INTUITY™ Messaging Solutions Enhanced-List Application Release 1.
Copyright 1997, Lucent Technologies All Rights Reserved Printed in U.S.A. Notice Every effort was made to ensure that the information in this book was complete and accurate at the time of printing. However, information is subject to change. Your Responsibility for Your System’s Security Toll fraud is the unauthorized use of your telecommunications system by an unauthorized party, for example, persons other than your company’s employees, agents, subcontractors, or persons working on your company’s behalf.
Contents About This Book 1 ■ Purpose v ■ Intended Audiences v ■ Trademarks and Service Marks vi ■ Related Resources viii ■ How to Comment on This Book viii Enhanced-List Application ■ 2 3 Overview 1 Audience 1 What You Should Know 1 ■ Enhanced-List Application 2 ■ What ELA Can Do for You 2 ■ ELA Administration 3 Basic Concepts 3 Planning with Professional Services 3 Things to Consider 4 Installation ■ Overview 9 ■ Installing the Software 9 ■ Rebooting the Sys
Contents Increasing the Number of Mailing Lists Allowed on the System 15 ■ Defining an ELA Class of Service 16 ■ Setting Up ELA and Shadow Mailbox Community IDs 19 ■ ■ ■ ■ Things to Consider 19 Before You Begin 20 ELA Community ID 20 Shadow Mailbox Community ID 22 Administering TCP/IP 23 Before You Begin 23 Setting Up IMAPI Sessions for Trusted Server Access 26 Defining Two ELA Trusted Servers 28 Before You Begin 4 Administering ELA for AUDIX ■ Overview 33 ■ Defining the A
Contents 6 IN ■ Checking the Administrator’s Log 51 ■ Checking the Delivery Failure Log 52 ■ Delivery Failure Codes 54 ■ Troubleshooting ELA 55 Alarms ■ Overview 59 ■ DELIVTS Resource Type 59 ■ REGISTRY Resource Type 61 ■ SHADOW Resource Type 62 ■ EL — Enhanced-List Application 65 Index Issue 1 July 1997 iii
Contents iv Issue 1 July 1997
About This Book Purpose This book contains instructions for installing and administrating the Enhanced-List Application (ELA) on an INTUITY™ AUDIX® R4 system. Intended Audiences This book is intended primarily for the on-site technical personnel who are responsible for installing and configuring the system and performing initial administration and acceptance testing.
About This Book Trademarks and Service Marks The following trademarked products are mentioned in books in the Lucent INTUITY document set: ■ AT™ is a trademark of Hayes Microcomputer Products, Inc. ■ AUDIX® is a registered trademark of Lucent Technologies™. ■ ■ ■ COMSPHERE® is a registered trademark of Lucent Technologies™ Paradyne Corp. CONVERSANT® Voice Information System is a registered trademark of Lucent Technologies™. ■ DEFINITY® is a registered trademark of Lucent Technologies™.
Trademarks and Service Marks ■ Novell® is a registered trademark of Novell, Inc. ■ Paradyne® is a registered trademark of Lucent Technologies™. ■ Phillips® is a registered trademark of Phillips Screw Company. ■ Rolm® is a registered trademark of International Business Machines. ■ SL-1™ is a trademark of Northern Telecom Limited. ■ softFAX® is a registered trademark of VOXEM, Inc. ■ SUPERSET™ is a trademark of Mitel Corporation. ■ SX-100™ is a trademark of Mitel Corporation.
About This Book Related Resources If you need help with basic administrative procedures, see the INTUITY™ Messaging Solutions Release 4 Administration book, 585-310-564. How to Comment on This Book We are always interested in your suggestions for improving this book. Please complete and return the reader comment card that is located behind the title page.
Enhanced-List Application 1 Overview This chapter describes the Enhanced-List Application (ELA) on an INTUITY™ AUDIX® Release 4 system. Audience Read this book if you are the AUDIX system administrator responsible for the configuration and maintenance of an INTUITY AUDIX Release 4 system.
Enhanced-List Application Enhanced-List Application The Enhanced-List Application (ELA) greatly expands your business’ capability to deliver messages to large numbers of recipients. A single enhanced list can contain 1500 addresses and you – the system administrator – can create up to 100 such lists. Enhanced lists can be nested (or embedded) in each other, that is, a list (containing 1500 addresses) can be a member contained in another list.
