Avaya 2 manual Documentation disclaimer

Page 2

© 2005 - 2006 Avaya Inc. All Rights Reserved.

Notice

While reasonable efforts were made to ensure that the information in this document was complete and accurate at the time of printing, Avaya Inc. can assume no liability for any errors. Changes and corrections to the information in this document might be incorporated in future releases.

Documentation disclaimer

Avaya Inc. is not responsible for any modifications, additions, or deletions to the original published version of this documentation unless such modifications, additions, or deletions were performed by Avaya. Customer and/or End User agree to indemnify and hold harmless Avaya, Avaya's agents, servants and employees against all claims, lawsuits, demands and judgments arising out of, or in connection with, subsequent modifications, additions or deletions to this documentation to the extent made by the Customer or End User.

Link disclaimer

Avaya Inc. is not responsible for the contents or reliability of any linked Web sites referenced elsewhere within this documentation, and Avaya does not necessarily endorse the products, services, or information described or offered within them. We cannot guarantee that these links will work all the time and we have no control over the availability of the linked pages.

Warranty

Avaya Inc. provides a limited warranty on this product. Refer to your sales agreement to establish the terms of the limited warranty. In addition, Avaya's standard warranty language, as well as information regarding support for this product, while under warranty, is available through the Avaya Support Web site:

http://www.avaya.com/support

License

USE OR INSTALLATION OF THE PRODUCT INDICATES THE END USER'S ACCEPTANCE OF THE TERMS SET FORTH HEREIN AND THE GENERAL LICENSE TERMS AVAILABLE ON THE AVAYA WEB SITE http://support.avaya.com/LicenseInfo/ ("GENERAL LICENSE TERMS"). IF YOU DO NOT WISH TO BE BOUND BY THESE TERMS, YOU MUST RETURN THE PRODUCT(S) TO THE POINT OF PURCHASE WITHIN TEN (10) DAYS OF DELIVERY FOR A REFUND OR CREDIT.

Avaya grants End User a license within the scope of the license types described below. The applicable number of licenses and units of capacity for which the license is granted will be one (1), unless a different number of licenses or units of capacity is specified in the Documentation or other materials available to End User. "Designated Processor" means a single stand-alone computing device. "Server" means a Designated Processor that hosts a software application to be accessed by multiple users. "Software" means the computer programs in object code, originally licensed by Avaya and ultimately utilized by End User, whether as stand-alone Products or pre-installed on Hardware. "Hardware" means the standard hardware Products, originally sold by Avaya and ultimately utilized by End User.

License type(s)

Concurrent User License (CU). End User may install and use the Software on multiple Designated Processors or one or more Servers, so long as only the licensed number of Units are accessing and using the Software at any given time. A "Unit" means the unit on which Avaya, at its sole discretion, bases the pricing of its licenses and can be, without limitation, an agent, port or user, an e-mail or voice mail account in the name of a person or corporate function (e.g., webmaster or helpdesk), or a directory entry in the administrative database utilized by the Product that permits one user to interface with the Software. Units may be linked to a specific, identified Server.

Shrinkwrap License (SR). With respect to Software that contains elements provided by third party suppliers, End User may install and use the Software in accordance with the terms and conditions of the applicable license agreements, such as "shrinkwrap" or "clickwrap" license accompanying or applicable to the Software ("Shrinkwrap License"). The text of the Shrinkwrap License will be available from Avaya upon End User's request (see "Third-party Components" for more information).

Copyright

Except where expressly stated otherwise, the Product is protected by copyright and other laws respecting proprietary rights. Unauthorized reproduction, transfer, and or use can be a criminal, as well as a civil, offense under the applicable law.

Third-party components

Certain software programs or portions thereof included in the Product may contain software distributed under third party agreements ("Third Party Components"), which may contain terms that expand or limit rights to use certain portions of the Product ("Third Party Terms"). Information identifying Third Party Components and the Third Party Terms that apply to them is available on the Avaya Support Web site:

http://support.avaya.com/ThirdPartyLicense/

Preventing toll fraud

"Toll fraud" is the unauthorized use of your telecommunications system by an unauthorized party (for example, a person who is not a corporate employee, agent, subcontractor, or is not working on your company's behalf). Be aware that there can be a risk of toll fraud associated with your system and that, if toll fraud occurs, it can result in substantial additional charges for your telecommunications services.

Avaya fraud intervention

If you suspect that you are being victimized by toll fraud and you need technical assistance or support, call Technical Service Center Toll Fraud Intervention Hotline at +1-800-643-2353 for the United States and Canada. For additional support telephone numbers, see the Avaya Support Web site:

http://www.avaya.com/support

Providing Telecommunications Security

Telecommunications security (of voice, data, and/or video communications) is the prevention of any type of intrusion to (that is, either unauthorized or malicious access to or use of) your company's telecommunications equipment by some party.

Your company's "telecommunications equipment" includes both this Avaya product and any other voice/data/video equipment that can be accessed by this Avaya product (that is, "networked equipment").

An "outside party" is anyone who is not a corporate employee, agent, subcontractor, or is not working on your company's behalf. Whereas, a "malicious party" is anyone (including someone who might be otherwise authorized) who accesses your telecommunications equipment with either malicious or mischievous intent.

