict with other user-generated traffic.
Security
Securing a system that allows access from another domain involves a 2-pronged
approach. You must consider security from both an internal and an external
perspective. External security involves administration to prevent access from an
unauthorized source, such as an e-mail or AMIS-Analog message originator that
decides to send “mail bombs” to an Enhanced List. Internal security focuses on
preventing, or recovering from, damage if a breach occurs, for example, a virus
is transmitted in a message component such as an attached software file.
For an in-depth discussion and definition of such terms as
trusted server
and
domain
, see your
I
NTUITY
Messaging Solutions Release 4 Administration
book.
External Security
A new option — the trusted server — has been introduced in this release. The
ELA application runs as a trusted server, making requests of the AUDIX server,
via IMAPI, to distribute messages to designated recipients. The trusted server is
empowered to do anything to an ELA mailbox that an AUDIX user can do.
To prevent unauthorized access to AUDIX from an external source such as a
trusted server, system administrators have two levels of security at their disposal:
■
Trusted server password
■
IMAPI password
The trusted server password is administered on both the AUDIX server and on
the trusted server. The trusted server must use this password when it connects to
AUDIX.
Содержание INTUITY Messaging Solutions
Страница 6: ...Contents iv Issue 1 July 1997...
Страница 42: ...Administering AUDIX for ELA 32 Issue 1 July 1997...
Страница 60: ...Administering ELA for AUDIX 50 Issue 1 July 1997...
Страница 68: ...Preventative Maintenance and Troubleshooting 58 Issue 1 July 1997...