![]() |
![]() |
![]() |
Enhanced List Administration (ELA)
Overview of Enhanced List Application (ELA)
This section describes the Enhanced List Application (ELA) on an Intuity AUDIX Release�5 system.
Read this section if you are the AUDIX system administrator responsible for the configuration and maintenance of an Intuity AUDIX Release 5 system.
The procedures in this section assume you know basic Intuity AUDIX commands and navigation. If you are not familiar with these system basics, review the Getting Started section before you continue. See features, planning, and security for more information about those aspects of ELA software.
Administering Intuity AUDIX for ELA
To define the ELA server and functionality to Intuity AUDIX:
- Contact Professional Services (or your account representative, if you did not contract with Professional Services) to have ELA activated.
- Verify that ELA is enabled for your system.
- Increase the number of mailing lists AUDIX allows on the system.
- Define an ELA Class of Service.
- Set up ELA and shadow mailbox Community IDs.
- Administer TCP/IP on the AUDIX server, if not already administered.
- Set up IMAPI sessions for ELA server access to AUDIX.
- Define two ELA trusted servers to the AUDIX server and administer access (including the surrounding security requirements).
Note: Depending on what services your business purchased from Professional Services during the planning phase for ELA, some of the following procedures may already be done.
Activating ELA
ELA installation occurs as part of the Intuity AUDIX Release 5.0 installation or upgrade. After the ELA installation is complete, contact Professional Services (or your account representative, if you did not contract with Professional Services). The technician from the remote support center will access your system remotely and activate the ELA feature.
When the remote support center has activated the ELA feature, continue with Verifying That ELA Is Enabled.
Verifying That ELA Is Enabled
- Log in to the Intuity AUDIX system using sa.
The system displays the Avaya Intuity Main Menu.
- If Enhanced-List Manager does not display on the main menu, select:
Feature OptionsThe system displays the Feature Options Window.
- Ensure that the
Enhanced-List Application
field is set to ON:
- If the field is OFF, and you purchased/installed ELA, call the support center to request that the feature be enabled for your Intuity AUDIX system.
- Press F6 (Cancel) to exit the window.
Increasing the Number of Mailing Lists Allowed on the System
The following task contains instructions for the fields that relate directly to ELA. See Defining Basic Features and Parameters for a complete description of the fields in the System-Parameters Limits screen.
To administer AUDIX system limits to support ELA:
- Start at the Avaya Intuity Main Menu and select:
AUDIX AdministrationThe system displays the AUDIX Command Prompt Screen.
- At the
enter command:
prompt, enter change system-parameters limitsThe system displays the System-Parameters Limits screen.
- Tab to the
Lists, Total Entries:
field and enter 200000- Check the
Lists/Subscriber
field. The default value is 100.
- If the default value has not changed, skip this step.
- If this setting has changed, enter a value of 15 or greater.
- Check the
Recipients/Lists
field. The default value is 250.
- If the default value has not changed, skip this step.
- If this setting has changed to less than the default, enter a value of 250
- Press F3 (Enter) to save the information in the system database.
The cursor returns to the command line, and the system displays the following message:
Command Successfully Completed
.- Enter exit or another administrative command at the
enter command:
prompt.Defining an ELA Class of Service
The following task contains instructions for the fields that directly relate to ELA. The other fields should be administered to support other capabilities that you anticipate using. See Changing Class of Service Options in the Subscriber Administration section for a thorough description of the Class of Service feature.
Before you perform the following tasks, ensure that you have an unused Class of Service that you can define for ELA. We recommend that you use a COS that is between 2 and 11, because customers often use COS 1 as their default Class of Service.
Note: The ELA COS can only be used for ELA mailboxes, not for any other type of mailbox or subscriber.
- Start at the Avaya Intuity Main Menu and select:
AUDIX AdministrationThe system displays the AUDIX Command Prompt Screen.
- At the
enter command:
prompt, enter change cos COS_number, where COS_number is the unique Class of Service you would like to use for ELA. For example, enter change cos 10The system displays the Class of Service Screen, Page 1.
- Although not required, we recommend that you change the name of the COS to be more descriptive, for example, enter ELA in the
Name:
field.- Write down the COS number. You will need it later when you administer the ELA server.
