Equinox Systems MEGAPLEX Manuel d'installation

Naviguer en ligne ou télécharger Manuel d'installation pour Mise en réseau Equinox Systems MEGAPLEX. Equinox Systems MEGAPLEX Installation manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 80
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
INTUITY™ Messaging Solutions
Enhanced-List Application
Release 1.0
585-310-575
Comcode 107975674
Issue 1
July 1997
Vue de la page 0
1 2 3 4 5 6 ... 79 80

Résumé du contenu

Page 1 - INTUITY™ Messaging Solutions

INTUITY™ Messaging SolutionsEnhanced-List ApplicationRelease 1.0585-310-575Comcode 107975674Issue 1July 1997

Page 2

About This Bookviii Issue 1 July 1997 Related ResourcesIf you need help with basic administrative procedures, see the INTUITY™ Messaging Solutions R

Page 3 - Contents

Issue 1 July 1997 1 1Enhanced-List ApplicationOverviewThis chapter describes the Enhanced-List Application (ELA) on an INTUITY™ AUDIX® Release 4 sys

Page 4

Enhanced-List Application2 Issue 1 July 1997 Enhanced-List ApplicationThe Enhanced-List Application (ELA) greatly expands your business’ capability

Page 5

ELA AdministrationIssue 1 July 19973 Forward messages to support staff automatically.If you often forward incoming messages, you can create an enha

Page 6

Enhanced-List Application4 Issue 1 July 1997 This administration can be divided as follows:AUDIX Administration: Contact Professional Services (or

Page 7 - About This Book

ELA AdministrationIssue 1 July 19975Hardware/Software RequirementsELA runs on the same machine as AUDIX. ELA must be installed on a Lucent INTUITY

Page 8 - Trademarks and Service Marks

Enhanced-List Application6 Issue 1 July 1997 Port Usage ImpactVoice port usage increases as recipients retrieve messages sent by ELA. Plan for the i

Page 9

ELA AdministrationIssue 1 July 19977The IMAPI password is an optional, secondary level of security used to prevent an unauthorized source external t

Page 10 - How to Comment on This Book

Enhanced-List Application8 Issue 1 July 1997 cannot be infected with viruses embedded in these software files, client machines may become infected w

Page 11 - Enhanced-List Application

Issue 1 July 1997 9 2InstallationOverviewThis chapter describes how to install ELA on a Lucent INTUITY R4.2 or higher system. Installing the Softwar

Page 12 - What ELA Can Do for You

Copyright  1997, Lucent TechnologiesAll Rights ReservedPrinted in U.S.A.NoticeEvery effort was made to ensure that the information in this book was c

Page 13 - ELA Administration

Installation10 Issue 1 July 1997 Figure 2-1. Software Install Menu3. Insert the tape labeled Enhanced-List Application into the tape drive.4. Select

Page 14 - ELA Message Delivery

Rebooting the SystemIssue 1 July 1997116. Press to select all.The system installs the software and displays several status messages. When the soft

Page 15 - Remote Message Impact

Installation12 Issue 1 July 1997 3. Press (F3) .The system stops the voice system and displays the a series of status messages. When the voice syste

Page 16 - External Security

Issue 1 July 1997 13 3Administering AUDIX for ELAOverviewTo define the ELA server and functionality to AUDIX: Contact Professional Services (or you

Page 17 - Internal Security

Administering AUDIX for ELA14 Issue 1 July 1997 Activating ELAAfter the ELA installation is complete, contact your Professional Services (or your ac

Page 18 - Shadow Mailbox

Increasing the Number of Mailing Lists Allowed on the SystemIssue 1 July 1997153. Ensure the following fields are set to ON: Enhanced List Applicat

Page 19 - Installation

Administering AUDIX for ELA16 Issue 1 July 1997 6. Press (F3) to save the information in the system database.The cursor returns to the command lin

