Administering AUDIX for ELA

8.Press (F3) ENTER to save this information to the system database.

The cursor returns to the command line, and the system displays the message Command Successfully Completed.

9.Continue with the next procedure or enter exit to leave AUDIX Administration.

Defining Two ELA Trusted Servers

The ELA software runs as two separate trusted servers. For the ELA servers to communicate with the INTUITY AUDIX server, they must be defined to the INTUITY AUDIX system. The installation worksheets you received from your account representative will have the exact names for the ELA trusted servers. However, for the purposes of this document, the first ELA trusted server will be referred to as the administrative server and the second ELA trusted server as the delivery server.

A request from ELA to send a message to an AUDIX mailbox involves invoking an IMAPI session and locking the ELA mailbox. A server that uses IMAPI to access an AUDIX mailbox is known as a trusted server.

! SECURITY ALERT:

The procedures in this section include setting a password the trusted server must use to access AUDIX. There is a secondary layer of security (in addition to a trusted server password) that you can administer. This additional layer of security involves setting a separate IMAPI password that the trusted server must use before the system will allow an IMAPI session to be invoked.

While administration of this additional password is optional, it is strongly recommended. See your INTUITY Messaging Solutions Release 4 Administration book.

Before You Begin

Before adding the ELA trusted server to the system, you will need the following information:

Two unique 1- to 10-printable character server names for the ELA trusted servers. These server names must be unique, not only from each other, but from all other machines in the network (including fax call delivery machines). Use the li ma and li tr commands to view all machines currently in your network.

Additionally, the server names must comply with the guidelines for naming machines your INTUITY Messaging Solutions Release 4 Administration book for complete information on naming conventions).

28Issue 1 July 1997

Page 38
Image 38
Lucent Technologies 585-310-575 manual Defining Two ELA Trusted Servers, Security Alert