Lucent Technologies 585-310-575 manual Defining Two ELA Trusted Servers, Security Alert

Page 38

Administering AUDIX for ELA

8.Press (F3) ENTER to save this information to the system database.

The cursor returns to the command line, and the system displays the message Command Successfully Completed.

9.Continue with the next procedure or enter exit to leave AUDIX Administration.

Defining Two ELA Trusted Servers

The ELA software runs as two separate trusted servers. For the ELA servers to communicate with the INTUITY AUDIX server, they must be defined to the INTUITY AUDIX system. The installation worksheets you received from your account representative will have the exact names for the ELA trusted servers. However, for the purposes of this document, the first ELA trusted server will be referred to as the administrative server and the second ELA trusted server as the delivery server.

A request from ELA to send a message to an AUDIX mailbox involves invoking an IMAPI session and locking the ELA mailbox. A server that uses IMAPI to access an AUDIX mailbox is known as a trusted server.

! SECURITY ALERT:

The procedures in this section include setting a password the trusted server must use to access AUDIX. There is a secondary layer of security (in addition to a trusted server password) that you can administer. This additional layer of security involves setting a separate IMAPI password that the trusted server must use before the system will allow an IMAPI session to be invoked.

While administration of this additional password is optional, it is strongly recommended. See your INTUITY Messaging Solutions Release 4 Administration book.

Before You Begin

Before adding the ELA trusted server to the system, you will need the following information:

Two unique 1- to 10-printable character server names for the ELA trusted servers. These server names must be unique, not only from each other, but from all other machines in the network (including fax call delivery machines). Use the li ma and li tr commands to view all machines currently in your network.

Additionally, the server names must comply with the guidelines for naming machines your INTUITY Messaging Solutions Release 4 Administration book for complete information on naming conventions).

28Issue 1 July 1997

Image 38
Contents Intuity Messaging Solutions Trademarks Contents Preventative Maintenance and Troubleshooting INIndex Iv Issue 1 July Intended Audiences About This BookPurpose Trademarks and Service Marks Page How to Comment on This Book Related ResourcesAudience Enhanced-List ApplicationOverview What You Should KnowEnhanced-List Application What ELA Can Do for YouBasic Concepts ELA AdministrationPlanning with Professional Services Things to Consider ELA Message DeliveryRemote Message Impact Hardware/Software RequirementsLAN Impact External Security Port Usage ImpactSecurity Internal Security Imapi Session Requirements Shadow MailboxInstallation Installing the SoftwareSoftware Install Menu Rebooting the System Wait Time WindowMake sure that there is no diskette in the diskette drive Administering Audix for ELA Verifying that ELA is Enabled Activating ELAIncreasing the Number of Mailing Lists Allowed on the System Defining an ELA Class of Service Ch cos COSnumberFax? If you have purchased fax Enter the following information Setting Up ELA and Shadow Mailbox Community IDs Example of Communities Administered for use with ELABefore You Begin ELA Community IDSending Restrictions Screen Shadow Mailbox Community ID Administering TCP/IP Administering Audix for ELA Denver1 Setting Up Imapi Sessions for Trusted Server Access Setting Up Imapi Sessions for Trusted Server Access Defining Two ELA Trusted Servers Security AlertDrmid10 For the administrative ELA trusted server elaadmin, enter 0 Page Administering Audix for ELA Issue 1 July Administering ELA for AUDIX4 Defining the Audix server Administering AccessSet Up Enhanced-List System Data Window On next Administering ELA for Audix Guidelines for Naming Enhanced Lists Mailbox AttributesCreating Enhanced Lists Administer Enhanced-Lists Window On next Guidelines for Selecting Enhanced-List Members Adding Members to Enhanced ListsEnhanced List Membership for Listname Window Adding/Deleting Members to an Enhanced List Enhanced-List Membership for Listname listextension Window Adding a Member Finding a MemberPrinting an Enhanced List Deleting an Enhanced ListDeleting a Member Confirm Deletion of Enhanced-List Window Testing Intuity Enhanced Lists Recording Names for Enhanced ListsPage Administering ELA for Audix Issue 1 July Preventative Maintenance Troubleshooting Checking the Administrator’s LogChecking the Delivery Failure Log Delivery Failure Log WindowOccurred, such as Full Mailbox, Unsupported Media, or Delivery Failure Codes Delivery Failure Codes Reason of Failure DescriptionTroubleshooting ELA Messaging Solutions Release 4 Alarm Log Messages Lucent Intuity Messaging Solutions Digital Preventative Maintenance and Troubleshooting Issue 1 July Delivts Resource Type AlarmsAlarm Code Event ID ELA-delivts01 Alarm Code Event ID ELA-delivts04 Alarm Code Event ID ELA-delivts02Alarm Code Event ID ELA-delivts03 Registry Resource Type Alarm Code Event ID ELA-registry01Alarm Code Event ID ELA-registry02 Shadow Resource Type Alarm Code Event ID ELA-shadow01Alarm Code Event ID ELA-shadow02 Alarm Code Event ID ELA-shadow05 Alarm Code Event ID ELA-shadow03Alarm Code Event ID ELA-shadow04 Alarm Code Event ID ELA-shadow06 EL Enhanced-List Application Event ID ELA-badreca01 through ELA-badreca12Event ID ELA-nestvioltn Event ID ELA-lostlock01 through ELA-lostlock10Event ID ELA-nomembers Event ID ELA-chkrestrct Event ID ELA-loopvioltnEvent ID ELA-mboxlock01 Event ID ELA-shadow07 Event ID ELA-delivts05Index Index