Lucent Technologies 585-310-575 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80

Ir a la página of

Buen manual de instrucciones

Las leyes obligan al vendedor a entregarle al comprador, junto con el producto, el manual de instrucciones Lucent Technologies 585-310-575. La falta del manual o facilitar información incorrecta al consumidor constituyen una base de reclamación por no estar de acuerdo el producto con el contrato. Según la ley, está permitido adjuntar un manual de otra forma que no sea en papel, lo cual últimamente es bastante común y los fabricantes nos facilitan un manual gráfico, su versión electrónica Lucent Technologies 585-310-575 o vídeos de instrucciones para usuarios. La condición es que tenga una forma legible y entendible.

¿Qué es un manual de instrucciones?

El nombre proviene de la palabra latina “instructio”, es decir, ordenar. Por lo tanto, en un manual Lucent Technologies 585-310-575 se puede encontrar la descripción de las etapas de actuación. El propósito de un manual es enseñar, facilitar el encendido o el uso de un dispositivo o la realización de acciones concretas. Un manual de instrucciones también es una fuente de información acerca de un objeto o un servicio, es una pista.

Desafortunadamente pocos usuarios destinan su tiempo a leer manuales Lucent Technologies 585-310-575, sin embargo, un buen manual nos permite, no solo conocer una cantidad de funcionalidades adicionales del dispositivo comprado, sino también evitar la mayoría de fallos.

Entonces, ¿qué debe contener el manual de instrucciones perfecto?

Sobre todo, un manual de instrucciones Lucent Technologies 585-310-575 debe contener:
- información acerca de las especificaciones técnicas del dispositivo Lucent Technologies 585-310-575
- nombre de fabricante y año de fabricación del dispositivo Lucent Technologies 585-310-575
- condiciones de uso, configuración y mantenimiento del dispositivo Lucent Technologies 585-310-575
- marcas de seguridad y certificados que confirmen su concordancia con determinadas normativas

¿Por qué no leemos los manuales de instrucciones?

Normalmente es por la falta de tiempo y seguridad acerca de las funcionalidades determinadas de los dispositivos comprados. Desafortunadamente la conexión y el encendido de Lucent Technologies 585-310-575 no es suficiente. El manual de instrucciones siempre contiene una serie de indicaciones acerca de determinadas funcionalidades, normas de seguridad, consejos de mantenimiento (incluso qué productos usar), fallos eventuales de Lucent Technologies 585-310-575 y maneras de solucionar los problemas que puedan ocurrir durante su uso. Al final, en un manual se pueden encontrar los detalles de servicio técnico Lucent Technologies en caso de que las soluciones propuestas no hayan funcionado. Actualmente gozan de éxito manuales de instrucciones en forma de animaciones interesantes o vídeo manuales que llegan al usuario mucho mejor que en forma de un folleto. Este tipo de manual ayuda a que el usuario vea el vídeo entero sin saltarse las especificaciones y las descripciones técnicas complicadas de Lucent Technologies 585-310-575, como se suele hacer teniendo una versión en papel.

¿Por qué vale la pena leer los manuales de instrucciones?

Sobre todo es en ellos donde encontraremos las respuestas acerca de la construcción, las posibilidades del dispositivo Lucent Technologies 585-310-575, el uso de determinados accesorios y una serie de informaciones que permiten aprovechar completamente sus funciones y comodidades.

Tras una compra exitosa de un equipo o un dispositivo, vale la pena dedicar un momento para familiarizarse con cada parte del manual Lucent Technologies 585-310-575. Actualmente se preparan y traducen con dedicación, para que no solo sean comprensibles para los usuarios, sino que también cumplan su función básica de información y ayuda.

Índice de manuales de instrucciones

  • Página 1

    I NT UITY ™ Messaging Solutions Enhan ce d-Li st App li ca tio n Re le as e 1 .0 58 5-310-57 5 Com code 1 0797 5674 Issue 1 July 1 997[...]

  • Página 2

    Copyright  1997, L ucen t Te chnol ogi es All Rights R e served Prin ted in U .S. A. Notice Eve ry effort was made to en sure that the info rmation in this b ook wa s compl et e and accur at e at th e time of pr i nti ng. Ho w ever , in for mat ion is s ubj ec t to cha nge. Your Responsibi l i ty for Your Sy ste m’s Sec u rity Toll fr aud is t[...]

