background image

Alarms

64

Issue 1   July 1997 

Repair Action: 

Access the Set Up Enhanced-List System Data window and re-enter the shadow 
mailbox extension and community ID. If a shadow mailbox exists at the extension 
entered, the system displays a system prompt to that effect. If a shadow mailbox 
does not exist at the extension entered, a new mailbox will be created.

NOTE:

If you wish to move the shadow mailbox to a new extension, only use the 
Set Up Enhanced-List System Data window.

Alarm Code: 6

Event ID: ELA-shadow06 

Alarm Level:

 

Warning

Description:  

The shadow mailbox is full of messages for recipients who 
have full mailboxes. ELA cannot deliver these messages 
until the recipients make space in their mailboxes. Also, 
AUDIX can take up to two weeks to determine that a 
message is undeliverable and to generate a log entry for a 
delivery failure. 

Repair Action: 

You can correct single instances of this problem by deleting messages from the 
shadow mailbox. To access the shadow mailbox:

1. In AUDIX Administration enter 

ch su

 

extension

 

for the enhanced-list 

mailbox.

2. At the Subscriber screen, enter a new password in the 

Password:

 field.

Remember this password for step 5 below. 

3. Press (F3) 

 to save the password.

4. At the 

enter command:

 enter 

exit

5. Use Message Manager to log into the shadow mailbox.

6. Open the Outgoing folder and delete messages that have been 

rescheduled for delivery to full mailboxes. Keep deleting messages until 
the shadow mailbox is less than 50 percent full.

We recommend that you make a list of the recipients whose mailboxes are 
full, so you can ask them to delete at least half of their messages. (You 
cannot use AUDIX to make this request, because it cannot deliver 
messages until the mailboxes have more room.)

7. Log out of the shadow mailbox.

ENTER

Содержание INTUITY Messaging Solutions

Страница 1: ...INTUITY Messaging Solutions Enhanced List Application Release 1 0 585 310 575 Comcode 107975674 Issue 1 July 1997...

Страница 2: ...ul interference in which case the user will be required to correct the interference at his own expense Part 68 Network Registration Number This equipment is regis tered with the FCC in accordance with...

Страница 3: ...t Application Overview 1 Audience 1 What You Should Know 1 Enhanced List Application 2 What ELA Can Do for You 2 ELA Administration 3 Basic Concepts 3 Planning with Professional Services 3 Things to C...

Страница 4: ...ted Server Access 26 Defining Two ELA Trusted Servers 28 Before You Begin 28 4 Administering ELA for AUDIX Overview 33 Defining the AUDIX server and Administering Access 33 Before You Begin 33 Guideli...

Страница 5: ...dministrator s Log 51 Checking the Delivery Failure Log 52 Delivery Failure Codes 54 Troubleshooting ELA 55 6 Alarms Overview 59 DELIVTS Resource Type 59 REGISTRY Resource Type 61 SHADOW Resource Type...

Страница 6: ...Contents iv Issue 1 July 1997...

Страница 7: ...esponsible for installing and configuring the system and performing initial administration and acceptance testing Secondary audiences include the following from Lucent Field support Technical Service...

Страница 8: ...istered trademark of Lucent Technologies INTUITY is a trademark of Lucent Technologies Lotus Notes is a registered trademark of Lotus Development Corporation MEGAPORT is a trademark of Equinox Systems...

Страница 9: ...Inc SUPERSET is a trademark of Mitel Corporation SX 100 is a trademark of Mitel Corporation SX 200 is a trademark of Mitel Corporation SX 2000 is a trademark of Mitel Corporation Telephony OneStip is...

Страница 10: ...our suggestions for improving this book Please complete and return the reader comment card that is located behind the title page If the reader comment card has been removed send your comments to Lucen...

Страница 11: ...ITY AUDIX Release 4 system What You Should Know The procedures in this chapter assume you know basic Lucent INTUITY commands and navigation such as logging in and out of the system the difference betw...

Страница 12: ...Up to 100 enhanced lists can be created on an INTUITY AUDIX machine Nesting embedding an enhanced list within another Enhanced List enables a total recipient population of nearly 150 000 Changes in an...

Страница 13: ...n does For the purposes of ELA a domain is a logical boundary defined by the application INTUITY AUDIX voice fax mail messaging is one domain and ELA is another domain The two domains are linked toget...