ELA Administration ■ Forward messages to support staff automatically. If you often forward incoming messages, you can create an enhanced-list mailbox that automatically forwards messages to your staff. Your staff can review the messages and then respond to them as they normally would. ELA Administration Only the system administrator (sa) login can administer enhanced lists. Basic Concepts To understand ELA, you first need to understand some concepts and terminology, such as trusted servers and domains.
Enhanced-List Application This administration can be divided as follows: AUDIX Administration: ■ Contact Professional Services (or your account representative, if you did not contract with Professional Services) to have ELA installed. ■ Contact Professional Services (or your account representative, if you did not contract with Professional Services) to have ELA activated. ■ Verify that ELA is enabled for your system. ■ Increase the number of mailing lists AUDIX allows on the system.
ELA Administration Hardware/Software Requirements ELA runs on the same machine as AUDIX. ■ ELA must be installed on a Lucent INTUITY R4.2-4 or higher machine. If your site has an earlier release, contact your Lucent service representative to obtain the necessary upgrade. ELA is not available for pre-R4 Lucent INTUITY systems. ■ MAP/40s machines require 64k of RAM.
Enhanced-List Application Port Usage Impact Voice port usage increases as recipients retrieve messages sent by ELA. Plan for the increase with Professional Services when you purchase ELA. Refer to the worksheets that were compiled at the time of the purchase to determine the port usage impact. You should monitor your system to determine if your Grade of Service (GOS) falls below acceptable levels.
ELA Administration The IMAPI password is an optional, secondary level of security used to prevent an unauthorized source external to AUDIX from starting an IMAPI session. We strongly recommend that you take advantage of this extra protection. If you choose to administer an IMAPI password, we recommend that you change it on a regular basis, for example, monthly. (If you have set your administrator’s password to age automatically, the system prompts you to change your password.
Enhanced-List Application cannot be infected with viruses embedded in these software files, client machines may become infected when a user launches the application associated with the software file. ! CAUTION: ELA does not perform any virus detection. Your company should evaluate the security risks of file attachments carefully and make provisions for virus detection software on PCs running Message Manager or an e-mail application supported by INTUITY AUDIX R4.
Installation 2 Overview This chapter describes how to install ELA on a Lucent INTUITY R4.2 or higher system. Installing the Software The ELA package is provided on a tape labeled Enhanced-List Application. To install ELA on a Lucent INTUITY R4.2 or higher system: 1. Log in to the Lucent INTUITY system using craft or tsc. 2.
Installation Figure 2-1. Software Install Menu 3. Insert the tape labeled Enhanced-List Application into the tape drive. 4. Select: > Tape drive The system displays the message: Insert a tape into the Tape Drive. Type [go] when ready or [q] to quit: (default: go) 5. Press ENTER to go ahead with the install. The system displays the message: Installation in progress. Do not remove the tape.
Rebooting the System 6. Press ENTER to select all. The system installs the software and displays several status messages. When the software installation is complete, the system displays the message: Installation of Enhanced List Application Package was successful. Insert a tape into the Tape Drive. Type [go] when ready or [q] to quit: (default: go) 7. Remove the tape from the tape drive and re-insert the back-up tape. 8. Enter q 9. Press (F6) CANCEL repeatedly to return to the main menu. 10.
Installation 3. Press (F3) SAVE . The system stops the voice system and displays the a series of status messages. When the voice system has stopped, the system displays the message: The Voice System has stopped. Press Enter to Continue. 4. Press ENTER 5. Press (F6) . CANCEL . The system displays the System Control window. 6. Select >Shutdown System The system displays the Wait Time window (Figure 2-2). 7. Enter 0 (zero) to indicate you would like an immediate shutdown. 8. Press (F3) SAVE .
Administering AUDIX for ELA 3 Overview To define the ELA server and functionality to AUDIX: ■ Contact Professional Services (or your account representative, if you did not contract with Professional Services) to have ELA installed. ■ Contact Professional Services (or your account representative, if you did not contract with Professional Services) to have ELA activated. ■ Verify that ELA is enabled for your system. ■ Increase the number of mailing lists AUDIX allows on the system.
Administering AUDIX for ELA Activating ELA After the ELA installation is complete, contact your Professional Services (or your account representative, if you did not contract with Professional Services). The technician from the remote support center will access your system remotely and activate the ELA feature. When the remote support center has activated the ELA feature, continue with the next procedure.
