Академический Документы
Профессиональный Документы
Культура Документы
5M00050V/ 5M00050I
Table of Contents
Getting Started .............................................................................................................................. 15 Warm Up ................................................................................................................................... 16 Technical Check........................................................................................................................ 17 Module 1: Introduction .................................................................................................................. 18 Instructor and Participant Introduction ...................................................................................... 19 Course Description.................................................................................................................... 20 Course Objectives ..................................................................................................................... 21 Prerequisite Knowledge ............................................................................................................ 22 Expectations .............................................................................................................................. 25 Module 1: Introduction .................................................................................................................. 26 Module Objectives ..................................................................................................................... 27 Messaging Overview ................................................................................................................. 28 CMM Overview .......................................................................................................................... 29 CMM and CM Shared Resources .......................................................................................... 30 Switch Integration...................................................................................................................... 31 CMM Servers ............................................................................................................................ 32 System Platform Architecture ................................................................................................... 33 Hardware Platform and Capacities ........................................................................................... 34 CMM Features........................................................................................................................... 35 Overview of Networking Capabilities ........................................................................................ 36 System Installation Checklist .................................................................................................... 37 Summary ................................................................................................................................... 38 Quiz ........................................................................................................................................... 39 Module 2 : Communication Manager Messaging (CMM) Administration .................................... 40 Accessing CMM Web and Command Line Interface ............................................................ 51 Enabling CMM through SMI ...................................................................................................... 52 Accessing CMM through dom0 Shell........................................................................................ 53 Accessing CMM through SSH .................................................................................................. 54 Lab Exercise 1: Access and Enable CMM ............................................................................... 55
Summary ................................................................................................................................... 56 Quiz ........................................................................................................................................... 57 Lesson Objectives ..................................................................................................................... 59 Login-Profile Mapping ............................................................................................................... 60 Login Changes .......................................................................................................................... 61 Login Profiles............................................................................................................................. 62 Managing Permissions for Customers Installing service packs/ RFUs ................................... 63 Creating Privileged Logins (profile 18) ..................................................................................... 64 Creating Privileged Logins (profile 18) (Continued) ................................................................. 65 Login Field Descriptions............................................................................................................ 66 Login Field Descriptions (contd.) ............................................................................................. 67 Creating Unprivileged Logins (profile 19) ................................................................................. 68 Creating Unprivileged Logins (profile 19 (Continued) .............................................................. 69 Creating New Profiles ............................................................................................................... 70 Creating Logins with New Profiles ............................................................................................ 71 Lab Exercise 2: Create a Privileged Login Account and an Unprivileged Login Account ....... 72 Summary ................................................................................................................................... 73 Quiz ........................................................................................................................................... 74 Lesson Objectives ..................................................................................................................... 76 Creating a Mailbox .................................................................................................................... 77 Creating a Mailbox (contd.) ...................................................................................................... 78 Assigning Capabilities/Permissions to Subscribers.................................................................. 79 Assigning Capabilities/Permissions to Subscribers (contd.) ................................................... 80 Permissions to Subscribers ...................................................................................................... 81 Permissions to Subscribers (Continued) .................................................................................. 82 Permissions to Subscribers (Continued) .................................................................................. 83 Changing a Mailbox .................................................................................................................. 84 Deleting a Mailbox..................................................................................................................... 85 Creating and Changing Subscriber Name Recording .............................................................. 86 Recording Personal Greeting for a Subscriber......................................................................... 87 Managing Passwords ................................................................................................................ 88 Reassigning Passwords............................................................................................................ 89 Locking/Unlocking Mailboxes.................................................................................................... 90
Lab Exercise 3: Create a Subscriber and Assign Permissions to a Subscriber ...................... 91 Summary ................................................................................................................................... 92 Lesson Objectives ..................................................................................................................... 94 System Limits ............................................................................................................................ 95 Basic Parameters ...................................................................................................................... 96 Log-in Parameters..................................................................................................................... 97 Input Time Limits ....................................................................................................................... 98 Threshold Warnings .................................................................................................................. 99 Threshold Warnings (Continued) ............................................................................................ 100 Class of Service (COS)........................................................................................................... 101 COS Basic Features ............................................................................................................ 102 COS Permissions ................................................................................................................. 103 COS Permissions (Continued)............................................................................................. 104 COS Incoming Mailbox ........................................................................................................ 105 COS Outgoing Mailbox ........................................................................................................ 106 COS Miscellaneous.............................................................................................................. 107 Lab Exercise 4: Configuring Basic Administration Parameters.............................................. 108 Summary ................................................................................................................................. 109 Quiz ......................................................................................................................................... 110 Lesson Objectives ................................................................................................................... 112 Auto Attendant......................................................................................................................... 113 Auto Attendant Operations................................................................................................... 114 Auto Attendant Treatment Types ......................................................................................... 115 Auto Attendant Treatment Types (contd.)........................................................................... 116 Auto Attendant Steps to Create ........................................................................................... 117 Auto Attendant Step 1: Enabling Call Transfer Out............................................................. 118 Auto Attendant Step 1: Enabling Call Transfer Out (Continued) ........................................ 119 Auto Attendant Step 2: Administering the Automated Attendant as a Subscriber.............. 120 Auto Attendant Step 2: Administering the Automated Attendant as a Subscriber (Continued) ................................................................................................................................................. 121 Auto Attendant Step 2: Administering the Automated Attendant as a Subscriber (Continued) ................................................................................................................................................. 122 Auto Attendant Step 2: Administering the Automated Attendant as a Subscriber (Continued) ................................................................................................................................................. 123
Auto Attendant Step 3: Recording Greetings for the Automated Attendant Menu ............. 124 Auto Attendant Step 3: Recording Greetings for the Automated Attendant Menu (No Multiple Personal Greetings)................................................................................................... 125 Auto Attendant Step 3: Recording Greetings for the Automated Attendant Menu (Multiple Personal Greetings) ................................................................................................................ 126 Auto Attendant Step 4: Confirming Automated Attendant Administration .......................... 127 Lab Exercise 5: Creating an Auto Attendant .......................................................................... 128 Call Transfer Parameters ........................................................................................................ 129 Call Transfer Parameters (Continued).................................................................................... 130 Call Transfer Add Denied Number Addition ........................................................................ 131 Call Transfer Add Denied Number Deletion ........................................................................ 132 Call Transfer Denied Number Display ................................................................................. 133 Call Transfer Add Allowed Number Addition ....................................................................... 134 Call Transfer Add Allowed Number Deletion ....................................................................... 135 Call Transfer Add Allowed Number Display ........................................................................ 136 Bulletin Board .......................................................................................................................... 137 Setting Up the Subscriber Screen for a Bulletin Board .......................................................... 138 Setting Up the Subscriber Screen for a Bulletin Board (Continued) ...................................... 139 Setting Up the Subscriber Screen for a Bulletin Board (Continued) ...................................... 140 Recording Bulletin Board Messages....................................................................................... 141 Using Bulletin Boards with an Automated Attendant.............................................................. 142 Summary ................................................................................................................................. 143 Quiz ......................................................................................................................................... 144 Quiz ......................................................................................................................................... 145 Module 2: Communication Manager Messaging (CMM) Administration ................................... 146 Lesson Objectives ................................................................................................................... 147 Guest Passwords .................................................................................................................... 148 Administer and Configure Guest Passwords.......................................................................... 149 Outcalling................................................................................................................................. 150 Configure Outcalling................................................................................................................ 151 Configure Outcalling (contd.) ................................................................................................. 152 Broadcast Messages............................................................................................................... 153 Setting Up Broadcast Messages ............................................................................................ 154 Setting Up Broadcast Messages (Continued) ........................................................................ 155
