Lucent Technologies 585-310-575 manual On next

Page 45

Defining the AUDIX server and Administering Access

Table 4-1. Field Definitions: Set Up Enhanced-List System Data Window

 

Field Name

Description/Procedure

 

 

 

 

 

 

System Login:

Enter sa (system administrator login) or vm (voice mail

 

 

Valid Input:

administrator login).

 

 

 

 

 

 

 

sa, vm

 

 

NOTE:

 

 

 

 

 

 

 

 

 

 

 

 

 

Administrators using the vm login cannot administer

 

 

 

 

 

enhanced lists or ELA trusted servers. This field allows

 

 

 

 

 

ELA to log into AUDIX.

 

 

 

 

 

 

System Password:

Enter your sa or vm administration password.

 

 

Valid Input:

The ELA server uses this password to perform AUDIX

 

 

6- to 8-alphanumeric

administration functions, such as adding or deleting an

 

 

enhanced-list mailbox.

 

 

characters

 

 

 

 

 

 

 

 

 

 

 

IMAPI Password:

If you decided to require that trusted servers use an IMAPI

 

 

Valid Input:

password, enter the IMAPI password you administered in

 

 

AUDIX.

 

 

0- to 8-alphanumeric

 

 

Some AUDIX functions do not require passwords.

 

 

characters

 

 

 

 

 

 

 

 

 

If a password is required, then the one you enter here must

 

 

 

 

 

match that password exactly.

 

 

 

 

If a password is not required, you can delete any existing

 

 

 

 

 

password as follows:

 

 

 

 

1. Open the Set Up Enhanced-List System Data window.

 

 

 

 

2. Enter some characters into the IMAPI Password: field.

 

 

 

 

3. Press Backspace until all the characters you entered have

 

 

 

 

 

been deleted.

 

 

 

 

4. Press (F3) SAVE to save your changes.

 

 

 

 

 

 

Administrative Trusted-Server

Enter the Administrative trusted server name that you

 

 

Name:

administered in AUDIX.

 

 

Valid Input:

This name should be listed on the Installation Information

 

 

1- to 10-alphanumeric

worksheet. This field is case-sensitive, so capital letters must be

 

 

typed as capitals, and lowercase letters as lowercase.

 

 

characters

 

 

 

 

 

 

 

 

This name cannot start with a number and cannot contain any

 

 

 

embedded spaces, for example, denver 1 is not allowed, but

 

 

 

denver_1 is allowed.

 

 

 

 

 

NOTE:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The ELA trusted server must be added in AUDIX before

 

 

 

 

 

you can complete this procedure.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Continued on next page

 

Issue 1 July 1997 35

Image 45
Contents Intuity Messaging Solutions Trademarks Contents Preventative Maintenance and Troubleshooting INIndex Iv Issue 1 July About This Book PurposeIntended Audiences Trademarks and Service Marks Page Related Resources How to Comment on This BookOverview Enhanced-List ApplicationAudience What You Should KnowWhat ELA Can Do for You Enhanced-List ApplicationELA Administration Planning with Professional ServicesBasic Concepts ELA Message Delivery Things to ConsiderHardware/Software Requirements LAN ImpactRemote Message Impact Port Usage Impact SecurityExternal Security Internal Security Shadow Mailbox Imapi Session RequirementsInstalling the Software InstallationSoftware Install Menu Wait Time Window Rebooting the SystemMake sure that there is no diskette in the diskette drive Administering Audix for ELA Activating ELA Verifying that ELA is EnabledIncreasing the Number of Mailing Lists Allowed on the System Ch cos COSnumber Defining an ELA Class of ServiceFax? If you have purchased fax Enter the following information Example of Communities Administered for use with ELA Setting Up ELA and Shadow Mailbox Community IDsELA Community ID Before You BeginSending Restrictions Screen Shadow Mailbox Community ID Administering TCP/IP Administering Audix for ELA Denver1 Setting Up Imapi Sessions for Trusted Server Access Setting Up Imapi Sessions for Trusted Server Access Security Alert Defining Two ELA Trusted ServersDrmid10 For the administrative ELA trusted server elaadmin, enter 0 Page Administering Audix for ELA Issue 1 July Defining the Audix server Administering Access Administering ELA for AUDIX4Set Up Enhanced-List System Data Window On next Administering ELA for Audix Mailbox Attributes Guidelines for Naming Enhanced ListsCreating Enhanced Lists Administer Enhanced-Lists Window On next Adding Members to Enhanced Lists Guidelines for Selecting Enhanced-List MembersEnhanced List Membership for Listname Window Adding/Deleting Members to an Enhanced List Enhanced-List Membership for Listname listextension Window Finding a Member Adding a MemberDeleting an Enhanced List Deleting a MemberPrinting an Enhanced List Confirm Deletion of Enhanced-List Window Recording Names for Enhanced Lists Testing Intuity Enhanced ListsPage Administering ELA for Audix Issue 1 July Checking the Administrator’s Log Preventative Maintenance TroubleshootingDelivery Failure Log Window Checking the Delivery Failure LogOccurred, such as Full Mailbox, Unsupported Media, or Delivery Failure Codes Reason of Failure Description Delivery Failure CodesTroubleshooting ELA Messaging Solutions Release 4 Alarm Log Messages Lucent Intuity Messaging Solutions Digital Preventative Maintenance and Troubleshooting Issue 1 July Alarms Alarm Code Event ID ELA-delivts01Delivts Resource Type Alarm Code Event ID ELA-delivts02 Alarm Code Event ID ELA-delivts03Alarm Code Event ID ELA-delivts04 Alarm Code Event ID ELA-registry01 Alarm Code Event ID ELA-registry02Registry Resource Type Alarm Code Event ID ELA-shadow01 Alarm Code Event ID ELA-shadow02Shadow Resource Type Alarm Code Event ID ELA-shadow03 Alarm Code Event ID ELA-shadow04Alarm Code Event ID ELA-shadow05 Alarm Code Event ID ELA-shadow06 Event ID ELA-badreca01 through ELA-badreca12 EL Enhanced-List ApplicationEvent ID ELA-lostlock01 through ELA-lostlock10 Event ID ELA-nomembersEvent ID ELA-nestvioltn Event ID ELA-loopvioltn Event ID ELA-mboxlock01Event ID ELA-chkrestrct Event ID ELA-delivts05 Event ID ELA-shadow07Index Index