Increasing the Number of Mailing Lists Allowed on the System 3. Ensure the following fields are set to ON: ■ Enhanced List Application ■ TCP/IP Administration 4. If either of these fields is OFF, and you purchased/installed ELA, call the support center to request that the features be enabled for your Lucent INTUITY platform. 5. Press (F6) CANCEL to exit this window.
Administering AUDIX for ELA 6. Press (F3) ENTER to save the information in the system database. The cursor returns to the command line, and the system displays the message Command Successfully Completed. 7. Continue with the next procedure or enter exit to leave AUDIX Administration. Defining an ELA Class of Service The following task contains instructions for the fields that directly relate to ELA.
Defining an ELA Class of Service Figure 3-2. Class of Service Screen, Page 1; Defining a Class of Service for ELA 3. Although not required, we recommend that you change the name of the COS to be more descriptive, for example, enter ELA in the Name: field. NOTE: You should write down the COS number. You will need it later when you administer the ELA server. 4. If you would like ELA to be able to distribute call answer messages, enter call-answer in the Type: field (under PERMISSIONS:).
Administering AUDIX for ELA 1 Figure 3-3. Subscriber Class of Service Parameters Screen, Page 2; Enabling ELA on a COS Basis 7. Enter the following information: ■ 14 in the Retention Times (days), New: field. (This setting acts as a safety measure, should ELA encounter an operational problem, and cannot send messages for a couple of days.) ■ 14 in the Retention Times (days), Old: field. (Ordinarily, there are no old or unopened messages.
Setting Up ELA and Shadow Mailbox Community IDs 8. Press (F3) ENTER to save the information in the system database. The cursor returns to the command line, and the system displays the message Command Successfully Completed. 9. Continue with the next procedure or enter exit to leave AUDIX Administration. Setting Up ELA and Shadow Mailbox Community IDs The following task contains instructions that directly relate to ELA.
Administering AUDIX for ELA Let’s say you set up the enhanced-list mailbox community to be Community 10. Community 10 is given permission to send to all other communities (except the shadow mailbox community). Then, you set up a special user community, Community 9, and administer Community 9 to send to all communities (except the shadow mailbox community). Only users you would like to have access to the enhanced lists are placed into Community 9.
Setting Up ELA and Shadow Mailbox Community IDs 2. At the enter command: prompt, enter either: Full Command Version Short Command Version change system-parameters sending-restrictions ch sy s The system displays the Sending Restrictions screen (Figure 3-5).
Administering AUDIX for ELA access to enhanced lists from sending a message to an Enhanced List. Following the example discussed under "Things to Consider" on page 3-19, there would be an r in the field corresponding to the intersection between Sender Community 1 (the default user community) and Recipient Community 10 (the Enhanced List Mailbox Community). Shadow Mailbox Community ID 6.
Administering TCP/IP Administering TCP/IP If your system is already connected to the LAN, you can skip this procedure. However, you need to know the IP Address to administer the trusted server, so — even if your system is already networked — perform step 1 of this procedure and write down your system’s IP address. TCP/IP is a set of protocols that links computers across a wide variety of networks. TCP/IP must be administered for the ELA trusted server to communicate with AUDIX.
Administering AUDIX for ELA Figure 3-6. TCP/IP Administration Window; Administering TCP/IP for Enhanced-List Application (ELA) 2. Enter the AUDIX server name in the UNIX Machine Name: field. This name should be listed on the Installation Information worksheet, or you can obtain this name from your PC/LAN administrator. This is a case-sensitive field, so capital letters must be typed as capitals, and lowercase letters as lowercase.
Administering TCP/IP 5. Enter the default gateway IP address in the Default Gateway IP Address: field. The default gateway IP address is the address of the gateway router that serves to connect to addresses on other LANs. This field is left blank if the Lucent INTUITY system will only be communicating with other machines on the same LAN. If your system is not connected to a LAN, enter the number you made up for step 3. 6. Press (F8) CHG-KEYS and then (F2) BRD CNFG .
Administering AUDIX for ELA NOTE: The changes to your system will not take effect until you reboot your system. See your INTUITY Messaging Solutions Release 4 Administration book for instructions. Setting Up IMAPI Sessions for Trusted Server Access Whenever a trusted server accesses an AUDIX mailbox, it uses an IMAPI session. IMAPI is the software that allows access to INTUITY AUDIX mailboxes.
