Lucent Technologies INTUITY Messaging Solutions User Manual

INTUITY™ Messaging Solutions
Enhance d-Li st Application Release 1.0
585-310-575 Comcode 107975674 Issue 1 July 1997
Copyright 1997, Lucent Te chnologies All Rights Reserved Printed in U.S.A.
Notice
Every effort was made to ensure that the information in this book was complete and accurate at the ti me of printing. However, inf or m ation is subjec t to change.
Your Responsibility for Your System’s Security
Toll fraud is the unauthorized use of your telecommunications system by an unauthorized party, for example, per s ons other than your com-
pany’s emplo yee s, age nts, sub con trac tor s, or per so ns worki ng on your company’s behalf. Note that th ere may be a risk of toll f r aud as s oci­ated with your telecommunications system and, if toll fraud occurs, it can result in substantial additional charges for your telecommunica­tions services.
You and you r system manager are responsi ble for the security of your system, such as progra mming and configuring you r equipment to pre­vent unauthorized use. The system manager is also responsible for reading all installation, instruction, and system administration docu­ments provided with this product in order to fully understand the fea­tures that can introduce ri s k of toll fraud and the steps that can be taken to re duce that risk. Lucent Technologies does not warra nt that this product is immune from or will prevent unauthorized use of com­mon-carri er telecommunication ser vices or facilities accessed thr ough or connected to it. Luce nt Tec hno lo gi es will not be respo nsible for any charges that result from s uch unauthor ized use.
Lucent Technologies Fraud Intervention
If you suspect that you are being vict imi zed by tol l fraud and you need technical s upport or assistance, call Technical Service Center Toll Fraud Interventio n Hotlin e at 1 800 643-2 353 .
Federal Communications Commission Statement Part 15: Class A Statement. This equipment has been tested an d
found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide rea­sonable protection against harmful interfer ence when the equi pment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not install ed and used in accor dance with the instructions, may cause harmful int erfer­ence to radio communications. Operation of this equipm ent in a resi­dential area is likely to cause harmful interference, in which case the user will be required to correct the interference at his own expense.
Canadian Department of Communications (DOC) Interference I nformation
This digital ap pa r a t u s do es no t ex c e ed the Cla s s A li m i ts f or r a dio noise emissi ons set out in t he radio interference regulations of the Canadian Depar tment of Communications.
ésent Appareil Nomé riqu e n’émet pas de brui ts r adioélectr iq ues
Le Pr
épassant les limites applicables aux appareils numériques de la class
d
éscrites dans le reglement sur le brouillage radio é l ectrique édicté
A pr par le minist
Trademarks
See the preface of this document.
Ordering Information Call: Lucent Technologies Publications Cent er
Write: Lucent Technologies Publications Cent er
Order: Document No. 585-310-575
For additional documents, refer to the section in “About This Docu­ment” entitled “Related Resou rc es .”
You can be placed on a standing order list for this an d other docu­ments you may nee d. Standing order will enab le you to autom ati cally receive update d versions of individual documents or document sets , billed to account information that you provide. For more information on standing orders, or to be put on a li s t to receive future is s ues of thi s document, contact the Luce nt Technologies Publications Center.
Comments
To comment on this document, return the comment card at the front of the document.
Acknowledgment
This document was prepared by the Product Documentation Develop­ment, Lucent Technologies , Denver, CO and Co lumbus, OH.
ére des Communications du Canada.
Voice 1 800 457 -1 235 International Vo ice 317 361-5353 Fax 1 800 457-1764 International Fax 317 361-5355
P.O. Box 4100 Crawfordsv ille, IN 47933
Comcode 107975674 Issue 1, July 1997
Part 68: Network Registration Number. This equipment is regis­tered with the FCC in accordance with Part 68 of the FCC Rules. It is identified by FCC registratio n numb er xxx.
Part 68: Answer-Supervision Signaling. Allo win g th is eq ui pme n t t o be operated in a manner that does not provide proper answer-supervi­sion signaling is in viola tio n of Part 68 R ules. This eq uip men t ret urns answer-supervision s ignals to the public switched network when :
• Answered by the called station
• Answered by the attendant
• Routed to a recorded announcement that can be administered by the CPE user
This equipment returns answer-supervision signals on all DID calls forwarded back to the public switched telephone network. Per m issi­ble exceptions are:
• A call is unanswered
• A busy tone i s re ceived
• A reorder tone is received
Contents
About This Book
Purpose v
Intended Audiences v
Trademarks and Service Marks vi
Related Resources viii
How to Comment on This Book viii
1 Enhanc e d-List A pplicat io n
Overview 1
Audience 1 What You Should Know 1
Enhanced-List Application 2
What ELA Can Do for You 2
ELA Administration 3
Basic Concep t s 3 Planning with Professional Services 3 Things to Consider 4
2 Installation
Overview 9
Installing the Software 9
Rebooting the System 11
3 Administering AUDIX for ELA
Overview 13
Activating ELA 14
Verifying that ELA is Enabled 14
Issue 1 July 1997 i
Contents
Increasing the Number of Mailing
Lists Allowed on the System 15
Defining an ELA Class of Service 16
Setting Up ELA and Shadow Mailbox
Community IDs 19
Things to Consider 19 Before You Begin 20 ELA Community ID 20 Shadow Mailbox Community ID 22
Administering TCP/IP 23
Before You Begin 23
Setting Up IMAPI Sessions for
Trusted Server Access 26
Defining Two ELA Trusted Servers 28
Before You Begin 28
4 Administering ELA for AUDIX
Overview 33
Defining the AUDIX server and
Administering Access 33
Before You Begin 33
Guidelines for Naming Enhanced Lists 37
Creating Enhanced Lists 38
Guidelines for Selecting Enhanced-List Members 41 Adding Members to Enhanced Lists 41 Adding/Deleting Mem bers to an Enhanced List 43
Deleting an Enhanced List 46
Recording Names for Enhanced Lists 48
Testing INTUITY Enhanced Lists 48
5 Preventative Maintenance and Troubleshooting
Overview 51
ii Issue 1 July 1997
Contents
Checking the Administrator’s Log 51
Checking the Delivery Failure Log 52
Delivery Failure Codes 54
Troubleshooting ELA 55
6 Alarms
Overview 59
DELIVTS Resource Type 59
REGISTRY Reso urce Type 61
SHADOW Resource Type 62
EL — Enhanced-List Application 65
IN Index
Issue 1 July 1997 iii
Contents
iv Issue 1 July 1997