Страница 14: ...dministration Define the AUDIX server to the ELA servers and administer access Select shadow mailbox extension Create and administer the Enhanced List s Record a name for the enhanced list optional Th...

Страница 15: ...ing messages for delivery to an e mail or Message Manager recipient or to TCP IP networked remote machines If none of these are valid for your site ELA will not cause any LAN traffic See Chapter 6 in...

Страница 16: ...must consider security from both an internal and an external perspective External security involves administration to prevent access from an unauthorized source such as an e mail or AMIS Analog messa...

Страница 17: ...LA mailboxes are no more vulnerable to unauthorized use than other voice mailboxes However the impact on system performance can be many times greater than the potential for harassment when sending mes...

Страница 18: ...ruses before use IMAPI Session Requirements An IMAPI session is invoked when an e mail trusted server Message Manager or the ELA trusted server needs to communicate with the AUDIX server The AUDIX ser...

Страница 19: ...A package is provided on a tape labeled Enhanced List Application To install ELA on a Lucent INTUITY R4 2 or higher system 1 Log in to the Lucent INTUITY system using craft or tsc 2 Starting from the...

Страница 20: ...ot remove the tape The following packages are available 1 ELA Enhanced List Application Package Select package s you wish to process or all to process all packages default all q NOTE If you receive a...

Страница 21: ...pe 8 Enter q 9 Press F6 repeatedly to return to the main menu 10 Continue with the next procedure Rebooting the System Rebooting the System Rebooting is a 2 step process First the voice system must be...

Страница 22: ...mediate shutdown 8 Press F3 The system displays the following message Shutdown started When the system is completely shut down the system displays the message The system is down Press Ctrl Alt Del to...

Страница 23: ...led for your system Increase the number of mailing lists AUDIX allows on the system Define an ELA Class of Service Set up ELA and shadow mailbox Community IDs Administer TCP IP on the AUDIX server Def...

Страница 24: ...A feature continue with the next procedure NOTE You must log off the system and log back on to get enhanced lists to display as an option on the Lucent INTUITY main menu Verifying that ELA is Enabled...

Страница 25: ...imits to support ELA 1 Starting from the main menu Figure 3 1 on page 3 14 select 2 At the enter command prompt enter either The system displays the System Parameters Limits screen 3 Tab to the Lists...

Страница 26: ...k for explanations of the other fields on these screens and their implications NOTE ELA can take up to 12 hours to show the changes you make to subscriber information in INTUITY AUDIX Before you begin...

Страница 27: ...eld under PERMISSIONS Otherwise enter none NOTE If you administer your system such that ELA mailboxes are to be accessible only by direct addressing and later decide you would like some ELA mailboxes...

Страница 28: ...Ordinarily there are no old or unopened messages ELA will forward old unopened messages in the event service is interrupted 14 in the Retention Times days Unopened field The same explanation holds tr...

Страница 29: ...e purpose and implementation of Community IDs in more detail Things to Consider ELA mailing lists are a powerful messaging tool that all users in your AUDIX network can access However should your busi...

Страница 30: ...ot go to the shadow mailbox Also you will have to administer the rest of your user population to belong to a community restricted from sending messages to the enhanced list mailbox community for examp...

Страница 31: ...Things to Consider on page 3 19 Sender Community 9 would be blank horizontally from left to right and Recipient Community 10 would be blank vertically from top to bottom 5 If all users are to have ac...

Страница 32: ...the example discussed under Things to Consider on page 3 19 Recipient Community 11 would contain r s vertically from top to bottom 7 Press F3 to save the information in the system database The system...

Страница 33: ...usted server to communicate with AUDIX Before You Begin You will need to know the Network IP address Host Identifier AUDIX server name Subnet mask Gateway Identifier ID to administer TCP IP Your PC LA...

Страница 34: ...r_1 is allowed 3 Enter the IP Internet Protocol address in the IP Address field and press This is the Lucent INTUITY system s address Your PC LAN system administrator should have this information If y...

Страница 35: ...then F2 The system displays the Ethernet Board Configuration window Figure 3 7 Figure 3 7 Ethernet Board Configuration Window Administering TCP IP for Enhanced List Application ELA 7 Press F2 to displ...

