Lucent Technologies 585-310-575 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80

Ir para a página of

Bom manual de uso

As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto Lucent Technologies 585-310-575. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónicoLucent Technologies 585-310-575 vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.

O que é a instrução?

A palavra vem do latim "Instructio" ou instruir. Portanto, no manual Lucent Technologies 585-310-575 você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.

Infelizmente, pequenos usuários tomam o tempo para ler o manual Lucent Technologies 585-310-575, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.

Então, o que deve conter o manual perfeito?

Primeiro, o manual Lucent Technologies 585-310-575 deve conte:
- dados técnicos do dispositivo Lucent Technologies 585-310-575
- nome do fabricante e ano de fabricação do dispositivo Lucent Technologies 585-310-575
- instruções de utilização, regulação e manutenção do dispositivo Lucent Technologies 585-310-575
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes

Por que você não ler manuais?

Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque Lucent Technologies 585-310-575 não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos Lucent Technologies 585-310-575 e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço Lucent Technologies na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas Lucent Technologies 585-310-575, como para a versão papel.

Por que ler manuais?

Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo Lucent Technologies 585-310-575, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.

Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual Lucent Technologies 585-310-575. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação

Índice do manual

  • Página 1

    I NT UITY ™ Messaging Solutions Enhan ce d-Li st App li ca tio n Re le as e 1 .0 58 5-310-57 5 Com code 1 0797 5674 Issue 1 July 1 997[...]

  • Página 2

    Copyright  1997, L ucen t Te chnol ogi es All Rights R e served Prin ted in U .S. A. Notice Eve ry effort was made to en sure that the info rmation in this b ook wa s compl et e and accur at e at th e time of pr i nti ng. Ho w ever , in for mat ion is s ubj ec t to cha nge. Your Responsibi l i ty for Your Sy ste m’s Sec u rity Toll fr aud is t[...]

  • Página 3

    Conten ts Issue 1 July 1997 i Abou t This Book ■ Pur pos e v ■ Intended Audience s v ■ Tradem arks and Service Marks vi ■ Related R esources viii ■ How t o Comment on This B ook viii 1 En ha n ced -Lis t App lic a t ion ■ Overvie w 1 Aud i ence 1 Wh at You S hould Know 1 ■ Enhanced -List Applica t i on 2 ■ What ELA Can Do for You 2 [...]

  • Página 4

    Conten ts ii Issue 1 July 199 7 ■ Increasing the Number of Mailing Lists A l lowed on the Sy s t em 15 ■ Defining an ELA Class of Service 16 ■ Setting Up ELA and Shadow Mai l b ox Community IDs 19 Thi ng s to C ons id er 19 Befor e Y ou Begin 20 ELA Community ID 20 Shad ow Mailbox Community ID 22 ■ Admini s tering TCP/IP 23 Befor e Y ou Beg[...]

  • Página 5

    Conten ts Issue 1 July 1997 iii ■ Checking the Admin istrator’s Log 51 ■ Checking t he De l ivery Failure Log 52 ■ Delivery Failure Codes 54 ■ Troubleshoo ti ng ELA 55 6 Alarms ■ Overvie w 59 ■ DELIVTS Resource Ty pe 59 ■ REG ISTR Y Resource Type 61 ■ SHADO W Resourc e Type 62 ■ EL — Enhan ced-List Applicat i on 65 IN Inde x[...]

  • Página 6

    Conten ts iv Issue 1 July 1997[...]

  • Página 7

    Issue 1 J uly 1997 v About This Boo k Pu rpo se This book contains instructions for installing and administrating the Enhanced -List Applicat ion (ELA) on an I NTUITY ™ AUDIX ® R 4 syst em. Inte n ded A udiences This book is intended primarily for t he on-site technica l personnel who are responsible for installing and configuring the system and[...]

  • Página 8

    About T his Book vi Issue 1 July 1997 Trademarks and Service Mar k s The following tradema r ked produ ct s are mention ed in books in the Lucent I NT UI TY documen t set: ■ AT™ is a t radem ark of Hayes Microcomp uter Products, Inc. ■ AUDIX ® i s a registered tradema rk of Lucent Technolog ies™. ■ cc:Mail ® is a registered t rademark o[...]

