Port Usage Impact
Voice port usage increases as recipients retrieve messages sent by ELA. Plan for the increase with Professional Services when you purchase ELA. Refer to the worksheets that were compiled at the time of the purchase to determine the port usage impact.
You should monitor your system to determine if your Grade of Service (GOS) falls below acceptable levels. If that happens frequently, particularly during the peak busy hour, contact your Lucent account representative to purchase more ports, if necessary. For more information about GOS and monitoring your system, see your INTUITY Messaging Solutions Release 4 Administration book.
NOTE:
If, in its application, ELA degrades service, you might suggest that those users with access to enhanced lists schedule delivery of ELA messages for
Security
Securing a system that allows access from another domain involves a
For an
External Security
A new option — the trusted server — has been introduced in this release. The ELA application runs as a trusted server, making requests of the AUDIX server, via IMAPI, to distribute messages to designated recipients. The trusted server is empowered to do anything to an ELA mailbox that an AUDIX user can do.
To prevent unauthorized access to AUDIX from an external source such as a trusted server, system administrators have two levels of security at their disposal:
■Trusted server password
■IMAPI password
The trusted server password is administered on both the AUDIX server and on the trusted server. The trusted server must use this password when it connects to
AUDIX.
6Issue 1 July 1997