  • Página 3

    Conten ts Issue 1 July 1997 i Abou t This Book ■ Pur pos e v ■ Intended Audience s v ■ Tradem arks and Service Marks vi ■ Related R esources viii ■ How t o Comment on This B ook viii 1 En ha n ced -Lis t App lic a t ion ■ Overvie w 1 Aud i ence 1 Wh at You S hould Know 1 ■ Enhanced -List Applica t i on 2 ■ What ELA Can Do for You 2 [...]

  • Página 4

    Conten ts ii Issue 1 July 199 7 ■ Increasing the Number of Mailing Lists A l lowed on the Sy s t em 15 ■ Defining an ELA Class of Service 16 ■ Setting Up ELA and Shadow Mai l b ox Community IDs 19 Thi ng s to C ons id er 19 Befor e Y ou Begin 20 ELA Community ID 20 Shad ow Mailbox Community ID 22 ■ Admini s tering TCP/IP 23 Befor e Y ou Beg[...]

  • Página 5

    Conten ts Issue 1 July 1997 iii ■ Checking the Admin istrator’s Log 51 ■ Checking t he De l ivery Failure Log 52 ■ Delivery Failure Codes 54 ■ Troubleshoo ti ng ELA 55 6 Alarms ■ Overvie w 59 ■ DELIVTS Resource Ty pe 59 ■ REG ISTR Y Resource Type 61 ■ SHADO W Resourc e Type 62 ■ EL — Enhan ced-List Applicat i on 65 IN Inde x[...]

  • Página 6

    Conten ts iv Issue 1 July 1997[...]

  • Página 7

    Issue 1 J uly 1997 v About This Boo k Pu rpo se This book contains instructions for installing and administrating the Enhanced -List Applicat ion (ELA) on an I NTUITY ™ AUDIX ® R 4 syst em. Inte n ded A udiences This book is intended primarily for t he on-site technica l personnel who are responsible for installing and configuring the system and[...]

  • Página 8

    About T his Book vi Issue 1 July 1997 Trademarks and Service Mar k s The following tradema r ked produ ct s are mention ed in books in the Lucent I NT UI TY documen t set: ■ AT™ is a t radem ark of Hayes Microcomp uter Products, Inc. ■ AUDIX ® i s a registered tradema rk of Lucent Technolog ies™. ■ cc:Mail ® is a registered t rademark o[...]

  • Página 9

    Trademarks a nd Service Mark s Issue 1 J uly 1997 vi i ■ Novell ® i s a registered trademark of Novell, Inc. ■ Parad yne ® is a re g istered tradem ark of Lucent Technol og ies™. ■ Phi llips ® is a reg is ter ed trad ema rk of Philli ps Scre w C om pany. ■ Rol m ® i s a registered trademark of International Bus iness Mach ines. ■ SL[...]

  • Página 10

    About T his Book viii I s sue 1 J uly 1997 Rela ted R eso urces If you need help with basi c administrative procedures, see the I NTUITY ™ Messaging Solutions R elease 4 Administra tion book, 585-31 0-564. Ho w to Com ment on Thi s Boo k We are always interested in your sug gestions for i mprovin g this book. Please comple te and return the reade[...]

  • Página 11

    Issue 1 July 1997 1 1 Enhanced -List App l ic at io n Over view This chapter describes the Enhanced -List Application (ELA) on an I NTUITY ™ AUDIX ® Release 4 system. Audience Read this book if you are the AUDIX syste m adminis trato r re sponsi b l e for th e configuratio n and ma intenance of an I NTUITY AUDIX R e lease 4 system. What You Shou[...]

  • Página 12

    Enhanced -List Applicat ion 2 Issue 1 July 1997 E nha n ced- Lis t Ap plic a t ion The Enhanced -List A pplication (ELA) greatly ex pands your business’ capability to de l iver messag es to large numbers of recipients. A single enh anced lis t can contain 1500 addresses and you – th e syst em administrator – can create up t o 100 s uch lists.[...]

  • Página 13

    ELA Ad m inist r atio n Issue 1 J uly 1997 3 ■ Forward messages to support staff automatically. If you o f t en forward incoming messages, y ou can create an en hanced-list mailbox that autom at ically forwards messages t o your staff. Your staff can review the messages and then respond to them as they normally would. ELA Ad m in istr at ion Only[...]