  • Página 9

    Trademarks a nd Service Mark s Issue 1 J uly 1997 vi i ■ Novell ® i s a registered trademark of Novell, Inc. ■ Parad yne ® is a re g istered tradem ark of Lucent Technol og ies™. ■ Phi llips ® is a reg is ter ed trad ema rk of Philli ps Scre w C om pany. ■ Rol m ® i s a registered trademark of International Bus iness Mach ines. ■ SL[...]

  • Página 10

    About T his Book viii I s sue 1 J uly 1997 Rela ted R eso urces If you need help with basi c administrative procedures, see the I NTUITY ™ Messaging Solutions R elease 4 Administra tion book, 585-31 0-564. Ho w to Com ment on Thi s Boo k We are always interested in your sug gestions for i mprovin g this book. Please comple te and return the reade[...]

  • Página 11

    Issue 1 July 1997 1 1 Enhanced -List App l ic at io n Over view This chapter describes the Enhanced -List Application (ELA) on an I NTUITY ™ AUDIX ® Release 4 system. Audience Read this book if you are the AUDIX syste m adminis trato r re sponsi b l e for th e configuratio n and ma intenance of an I NTUITY AUDIX R e lease 4 system. What You Shou[...]

  • Página 12

    Enhanced -List Applicat ion 2 Issue 1 July 1997 E nha n ced- Lis t Ap plic a t ion The Enhanced -List A pplication (ELA) greatly ex pands your business’ capability to de l iver messag es to large numbers of recipients. A single enh anced lis t can contain 1500 addresses and you – th e syst em administrator – can create up t o 100 s uch lists.[...]

  • Página 13

    ELA Ad m inist r atio n Issue 1 J uly 1997 3 ■ Forward messages to support staff automatically. If you o f t en forward incoming messages, y ou can create an en hanced-list mailbox that autom at ically forwards messages t o your staff. Your staff can review the messages and then respond to them as they normally would. ELA Ad m in istr at ion Only[...]

  • Página 14

    Enhanced -List Applicat ion 4 Issue 1 July 1997 This administration can be divided as follows: AUDIX Adm i nistration: ■ Contact Professional Services (or your account representative, if you did not con t ract with P r o f essional S ervices) to have ELA i nstalled. ■ Contact Professional Services (or your account representative, if you did not[...]

  • Página 15

    ELA Ad m inist r atio n Issue 1 J uly 1997 5 Hardware/So ftware Requirements ELA runs on the s ame m achin e as AUDIX. ■ ELA must be installed on a Lucent I NTUITY R4.2-4 or higher machi ne. If your site has an earli er rel e ase, contact your Lucent s ervice representa t ive to obtain the necessary upgrade. ELA is not available for pre-R4 Lucent[...]

  • Página 16

    Enhanced -List Applicat ion 6 Issue 1 July 1997 Port U s age Impact Voice port usage increases as rec ipi e nts retrieve m essages sent by ELA . Plan f or the i ncreas e with Professional Services when you purchase EL A. Refer to the worksheets that were compiled at the ti m e of the purchase to determine the port usage impa ct. You should m onitor[...]

  • Página 17

    ELA Ad m inist r atio n Issue 1 J uly 1997 7 The IMAPI passw ord is an optional, seconda ry level of security used to prevent an unauthorized source external to AUDIX f rom starting an IMAPI session. We strongly rec om mend that y ou take a dvantage of this ex t ra protection. If you choose to a dminister an IMAPI pass word, we rec ommend that you [...]

  • Página 18

    Enhanced -List Applicat ion 8 Issue 1 July 1997 cannot be infected with viruses embedded in these software files, cl ient machines m ay becom e infected w hen a user launches the applicati on associated with the software file. ! CAUTION: ELA does not perform any virus detection. Your com pan y should evaluat e the security risks of file attachments[...]