Setting Up IMAPI Sessions for Trusted Server Access n n Figure 3-8. System-Parameters IMAPI-Options Screen, Page 1; Setting IMAPI Sessions for Trusted Server Access NOTE: The following contain instructions for the fields that directly relate to ELA. See your INTUITY Messaging Solutions Release 4 Administration book. for complete field descriptions and to understand their implications. 3. In the Maximum Simultaneous Sessions: field enter 2 more than the current value.
Administering AUDIX for ELA 8. Press (F3) ENTER to save this information to the system database. The cursor returns to the command line, and the system displays the message Command Successfully Completed. 9. Continue with the next procedure or enter exit to leave AUDIX Administration. Defining Two ELA Trusted Servers The ELA software runs as two separate trusted servers. For the ELA servers to communicate with the INTUITY AUDIX server, they must be defined to the INTUITY AUDIX system.
Defining Two ELA Trusted Servers ■ The TCP/IP address for the AUDIX server (see page 3-23). You will perform this procedure twice, first for the ELA administrative server, and then for the ELA delivery server. To add the ELA trusted servers to the INTUITY AUDIX server: 1. Starting from the main menu (Figure 3-1 on page 3-14), select: > AUDIX Administration 2.
Administering AUDIX for ELA 3. In the Trusted-Server Name: field, enter a name for the first ELA trusted server. (See the Note below for tips on trusted server names.) This name must be a unique 1- to 10-printable character entry. Additionally, this name cannot start with a number and cannot contain any embedded spaces, for example, denver 1 is not allowed, but denver_1 is allowed. (Use the li tr and li ma commands to view existing names and ensure that you are not using a name that is already assigned.
Defining Two ELA Trusted Servers 11. Do you want to administer an IMAPI password? ■ If yes, follow the procedures for setting the IMAPI password in your INTUITYMessaging Solutions Release 4 Administration book before proceeding to the next section. ■ If no, go to Chapter 4 to Administer ELA, or enter exit to leave AUDIX Administration.
Administering AUDIX for ELA 32 Issue 1 July 1997
Administering ELA for AUDIX 4 Overview Now that the AUDIX system knows about the ELA trusted servers, you can do the initial administration of the ELA system.
Administering ELA for AUDIX ■ Enhanced-list mailbox and shadow mailbox Community IDs (see page 3-20) ■ ELA Class of Service (see page 3-16) To administer the ELA server: 1. Starting from the main menu (Figure 3-1 on page 3-14), select: > Enhanced-List Manager > Set Up Enhanced-List System Data The Set Up Enhanced-List System Data window displays (Figure 4-1). Figure 4-1. Set Up Enhanced-List System Data Window 2. Complete the fields in this window using the information in Table 4-1.
Defining the AUDIX server and Administering Access Table 4-1. Field Definitions: Set Up Enhanced-List System Data Window Field Name Description/Procedure System Login: Enter sa (system administrator login) or vm (voice mail administrator login). Valid Input: sa, vm NOTE: Administrators using the vm login cannot administer enhanced lists or ELA trusted servers. This field allows ELA to log into AUDIX. System Password: Enter your sa or vm administration password.
Administering ELA for AUDIX Table 4-1. Field Definitions: Set Up Enhanced-List System Data Window — Continued Field Name Description/Procedure Password: Enter the Administrative trusted server password (see page 3-30). Valid Input: 5- to 10-alphanumeric characters Delivery Trusted-Server Name: Valid Input: 1- to 10-alphanumeric characters Enter the name of the delivery trusted server that you administered in AUDIX. (This is the second ELA trusted server you added.
Guidelines for Naming Enhanced Lists Field Definitions: Set Up Enhanced-List System Data Window — Continued Table 4-1. Field Name Description/Procedure DEFAULT ENHANCED-LIST MAILBOX ATTRIBUTES Class of Service: Enter the number of the COS assigned to the enhanced-list mailbox and the shadow mailbox. ELA uses this COS number when you create new enhanced lists.
Administering ELA for AUDIX ■ Give enhanced lists names that reflect an organization or a function. Include the word list. Examples: — Marketing_Dept_List — Maxfield_List — Western_District_Salesforce_List ■ If you want all enhanced lists to be grouped together, put the word list first. Examples: — List_Marketing_Dept — List_Maxfield — List_Western_District_Salesforce ■ Begin the name with the number 1.
