Copyright 1997, Lucent Te chnologies
All Rights Reserved
Printed in U.S.A.
Notice
Every effort was made to ensure that the information in this book was
complete and accurate at the ti me of printing. However, inf or m ation
is subjec t to change.
Your Responsibility for Your System’s Security
Toll fraud is the unauthorized use of your telecommunications system
by an unauthorized party, for example, per s ons other than your com-
pany’s emplo yee s, age nts, sub con trac tor s, or per so ns worki ng on your
company’s behalf. Note that th ere may be a risk of toll f r aud as s ociated with your telecommunications system and, if toll fraud occurs, it
can result in substantial additional charges for your telecommunications services.
You and you r system manager are responsi ble for the security of your
system, such as progra mming and configuring you r equipment to prevent unauthorized use. The system manager is also responsible for
reading all installation, instruction, and system administration documents provided with this product in order to fully understand the features that can introduce ri s k of toll fraud and the steps that can be
taken to re duce that risk. Lucent Technologies does not warra nt that
this product is immune from or will prevent unauthorized use of common-carri er telecommunication ser vices or facilities accessed thr ough
or connected to it. Luce nt Tec hno lo gi es will not be respo nsible for
any charges that result from s uch unauthor ized use.
Lucent Technologies Fraud Intervention
If you suspect that you are being vict imi zed by tol l fraud and you need
technical s upport or assistance, call Technical Service Center Toll
Fraud Interventio n Hotlin e at 1 800 643-2 353 .
Federal Communications Commission Statement
Part 15: Class A Statement. This equipment has been tested an d
found to comply with the limits for a Class A digital device, pursuant
to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interfer ence when the equi pment is
operated in a commercial environment. This equipment generates,
uses, and can radiate radio-frequency energy and, if not install ed and
used in accor dance with the instructions, may cause harmful int erference to radio communications. Operation of this equipm ent in a residential area is likely to cause harmful interference, in which case the
user will be required to correct the interference at his own expense.
Canadian Department of Communications (DOC)
Interference I nformation
This digital ap pa r a t u s do es no t ex c e ed the Cla s s A li m i ts f or r a dio
noise emissi ons set out in t he radio interference regulations of the
Canadian Depar tment of Communications.
ésent Appareil Nomé riqu e n’émet pas de brui ts r adioélectr iq ues
Le Pr
épassant les limites applicables aux appareils numériques de la class
d
éscrites dans le reglement sur le brouillage radio é l ectrique édicté
A pr
par le minist
Trademarks
See the preface of this document.
Ordering Information
Call:Lucent Technologies Publications Cent er
Write:Lucent Technologies Publications Cent er
Order:Document No. 585-310-575
For additional documents, refer to the section in “About This Document” entitled “Related Resou rc es .”
You can be placed on a standing order list for this an d other documents you may nee d. Standing order will enab le you to autom ati cally
receive update d versions of individual documents or document sets ,
billed to account information that you provide. For more information
on standing orders, or to be put on a li s t to receive future is s ues of thi s
document, contact the Luce nt Technologies Publications Center.
Comments
To comment on this document, return the comment card at the front of
the document.
Acknowledgment
This document was prepared by the Product Documentation Development, Lucent Technologies , Denver, CO and Co lumbus, OH.
ére des Communications du Canada.
Voice 1 800 457 -1 235 International Vo ice 317 361-5353
Fax 1 800 457-1764International Fax 317 361-5355
P.O. Box 4100
Crawfordsv ille, IN 47933
Comcode 107975674
Issue 1, July 1997
Part 68: Network Registration Number. This equipment is registered with the FCC in accordance with Part 68 of the FCC Rules. It is
identified by FCC registratio n numb er xxx.