Page 20 - 10 Issue 1 July 1997

Defining an ELA Class of ServiceIssue 1 July 199717 Figure 3-2. Class of Service Screen, Page 1; Defining a Class of Service for ELA3. Although not

Page 21 - Rebooting the System

Administering AUDIX for ELA18 Issue 1 July 1997 Figure 3-3. Subscriber Class of Service Parameters Screen, Page 2; Enabling ELA

Page 22 - 12 Issue 1 July 1997

Setting Up ELA and Shadow Mailbox Community IDsIssue 1 July 1997198. Press (F3) to save the information in the system database.The cursor returns

Page 23 - Administering AUDIX for ELA

ContentsIssue 1 July 1997 iAbout This Book Purpose v Intended Audiences v Trademarks and Service Marks vi Related Resources viii How to Comment

Page 24 - Verifying that ELA is Enabled

Administering AUDIX for ELA20 Issue 1 July 1997 Let’s say you set up the enhanced-list mailbox community to be Community 10. Community 10 is given p

Page 25 - Lists Allowed on the System

Setting Up ELA and Shadow Mailbox Community IDsIssue 1 July 1997212. At the enter command: prompt, enter either: The system displays the Sending R

Page 26 - 16 Issue 1 July 1997

Administering AUDIX for ELA22 Issue 1 July 1997 access to enhanced lists from sending a message to an Enhanced List.Following the example discussed

Page 27 - NEXTPAGE

Administering TCP/IPIssue 1 July 199723Administering TCP/IPIf your system is already connected to the LAN, you can skip this procedure. However, you

Page 28 - 18 Issue 1 July 1997

Administering AUDIX for ELA24 Issue 1 July 1997 Figure 3-6. TCP/IP Administration Window; Administering TCP/IP for Enhanced-List Application (ELA)2.

Page 29 - Community IDs

Administering TCP/IPIssue 1 July 1997255. Enter the default gateway IP address in the Default Gateway IP Address: field.The default gateway IP addre

Page 30 - ELA Community ID

Administering AUDIX for ELA26 Issue 1 July 1997 NOTE:The changes to your system will not take effect until you reboot your system. See your INTUITY

Page 31

Setting Up IMAPI Sessions for Trusted Server AccessIssue 1 July 199727 Figure 3-8. System-Parameters IMAPI-Options Screen, Page 1; Setting IMAPI Ses

Page 32 - Shadow Mailbox Community ID

Administering AUDIX for ELA28 Issue 1 July 1997 8. Press (F3) to save this information to the system database.The cursor returns to the command li

Page 33 - Administering TCP/IP

Defining Two ELA Trusted ServersIssue 1 July 199729 The TCP/IP address for the AUDIX server (see page 3-23).You will perform this procedure twice,

Page 34 - 24 Issue 1 July 1997

Contentsii Issue 1 July 1997 Increasing the Number of MailingLists Allowed on the System 15 Defining an ELA Class of Service 16 Setting Up ELA a

Page 35

Administering AUDIX for ELA30 Issue 1 July 1997 3. In the Trusted-Server Name: field, enter a name for the first ELA trusted server. (See the Note b

Page 36 - Trusted Server Access

Defining Two ELA Trusted ServersIssue 1 July 19973111. Do you want to administer an IMAPI password? If yes, follow the procedures for setting the I

Page 37

Administering AUDIX for ELA32 Issue 1 July 1997

Page 38 - SECURITY ALERT:

Issue 1 July 1997 33 4Administering ELA for AUDIXOverviewNow that the AUDIX system knows about the ELA trusted servers, you can do the initial admin

Page 39 - NTUITY System

Administering ELA for AUDIX34 Issue 1 July 1997 Enhanced-list mailbox and shadow mailbox Community IDs (see page 3-20) ELA Class of Service (see

Page 40 - 30 Issue 1 July 1997

Defining the AUDIX server and Administering AccessIssue 1 July 199735Table 4-1. Field Definitions: Set Up Enhanced-List System Data WindowField Name

