Lucent Technologies 585-310-575 manual Port Usage Impact, External Security

Models: 585-310-575

1 80
Download 80 pages 27.59 Kb
Page 16
Image 16

Enhanced-List Application

Port Usage Impact

Voice port usage increases as recipients retrieve messages sent by ELA. Plan for the increase with Professional Services when you purchase ELA. Refer to the worksheets that were compiled at the time of the purchase to determine the port usage impact.

You should monitor your system to determine if your Grade of Service (GOS) falls below acceptable levels. If that happens frequently, particularly during the peak busy hour, contact your Lucent account representative to purchase more ports, if necessary. For more information about GOS and monitoring your system, see your INTUITY Messaging Solutions Release 4 Administration book.

NOTE:

If, in its application, ELA degrades service, you might suggest that those users with access to enhanced lists schedule delivery of ELA messages for off-peak hours, for example, at 10:00 p.m. or 4:00 a.m. That way, delivery of messages will not conflict with other user-generated traffic.

Security

Securing a system that allows access from another domain involves a 2-pronged approach. You must consider security from both an internal and an external perspective. External security involves administration to prevent access from an unauthorized source, such as an e-mail or AMIS-Analog message originator that decides to send “mail bombs” to an Enhanced List. Internal security focuses on preventing, or recovering from, damage if a breach occurs, for example, a virus is transmitted in a message component such as an attached software file.

For an in-depth discussion and definition of such terms as trusted server and domain, see your INTUITY Messaging Solutions Release 4 Administration book.

External Security

A new option — the trusted server — has been introduced in this release. The ELA application runs as a trusted server, making requests of the AUDIX server, via IMAPI, to distribute messages to designated recipients. The trusted server is empowered to do anything to an ELA mailbox that an AUDIX user can do.

To prevent unauthorized access to AUDIX from an external source such as a trusted server, system administrators have two levels of security at their disposal:

Trusted server password

IMAPI password

The trusted server password is administered on both the AUDIX server and on the trusted server. The trusted server must use this password when it connects to

AUDIX.

6Issue 1 July 1997

Page 16
Image 16
Lucent Technologies 585-310-575 manual Port Usage Impact, External Security