About This Book

Purpose

This book contains instructions for installing and administrating the Enhanced-List Application (ELA) on an I

Intended Audiences

This book is intended primarily for the on-site technical personnel who are responsible for installing and configuring the system and performing initial administration and acceptance testing. Second ary audienc es include the following from Lucent:
Field support — Technical Service Organiza tion (TSO)
Helpline personnel
Factory assemble, load, and test (ALT) personnel
Provisioning project managers — Sales and Technical Resource Center
(STRC)
This book assumes that the primary users of this book have completed the
NTUITY AUDIX Administration training course.
I
NTUITY™ AUDIX
®
R4 system.
Issue 1 July 1997 v
About This Book

Trademarks and Service Marks

The following trademarked products are mentioned in books in the Lucent INTUITY document set:
AT™ is a trademark of Hayes Microcomputer Products, Inc.
AUDIX
cc:Mail
Development Corporation.
COMSPHERE
Paradyne Corp.
CONVERSANT
Lucent Technologies™.
DEFINITY
DMS-100™ is a trademark of Northern Telecom Limited.
Dterm™ is a trademark of NEC Telephones, Inc.
Equinox™ is a trademark of Equinox Systems, Inc.
5ESS
®
is a registered trademark of Lucent Technologies™.
®
is a registered trademark of cc:Mail, a subsidiary of Lotus
®
is a registered trademark of Lucent Technologies™
®
Voice Information System is a registered trademark of
®
is a registered trademark of Lucent Technologies™.
®
is a registered trademark of Lucent Technologies™.
INTUITY™ is a trademark of Lucent Technologies™.
Lotus Notes
®
is a registered trademark of Lotus Development
Corporation.
MEGAPORT™ is a trademark of Equinox Systems , Inc.
MEGAPLEX™ is a trademark of Equinox Systems, Inc.
Meridian™ is a trademark of Northern Telecom Limited.
MERL IN L EGEND
Microcom Networking Protocol
®
is a registered trademark of Lucent Technologies™.
®
is a registered trademark of Microcom,
Inc.
Microsoft
MS
MS-DOS
Mitel™ is a trademark of Mitel Corporation.
NEAX™ is a trademark of NEC Telephone, Inc.
NEC
Netware
Netware
Northern Telecom
®
is a registered trademark of Microsoft Corporation.
®
is a registered trademark of Microsoft Corporation.
®
is a registered trademark of Microsoft Corporation.
®
is a registered trademark of NEC Telephone, Inc.
®
is a registered trademark of Novell, Inc.
®
Loadable Module™ is a registered trademark of Novell, Inc.
®
is a registered trademark of Northern Telecom
Limited.
vi Issue 1 July 1997
Trademarks and Service Marks
Novell
Parady n e
Phillips
Rolm
SL-1™ is a trademark of Northern Telecom Limited.
softFAX
SUPERSET™ is a trademark of Mitel Corporation.
SX-100™ is a trademark of Mitel Corporation.
SX-200™ is a trademark of Mitel Corporation.
SX-2000™ is a trademark of Mitel Corporation.
Telephony OneStip™ is a trademark of Lotus Development Corporation.
TMI™ is a trademark of Texas Micro Systems, Inc.
UNIX
Voice Bridge
®
is a registered trademark of Novell, Inc.
®
is a registered trademark of Lucent Technologies™.
®
is a registered tradema rk of Ph illi ps Sc re w C ompany.
®
is a registered trademark of International Business Machines.
®
is a registered trademark of VOXEM, Inc.
®
is a registered trademark of UNIX Systems Laboratories, Inc.
®
is a registered trademark of Voice Technologies Group,
Inc.
VOXEM
VT100™ is a trademark of Digital Equipment Corporation.
®
is a registered trademark of VOXEM, Inc.
Windows™ is a trademark of Microsoft Corporation.
Issue 1 July 1997
vii
About This Book

Related Resources

If you need help with basic administrative procedures, see the
Messaging Solutions Release 4 Administration

How to Comment on This Book

We are always interested in your suggestions for improving this book. Please complete and return the reader comment card that is located behind the title page.
If the reader comment card has been removed, send your comments to:
Lucent Technologies Product Documentation Room 22-2H15 11900 North Pecos Street Denver, Colorado 80234
Alternatively, you can fax your comments to:
Lucent I (303) 538-1741
Please be sure to mention the name and order number of this book.
NTUITY Writing Team
I
NTUITY
book, 585-310-564.
viii Issue 1 July 1997

Enhanced-List Application

Overview

This chapter describes the Enhanced-List Application (ELA) on an INTUITY
®
AUDIX
Release 4 system.
1

Audience

Read this book if you are the AUDIX system administrato r respon si b le fo r the configuration and maintenance of an I

What You Should Know

The procedures in this chapter assume you know basic Lucent INTUITY commands and navigation, such as logging in and out of the system, the difference between the VM and SA logins, command prompt function and usage, and how to move from field-to-field within a screen or window.
If you are not familiar with Lucent I
I
NTUITY
Messaging Solutions Release 4 Administration
NTUITY AUDIX Release 4 system.
NTUITY system basics, please read Chapter 1 i n
before you continue.
Issue 1 July 1997 1

