Lucent Technologies 585-310-575 manual Imapi Session Requirements, Shadow Mailbox

Page 18

Enhanced-List Application

cannot be infected with viruses embedded in these software files, client machines may become infected when a user launches the application associated with the software file.

! CAUTION:

ELA does not perform any virus detection. Your company should evaluate the security risks of file attachments carefully and make provisions for virus detection software on PCs running Message Manager or an e-mail application supported by INTUITY AUDIX R4.

At a minimum, you should advise your users that file attachments should be detached (not launched) and scanned for viruses before use.

IMAPI Session Requirements

An IMAPI session is invoked when an e-mail trusted server, Message Manager, or the ELA trusted server needs to communicate with the AUDIX server. The AUDIX server must have a sufficient number of IMAPI sessions administered to provide adequate access for all IMAPI requests. Additionally, the ELA server must be registered as an AUDIX trusted server.

Shadow Mailbox

The shadow mailbox is a special mailbox that ELA uses to distribute messages. The use of a shadow mailbox prevents replies to ELA-delivered messages from being sent back to the entire Enhanced List. However, you can administer enhanced lists such that recipients can reply to the person who originally sent the message. The shadow mailbox must belong to a community that cannot receive messages.

8Issue 1 July 1997

Image 18
Contents Intuity Messaging Solutions Trademarks Contents Preventative Maintenance and Troubleshooting INIndex Iv Issue 1 July About This Book PurposeIntended Audiences Trademarks and Service Marks Page How to Comment on This Book Related ResourcesAudience Enhanced-List ApplicationOverview What You Should KnowEnhanced-List Application What ELA Can Do for YouELA Administration Planning with Professional ServicesBasic Concepts Things to Consider ELA Message DeliveryHardware/Software Requirements LAN ImpactRemote Message Impact Port Usage Impact SecurityExternal Security Internal Security Imapi Session Requirements Shadow MailboxInstallation Installing the SoftwareSoftware Install Menu Rebooting the System Wait Time WindowMake sure that there is no diskette in the diskette drive Administering Audix for ELA Verifying that ELA is Enabled Activating ELAIncreasing the Number of Mailing Lists Allowed on the System Defining an ELA Class of Service Ch cos COSnumberFax? If you have purchased fax Enter the following information Setting Up ELA and Shadow Mailbox Community IDs Example of Communities Administered for use with ELABefore You Begin ELA Community IDSending Restrictions Screen Shadow Mailbox Community ID Administering TCP/IP Administering Audix for ELA Denver1 Setting Up Imapi Sessions for Trusted Server Access Setting Up Imapi Sessions for Trusted Server Access Defining Two ELA Trusted Servers Security AlertDrmid10 For the administrative ELA trusted server elaadmin, enter 0 Page Administering Audix for ELA Issue 1 July Administering ELA for AUDIX4 Defining the Audix server Administering AccessSet Up Enhanced-List System Data Window On next Administering ELA for Audix Guidelines for Naming Enhanced Lists Mailbox AttributesCreating Enhanced Lists Administer Enhanced-Lists Window On next Guidelines for Selecting Enhanced-List Members Adding Members to Enhanced ListsEnhanced List Membership for Listname Window Adding/Deleting Members to an Enhanced List Enhanced-List Membership for Listname listextension Window Adding a Member Finding a MemberDeleting an Enhanced List Deleting a MemberPrinting an Enhanced List Confirm Deletion of Enhanced-List Window Testing Intuity Enhanced Lists Recording Names for Enhanced ListsPage Administering ELA for Audix Issue 1 July Preventative Maintenance Troubleshooting Checking the Administrator’s LogChecking the Delivery Failure Log Delivery Failure Log WindowOccurred, such as Full Mailbox, Unsupported Media, or Delivery Failure Codes Delivery Failure Codes Reason of Failure DescriptionTroubleshooting ELA Messaging Solutions Release 4 Alarm Log Messages Lucent Intuity Messaging Solutions Digital Preventative Maintenance and Troubleshooting Issue 1 July Alarms Alarm Code Event ID ELA-delivts01Delivts Resource Type Alarm Code Event ID ELA-delivts02 Alarm Code Event ID ELA-delivts03Alarm Code Event ID ELA-delivts04 Alarm Code Event ID ELA-registry01 Alarm Code Event ID ELA-registry02Registry Resource Type Alarm Code Event ID ELA-shadow01 Alarm Code Event ID ELA-shadow02Shadow Resource Type Alarm Code Event ID ELA-shadow03 Alarm Code Event ID ELA-shadow04Alarm Code Event ID ELA-shadow05 Alarm Code Event ID ELA-shadow06 EL Enhanced-List Application Event ID ELA-badreca01 through ELA-badreca12Event ID ELA-lostlock01 through ELA-lostlock10 Event ID ELA-nomembersEvent ID ELA-nestvioltn Event ID ELA-loopvioltn Event ID ELA-mboxlock01Event ID ELA-chkrestrct Event ID ELA-shadow07 Event ID ELA-delivts05Index Index