  • Página 19

    Issue 1 July 1997 9 2 Install ation Over view This chapter describes how to install E LA on a Lucent I NTUITY R4.2 o r higher syste m . I ns t allin g the So ft ware The ELA package is prov ided on a tape labeled Enhanc ed-List Ap p lication . To install ELA on a Lucent I NTUITY R4.2 or hi gher system: 1. Log in to the Lucen t I NTUITY system using[...]

  • Página 20

    Ins ta lla tio n 10 Issue 1 July 1997 Figur e 2-1. Soft ware In stall M e nu 3. Insert the t ape labeled Enhance d-List Ap pl i cation i nto th e ta pe dr ive . 4. Select: The system displa ys the message : Insert a tape into the Tape Drive. Type [go] when ready or [q] to quit: (default: go) 5. Press to go ahead with the install. The system displa [...]

  • Página 21

    Rebooting the System Issue 1 July 199 7 11 6. Press to select all . The system installs the software and displays several status messa ges. When th e soft ware installation is complete, the syste m displays the message: Installation of Enhanced List Application Package was successful. Insert a tape into the Tape Drive. Type [go] when ready or [q] t[...]

  • Página 22

    Ins ta lla tio n 12 Issue 1 July 1997 3. Press (F3) . The system stop s the voi ce system and displ ays the a seri es of status messages. When the voice system has st opped, the syst e m displays the message: The Voice System has stopped. Press Enter to Continue. 4. Press . 5. Press (F6) . The s y s tem displays t he Sy s t em Control win dow. 6. S[...]

  • Página 23

    Issue 1 July 1997 13 3 Administering A U DI X for EL A Over view To define the ELA server and functionality t o AUDIX: ■ Contact Professional Services (or your account representative, if you did not contract with Profession al Services) to have ELA installed. ■ Contact Professional Services (or your account representative, if you did not contra[...]

  • Página 24

    Administering AUDIX f or ELA 14 Issue 1 July 1997 Acti vat ing ELA After the ELA installation i s complete, contact your Professional S ervices ( o r your account representat ive, if you did not contract with Professional Services). The technici an from the remo te supp ort center w ill acce ss your syst e m re motely and activate the ELA feature. [...]

  • Página 25

    Inc re as in g t he N umb er of Ma iling L is ts A llo w ed o n the Syst e m Issue 1 July 199 7 15 3. Ensure the following fiel ds are set to ON: ■ Enhanced List Application ■ TCP/IP Administration 4. If either of these fields is OFF, and you purcha sed/installed ELA, call the support center to request that the features be enabled for your Luce[...]

  • Página 26

    Administering AUDIX f or ELA 16 Issue 1 July 1997 6. Press (F3 ) to save the i nformation in the system d at abase. The cursor ret urns to the co mmand l i ne, and the syst em displays the me ssag e Command Successfully Completed . 7. Continue with the next proced ure or enter ex i t t o l eav e A UD IX Administrati on. Def i ning an EL A C la s s [...]

  • Página 27

    Defining an ELA Cl as s of Service Issue 1 July 199 7 17 Figu re 3- 2. Clas s of Servic e S c r e en , Page 1; Defi nin g a Class of Servi ce fo r ELA 3. Although not required, we recomme nd th at you change the name of the COS to be more descri p tive, for ex a m pl e , e nte r ELA in th e Name: fie ld. NOT E: Yo u should w rit e down the CO S num[...]

  • Página 28

    Administering AUDIX f or ELA 18 Issue 1 July 1997 Figur e 3-3. S ub sc ribe r C las s of Se rvi c e Para m et ers Sc reen, Pa ge 2; Enabl ing ELA on a COS B as is 7. Enter the follo wing information: ■ 14 in the Retention Times (days), New: field. (Thi s setting acts as a safety measure, should ELA encoun ter an operation al problem, and cannot s[...]

  • Página 29

    Setti n g Up EL A and Sha do w Mail box C om mun ity IDs Issue 1 July 199 7 19 8. Press (F3 ) to save t he informatio n in the sy stem d at abase. The cursor ret urns to the co mmand l i ne, and the syst em displays the me ssag e Command Successfully Completed . 9. Continue with the next proced ure or enter ex i t t o l eav e A UD IX Administrati o[...]