- If you would like ELA to be able to distribute call answer messages, enter call-answer in the
Type:
field (underPERMISSIONS
:). Otherwise, enter none.- Enter y in following fields (under
PERMISSIONS
):- Press F7 (NextPage). The system displays the Subscriber Class of Service Parameters Screen, Page 2.
- Enter the following information:
- 14 in the
Retention Times (days), New:
field. (This setting acts as a safety measure, should ELA encounter an operational problem, and cannot send messages for a couple of days.)- 14 in the
Retention Times (days), Old:
field. (Ordinarily, there are no old or unopened messages. ELA will forward old/unopened messages in the event service is interrupted.)- 14 in the
Retention Times (days), Unopened:
field. (Ordinarily, there are no old or unopened messages. ELA will forward old/unopened messages in the event service is interrupted.)- nudaf in the
Outgoing Mailbox, Category Order:
field- 0 in the
Retention Times (days), File Cab:
field- 1 in the
Delivered/Nondeliverable:
field- 6 in the
Maximum Mailing Lists:
field- 1500 in the
Total Entries in all Lists:
field- 32767 in the
Mailbox Size, Maximum Length:
field
Note: Administer the other fields to be consistent with the messaging needs of your business.
- Press F3 (Enter) to save the information in the system database.
The cursor returns to the command line, and the system displays the following message:
Command Successfully Completed
.- Enter exit or another administrative command at the
enter command:
prompt.Setting Up ELA and Shadow Mailbox Community IDs
The following task contains instructions that directly relate to ELA. The other fields should be administered to support other capabilities that you anticipate using. See Setting Up Community Sending Restrictions in the Basic Messaging Administration section for a thorough description of Community Sending Restrictions.
Things to Consider
ELA mailing lists are a powerful messaging tool that all subscribers in your AUDIX network can access. However, should your business needs indicate differently, you can control who can use the enhanced lists by administering community sending restrictions. The following figure illustrates a typical application of sending restrictions for ELA and this application of sending restrictions is used as a basis for the following discussion.
Figure� 1. Example of Communities Administered for use with ELA
Let's say you set up the enhanced-list mailbox community to be Community 10. Community 10 is given permission to send to all other communities (except the shadow mailbox community). Then, you set up a special subscriber community, Community 9, and administer Community 9 to send to all communities (except the shadow mailbox community). Only subscribers you would like to have access to the enhanced lists are placed into Community 9. All other subscribers would not be able to send a message to the ELA mailbox.
Additionally, you must set up a shadow mailbox community ID, for example Community 11. The shadow mailbox community ID is administered such that messages can be sent to any community, but messages cannot be received from any other community. You do this so replies from pre-Release 4 Intuity AUDIX machines or from DEFINITY AUDIX and AUDIX Release 1 machines do not go to the shadow mailbox.
Also, you will have to administer the rest of your subscriber population to belong to a community restricted from sending messages to the enhanced-list mailbox community, for example, the default Community 1.
Note: If your AUDIX system is networked with other Avaya Intuity systems, all enhanced-list mailbox community sending restrictions must be consistently applied throughout the system, that is, the same Community ID numbers administered with the same restrictions. In particular, the shadow mailbox community must not be accessible by any other community on any machine in the network.
See Setting Up Community Sending Restrictions for a thorough description of Community Sending Restrictions.Before You Begin
Before you begin the following procedure, use the display system-parameters sending restrictions command in AUDIX administration and ensure that you have at least two Communities that you can use for ELA (4 communities are needed if you are going to implement a special community for selected subscribers with access to ELA mailboxes.)
ELA Community ID
To set up sending an ELA Community ID:
- Start at the Avaya Intuity Main Menu and select:
AUDIX AdministrationThe system displays the AUDIX Command Prompt Screen.
- At the
enter command:
prompt, enter change system-parameters sending-restrictionsThe system displays the Sending Restrictions Screen.
- Enter y in the
Activate Restrictions?
field.- Leave all fields blank (horizontally) that correspond to the (sender) Community ID that you've assigned to ELA, and leave all fields blank (vertically) that correspond to the (recipient) Community ID you've assigned for subscribers who will have access to the enhanced lists. (If all subscribers are to have access to enhanced lists, the recipient community will be the default subscriber community usually community 1.)