Enhanced-List Application

Enhan c e d-List Applica tion
The Enhanced-List Application (ELA) greatly expands your business’ capability to deliver messages to large numbers of recipients. A single enhanced list can contain 1500 addresses and you – the system administrator – can create up to 100 such lists. Enhanced lists can be nested (or embedded) in each other, that is, a list (containing 1500 addresses) can be a member contained in another list. By doing so, your users can record a message, address it to the parent enhanced list, and send it to nearly 150,000 people – just as easily as if the message were being sent to a person 1 desk away.
All users administered in AUDIX (including e-mail and remote users) can send messages to the recipients on enhanced lists, or you can administer your system to only allow selected users in your AUDIX network access to the enhanced lists.
ELA has the following characteristics:
Up to 1500 recipients can be contained in an enhanced list (compared to
250 addresses in a standard AUDIX mailing list.)
Up to 100 enhanced lists can be created on an INTUITY AUDIX machine
Nesting (embedding an enhanced list within another Enhanced List)
enables a total recipient population of nearly 150,000
Changes in an enhanced list propagate to all lists that refer to the
changed list
Access to enhanced lists from anywhere within the AUDIX network
(standard AUDIX mailing lists are only accessible to those users with mailboxes on the same machine as the lists)
Delivery to local and remote AUDIX users, administered e-mail users, and
remote AMIS pre-administered users
Cross-domain delivery from an e-mail trusted server to AUDIX. This
enables administered e-mail users to access the Enhanced Lists

What ELA Can Do for You

ELA can:
Distribute messages to a targeted audience.
You can create a list of people that you send messages to frequently. Then, you can send them all the same message by entering one enhanced-list address.
Centralize messages into one AUDIX mailbox.
First select one office as your primary location. Then create an enhanced list at each secondary location that has, as its only member, the number of your primary office location. When a mailbox at a secondary location receives a message, ELA puts it into the mailbox for the primary office.
2 Issue 1 July 1997

ELA Adminis t r ation

Forward messages to support staff automatically.
If you often forward incoming messages, you can create an enhanced-list mailbox that automatically forwards messages to your staff. Your staff can review the messages and then respond to them as they normally would.
ELA Administra t ion
Only the system administrator (sa) login can administer enhanced lists.

Basic Concepts

To understand ELA, you first need to understand some concepts and terminology, such as
A
trusted server
NTUITY AUDIX that uses its own login and password to launch an IMAPI session
I and access AUDIX mailboxes. The ELA software, acting as a trusted server, can access and manipulate an AUDIX message just as the AUDIX application does.
is a computer or a software application in a domain outside of
trusted servers
and
domains
.
For the purposes of ELA, a applica tio n . I
NTUITY AUDIX voice/fax mail messaging is one domain, and ELA is
domain
another domain. The two domains are linked together to allow messages to be distributed between domains.
For a complete discussion and definition of trusted server and domain, see your
I
NTUITY
Messaging Solutions Release 4 Administration

Planning with Professional Services

ELA is a separately purchasable feature that incurs a Right-to-Use (RTU) fee. ELA requires some solid planning to ensure your system makes effective use of the feature. You can contract with Professional Services to work with you to plan and administer ELA, or you can do the planning and administration yourself using ELA worksheets that your account representative provides. In either case, the result of that planning is comp leted ELA wo rk sheet s that you will us e as you proceed to implement ELA.
ELA also requires some AUDIX Administration, as well as administration of the ELA server itself.
is a logical boundary defined by the
book.
Issue 1 July 1997
3
Enhanced-List Application
This administration can be divided as follows: AUDIX Administration:
Contact Professional Services (or your account representative, if you did
not contract with Professional Services) to have ELA installed.
Contact Professional Services (or your account representative, if you did
not contract with Professional Services) to have ELA activated.
Verify that ELA is enabled for your system.
Increase the number of mailing lists AUDIX allows on the system.
Define an ELA Class of Service.
Set up ELA and shadow mailbox Community IDs.
Administer TCP/IP on the AUDIX server.
Define two ELA trusted servers to the AUDIX server and administer
access (including the surrounding security requirements).
Set up IMAPI sessions for ELA server access to AUDIX.
ELA Adminis t r ation:
Define the AUDIX server to the ELA servers and administer access.
Select shadow mailbox extension.
Create and administer the Enhanced List(s).
Record a name for the enhanced list (optional).
The next section highlights the planning considerations for implementing ELA. Administration procedures begin with "Installing the Software" on page 2-9.