  • Página 30

    Administering AUDIX f or ELA 20 Issue 1 July 1997 Let’s say you set up the enhanced -list mailbox communi ty t o be Communit y 10. Commun it y 10 is g iven perm i ssion to s end to all other c ommunities (except the shadow mailbox c ommunity). The n, you s et up a specia l user com munity, Commun it y 9, and administer C ommunity 9 to se nd to al[...]

  • Página 31

    Setti n g Up EL A and Sha do w Mail box C om mun ity IDs Issue 1 July 199 7 21 2. At the enter command: pro mpt, enter either: The system displays the Sending Restrictions screen (Figure 3-5). Figure 3-5. Se n di ng Restrictions S c reen 3. Enter y in the Activate Restrictions? fi eld. 4. Leave all fields blank (ho r izontally) that c orr espond to[...]

  • Página 32

    Administering AUDIX f or ELA 22 Issue 1 July 1997 access to enhanced lists from sending a message to an Enhanced List. Following the example discusse d under "Things to Consider" on page 3-19, there would be an r in the field corresponding to the intersection between Sender Comm uni ty 1 (t he default user com munity) and Recipient Commun[...]

  • Página 33

    Administering TCP /IP Issue 1 July 199 7 23 Admi ni ster in g TC P/ IP If you r system is al ready connec ted to the LAN, you can skip t h is p rocedu re. However, you need to know t he I P A dd ress to adm inis ter the trusted serv er, so — even if y our system i s already networked — perform step 1 of t hi s p rocedure and writ e down your sy[...]

  • Página 34

    Administering AUDIX f or ELA 24 Issue 1 July 1997 Figure 3 - 6 . TCP /IP Adm inistration W indow; A d ministering T CP/IP fo r Enhanced-List Applic ation (ELA) 2. Enter the AUDIX s erver nam e in the UNIX Machine Name: field. Thi s name sho uld be l isted on the Installation Information worksheet, or y ou can obt ai n this n am e from your PC/LA N [...]

  • Página 35

    Administering TCP /IP Issue 1 July 199 7 25 5. Ent er the de faul t gat ew ay IP addr es s in the Default Gateway IP Address: fie l d . The default gateway IP address is the addres s of the gateway router that serves to connect to addresses on other LANs. This field is left blank if the Lucent I NT UIT Y system will only be communicating wi th othe[...]

  • Página 36

    Administering AUDIX f or ELA 26 Issue 1 July 1997 NOT E: The changes to your syste m will not take effect until you reboot your system. See your I NTUITY Messaging Solutions R elease 4 Adm inistratio n book for i nstructions. Se tting Up IMAPI S essions f or Trust ed Se rver A ccess Whenever a trusted server accesses an AUDIX mailbox, it u ses an I[...]

  • Página 37

    Setting Up IMAPI Sessions for Trusted Server Access Issue 1 July 199 7 27 Figure 3-8. S ys tem-Parameters IMAPI-Options Screen , Pa ge 1; Sett ing IMAPI Sessions f or Tru ste d Se rve r Ac ce s s NOT E: The f oll owing contain instructions for t he fields t hat directly relate to ELA. See your I NTUITY Messaging Solutions R elease 4 Administ ration[...]

  • Página 38

    Administering AUDIX f or ELA 28 Issue 1 July 1997 8. P ress (F3) to sa ve this in format io n to the syst em databa se. The cursor ret urns to the co mmand l i ne, and the syst em displays the me ssag e Command Successfully Completed . 9. Continue with the next proced ure or enter ex i t t o l eav e A UD IX Administrati on. Def i ning Two EL A Tru [...]

  • Página 39

    Defining Two ELA Trusted Servers Issue 1 July 199 7 29 ■ The TCP/IP address for the AUDIX server (s ee pa ge 3-23). You will p erf orm this p rocedure twice , fi rst for the E LA administrative server, and then for t he ELA delivery server. To add the ELA trusted servers to the I NTUITY AUDIX server: 1. Starting from the main menu (Figure 3-1 on [...]