  • Página 14

    Enhanced -List Applicat ion 4 Issue 1 July 1997 This administration can be divided as follows: AUDIX Adm i nistration: ■ Contact Professional Services (or your account representative, if you did not con t ract with P r o f essional S ervices) to have ELA i nstalled. ■ Contact Professional Services (or your account representative, if you did not[...]

  • Página 15

    ELA Ad m inist r atio n Issue 1 J uly 1997 5 Hardware/So ftware Requirements ELA runs on the s ame m achin e as AUDIX. ■ ELA must be installed on a Lucent I NTUITY R4.2-4 or higher machi ne. If your site has an earli er rel e ase, contact your Lucent s ervice representa t ive to obtain the necessary upgrade. ELA is not available for pre-R4 Lucent[...]

  • Página 16

    Enhanced -List Applicat ion 6 Issue 1 July 1997 Port U s age Impact Voice port usage increases as rec ipi e nts retrieve m essages sent by ELA . Plan f or the i ncreas e with Professional Services when you purchase EL A. Refer to the worksheets that were compiled at the ti m e of the purchase to determine the port usage impa ct. You should m onitor[...]

  • Página 17

    ELA Ad m inist r atio n Issue 1 J uly 1997 7 The IMAPI passw ord is an optional, seconda ry level of security used to prevent an unauthorized source external to AUDIX f rom starting an IMAPI session. We strongly rec om mend that y ou take a dvantage of this ex t ra protection. If you choose to a dminister an IMAPI pass word, we rec ommend that you [...]

  • Página 18

    Enhanced -List Applicat ion 8 Issue 1 July 1997 cannot be infected with viruses embedded in these software files, cl ient machines m ay becom e infected w hen a user launches the applicati on associated with the software file. ! CAUTION: ELA does not perform any virus detection. Your com pan y should evaluat e the security risks of file attachments[...]

  • Página 19

    Issue 1 July 1997 9 2 Install ation Over view This chapter describes how to install E LA on a Lucent I NTUITY R4.2 o r higher syste m . I ns t allin g the So ft ware The ELA package is prov ided on a tape labeled Enhanc ed-List Ap p lication . To install ELA on a Lucent I NTUITY R4.2 or hi gher system: 1. Log in to the Lucen t I NTUITY system using[...]

  • Página 20

    Ins ta lla tio n 10 Issue 1 July 1997 Figur e 2-1. Soft ware In stall M e nu 3. Insert the t ape labeled Enhance d-List Ap pl i cation i nto th e ta pe dr ive . 4. Select: The system displa ys the message : Insert a tape into the Tape Drive. Type [go] when ready or [q] to quit: (default: go) 5. Press to go ahead with the install. The system displa [...]

  • Página 21

    Rebooting the System Issue 1 July 199 7 11 6. Press to select all . The system installs the software and displays several status messa ges. When th e soft ware installation is complete, the syste m displays the message: Installation of Enhanced List Application Package was successful. Insert a tape into the Tape Drive. Type [go] when ready or [q] t[...]

  • Página 22

    Ins ta lla tio n 12 Issue 1 July 1997 3. Press (F3) . The system stop s the voi ce system and displ ays the a seri es of status messages. When the voice system has st opped, the syst e m displays the message: The Voice System has stopped. Press Enter to Continue. 4. Press . 5. Press (F6) . The s y s tem displays t he Sy s t em Control win dow. 6. S[...]

  • Página 23

    Issue 1 July 1997 13 3 Administering A U DI X for EL A Over view To define the ELA server and functionality t o AUDIX: ■ Contact Professional Services (or your account representative, if you did not contract with Profession al Services) to have ELA installed. ■ Contact Professional Services (or your account representative, if you did not contra[...]

  • Página 24

    Administering AUDIX f or ELA 14 Issue 1 July 1997 Acti vat ing ELA After the ELA installation i s complete, contact your Professional S ervices ( o r your account representat ive, if you did not contract with Professional Services). The technici an from the remo te supp ort center w ill acce ss your syst e m re motely and activate the ELA feature. [...]

  • Página 25

    Inc re as in g t he N umb er of Ma iling L is ts A llo w ed o n the Syst e m Issue 1 July 199 7 15 3. Ensure the following fiel ds are set to ON: ■ Enhanced List Application ■ TCP/IP Administration 4. If either of these fields is OFF, and you purcha sed/installed ELA, call the support center to request that the features be enabled for your Luce[...]