Following the example discussed in Things to Consider, Sender Community 9 would be blank (horizontally from left to right) and Recipient Community 10 would be blank (vertically from top to bottom).
- If all subscribers are to have access to enhanced lists, skip this step.
Enter an r in the field that corresponds to the intersection between the (recipient) ELA Community ID and the (sender) community to which the rest of the subscriber population belongs. This prevents those who do not have access to enhanced lists from sending a message to an enhanced list.
Following the example discussed in Things to Consider, there would be an r in the field corresponding to the intersection between Sender Community 1 (the default subscriber community) and Recipient Community 10 (the Enhanced List Mailbox Community).
Shadow Mailbox Community ID
- Enter an r in all (recipient community) fields in the column that corresponds to the Community ID that you've assigned to the shadow mailbox. This prevents messages from being sent into the shadow mailbox.
Following the example discussed in Things to Consider, Recipient Community 11 would contain r's (vertically from top to bottom).
- Press F3 (Enter) to save the information in the system database.
The cursor returns to the command line, and the system displays the following message:
Command Successfully Completed
.- Continue with the next procedure or enter exit at the
enter command:
prompt.
Note: You must now use the Change Subscriber or Change COS screen to assign your subscribers to either the community that does not have access to enhanced lists, or to the special community that does have access. If you used your default subscriber community (Community 1) as the community that does not have access, then you only have to administer those selected individuals who will belong to the new special community with access to enhanced lists.
See Setting Up Community Sending Restrictions for a thorough description of Community Sending Restrictions.Administering TCP/IP
If your system is already connected to the LAN, you can skip this procedure. However, you need to know the IP Address to administer the trusted server, so even if your system is already networked perform Step 1 of this procedure and write down your system's IP address.
TCP/IP is a set of protocols that links computers across a wide variety of networks. TCP/IP must be administered for the ELA trusted server to communicate with AUDIX.
- Network IP address
- Host Identifier (AUDIX server name)
- Subnet mask
- Gateway Identifier (ID) to administer TCP/IP
Your PC/LAN system administrator should have this information.
To administer TCP/IP networking:
- Start at the Avaya Intuity Main Menu and select:
TCP/IP Administration
Network AddressingThe system displays the Network Addressing Window.
Note: Write this IP address down, as you will need it when you administer the ELA trusted server later in this section.
- If the Network Addressing Window is blank, administer TCP/IP for your system.
- Continue with the next procedure.
Setting Up IMAPI Sessions for Trusted Server Access
Whenever a trusted server accesses an AUDIX mailbox, it uses an IMAPI session. IMAPI is the software that allows access to Intuity AUDIX mailboxes. Depending on what Intuity model you purchased, there can be up to 96 active sessions simultaneously, some of which you need to set for trusted server use.
Note: IMAPI sessions cannot be reserved for use by ELA. The following procedure administers the maximum number of IMAPI sessions you will allow trusted servers to use simultaneously, but does not guarantee that an IMAPI session will be available. You should monitor ELA trusted server activity to see if trusted server requests for IMAPI sessions are frequently being denied because all sessions are in use (see Overview of Reports). If so, you may need to purchase more IMAPI sessions.
To set IMAPI sessions for trusted server use:
- Start at the Avaya Intuity Main Menu and select:
AUDIX AdministrationThe system displays the AUDIX Command Prompt Screen.
- At the
enter command:
prompt, enter change system-parameters imapi-optionsThe system displays the System-Parameters IMAPI-Options Screen, Page 1.
Note: The following instructions are for the fields that directly relate to ELA. See Email (Internet Messaging) to understand trusted server implications for Internet Messaging.
- In the
Maximum Simultaneous Sessions:
field enter 2 more than the current value. (For example, if the field currently reads 30, enter 32.)This number includes sessions for subscribers who are logged into their mailboxes using Message Manager or Internet Messaging, if applicable, and cannot exceed the value in the
Total Sessions Purchased
field.- In the
Simultaneous Sessions Available for Trusted Server Access:
field enter 2 more than the current value. (For example, if the field currently reads 2, enter 4.)