  • Página 40

    Administering AUDIX f or ELA 30 Issue 1 July 1997 3. In th e Trusted-Server Name: field , enter a name for the first ELA trusted server. (See the Note below for tips on trusted serv er names.) This name must be a unique 1- t o 10-printable character entry. Additionally, t his name can not start with a number an d cannot co ntain any embedded spaces[...]

  • Página 41

    Defining Two ELA Trusted Servers Issue 1 July 199 7 31 11. Do you want t o administer an IMAPI password? ■ If yes, follow the procedures for s etting the IMAPI pass word in your I NTUITY Me s sa g ing S ol ut ion s Re le ase 4 A d mi n is tra t i o n bo ok b efor e proceedin g to the ne xt section. ■ If no, go to Chapter 4 to Ad m inister ELA, [...]

  • Página 42

    Administering AUDIX f or ELA 32 Issue 1 July 1997[...]

  • Página 43

    Issue 1 July 1997 33 4 Admi nister ing ELA fo r AUDI X Over view Now that t he AUDI X system knows abo ut the ELA t ruste d serve rs, you can d o the initial administration of the ELA system. To mak e ELA fully functional, you must: ■ Define the AUDIX server t o ELA and administer acces s ■ Create en hanced lists ■ Add mem bers to enhanc ed l[...]

  • Página 44

    Administering ELA for AUDI X 34 Issue 1 July 1997 ■ Enhanced - l ist mailbox an d shadow mailbox Com munity IDs (see page 3-20) ■ E L A C la ss of S er vi c e ( se e p a ge 3- 16) To administer the ELA server: 1. Starting from the main menu (Figure 3-1 on p age 3-14), select: The Set Up Enhanced-List System Data window displays (Figure 4-1). Fi[...]

  • Página 45

    Defining the AUDIX server and Administering Access Issue 1 July 199 7 35 Table 4-1 . Field Definitions: Set U p Enhanced-List S ys tem Data W indow Fi e ld Na m e Des crip tio n/Pro cedu re Syst em Login: Vali d Inp ut : sa, v m Enter sa (s ystem admini strator login) or vm (voice mail ad mi ni stra t or l ogi n) . NOT E: Admini strator s using the[...]

  • Página 46

    Administering ELA for AUDI X 36 Issue 1 July 1997 Passwor d: Vali d Inp ut : 5- to 10- al phanumeri c chara cters Enter th e Admini strati ve tr usted server pa sswor d (see page 3-30). Deli ver y Trusted-Se rve r Name: Vali d Inp ut : 1- to 10- al phanumeri c chara cters Enter the nam e of the deliver y trust ed server that y ou adminis t ered i n[...]

  • Página 47

    Guidelines for Nami ng Enhanced Lists Issue 1 July 199 7 37 3. P ress (F3 ) to save the E LA serv e r in form ation t o the system data base . The system di splays the message “ Successfully Updated! ” and asks you to press F 1 acknowledge the mess age. 4. Press (F1) . The s y stem red i splays the E nhanced List Manag er menu. 5. Continue with[...]

  • Página 48

    Administering ELA for AUDI X 38 Issue 1 July 1997 ■ Give enhanced li sts names that reflect an organization or a function. Include the word list . Exam ples : — Marketing_ Dept_List — Maxfield_List — Western_District_Sal esf orce_ List ■ If you want all enhanc ed lists to be grouped t ogeth er, put the word list firs t. Exam ples : — Li[...]

  • Página 49

    Creating Enhanced Lists Issue 1 July 199 7 39 Fi gure 4-2 . Ad m i nist er En hanc ed- Lis t s Wind ow 2. Press (F4) . The s y s tem displays t he Ne w Enhanced-List wi ndow (Figure 4 - 3). Figure 4- 3. N ew Enhanced-List Window 3. Complete the fields in t his window using the information in Table 4-2. NEW E-LIST[...]