Страница 36: ...erved for use by ELA The following procedure administers the maximum number of IMAPI sessions you will allow trusted servers to use simultaneously but does not guarantee that an IMAPI session will be...

Страница 37: ...value For example if the field currently reads 30 enter 32 This number includes sessions for users who are logged into their mailboxes using Message Manager or an e mail application supported by INTUI...

Страница 38: ...nown as a trusted server SECURITY ALERT The procedures in this section include setting a password the trusted server must use to access AUDIX There is a secondary layer of security in addition to a tr...

Страница 39: ...e INTUITY AUDIX server 1 Starting from the main menu Figure 3 1 on page 3 14 select 2 At the enter command prompt enter either The system displays the Trusted Server Profile screen Figure 3 9 To see a...

Страница 40: ...s display but will appear as a series of asterisks after you save 5 Enter the TCP IP address of this Lucent INTUITY in the form w x y z where each letter is a number 0 to 255 See page 3 23 for informa...

Страница 41: ...minister an IMAPI password If yes follow the procedures for setting the IMAPI password in your INTUITYMessaging Solutions Release 4 Administration book before proceeding to the next section If no go t...

Страница 42: ...Administering AUDIX for ELA 32 Issue 1 July 1997...

Страница 43: ...he enhanced lists optional Defining the AUDIX server and Administering Access To allow communication between ELA and AUDIX you must perform some initial ELA administration Before You Begin To administ...

Страница 44: ...page 3 16 To administer the ELA server 1 Starting from the main menu Figure 3 1 on page 3 14 select The Set Up Enhanced List System Data window displays Figure 4 1 Figure 4 1 Set Up Enhanced List Sys...

Страница 45: ...AUDIX Some AUDIX functions do not require passwords If a password is required then the one you enter here must match that password exactly If a password is not required you can delete any existing pa...

Страница 46: ...rd Valid Input 1 to 15 alphanumeric characters Enter the delivery trusted server password SHADOW MAILBOX ATTRIBUTES Mailbox Extension Valid Input 3 to 10 numeric characters Enter the extension to be u...

Страница 47: ...Manager does not differentiate between an enhanced list and a person s name Examples of names to avoid Jane_Doe Doe_Jane DEFAULT ENHANCED LIST MAILBOX ATTRIBUTES Class of Service Valid Input a number...

Страница 48: ...stern_District_Salesforce Begin the name with the number 1 Example 1_McDonnell_List Users can reach the enhanced list mailbox through Numbers Addressing as well as Names Addressing Since there are no...

Страница 49: ...97 39 Figure 4 2 Administer Enhanced Lists Window 2 Press F4 The system displays the New Enhanced List window Figure 4 3 Figure 4 3 New Enhanced List Window 3 Complete the fields in this window using...

Страница 50: ...know this extension Password Valid Input 5 to 15 numeric characters Enter the password for this list mailbox This password is for administrative purposes only Users who send messages to the ELA mailb...

Страница 51: ...servers including Lotus Integrated Messaging AMIS pre administered subscribers The following cannot be members of an enhanced list Public or private subscriber owned lists AMIS casual addresses Broad...

Страница 52: ...4 5 Add Member Window Adding Members to an Enhanced List 3 Enter one of the following The user s name as it appears in the AUDIX system This name can be another enhanced list The user s extension This...

Страница 53: ...ships 6 Review the Administer Enhanced Lists window If you want to change or delete any information you just entered a Press The Enhanced List Membership window displays b Select the member name you w...

Страница 54: ...ons menu displays Select Find List and press Enter the name or extension of the list you would like to add or change and press F3 The Administer Enhanced Lists window will re display with the specifie...

Страница 55: ...ame trusted servername b Press F3 to save this information in the system database c Continue entering names extensions e mail addresses until all new members have been added d Press F6 to return to th...

Страница 56: ...Enhanced List 7 Press F8 An Actions menu displays a Select Print List Membership and press The system displays the message Printing List Membership for Listname listextension and sends the list to the...

Страница 57: ...the specified list highlighted 3 Press F7 The system displays the Confirm Deletion of Enhanced List window Figure 4 7 Figure 4 7 Confirm Deletion of Enhanced List Window 4 Do you want to delete the a...