  • Página 26

    Administering AUDIX f or ELA 16 Issue 1 July 1997 6. Press (F3 ) to save the i nformation in the system d at abase. The cursor ret urns to the co mmand l i ne, and the syst em displays the me ssag e Command Successfully Completed . 7. Continue with the next proced ure or enter ex i t t o l eav e A UD IX Administrati on. Def i ning an EL A C la s s [...]

  • Página 27

    Defining an ELA Cl as s of Service Issue 1 July 199 7 17 Figu re 3- 2. Clas s of Servic e S c r e en , Page 1; Defi nin g a Class of Servi ce fo r ELA 3. Although not required, we recomme nd th at you change the name of the COS to be more descri p tive, for ex a m pl e , e nte r ELA in th e Name: fie ld. NOT E: Yo u should w rit e down the CO S num[...]

  • Página 28

    Administering AUDIX f or ELA 18 Issue 1 July 1997 Figur e 3-3. S ub sc ribe r C las s of Se rvi c e Para m et ers Sc reen, Pa ge 2; Enabl ing ELA on a COS B as is 7. Enter the follo wing information: ■ 14 in the Retention Times (days), New: field. (Thi s setting acts as a safety measure, should ELA encoun ter an operation al problem, and cannot s[...]

  • Página 29

    Setti n g Up EL A and Sha do w Mail box C om mun ity IDs Issue 1 July 199 7 19 8. Press (F3 ) to save t he informatio n in the sy stem d at abase. The cursor ret urns to the co mmand l i ne, and the syst em displays the me ssag e Command Successfully Completed . 9. Continue with the next proced ure or enter ex i t t o l eav e A UD IX Administrati o[...]

  • Página 30

    Administering AUDIX f or ELA 20 Issue 1 July 1997 Let’s say you set up the enhanced -list mailbox communi ty t o be Communit y 10. Commun it y 10 is g iven perm i ssion to s end to all other c ommunities (except the shadow mailbox c ommunity). The n, you s et up a specia l user com munity, Commun it y 9, and administer C ommunity 9 to se nd to al[...]

  • Página 31

    Setti n g Up EL A and Sha do w Mail box C om mun ity IDs Issue 1 July 199 7 21 2. At the enter command: pro mpt, enter either: The system displays the Sending Restrictions screen (Figure 3-5). Figure 3-5. Se n di ng Restrictions S c reen 3. Enter y in the Activate Restrictions? fi eld. 4. Leave all fields blank (ho r izontally) that c orr espond to[...]

  • Página 32

    Administering AUDIX f or ELA 22 Issue 1 July 1997 access to enhanced lists from sending a message to an Enhanced List. Following the example discusse d under "Things to Consider" on page 3-19, there would be an r in the field corresponding to the intersection between Sender Comm uni ty 1 (t he default user com munity) and Recipient Commun[...]

  • Página 33

    Administering TCP /IP Issue 1 July 199 7 23 Admi ni ster in g TC P/ IP If you r system is al ready connec ted to the LAN, you can skip t h is p rocedu re. However, you need to know t he I P A dd ress to adm inis ter the trusted serv er, so — even if y our system i s already networked — perform step 1 of t hi s p rocedure and writ e down your sy[...]

  • Página 34

    Administering AUDIX f or ELA 24 Issue 1 July 1997 Figure 3 - 6 . TCP /IP Adm inistration W indow; A d ministering T CP/IP fo r Enhanced-List Applic ation (ELA) 2. Enter the AUDIX s erver nam e in the UNIX Machine Name: field. Thi s name sho uld be l isted on the Installation Information worksheet, or y ou can obt ai n this n am e from your PC/LA N [...]

  • Página 35

    Administering TCP /IP Issue 1 July 199 7 25 5. Ent er the de faul t gat ew ay IP addr es s in the Default Gateway IP Address: fie l d . The default gateway IP address is the addres s of the gateway router that serves to connect to addresses on other LANs. This field is left blank if the Lucent I NT UIT Y system will only be communicating wi th othe[...]

  • Página 36

    Administering AUDIX f or ELA 26 Issue 1 July 1997 NOT E: The changes to your syste m will not take effect until you reboot your system. See your I NTUITY Messaging Solutions R elease 4 Adm inistratio n book for i nstructions. Se tting Up IMAPI S essions f or Trust ed Se rver A ccess Whenever a trusted server accesses an AUDIX mailbox, it u ses an I[...]