  • Página 50

    Administering ELA for AUDI X 40 Issue 1 July 1997 4. P ress (F3) to sa ve this in format io n in the sy stem databa se. The cursor displays in the A d ministe r Enhanced Lists window on the li ne that shows the li st you just entered. (If you have more than one list , the new list is placed in line alphab etically with t he other lists). Table 4-2.[...]

  • Página 51

    Creating Enhanced Lists Issue 1 July 199 7 41 Guid elines for Sel ecting Enhanc ed-Li st M embers The following subscribers can be members of an enhanced list: ■ Local and remote subscrib ers. These me mb ers can be other enhanced list s . ■ Call delivery numb ers, including fax machines ■ E-mail subscrib ers who are serviced by other trusted[...]

  • Página 52

    Administering ELA for AUDI X 42 Issue 1 July 1997 Fi g ure 4- 4. Enha nced Li st Mem ber ship f o r Listname Window 2. Press (F4) . The system displays the Add Memb er data entry wi n dow (Figure 4-5). Fig ure 4 -5. A dd Me mber W ind ow; A ddi ng Me mb e rs t o an Enha nce d List 3. Enter one of t h e following: ■ The user’s na me as it ap pea[...]

  • Página 53

    Creating Enhanced Lists Issue 1 July 199 7 43 4. P ress (F3 ) to sa ve thi s info rmati o n in the system d atabase . NOT E: The Entries: field at the t op of the Administer Enhan ced-Li sts window increments each time you add a new member to the l ist. 5. Repeat S t ep 3 and Step 4 t o continue adding member names , extensions, and e-mail addresse[...]

  • Página 54

    Administering ELA for AUDI X 44 Issue 1 July 1997 The system displays the Administer Enhanced -Lists window (Figure 4-2). The nam es of y our enhanced lists disp l ay in the window (along wi th other de scr i ptiv e dat a). 2. Using the arr o w keys, select th e list y ou would like to add members to. If the lis t is not on the visib le page, s ele[...]

  • Página 55

    Creating Enhanced Lists Issue 1 July 199 7 45 ■ Dele te a memb e r fr o m the list (S tep 6) ■ Pri nt the l i st to your syst e m pri n t er (Ste p 7) Adding a M e mber 4. Press (F4) . The s y s tem displays t he Ad d Member d ata entry win dow (Figure 4 - 5 on page 4-42). a. Enter one of t h e following: ■ The user’s n am e as it appears i[...]

  • Página 56

    Administering ELA for AUDI X 46 Issue 1 July 1997 Deleti ng a Member 6. To delete a member: a. Locate the mem ber name to be deleted . See ‘‘Finding a Member’’ above. b. Pres s (F7 ) . The system displa ys the confirmation m essage: CONFIRM: Deleting Name= List - Listna me Extension/Address= Listextension Enter y to continue, n to abort. c.[...]

  • Página 57

    Deleting an Enhance d List Issue 1 July 199 7 47 2. Use the arrow k eys to hi g hlight the line t hat represents th e l ist you want t o delete. If the list to be d eleted does not app ear on the visible page, s elect the list by one of the following means. ■ Press un t i l the desired l ist d isplays. Use t he arrow keys to highlight the list yo[...]

  • Página 58

    Administering ELA for AUDI X 48 Issue 1 July 1997 Rec ordi ng Na mes f or En hanced List s Once y ou have esta bl ishe d a n enhanced list , is a g ood idea t o record a name f o r the list. That way, users will hear a meani ngful name for the list when they send a message to an enhance- list mailbox for distri b ut ion. However, you need to record[...]

  • Página 59

    Testing I NTUITY Enhanced Lists Issue 1 July 199 7 49 ■ " Def ini ng an EL A Cl as s of S erv ic e" o n p age 3- 16 ■ "Setting Up ELA and Shadow Mailbox Comm unity IDs" on page 3-19 ■ "Administering TCP/IP" on page 3-23 ■ "Setting U p IMAPI S ess ions for Trust ed Server A ccess" on page 3-26 ■ &quo[...]

  • Página 60

    Administering ELA for AUDI X 50 Issue 1 July 1997[...]

