Avaya INTUITY AUDIX LX
Home Getting StartedAdministrationMaintenanceReference

Search This CD

Index

Contact Us

 

 

 

  
Home > Administration > Email (Internet Messaging) > Internet Messaging Concepts and Planning

Internet Messaging Concepts and Planning

NOTE: This feature may not be available with your release of IA 770 INTUITY AUDIX Messaging Application

 

Internet Messaging for the INTUITY AUDIX builds on the multimedia capabilities of INTUITY AUDIX to provide exchange of voice, text, fax, and binary components over the Internet.

Topics include:

Internet Messaging Features

Internet Messaging has the following characteristics:

  • Internet Gateway
  • AUDIX subscribers gain access to an Internet email address and can send or receive messages over the Internet. Internet Messaging uses Extended Simple Mail Transport Protocol (ESMTP), a standard TCP/IP-based mail protocol.

  • Mailbox access through POP3 clients
  • In addition to the telephone user interface (TUI) and INTUITY Message Manager 4.3 and later, subscribers can also select one of the currently available POP3 email client programs to check their messages. For example, Netscape Mail or Microsoft Outlook can be used to receive and respond to messages through the INTUITY AUDIX server.

  • Avaya Voice Player
  • With this player, Internet email users can play and respond to messages received from INTUITY AUDIX senders. If a subscriber has a microphone, the subscriber can create voice messages directly on his or herpersonal computer.

What Internet Messaging Can Do for You

Internet Messaging can:

  • Provide access for INTUITY AUDIX subscribers to any of the email users worldwide through the Internet.
  • Increase the number of choices that subscribers have to access messages, including telephone, INTUITY Message Manager, and industry-standard email platforms.
  • Save costs by allowing message transport through existing, shared Internet facilities.
  • Simplify distribution of the Voice Player through an automatic email response system.

Sending and Receiving Email

Internet Messaging gives INTUITY Message Manager and Post Office Protocol 3 (POP3) client subscribers full Internet email capabilities through the INTUITY AUDIX. Multimedia messages can be sent from the INTUITY AUDIX to any email address. The recipients can access these messages as multipart MIME messages using commercially available email software. Voice components are played with the Avaya Voice Player (AVP), which is distributed without charge and uses the same voice compression algorithm as the INTUITY AUDIX system.

Email Access With Computer Applications

The following access methods are available:

  • Message Manager subscribers can send and receive all four component types to and from Internet email users, as with any other INTUITY AUDIX destination. These component types include voice, fax, text, and file attachments.
  • POP3 client subscribers can use their browser to access their INTUITY AUDIX mailboxes. The AVP plays and records voice components, with the appropriate computer hardware configuration. Graphics programs display fax files. Text and attached files are handled as with any other email.
  • Non-INTUITY AUDIX users access messages by using the same message-rendering tools as POP3 client subscribers, except that the messages are delivered through their own Internet service provider.
Email Access Through the Telephone

With Internet Messaging for INTUITY AUDIX, subscribers can use the telephone to manage messages received at their AUDIX mailbox. The message-waiting indicator (MWI, such as the indicator lamp or a stutter dial tone) is activated to alert a subscriber to the arrival of new messages.

The message can contain up to three media types, specifically voice, text, and file attachments. (If a fax is contained in the message, the system notifies the subscriber that the fax component is unaccessible.) From the telephone, subscribers can:

  • Receive an email message that can contain up to three media type components.
  • Listen to a voiced rendering of the text component (if the INTUITY AUDIX Text-to-Speech feature is activated).
  • Reply to an email message, whether it came from an INTUITY AUDIX subscriber or an Internet email address.

A message is treated as a single entity when accessed through a telephone. When subscribers play a message that contains a voice, a text message, and a file attachment component, they hear the following:

  • The voice component
  • The spoken translation of the text component (if enabled)
  • A voiced summary about the attached file
Optional Email Features

Text-to-Speech (TTS) conversion is an optional feature that enables subscribers to listen to a voiced rendering of email and INTUITY Message Manager text messages received in their AUDIX mailboxes.

Message components are rendered as follows:

  • The subject line of an email message is read as part of the message header.
  • The body of the text message is voiced.
  • If a file attachment is included in the email message, that component is not voiced. The subscriber hears summary information with regard to the size of the file.

