Port usage impact, Security, External security – Lucent Technologies INTUITY Messaging Solutions Enhanced-List Application 585-310-575 User Manual

Page 16

Advertising
background image

Enhanced-List Application

6

Issue 1 July 1997

Port Usage Impact

Voice port usage increases as recipients retrieve messages sent by ELA. Plan for
the increase with Professional Services when you purchase ELA. Refer to the
worksheets that were compiled at the time of the purchase to determine the port
usage impact.

You should monitor your system to determine if your Grade of Service (GOS) falls
below acceptable levels. If that happens frequently, particularly during the peak
busy hour, contact your Lucent account representative to purchase more ports, if
necessary. For more information about GOS and monitoring your system, see
your

I

NTUITY

Messaging Solutions Release 4 Administration book.

NOTE:
If, in its application, ELA degrades service, you might suggest that those
users with access to enhanced lists schedule delivery of ELA messages for
off-peak hours, for example, at 10:00 p.m. or 4:00 a.m. That way, delivery of
messages will not conflict with other user-generated traffic.

Security

Securing a system that allows access from another domain involves a 2-pronged
approach. You must consider security from both an internal and an external
perspective. External security involves administration to prevent access from an
unauthorized source, such as an e-mail or AMIS-Analog message originator that
decides to send “mail bombs” to an Enhanced List. Internal security focuses on
preventing, or recovering from, damage if a breach occurs, for example, a virus
is transmitted in a message component such as an attached software file.

For an in-depth discussion and definition of such terms as

trusted server and

domain, see your I

NTUITY

Messaging Solutions Release 4 Administration book.

External Security

A new option — the trusted server — has been introduced in this release. The
ELA application runs as a trusted server, making requests of the AUDIX server,
via IMAPI, to distribute messages to designated recipients. The trusted server is
empowered to do anything to an ELA mailbox that an AUDIX user can do.

To prevent unauthorized access to AUDIX from an external source such as a
trusted server, system administrators have two levels of security at their disposal:

Trusted server password

IMAPI password

The trusted server password is administered on both the AUDIX server and on
the trusted server. The trusted server must use this password when it connects to
AUDIX.

Advertising