Part 68: Answer-Supervision Signaling. Allo win g th is eq ui pme n t t o
be operated in a manner that does not provide proper answer-supervision signaling is in viola tio n of Part 68 R ules. This eq uip men t ret urns
answer-supervision s ignals to the public switched network when :
• Answered by the called station
• Answered by the attendant
• Routed to a recorded announcement that can be administered
by the CPE user
This equipment returns answer-supervision signals on all DID calls
forwarded back to the public switched telephone network. Per m issible exceptions are:
• A call is unanswered
• A busy tone i s re ceived
• A reorder tone is received
Contents
About This Book
■ Purposev
■ Intended Audiencesv
■ Trademarks and Service Marksvi
■ Related Resourcesviii
■ How to Comment on This Bookviii
1 Enhanc e d-List A pplicat io n
■ Overview1
Audience1
What You Should Know1
■ Enhanced-List Application2
■ What ELA Can Do for You2
■ ELA Administration3
Basic Concep t s3
Planning with Professional Services3
Things to Consider4
2 Installation
■ Overview9
■ Installing the Software9
■ Rebooting the System11
3 Administering AUDIX for ELA
■ Overview13
■ Activating ELA14
■ Verifying that ELA is Enabled14
Issue 1 July 1997i
Contents
■ Increasing the Number of Mailing
Lists Allowed on the System15
■ Defining an ELA Class of Service16
■ Setting Up ELA and Shadow Mailbox
Community IDs19
Things to Consider19
Before You Begin20
ELA Community ID20
Shadow Mailbox Community ID22
■ Administering TCP/IP23
Before You Begin23
■ Setting Up IMAPI Sessions for
Trusted Server Access26
■ Defining Two ELA Trusted Servers28
Before You Begin28
4 Administering ELA for AUDIX
■ Overview33
■ Defining the AUDIX server and
Administering Access33
Before You Begin33
■ Guidelines for Naming Enhanced Lists37
■ Creating Enhanced Lists38
Guidelines for Selecting Enhanced-List Members41
Adding Members to Enhanced Lists41
Adding/Deleting Mem bers to an Enhanced List43
■ Deleting an Enhanced List46
■ Recording Names for Enhanced Lists48
■ Testing INTUITY Enhanced Lists48
5 Preventative Maintenance and Troubleshooting
■ Overview51
iiIssue 1 July 1997
Contents
■ Checking the Administrator’s Log51
■ Checking the Delivery Failure Log52
■ Delivery Failure Codes54
■ Troubleshooting ELA55
6 Alarms
■ Overview59
■ DELIVTS Resource Type59
■ REGISTRY Reso urce Type61
■ SHADOW Resource Type62
■ EL — Enhanced-List Application65
IN Index
Issue 1 July 1997iii
Contents
ivIssue 1 July 1997
About This Book
Purpose
This book contains instructions for installing and administrating the
Enhanced-List Application (ELA) on an I
Intended Audiences
This book is intended primarily for the on-site technical personnel who are
responsible for installing and configuring the system and performing initial
administration and acceptance testing. Second ary audienc es include the
following from Lucent:
■Field support — Technical Service Organiza tion (TSO)
■Helpline personnel
■Factory assemble, load, and test (ALT) personnel
■Provisioning project managers — Sales and Technical Resource Center
(STRC)
This book assumes that the primary users of this book have completed the
NTUITY AUDIX Administration training course.
I
NTUITY™ AUDIX
®
R4 system.
Issue 1 July 1997v
About This Book
Trademarks and Service Marks
The following trademarked products are mentioned in books in the Lucent INTUITY
document set:
■AT™ is a trademark of Hayes Microcomputer Products, Inc.
■AUDIX
■cc:Mail
Development Corporation.
■COMSPHERE
Paradyne Corp.
■CONVERSANT
Lucent Technologies™.
■DEFINITY
■DMS-100™ is a trademark of Northern Telecom Limited.
■Dterm™ is a trademark of NEC Telephones, Inc.
■Equinox™ is a trademark of Equinox Systems, Inc.
■5ESS
®
is a registered trademark of Lucent Technologies™.
®
is a registered trademark of cc:Mail, a subsidiary of Lotus
®
is a registered trademark of Lucent Technologies™
®
Voice Information System is a registered trademark of
®
is a registered trademark of Lucent Technologies™.
®
is a registered trademark of Lucent Technologies™.
■INTUITY™ is a trademark of Lucent Technologies™.
■Lotus Notes
®
is a registered trademark of Lotus Development
Corporation.
■MEGAPORT™ is a trademark of Equinox Systems , Inc.
■MEGAPLEX™ is a trademark of Equinox Systems, Inc.
■Meridian™ is a trademark of Northern Telecom Limited.
■MERL IN L EGEND
■Microcom Networking Protocol
®
is a registered trademark of Lucent Technologies™.
®
is a registered trademark of Microcom,
Inc.
■Microsoft
■MS
■MS-DOS
■Mitel™ is a trademark of Mitel Corporation.
■NEAX™ is a trademark of NEC Telephone, Inc.
■NEC
■Netware
■Netware
■Northern Telecom
®
is a registered trademark of Microsoft Corporation.
®
is a registered trademark of Microsoft Corporation.
®
is a registered trademark of Microsoft Corporation.
®
is a registered trademark of NEC Telephone, Inc.
®
is a registered trademark of Novell, Inc.
®
Loadable Module™ is a registered trademark of Novell, Inc.
®
is a registered trademark of Northern Telecom
Limited.
viIssue 1 July 1997
Trademarks and Service Marks
■Novell
■Parady n e
■Phillips
■Rolm
■SL-1™ is a trademark of Northern Telecom Limited.
■softFAX
■SUPERSET™ is a trademark of Mitel Corporation.
■SX-100™ is a trademark of Mitel Corporation.
■SX-200™ is a trademark of Mitel Corporation.
■SX-2000™ is a trademark of Mitel Corporation.
■Telephony OneStip™ is a trademark of Lotus Development Corporation.
■TMI™ is a trademark of Texas Micro Systems, Inc.
■UNIX
■Voice Bridge
®
is a registered trademark of Novell, Inc.
®
is a registered trademark of Lucent Technologies™.
®
is a registered tradema rk of Ph illi ps Sc re w C ompany.
®
is a registered trademark of International Business Machines.
®
is a registered trademark of VOXEM, Inc.
®
is a registered trademark of UNIX Systems Laboratories, Inc.
®
is a registered trademark of Voice Technologies Group,
Inc.
■VOXEM
■VT100™ is a trademark of Digital Equipment Corporation.
®
is a registered trademark of VOXEM, Inc.
■Windows™ is a trademark of Microsoft Corporation.
Issue 1 July 1997
vii
About This Book
Related Resources
If you need help with basic administrative procedures, see the
Messaging Solutions Release 4 Administration
How to Comment on This Book
We are always interested in your suggestions for improving this book. Please
complete and return the reader comment card that is located behind the title
page.
If the reader comment card has been removed, send your comments to:
Lucent Technologies
Product Documentation
Room 22-2H15
11900 North Pecos Street
Denver, Colorado 80234
Alternatively, you can fax your comments to:
Lucent I
(303) 538-1741
Please be sure to mention the name and order number of this book.
NTUITY Writing Team
I
NTUITY
book, 585-310-564.
™
viiiIssue 1 July 1997
Enhanced-List Application
Overview
This chapter describes the Enhanced-List Application (ELA) on an INTUITY™
®
AUDIX
Release 4 system.
1
Audience
Read this book if you are the AUDIX system administrato r respon si b le fo r the
configuration and maintenance of an I
What You Should Know
The procedures in this chapter assume you know basic Lucent INTUITY
commands and navigation, such as logging in and out of the system, the
difference between the VM and SA logins, command prompt function and usage,
and how to move from field-to-field within a screen or window.
If you are not familiar with Lucent I
I
NTUITY
Messaging Solutions Release 4 Administration
NTUITY AUDIX Release 4 system.
NTUITY system basics, please read Chapter 1 i n
before you continue.
Issue 1 July 19971
Enhanced-List Application
Enhan c e d-List Applica tion
The Enhanced-List Application (ELA) greatly expands your business’ capability
to deliver messages to large numbers of recipients. A single enhanced list can
contain 1500 addresses and you – the system administrator – can create up to
100 such lists. Enhanced lists can be nested (or embedded) in each other, that
is, a list (containing 1500 addresses) can be a member contained in another list.
By doing so, your users can record a message, address it to the parent
enhanced list, and send it to nearly 150,000 people – just as easily as if the
message were being sent to a person 1 desk away.
All users administered in AUDIX (including e-mail and remote users) can send
messages to the recipients on enhanced lists, or you can administer your system
to only allow selected users in your AUDIX network access to the enhanced lists.
ELA has the following characteristics:
■Up to 1500 recipients can be contained in an enhanced list (compared to
250 addresses in a standard AUDIX mailing list.)
■Up to 100 enhanced lists can be created on an INTUITY AUDIX machine
■Nesting (embedding an enhanced list within another Enhanced List)
enables a total recipient population of nearly 150,000
■Changes in an enhanced list propagate to all lists that refer to the
changed list
■Access to enhanced lists from anywhere within the AUDIX network
(standard AUDIX mailing lists are only accessible to those users with
mailboxes on the same machine as the lists)
■Delivery to local and remote AUDIX users, administered e-mail users, and
remote AMIS pre-administered users
■Cross-domain delivery from an e-mail trusted server to AUDIX. This
enables administered e-mail users to access the Enhanced Lists
What ELA Can Do for You
ELA can:
■Distribute messages to a targeted audience.
You can create a list of people that you send messages to frequently.
Then, you can send them all the same message by entering one
enhanced-list address.
■Centralize messages into one AUDIX mailbox.
First select one office as your primary location. Then create an enhanced
list at each secondary location that has, as its only member, the number of
your primary office location. When a mailbox at a secondary location
receives a message, ELA puts it into the mailbox for the primary office.
2Issue 1 July 1997
ELA Adminis t r ation
■Forward messages to support staff automatically.
If you often forward incoming messages, you can create an enhanced-list
mailbox that automatically forwards messages to your staff. Your staff can
review the messages and then respond to them as they normally would.
ELA Administra t ion
Only the system administrator (sa) login can administer enhanced lists.
Basic Concepts
To understand ELA, you first need to understand some concepts and
terminology, such as
A
trusted server
NTUITY AUDIX that uses its own login and password to launch an IMAPI session
I
and access AUDIX mailboxes. The ELA software, acting as a trusted server, can
access and manipulate an AUDIX message just as the AUDIX application does.
is a computer or a software application in a domain outside of
trusted servers
and
domains
.
For the purposes of ELA, a
applica tio n . I
NTUITY AUDIX voice/fax mail messaging is one domain, and ELA is
domain
another domain. The two domains are linked together to allow messages to be
distributed between domains.
For a complete discussion and definition of trusted server and domain, see your
I
NTUITY
Messaging Solutions Release 4 Administration
Planning with Professional Services
ELA is a separately purchasable feature that incurs a Right-to-Use (RTU) fee.
ELA requires some solid planning to ensure your system makes effective use of
the feature. You can contract with Professional Services to work with you to plan
and administer ELA, or you can do the planning and administration yourself
using ELA worksheets that your account representative provides. In either case,
the result of that planning is comp leted ELA wo rk sheet s that you will us e as you
proceed to implement ELA.
ELA also requires some AUDIX Administration, as well as administration of the
ELA server itself.
is a logical boundary defined by the
book.
Issue 1 July 1997
3
Enhanced-List Application
This administration can be divided as follows:
AUDIX Administration:
■Contact Professional Services (or your account representative, if you did
not contract with Professional Services) to have ELA installed.
■Contact Professional Services (or your account representative, if you did
not contract with Professional Services) to have ELA activated.
■Verify that ELA is enabled for your system.
■Increase the number of mailing lists AUDIX allows on the system.
■Define an ELA Class of Service.
■Set up ELA and shadow mailbox Community IDs.
■Administer TCP/IP on the AUDIX server.
■Define two ELA trusted servers to the AUDIX server and administer
access (including the surrounding security requirements).
■Set up IMAPI sessions for ELA server access to AUDIX.
ELA Adminis t r ation:
■Define the AUDIX server to the ELA servers and administer access.
■Select shadow mailbox extension.
■Create and administer the Enhanced List(s).
■Record a name for the enhanced list (optional).
The next section highlights the planning considerations for implementing ELA.
Administration procedures begin with "Installing the Software" on page 2-9.
Things to Con s id er
ELA is a powerful messaging tool that can distribute large quantities of
messages. The following section discusses various planning considerations that
should be addressed to ensure effective implementation and use of ELA.
ELA Message Delivery
We recommend that you schedule delivery for large enhanced lists during
off-peak hours.
ELA can deliver up to 100 messages a minute. However, during peak traffic
hours, your system also processes other user-generated messages. ELA
intentionally slows delivery of messages to large enhanced lists during peak
traffic so your system can continue to process these other messages.
4Issue 1 July 1997
ELA Adminis t r ation
Hardware/Software Requirements
ELA runs on the same machine as AUDIX.
■ELA must be installed on a Lucent INTUITY R4.2-4 or higher machine. If
your site has an earlier release, contact your Lucent service representative
to obtain the necessary upgrade. ELA is not available for pre-R4 Lucent
NTUITY systems.
I
■MAP/40s machines require 64k of RAM.
LAN Impact
If your configuration includes a LAN, planning ELA implementation should
involve your PC/LAN administrator(s) to ensure that AUDIX and the network are
not adversely affected. The amount of LAN traffic on your system from ELA
messages could increase if ELA will be sending messages for delivery to an
e-mail or Message Manager recipient or to TCP/IP-networked remote machines.
If none of these are valid for your site, ELA will not cause any LAN traffic.
I
See Chapter 6 in your
book:
NTUITY
Messaging Solutions Release 4 Administra tion
■If your site has e-mail, to calculate some initial traffic estimates
■If your site has Message Manager, to calculate some initial traffic
estimates
Remote Message Impact
If your site is networked, estimate the increase in the amount of remote traffic by
first determining the percent of current traffic that is remote and calculating the
number of messages/minute that percent represents. When ELA is actively
sending messages, add that number of messages to the traffic estimate for
remote message delivery.
NOTE:
For typical applications of ELA, the increase in messaging traffic can be
negligible.
Issue 1 July 1997
5
Enhanced-List Application
Port Usage Impact
Voice port usage increases as recipients retrieve messages sent by ELA. Plan for
the increase with Professional Services when you purchase ELA. Refer to the
worksheets that were compiled at the time of the purchase to determine the port
usage impact.
You should monitor your system to determine if your Grade of Service (GOS) falls
below acceptable levels. If that happens frequently, particularly during the peak
busy hour, contact your Lucent account representative to purchase more ports, if
necessary. For more information about GOS and monitoring your system , see
I
NTUITY
your
Messaging Solutions Release 4 Administra tion
NOTE:
If, in its application, ELA degrades service, you might suggest that those
users with access to enhanced lists schedule delivery of ELA messages for
off-peak hours, for example, at 10:00 p.m. or 4:00 a.m. That way, delivery of
messages will not conflict with other user-g enerat ed traff ic.
Security
book.
Securing a system that allows access from another domain involves a 2-pronged
approach. You must consider security from both an internal and an external
perspective. External security involves administration to prevent access from an
unauthorized source, such as an e-mail or AMIS-Analog message originator that
decides to send “mail bombs” to an Enhanced List. Internal security focuses on
preventing, or recovering from, damage if a breach occurs, for example, a virus
is transmitted in a message component such as an attached software file.
For an in-depth discussion and definition of such terms as
domain
, see your
I
NTUITY
Messaging Solutions Release 4 Administration
trusted server
and
book.
External Security
A new option — the trusted server — has been introduced in this release. The
ELA application runs as a trusted server, making requests of the AUDIX server,
via IMAPI, to distribute messages to designated recipients. The trusted server is
empowered to do anything to an ELA mailbox that an AUDIX user can do.
To prevent unauthorized access to AUDIX from an external source such as a
trusted server, system administrators have two levels of security at their disposal:
■Trusted server password
■IMAPI password
The trusted server password is administered on both the AUDIX server and on
the trusted server. The trusted server must use this password when it connects to
AUDIX.
6Issue 1 July 1997
ELA Adminis t r ation
The IMAPI password is an optional, secondary level of security used to prevent
an unauthorized source external to AUDIX from starting an IMAPI session. We
strongly recommend
If you choose to administer an IMAPI password, we recommend that you change
it on a regular basis, for example, monthly. (If you have set your administrator’s
password to age automatically, the system prompts you to change your
password. You can use this prompt to remind you to change the IMAPI password
as well.)
NOTE:
If you change an IMAPI password in AUDIX, all trusted servers must be
administered with the new IMAPI password. For example, if your I
AUDIX R4 supports an e-mail server, the e-mail administrator must also
administer the e-mail trusted server to reflect the new IMAPI password.
In addition to trusted server security, there is the possibility that an administered
e-mail or remote AMIS Analog user could use an ELA mailbox in an unauthorized
manner. One example is to send “mail bombs” to an Enhanced List. Mail bombs
are harassing messages that do not serve your business needs, and impose
unnecessary traffic on your system. ELA mailboxes are no more vulnerable to
unauthorized use than other voice mailboxes. However, the impact on system
performance can be many times greater than the potential for harassment when
sending messages to an individual mailbox. Sending to an enhanced list that
forwards a message to 1500 recipients will obviously have much farther reaching
consequences than that of a handful of messages sent to individual mailboxes.
that you take advantage of this extra protection.
NTUITY
To prevent unauthorized access to an ELA mailbox from an external source such
as e-mail users or remote AMIS Analog users, you can place those users in a
community with sending restrictions. See:
■"Setting Up ELA and Shadow Mailbox Community IDs" on page 3-19 for
information about administering ELA community sending restrictions
■“Setting Up Community Sending Restrictions” in Chapter 3 of your
Messaging Solutions Administration
guide for information about the
I
NTUITY
implications of administering Community IDs
Internal Security
INTUITY AUDIX R4 allows the transmission of 2 new message components, text
(originating from Message Manager or e-mail) and binary file attachments
(software files, such as a spreadsheet or word processing file). With these new
components come new security considerations, namely, the inadvertent delivery
of a virus that may be embedded in a file attachment. This can occur in any
system that supports the delivery of software files. While the AUDIX machine
Issue 1 July 1997
7
Enhanced-List Application
cannot be infected with viruses embedded in these software files, client
machines may become infected when a user launches the applic ation
associated with the software file.
!
CAUTION:
ELA does not perform any virus detection. Your company should evaluate
the security risks of file attachments carefully and make provisions for virus
detection software on PCs running Message Manager or an e-mail
application supported by I
At a minimum, you should advise your users that file attachments should be
detached (not launched) and scanned for viruses before use.
IMAPI Session Requirements
An IMAPI session is invoked when an e-mail trusted server, Message Manager,
or the ELA trusted server needs to communicate with the AUDIX server. The
AUDIX server must have a sufficient number of IMAPI sessions administered to
provide adequate access for all IMAPI requests. Additionally, the ELA server
must be registered as an AUDIX trusted server.
NTUITY
AUDIX R4.
Shadow Mailbox
The shadow mailbox is a special mailbox that ELA uses to distribute messages.
The use of a shadow mailbox prevents replies to ELA-delivered messages from
being sent back to the entire Enhanced List. However, you can administer
enhanced lists such that recipients can reply to the person who originally sent
the message. The shadow mailbox must belong to a community that cannot
receive messages.
8Issue 1 July 1997
Installation
Overview
This chapter describes how to install ELA on a Lucent INTUITY R4.2 or higher
system.
2
Insta lling th e So ftware
The ELA package is provided on a tape labeled
To install ELA on a Lucent I
1. Log in to the Lucent I
2. Starting from the main menu, select:
> Customer/Services Administration
>System Management
>UNIX Management
>Software Install
The system displays the Software Install menu (Figure 2-1).
Enhanced-List Application
NTUITY R4.2 or higher system:
NTUITY system using craft or tsc.
.
Issue 1 July 19979
Installation
Figure 2-1.Software Install Menu
3. Insert the tape labeled
Enhanced-List Application
into the tape drive.
4. Select:
> Tape drive
The system displays the message:
Insert a tape into the Tape Drive.
Type [go] when ready
or [q] to quit: (default: go)
5. Press to go ahead with the install.
ENTER
The system displays the message:
Installation in progress. Do not remove the tape.
The following packages are available:
1 ELAEnhanced List Application Package
Select package(s) you wish to process (or ‘all’ to
process all packages). (default: all) [?, ??, q].
NOTE:
If you receive a device open failure messag e, the tape was
after
inserted
you selected Tape Drive or the system did not see
the tape. In that case, complete step a through step d below.
10Issue 1 July 1997
a. Enter q
The system displays the Software Install menu (Figure 2-1).
b. Remove the tape from the tape drive.
c. Re-insert the tape into the tape drive.
d. Repeat step 4 and step 5.
Rebooting the System
6. Press to select all.
ENTER
The system installs the software and displays several status messages.
When the software installation is complete, the system displays the
message:
Installation of Enhanced List Application Package
was successful.
Insert a tape into the Tape Drive.
Type [go] when ready
or [q] to quit: (default: go)
7. Remove the tape from the tape drive and re-insert the back-up tape.
8. Enter q
9. Press (F6) repeatedly to return to the main menu.
CANCEL
10. Continue with the next procedure, ‘‘Rebooting the System’’.
Rebootin g the System
Rebooting is a 2-step process. First the voice system must be stopped, and then
the machine can be rebooted. To stop the voice system:
1. Starting from the main menu, select:
> Customer/Services Administration
> System Management
> System Control
>Stop Voice System
The system displays the Wait Time window (Figure 2-2).
Figure 2-2. W a it Time Window
2. Enter 60 in the Seconds: field to have the system wait one minute for
calls in progress to finish before stopping the voice system.
Issue 1 July 1997
11
Installation
3. Press (F3) .
SAVE
The system stops the voice system and displays the a series of status
messages. When the voice system has stopped, the system displays the
message:
The Voice System has stopped.
Press Enter to Continue.
4. Press .
5. Press (F6) .
ENTER
CANCEL
The system displays the System Control window.
6. Select
>Shutdown System
The system displays the Wait Time window (Figure 2-2).
7. Enter 0 (zero) to indicate you would like an immediate shutdown.
8. Press (F3) .
SAVE
The system displays the following message:
Shutdown started.
When the system is completely shut down, the system displays the
message.
The system is down.
Press Ctrl-Alt-Del to reboot your computer.
9. Make sure that there is no diskette in the diskette drive.
10. Press .
CONTROL ALT DEL
The system performs a power-on self test (POST). The screen lists various
hardware components and the status of the tests performed on those
components.
When the reboot is complete, the system displays the following prompt:
Startup of the Voice System is complete.
Console Login:
12Issue 1 July 1997
Administering AUDIX for ELA
Overview
To define the ELA server and functionality to AUDIX:
■Contact Professional Services (or your account representative, if you did
not contract with Professional Services) to have ELA installed.
3
■Contact Professional Services (or your account representative, if you did
not contract with Professional Services) to have ELA activated.
■Verify that ELA is enabled for your system.
■Increase the number of mailing lists AUDIX allows on the system.
■Define an ELA Class of Service.
■Set up ELA and shadow mailbox Community IDs.
■Administer TCP/IP on the AUDIX server.
■Define two ELA trusted servers to the AUDIX server and administer
access (including the surrounding security requirements).
■Set up IMAPI sessions for ELA server access to AUDIX.
Depending on what services your business purchased from Professional
Services during the planning phase for ELA, some of the following procedures
I
NTUITY
may already be done. See your
Administration
book.
Messaging Solutions Release 4
Issue 1 July 199713
Administering AUDIX for ELA
Activatin g ELA
After the ELA installation is complete, contact your Professional Services (or your
account representative, if you did not contract with Professional Services). The
technician from the remote support center w ill acce ss your system remotely and
activate the ELA feature.
When the remote support center has activated the ELA feature, continue with the
next procedure.
NOTE:
You must log off the system and log back on to get enhanced lists to
display as an option on the Lucent I
Verifying that ELA is Enabled
1. Log into the Lucent INTUITY system using sa.
NTUITY main menu.
The system should display the Lucent I
Enhanced-List Manager as a menu option (Figure 3-1).
Figure 3-1. L uc ent INTUITY Main Menu for Release 4 (with ELA)
2. If Enhanced-List Manager does not display on the main menu, select:
> Customer/Services Administration
> Feature Options
NTUITY main menu with
The system displays the Feature Options window.
14Issue 1 July 1997
Loading...
+ 56 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.