Lucent Technologies 585-310-575 manual Port Usage Impact, External Security

Page 16

Enhanced-List Application

Port Usage Impact

Voice port usage increases as recipients retrieve messages sent by ELA. Plan for the increase with Professional Services when you purchase ELA. Refer to the worksheets that were compiled at the time of the purchase to determine the port usage impact.

You should monitor your system to determine if your Grade of Service (GOS) falls below acceptable levels. If that happens frequently, particularly during the peak busy hour, contact your Lucent account representative to purchase more ports, if necessary. For more information about GOS and monitoring your system, see your INTUITY Messaging Solutions Release 4 Administration book.

NOTE:

If, in its application, ELA degrades service, you might suggest that those users with access to enhanced lists schedule delivery of ELA messages for off-peak hours, for example, at 10:00 p.m. or 4:00 a.m. That way, delivery of messages will not conflict with other user-generated traffic.

Security

Securing a system that allows access from another domain involves a 2-pronged approach. You must consider security from both an internal and an external perspective. External security involves administration to prevent access from an unauthorized source, such as an e-mail or AMIS-Analog message originator that decides to send “mail bombs” to an Enhanced List. Internal security focuses on preventing, or recovering from, damage if a breach occurs, for example, a virus is transmitted in a message component such as an attached software file.

For an in-depth discussion and definition of such terms as trusted server and domain, see your INTUITY Messaging Solutions Release 4 Administration book.

External Security

A new option — the trusted server — has been introduced in this release. The ELA application runs as a trusted server, making requests of the AUDIX server, via IMAPI, to distribute messages to designated recipients. The trusted server is empowered to do anything to an ELA mailbox that an AUDIX user can do.

To prevent unauthorized access to AUDIX from an external source such as a trusted server, system administrators have two levels of security at their disposal:

Trusted server password

IMAPI password

The trusted server password is administered on both the AUDIX server and on the trusted server. The trusted server must use this password when it connects to

AUDIX.

6Issue 1 July 1997

Image 16
Contents Intuity Messaging Solutions Trademarks Contents Preventative Maintenance and Troubleshooting INIndex Iv Issue 1 July Purpose About This BookIntended Audiences Trademarks and Service Marks Page How to Comment on This Book Related ResourcesEnhanced-List Application OverviewAudience What You Should KnowEnhanced-List Application What ELA Can Do for YouPlanning with Professional Services ELA AdministrationBasic Concepts Things to Consider ELA Message DeliveryLAN Impact Hardware/Software RequirementsRemote Message Impact Security Port Usage ImpactExternal Security Internal Security Imapi Session Requirements Shadow MailboxInstallation Installing the SoftwareSoftware Install Menu Rebooting the System Wait Time WindowMake sure that there is no diskette in the diskette drive Administering Audix for ELA Verifying that ELA is Enabled Activating ELAIncreasing the Number of Mailing Lists Allowed on the System Defining an ELA Class of Service Ch cos COSnumberFax? If you have purchased fax Enter the following information Setting Up ELA and Shadow Mailbox Community IDs Example of Communities Administered for use with ELABefore You Begin ELA Community IDSending Restrictions Screen Shadow Mailbox Community ID Administering TCP/IP Administering Audix for ELA Denver1 Setting Up Imapi Sessions for Trusted Server Access Setting Up Imapi Sessions for Trusted Server Access Defining Two ELA Trusted Servers Security AlertDrmid10 For the administrative ELA trusted server elaadmin, enter 0 Page Administering Audix for ELA Issue 1 July Administering ELA for AUDIX4 Defining the Audix server Administering AccessSet Up Enhanced-List System Data Window On next Administering ELA for Audix Guidelines for Naming Enhanced Lists Mailbox AttributesCreating Enhanced Lists Administer Enhanced-Lists Window On next Guidelines for Selecting Enhanced-List Members Adding Members to Enhanced ListsEnhanced List Membership for Listname Window Adding/Deleting Members to an Enhanced List Enhanced-List Membership for Listname listextension Window Adding a Member Finding a MemberDeleting a Member Deleting an Enhanced ListPrinting an Enhanced List Confirm Deletion of Enhanced-List Window Testing Intuity Enhanced Lists Recording Names for Enhanced ListsPage Administering ELA for Audix Issue 1 July Preventative Maintenance Troubleshooting Checking the Administrator’s LogChecking the Delivery Failure Log Delivery Failure Log WindowOccurred, such as Full Mailbox, Unsupported Media, or Delivery Failure Codes Delivery Failure Codes Reason of Failure DescriptionTroubleshooting ELA Messaging Solutions Release 4 Alarm Log Messages Lucent Intuity Messaging Solutions Digital Preventative Maintenance and Troubleshooting Issue 1 July Alarm Code Event ID ELA-delivts01 AlarmsDelivts Resource Type Alarm Code Event ID ELA-delivts03 Alarm Code Event ID ELA-delivts02Alarm Code Event ID ELA-delivts04 Alarm Code Event ID ELA-registry02 Alarm Code Event ID ELA-registry01Registry Resource Type Alarm Code Event ID ELA-shadow02 Alarm Code Event ID ELA-shadow01Shadow Resource Type Alarm Code Event ID ELA-shadow04 Alarm Code Event ID ELA-shadow03Alarm Code Event ID ELA-shadow05 Alarm Code Event ID ELA-shadow06 EL Enhanced-List Application Event ID ELA-badreca01 through ELA-badreca12Event ID ELA-nomembers Event ID ELA-lostlock01 through ELA-lostlock10Event ID ELA-nestvioltn Event ID ELA-mboxlock01 Event ID ELA-loopvioltnEvent ID ELA-chkrestrct Event ID ELA-shadow07 Event ID ELA-delivts05Index Index