Creating Enhanced Lists Figure 4-2. Administer Enhanced-Lists Window 2. Press (F4) NEW E-LIST . The system displays the New Enhanced-List window (Figure 4-3). Figure 4-3. New Enhanced-List Window 3. Complete the fields in this window using the information in Table 4-2.
Administering ELA for AUDIX Table 4-2. Field Definitions: New Enhanced List Window Field Name Description/Procedure List Name: Enter a name for the list. Use the "Guidelines for Naming Enhanced Lists" on page 4-37. Valid Input: 1- to 29-alphanumeric characters Enter the local extension for the list mailbox. This extension must comply with your system dial plan. ELA creates a mailbox at this extension automatically, if one does not already exist.
Creating Enhanced Lists Guidelines for Selecting Enhanced-List Members The following subscribers can be members of an enhanced list: ■ Local and remote subscribers. These members can be other enhanced lists.
Administering ELA for AUDIX Figure 4-4. Enhanced List Membership for Listname Window 2. Press (F4) ADD MEMBER . The system displays the Add Member data entry window (Figure 4-5). Figure 4-5. Add Member Window; Adding Members to an Enhanced List 3. Enter one of the following: 42 ■ The user’s name as it appears in the AUDIX system. This name can be another enhanced list. ■ The user’s extension. This extension can be the extension for another enhanced list.
Creating Enhanced Lists 4. Press (F3) SAVE to save this information in the system database. NOTE: The Entries: field at the top of the Administer Enhanced-Lists window increments each time you add a new member to the list. 5. Repeat Step 3 and Step 4 to continue adding member names, extensions, and e-mail addresses. NOTE: We recommend that you print a copy of the completed list to your system printer, if available.
Administering ELA for AUDIX The system displays the Administer Enhanced-Lists window (Figure 4-2). The names of your enhanced lists display in the window (along with other descriptive data). 2. Using the arrow keys, select the list you would like to add members to. If the list is not on the visible page, select the list by one of the following means: ■ Press NEXTPAGE until the desired list displays. Use the arrow keys to highlight the list you would like to edit. ■ Press (F8) ACTIONS .
Creating Enhanced Lists ■ Delete a member from the list (Step 6) ■ Print the list to your system printer (Step 7) Adding a Member 4. Press (F4) ADD MEMBER . The system displays the Add Member data entry window (Figure 4-5 on page 4-42). a. Enter one of the following: ■ The user’s name as it appears in the AUDIX system ■ The user’s extension ■ The user’s network (e-mail) address in the format dictated by the e-mail system, for example, username@trusted-servername b.
Administering ELA for AUDIX Deleting a Member 6. To delete a member: a. Locate the member name to be deleted. See ‘‘Finding a Member’’ above. b. Press (F7) DELETE MEMBER . The system displays the confirmation message: CONFIRM: Deleting Name= List - Listname Extension/Address= Listextension Enter y to continue, n to abort. c. Enter y The Enhanced-List Membership window redisplays. d. Continue with Step 7 to print a copy of the list. Printing an Enhanced List 7. Press (F8) ACTIONS .
Deleting an Enhanced List 2. Use the arrow keys to highlight the line that represents the list you want to delete. If the list to be deleted does not appear on the visible page, select the list by one of the following means. ■ Press NEXTPAGE until the desired list displays. Use the arrow keys to highlight the list you would like to delete. ■ Select (F8) ACTIONS . An Actions menu displays. Select Find List and press ENTER .
Administering ELA for AUDIX Recording Names for Enhanced Lists Once you have established an enhanced list, is a good idea to record a name for the list. That way, users will hear a meaningful name for the list when they send a message to an enhance- list mailbox for distribution. However, you need to record the name using an administrative recording session. To record a name for an enhanced list: 1. From a touch-tone telephone, log in as an administrator. 2. Press 9 .
Testing INTUITY Enhanced Lists ■ "Defining an ELA Class of Service" on page 3-16 ■ "Setting Up ELA and Shadow Mailbox Community IDs" on page 3-19 ■ "Administering TCP/IP" on page 3-23 ■ "Setting Up IMAPI Sessions for Trusted Server Access" on page 3-26 ■ "Defining Two ELA Trusted Servers" on page 3-28 (You must have two available, unused extensions, one for the shadow mailbox and one for the enhanced-list mailbox) 2.