2011 Ava ya Inc. All ri ghts reserved.
Setting Up Broadcast Messages (Continued) ........................................................................ 156 Sending a Broadcast Message ............................................................................................... 157 Recording a Broadcast Message............................................................................................ 158 Recording a Broadcast Message (Continued) ....................................................................... 159 Lab Exercise 6: Recording a Broadcast Message ................................................................. 160 Enhanced Lists ........................................................................................................................ 161 Planning to Implement Enhanced Lists Application ............................................................... 162 Configuring Enhanced List Application ................................................................................... 163 Setting Up Shadow Mailbox COS ........................................................................................... 164 Setting Sending Restrictions ................................................................................................... 165 Creating an Enhanced List...................................................................................................... 166 Creating an Enhanced List (contd.) ....................................................................................... 167 Adding Members to an Enhanced List.................................................................................... 168 Adding Members to an Enhanced List (contd.) ..................................................................... 169 Testing ELA ............................................................................................................................. 170 Customizing Announcements ................................................................................................. 171 Customizing Announcements Terminology ......................................................................... 172 Customizing Announcements Terminology (contd.) ........................................................... 173 Customizing Announcements Terminology (contd.) ........................................................... 174 Configuring Customized Announcements .............................................................................. 175 Customizing Announcements Step 1: Add New Announcement Set ................................. 176 Customizing Announcements Step 2: Identify an Administrative Announcement Set ....... 177 Customizing Announcements Step 3: Copy Contents of Standard Set to a New Set........ 178 Customizing Announcements Step 4: Check Contents of the New Set ............................. 179 Customizing Announcements Step 4: Check Contents of the New Set (contd.) ............... 180 Customizing Announcements Step 5: Copy Announcements ............................................ 181 Customizing Announcements Step 5: Copy Announcements (contd.) .............................. 182 Customizing Announcements Step 6: Record Fragments .................................................. 183 Customizing Announcements Step 6: Record Fragments (contd.).................................... 184 Customizing Announcements Step 7: Activate Announcement Set ................................... 185 Fax Messaging ........................................................................................................................ 186 Creating and Sending a Fax ................................................................................................... 187 Receiving a Fax....................................................................................................................... 188
Retrieving and Printing a Fax.................................................................................................. 189 Administering Fax.................................................................................................................... 190 Administering Fax (Continued) ............................................................................................... 191 Administering Fax (Continued) ............................................................................................... 192 Specifying Fax Dial Strings ..................................................................................................... 193 Summary ................................................................................................................................. 194 Quiz ......................................................................................................................................... 195 Quiz ......................................................................................................................................... 196 Quiz ......................................................................................................................................... 197 Module 2: Communication Manager Messaging (CMM) Administration ................................... 198 Lesson Objectives ................................................................................................................... 199 What Internet Messaging Can Do........................................................................................... 199 Internet Messaging.................................................................................................................. 200 Using Internet Messaging with POP3 ..................................................................................... 201 Using Internet Messaging with IMAP4.................................................................................... 202 LAN Impact of Email Messaging............................................................................................. 203 LDAP Integration ..................................................................................................................... 204 Administering Internet Messaging .......................................................................................... 205 Administering Internet Messaging (Continued) ...................................................................... 206 Administering Internet Messaging (Continued) ...................................................................... 207 Administering Internet Messaging (Continued) ...................................................................... 208 Message Manager .................................................................................................................. 209 Administering Messaging Manager COS ............................................................................ 210 Text-to-Speech (TTS) ............................................................................................................. 211 Text-to-Speech (TTS) (Continued) ......................................................................................... 212 Module Summary .................................................................................................................... 213 Module 3: Communication Manager Messaging (CMM) Maintenance...................................... 214 Introduction.............................................................................................................................. 215 Module Objectives ................................................................................................................... 216 Module 3: Communication Manager Messaging (CMM) Maintenance...................................... 217 Lesson Objectives ................................................................................................................... 218 CMM Backup Process............................................................................................................. 219 Translations, Announcements, Messaging Names, and Voice Messages ............................ 220
Network Backups .................................................................................................................... 221 On-Demand Backups .............................................................................................................. 222 Performing On Demand Backups ........................................................................................... 223 Performing On Demand Backups (Continued) ....................................................................... 224 Performing On Demand Backups (Continued) ....................................................................... 225 Adding Scheduled Backups .................................................................................................... 226 Adding Scheduled Backups (Continued) ................................................................................ 227 Adding Scheduled Backups (Continued) ................................................................................ 228 Changing a Backup Scheduled .............................................................................................. 229 Deleting a Backup Scheduled................................................................................................. 230 Restoring System Files ........................................................................................................... 231 Restoring System Files (contd.) ............................................................................................. 232 Lab Exercise 7: Performing Backup and Restore .................................................................. 233 Summary ................................................................................................................................. 234 Quiz ......................................................................................................................................... 235 Module 3: Communication Manager Messaging (CMM) Maintenance...................................... 236 Lesson Objectives ................................................................................................................... 237 Performance Reports .............................................................................................................. 238 Traffic Reports ......................................................................................................................... 239 Traffic Reports (Continued)..................................................................................................... 240 Activating Traffic Collection..................................................................................................... 241 Feature Daily Traffic Report .................................................................................................... 242 Feature Hourly Traffic Report ................................................................................................. 243 Load Daily Traffic Report ........................................................................................................ 244 Load Hourly Traffic Report ...................................................................................................... 245 Network Load Daily Traffic Report .......................................................................................... 246 Network Load Hourly Traffic Report ....................................................................................... 247 Remote Messages Daily Traffic Report .................................................................................. 248 Remote Messages Hourly Traffic Report ............................................................................... 249 Special Features Daily Traffic Report ..................................................................................... 250 Special Features Hourly Traffic Report .................................................................................. 251 Subscriber Daily Traffic Report ............................................................................................... 252 Subscriber Daily Traffic Report (Continued)........................................................................... 253
Subscriber Monthly Traffic Report .......................................................................................... 254 Subscriber Monthly Traffic Report (Continued) ...................................................................... 255 Traffic Snapshot-Daily Report ................................................................................................. 256 Traffic Snapshot-Daily Report (Continued)............................................................................. 257 Traffic Snapshot-Monthly Report ............................................................................................ 258 Traffic Snapshot-Monthly Report (Continued) ........................................................................ 259 Summary ..................................................................................................................................... 260 Quiz ......................................................................................................................................... 261 Module 3: Communication Manager Messaging (CMM) Maintenance...................................... 262 Lesson Objectives ................................................................................................................... 263 Updating Messaging Software ................................................................................................ 264 Implementing Service Packs................................................................................................... 270 Viewing the Service Pack Status in CDOM ............................................................................ 271 Viewing the Service Pack Status in SMI................................................................................. 272 Adding an Optional Language ................................................................................................ 273 Adding an Optional Language (contd.) .................................................................................. 274 Removing Service Pack in System Platform .......................................................................... 275 Removing Service Pack in SMI............................................................................................... 276 Removing a CMM Update/Language Pack ............................................................................ 277 Lab Exercise 8: Install and Update System Software ............................................................ 278 Summary ................................................................................................................................. 279 Module 3: Communication Manager Messaging (CMM) Maintenance...................................... 280 Lesson Objectives ................................................................................................................... 281 Toll Fraud Overview ................................................................................................................ 282 Preventing Unauthorized System Use.................................................................................... 283 Password Standards ............................................................................................................... 284 Access Security Gateway (ASG) ............................................................................................ 285 Trusted Servers ....................................................................................................................... 286 Managing Trusted Server Passwords..................................................................................... 287 Preventing Unauthorized Mailbox Use ................................................................................... 288 Preventing Unauthorized Mailbox Use (Continued) ............................................................... 289 Common Security Practices.................................................................................................... 290 Common Security Practices (Continued) ............................................................................... 291
Summary ................................................................................................................................. 292 Quiz ......................................................................................................................................... 293 Module Summary .................................................................................................................... 294 Module 4: Communication Manager Messaging (CMM) Troubleshooting ................................ 295 Introduction.............................................................................................................................. 296 Lesson Objectives ................................................................................................................... 297 Module 4: Communication Manager Messaging (CMM) Troubleshooting ................................ 298 Lesson Objectives ................................................................................................................... 299 Maintenance Interfaces (Continued)....................................................................................... 300 Alarms ..................................................................................................................................... 301 System Platform Alarms.......................................................................................................... 302 System Platform Alarms (Continued) ..................................................................................... 303 Alarm Levels ............................................................................................................................ 304 Viewing Alarms........................................................................................................................ 305 Alarms Field Description ......................................................................................................... 306 Checking the Alarm Log.......................................................................................................... 307 Alarms Log Field Description .................................................................................................. 308 Interpreting System Alarms to Monitor Performance ............................................................. 309 Interpreting System Alarms to Monitor Performance (Continued) ......................................... 310 Interpreting System Alarms to Monitor Performance (Continued) ......................................... 311 Lab Exercise 9: Interpreting Alarms........................................................................................ 319 Logs ......................................................................................................................................... 320 Events...................................................................................................................................... 321 Administrator's Log Field Description ..................................................................................... 322 Viewing Events from Maintenance Log .................................................................................. 323 Maintenance Log Field Description (Continued) .................................................................... 325 Interpreting System Events to Monitor Performance ............................................................. 326 Interpreting System Events to Monitor Performance (Continued) ......................................... 327 Interpreting System Events to Monitor Performance (Continued) ......................................... 328 Interpreting System Events to Monitor Performance (Continued) ......................................... 329 Summary ................................................................................................................................. 336 Quiz ......................................................................................................................................... 337 Quiz ......................................................................................................................................... 338
10
Quiz ......................................................................................................................................... 339 Module 4: Communication Manager Messaging (CMM) Troubleshooting ................................ 340 Lesson Objectives ................................................................................................................... 341 Diagnosing the Voice Equipment............................................................................................ 342 Fields on the Diagnose the Voice Equipment Page ............................................................... 343 Fields on the Display Voice Equipment Page ........................................................................ 344 Busying Out Voice Channels .................................................................................................. 345 Fields on the Busying Out Voice Channels Page................................................................... 346 Releasing Voice Channels ...................................................................................................... 347 Fields on the Release Voice Equipment Page ....................................................................... 348 Lab Exercise 10: Release Voice Channels ............................................................................ 349 Voice Messaging Database Audits ......................................................................................... 350 Voice Messaging Database Audit Types ................................................................................ 351 Voice Messaging Database Audit Types (Continued)............................................................ 352 Voice Messaging Database Audit Types (Continued) ............................................................ 353 Performing a Voice Messaging Database Audit ..................................................................... 354 Performing a Voice Messaging Database Audit (Continued) ................................................. 355 Performing a Voice Messaging Database Audit (Continued) ................................................. 356 Diagnostic Menu Options ........................................................................................................ 357 Diagnostic Menu Options (Continued).................................................................................... 358 Diagnostic Menu Options (Continued).................................................................................... 359 Diagnostic Menu Options (Continued).................................................................................... 361 Summary ................................................................................................................................. 362 Quiz ......................................................................................................................................... 363 Module 4: Communication Manager Messaging (CMM) Troubleshooting ................................ 364 Lesson Objectives ................................................................................................................... 365 Troubleshooting Top Ten Messaging Issues.......................................................................... 366 Troubleshooting Top Ten Messaging Issues (Continued) ..................................................... 367 Troubleshooting Top Ten Messaging Issues (Continued) ..................................................... 368 Troubleshooting Top Ten Messaging Issues (Continued) ..................................................... 369 Troubleshooting Top Ten Messaging Issues (Continued) ..................................................... 370 Troubleshooting Top Ten Messaging Issues (Continued) ..................................................... 371 Troubleshooting Top Ten Messaging Issues (Continued) ..................................................... 372
11
Troubleshooting Top Ten Messaging Issues (Continued) ..................................................... 373 Troubleshooting Top Ten Messaging Issues (Continued) ..................................................... 374 Troubleshooting Top Ten Messaging Issues (Continued) ..................................................... 375 Troubleshooting Top Ten Messaging Issues (Continued) ..................................................... 376 Lab Exercise 11: Allowing Incoming Fax Messages .............................................................. 377 Module Summary .................................................................................................................... 378 Course Summary .................................................................................................................... 379
12
Student Guide
Avaya Aura Communication Manager Messaging Embedded Administration, Maintenance & Troubleshooting
13
Day 1
14
Getting Started
Duration: 20 minutes
15
Warm Up
Student Notes
16
Technical Check
Technical Checks include
1. 2. 3. 4. Can you hear me? Can you see the slides? Can you speak into your microphone? Can the class hear you?