Platform Maximum Value MAP/5P and MAP/40P 4 MAP/100P 6- Enter 5 in the
IMAPI Session Timeout:
field.- Enter 5 in the
Trusted Server Session Timeout:
field.- Enter y in the
Message Transfer?
field.- Press F3 (Enter) to save this information to the system database.
The cursor returns to the command line, and the system displays the following message:
Command Successfully Completed
.- Continue with the next procedure or enter exit at the
enter command:
prompt.Defining Two ELA Trusted Servers
The ELA software runs as two separate trusted servers. For the ELA servers to communicate with the Intuity AUDIX server, they must be defined to the Intuity AUDIX system. The installation worksheets you received from your account representative will have the exact names for the ELA trusted servers. However, for the purposes of this document, the first ELA trusted server will be referred to as the administrative server and the second ELA trusted server as the delivery server.
A request from ELA to send a message to an AUDIX mailbox involves invoking an IMAPI session and locking the ELA mailbox. A server that uses IMAPI to access an AUDIX mailbox is known as a trusted server.
The procedures in this section include setting a password the trusted server must use to access AUDIX. There is a secondary layer of security (in addition to a trusted server password) that you can administer. This additional layer of security involves setting a separate IMAPI password that the trusted server must use before the system will allow an IMAPI session to be invoked.
While administration of this additional password is optional, it is strongly recommended. See Setting an IMAPI Password.
Before You Begin
Before adding the ELA trusted server to the system, you will need the following information:
- Two unique 1- to 10-printable character server names for the ELA trusted servers. These server names must be unique, not only from each other, but from all other machines in the network (including fax call delivery machines). Use the li ma and li tr commands to view all machines currently in your network.
- The TCP/IP address for the AUDIX server (see step 1 of Administering TCP/IP).
Adding the Trusted Servers
You will perform this procedure twice, first for the ELA administrative server, and then for the ELA delivery server.
To add the ELA trusted servers to the Intuity AUDIX server:
- Start at the Avaya Intuity Main Menu and select:
AUDIX AdministrationThe system displays the AUDIX Command Prompt Screen.
- At the
enter command:
prompt, enter add trusted-server
The system displays the Trusted-Server Profile Screen.
Tip: To see a list of existing trusted servers enter li tr at the command line.
- In the
Trusted-Server Name:
field, enter a name for the first ELA trusted server. (See the Note below for tips on trusted server names.)This name must be a unique 1- to 10-printable character entry. Additionally, this name cannot start with a number and cannot contain any embedded spaces, for example, denver 1 is not allowed, but denver_1 is allowed. (Use the li tr and li ma commands to view existing names and ensure that you are not using a name that is already assigned.)
- Enter a 5- to 10-alphanumeric password that the trusted server must use to log on to the AUDIX server. As you type, your keystrokes display, but will appear as a series of asterisks (*) after you save.
- Enter the TCP/IP address of this Avaya Intuity in the form w.x.y.z, where each letter is a number, 0 to 255. (See Administering TCP/IP for information on how to determine your system's IP address.)
- Enter Enhanced-List Application in the
Service Name:
field. Type exactly as listed, including the hyphen and capitalization.Every ELA server will have the same service name. For example, if you have two ELA servers, they will have separate trusted server names, but the same service name.
- Enter n in the
Cross-Domain Delivery?
field.- For the administrative ELA trusted server (ela_admin), enter 0 in the
Minutes of Inactivity Before Alarm:
field.For the delivery ELA trusted server (ela_deliv), enter 255 in the
Minutes of Inactivity Before Alarm:
field.- Press F3 (Enter) to save the information in the system database.
The cursor returns to the command line, and the system displays the message:
Command Successfully Completed
.- You must now add the delivery ELA server. Return to Step 2, and repeat this procedure, ensuring that you use a unique name for the delivery trusted server, that is, do not use the name of the ELA trusted server you just added.
- Do you want to administer an IMAPI password?
- If yes, follow the procedures in Setting an IMAPI Password.