Page 41

Administering ELA for AUDIX36 Issue 1 July 1997 Password: Valid Input:5- to 10-alphanumeric charactersEnter the Administrative trusted server passwo

Page 42 - 32 Issue 1 July 1997

Guidelines for Naming Enhanced ListsIssue 1 July 1997373. Press (F3) to save the ELA server information to the system database.The system displays

Page 43 - Administering ELA for AUDIX

Administering ELA for AUDIX38 Issue 1 July 1997 Give enhanced lists names that reflect an organization or a function. Include the word list. Examp

Page 44 - 34 Issue 1 July 1997

Creating Enhanced ListsIssue 1 July 199739Figure 4-2. Administer Enhanced-Lists Window2. Press (F4) .The system displays the New Enhanced-List windo

Page 45 - Backspace

ContentsIssue 1 July 1997 iii Checking the Administrator’s Log 51 Checking the Delivery Failure Log 52 Delivery Failure Codes 54 Troubleshooting

Page 46 - WARNING:

Administering ELA for AUDIX40 Issue 1 July 1997 4. Press (F3) to save this information in the system database.The cursor displays in the Administe

Page 47 - Continued

Creating Enhanced ListsIssue 1 July 199741Guidelines for Selecting Enhanced-List MembersThe following subscribers can be members of an enhanced list

Page 48 - Creating Enhanced Lists

Administering ELA for AUDIX42 Issue 1 July 1997 Figure 4-4. Enhanced List Membership for Listname Window2. Press (F4) .The system displays the Add M

Page 49 - NEW E-LIST

Creating Enhanced ListsIssue 1 July 1997434. Press (F3) to save this information in the system database.NOTE:The Entries: field at the top of the

Page 50 - 40 Issue 1 July 1997

Administering ELA for AUDIX44 Issue 1 July 1997 The system displays the Administer Enhanced-Lists window (Figure 4-2). The names of your enhanced li

Page 51 - OPEN E-LIST

Creating Enhanced ListsIssue 1 July 199745 Delete a member from the list (Step 6) Print the list to your system printer (Step 7)Adding a Member4.

Page 52 - 42 Issue 1 July 1997

Administering ELA for AUDIX46 Issue 1 July 1997 Deleting a Member6. To delete a member:a. Locate the member name to be deleted. See ‘‘Finding a Memb

Page 53 - DELETE MEMBER

Deleting an Enhanced ListIssue 1 July 1997472. Use the arrow keys to highlight the line that represents the list you want to delete. If the list to

Page 54 - 44 Issue 1 July 1997

Administering ELA for AUDIX48 Issue 1 July 1997 Recording Names for Enhanced ListsOnce you have established an enhanced list, is a good idea to reco

Page 55 - Finding a Member

Testing INTUITY Enhanced ListsIssue 1 July 199749 "Defining an ELA Class of Service" on page 3-16 "Setting Up ELA and Shadow Mailbo

Page 56 - Deleting an Enhanced List

Contentsiv Issue 1 July 1997

Page 57 - Listname

Administering ELA for AUDIX50 Issue 1 July 1997

Page 58 - NTUITY Enhanced Lists

Issue 1 July 1997 51 5Preventative Maintenance and Troubleshooting OverviewThis section describes how to check for system alarms relating to ELA and

Page 59 - NTUITY AUDIX.”

Preventative Maintenance and Troubleshooting52 Issue 1 July 1997 5. Press (F3) to display the alarm entries.6. Examine the displayed entries. See

Page 60 - 50 Issue 1 July 1997

Checking the Delivery Failure LogIssue 1 July 1997532. Press (F8) to send a copy of this report to the system printer, if you have a printer avail

Page 61 - Troubleshooting

Preventative Maintenance and Troubleshooting54 Issue 1 July 1997 Delivery Failure CodesDelivery failure logs contain the following codes: Table 5-2.

Page 62 - 52 Issue 1 July 1997

Troubleshooting ELAIssue 1 July 199755Troubleshooting ELATable 5-3 lists questions users ask the system administrator and suggested remedies to comm

Page 63

Preventative Maintenance and Troubleshooting56 Issue 1 July 1997 Recipient claims s/he did not get an ELA message. Mailing list not currentCheck th

Page 64 - Delivery Failure Codes

Troubleshooting ELAIssue 1 July 199757“Everyone else seemed to have received their enhanced-list message. I got mine much later.”User mailbox full C

Page 65 - Troubleshooting ELA

Preventative Maintenance and Troubleshooting58 Issue 1 July 1997

Page 66 - 56 Issue 1 July 1997

Issue 1 July 1997 59 6AlarmsOverviewThe following alarms are associated with the Enhanced-List Application. DELIVTS Resource TypeAlarm Code: 1Event

Page 67

Issue 1 July 1997 v About This BookPurposeThis book contains instructions for installing and administrating the Enhanced-List Application (ELA) on a

Page 68 - 58 Issue 1 July 1997

Alarms60 Issue 1 July 1997 Alarm Code: 2Event ID: ELA-delivts02 Alarm Level: WarningDescription: Trusted-server data partially lost, re-enter or

Page 69 - DELIVTS Resource Type

REGISTRY Resource TypeIssue 1 July 1997612. Verify/administer the screen information, as required. 3. Repeat for the delivery trusted server. 4. Ent

Page 70

Alarms62 Issue 1 July 1997 SHADOW Resource TypeAlarm Code: 1Event ID: ELA-shadow01 Alarm Level: WarningDescription: Shadow mailbox data lost, re-

Page 71 - REGISTRY Resource Type

SHADOW Resource TypeIssue 1 July 199763Alarm Code: 3Event ID: ELA-shadow03 Alarm Level: WarningDescription: Shadow mailbox data corrupt, re-enter

Page 72 - SHADOW Resource Type

Alarms64 Issue 1 July 1997 Repair Action: Access the Set Up Enhanced-List System Data window and re-enter the shadow mailbox extension and community

Page 73

EL — Enhanced-List ApplicationIssue 1 July 199765If you regularly get this alarm, the following questions can help you evaluate how your business us

Page 74 - Event ID: ELA-shadow06

Alarms66 Issue 1 July 1997 Event ID: ELA-lostlock01 through ELA-lostlock10 Description: Messages to an enhanced list could not be delivered because

Page 75

EL — Enhanced-List ApplicationIssue 1 July 199767Repair Procedure: Evaluate list membership hierarchy and delete unnecessary nesting so that ELA c

Page 76 - Event ID: ELA-nestvioltn

Alarms68 Issue 1 July 1997 2. Verify that the shadow mailbox belongs to a community that cannot receive messages. NOTE:The sending restrictions must

Page 77 - Event ID: ELA-chkrestrct

Issue 1 July 1997 69 INIndexAadministering, 34AUDIX, 3COS, 16LAN, 23TCP/IP, 23administrator’s log, 51alarms, 51ELA-badreca01 through ELA-badreca12,

Page 78 - Event ID: ELA-delivts05

About This Bookvi Issue 1 July 1997 Trademarks and Service MarksThe following trademarked products are mentioned in books in the Lucent INTUITY docu

Page 79

Index70 Issue 1 July 1997LLAN administration, 5, 23logs, 51delivery failure, 52Mmailboxes, 6, 7, 17, 28mailing lists, 19AUDIX, 2messaging traffic, 5

Page 80 - 70 Issue 1 July 1997

Trademarks and Service MarksIssue 1 July 1997vii Novell® is a registered trademark of Novell, Inc. Paradyne® is a registered trademark of Lucent T

Commentaires sur ces manuels

Pas de commentaire