![]() |
![]() |
![]() |
Enhanced List Application
The Enhanced List Application (ELA) greatly expands the capability to deliver messages to large numbers of recipients. A single enhanced list can contain 1500 addresses. The system administrator can create up to 100 such lists.
Features
The Enhanced List Application (ELA) provides the following features:
- Up to 1500 recipients can be contained in an enhanced list (compared to 250 addresses in a standard Intuity AUDIX mailing list).
- Up to 100 enhanced lists can be created on an Intuity AUDIX machine.
- Changes in an enhanced list propagate to all lists that refer to the changed list.
- Access to enhanced lists is possible from anywhere within the Intuity AUDIX network (standard Intuity AUDIX mailing lists are only accessible to those subscribers with mailboxes on the same machine as the lists).
- Messages can be delivered to local and remote Intuity AUDIX, email, and remote AMIS pre administered subscribers.
- Messages can be delivered across domains from an email trusted server to Intuity AUDIX. This enables email subscribers to access the Enhanced Lists.
- Distribute messages to a targeted audience.
You can create a list of people to whom you send messages frequently. Then, you can send them all the same message by entering one enhanced list address.
- Centralize messages in one Intuity AUDIX mailbox.
First, select one office as your primary location. Then create an enhanced list at each secondary location that has as its only member the number of your primary office location. When a mailbox at a secondary location receives a message, ELA puts it into the mailbox for the primary office.
- Forward messages to support staff automatically.
If you frequently forward incoming messages, you can create an enhanced list mailbox that automatically forwards messages to other subscribers. These subscribers can review the messages and then respond to them as they normally would.
- Nest (or embed) enhanced lists.
A list with 1500 addresses can be a list contained within another list. So, a subscriber can record a message, address it to the parent enhanced list, and send it to nearly 150,000 people just as easily as if the message were being sent to one person sitting at the next desk.
All subscribers administered in Intuity AUDIX (including email and remote subscribers) can send messages to the recipients in enhanced lists. Or, you can administer your system to allow only selected subscribers in your Intuity AUDIX network access to the enhanced lists.
Concepts
This section defines some terms that are used in the following discussion:
- A trusted server is a computer or a software application in a domain outside of Intuity AUDIX. It uses its own login and password to launch an Intuity messaging application programming interface (IMAPI) session and access Intuity AUDIX mailboxes. The ELA software, acting as a trusted server, can access and manipulate an Intuity AUDIX message just as the Intuity AUDIX application does.
- For the purposes of ELA, a domain is a logical boundary defined by the application. Intuity AUDIX voice and fax mail messaging are one domain, and ELA is another domain. The two domains are linked to allow messages to be distributed between them.
Implementing
ELA is a powerful messaging tool that can distribute large quantities of messages. Consider the following items to ensure effective implementation and use of the Enhanced List Application.
Planning with Professional Services
ELA requires some solid planning to ensure your system makes effective use of the feature. You can contract with Professional Services to work with you to plan and administer ELA, or you can do the planning and administration yourself using ELA worksheets that your account representative provides.
Administering Intuity AUDIX for ELA
The tasks involved with administering Intuity AUDIX for ELA are listed below and described fully in Administering Intuity AUDIX for ELA. The following steps are required to administer the ELA trusted server and functionality for Intuity AUDIX:
- Verify that ELA is enabled for your system.
- Increase the number of mailing lists Intuity AUDIX allows on the system.
- Define an ELA Class of Service.
- Set up ELA and shadow mailbox Community IDs.
- Administer TCP/IP on the Intuity AUDIX server.
- Set up IMAPI sessions for ELA server access to Intuity AUDIX.
- Define two ELA trusted servers to the Intuity AUDIX server and administer access (including the surrounding security requirements).
Administering ELA for Intuity AUDIX
Once the Intuity AUDIX system knows about the ELA trusted servers, you can do the initial administration of the ELA system. The tasks involved with adminstering ELA for Intuity AUDIX are listed below and described fully in Administering ELA for Intuity AUDIX. To make ELA fully functional, you must:
- Define the Intuity AUDIX server for ELA, administer access, and select the shadow mailbox extension.
- Create enhanced lists.
- Add members to enhanced lists.
- Record a name for the enhanced lists (optional).
- Test your enhanced list setup.
Scheduling ELA Message Delivery
We recommend that you schedule delivery for large enhanced lists during off-peak hours. This is because during peak traffic hours, your system processes other subscriber-generated messages. ELA intentionally slows delivery of messages to large enhanced lists during peak traffic so your system can continue to process these other messages.