- If no, go to Administering ELA for AUDIX to Administer ELA, or enter exit at the
enter command:
prompt.Setting an IMAPI Password
The IMAPI password is an additional layer of security for use with trusted servers. The password is optional until it is administered for one trusted server. It is then required each time any trusted server requests a session with the Intuity AUDIX. Since trusted servers are used by many Intuity AUDIX features, this password might already be established.
- Start at the Avaya Intuity Main Menu and select:
AUDIX AdministrationThe system displays the AUDIX Command Prompt Screen.
- At the
enter command:
prompt, enter change imapi-password
The system displays the Change IMAPI-Password Screen.
- Complete the
Current Password:
andNew Password:
fields.- Press F3 (Enter) to save the change.
- Enter exit or another administrative command at the
enter command:
prompt.Administering ELA for AUDIX
Now that the AUDIX system knows about the ELA trusted servers, you can do the initial administration of the ELA system. To make ELA fully functional, you must:
- Define the AUDIX server to ELA, administer access, and select shadow mailbox extension.
- Create enhanced lists.
- Add members to enhanced lists.
- Record a name for each enhanced list (optional).
- Test your enhanced list setup.
Defining the AUDIX Server and Administering Access
To allow communication between ELA and AUDIX, you must perform some initial ELA administration.
To administer the ELA server, you need to know the:
- The sa or vm password
- IMAPI password, Optional. See Setting an IMAPI Password.
- ELA administrative trusted server name and password. See Defining Two ELA Trusted Servers.
- ELA delivery trusted server name and password. See Defining Two ELA Trusted Servers.
- A currently unused extension to use as the shadow mailbox
- Enhanced-list mailbox and shadow mailbox Community IDs. See ELA Community ID
- ELA Class of Service. See Defining an ELA Class of Service
- Start at the Avaya Intuity Main Menu and select:
Enhanced-List Manager
Set Up Enhanced-List System DataThe system displays the Set Up Enhanced-List System Data Window.
- Complete the fields in this window using the information in the table for Field Definitions: Set Up Enhanced-List System Data.
- Press F3 (Save) to save the ELA server information to the system database.
The system displays the message "
Successfully Updated!
" and asks you to press F1 to acknowledge the message.- Press F1 (Acknowlg Message).
The system displays the Enhanced List Manager menu.
- Continue with the next procedure or press F6 (Cancel) repeatedly to return to the Avaya Intuity Main Menu.
Guidelines for Naming Enhanced Lists
We recommend that you use the following guidelines when you name an enhanced list. These guidelines can help prevent subscribers from inadvertently sending their messages to the enhanced list, instead of to a person.
- Do not use embedded spaces in the name. If you would like a list to be called Marketing Department, type it Marketing_Department_LIst
- Avoid naming an enhanced list after a person. Intuity Message Manager does not differentiate between an enhanced list and a person's name.
- Give enhanced lists names that reflect an organization or a function. Include the word list. Names of this style can be located and addressed with the Voice Director name addressing feature.
- If you want all enhanced lists to be grouped together, put the word list first.
- Begin the name with the number 1. Subscribers can reach the enhanced-list mailbox through Numbers Addressing as well as Names Addressing. Since there are no letters associated with keypad
, subscribers will be less likely to inadvertently select the wrong address. Names of this style cannot be located and addressed with the Voice Director name addressing feature.
Creating Enhanced Lists
To create an enhanced list and add members:
- Start at the Avaya Intuity Main Menu and select:
Enhanced-List Manager
Administer Enhanced-ListsThe system displays the Administer Enhanced-Lists Window.
- Press F4 (New E-List).
The system displays the New Enhanced-List Window.
- Complete the fields in this window using the information in the table for Field Definitions: New Enhanced List Window.
- Press F3 (Save) to save this information in the system database.
The cursor displays in the Administer Enhanced Lists window on the line that shows the list you just entered. (If you have more than one list, the new list is placed in line alphabetically with the other lists).
Guidelines for Selecting Enhanced-List Members
The following can be members of an enhanced list:
- Local and remote subscribers. These members can be other enhanced lists.
- Call delivery numbers, including fax machines
- Fax extended dialing destinations
- Email subscribers who are serviced by other trusted servers, including Internet Messaging for Intuity AUDIX
- AMIS pre-administered subscribers
- Other ELA lists
The following cannot be members of an enhanced list:
Adding Members to Enhanced Lists
To add member names, extensions, and network (email) addresses to a new enhanced list, perform the following tasks. Start on the Administer Enhanced Lists window.