Things to Con s id er

ELA is a powerful messaging tool that can distribute large quantities of messages. The following section discusses various planning considerations that should be addressed to ensure effective implementation and use of ELA.
ELA Message Delivery
We recommend that you schedule delivery for large enhanced lists during off-peak hours.
ELA can deliver up to 100 messages a minute. However, during peak traffic hours, your system also processes other user-generated messages. ELA intentionally slows delivery of messages to large enhanced lists during peak traffic so your system can continue to process these other messages.
4 Issue 1 July 1997
ELA Adminis t r ation
Hardware/Software Requirements
ELA runs on the same machine as AUDIX.
ELA must be installed on a Lucent INTUITY R4.2-4 or higher machine. If
your site has an earlier release, contact your Lucent service representative to obtain the necessary upgrade. ELA is not available for pre-R4 Lucent
NTUITY systems.
I
MAP/40s machines require 64k of RAM.
LAN Impact
If your configuration includes a LAN, planning ELA implementation should involve your PC/LAN administrator(s) to ensure that AUDIX and the network are not adversely affected. The amount of LAN traffic on your system from ELA messages could increase if ELA will be sending messages for delivery to an e-mail or Message Manager recipient or to TCP/IP-networked remote machines. If none of these are valid for your site, ELA will not cause any LAN traffic.
I
See Chapter 6 in your book:
NTUITY
Messaging Solutions Release 4 Administra tion
If your site has e-mail, to calculate some initial traffic estimates
If your site has Message Manager, to calculate some initial traffic
estimates
Remote Message Impact
If your site is networked, estimate the increase in the amount of remote traffic by first determining the percent of current traffic that is remote and calculating the number of messages/minute that percent represents. When ELA is actively sending messages, add that number of messages to the traffic estimate for remote message delivery.
NOTE:
For typical applications of ELA, the increase in messaging traffic can be negligible.
Issue 1 July 1997
5
Enhanced-List Application
Port Usage Impact
Voice port usage increases as recipients retrieve messages sent by ELA. Plan for the increase with Professional Services when you purchase ELA. Refer to the worksheets that were compiled at the time of the purchase to determine the port usage impact.
You should monitor your system to determine if your Grade of Service (GOS) falls below acceptable levels. If that happens frequently, particularly during the peak busy hour, contact your Lucent account representative to purchase more ports, if necessary. For more information about GOS and monitoring your system , see
I
NTUITY
your
Messaging Solutions Release 4 Administra tion
NOTE:
If, in its application, ELA degrades service, you might suggest that those users with access to enhanced lists schedule delivery of ELA messages for off-peak hours, for example, at 10:00 p.m. or 4:00 a.m. That way, delivery of messages will not conflict with other user-g enerat ed traff ic.
Security
book.
Securing a system that allows access from another domain involves a 2-pronged approach. You must consider security from both an internal and an external perspective. External security involves administration to prevent access from an unauthorized source, such as an e-mail or AMIS-Analog message originator that
decides to send “mail bombs” to an Enhanced List. Internal security focuses on preventing, or recovering from, damage if a breach occurs, for example, a virus is transmitted in a message component such as an attached software file.
For an in-depth discussion and definition of such terms as
domain
, see your
I
NTUITY
Messaging Solutions Release 4 Administration
trusted server
and
book.
External Security
A new option — the trusted server — has been introduced in this release. The ELA application runs as a trusted server, making requests of the AUDIX server, via IMAPI, to distribute messages to designated recipients. The trusted server is empowered to do anything to an ELA mailbox that an AUDIX user can do.
To prevent unauthorized access to AUDIX from an external source such as a trusted server, system administrators have two levels of security at their disposal:
Trusted server password
IMAPI password
The trusted server password is administered on both the AUDIX server and on the trusted server. The trusted server must use this password when it connects to AUDIX.
6 Issue 1 July 1997
ELA Adminis t r ation
The IMAPI password is an optional, secondary level of security used to prevent an unauthorized source external to AUDIX from starting an IMAPI session. We
strongly recommend
If you choose to administer an IMAPI password, we recommend that you change
it on a regular basis, for example, monthly. (If you have set your administrator’s password to age automatically, the system prompts you to change your password. You can use this prompt to remind you to change the IMAPI password as well.)
NOTE:
If you change an IMAPI password in AUDIX, all trusted servers must be administered with the new IMAPI password. For example, if your I AUDIX R4 supports an e-mail server, the e-mail administrator must also administer the e-mail trusted server to reflect the new IMAPI password.
In addition to trusted server security, there is the possibility that an administered e-mail or remote AMIS Analog user could use an ELA mailbox in an unauthorized manner. One example is to send “mail bombs” to an Enhanced List. Mail bombs are harassing messages that do not serve your business needs, and impose unnecessary traffic on your system. ELA mailboxes are no more vulnerable to unauthorized use than other voice mailboxes. However, the impact on system performance can be many times greater than the potential for harassment when sending messages to an individual mailbox. Sending to an enhanced list that forwards a message to 1500 recipients will obviously have much farther reaching consequences than that of a handful of messages sent to individual mailboxes.
that you take advantage of this extra protection.
NTUITY
To prevent unauthorized access to an ELA mailbox from an external source such as e-mail users or remote AMIS Analog users, you can place those users in a community with sending restrictions. See:
"Setting Up ELA and Shadow Mailbox Community IDs" on page 3-19 for
information about administering ELA community sending restrictions
“Setting Up Community Sending Restrictions” in Chapter 3 of your
Messaging Solutions Administration
guide for information about the
I
NTUITY
implications of administering Community IDs
Internal Security
INTUITY AUDIX R4 allows the transmission of 2 new message components, text (originating from Message Manager or e-mail) and binary file attachments (software files, such as a spreadsheet or word processing file). With these new components come new security considerations, namely, the inadvertent delivery of a virus that may be embedded in a file attachment. This can occur in any system that supports the delivery of software files. While the AUDIX machine
Issue 1 July 1997
7
Enhanced-List Application
cannot be infected with viruses embedded in these software files, client machines may become infected when a user launches the applic ation associated with the software file.
!
CAUTION:
ELA does not perform any virus detection. Your company should evaluate the security risks of file attachments carefully and make provisions for virus detection software on PCs running Message Manager or an e-mail application supported by I
At a minimum, you should advise your users that file attachments should be detached (not launched) and scanned for viruses before use.
IMAPI Session Requirements
An IMAPI session is invoked when an e-mail trusted server, Message Manager, or the ELA trusted server needs to communicate with the AUDIX server. The AUDIX server must have a sufficient number of IMAPI sessions administered to provide adequate access for all IMAPI requests. Additionally, the ELA server must be registered as an AUDIX trusted server.
NTUITY
AUDIX R4.
Shadow Mailbox
The shadow mailbox is a special mailbox that ELA uses to distribute messages. The use of a shadow mailbox prevents replies to ELA-delivered messages from being sent back to the entire Enhanced List. However, you can administer enhanced lists such that recipients can reply to the person who originally sent the message. The shadow mailbox must belong to a community that cannot receive messages.
8 Issue 1 July 1997