Administering ELA for AUDIX 50 Issue 1 July 1997
Preventative Maintenance and Troubleshooting 5 Overview This section describes how to check for system alarms relating to ELA and how to diagnose common application and end-user problems. Checking the Administrator’s Log The system warns you of potential administrative problems with ELA by displaying a minor and warning message (Alarms: w or Alarms: m) on the AUDIX Administration status line when it logs an administration event.
Preventative Maintenance and Troubleshooting 5. Press (F3) SAVE to display the alarm entries. 6. Examine the displayed entries. See the Lucent INTUITY™ Messaging Solutions Release 4 Alarm and Log Messages, 585-310-566 for a list of events and alarms, and associated repair procedures. 7. Take whatever corrective action is necessary. 8. Enter exit at the enter command: prompt to exit AUDIX administration.
Checking the Delivery Failure Log Table 5-1. Field Definitions: Enhanced-List Delivery Failure Log Window Field Name Description/Procedure Date The calendar date the delivery failure occurred Time The time that delivery failure occurred Message Originator The address of the user who sent the message to the enhanced list for distribution The address is in the format address@machine where address can be the telephone extension or the network (e-mail) address.
Preventative Maintenance and Troubleshooting Delivery Failure Codes Delivery failure logs contain the following codes: Table 5-2. Delivery Failure Codes Reason of Failure Description Full mailbox The recipient has a full mailbox. Could not locate ELA could not locate the recipient. Transmission probs Transmission difficulties occurred. Permission denied The message contains features ELA can not recognize. Permission is denied.
Troubleshooting ELA Troubleshooting ELA Table 5-3 lists questions users ask the system administrator and suggested remedies to commonly encountered system problems. Table 5-3. User Questions or System Functionality Symptoms Question/Symptom Possible Cause Use the li cos command from AUDIX Administration to determine the ELA Class(es) of Service. Use the li su command and note the extension(s) of all mailboxes with the applicable COS.
Preventative Maintenance and Troubleshooting Table 5-3. User Questions or System Functionality Symptoms — Continued Question/Symptom Recipient claims s/he did not get an ELA message. Possible Cause ■ Mailing list not current ■ Subscriber’s mailbox not administered correctly Answer/Suggested Remedy Check the mailing list for the recipient’s name. Administer, if necessary. ■ ■ ■ ■ System delivery failure System delivery failures can arise from many sources.
Troubleshooting ELA Table 5-3. User Questions or System Functionality Symptoms — Continued Question/Symptom Possible Cause Answer/Suggested Remedy “Everyone else seemed to have received their enhanced-list message. I got mine much later.” User mailbox full Check the List Measurements Subscriber Day screen for the affected user. Look at the available mailbox space. Advise the user to delete unneeded messages and greetings, if appropriate or consider putting the user in a COS with a larger mailbox.
Preventative Maintenance and Troubleshooting 58 Issue 1 July 1997
Alarms 6 Overview The following alarms are associated with the Enhanced-List Application. DELIVTS Resource Type Alarm Code: 1 Event ID: ELA-delivts01 Alarm Level: Description: Warning Trusted-server data lost, re-enter or restore. Repair Action: There are two recovery methods: ■ Access the Set Up Enhanced-List System Data window and re-enter all field information. ■ Restore data from the most recent backup of system data.
Alarms Alarm Code: 2 Event ID: ELA-delivts02 Alarm Level: Description: Warning Trusted-server data partially lost, re-enter or restore. Repair Action: There are two recovery methods: ■ Access the Set Up Enhanced-List System Data window and re-enter all field information. ■ Restore data from the most recent backup of system data. See Chapter 3, “Common System Procedures,” in your maintenance book for instructions about restoring data.
REGISTRY Resource Type 2. Verify/administer the screen information, as required. 3. Repeat for the delivery trusted server. 4. Enter ch imapi and verify/administer as required. 5. When complete, enter the correct information in the Set Up Enhanced-List System Data window. REGISTRY Resource Type Alarm Code: 1 Event ID: ELA-registry01 Alarm Level: Warning Description: E-list registry lost, re-enter or restore. The ELA software has detected that registry database has disappeared. Repair Action: 1.