- Press F5 (Open E-List).
The system displays the Enhanced-List Membership for Listname Window.
- Press F4 (Add Member).
The system displays the Add Member Window.
- Enter one of the following:
- The subscriber's name as it appears in the AUDIX system. This name can be another enhanced list.
- The subscriber's extension. This extension can be the extension for another enhanced list.
- The subscriber's network (email) address in the format dictated by the email system, for example, username@internet
- The destination address. A Fax Extended Dialing address would be entered as trunk access code, long distance access or area code, telephone number, @ sign, and fax server name. For example: 912127771234@fedfax where fedfax is the fax server name.
- Press F3 (Save) to save this information in the system database.
Note: The
Entries:
field at the top of the Administer Enhanced-Lists window increments each time you add a new member to the list.- Repeat Step 3 and Step 4 to continue adding member names, extensions, and email addresses.
- Review the Administer Enhanced-Lists window. If you want to change or delete any information you just entered:
- When you have finished adding member names to this enhanced list, press F6 (Cancel) repeatedly to return to the main menu.
Adding/Deleting Members to an Enhanced List
To change data for a member of an enhanced list, such as the name or telephone extension, make the change in AUDIX as described in Changing Subscriber Data. The change is automatically reflected in all enhanced lists that contain that member.
To add or delete the members of an existing enhanced list:
- Start at the Avaya Intuity Main Menu and select:
Enhanced-List Manager
Administer Enhanced-ListsThe system displays the Administer Enhanced-Lists Window. The names of your enhanced lists display in the window (along with other descriptive data).
- Using the arrow keys, select the list you would like to add members to. If the list is not on the visible page, select the list by one of the following means:
- Press NEXTPAGE until the desired list displays. Use the arrow keys to highlight the list you would like to edit.
- Press F8 (Actions). An Actions menu displays. Select
Find List
and press ENTER. Enter the name or extension of the list you would like to add or change and press F3 (Find). The Administer Enhanced-Lists window will re-display with the specified list highlighted.- Press F5 (Open E-List).
The system displays the Enhanced-List Membership for Listname (listextension) Window. The member names of the selected list display in the window. Accompanying each name is an extension number or network (email) address and other descriptive data.
Adding a Member
- Press F4 (Add Member).
The system displays the Add Member Window.
- Enter one of the following:
- The subscriber's name as it appears in the AUDIX system
- The subscriber's extension
- The subscriber's network (email) address in the format dictated by the email system, for example, username@trusted-servername
- Press F3 (Save) to save this information in the system database.
Note: If the extension you added is an ELA enhanced list, the system puts yes in the
E-list?
field.- Continue entering names/extensions/email addresses until all new members have been added.
- Press F6 (Cancel) to return to the Administer Enhanced List window or proceed to Step 7 to print a copy of the list.
Finding a Member
Deleting a Member
- To delete a member:
- Locate the member name to be deleted. See Finding a Member.
- Press F7 (Delete Member).
The system displays the confirmation message:
Name= List - Listname
Extension/Address= Listextension
Enter y to continue, n to abort.- Enter y
The Enhanced-List Membership window redisplays.
- Continue with Step 7 to print a copy of the list.
Printing an Enhanced List
- Press F8 (Actions). An
Actions
menu displays.
- Select
Print List Membership
and press ENTER.The system displays the message "
Printing List Membership for Listname (listextension)
" and sends the list to the system printer.- Press F1 (Acknowlg Message).
The system redisplays the Actions menu.
- Proceed to Step 8.
- When you have finished, press F6 (Cancel) repeatedly to return to the main menu.
Deleting an Enhanced List
To delete an existing enhanced list:
- Start at the Avaya Intuity Main Menu and select:
Enhanced-List Manager
Administer Enhanced-ListsThe system displays the Administer Enhanced-Lists Window.
- Use the arrow keys to highlight the line that represents the list you want to delete. If the list to be deleted does not appear on the visible page, select the list by one of the following means.
- Press NEXTPAGE until the desired list displays. Use the arrow keys to highlight the list you would like to delete.