  • Página 61

    Issue 1 July 1997 51 5 Preventative Maintenance and Troubles hooting Over view This s ect i on describes ho w to c heck for system alarms rel ating to ELA and how to diagno s e co m mon app li cation an d end-user problems. Ch ec king th e Admini strato r’s Log The system warns you of potential administrative problems with ELA by displaying a min[...]

  • Página 62

    Preventative M aintenance and Troub l eshooting 52 Issue 1 July 1997 5. Press (F3) to display the alarm entries . 6. Examine the display ed entries. See the Lucent I NTUITY ™ Messa ging Solutions R elease 4 Alarm a nd Log M essages, 585-310-566 f or a list of events and alarms, and associat ed repair proced ures . 7. Take whatever corrective acti[...]

  • Página 63

    Checking the Delivery Failure Log Issue 1 July 199 7 53 2. Press (F8 ) to se nd a c op y of th is re po rt to t he sys te m p rin te r , if you h ave a printer available. 3. Press (F6) repeatedly to return t o the main menu. Table 5-1 . F ield Definition s: Enhanced-List Delivery Failur e Log Window Fi e ld Na m e D esc ript ion/ Pro cedu re Date T[...]

  • Página 64

    Preventative M aintenance and Troub l eshooting 54 Issue 1 July 1997 Deliv e r y Fail u re Cod es Delivery failure logs contain the f ollowing codes: Table 5-2. Delivery F a ilure Codes Reason of Failure Description Full ma il box The recip i en t has a full mailbox. Could not l oc ate ELA could not locat e the recipi ent . Trans m i ssion probs Tr[...]

  • Página 65

    Troubleshoot i ng ELA Issue 1 July 199 7 55 Tr ou bles ho otin g ELA Table 5-3 lists questions users ask the system adm inistrator and suggest ed remedies to commonly encou ntered system problem s. Table 5-3. User Questions or System Functionality Symptoms Que st io n /Sym p tom Po ss ibl e Cau se Ans we r/ Sug gest ed R e m edy Duri ng an u pgra d[...]

  • Página 66

    Preventative M aintenance and Troub l eshooting 56 Issue 1 July 1997 Recipi ent cl ai ms s/ he did not get an EL A mess age. ■ Ma iling list n ot curre nt Check the mailing list f or the recipien t’s name. Adm inist er, i f n ecessary. ■ Subscri ber’s mailbox not admini stered corre ctly ■ Check t he Subs cr iber scre en for t he affec te[...]

  • Página 67

    Troubleshoot i ng ELA Issue 1 July 199 7 57 “Ever yone el se seem ed to have rec eived their enhance d-list mess age. I got mine much later.” User mail box f u ll Check the Li st Measurement s Subs criber Day screen fo r t h e af f ected user. Look at the av ailable mailbox space. Advise th e user to delet e unneede d messages and greeti ngs, i[...]

  • Página 68

    Preventative M aintenance and Troub l eshooting 58 Issue 1 July 1997[...]

  • Página 69

    Issue 1 July 1997 59 6 Alarms Over view The following alarms are associated with the Enhance d-List Application. DELI VTS Res o urce Ty pe Alarm Co de: 1 Event ID: ELA-delivt s 01 Alarm L evel: Warning Des criptio n: Trusted-server d at a lost, re-ent er or restore. Repair Action: There are two recovery methods: ■ Access the Set Up Enhanced-List [...]

  • Página 70

    Al arms 60 Issue 1 July 1997 Alarm Co de: 2 Event I D : E LA-delivts02 Alarm L evel: Warning Des criptio n: Trusted-server data partially lost, re-ent er or restore. Repair Action: There are two recovery methods: ■ Access t he Set Up Enhanced-Li s t System Dat a window and re-enter all field information. ■ Restore data from the most recent back[...]

  • Página 71

    REGIST R Y Resource Type Issue 1 July 199 7 61 2. Verify/administer the screen information, as required. 3. Repeat for the delivery trusted server. 4. Enter ch i mapi and ve rify/admi nister a s re quire d. 5. When compl et e, enter the correct i nformation in the Set Up Enhanced-List Syst em Data window. REGISTRY Resource Type Alarm Co de: 1 Event[...]

