Lucent Technologies 585-310-575 Answering Machine User Manual


 
Administering AUDIX for ELA
28 Issue 1 July 1997
8. Press (F3) to save this information to the system database.
The cursor returns to the command line, and the system displays the
message Command Successfully Completed.
9. Continue with the next procedure or enter exit to leave AUDIX
Administration.
Defining Two ELA Trusted Servers
The ELA software runs as two separate trusted servers. For the ELA servers to
communicate with the I
NTUITY AUDIX server, they must be defined to the INTUITY
AUDIX system. The installation worksheets you received from your account
representative will have the exact names for the ELA trusted servers. However,
for the purposes of this document, the first ELA trusted server will be referred to
as the
administrative server
and the second ELA trusted server as the
delivery
server
.
A request from ELA to send a message to an AUDIX mailbox involves invoking an
IMAPI session and locking the ELA mailbox. A server that uses IMAPI to access
an AUDIX mailbox is known as a trusted server.
!
SECURITY ALERT:
The procedures in this section include setting a password the trusted
server must use to access AUDIX. There is a secondary layer of security (in
addition to a trusted server password) that you can administer. This
additional layer of security involves setting a separate IMAPI password that
the trusted server must use before the system will allow an IMAPI session to
be invoked.
While administration of this additional password is optional, it is strongly
recommended.
See your
I
NTUITY
Messaging Solutions Release 4
Administration
book.
Before You Begin
Before adding the ELA trusted server to the system, you will need the following
information:
Two unique 1- to 10-printable character server names for the ELA trusted
servers. These server names must be unique, not only from each other,
but from all other machines in the network (including fax call delivery
machines). Use the li ma and li tr commands to view all machines
currently in your network.
Additionally, the server names must comply with the guidelines for naming
machines your
I
NTUITY
Messaging Solutions Release 4 Administration
book for complete information on naming conventions).
ENTER