Alarms SHADOW Resource Type Alarm Code: 1 Event ID: ELA-shadow01 Alarm Level: Description: Warning Shadow mailbox data lost, re-enter or restore. Repair Action: There are two recovery methods: ■ Access the Set Up Enhanced-List System Data window and re-enter the shadow mailbox extension and community ID. If a shadow mailbox exists at the extension entered, the system displays a system prompt to that effect. If a shadow mailbox does not exist at the extension entered, a new mailbox will be created.
SHADOW Resource Type Alarm Code: 3 Event ID: ELA-shadow03 Alarm Level: Description: Warning Shadow mailbox data corrupt, re-enter or restore. Repair Action: There are two recovery methods: ■ Access the Set Up Enhanced-List System Data window and re-enter the shadow mailbox extension and community ID. If a shadow mailbox exists at the extension entered, the system displays a system prompt to that effect. If a shadow mailbox does not exist at the extension entered, a new mailbox will be created.
Alarms Repair Action: Access the Set Up Enhanced-List System Data window and re-enter the shadow mailbox extension and community ID. If a shadow mailbox exists at the extension entered, the system displays a system prompt to that effect. If a shadow mailbox does not exist at the extension entered, a new mailbox will be created. NOTE: If you wish to move the shadow mailbox to a new extension, only use the Set Up Enhanced-List System Data window.
EL — Enhanced-List Application If you regularly get this alarm, the following questions can help you evaluate how your business uses ELA: ■ Do your subscribers use large enhanced lists too frequently? Are they being used for trivial or non-business purposes? ■ Are subscriber mailboxes too small? Should you increase mailbox space or purchase more hours for storage? ■ Is the ELA class-of-service correct? (Check the value in the Mailbox Size (seconds), Maximum: field on the Class of Service screen, Page
Alarms Event ID: ELA-lostlock01 through ELA-lostlock10 Description: Messages to an enhanced list could not be delivered because someone was logged into the shadow mailbox. Repair Procedure: No one should ever be logged into the shadow mailbox. However. if someone is, change the password for the shadow mailbox as follows: 1. In AUDIX Administration enter ch su extension for the enhanced-list mailbox. 2. At the Subscriber screen, enter a new password in the Password: field. 3.
EL — Enhanced-List Application Repair Procedure: Evaluate list membership hierarchy and delete unnecessary nesting so that ELA can handle delivery of the message. See Lucent INTUITY Messaging Solutions Release 4 Administration, 585-310-564 for procedures. Event ID: ELA-loopvioltn Description: There are two enhanced lists that refer to each other. For example, enhanced list 1 contains enhanced list 2 as a member, and enhanced list 2 contains enhanced list 1 as a member.
Alarms 2. Verify that the shadow mailbox belongs to a community that cannot receive messages. NOTE: The sending restrictions must be identical on all machines in the INTUITY AUDIX network. Check the sending restrictions on all machines. See Lucent INTUITY Messaging Solutions Release 4 Administration, 585-310-564 for more detailed procedures. Event ID: ELA-shadow07 Description: Shadow mailbox space gridlock caused no ELA service for longer than number hours.
Index IN E A administering, 34 AUDIX, 3 COS, 16 LAN, 23 TCP/IP, 23 administrator’s log, 51 alarms, 51 ELA-badreca01 through ELA-badreca12, 65 ELA-chkrestrct, 67 ELA-delivts01, 59 ELA-delivts02, 60 ELA-delivts03, 60 ELA-delivts04, 60 ELA-delivts05, 68 ELA-loopvioltn, 67 ELA-lostlock01 through ELA-lostlock10, 66 ELA-mboxlock01, 67 ELA-nestvioltn, 66 ELA-no_members, 66 ELA-registry01, 61 ELA-registry02, 61 ELA-shadow01, 62 ELA-shadow02, 62 ELA-shadow03, 63 ELA-shadow04, 63 ELA-shadow06, 64 ELA-shadow07, 68 A
Index L LAN administration, 5, 23 logs, 51 delivery failure, 52 trusted servers, 28 definition, 3 IMAPI sessions, 26 IP addresses, 23 names, 35 security, 6, 8 V M mailboxes, 6, 7, 17, 28 mailing lists, 19 AUDIX, 2 messaging traffic, 5 P passwords, 6, 28, 36 IMAPI, 35 list mailbox, 40 system , 35 ports, 6 R rebooting the system, 11 S security e-mail, 6 external access, 6 passwords, 6 trusted servers, 6 virus prevention, 6 service degradation, ports and, 6 shadow mailbox, 8, 19, 22, 36 software requirem