  • Página 37

    Setting Up IMAPI Sessions for Trusted Server Access Issue 1 July 199 7 27 Figure 3-8. S ys tem-Parameters IMAPI-Options Screen , Pa ge 1; Sett ing IMAPI Sessions f or Tru ste d Se rve r Ac ce s s NOT E: The f oll owing contain instructions for t he fields t hat directly relate to ELA. See your I NTUITY Messaging Solutions R elease 4 Administ ration[...]

  • Página 38

    Administering AUDIX f or ELA 28 Issue 1 July 1997 8. P ress (F3) to sa ve this in format io n to the syst em databa se. The cursor ret urns to the co mmand l i ne, and the syst em displays the me ssag e Command Successfully Completed . 9. Continue with the next proced ure or enter ex i t t o l eav e A UD IX Administrati on. Def i ning Two EL A Tru [...]

  • Página 39

    Defining Two ELA Trusted Servers Issue 1 July 199 7 29 ■ The TCP/IP address for the AUDIX server (s ee pa ge 3-23). You will p erf orm this p rocedure twice , fi rst for the E LA administrative server, and then for t he ELA delivery server. To add the ELA trusted servers to the I NTUITY AUDIX server: 1. Starting from the main menu (Figure 3-1 on [...]

  • Página 40

    Administering AUDIX f or ELA 30 Issue 1 July 1997 3. In th e Trusted-Server Name: field , enter a name for the first ELA trusted server. (See the Note below for tips on trusted serv er names.) This name must be a unique 1- t o 10-printable character entry. Additionally, t his name can not start with a number an d cannot co ntain any embedded spaces[...]

  • Página 41

    Defining Two ELA Trusted Servers Issue 1 July 199 7 31 11. Do you want t o administer an IMAPI password? ■ If yes, follow the procedures for s etting the IMAPI pass word in your I NTUITY Me s sa g ing S ol ut ion s Re le ase 4 A d mi n is tra t i o n bo ok b efor e proceedin g to the ne xt section. ■ If no, go to Chapter 4 to Ad m inister ELA, [...]

  • Página 42

    Administering AUDIX f or ELA 32 Issue 1 July 1997[...]

  • Página 43

    Issue 1 July 1997 33 4 Admi nister ing ELA fo r AUDI X Over view Now that t he AUDI X system knows abo ut the ELA t ruste d serve rs, you can d o the initial administration of the ELA system. To mak e ELA fully functional, you must: ■ Define the AUDIX server t o ELA and administer acces s ■ Create en hanced lists ■ Add mem bers to enhanc ed l[...]

  • Página 44

    Administering ELA for AUDI X 34 Issue 1 July 1997 ■ Enhanced - l ist mailbox an d shadow mailbox Com munity IDs (see page 3-20) ■ E L A C la ss of S er vi c e ( se e p a ge 3- 16) To administer the ELA server: 1. Starting from the main menu (Figure 3-1 on p age 3-14), select: The Set Up Enhanced-List System Data window displays (Figure 4-1). Fi[...]

  • Página 45

    Defining the AUDIX server and Administering Access Issue 1 July 199 7 35 Table 4-1 . Field Definitions: Set U p Enhanced-List S ys tem Data W indow Fi e ld Na m e Des crip tio n/Pro cedu re Syst em Login: Vali d Inp ut : sa, v m Enter sa (s ystem admini strator login) or vm (voice mail ad mi ni stra t or l ogi n) . NOT E: Admini strator s using the[...]

  • Página 46

    Administering ELA for AUDI X 36 Issue 1 July 1997 Passwor d: Vali d Inp ut : 5- to 10- al phanumeri c chara cters Enter th e Admini strati ve tr usted server pa sswor d (see page 3-30). Deli ver y Trusted-Se rve r Name: Vali d Inp ut : 1- to 10- al phanumeri c chara cters Enter the nam e of the deliver y trust ed server that y ou adminis t ered i n[...]

  • Página 47

    Guidelines for Nami ng Enhanced Lists Issue 1 July 199 7 37 3. P ress (F3 ) to save the E LA serv e r in form ation t o the system data base . The system di splays the message “ Successfully Updated! ” and asks you to press F 1 acknowledge the mess age. 4. Press (F1) . The s y stem red i splays the E nhanced List Manag er menu. 5. Continue with[...]