Refer to your vILT Troubleshooting Guide for tips and troubleshooting information regarding Audio, Adobe uConnect, and TechNet.
Student Notes
17
Module 1: Introduction
Duration: 75 minutes
18
Student Notes
19
Course Description
This course covers common post-implementation administration tasks including customer administrable system parameters, system features and mailbox administration. Also covered in this course will be common maintenance procedures such as performing a system backup and restore. Lastly, the course will cover troubleshooting procedures with the review of frequently logged trouble tickets.
Student Notes
20
Course Objectives
After completing this course, you will be able to: Describe CMM administration. Perform post-installation administration. Perform ongoing administration. Perform advanced administration. Perform CMM maintenance. Use reports. Use utilities. Apply system security. Perform a system backup/restore. Perform CMM troubleshooting. Analyze and use alarms. Apply protocols. Perform emergency recovery. Identify top ten common trouble issues.
Student Notes
21
Prerequisite Knowledge
Prior to taking this course, students are expected to have basic knowledge of: Communication Manager Communication Manager Messaging formerly known as IA770 messaging It is recommended to take the Avaya Aura Communication Manager Messaging Implementation course.
Student Notes
22
Agenda
Day 1 Course Introduction Module 1: Overview 15 minute break Module 2: Administration of Communication Manager Messaging Lesson 1 Introduction Lesson 2 Administrative Overview Lesson 3 Logins 15 minute break Lesson 4 Subscribers 2 hours break Lesson 5 Global Parameters Lesson 6 Auto Attendant Day 2 Lesson 7 System Features Lesson 8 Desktop Messaging 15 minute break Module 3: Maintenance of Communication Manager Messaging Lesson 1 Introduction Lesson 2 Backup and Restore 15 minute break Lesson 3 System Performance 2 hours break Lesson 4 Updating System Software 15 minute break Lesson 5 Security 75 minutes 10 minutes 75 minutes 75 minutes
75 minutes 75 minutes
75 minutes
Student Notes
23
Agenda (Continued)
Day 3 Module 4: Troubleshooting of Communication Manager Messaging Lesson 1 Introduction Lesson 2 Alarms and Events 15 minute break Lesson 3 Voice Equipment and Diagnostics 2 hours break Lesson 4 Troubleshooting Exercises Course Summary 75 minutes
Student Notes
24
Expectations
1. 2. 3. 4. 5. 6. 7.
Check email, voice mail, and IM chat on breaks.
Make every effort to be on time for the start time and from breaks and lunches.
Questions will be asked frequently (every 5 to 10 minutes) and participation will be prompted. A survey link will be sent to you by email at the end of the session.
Student Notes
25
26
Module Objectives
Describe the CMM architecture and connectivity. Describe the CMM system features.
Student Notes
27
Messaging Overview
Avaya is offering several options for Voice Mail, to accommodate the needs of different customers: Modular Messaging A powerful IP - and standards-based unified messaging platform designed for single - or multi-site global enterprises.
Modular Messaging offers exceptional scalability and a superior feature package of call answering, voice messaging, and speech capabilities.
Avaya Aura Messaging: Avayas next generation solution for unified messaging that combines new and existing technology and expertise with industry standards to flexibly integrate within the Avaya Aura architecture on a Linux-based server. Communication Manager Messaging (CMM) - starting with ACM 5.2, formerly known as IA770 embedded, offering basic voice mail services.
Student Notes
28
CMM Overview
Communications Manager Messaging is available in two flavors: CMM embedded, which is a software-only messaging solution that is embedded in the Communication Manager (CM) software. CMM Federal, which is essentially the same messaging solution as above but hosted on a separate server. It targets the Federal market (Military/Government in the US ONLY) that requires an IPv6, JITC (Joint Interoperability Test Command) compliant messaging system. Support of both versions continues in Avaya Aura R6.0.1: CMM embedded, as well as the CMM-FM. In this course, you are learning about the CMM embedded version.
Student Notes
29
Student Notes
30
Switch Integration
CMM uses switch integration to communicate with CM. CMM obtains information from CM software to answer telephone calls, and also sends information back to the CM software (for example, to enable MWI Message Waiting Indication). Depending on the information received, the messaging software: Plays a greeting, Provides an automated attendant, Permits a subscriber to retrieve messages, or Directs unanswered incoming telephone calls to the correct mailbox.
Student Notes
31
CMM Servers
CMM 6 Embedded runs on three Avaya servers: S8300D S8510 (must add necessary memory and hardware to upgrade to 6.0) S8800 (1U) CMM embedded is also supported on servers sourced from both HP and Dell The CMM system capacity depends on the server type: Total ports combine Call Answer Ports and Transfer Ports Call Answer ports are used, if you want to call in to voice mail and retrieve messages, or if you want to leave a message for another subscriber.
Student Notes
32
Student Notes
33
Template
CM Only CM Simplex CMM Federal Embedded 1,000 24 36 1,000 6,000 210 250 6,000 128 30 15,000 210 250 6,000 128 30
Midsize Enterprise
Subscriber Mailboxes IP trunk Call Answer Ports IP Trunk Total Ports IMAP4 Sessions
Student Notes
34
CMM Features
CMM has several features: Multimedia messaging: o Voice o Fax o Text Call management: o Call answer o Call sending o Call forwarding AUDIX Telephony User Interface (TUI): o 35 TUI language packages o Outcalling mobility o Multiple personal greetings Special mailboxes: o Automated attendant o Bulletin board o Broadcast
Student Notes
35
Student Notes
36
Task 1. Install the CM server 2. Log in to System Platform to install CM service packs 3. Configure Messaging 4. Log in to the System Management Interface (SMI) to administer messaging 5. Locate Service Packs and RFUs on the Avaya support Website. 6. Enable CMM 7. Perform Switch Link Administration 8. Start CMM 9. Set system wide messaging parameters 10. Add test subscribers for messaging 11. Perform System Acceptance Testing
Student Notes
37
Summary
In this lesson, we have completed a review of CMM architecture and connectivity. We have also reviewed at a high level the CMM system features.
Student Notes
38
Quiz
1. True / False? a. CMM embedded uses the same IP address as that of Communication Manager. b. CM and CMM are installed on the same server and are integrated using H.323 / Q.Sig protocol or SIP protocol. c. CMM supports other networking protocols (AMIS Analog Networking, VPIM, SMTP, Octel Analog, Octel Digital, etc.
Student Notes
39
Duration: 75 minutes
40
Duration: 15 minutes
41
Introduction
In this module, you will access CMM and perform various administrative tasks. You will be able to set up global parameters, add subscribers, and set up the auto attendant. You will also be able to set up system features and desktop messaging.
Student Notes
42
Module Objectives
After you complete this module, you will be able to: Access CMM. Set up global parameters. Set up subscribers. Set up the auto attendant. Set up system features. Set up desktop messaging.
Student Notes
43
44
Lesson Objective
In this lesson, you will learn how to: Administer CMM using a checklist. Perform a lab exercise Access and Enable CMM.
Student Notes
45
Administering CMM
The following are the high-level steps for administering CMM: Log in to System Platform Install the CM Service Pack Log in to the System Management Interface (SMI) interface. Enable CM Messaging. Download the latest CMM Service Pack/RFUs from the Avaya Support Web site. Install the CMM Service Pack/RFUs. Perform the switch link administration. Start the messaging application. Set system-wide messaging parameters. Add subscriber mailboxes.
Student Notes
46
The high-level steps in administering CMM are listed in the checklist below. As you complete a procedure, make a check mark against the task.
Task Change both the privileged account (system administrator, sa) and nonprivileged account (voice mail administrator (vm) passwords. Add subscribers.
Purpose This ensures system security and prevents unauthorized access to your messaging software.
Page Location (All pages refer to CMM Web interface unless explicitly stated) Administrator Accounts on the Server (Maintenance) Web page (Click Server Maintenance) on the Administration menu of the System Management Interface.
This defines subscriber mailboxes to the system with the messaging software.
Define system This defines maximum limits. capacities for such things as stored messages and message delivery lists. Define basic This defines login parameters features and and system time limits and parameters. transfer type. It also defines certain globally activate features for all subscribers, such as multiple personal greetings.
47
Student Notes
48
This defines thresholds that determine when mailboxes get too full or disk space Define gets too low. The messaging software thresholds plays a voice warning to subscribers when for mailboxes get too full. In addition, the warnings. messaging software displays a warning on the status line when disk space for system messages gets too low. Define This defines classes of service which you Class of may then assign to subscribers. A class of Service service (COS) is a set of messaging options. capabilities. This creates automatic answering so that Set up callers hear a menu of options, depending automated on the time of day and administered call attendants routing. The callers then select options and (optional). transfer to other destinations by pressing touchtone buttons or dialing extensions. This enhances system security by choosing the type of call transfers Administer and coverage you will allow on your transfer system. type and It also allows you to administer the restrictions. extension ranges to which callers can transfer.