Installation

Overview

This chapter describes how to install ELA on a Lucent INTUITY R4.2 or higher system.
2

Insta lling th e So ftware

The ELA package is provided on a tape labeled To install ELA on a Lucent I
1. Log in to the Lucent I
2. Starting from the main menu, select:
> Customer/Services Administration
>System Management
>UNIX Management
>Software Install
The system displays the Software Install menu (Figure 2-1).
Enhanced-List Application
NTUITY R4.2 or higher system:
NTUITY system using craft or tsc.
.
Issue 1 July 1997 9
Installation
Figure 2-1. Software Install Menu
3. Insert the tape labeled
Enhanced-List Application
into the tape drive.
4. Select:
> Tape drive
The system displays the message:
Insert a tape into the Tape Drive. Type [go] when ready
or [q] to quit: (default: go)
5. Press to go ahead with the install.
ENTER
The system displays the message:
Installation in progress. Do not remove the tape.
The following packages are available:
1 ELA Enhanced List Application Package
Select package(s) you wish to process (or ‘all’ to process all packages). (default: all) [?, ??, q].
NOTE:
If you receive a device open failure messag e, the tape was
after
inserted
you selected Tape Drive or the system did not see
the tape. In that case, complete step a through step d below.
10 Issue 1 July 1997
a. Enter q
The system displays the Software Install menu (Figure 2-1). b. Remove the tape from the tape drive. c. Re-insert the tape into the tape drive. d. Repeat step 4 and step 5.

Rebooting the System

6. Press to select all.
ENTER
The system installs the software and displays several status messages.
When the software installation is complete, the system displays the
message:
Installation of Enhanced List Application Package was successful.
Insert a tape into the Tape Drive. Type [go] when ready
or [q] to quit: (default: go)
7. Remove the tape from the tape drive and re-insert the back-up tape.
8. Enter q
9. Press (F6) repeatedly to return to the main menu.
CANCEL
10. Continue with the next procedure, ‘‘Rebooting the System’’.
Rebootin g the System
Rebooting is a 2-step process. First the voice system must be stopped, and then the machine can be rebooted. To stop the voice system:
1. Starting from the main menu, select:
> Customer/Services Administration
> System Management
> System Control
>Stop Voice System
The system displays the Wait Time window (Figure 2-2).
Figure 2-2. W a it Time Window
2. Enter 60 in the Seconds: field to have the system wait one minute for
calls in progress to finish before stopping the voice system.
Issue 1 July 1997
11
Installation
3. Press (F3) .
SAVE
The system stops the voice system and displays the a series of status messages. When the voice system has stopped, the system displays the message:
The Voice System has stopped. Press Enter to Continue.
4. Press .
5. Press (F6) .
ENTER
CANCEL
The system displays the System Control window.
6. Select
>Shutdown System
The system displays the Wait Time window (Figure 2-2).
7. Enter 0 (zero) to indicate you would like an immediate shutdown.
8. Press (F3) .
SAVE
The system displays the following message:
Shutdown started.
When the system is completely shut down, the system displays the message.
The system is down. Press Ctrl-Alt-Del to reboot your computer.
9. Make sure that there is no diskette in the diskette drive.
10. Press .
CONTROL ALT DEL
The system performs a power-on self test (POST). The screen lists various hardware components and the status of the tests performed on those components.
When the reboot is complete, the system displays the following prompt:
Startup of the Voice System is complete. Console Login:
12 Issue 1 July 1997

Administering AUDIX for ELA

Overview

To define the ELA server and functionality to AUDIX:
Contact Professional Services (or your account representative, if you did
not contract with Professional Services) to have ELA installed.
3
Contact Professional Services (or your account representative, if you did
not contract with Professional Services) to have ELA activated.
Verify that ELA is enabled for your system.
Increase the number of mailing lists AUDIX allows on the system.
Define an ELA Class of Service.
Set up ELA and shadow mailbox Community IDs.
Administer TCP/IP on the AUDIX server.
Define two ELA trusted servers to the AUDIX server and administer
access (including the surrounding security requirements).
Set up IMAPI sessions for ELA server access to AUDIX.
Depending on what services your business purchased from Professional Services during the planning phase for ELA, some of the following procedures
I
NTUITY
may already be done. See your
Administration
book.
Messaging Solutions Release 4
Issue 1 July 1997 13
Administering AUDIX for ELA

Activatin g ELA

After the ELA installation is complete, contact your Professional Services (or your account representative, if you did not contract with Professional Services). The technician from the remote support center w ill acce ss your system remotely and activate the ELA feature.
When the remote support center has activated the ELA feature, continue with the next procedure.
NOTE:
You must log off the system and log back on to get enhanced lists to display as an option on the Lucent I

Verifying that ELA is Enabled

1. Log into the Lucent INTUITY system using sa.
NTUITY main menu.
The system should display the Lucent I Enhanced-List Manager as a menu option (Figure 3-1).
Figure 3-1. L uc ent INTUITY Main Menu for Release 4 (with ELA)
2. If Enhanced-List Manager does not display on the main menu, select:
> Customer/Services Administration
> Feature Options
NTUITY main menu with
The system displays the Feature Options window.
14 Issue 1 July 1997
Loading...
+ 56 hidden pages