  • Página 48

    Administering ELA for AUDI X 38 Issue 1 July 1997 ■ Give enhanced li sts names that reflect an organization or a function. Include the word list . Exam ples : — Marketing_ Dept_List — Maxfield_List — Western_District_Sal esf orce_ List ■ If you want all enhanc ed lists to be grouped t ogeth er, put the word list firs t. Exam ples : — Li[...]

  • Página 49

    Creating Enhanced Lists Issue 1 July 199 7 39 Fi gure 4-2 . Ad m i nist er En hanc ed- Lis t s Wind ow 2. Press (F4) . The s y s tem displays t he Ne w Enhanced-List wi ndow (Figure 4 - 3). Figure 4- 3. N ew Enhanced-List Window 3. Complete the fields in t his window using the information in Table 4-2. NEW E-LIST[...]

  • Página 50

    Administering ELA for AUDI X 40 Issue 1 July 1997 4. P ress (F3) to sa ve this in format io n in the sy stem databa se. The cursor displays in the A d ministe r Enhanced Lists window on the li ne that shows the li st you just entered. (If you have more than one list , the new list is placed in line alphab etically with t he other lists). Table 4-2.[...]

  • Página 51

    Creating Enhanced Lists Issue 1 July 199 7 41 Guid elines for Sel ecting Enhanc ed-Li st M embers The following subscribers can be members of an enhanced list: ■ Local and remote subscrib ers. These me mb ers can be other enhanced list s . ■ Call delivery numb ers, including fax machines ■ E-mail subscrib ers who are serviced by other trusted[...]

  • Página 52

    Administering ELA for AUDI X 42 Issue 1 July 1997 Fi g ure 4- 4. Enha nced Li st Mem ber ship f o r Listname Window 2. Press (F4) . The system displays the Add Memb er data entry wi n dow (Figure 4-5). Fig ure 4 -5. A dd Me mber W ind ow; A ddi ng Me mb e rs t o an Enha nce d List 3. Enter one of t h e following: ■ The user’s na me as it ap pea[...]

  • Página 53

    Creating Enhanced Lists Issue 1 July 199 7 43 4. P ress (F3 ) to sa ve thi s info rmati o n in the system d atabase . NOT E: The Entries: field at the t op of the Administer Enhan ced-Li sts window increments each time you add a new member to the l ist. 5. Repeat S t ep 3 and Step 4 t o continue adding member names , extensions, and e-mail addresse[...]

  • Página 54

    Administering ELA for AUDI X 44 Issue 1 July 1997 The system displays the Administer Enhanced -Lists window (Figure 4-2). The nam es of y our enhanced lists disp l ay in the window (along wi th other de scr i ptiv e dat a). 2. Using the arr o w keys, select th e list y ou would like to add members to. If the lis t is not on the visib le page, s ele[...]

  • Página 55

    Creating Enhanced Lists Issue 1 July 199 7 45 ■ Dele te a memb e r fr o m the list (S tep 6) ■ Pri nt the l i st to your syst e m pri n t er (Ste p 7) Adding a M e mber 4. Press (F4) . The s y s tem displays t he Ad d Member d ata entry win dow (Figure 4 - 5 on page 4-42). a. Enter one of t h e following: ■ The user’s n am e as it appears i[...]

  • Página 56

    Administering ELA for AUDI X 46 Issue 1 July 1997 Deleti ng a Member 6. To delete a member: a. Locate the mem ber name to be deleted . See ‘‘Finding a Member’’ above. b. Pres s (F7 ) . The system displa ys the confirmation m essage: CONFIRM: Deleting Name= List - Listna me Extension/Address= Listextension Enter y to continue, n to abort. c.[...]

  • Página 57

    Deleting an Enhance d List Issue 1 July 199 7 47 2. Use the arrow k eys to hi g hlight the line t hat represents th e l ist you want t o delete. If the list to be d eleted does not app ear on the visible page, s elect the list by one of the following means. ■ Press un t i l the desired l ist d isplays. Use t he arrow keys to highlight the list yo[...]

  • Página 58

    Administering ELA for AUDI X 48 Issue 1 July 1997 Rec ordi ng Na mes f or En hanced List s Once y ou have esta bl ishe d a n enhanced list , is a g ood idea t o record a name f o r the list. That way, users will hear a meani ngful name for the list when they send a message to an enhance- list mailbox for distri b ut ion. However, you need to record[...]