Страница 58: ...n 3 Press The system prompts with Please enter the extension and pound sign 4 Enter the extension for the enhanced list mailbox The system prompts with When finished recording press pound to approve o...

Страница 59: ...est users and test telephones 3 Using the procedures in the Installation manual specific to your platform use the test 1 telephone to create and send a voice mail message to the ELA mailbox Record the...

Страница 60: ...Administering ELA for AUDIX 50 Issue 1 July 1997...

Страница 61: ...an administration event Check the status line at the top of the AUDIX Administration screen at least once a day Other events besides those generated by ELA create administrative log entries but you ca...

Страница 62: ...dministration Checking the Delivery Failure Log The delivery failure log contains entries for all failed deliveries along with descriptive data regarding cause for the failure and other information Ch...

Страница 63: ...ess The system truncates addresses that are longer than 21 characters Parent List The list mailbox to which a user originally addressed the message Child List The last list mailbox a message reached p...

Страница 64: ...The login announcement already exists AMIS wrong number This is the wrong number for this AMIS analog recipient Too many AMIS xmits Too many transmission attempts for AMIS analog resulted in a transmi...

Страница 65: ...permit Reply to Sender Administer the enhanced list to allow Reply to Sender if appropriate Educate your users about ELA functionality Community IDs for the user or recipient incorrectly administered...

Страница 66: ...k the Administrator s Log for related alarms If an alarm warrants further action see Lucent INTUITY Messaging Solutions Release 4 Alarm and Log Messages 585 310 566 Verify network capabilities with yo...

Страница 67: ...working problems between originator system and recipient system Perform networking troubleshooting See Lucent INTUITY Messaging Solutions Digital Networking 585 310 567 for more information You inadve...

Страница 68: ...Preventative Maintenance and Troubleshooting 58 Issue 1 July 1997...

Страница 69: ...data lost re enter or restore Repair Action There are two recovery methods Access the Set Up Enhanced List System Data window and re enter all field information Restore data from the most recent backu...

Страница 70: ...our remote maintenance center Alarm Code 3 Event ID ELA delivts03 Alarm Level Warning Description Trusted server data corrupt re enter or restore Repair Action There are two recovery methods Access th...

Страница 71: ...Go to the Administer Enhanced Lists window b Use F4 NEW E LIST to re enter the name of each Enhanced List one at a time The individual members do not need to be re entered See Lucent INTUITY Messaging...

Страница 72: ...ructions about restoring data If you would prefer to have assistance with this restore contact your remote maintenance center Alarm Code 2 Event ID ELA shadow02 Alarm Level Warning Description Shadow...

Страница 73: ...recent backup of system data See Chapter 3 Common System Procedures in your maintenance book for instructions about restoring data If you would prefer to have assistance with this restore contact you...

Страница 74: ...le and to generate a log entry for a delivery failure Repair Action You can correct single instances of this problem by deleting messages from the shadow mailbox To access the shadow mailbox 1 In AUDI...

Страница 75: ...ough ELA badreca12 Description Bad record deleted from E List registry Check for missing lists extension ELA detected a corrupt record and took the following action If the message displays an extensio...

Страница 76: ...enhanced list did not contain any members In such a case ELA will delete the message Repair Procedure Perhaps you forgot to add the members to the Enhanced List or perhaps the enhanced list is no lon...

Страница 77: ...ted Enhanced Lists 2 Search for the extension of the other Enhanced List 3 Use F7 DELETE E LIST to delete the Enhanced List See Lucent INTUITY Messaging Solutions Release 4 Administration 585 310 564...

Страница 78: ...es unavailable for delivery trusted server The trusted server that delivers ELA messages cannot access AUDIX The message shows the amount of elapsed time in 30 minute increments since ELA has stopped...

Страница 79: ...ts 2 server name 24 C community IDs 19 21 36 37 40 COS administering 16 37 40 D delivery failure 52 codes 54 domains 3 E ELA activating 14 administering COS 16 alarms 51 59 characteristics 2 community...

Страница 80: ...11 S security e mail 6 external access 6 passwords 6 trusted servers 6 virus prevention 6 service degradation ports and 6 shadow mailbox 8 19 22 36 software requirements 5 system limits AUDIX 15 syst...

Отзывы: