INTUITY™ Messaging SolutionsEnhanced-List ApplicationRelease 1.0585-310-575Comcode 107975674Issue 1July 1997
About This Bookviii Issue 1 July 1997 Related ResourcesIf you need help with basic administrative procedures, see the INTUITY™ Messaging Solutions R
Issue 1 July 1997 1 1Enhanced-List ApplicationOverviewThis chapter describes the Enhanced-List Application (ELA) on an INTUITY™ AUDIX® Release 4 sys
Enhanced-List Application2 Issue 1 July 1997 Enhanced-List ApplicationThe Enhanced-List Application (ELA) greatly expands your business’ capability
ELA AdministrationIssue 1 July 19973 Forward messages to support staff automatically.If you often forward incoming messages, you can create an enha
Enhanced-List Application4 Issue 1 July 1997 This administration can be divided as follows:AUDIX Administration: Contact Professional Services (or
ELA AdministrationIssue 1 July 19975Hardware/Software RequirementsELA runs on the same machine as AUDIX. ELA must be installed on a Lucent INTUITY
Enhanced-List Application6 Issue 1 July 1997 Port Usage ImpactVoice port usage increases as recipients retrieve messages sent by ELA. Plan for the i
ELA AdministrationIssue 1 July 19977The IMAPI password is an optional, secondary level of security used to prevent an unauthorized source external t
Enhanced-List Application8 Issue 1 July 1997 cannot be infected with viruses embedded in these software files, client machines may become infected w
Issue 1 July 1997 9 2InstallationOverviewThis chapter describes how to install ELA on a Lucent INTUITY R4.2 or higher system. Installing the Softwar
Copyright 1997, Lucent TechnologiesAll Rights ReservedPrinted in U.S.A.NoticeEvery effort was made to ensure that the information in this book was c
Installation10 Issue 1 July 1997 Figure 2-1. Software Install Menu3. Insert the tape labeled Enhanced-List Application into the tape drive.4. Select
Rebooting the SystemIssue 1 July 1997116. Press to select all.The system installs the software and displays several status messages. When the soft
Installation12 Issue 1 July 1997 3. Press (F3) .The system stops the voice system and displays the a series of status messages. When the voice syste
Issue 1 July 1997 13 3Administering AUDIX for ELAOverviewTo define the ELA server and functionality to AUDIX: Contact Professional Services (or you
Administering AUDIX for ELA14 Issue 1 July 1997 Activating ELAAfter the ELA installation is complete, contact your Professional Services (or your ac
Increasing the Number of Mailing Lists Allowed on the SystemIssue 1 July 1997153. Ensure the following fields are set to ON: Enhanced List Applicat
Administering AUDIX for ELA16 Issue 1 July 1997 6. Press (F3) to save the information in the system database.The cursor returns to the command lin
Defining an ELA Class of ServiceIssue 1 July 199717 Figure 3-2. Class of Service Screen, Page 1; Defining a Class of Service for ELA3. Although not
Administering AUDIX for ELA18 Issue 1 July 1997 Figure 3-3. Subscriber Class of Service Parameters Screen, Page 2; Enabling ELA
Setting Up ELA and Shadow Mailbox Community IDsIssue 1 July 1997198. Press (F3) to save the information in the system database.The cursor returns
ContentsIssue 1 July 1997 iAbout This Book Purpose v Intended Audiences v Trademarks and Service Marks vi Related Resources viii How to Comment
Administering AUDIX for ELA20 Issue 1 July 1997 Let’s say you set up the enhanced-list mailbox community to be Community 10. Community 10 is given p
Setting Up ELA and Shadow Mailbox Community IDsIssue 1 July 1997212. At the enter command: prompt, enter either: The system displays the Sending R
Administering AUDIX for ELA22 Issue 1 July 1997 access to enhanced lists from sending a message to an Enhanced List.Following the example discussed
Administering TCP/IPIssue 1 July 199723Administering TCP/IPIf your system is already connected to the LAN, you can skip this procedure. However, you
Administering AUDIX for ELA24 Issue 1 July 1997 Figure 3-6. TCP/IP Administration Window; Administering TCP/IP for Enhanced-List Application (ELA)2.
Administering TCP/IPIssue 1 July 1997255. Enter the default gateway IP address in the Default Gateway IP Address: field.The default gateway IP addre
Administering AUDIX for ELA26 Issue 1 July 1997 NOTE:The changes to your system will not take effect until you reboot your system. See your INTUITY
Setting Up IMAPI Sessions for Trusted Server AccessIssue 1 July 199727 Figure 3-8. System-Parameters IMAPI-Options Screen, Page 1; Setting IMAPI Ses
Administering AUDIX for ELA28 Issue 1 July 1997 8. Press (F3) to save this information to the system database.The cursor returns to the command li
Defining Two ELA Trusted ServersIssue 1 July 199729 The TCP/IP address for the AUDIX server (see page 3-23).You will perform this procedure twice,
Contentsii Issue 1 July 1997 Increasing the Number of MailingLists Allowed on the System 15 Defining an ELA Class of Service 16 Setting Up ELA a
Administering AUDIX for ELA30 Issue 1 July 1997 3. In the Trusted-Server Name: field, enter a name for the first ELA trusted server. (See the Note b
Defining Two ELA Trusted ServersIssue 1 July 19973111. Do you want to administer an IMAPI password? If yes, follow the procedures for setting the I
Administering AUDIX for ELA32 Issue 1 July 1997
Issue 1 July 1997 33 4Administering ELA for AUDIXOverviewNow that the AUDIX system knows about the ELA trusted servers, you can do the initial admin
Administering ELA for AUDIX34 Issue 1 July 1997 Enhanced-list mailbox and shadow mailbox Community IDs (see page 3-20) ELA Class of Service (see
Defining the AUDIX server and Administering AccessIssue 1 July 199735Table 4-1. Field Definitions: Set Up Enhanced-List System Data WindowField Name
Administering ELA for AUDIX36 Issue 1 July 1997 Password: Valid Input:5- to 10-alphanumeric charactersEnter the Administrative trusted server passwo
Guidelines for Naming Enhanced ListsIssue 1 July 1997373. Press (F3) to save the ELA server information to the system database.The system displays
Administering ELA for AUDIX38 Issue 1 July 1997 Give enhanced lists names that reflect an organization or a function. Include the word list. Examp
Creating Enhanced ListsIssue 1 July 199739Figure 4-2. Administer Enhanced-Lists Window2. Press (F4) .The system displays the New Enhanced-List windo
ContentsIssue 1 July 1997 iii Checking the Administrator’s Log 51 Checking the Delivery Failure Log 52 Delivery Failure Codes 54 Troubleshooting
Administering ELA for AUDIX40 Issue 1 July 1997 4. Press (F3) to save this information in the system database.The cursor displays in the Administe
Creating Enhanced ListsIssue 1 July 199741Guidelines for Selecting Enhanced-List MembersThe following subscribers can be members of an enhanced list
Administering ELA for AUDIX42 Issue 1 July 1997 Figure 4-4. Enhanced List Membership for Listname Window2. Press (F4) .The system displays the Add M
Creating Enhanced ListsIssue 1 July 1997434. Press (F3) to save this information in the system database.NOTE:The Entries: field at the top of the
Administering ELA for AUDIX44 Issue 1 July 1997 The system displays the Administer Enhanced-Lists window (Figure 4-2). The names of your enhanced li
Creating Enhanced ListsIssue 1 July 199745 Delete a member from the list (Step 6) Print the list to your system printer (Step 7)Adding a Member4.
Administering ELA for AUDIX46 Issue 1 July 1997 Deleting a Member6. To delete a member:a. Locate the member name to be deleted. See ‘‘Finding a Memb
Deleting an Enhanced ListIssue 1 July 1997472. Use the arrow keys to highlight the line that represents the list you want to delete. If the list to
Administering ELA for AUDIX48 Issue 1 July 1997 Recording Names for Enhanced ListsOnce you have established an enhanced list, is a good idea to reco
Testing INTUITY Enhanced ListsIssue 1 July 199749 "Defining an ELA Class of Service" on page 3-16 "Setting Up ELA and Shadow Mailbo
Contentsiv Issue 1 July 1997
Administering ELA for AUDIX50 Issue 1 July 1997
Issue 1 July 1997 51 5Preventative Maintenance and Troubleshooting OverviewThis section describes how to check for system alarms relating to ELA and
Preventative Maintenance and Troubleshooting52 Issue 1 July 1997 5. Press (F3) to display the alarm entries.6. Examine the displayed entries. See
Checking the Delivery Failure LogIssue 1 July 1997532. Press (F8) to send a copy of this report to the system printer, if you have a printer avail
Preventative Maintenance and Troubleshooting54 Issue 1 July 1997 Delivery Failure CodesDelivery failure logs contain the following codes: Table 5-2.
Troubleshooting ELAIssue 1 July 199755Troubleshooting ELATable 5-3 lists questions users ask the system administrator and suggested remedies to comm
Preventative Maintenance and Troubleshooting56 Issue 1 July 1997 Recipient claims s/he did not get an ELA message. Mailing list not currentCheck th
Troubleshooting ELAIssue 1 July 199757“Everyone else seemed to have received their enhanced-list message. I got mine much later.”User mailbox full C
Preventative Maintenance and Troubleshooting58 Issue 1 July 1997
Issue 1 July 1997 59 6AlarmsOverviewThe following alarms are associated with the Enhanced-List Application. DELIVTS Resource TypeAlarm Code: 1Event
Issue 1 July 1997 v About This BookPurposeThis book contains instructions for installing and administrating the Enhanced-List Application (ELA) on a
Alarms60 Issue 1 July 1997 Alarm Code: 2Event ID: ELA-delivts02 Alarm Level: WarningDescription: Trusted-server data partially lost, re-enter or
REGISTRY Resource TypeIssue 1 July 1997612. Verify/administer the screen information, as required. 3. Repeat for the delivery trusted server. 4. Ent
Alarms62 Issue 1 July 1997 SHADOW Resource TypeAlarm Code: 1Event ID: ELA-shadow01 Alarm Level: WarningDescription: Shadow mailbox data lost, re-
SHADOW Resource TypeIssue 1 July 199763Alarm Code: 3Event ID: ELA-shadow03 Alarm Level: WarningDescription: Shadow mailbox data corrupt, re-enter
Alarms64 Issue 1 July 1997 Repair Action: Access the Set Up Enhanced-List System Data window and re-enter the shadow mailbox extension and community
EL — Enhanced-List ApplicationIssue 1 July 199765If you regularly get this alarm, the following questions can help you evaluate how your business us
Alarms66 Issue 1 July 1997 Event ID: ELA-lostlock01 through ELA-lostlock10 Description: Messages to an enhanced list could not be delivered because
EL — Enhanced-List ApplicationIssue 1 July 199767Repair Procedure: Evaluate list membership hierarchy and delete unnecessary nesting so that ELA c
Alarms68 Issue 1 July 1997 2. Verify that the shadow mailbox belongs to a community that cannot receive messages. NOTE:The sending restrictions must
Issue 1 July 1997 69 INIndexAadministering, 34AUDIX, 3COS, 16LAN, 23TCP/IP, 23administrator’s log, 51alarms, 51ELA-badreca01 through ELA-badreca12,
About This Bookvi Issue 1 July 1997 Trademarks and Service MarksThe following trademarked products are mentioned in books in the Lucent INTUITY docu
Index70 Issue 1 July 1997LLAN administration, 5, 23logs, 51delivery failure, 52Mmailboxes, 6, 7, 17, 28mailing lists, 19AUDIX, 2messaging traffic, 5
Trademarks and Service MarksIssue 1 July 1997vii Novell® is a registered trademark of Novell, Inc. Paradyne® is a registered trademark of Lucent T
Commentaires sur ces manuels