TOC Index Search

 

Enhanced List Application

The Enhanced List Application (ELA) greatly expands the capability to deliver messages to large numbers of recipients. A single enhanced list can contain 1500 addresses. The system administrator can create up to 100 such lists.

Topics include:

Features

The Enhanced List Application (ELA) provides the following features:

With ELA you can:

All subscribers administered in Intuity AUDIX (including email and remote subscribers) can send messages to the recipients in enhanced lists. Or, you can administer your system to allow only selected subscribers in your Intuity AUDIX network access to the enhanced lists.

Concepts

This section defines some terms that are used in the following discussion:

Implementing

ELA is a powerful messaging tool that can distribute large quantities of messages. Consider the following items to ensure effective implementation and use of the Enhanced List Application.

Planning with Professional Services

ELA requires some solid planning to ensure your system makes effective use of the feature. You can contract with Professional Services to work with you to plan and administer ELA, or you can do the planning and administration yourself using ELA worksheets that your account representative provides.

Administering Intuity AUDIX for ELA

The tasks involved with administering Intuity AUDIX for ELA are listed below and described fully in Administering Intuity AUDIX for ELA. The following steps are required to administer the ELA trusted server and functionality for Intuity AUDIX:

Administering ELA for Intuity AUDIX

Once the Intuity AUDIX system knows about the ELA trusted servers, you can do the initial administration of the ELA system. The tasks involved with adminstering ELA for Intuity AUDIX are listed below and described fully in Administering ELA for Intuity AUDIX. To make ELA fully functional, you must:

Scheduling ELA Message Delivery

We recommend that you schedule delivery for large enhanced lists during off-peak hours. This is because during peak traffic hours, your system processes other subscriber-generated messages. ELA intentionally slows delivery of messages to large enhanced lists during peak traffic so your system can continue to process these other messages.

Hardware and Software Requirements

ELA runs on the same machine as Intuity AUDIX. ELA must be installed on a Intuity AUDIX Release 4.2—5 or later machine. If your site has an earlier release, contact your service representative to obtain the necessary upgrade. ELA is not available for pre-Release 4 Intuity AUDIX systems.

Local Area Networks

If your configuration includes a local area network, ELA implementation should involve your PC/LAN administrators to ensure that Intuity AUDIX and the network are not adversely affected. The amount of traffic on your LAN from ELA messages could increase if ELA sends messages for delivery to email or Message Manager recipients or to TCP/IP-networked remote machines. If none of these are valid for your site, ELA will not cause any increase in LAN traffic.

Remote Messages

If your site is networked, estimate the increase in the amount of remote traffic first by determining the percentage of current traffic that is remote and calculating the number of messages per minute that percentage represents. When ELA is actively sending messages, add that number of messages to the traffic estimate for remote message delivery.

Port Usage

Voice port usage increases as recipients retrieve messages sent by ELA. Plan for the increase with Professional Services when you purchase ELA. After installation, monitor your system to determine if your Grade of Service (GOS) falls below acceptable levels. If that happens frequently, particularly during the peak busy hour, contact your account representative to purchase more ports.

IMAPI Session Requirements

An IMAPI session is invoked when an email trusted server, Message Manager, Aria TUI, or the ELA trusted server needs to communicate with the Intuity AUDIX server. The Intuity AUDIX server must have a sufficient number of IMAPI sessions administered to provide adequate access for all IMAPI requests. Additionally, the ELA server must be registered as an Intuity AUDIX trusted server.

Shadow Mailbox

The shadow mailbox is a special mailbox that ELA uses to distribute messages. The use of a shadow mailbox prevents replies to ELA delivered messages from being sent back to the entire enhanced list. However, you can administer enhanced lists so that recipients can reply to the person who originally sent the message. The shadow mailbox must belong to a community that cannot receive messages.

For a complete description of this Intuity AUDIX feature, see�Overview of Enhanced List Application (ELA).

Security Considerations

When securing a system that allows access from another domain, you must consider both internal and external security.

External Security

The ELA application runs as a trusted server. The trusted server makes requests of the Intuity AUDIX server via IMAPI to distribute messages to designated recipients. The trusted server can do anything to an ELA mailbox that an Intuity AUDIX can do.

Passwords

Two levels of security are available to administrators to prevent unauthorized access to the Intuity AUDIX from an external source system:

If you choose to administer an IMAPI password, it is recommended that you change it on a regular basis, for example, monthly.


 

Note: If you change the IMAPI password in Intuity AUDIX, all trusted servers must be administered with the new password.

Community Sending Restrictions

External security also involves administration to prevent access from an unauthorized source. These sources can include a subscriber who is administered to use email or remote AMIS analog networking. Users might send "mail bombs" to an enhanced list. Mail bombs are harassing messages that not only do not serve your business needs, but also impose unnecessary traffic on your system.

ELA mailboxes are no more vulnerable to unauthorized use than other voice mailboxes. However, the impact on system performance can be many times greater.

To prevent unauthorized access to an ELA mailbox from an external source such as email users or remote AMIS Analog networking users, you can place those subscribers in a community with sending restrictions.

Internal Security

Internal security focuses on preventing or recovering from damage if a breach occurs, for example, if a virus is transmitted in a message component such as an attached software file.

Intuity AUDIX allows for the transmission of two message components, text (originating from Message Manager or email) and binary file attachments (software files, such as a spreadsheet or word processing file). With these components come related security considerations, namely, the inadvertent delivery of a computer virus that could be embedded in a file attachment. This can occur in any system that supports the delivery of software files. While the AUDIX machine cannot be infected with viruses embedded in these software files, client machines can become infected when a user launches the application associated with the software file.


 


ELA does not perform any virus detection. The customer should evaluate the security risks of file attachments carefully and make provisions for virus detection software on PCs running Message Manager or an email application supported by Intuity AUDIX.

At a minimum, advise your users to detach (not launch) file attachments and scan them for viruses before use.


Avaya Communication
http://www.avaya.com
Avaya UCS Information Development
TOC Index Search