  • Página 72

    Al arms 62 Issue 1 July 1997 SH ADOW Re so urc e Typ e Alarm Co de: 1 Event I D : E LA-shadow01 Alarm L evel: Warning Des criptio n: Shadow mailbox data lost, re-enter or rest ore . Repair Action: There are two recovery methods: ■ Access t he Set Up Enhanced-Li s t System Dat a window and re-enter t he shadow mailbox e x tension an d commun it y [...]

  • Página 73

    SHADOW Resource Type Issue 1 July 199 7 63 Alarm Co de: 3 Event ID: ELA-shadow03 Alarm L evel: Warning Des criptio n: Shadow mailbox data corrupt, re-enter or restore. Repair Action: There are two recovery methods: ■ Access the Set Up Enhanced-List System Data window and re-enter the shadow mailbox e x tension an d commun it y ID. I f a shad ow m[...]

  • Página 74

    Al arms 64 Issue 1 July 1997 Repair Action: Access the S et Up Enhanced-List Sys t em Data window a nd re-enter the shadow mailbox ext en s ion and community ID. I f a shadow m ai lbox ex i sts a t the e x tension enter ed , the syste m d i splays a syst e m pro m pt to that effe c t. If a sha dow mai lbox does not exist at the ext ension entered ,[...]

  • Página 75

    EL — Enhanced -Li st Applic at i on Issue 1 July 199 7 65 If you regularly get this alarm, the following q uest ions can help you eval uat e how your business uses ELA: ■ Do your subscribers use large enhanc ed lists too frequently? Are they being used for trivial or non-business purposes? ■ Are subscriber ma ilboxes too small? Should you inc[...]

  • Página 76

    Al arms 66 Issue 1 July 1997 Even t ID: ELA -lost lock 0 1 thr ough ELA -lostlo c k10 Des cript i o n: Mess ages to a n enhanced list coul d not b e delivered because s omeone was logged into the sha dow m ail box. Re pair P roced ure: No one shou l d ever be logged into the sha d ow mailbox. However. if someone is, change the password for the shad[...]

  • Página 77

    EL — Enhanced -Li st Applic at i on Issue 1 July 199 7 67 Re pair P roced ure: Evaluate list membe rship hierarchy and delete unnecess ary nestin g so that ELA can handle delivery of the message. See Lucent I NTUITY Mess aging Soluti ons Release 4 Administration , 585-310-564 f or procedures . Even t ID : ELA -l oopv io ltn Des cript i o n: There[...]

  • Página 78

    Al arms 68 Issue 1 July 1997 2. Verify that the shado w mailbox belongs to a com mu nity that cannot receive messa ges. NOT E: The s ending restrictions must be identical on all machi nes in the I NT UI TY AUDIX network. Check the sending restrictions on all machine s . See Lucent I NTUITY Messa ging Solution s Release 4 Adm inistration, 585-310-56[...]

  • Página 79

    Issue 1 July 1997 69 IN Index A ad minist ering , 34 AUDIX , 3 COS , 16 LAN , 23 TCP/IP , 23 ad minist rator’s log , 51 alar ms , 51 ELA-badr eca01 thr ough ELA-badr eca12 , 65 EL A-ch kre strc t , 67 ELA-del i v ts01 , 59 ELA-del i v ts02 , 60 ELA-del i v ts03 , 60 ELA-del i v ts04 , 60 ELA-del i v ts05 , 68 ELA-lo opvioltn , 67 ELA-lo stlock01 [...]

  • Página 80

    Ind ex 70 Issue 1 J uly 1997 L LAN admini stration , 5 , 23 log s , 51 de liv e ry fa ilu r e , 52 M mail boxes , 6 , 7 , 17 , 28 ma ili ng lis t s , 19 AUDIX , 2 mes sagi ng traffic , 5 P passwor ds , 6 , 28 , 36 IM API , 35 list mai lbo x , 40 sy ste m , 35 port s , 6 R reboot ing the syst em , 11 S secur ity e-mail , 6 exter nal access , 6 passw[...]