  • Página 59

    Testing I NTUITY Enhanced Lists Issue 1 July 199 7 49 ■ " Def ini ng an EL A Cl as s of S erv ic e" o n p age 3- 16 ■ "Setting Up ELA and Shadow Mailbox Comm unity IDs" on page 3-19 ■ "Administering TCP/IP" on page 3-23 ■ "Setting U p IMAPI S ess ions for Trust ed Server A ccess" on page 3-26 ■ &quo[...]

  • Página 60

    Administering ELA for AUDI X 50 Issue 1 July 1997[...]

  • Página 61

    Issue 1 July 1997 51 5 Preventative Maintenance and Troubles hooting Over view This s ect i on describes ho w to c heck for system alarms rel ating to ELA and how to diagno s e co m mon app li cation an d end-user problems. Ch ec king th e Admini strato r’s Log The system warns you of potential administrative problems with ELA by displaying a min[...]

  • Página 62

    Preventative M aintenance and Troub l eshooting 52 Issue 1 July 1997 5. Press (F3) to display the alarm entries . 6. Examine the display ed entries. See the Lucent I NTUITY ™ Messa ging Solutions R elease 4 Alarm a nd Log M essages, 585-310-566 f or a list of events and alarms, and associat ed repair proced ures . 7. Take whatever corrective acti[...]

  • Página 63

    Checking the Delivery Failure Log Issue 1 July 199 7 53 2. Press (F8 ) to se nd a c op y of th is re po rt to t he sys te m p rin te r , if you h ave a printer available. 3. Press (F6) repeatedly to return t o the main menu. Table 5-1 . F ield Definition s: Enhanced-List Delivery Failur e Log Window Fi e ld Na m e D esc ript ion/ Pro cedu re Date T[...]

  • Página 64

    Preventative M aintenance and Troub l eshooting 54 Issue 1 July 1997 Deliv e r y Fail u re Cod es Delivery failure logs contain the f ollowing codes: Table 5-2. Delivery F a ilure Codes Reason of Failure Description Full ma il box The recip i en t has a full mailbox. Could not l oc ate ELA could not locat e the recipi ent . Trans m i ssion probs Tr[...]

  • Página 65

    Troubleshoot i ng ELA Issue 1 July 199 7 55 Tr ou bles ho otin g ELA Table 5-3 lists questions users ask the system adm inistrator and suggest ed remedies to commonly encou ntered system problem s. Table 5-3. User Questions or System Functionality Symptoms Que st io n /Sym p tom Po ss ibl e Cau se Ans we r/ Sug gest ed R e m edy Duri ng an u pgra d[...]

  • Página 66

    Preventative M aintenance and Troub l eshooting 56 Issue 1 July 1997 Recipi ent cl ai ms s/ he did not get an EL A mess age. ■ Ma iling list n ot curre nt Check the mailing list f or the recipien t’s name. Adm inist er, i f n ecessary. ■ Subscri ber’s mailbox not admini stered corre ctly ■ Check t he Subs cr iber scre en for t he affec te[...]

  • Página 67

    Troubleshoot i ng ELA Issue 1 July 199 7 57 “Ever yone el se seem ed to have rec eived their enhance d-list mess age. I got mine much later.” User mail box f u ll Check the Li st Measurement s Subs criber Day screen fo r t h e af f ected user. Look at the av ailable mailbox space. Advise th e user to delet e unneede d messages and greeti ngs, i[...]

  • Página 68

    Preventative M aintenance and Troub l eshooting 58 Issue 1 July 1997[...]

  • Página 69

    Issue 1 July 1997 59 6 Alarms Over view The following alarms are associated with the Enhance d-List Application. DELI VTS Res o urce Ty pe Alarm Co de: 1 Event ID: ELA-delivt s 01 Alarm L evel: Warning Des criptio n: Trusted-server d at a lost, re-ent er or restore. Repair Action: There are two recovery methods: ■ Access the Set Up Enhanced-List [...]

  • Página 70

    Al arms 60 Issue 1 July 1997 Alarm Co de: 2 Event I D : E LA-delivts02 Alarm L evel: Warning Des criptio n: Trusted-server data partially lost, re-ent er or restore. Repair Action: There are two recovery methods: ■ Access t he Set Up Enhanced-Li s t System Dat a window and re-enter all field information. ■ Restore data from the most recent back[...]

  • Página 71

    REGIST R Y Resource Type Issue 1 July 199 7 61 2. Verify/administer the screen information, as required. 3. Repeat for the delivery trusted server. 4. Enter ch i mapi and ve rify/admi nister a s re quire d. 5. When compl et e, enter the correct i nformation in the Set Up Enhanced-List Syst em Data window. REGISTRY Resource Type Alarm Co de: 1 Event[...]

  • Página 72

    Al arms 62 Issue 1 July 1997 SH ADOW Re so urc e Typ e Alarm Co de: 1 Event I D : E LA-shadow01 Alarm L evel: Warning Des criptio n: Shadow mailbox data lost, re-enter or rest ore . Repair Action: There are two recovery methods: ■ Access t he Set Up Enhanced-Li s t System Dat a window and re-enter t he shadow mailbox e x tension an d commun it y [...]

  • Página 73

    SHADOW Resource Type Issue 1 July 199 7 63 Alarm Co de: 3 Event ID: ELA-shadow03 Alarm L evel: Warning Des criptio n: Shadow mailbox data corrupt, re-enter or restore. Repair Action: There are two recovery methods: ■ Access the Set Up Enhanced-List System Data window and re-enter the shadow mailbox e x tension an d commun it y ID. I f a shad ow m[...]

  • Página 74

    Al arms 64 Issue 1 July 1997 Repair Action: Access the S et Up Enhanced-List Sys t em Data window a nd re-enter the shadow mailbox ext en s ion and community ID. I f a shadow m ai lbox ex i sts a t the e x tension enter ed , the syste m d i splays a syst e m pro m pt to that effe c t. If a sha dow mai lbox does not exist at the ext ension entered ,[...]

  • Página 75

    EL — Enhanced -Li st Applic at i on Issue 1 July 199 7 65 If you regularly get this alarm, the following q uest ions can help you eval uat e how your business uses ELA: ■ Do your subscribers use large enhanc ed lists too frequently? Are they being used for trivial or non-business purposes? ■ Are subscriber ma ilboxes too small? Should you inc[...]

  • Página 76

    Al arms 66 Issue 1 July 1997 Even t ID: ELA -lost lock 0 1 thr ough ELA -lostlo c k10 Des cript i o n: Mess ages to a n enhanced list coul d not b e delivered because s omeone was logged into the sha dow m ail box. Re pair P roced ure: No one shou l d ever be logged into the sha d ow mailbox. However. if someone is, change the password for the shad[...]

  • Página 77

    EL — Enhanced -Li st Applic at i on Issue 1 July 199 7 67 Re pair P roced ure: Evaluate list membe rship hierarchy and delete unnecess ary nestin g so that ELA can handle delivery of the message. See Lucent I NTUITY Mess aging Soluti ons Release 4 Administration , 585-310-564 f or procedures . Even t ID : ELA -l oopv io ltn Des cript i o n: There[...]

  • Página 78

    Al arms 68 Issue 1 July 1997 2. Verify that the shado w mailbox belongs to a com mu nity that cannot receive messa ges. NOT E: The s ending restrictions must be identical on all machi nes in the I NT UI TY AUDIX network. Check the sending restrictions on all machine s . See Lucent I NTUITY Messa ging Solution s Release 4 Adm inistration, 585-310-56[...]

  • Página 79

    Issue 1 July 1997 69 IN Index A ad minist ering , 34 AUDIX , 3 COS , 16 LAN , 23 TCP/IP , 23 ad minist rator’s log , 51 alar ms , 51 ELA-badr eca01 thr ough ELA-badr eca12 , 65 EL A-ch kre strc t , 67 ELA-del i v ts01 , 59 ELA-del i v ts02 , 60 ELA-del i v ts03 , 60 ELA-del i v ts04 , 60 ELA-del i v ts05 , 68 ELA-lo opvioltn , 67 ELA-lo stlock01 [...]

  • Página 80

    Ind ex 70 Issue 1 J uly 1997 L LAN admini stration , 5 , 23 log s , 51 de liv e ry fa ilu r e , 52 M mail boxes , 6 , 7 , 17 , 28 ma ili ng lis t s , 19 AUDIX , 2 mes sagi ng traffic , 5 P passwor ds , 6 , 28 , 36 IM API , 35 list mai lbo x , 40 sy ste m , 35 port s , 6 R reboot ing the syst em , 11 S secur ity e-mail , 6 exter nal access , 6 passw[...]