Under Messaging Administration, Classes-of- Service 1. Under Messaging Administration, Attendant Management
Student Notes
49
Task
Purpose
This defines a bulletin board, which lets callers access a bulletin board to hear updated information or select messages from a menu of options. This sets up a broadcast mailbox. A broadcast mailbox allows subscribers to send broadcast messages. This administers system-related outcalling parameters. Outcalling allows a subscriber to tell the messaging software to place calls to a specified number when the subscriber receives new messages.
Set up bulletin board (optional). Set up a broadcast mailbox (optional). Set up outcalling (optional).
Under Messaging Administration Customize Announcement Sets system This changes the announcement that the Announcements announcements messaging software plays automatically Admin Voice and fragments to fit the needs of your company. Fragment, (optional). Announcements Announcements Copy Define Text to Under Messaging Speech (TTS) This determines what parts of text Administration, select options messages are converted into speech. Subscriber (optional). Management
Student Notes
50
You also have access to CMM via two command line interfaces: System Platform System Domain (dom0) shell prompt Linux shell prompt
Student Notes
51
3. Click Administration > Server (Maintenance) . 4. Click Miscellaneous > Messaging Software . 5. Click Enable .
Student Notes
52
5. At the root@servername ~] # prompt, enter cmm. The system logs you into the virtual system.
Student Notes
53
6. Enter the password. At the root@servername] # prompt, enter cmm. The system logs you into the virtual system.
Student Notes
54
Student Notes
This exercise will be the first step to administering CMM. Students will enable messaging, perform switch link administration and start messaging.
55
Summary
In this lesson, you learned how to: Administer CMM using a checklist. Access and enable CMM.
Student Notes
56
Quiz
2. How do you determine the number of ports in CMM for the number of licensed mailboxes? a. Administration/Messaging > Server Administration > Trusted Servers b. Administration/Messaging > IMAP/SMTP Administration > Mail Options c. Administration/Messaging > Switch Link Administration > H 3.23 Specific Configuration > Show Capacity Calculator d. Administration/Messaging > Server Information > Voice Channel Monitor
Student Notes
57
Duration: 30 minutes
58
Lesson Objectives
In this lesson, you will learn how to: Describe logins and user profiles. Describe login changes for CMM 6.x and up (vs. 5.2 and below). Create privileged and non-privileged logins. Create profiles/Web access masks. Create a customer login with new profile. Perform a lab exercise Create a Privileged and an Unprivileged login.
Student Notes
59
Login-Profile Mapping
Similar to CM, CMM relies on user profiles to define logins permissions and restriction. User profiles enable you to allow an administrator to access only a specific set of administration Web pages. User profiles are created in CM. User profiles are numbered 0-69, however, not all of them are available to the customer. Some profiles are predefined and cant be c hanged, profiles 20-69 can be created and modified by the customer. In CMM 6.x, Privileged Administrator accounts use Communication Manager user profile 18. Profile 18 permits: Administration of all the messaging features through both the CM server browser interface and the messaging administration screen. Access to selected maintenance logs.
In CMM 6.x, Unprivileged Administrator accounts use Communication Manager user profile 19. Profile 19 permits: Administration of messaging software through the messaging administration screens Access to selected maintenance logs
Student Notes
60
Login Changes
CMM 5.2 (and below) used the sa (system administrator, equivalent to CM privileged login) and vm (voice mail, equivalent to CM unprivileged login) login profiles.
CM Profile Equivalent Profile 2 (Similar to dadmin) Profile 3 (Similar to craft) Profile 18 (Privileged) Profile 19 (Unprivileged)
Starting with CMM 6.x, default logins are no longer provided. It is required to create new customer logins, with respective user profiles assigned.
Student Notes
61
Login Profiles
You can add logins from the Server (Maintenance) > Web page > Security > Administrator Accounts.
Allows you to access: All Communication Manager Messaging Web-based administration pages Most Communication Manager Messaging Web-based administration pages All Communication Manager Messaging Web-based administration pages
craft
Service technician
All Communication Manager server Webbased administration screens Access to all maintenance logs
Communication A User with only Manager Messaging Communication Manager All messaging web pages Access only Messaging access only Assign a Communication Depending on the profile associated to Manager profile to this this login, the user is able to view login associated web pages
Custom
62
63
Student Notes
64
Student Notes
65
66
This is used to validate the user input of password or ASG key at the time of login. Is the user password or the ASG key that must be entered exactly in the same way as was entered for the Enter password or key field. If you select Yes, the user has to change the password or the key at the time of first login.
67
Student Notes
68
Student Notes
69
5. Select the profile. 6. Click Change . 7. Select the Web pages that must be available for a user to edit. 8. Click Submit.
70
71
Lab Exercise 2: Create a Privileged Login Account and an Unprivileged Login Account
1. 2. 3. 4. 5. Go to the virtual lab. Locate your Lab Workbook. Go to Exercise #2 in your Lab Workbook. You need to create a privileged and an unprivileged login account. Follow the directions in the Lab Workbook and let your instructor know after you finish each step. 6. Return to the uConnect classroom and use the I agree choice in uConnect to let you instructor know when you have finished each step.
Student Notes
72
Summary
In this lesson, you learned how to: Describe logins and user profiles. Describe login changes for CMM 6.x and up (vs. 5.2 and below) Create privileged and non-privileged logins. Create profiles/Web access masks. Create a customer login with new profile.
Student Notes
73
Quiz
3. Which two user profiles allow you to access all Communication Manager Messaging Web-based administration pages? a. Privileged Administrator b. Unprivileged Administrator c. Craft d. sa e. vm
74
75
Lesson Objectives
In this lesson, you will learn how to: Create a mailbox. Assign capabilities/permission to subscribers. Change and remove a mailbox. Perform subscriber name recording. Change passwords. Lock/Unlock a mailbox. Perform a lab exercise Create a Privileged Login Account, Add Mailboxes and Assign Permissions.
Student Notes
76
Creating a Mailbox
1. Log on to the CMM Web page. 2. Under Messaging Administration, select Subscriber Management. The system displays the Manage Subscriber page. 3. In the Local Subscriber Mailbox Number text box, enter a new extension. 4. Click Add or Edit. The system displays the Add Local Subscriber page.
77
Student Notes
78
Student Notes
79
Student Notes
80
Permissions to Subscribers
PERMISSIONS Type: call-ans wer none auto-attendant bulletin-board call-answer Callers have both call answer and mailbox capabilities.
For more information on the last two options. Announcement Cont rol? y = yes n = no This field permits a user, particularly a system administrator, to record system announcements such as subscriber names and networked system machine names.
Warning
Users with this permission can change system announcements heard by callers. Reserve this capability for system administrators.
Student Notes
81
Security
This capability can increase the risk of toll fraud. Priority Messages? y = yes n = no voice login both none Broadcast: This field permits a subscriber to send priority mail messages to other messaging subscribers. Indicates the types of broadcast messages that the subscriber can create: voice Broadcast voice message permission only
Student Notes
82
y = yes n = no y = yes n = no
Security
A trusted server can do anything to a message that a messaging subscriber can.
Student Notes
83
Changing a Mailbox
To change subscriber data: 1. Log on to the CMM Web page. 2. Under the Messaging Administration menu on the left pane, click Subscriber Administration. In the Manage Subscribers page, enter the mailbox number of the local subscriber and click the Add or Edit; alternatively, click Manage for either Local Subscriber or Remote Subscriber. 3. Change the Subscriber Information. 4. Click Save .
Student Notes
84
Deleting a Mailbox
To remove a subscriber: 1. Log on to CMM Web page. 2. Under Messaging Administration, select Subscriber Management. The system displays the Manage Local Subscribers page. 3. Click Manage (you can delete a remote subscriber as well). 4. On the Manage Local Subscribers page, select a subscriber from the list. 5. The system displays the Edit Local Subscriber page. 6. Click Delete .
Student Notes
85
Student Notes
86
87
Managing Passwords
By default, a subscriber needs to change password, assigned to him/her during subscriber mailbox creation. The system places some constraints on passwords to improve security. A password cannot: Be the same number as the extension Be all of the same digit (if more than one digit is entered). For example, 1111 is not allowed. Be a string of consecutive numbers. For example, 12345 or 7654 are not allowed. If a subscriber forgets his or her password, it must be reassigned through the Subscribers screen, to allow the subscr iber to again log in to the messaging system.
Student Notes
88
Reassigning Passwords
To reassign a password: 1. Log on to the CMM Web pages. 2. On the Messaging Administration list, click Subscriber Management link. 3. Click Manage to view the administered subscribers. 4. Select the subscriber, click the Edit/Delete Selected Subscriber button. 5. On the Edit Local Subscriber page, the Basic Information table contains the Password field. 6. Type a default password into the Password field. 7. Click the Save button.
Student Notes
89
Locking/Unlocking Mailboxes
To unlock a subscriber's mailbox: 1. Log on to the CMM Web page. 2. Under Messaging Administration, click Subscriber Management. The system displays the Manage Subscriber screen. 3. Click Manage to view either Local or Remote Subscribers. 4. Select a subscriber and click Edit/Delete the Selected Subscriber. The system displays the Edit Local Subscriber or Edit Remote Subscriber page. 5. In the Basic Information box, select y in the Locked? field. 6. Click Save .
Student Notes
90
Student Notes
91
Summary
In this lesson, you learned how to: Create a mailbox. Assign Capabilities/permission to subscribers. Change and remove a mailbox. Perform Subscriber Name Recording. Change passwords. Lock/Unlock a mailbox. Perform a lab exercise Add a Mailbox and Assign Permissions.
Student Notes
92
93
Lesson Objectives
In this lesson, you will learn how to: Define system limits. Define basic parameters. Configure threshold warnings. Administer Class Of Service (COS). Perform a lab exercise Configure Basic Administration Parameters.
Student Notes
94
System Limits
Messaging software comes with default system limits. You can change system limits at any time on the Limits page to define system capacities. To define system limits: 1. Log in to the CMM Web page. 2. On the left panel, under Messaging Administration, click Limits. 3. The system displays the Limits screen. 4. Complete the fields on this screen using the information in the table for Field Definitions: Limits page. 5. When you finish entering system limit information, click the Update Limits button.
95
Basic Parameters
To change system features and parameters: On the left hand panel, under Messaging Administration, click System Administration to administer system feature parameters. Administer System Attributes and Features page is displayed. The following features can be administered: Log-In Parameters Subscriber Password Aging Limits (DAYS) Input Time Limits (Days) Disconnect Options Miscellaneous Parameters Feature Activation Multimedia Parameters Call Transfer Out of Messaging Announcement Sets Rescheduling Increments for Full Mailbox Delivery Click Save .
Student Notes
96
Log-in Parameters
Field Name LOG-IN PARAMETERS Login Retries: Valid Input Description/Procedure
The number of sequential login attempts that is allowed before the messaging software disconnects the caller. Default: 3 The maximum number of consecutive unsuccessful login attempts that is allowed before the caller is locked out of the messaging software. From 1 to 15 numeric A password that people without mailboxes can use characters to leave messages for system subscribers. The Default: system does not allow subscribers to create a blank password that is the same as the guest password. The minimum number of characters that is required for a subscriber password. Passwords need to have at least 5 digits and must exceed by at least 1 digit the number of digits in an extension number. If limitations are not in place, many subscribers often choose easily guessed numbers for their password.
Student Notes
97
Wait (*W):
Default: 180
Student Notes
98
Threshold Warnings
The messaging software plays a warning message to subscribers when their mailboxes reach the threshold limits specified on the Thresholds page. You can change these thresholds.
To change the system thresholds: 1. Log in to the CMM Web page. 2. Under Messaging Administration, click the Thresholds link. 3. Click Update Thresholds.
Student Notes
99
Upper Threshold:
0: 100 Default: 80
The lower threshold for the message space in a subscribers mailbox. This value is a percentage of the subscribers mailbox space. When this threshold is reached, a warning message is issued to the subscriber upon login to his or her mailbox. Recommended values are 50% for small mailboxes (less than 9 minutes) and 80 % for larger mailboxes. The upper threshold for the message space in a subscribers mailbox. This value is a percentage of the subscribers mailbox space. When this threshold is reached, a warning message is issued to the subscriber upon login to his or her mailbox. Recommended values are 80% for small mailboxes (less than 9 minutes) and 95 % for larger mailboxes.
Student Notes
100
Student Notes
101
System multilingual is Call Answer Primary Annc. Set: Call Answer Language Choice?
Display only
y = yes n = no
102
COS Permissions
Permissions Type:
Enter either:
call-answer
Announcement Control?
y = yes n = no
The caller will have both call answer and mailbox capabilities. none The caller will have mailbox only and no call no answer capability. auto-attendant The mailbox is an automated attendant. bulletin-board The mail box is an information only recorded announcement. For more information about the last two options. Allows a subscriber, particularly a system administrator, to record system announcements such as subscriber names and networked system machine names. Warning Subscribers with this kind of permission can change system announcement that are heard by callers. Reserve this capability for system administrators. Allows the subscriber to activate the Outcalling feature. Outcalling alerts this subscriber to new messages by having the system place a call to a pager or phone number that the subscriber specifies.
Outcalling?
y = yes n = no
Student Notes
103
Security
A trusted server can do anything to an messaging message that an messaging subscriber can.
Student Notes
104
Indicates the order for scanning the incoming mailbox message categories for a subscriber: n New. Neither the header nor the message body was read.
The order oun encourages subscribers to keep a minimum number of messages stored by forcing them to scan through old messages first. Retention Times, New, Old, and Unopened: A number from 0 to 999 Indicates the number of days that new, old, or unopened messages are retained in this subscribers incoming mailbox.
The retention time clock is not reset to zero when a message is moved between old, unopened, and new categories. For example, if the retention time is 10 days for all three categories, a message is removed after 10 days (not after 30 days) regardless of whether or when it is moved from one category to another.
Student Notes
105
Indicates the order for scanning the outgoing mailbox message categories for a subscriber. f File cabinet. Saved copies of created messages.
A number from Enter the number of days that file cabinet messages, delivered 0 to 3999 messages, or nondeliverable messages are retained in this subscribers outgoing mailbox.
Student Notes
106
COS Miscellaneous
Voice Mail Message A number from 0 to 1200 (Seconds), Default=300 Maximum Length: Call Answer A number from 0 to 1200 Message (S econds), Default=120 Maximum Length: End of Message Warning Time (Seconds): 0 (zero) A number from 15 to 60 Enter the maximum duration of voice or text mail messages (in seconds) that this subscriber can create.
Enter the maximum duration of call -ans wer messages (in seconds) that this subscriber can receive. Enter the number of seconds that a warning message plays to indicate the remaining available recording time. The system plays the warning message this number of seconds before the maximum recording time is reached. If you enter a zero (0), no end-of-message warning is played. If you leave this field blank , the system uses the value on the System-Parameters Features screen. Other wise, this value overrides the value on the System-Paramet ers Features screen.
Enter the maximum number of mailing lists that this subscriber can creat e. Enter the maximum total number of mailing list entries that this subscriber can create. Enter the maximum number of seconds of mailbox space for this subscriber.
Total Entries in all Lists: Mailbox Size (Seconds), Maximum: Minimum Needed
Entries can range from 0 to Use this field to enter the minimum mailbox space 10800 seconds in seconds that must be available before a subscriber with this class of service will be allowed 24 seconds is to create a voice mail message. recommended
Student Notes
107
Student Notes
108
Summary
In this lesson, you learned how to: Define system limits. Define basic parameters. Configure threshold warnings. Administer Class Of Service (COS). Configure Basic Administration Parameters.
Student Notes
109
Quiz
4. The messaging software plays a warning message to subscribers when mailboxes reach the threshold limits. Which feature should you use to specify the mailbox threshold limit? a. Limits b. Input Time c. Thresholds d. Class Of Service their
110
111
Lesson Objectives
In this lesson, you will learn how to: Manage auto attendant. Administer global call transfer parameters. Set up a bulletin board. Perform a lab exercise Create an automated attendant that meets the customer's requirements.
Student Notes
112
Auto Attendant
An automated attendant is an interactive telephone answering system that answers incoming calls with a prerecorded announcement and routes them based on the caller's response to menus and prompts. You set up an automated attendant so that callers hear a menu of options. Callers then press the button on their telephone keypad that corresponds to the menu option they want. The automated attendant then executes the selected option. Callers who do not have touchtone telephones are typically told that they can hold or call another number to speak with a live attendant.
Student Notes
113
Student Notes
114
115
Student Notes
116
117
Student Notes
118
Student Notes
119
Student Notes
120
Student Notes
121
Student Notes
122
Student Notes
123
Auto Attendant Step 3: Recording Greetings for the Automated Attendant Menu
Use your touchtone telephone to record the automated attendant menu greetings that callers hear when they press a key on their telephones. You record an attendant menu greeting in the same way you record a personal greeting. The only difference is that you record the greeting for the attendant extension, and the greeting describes the options for the caller to choose from. You might want to consider including the following in the menu greeting script: A "hello and welcome" greeting followed by the menu choices available to the caller An instruction to press *T to transfer to a specific extension (if this option is active) and press the pound sign An instruction to wait if a time-out extension is administered An instruction on pressing * 4 to repeat the menu selections
Student Notes
124
Auto Attendant Step 3: Recording Greetings for the Automated Attendant Menu (No Multiple Personal Greetings)
To record a single automated attendant menu greeting (the Multiple Personal Greetings feature is not used): 1. Call Messaging extension, log in as the automated attendant using the extension and password (if any) you assigned on the Subscriber screen. 2. At the activity menu, press 3 to administer the attendant menu. 3. Press 1 to record the attendant menu greeting. 4. Specify greeting number for example, 1. 5. At the tone, speak the scripted greeting for the menu and then press # to stop the recording. 6. Alternatively, prior to pressing #, press 1 to stop the recording and Press 1 again to record from where you last stopped. Press 2 3 to listen to the recording. Press * 3 to delete and re-record Press # to approve. 7. At the end, press 1 to use this greeting for all calls.
Student Notes
125
Auto Attendant Step 3: Recording Greetings for the Automated Attendant Menu (Multiple Personal Greetings)
With multiple personal greetings, your automated attendant menu greeting can change according to the type of call. For example, you can have one greeting for out-of-hours calls and another for calls during regular business hours. You can also have different menus for internal and external calls. If an automated attendant menu is lost or was never recorded, callers hear a system announcement indicating that attendant services are not available. The system also makes an entry in the Administrator's Log each time a caller dials the automated attendant extension.
Student Notes
126
Student Notes
127
Student Notes
128
Student Notes
129
Student Notes
130
Student Notes
131
Student Notes
132
Student Notes
133
Student Notes
134
Student Notes
135
Student Notes
136
Bulletin Board
A bulletin board is an electronic message system that callers can access to hear messages. Callers dial the bulletin board telephone number and the system answers and presents callers with a recorded message. The major differences between a bulletin board and an automated attendant are as follows: A bulletin board does not have an option to route the call. A bulletin board does not present a menu of buttons for callers to select. A bulletin board does not have the capability to allow callers to replay the greeting.
Student Notes
137
Student Notes
138
Student Notes
139
Student Notes
140
You record a bulletin board message in the same way you record a personal greeting. It is a good idea to write down a script for the bulletin board ahead of time and read it aloud to a colleague before recording it. To record the bulletin board message: 1. Log in as the bulletin-board subscriber, using the extension and password (if any) you assigned on the Subscriber screen, both followed by #. 2. At the activity menu, press 3 to record the message. 3. Press 1 to record the bulletin board greetings. 4. Specify greeting number for example, 1. 5. At the tone, speak the scripted greeting for the menu and then press # to approve. 6. Alternatively, press 1 to stop the recording, followed by: o Press 1 again to record from where you last stopped. o Press 2 3 if you want to listen to the recording. o Press * 3 if you want to delete and re-record. o Press # to approve. 7. At the end, press 1 to use this greeting for all calls.
Student Notes
141
Student Notes
142
Summary
In this lesson, you learned how to: Manage auto attendant. Administer global call transfer parameters. Set up a bulletin board.
Student Notes
143
Quiz
5. Which auto attendant type routes a call transfer through a switch to the user station or an extension? a. Call answer b. Blank (not selecting any auto attendant type option) c. Guest-greeting d. Transfer
144
Quiz
6. Which of the following is true? a. A bulletin board has an option to route the call. b. A bulletin board presents a menu of buttons for callers to select. c. An automated attendant has the capability to allow callers to replay the greeting.
145
Module 2: Communication Manager Messaging (CMM) Administration ______________________________ Lesson 7: Setting up System Features
Duration: 35 minutes
146
Lesson Objectives
In this lesson, you will learn how to: Manage guest passwords. Configure and administer outcalling. Set-up a broadcast mailbox. Manage Enhanced Lists Application (ELA). Customize announcements. Configure and administer fax. Perform a lab exercise Set Up Broadcast Mailbox.
Student Notes
147
Guest Passwords
A guest password can be used by people without mailboxes to create and send messages to CMM subscribers. You dont need a guest password to call a subscriber and leave a me ssage, when a call goes to cover, and connects you to the subscribers greeting. However, sometimes a guest might not want to wait for several rings before leaving a message, or would like to use some additional options, that normally only messaging subscribers have access to. If a value is entered in the System Guest Password field, a guest can leave a message for a subscriber by logging in with that subscriber's extension and this guest password. Guest password must be different from any passwords, currently used by messaging subscribers.
Student Notes
148
Student Notes
149
Outcalling
Outcalling feature allows a subscriber to tell the messaging software to place a call to a specified number (for example, mobile phone number), when the subscriber receives new messages. Use the Outcalling Options page to activate outcalling and set-up additional outcalling parameters. You must use a privileged account to change data on this screen. Messaging administrators, who use non-privileged account, can only view the data on this screen. Each subscriber sets up a number for outcalling feature individually, by accessing his/her mailbox and choosing option 6. Each subscriber, who wants to use outcalling, needs to have it activated in his/her COS or under Custom COS section on the subscribers screen.
Student Notes
150
Configure Outcalling
To set up outcalling parameters: 1. Under Messaging Administration, click the Outcalling Options link. The system displays the Outcalling Options page. 2. After administering the features, click Update Features button.
Student Notes
151
Student Notes
152
Broadcast Messages
A broadcast mailbox allows subscribers to send broadcast messages or login announcements. You must set up a specific broadcast mailbox to store the broadcast messages. When subscribers listen to a broadcast message or login announcement, messaging system actually retrieves it from the broadcast mailbox. The broadcast mailbox can contain a maximum of 16 broadcast messages and 1 login announcement. Broadcast messages are useful for company announcements or emergency announcements. You create and send a broadcast message normally, except you do not address it. Instead, you mark the message as a broadcast message. You cannot send a broadcast message to subscribers on other systems or at other locations.
Student Notes
153
Student Notes
154
Student Notes
155
Student Notes
156
Student Notes
157
To allow a subscriber to send broadcast messages, go to the Edit Local Subscriber page and enter both in the Broadcast field
Student Notes
158
6. To listen to the list of additional broadcast options, press *M (*6): Press 1 to turn on message notification (press 1 again to undo) Press 2 to change the message expiration from the 2-day default : 1. Enter numbers for the month and day of expiration. For example, press 1 0 0 8 for October 8. 2. Press # to save the expiration date or press 2 to start over Press # to approve additional option.
Student Notes
159
160
Enhanced Lists
Enhanced-List Application (ELA) greatly expands the capability to deliver messages to large numbers of recipients. A single enhanced-list can contain 1500 addresses. The system administrator can create up to 100 enhanced-lists. ELA Features: o Distribute messages to a targeted audience. o Create a list of people to whom you send messages frequently. o Centralize messages in one CMM mailbox. o Forward messages to support staff automatically. ELA uses a shadow mailbox as a mechanism to distribute messages to lists of subscribers. It is a special internal mailbox you will never call or login to. A properly-configured ELA shadow mailbox helps the system block recipients from replying to ELA senders or recipient lists.
Student Notes
161
Student Notes
162
Student Notes
163
Student Notes
164
Student Notes
165
Student Notes
166
Student Notes
167
Student Notes
168
Student Notes
169
Testing ELA
After you configure ELA, complete the following steps to test the feature. 1. Create a test ELA list with at least 2 existing subscribers as members. 2. Record and send a voice mail message to the ELA list mailbox from one of your subscribers mailboxes, by addressing it to the extension of the ELA list extension. 3. Login to each of the subscribers mailboxes to check, if the message has been delivered. Also, make sure that al l ELA list members phones had MWIs on, when the message was delivered.
Student Notes
170
Customizing Announcements
When you use CMM, you hear voice prompts. Voice prompts are also called announcements. Voice prompts tell you what to do and what are your options. Welcome to AUDIX Your call is being answered by AUDIX Press # to approve or 1 to edit your message By default CMM uses a standard announcement set (US English or another languagebased, if you have uploaded the respective language file and enabled it). However, announcements can be customized. To understand the process of customizing announcements, you need to be familiar with the following definitions: Fragments Announcements Announcement Sets
Student Notes
171
Student Notes
172
Student Notes
173
Student Notes
174
Student Notes
175
Student Notes
176
Student Notes
177
Student Notes
178
Student Notes
179
Student Notes
180
Student Notes
181
Student Notes
182
Student Notes
183
Student Notes
184
Student Notes
185
Fax Messaging
With Fax Messaging users can: Create and send a fax to CMM subscribers. Receive faxes in their mailboxes. Print fax messages from their mailboxes to a fax machine, a PC with a fax modem, a LAN printer, or a fax-enabled system such as another CMM system. Administer their mailboxes to scan incoming messages and automatically print faxes when they are received. Administer their mailboxes to automatically delete a fax message after it is printed.
Student Notes
186
Student Notes
187
Receiving a Fax
CMM receives an incoming fax in a manner similar to the way it receives other calls. When a fax tone is received, the CMM: o Records the incoming fax, o Sends it to the subscriber's mailbox, o Notifies the subscriber, through the message-waiting indicator, that a fax has been received.
Student Notes
188
Student Notes
189
Administering Fax
To activate Fax Messaging, under Messaging Administration choose Fax Options, enable Fax and click Update Features.
Student Notes
190
Student Notes
191
Student Notes
192
Student Notes
193
Summary
In this lesson, you learned how to: Manage guest passwords. Configure and administer Outcalling. Set-up a broadcast mailbox. Manage Enhanced Lists Application (ELA). Customize announcements. Configure and administer fax.
Student Notes
194
Quiz
7. A subscriber has received new messages. Which feature allows a subscriber to tell the messaging software to place the call to a specified number? a. A guest password b. The Outcalling feature c. Text-to-Speech (TTS) conversion d. Fax Messaging
195
Quiz
8. Which of the following is true? a. You can send a broadcast message to subscribers on other systems b. You can send a broadcast message to subscribers at other locations. c. You can send broadcast messages or login announcements using a broadcast mailbox. d. You do not need to set up a specific broadcast mailbox to store the broadcast messages.
196
Quiz
9. Before you implement ELA on the system, which of the following information should be available? a. An available Class of Service (COS) number. b. A community ID for the shadow mailbox. c. A community ID for the ELA list mailboxes. d. A range of extensions to use for list mailboxes.
197
Duration: 35 minutes
198
Lesson Objectives
In this lesson, you will learn how to: Describe Internet messaging and configure IMAP/SMTP. Describe Message Manager. Describe and configure Text-to-Speech (TTS).
Student Notes
Student Notes
199
Internet Messaging
In addition to the telephone user interface (TUI), subscribers can also select one of the currently available POP3 or IMAP4 email client programs to check their messages. For example, Netscape Mail or Microsoft Outlook can be used to receive and respond to messages through the messaging software.
Student Notes
200
Student Notes
201
Student Notes
202
Student Notes
203
LDAP Integration
Lightweight Directory Access Protocol (LDAP) is a database that contains system data, subscriber data, and class of service assigned to a subscriber. Customers require access to the subscriber database to bulk-administer the data. Standard LDAP clients such as Microsoft Outlook are supported clients to gain access to the LDAP database. You can connect to LDAP in two ways: Anonymously As a Trusted Server Connection to the LDAP database using an anonymous connection needs an IP address and a unique name. This type of connection gets limited information from the database. You can use this connection to read data. Connection to the LDAP database as a trusted Server needs a trusted server name, IP address, and password. This connection type is used to bulk-administer subscribers. You can use the credentials provided by Avaya to get connected and get information about subscribers.
Student Notes
204
Student Notes
205
Student Notes
206
Student Notes
207
Student Notes
208
Message Manager
Message Manager is a Windows-based graphical user interface (GUI), that includes the following basic capabilities: Visual display of the messaging mailbox Support for playing and recording messages, greetings, and names on a PC sound card Remote access to your mailbox The ability to receive, create, and send voice messages, text messages, and attached files There are two ways in which you can enable subscribers for Message Manager: On an individual (subscriber-by-subscriber) basis By defining a Class of Service (COS)
Student Notes
209
Student Notes
210
Text-to-Speech (TTS)
Text-to-Speech (TTS) conversion is an optional feature that enables subscribers to listen to a voiced presentation of email and Message Manager text messages, received in their messaging mailboxes. Message components are rendered as follows: The subject line of an email message is read as part of the message header. The body of the text message is voiced. If a file attachment is included in the email message, that component is not voiced. The subscriber hears summary information regarding the size of the file. Fax components are also summarized regarding the number of pages contained in the fax. The TTS session default is: headers_and_bodies.