- Select F8 (Actions). An
Actions
menu displays. SelectFind List
and press ENTER. Then enter the name or telephone extension of the list you would like to delete and press F3 (Find). The Administer Enhanced-Lists window will re-display with the specified list highlighted.- Press F7 (Delete E-List).
The system displays the Confirm Deletion of Enhanced-List Window.
- Do you want to delete the associated AUDIX mailbox?
- If yes, go to Step 5.
- If no, enter n. To create a new enhanced list, see Creating Enhanced Lists.
- Press F3 (Delete) to delete the enhanced list.
AUDIX deletes the mailbox and all information in it, including any enhanced-list members or messages.
The system displays the message "
Deleted Listname (listextension) Enhanced List
" and asks you to press F1 acknowledge the message.- Press F1 (Acknowlg Message).
The system redisplays the Administer Enhanced-Lists window.
- Press F6 (Cancel) repeatedly to return to the Avaya Intuity Main Menu.
Recording Names for Enhanced Lists
Once you have established an enhanced list, it is a good idea to record a name for the list. That way, subscribers will hear a meaningful name for the list when they use the telephone user interface to address a message to an enhanced-list mailbox for distribution. However, you need to record the name using an administrative recording session.
To record a name for an enhanced list:
- From a touch-tone telephone, log in as an administrator.
- Press 9.
The system prompts with "To record names, press 4."
Note: If you get an error message, open the Class of Service screen for the administrator's extension and change the
Announcement Control?
field to y. Then start again.- Press 4.
The system prompts with "Please enter the extension and pound sign."
- Enter the extension for the enhanced-list mailbox.
The system prompts with "When finished recording, press pound to approve or 1 to edit your message. Record at the tone."
- After the tone, speak the name of the list.
- Press #.
- Repeat Step 4 through Step 6 to record additional names.
- Press *r to return to the main menu.
Testing Enhanced Lists
- Perform the administration outlined below, including:
- Administering Intuity AUDIX for ELA
- Activating ELA
- Increasing the Number of Mailing Lists Allowed on the System
- Defining an ELA Class of Service
- Setting Up ELA and Shadow Mailbox Community IDs
- Administering TCP/IP
- Setting Up IMAPI Sessions for Trusted Server Access
- Defining Two ELA Trusted Servers (You must have two available, unused extensions, one for the shadow mailbox and one for the enhanced-list mailbox)
- Defining the AUDIX Server and Administering Access
- Guidelines for Naming Enhanced Lists
See your installation information if you need help with the following procedures:
- Set up two test subscribers and two test telephones.
- Create a test list with subscribers test-1 and test-2 as members.
- Use the test-1 telephone to create and send a voice mail message to the ELA mailbox. Record the following or a similar test message and then enter the address for the enhanced-list mailbox:
"This is a test ELA message for Intuity AUDIX."
- Hang up the test-1 telephone to disconnect.
- Verify that the MWIs for the test subscribers' telephones activate and that the test subscribers received the message.
- Delete the test messages.
- Delete the test subscribers. (Optional)
- Delete the test list. (Optional)
Preventive Maintenance and Troubleshooting
This section describes how to check for system alarms relating to ELA and how to diagnose common application and end-user problems.
Checking the Administrator's Log
The system warns you of potential administrative problems with ELA by displaying a minor and warning message (
Alarms: w
orAlarms: m
) on the AUDIX Administration status line when it logs an administration event. Check the status line (at the top of the AUDIX Administration screen) at least once a day.Other events besides those generated by ELA create administrative log entries, but you can view ELA-specific events. You should do this on a regular basis to monitor ELA performance. To view ELA-specific log entries:
- Start at the Avaya Intuity Main Menu and select:
AUDIX AdministrationThe system displays the AUDIX Command Prompt Screen.
- At the
enter command:
prompt, enter display administrators-logThe system displays the Administrator's Log screen.
- Enter the starting date and time.
- Enter EL in the
Application:
field.- Press F3 (Save) to display the alarm entries.
- Examine the displayed entries. See Alarms and Events for a list of events and alarms, and associated repair procedures.
- Take whatever corrective action is necessary.