Hardware and Software Requirements
ELA runs on the same machine as Intuity AUDIX. ELA must be installed on a Intuity AUDIX Release 4.25 or later machine. If your site has an earlier release, contact your service representative to obtain the necessary upgrade. ELA is not available for pre-Release 4 Intuity AUDIX systems.
Local Area Networks
If your configuration includes a local area network, ELA implementation should involve your PC/LAN administrators to ensure that Intuity AUDIX and the network are not adversely affected. The amount of traffic on your LAN from ELA messages could increase if ELA sends messages for delivery to email or Message Manager recipients or to TCP/IP-networked remote machines. If none of these are valid for your site, ELA will not cause any increase in LAN traffic.
Remote Messages
If your site is networked, estimate the increase in the amount of remote traffic first by determining the percentage of current traffic that is remote and calculating the number of messages per minute that percentage represents. When ELA is actively sending messages, add that number of messages to the traffic estimate for remote message delivery.
Port Usage
Voice port usage increases as recipients retrieve messages sent by ELA. Plan for the increase with Professional Services when you purchase ELA. After installation, monitor your system to determine if your Grade of Service (GOS) falls below acceptable levels. If that happens frequently, particularly during the peak busy hour, contact your account representative to purchase more ports.
IMAPI Session Requirements
An IMAPI session is invoked when an email trusted server, Message Manager, Aria TUI, or the ELA trusted server needs to communicate with the Intuity AUDIX server. The Intuity AUDIX server must have a sufficient number of IMAPI sessions administered to provide adequate access for all IMAPI requests. Additionally, the ELA server must be registered as an Intuity AUDIX trusted server.
Shadow Mailbox
The shadow mailbox is a special mailbox that ELA uses to distribute messages. The use of a shadow mailbox prevents replies to ELA delivered messages from being sent back to the entire enhanced list. However, you can administer enhanced lists so that recipients can reply to the person who originally sent the message. The shadow mailbox must belong to a community that cannot receive messages.
For a complete description of this Intuity AUDIX feature, see�Overview of Enhanced List Application (ELA).
Security Considerations
When securing a system that allows access from another domain, you must consider both internal and external security.
External Security
The ELA application runs as a trusted server. The trusted server makes requests of the Intuity AUDIX server via IMAPI to distribute messages to designated recipients. The trusted server can do anything to an ELA mailbox that an Intuity AUDIX can do.
Passwords
Two levels of security are available to administrators to prevent unauthorized access to the Intuity AUDIX from an external source system:
- Trusted server password
The trusted server password is administered on both the Intuity AUDIX server and on the trusted server. The trusted server must use this password when it connects to Intuity AUDIX.
- IMAPI password
The IMAPI password is an optional, secondary level of security used to prevent an unauthorized source external to Intuity AUDIX from starting an IMAPI session. It is� strongly recommend� that you take advantage of this extra protection.
If you choose to administer an IMAPI password, it is recommended that you change it on a regular basis, for example, monthly.
Note: If you change the IMAPI password in Intuity AUDIX, all trusted servers must be administered with the new password.
Community Sending Restrictions
External security also involves administration to prevent access from an unauthorized source. These sources can include a subscriber who is administered to use email or remote AMIS analog networking. Users might send "mail bombs" to an enhanced list. Mail bombs are harassing messages that not only do not serve your business needs, but also impose unnecessary traffic on your system.
ELA mailboxes are no more vulnerable to unauthorized use than other voice mailboxes. However, the impact on system performance can be many times greater.
To prevent unauthorized access to an ELA mailbox from an external source such as email users or remote AMIS Analog networking users, you can place those subscribers in a community with sending restrictions.
Internal Security
Internal security focuses on preventing or recovering from damage if a breach occurs, for example, if a virus is transmitted in a message component such as an attached software file.
Intuity AUDIX allows for the transmission of two message components, text (originating from Message Manager or email) and binary file attachments (software files, such as a spreadsheet or word processing file). With these components come related security considerations, namely, the inadvertent delivery of a computer virus that could be embedded in a file attachment. This can occur in any system that supports the delivery of software files. While the AUDIX machine cannot be infected with viruses embedded in these software files, client machines can become infected when a user launches the application associated with the software file.
![]() http://www.avaya.com Avaya UCS Information Development |
![]() |
![]() |
![]() |