Student Notes
211
Student Notes
212
Module Summary
In this module, you learned how to: Administer CMM. Access CMM. Set up global parameters. Set up subscribers. Set up the auto attendant. Set up system features. Set up desktop messaging.
Student Notes
213
Lesson 1: Introduction
Duration: 15 minutes
214
Introduction
In this module, you will access CMM and perform various tasks related to maintenance. You will also be able to backup and restore the system. You will learn how to install system software updates. In addition, you will learn about the preventative measures available to secure the CMM from toll fraud.
Student Notes
215
Module Objectives
After you complete this module, you will be able to: Monitor alarms and events. Perform a system backup and restore. Monitor system performance. Install system software updates. Describe preventative measures available to secure the CMM from toll fraud.
Student Notes
216
Duration: 60 minutes
217
Lesson Objectives
In this lesson, you will learn how to: Describe CMM backup process. Discuss supported and unsupported backup items. Perform an On-Demand backup. Perform a scheduled backup. Restore system files. Perform a lab exercise Perform a System Backup.
Student Notes
218
Student Notes
219
Student Notes
220
Network Backups
Both CM and CMM use Network Device method to backup and store the data on the specified network server. FTP (File Transfer Protocol)/SFTP sends backup data to an FTP server. The FTP server must be available and accessible at the time of the backup, and it must have enough space to store the data. Internal FTP server must be enabled through the Server Access Web page. SCP (Secure Copy) sets up a SCP session between the server and the network storage device for secure backups. Both the FTP and SCP options require the following information: User Name: the users account name for the storage server. Password: the users password for the storage server. Host Name: the DNS name or IP address of the server. Directory: If you want to use the default directory on the internal FTP server, specify /var/home/ftp/pub; otherwise, type the designated directory path in this field.
Student Notes
221
On-Demand Backups
Use Backup Now when you want to back up system data immediately. The messaging backup files can be quite large. As a result, your LAN network connection may fail during the backup. In this case, you can run a scheduled backup instead, which allows the Communication Manager server to handle breaks in the LAN connection and ultimately create a successful backup. Note It is highly recommended that you stop the messaging software (voice system) before performing an attended backup.
Student Notes
222
Student Notes
223
Student Notes
224
Student Notes
225
Student Notes
226
Student Notes
227
10
Student Notes
228
Student Notes
229
Student Notes
230
Student Notes
231
Student Notes
232
Student Notes
233
Summary
In this lesson, you learned how to: Describe CMM backup process. Perform an On-Demand backup. Perform a scheduled backup. Restore system files.
Student Notes
234
Quiz
10. Which data type consists of prompts and phrases that guide the user the messaging application? a. Announcements b. Messaging names c. Voice message d. Translations through
235
Duration: 75 minutes
236
Lesson Objectives
In this lesson, you will learn how to: Describe the performance reports available to monitor system performance. Collect and analyze traffic reports.
Student Notes
237
Performance Reports
CMM collects information that depicts how the system is used, including the following data: Features Subscribers Communities Data port loads Remote messaging traffic This information is displayed in the following sections: Real-time dynamic report windows: Dynamic windows allow you to watch real-time traffic in the messaging system. Alarm logs and administrator's logs: Record events that are useful for preventive maintenance, for diagnosing problems and troubleshooting the system, and for spotting trends or estimating future needs. Messaging traffic reports: Contains a list of available reports.
Student Notes
238
Traffic Reports
The following table lists each traffic report and its purpose. Description Shows traffic information on a feature-by-feature basis. Features are divided into call answer features and messaging features. Traffic Report Type Feature Daily Traffic Report
Feature Hourly Traffic Shows traffic information on a feature-by-feature basis. Features are Report divided into call answer features and messaging features. Load Daily Traffic Report Load Hourly Traffic Report Network Load Daily Traffic Report Network Load Hourly Traffic Report Remote Messages Daily Traffic Report Remote Messages Monthly Traffic Report Shows daily load traffic information for 1 to 32 days. Shows hourly load traffic information for up to 192 hours (8 days). Shows network channel traffic one day at a time for up to 32 days. Shows network channel traffic 1 hour at a time for up to 192 hours (8 days). Gathers up to 8 days of information about traffic load between a local messaging system and a specified remote messaging system. Gathers up to 13 months of information about traffic load between a local messaging system and a specified remote messaging system.
Student Notes
239
Traffic Snapshot Daily Shows all of the traffic data that occurred on your messaging system Report during a specific day. Traffic Snapshot Monthly Report Shows all of the traffic data that occurred on your messaging system during a month.
Student Notes
240
Student Notes
241
Student Notes
242
Student Notes
243
Student Notes
244
Student Notes
245
Student Notes
246
Student Notes
247
Student Notes
248
Student Notes
249
Student Notes
250
Student Notes
251
Student Notes
252
Student Notes
253
Student Notes
254
Student Notes
255
2 1
Student Notes
256
6 5
Student Notes
257
2 1
Student Notes
258
6 5
Student Notes
259
Summary
In this lesson, you learned how to: Describe the performance reports available to monitor system performance. Collect and analyze traffic reports.
Student Notes
260
Quiz
11. Which type of traffic report should you run to gather up to 8 days of information about the traffic load between a local messaging system and specified remote messaging system? a. b. c. d. Special Features Daily Traffic Report Network Load Daily Traffic Report Remote Messages Daily Traffic Report Subscriber Daily Traffic Report a
261
Duration: 75 minutes
262
Lesson Objectives
In this lesson, you will learn how to: Update messaging software. Add optional languages. Remove software packages. Perform a lab exercise Install Software Updates.
Student Notes
263
Student Notes
264
265
266
267
268
Student Notes
269
Student Notes
270
Student Notes
271
Student Notes
272
273
274
Student Notes
275
Student Notes
276
Student Notes
277
Student Notes
278
Summary
In this lesson, you learned how to: Updating messaging software. Add optional languages. Remove software packages.
Student Notes
279
Lesson 5: Security
Duration: 60 minutes
280
Lesson Objectives
In this lesson, you will learn how to: Analyze the impacts of toll fraud. Prevent unauthorized system use. Prevent unauthorized use of mailboxes.
Student Notes
281
Student Notes
282
Student Notes
283
Password Standards
There are certain minimum standards that passwords must follow. A password cannot: o Be the same number as the extension o Be all of the same digit (if more than one digit is entered). For example, 1111 is not allowed. o Be a string of consecutive numbers. For example, 12345 or 7654 are not allowed. To minimize the risk of unauthorized people using the messaging system, follow these guidelines for system administrator passwords. o Establish a new password as soon as the messaging system is installed. o Use from 6 to 11 alphanumeric characters. The password must include at least one numeric character and two alphabetic characters. o Never use obvious passwords, such as a telephone extension, room number, employee identification number, social security number, or easily guessed numeric or letter combinations. o Do not post, share, print, or write down passwords. o Do not put the password on a programmable function key. o Change the password at least once per month. You can administer your system to age the password and notify you that a new password is required.
Student Notes
284
Student Notes
285
Trusted Servers
A trusted server is a computer or a software application in a domain outside of messaging. A trusted server uses its own login and password to perform the following activities: o Launch a Message Core Application Programming Interface (MCAPI); formerly called Avaya INTUITY Messaging Applications Programming Interface (IMAPI), o Connect to a LAN session, o Access messaging mailboxes. The trusted server can do everything to a user mailbox that a messaging user can do. The two trusted server screens are Change MCAPI Password and Trusted-Server. o MCAPI: You must administer an MCAPI password for the trusted server to connect to messaging. The MCAPI password is another layer of security. It prevents an unauthorized source from starting an MCAPI session.
Student Notes
286
Student Notes
287
Student Notes
288
Student Notes
289
Student Notes
290
Student Notes
291
Summary
In this module, you learned how to: Analyze the impacts of toll fraud. Prevent unauthorized messaging system use. Prevent unauthorized use of mailboxes.
Student Notes
292
Quiz
12. A trusted server uses its own login and password to perform which of following activities? a. Launch a Message Core Application Programming Interface (MCAPI); formerly called Avaya INTUITY Messaging Applications Programming Interface (IMAPI), b. Connect to a LAN session. c. Access messaging mailboxes. d. All of the above. the
293
Module Summary
In this module, you learned how to: Perform backups and restore Monitor system performance Install system software updates Describe preventative measures available to secure the CMM from toll fraud.
294
Lesson 1: Introduction
Duration: 15 minutes
295
Introduction
In this module, you will be able to monitor alarms and events and use this information to analyze the system performance. You will also learn how to analyze Voice Equipment Diagnostics and discuss troubleshooting techniques.
Student Notes
296
Lesson Objectives
After you complete this module, you will be able to: Monitor alarms and events. Analyze voice equipment diagnostics. Apply troubleshooting techniques to resolve messaging server and application issues.
Student Notes
297
Duration: 60 minutes
298
Lesson Objectives
In this lesson, you will learn how to: Identify alarms. Identify event categories. Describe how system event and alarm messages are used to monitor the performance of the messaging server. Demonstrate a lab exercise Interpret Alarms.
