
Contents
■Increasing the Number of Mailing
Lists Allowed on the System | 15 |
■ Defining an ELA Class of Service | 16 |
■Setting Up ELA and Shadow Mailbox
Community IDs | 19 |
Things to Consider | 19 |
Before You Begin | 20 |
ELA Community ID | 20 |
Shadow Mailbox Community ID | 22 |
■ Administering TCP/IP | 23 |
Before You Begin | 23 |
■ Setting Up IMAPI Sessions for |
|
Trusted Server Access | 26 |
■ Defining Two ELA Trusted Servers | 28 |
Before You Begin | 28 |
4Administering ELA for AUDIX
■ Overview | 33 |
■Defining the AUDIX server and
| Administering Access | 33 |
| Before You Begin | 33 |
■ Guidelines for Naming Enhanced Lists | 37 | |
■ | Creating Enhanced Lists | 38 |
| Guidelines for Selecting | 41 |
| Adding Members to Enhanced Lists | 41 |
| Adding/Deleting Members to an Enhanced List | 43 |
■ Deleting an Enhanced List | 46 | |
■ Recording Names for Enhanced Lists | 48 | |
■ | Testing INTUITY Enhanced Lists | 48 |
5Preventative Maintenance and Troubleshooting
■ Overview | 51 |
iiIssue 1 July 1997