- Enter exit or another administrative command at the
enter command:
prompt.Checking the Delivery Failure Log
The delivery failure log contains entries for all failed deliveries, along with descriptive data regarding cause for the failure and other information. Check this log to monitor ELA and system performance and if a subscriber complains that messages are not being delivered.
To view the delivery failure log:
- Start at the Avaya Intuity Main Menu and select:
Enhanced-List Manager
View E-List Delivery Failure LogThe system displays the Enhanced-List Delivery Failure Log Window. See the table for Field Definitions: Enhanced-List Delivery Failure Log .
- Press F8 (Print) to send a copy of this report to the system printer, if you have a printer available.
- Press F6 (Cancel) repeatedly to return to the Avaya Intuity Main Menu.
Delivery Failure Codes
Delivery failure logs contain the following codes:
Troubleshooting ELA
The Enhanced List Troubleshooting table lists potential problems and suggested remedies to commonly encountered system problems.
Table: Enhanced List Troubleshooting Problem Cause Solutions During an upgrade failure, installer/administrator cannot differentiate between AUDIX mailboxes and ELA mailboxes. Use the li cos command from AUDIX Administration to determine the ELA Class(es) of Service. Use the li su command and note the extension(s) of all mailboxes with the applicable COS. Subscribers complain that they cannot reply to messages received from an enhanced list. Message was sent to an enhanced list that did not permit "Reply to Sender." Community IDs for the subscriber or recipient incorrectly administered Administer Community IDs for subscriber or recipient, if appropriate. Recipient is not on a Avaya Intuity system or is on a pre-R4 system. Upgrade system to Avaya Intuity R4.1 or higher. Subscribers complain of getting multiple copies of the same message. Recipient is on more than one list. You inadvertently deleted the shadow mailbox. ELA raises a warning alarm. Any messages waiting in the delivery "queue" are lost.Re-enter the shadow extension on the Set Up Enhanced-List System Data Window and then press F3 (Save). Recipient claims she or he did not get an ELA message. Check the mailing list for the recipient's name. Administer, if necessary.
- Check the Activity Log to verify that the subscriber did not receive the message.
- Check the Subscriber screen for the affected subscriber. Look at the Mailbox size. Put subscriber in a COS with a larger mailbox, if necessary.
- Check the List Measurements Subscriber Day screen for the affected subscriber. Look at the available mailbox space. Advise the subscriber to delete unneeded messages and greetings, if appropriate.
- Check that Community ID is correct.
System delivery failures can arise from many sources.
- Check the Delivery Failure Log (see Checking the Delivery Failure Log).
- Check the Administrator's Log for related alarms. If an alarm warrants further action, see Alarms and Log Messages.
- Verify network capabilities with your PC/LAN administrator.
Recipient claims she or he did not get an ELA message. (continued) Administer Community IDs for all Avaya Intuity machines, if appropriate. The name of an enhanced-list member keeps disappearing from enhanced lists. System feature to delete non- administered remote subscribers is active. Subscribers complain that they cannot send a message to an enhanced-list mailbox. Subscriber belongs to a community with sending restrictions administered. Consider whether to change this subscriber's community ID to allow her/him to use enhanced lists. Recipient asks why she or he received the message from the enhanced list much later than other recipients. Subscriber mailbox full Check the List Measurements Subscriber Day screen for the affected subscriber. Look at the available mailbox space. Advise the subscriber to delete unneeded messages and greetings, if appropriate or consider putting the subscriber in a COS with a larger mailbox. Enhanced list was very large. Remember that ELA `throttles' traffic during periods of heavy user traffic. Inform subscriber that it message delivery to a large recipient population does take time. Networking problems between originator system and recipient system. Perform networking troubleshooting. See Diagnostics and Troubleshooting for more information. You inadvertently delete an enhanced list. There are two ways to restore an enhanced list:
- Reenter the names on the list.
- Restore the data from the previous night's tape backup.
There is no way to selectively restore only enhanced lists from the back-up tape. Your system will lose all incremental administration data from the point of backup. Use this method only if you are sure the business can tolerate the loss of recent administration.
![]() http://www.avaya.com Avaya UCS Information Development |
![]() |
![]() |
![]() |