Student Notes
299
Through the network or Recommended only when the Maintenance Web dedicated port on pages or the SAT are not accessible. This is to use server the Linux Command Line within Linux
Student Notes
300
Alarms
An alarm indicates a hardware, software, or environmental problem that could affect the operation of the messaging system. Errors found by the system are recorded in the maintenance log. The messaging system then attempts to diagnose and isolate those problems and can send an alarm to the alarm log if it cannot correct the error automatically. The system also sends alarms to the Communication Manager server alarm log. The messaging alarm log contains two types of entries: Active alarms: This alarm indicates a current problem in the system. Resolved alarms: This indicates that alarms have been corrected either automatically or through a repair procedure.
Student Notes
301
Student Notes
302
Chassis
For a sensor alarm type, the information provided in the alarm string is essentially the same information provided by IPMI. RAID tools constantly monitor RAID health and alarm when a problem is detected. The RAID monitoring tools differ by server type.
Student Notes
303
Alarm Levels
Three alarm levels indicate the severity of an alarm: Major alarms Failures that cause critical degradation of service. o These alarms require immediate attention. o Major alarms are repairable by technicians. Minor alarms Failures that cause some degradation of service, but do not render a crucial portion of the system inoperable. o A minor alarm typically affects a few trunks or stations or a single feature. o Minor alarms require attention, but the consequences are not immediate. o Minor alarms are repairable by technicians. Warning alarms Failures that cause no significant degradation of service or failures in equipment. o Warning alarms are repairable by the customer.
Student Notes
304
Viewing Alarms
To view current alarms against the messaging software: Log in to the SMI and click Server (Maintenance)>Current Alarms. The View Current Alarms screen appears. Check if any alarms are present under the Messaging Alarms heading.
Student Notes
305
Student Notes
306
Student Notes
307
Student Notes
308
2.
Student Notes
309
Student Notes
310
Student Notes
311
CGEN 7 CPUPERF 2 SOFTWARE 4 VROP 7 CGEN 8 CPUPERF 4 SOFTWARE 15 VROP 8 CGEN 11 CRON 2 CGEN 12 DSKMG 1 CGEN 17 DSKMG 2 CGEN 18 INIT 1 CGEN 21 INIT 5 CGEN 22 INIT 6 CGEN 25 MTC 1 CGEN 27 MTC 7 CGEN 28 MTC_9 CGEN 31 MTC 10 SPEECH_FS 1 VROP 10 THR 2 THR 3 THR 4 UNIX 3 UNIX 4 UNIX 5 UNIX 6 VOICE_PORT 1 VROP 11 VROP 12 VROP 14 VROP 15 VROP 18 VROP 19 VROP 20
VCHKOANM 2 VROP 22
For example, VP CGEN 28 is a call to a third-party API failed. The repair procedure involves: o Stopping the messaging software (voice system). o Starting the messaging software (voice system). o If the alarm remains active, contact your remote support center.
Student Notes
312
Interpreting AS Alarms
313
Interpreting MT Alarms
314
Interpreting SM Alarms
315
Interpreting SW Alarms
316
Interpreting VM Alarms
317
Interpreting VP Alarms
318
Student Notes
319
Logs
The system uses a series of logs as the central collection point for information flowing from all of the messaging features and feature packages. These logs provide a systemwide view of activities, errors, and alarms. The logs vary based on audience (login type) and information type. There are four types of logs: Log Type Description Activity log Administrators log Records a list of messaging mailbox-related events (for example, logins and message creation, receipt, and deletion). This log is useful for responding to subscriber-reported problems. Records informational message that could require some action by the messaging system administrator. These messages might simply log a successful nightly backup, or they could alert the system administrator that the system is low on disk space. Records major, minor, and warning alarms generated by the system. The customer is responsible for resolving all warning alarms. Records error occurrences, error resolutions, and informational events that can help Professional Services troubleshoot an alarm.
Student Notes
320
Events
An event is an informational message about system activities that indicate routine conditions or conditions that can lead to an alarm. For example, an event is logged when the system is rebooted. To view an event from an Administrator's Log: 1. Log on to CMM Web page. 2. Under Administration / Messaging>Logs, select Administrator. The system displays the Administrator's Log page. 3. In the Start Date field, enter the start date. Then, select ALL from the Application drop-down list. 4. Click Display.
Student Notes
321
Student Notes
322
Student Notes
323
Time:
A 24-hour clock time in the format hh:mm Blank AS, MT, SM, SW, VM, or VP
Application:
Student Notes
324
Enter the problem resource type. This identifies the logical resource type or system component reported. Only log entries with the specified problem resource type are displayed. Reporting Resource Enter the reporting resource type. This identifies the logical resource type of the resource that discovers and detects the problem. Only log entries Type: with the specified reporting resource type are displayed. Reporting Resource Enter the reporting resource source. This is a unique value that is used to identify the specific line of code reporting the condition. Only log entries Source: with the specified reporting resource source are displayed. Search String: Enter a text string. On log entries that contain the specified text entries are displayed.
Student Notes
325
2.
Student Notes
326
Student Notes
327
Student Notes
328
Student Notes
329
Interpreting AS Events
330
Interpreting MT Events
331
Interpreting SM Events
332
Interpreting SW Events
333
Interpreting VM Events
The VM application generates the event to indicate a problem with the voice messaging system.
Description:
Voice messaging files were corrupted. Subscribers cannot send or receive messages. Subscribers might be hearing "System experiencing difficulties." This event might occur if the system crashed or if messaging was not shut down correctly.
Repair Procedure:
1. Stop the messaging software (voice system). 2. Start the messaging software (voice system) to synchronize the voice platform and the messaging application. 3. Verify that users can create and retrieve messages. If users cannot create and retrieve messages, contact your remote support center.
334
Interpreting VP Events
335
Summary
In this lesson, you learned how to: Identify alarms. Identify event categories. Describe how system event and alarm messages are used to monitor the performance of the messaging server.
Student Notes
336
Quiz
13. Which interface allows you to use sorting and filtering capabilities to narrow your search of the logs? a. System Access Terminal (SAT) b. Maintenance Web Pages c. Command Line Interface (CLI)
337
Quiz
14. Which alarm indicates a problem with the voice messaging system? a. AS alarms b. MT alarms c. SM alarms d. VM alarms e. VP alarms
338
Quiz
15. Which event indicates a problem with the switch integration? a. AS events b. MT events c. SM events d. SW events e. VP events
339
Duration: 75 minutes
340
Lesson Objectives
In this lesson, you will learn how to: Diagnose voice equipment. Manage voice channels. Analyze database audits. Analyze diagnostics menu options.
Student Notes
341
Note
Do not diagnose all of the analog-line interface cards or channels at once. This kind of diagnosis can leave no channels available on the system to accept incoming calls.
2. Click Diagnose . 3. Depending on the equipment selected, diagnosis can take several minutes. The System displays the Voice Board Diagnostics results page as the system performs the diagnosis. 4. You need to busy out the voice equipment before diagnosing it. You cannot diagnose when it is inserv.
Student Notes
342
Equipment to diagnose Displays the equipment to diagnose as Card. Equipment Number Specifies the number of the card. Immediate diagnosis takes specified channels out of service immediately even if a call is in progress. Select NO to wait until all specified channels are idle before beginning the diagnosis.
Note Immediate Diagnosis? Selecting YES in the Immediate Diagnosis? Field disconnects calls in progress. Do not select YES unless call traffic is extremely low. Diagnosing voice cards only when they are free of calls can take longer, but no calls are disconnected.
Student Notes
343
State
Student Notes
344
Note
Do not busy out all voice channels at once. Busying out all of the channels at once can leave no channels available on the system to accept incoming calls.
To busy out voice channels: 1. Go to Voice Equipment Diagnostics>Busy 2. When the state change is complete, the system displays the Busyout of Voice Equipment results page .
Student Notes
345
Equipment Number
Change Immediately?
Student Notes
346
Student Notes
347
Equipment Number
Student Notes
348
Student Notes
349
Student Notes
350
Student Notes
351
Weekly
Daily
Student Notes
352
Deletes remote unverified subscribers who have not been Daily on delivery lists in the last 24 hours Deletes remotes subscribers with no valid nodes Weekly Deletes unadministered remote subscribers who have not Daily used the system for a specified time period Cross-checks name, extension, touchtone, subscriber directory, and remote node list translations files for consistency with subscriber profiles Weekly
Student Notes
353
Student Notes
354
The system displays the audit name and Result code, which indicate that the audit is running. The system also displays the results in stages depending on how that feature has been designed.
Student Notes
355
Student Notes
356
Student Notes
357
Student Notes
358
359
Student Notes
360
Student Notes
361
Summary
In this lesson, you learned how to: Diagnose voice equipment. Manage voice channels. Analyze database audits. Analyze diagnostics menu options.
Student Notes
362
Quiz
16. Which voice messaging database audit type counts subscribers to ensure that the number of subscribers is not exceeding internal limits? a. Subscriber Data b. Names Audit c. Network Data d. Personal Directories
363
Duration: 75 minutes
364
Lesson Objectives
In this lesson, you will learn how to: Identify and resolve messaging problems. Perform a lab exercise Resolve Fax Issues.
Student Notes
365
Student Notes
366
Student Notes
367
Student Notes
368
Student Notes
369
Student Notes
370
Student Notes
371
Student Notes
372
Student Notes
373
Student Notes
374
Student Notes
375
Student Notes
376
Student Notes
377
Module Summary
In this module, you learned how to: Monitor Alarms and Events. Analyze voice equipment diagnostics. Apply troubleshooting techniques to resolve messaging issues.
Student Notes
378
Course Summary
In this course, you learned how to: Perform CMM administration, including: Post-installation administration. Ongoing administration. Advanced administration.
Perform CMM maintenance, including: Backup and restore. System reports analysis. System software updates. System security.
Perform CMM troubleshooting, including: Analysis of alarm and events logs. Analysis of diagnostic reports. Common trouble issues and their resolution
Student Notes
379