Planning

Before you install Internet Messaging, there are several things that you need to consider:

Email Message Size

Email messaging can have a significant impact on the size set for a subscriber's mailbox. An email message can be a short memo or can include attachments of software files of considerable size. If subscribers send fax and voice messages, planning is more difficult.

AUDIX converts all message components into seconds of space in the mailbox. A mailbox can have up to 1800 seconds of recorded voice messages, which is approximately 2.4 MB. Attached files through Internet Messaging could fill up a mailbox very quickly.

 

LAN Impact

Use the following table to estimate how much of the LAN traffic on the system will be comprised of email messages (including email with attached components).
 
Table: LAN Impact of Email Messaging
Component Size
Voice 60 seconds = 132 1-KB packets
Email 5 KB = 5.5 1-KB packets
Attachments, including email attachments
Approximately 150 KB (file size varies by type of file and contents)

Subscriber Planning

Prepare subscribers by taking the following steps:

  • Inform users about their INTUITY AUDIX email capabilities. See Notifying Subscribers of Email Capability and Setup for more information.
  • Allow INTUITY Message Manager subscribers to add email addresses to their personal address books or their INTUITY AUDIX lists to simplify addressing.
  • Determine whether to allow INTUITY AUDIX subscribers to access messages in their INTUITY AUDIX mailbox with a POP3 email program. The INTUITY AUDIX system can send messages similar to any mail gateway, but allowing this access presents certain security risks. See Security Issues for more information.
  • When questions arise, or during the initial training about INTUITY AUDIX email, describe the following differences to subscribers:
    • When a message is sent from an AUDIX subscriber to recipients in both AUDIX and the Internet, the AUDIX recipients are not listed on the Internet recipient's email To: list. Therefore, the email recipients do not know which AUDIX subscribers also received the message and cannot use the email application's Reply All function to send a reply to the AUDIX recipients of the original message.
    • INTUITY AUDIX messages expire within a time period determined by the subscriber or COS mailbox settings. Subscribers need to understand this difference because email accounts do not usually have this limitation.
    • Users can set their email application (such as Outlook or Exchange) to forward mail automatically to another email address or to their INTUITY AUDIX email address. INTUITY AUDIX does not allow mail to be automatically forwarded to another email address.

Security Issues


Toll fraud is the theft of long distance service. When toll fraud occurs, your company is responsible for charges. See Overview of Security for information on how to prevent toll fraud or call the Avaya National Customer Care Center at 1-800-643-2353.

The use of Internet Messaging and the Internet presents certain security issues. Your company is responsible for any damages that could arise as a result of the use of Internet Messaging. However, you can administer your system to minimize these risks. You need to be concerned with:

Disabling POP3 Access

On the General Options and Settings page, if the POP3 enabled? field is set to Yes, hackers could determine a subscriber's login name and password and then commit toll fraud through the subscriber's mailbox. Use Internet Messaging only behind a corporate firewall and restrict external Internet access to the POP3 port.

If your company is concerned with subscriber login security, consider the following alternatives:

  • Disable the POP3 interface by selecting No on the General Options and Settings page.
  • Exclusively use POP3 clients such as Qualcomm's Eudora client that support the APOP (encrypted password) login mechanism.
  • Deploy secure socket layer (SSL) for POP3 by using an external SSL accelerator. Current products on the market include SSL100 Accelerator by Avaya.
Viruses

The ease with which messages can be broadcast and transmitted over the Internet simplifies the distribution of computer viruses. Enact a policy to ensure that subscribers check incoming messages and files for viruses.

Another precaution, especially important if this is your company's first email deployment, is a systemwide virus scanning application. The applications scan all incoming mail for viruses and intercept infected mail and files before they reach the subscriber. Current examples include:

  • Interscan Virus Wall by Trend Micro
  • Webshield products by McAfee
  • Antivirus for Gateways by Norton
  • eSafe Gateway by Aladdin
Spoofing or Sending Email Under a False Name

Internet email addresses are not validated for identity. As a result, the identity of the message sender is not guaranteed. Warn your subscribers not to respond to messages from unverified sources, especially if the message contains requests for private information or for any form of payment. You can check the name of the machine that delivered a message to the Internet Messaging server by reading the message's header information.

Top of page

  Search This CD     Index     Contact Us
� 2002 Avaya Inc. All rights reserved.