Such intrusions might be either to/through synchronous (time-multiplexed and/or circuit-based), or asynchronous (character-, message-, or packet-based) equipment, or interfaces for reasons of:

Utilization (of capabilities special to the accessed equipment)

Theft (such as, of intellectual property, financial assets, or toll facility access)

Eavesdropping (privacy invasions to humans)

Mischief (troubling, but apparently innocuous, tampering)

Harm (such as harmful tampering, data loss or alteration, regardless of motive or intent)

Issue 1.0 April 2006 2

Image 2
Contents Issue 1.0 April 2006 Avaya Interactive ResponseDocumentation disclaimer Troubleshooting overview TCP/IP FacilitiesPage Contents Avaya IR R2.0 Troubleshooting Public switched telephone network PstnContents Requirements for successful operationsConnections and communications SwitchesVoice response applications System and LAN capacity Possible malfunctions and errorsIncorrect system administration Hardware malfunctions and failuresCircuit-based configurations Application errorsConnection and communication problems Packet-based configurationsSpeech Identifying possible causes of problemsProblems Effects Actions LAN Troubleshooting procedure Reviewing the Display Equipment screen Using IR system eventsGathering information on a problem Checking system history Using Sun diagnostic testsMonitoring live operations State MeaningTroubleshooting based on observations Using commandsVoice system not answering Investigating operations problemsCall-handling problems ― Enter display card all and press EnterAll calls dropped Calls droppedCalls dropped at initial prompt Calls not transferred properly VoipcallforceclearedNo Dtmf tones Wink protocol Poor audio quality on VoIP calls Fax problemsTypical fax problems Touchtone not interpreted correctlyLocating fax errors Interpreting negative fax valuesHost sessions recover repeatedly Reviewing fax repair proceduresHost interaction problems Fax text or file not foundNo response for application with host interface Speech and TTS problemsSpeech delayed or cut off Calls to host droppedAll ports Broken on speech server Cannot configure speech recognitionSpeech resource bad or non-configured Speech recognition rejecting many responses Speech response delayedSpeech server not running Speech recognition not working Speech not playingChecking the server connection Mrcp problemsChecking for errors Mrcp connections and protocolsMrcp configuration file Parameter Description Default SettingExample TrueMrcp servers are frequently out of service Erratic availability of Mrcp speech resourcesASR Server Name Base Servers Port NumbText-to-Speech output is not heard Automatic Speech Recognition failsR2.0 Returning TTS resource state to Inserv Text-to-Speech problemsSelect Administrative Tools Select Component Services Execute Unix command failed System process problemsUnix commands failing or disk errors On the Tree tab, select Services LocalChecking Oracle object size limits Database problemsChecking Jdbc operations Checking LAN communications Checking communicationsWord about the Tomcat server log Localhostlog.2004-05-07.txtTroubleshooting speech server disconnections Typical causes of LAN problemsResources for LAN troubleshooting Troubleshooting database server disconnections Troubleshooting intermittent LAN problems Troubleshooting persistent server problemsTracing LAN activities Pinging server connectionsMonitoring Ethernet packets Specify the IP time to live for multicast packetsDetecting incorrect IP addresses arp Displaying network statistics netstatDisplaying packet route traceroute Checking cable connections Resolving a problem when the monitor does not displayChecking hardware Sun Blade 150 cable connectionsContents Label Function and troubleshooting considerations Label Function and Troubleshooting Considerations Sun Fire 280R cable connectionsTesting platform hardware FC-ALChecking card and channel states Checking NMS card configurationCommands Functions Restoring Manoos cards and channels Restoring Netoos cards and channels Restoring Foos cards and channelsRestoring Broken NMS and VoIP cards Inspecting the IR system platformChecking card administration Removing and restoring cards Displaying data on VoIP cards Gathering data on card operationsDisplaying data on NMS cards Checking for hard disk drive failures Performing root cause failure analysisReplacing a failed hard disk drive Running the metastat command Removing a failed hard disk drive Spare Okay C1t1d0s1Enter mirroradmin detach Activating disk mirroring for a new hard disk driveRestoring the system if both hard disk drives fail Disabling disk mirroringContents Issue 1.0 April 2006 Page Index Index
Related manuals
Manual 51 pages 39.31 Kb

2 specifications

Avaya 2 is an advanced communications solution renowned for its robust features and adaptability, catering to businesses of all sizes. It is part of Avaya's strategic focus on delivering unified communications and contact center solutions that emphasize efficiency, collaboration, and customer satisfaction.

One of the main features of Avaya 2 is its seamless integration with a variety of communication tools. This includes voice, video, messaging, and conferencing capabilities that empower organizations to connect with employees and customers effortlessly. The system supports both on-premises and cloud deployment, allowing businesses to choose an infrastructure that aligns with their operational strategy.

Avaya 2 leverages cutting-edge technologies such as artificial intelligence and machine learning to enhance user experience. These technologies streamline processes by automating routine tasks and providing insights through data analytics. For instance, AI-driven chatbots can handle customer inquiries, freeing human agents to focus on more complex tasks, ultimately improving response times and customer satisfaction.

Another characteristic of Avaya 2 is its customizable user interface. The platform allows users to personalize their workspace, making it easier to access the features they use most frequently. This level of customization fosters better productivity, as employees can tailor the system to suit their specific workflows.

Security is a top priority for Avaya 2. The solution incorporates advanced security measures including encryption, authentication protocols, and compliance with industry standards to protect sensitive data. This is especially crucial for organizations handling proprietary information or customer data, as it mitigates the risk of breaches and builds trust with clients.

Moreover, Avaya 2 enhances collaboration through features such as team messaging and video conferencing, facilitating real-time communication among teams, which is essential in today’s hybrid work environment. Organizations can create dedicated channels for projects, ensuring everyone is aligned and informed.

Overall, Avaya 2 stands out in the crowded field of communication solutions due to its unique blend of features, state-of-the-art technology, and emphasis on security and customization. It serves as a reliable platform for businesses looking to enhance communication efficiency, improve collaboration, and elevate customer satisfaction in an increasingly digital world.