We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byIyanna McCracken
Modified about 1 year ago
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 VMO and SMTP TOI Aaron Belcher
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 2 VMO for Unity Connection Similarities Works with Outlook 2003 and 2007. Same user interface you know and love from Unity. Same media player with same features speed control slider, pause, location slider, accessibility hotkeys, ect.. Same features set including secure messaging and Trap record/playback.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 3 VMO for Unity Connection differences Secure messaging and Trap record/playback uses HTTPS Newer more modern setup. SMTP routing improvements to work around Outlook’s address books. No need for duplicate entries like “John Doe” and “John Doe – Voicemail” (Discussed in detail in the next slide.)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 4 End user difference between Unity and Unity Connection’s Integrated messaging model. In Unity Integrated messaging users have two entries in the directory. The user has to pick the correct one so the message shows up in the voice mailbox. For example, “Aaron Belcher” and “Aaron Belcher – Voicemail” In Unity Connection we don’t modify the directory so there is only one “Aaron Belcher”. The message is sent to the correct mailbox by using the correct account to send the message. If email client sends the message through the corporate email account the message ends up in the corporate email box. If email client sends the message through the voicemail account it ends up in the voice mailbox. This model is mostly transparent to end users, because email clients default to sending forwards and replies to a messages through the account the message arrived in, so forwards and replies to voicemails end up as voicemails. The model is also transparent to end users when generating new voice messages from the email client. In order to generate a new voicemail end users have to use VMO and VMO sends all messages through the voicemail account. If the user chooses someone from the directory who isn’t a voicemail user, the message will either end up being NDR’d or delivered to the recipient’s corporate email mailbox.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 5 New concepts to support addressing messages from email clients. SMTP Proxy addresses: Additional SMTP addresses that each subscriber can have. Message sent to either the subscribers primary or proxy addresses are delivered to the subscriber’s mailbox. The subscriber’s SMTP proxy addresses usually match the subscriber’s corporate email addresses. Examples: email@example.com John.Doe@cisco.com Message Actions: Configures how the system handles messages of specific types. Types: Voicemail, Email, Fax, Delivery and Receipts. Actions: Accept the Message, Relay the message, or reject the message. SMTP Proxy addresses and Message Actions are per subscriber settings that can be configured in build with Bulk Edit or Bulk Administration Tool.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 6 New server settings to support receiving emails through SMTP System Settings->SMTP Configuration->Server – Allow Connections From untrusted IP Addresss: If it is enabled, SMTP connections are allowed from any IP addresses. (Trusted IP addresses are ones specifically allowed in the access list, authentication and TLS is never required from them.) – Require Authentication from Untrusted IP addresses: If it is enabled, we require for the SMTP “Auth Login” command to complete successfully before we allow the connect to send a message. –Transport Layer Security From untrusted IP Addresses: Required: If the connection doesn’t use TLS, the server will not allow it to authenticate Optional: The server will allow in either TLS or a none TLS connections (Recommended) Disabled: The server doesn’t offer TLS. System Settings->General Configuration “When a recipient can not be found”: “Send a non-deliverable receipt”: When this option is selected the connection server sends an NDR when the recipient can’t be found “Relay message to smart host”: When this option is selected and the recipient is not found the message is sent to the smart host to be delivered to that recipient. This is usually done so it can be delivered to a remote user’s email mailbox.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 7 Addressing and Messaging Routing flow If authentication is turned off and the sender doesn’t have an SMTP address in our system this will fail and the message will be sent to badmail. If the recipient doesn’t have a proxy address we NDR it by default. There is also an option to forward messages to unknown recipients on to the smart host to be delivered in their email accounts... There are also message handling properties that can reject, relay, or accept messages based on message types. Reject: NDR’s Relay: Sends message to different email address. Accept: Adds it to mailbox. For example, a user may want email messages and NDR’s in their corporate account instead. If authentication is turned on then the sender is checked here.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 8 None-VMO Client
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 9 None-VMO Email Clients Same features as 2.X UCXN. Plus ability to “reply to” and “forward” a voicemail with Text and additional attachments More limited then VMO: no secure messaging, no TRAP, ect...
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 10 Deploying VMO and None-VMO clients Create proxy addresses for each users corporate address with either the Bulk Administration Tool or Bulk Edit. Turning on the “allow access from untrusted IP addresses” option. Setup a custom keypad mapping that allows users to list the messages attachment over the telephone if they exists. Setup an IMAP and authenticated SMTP connection back to the server on each email client. Install VMO if using Outlook and it’s desired.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 11 Miscellaneous Trouble shooting Tips… VMO traces: Enable:Tools->ViewMail for Outlook Options->Diagnostic tab (Check all boxes.) Can be collected in: %ALLUSERSPROFILE%\Application Data\Cisco Systems\VMO\1.0\Logs Server side traces: Service: “Connection SMTP Server”, Component: “SMTP”, (All traces) Service: “Connection Message Transfer Agent”, Component: “MTA” (All traces) Common issues: 1.Symptom: SMTP messages stay in the outbox. Causes: –The sender doesn’t match a SMTP proxy address or primary SMTP address of a subscriber. –The message is larger then the max message size in the SMTP server configuration (defaults to 10 megs). –The address of the SMTP server is incorrect or blocked by firewal. Trouble shooting: Hit the send/receive button in Outllook. It will include the SMTP error. Turn on the SMTP logs and the server and view them. 2.Symptom: VMO form doesn’t appear after an install. Cause: –The Outlook process may not have exited. –Only new messages will be marked with the form. –The VMOExchangeExtension has been disabled by Outllook. Lookin in Help->About Microsoft Office Outlook->Disabled Items.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 12
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Unity Connection 7.1 Accept and Relay Aaron Belcher.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Partitions & Search Spaces TOI Aaron Belcher.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialMinFin IPT Phase 2 1 Unity Connection ViewMail for IBM Lotus Notes Release 7.1(2) TOI.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
POP Configuration Microsoft Outlook Express 6.x.
Module 5 Managing Message Transport. Module Overview Overview of Message Transport Configuring Message Transport.
1 © 2001, Cisco Systems, Inc. All rights reserved. Voice Connector Features Voic Interoperability – 4.0(5) Voice Connector features Rahul Singh.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Purpose The purpose of the cross box handoff feature is to make the.
IMS Client Installation Procedures 1. Copy the Voic Pro from the shared folder on the Voic Pro server. Go to Start, Run, and \\ or \\
Issues # 550 When receiving Yes What is the error message? Can you forward that to me? #553 Is the problem when sending or receiving? What kind of.
Welcome u How to use your Phone Effectively u Telephone Features u Voice Messaging Features.
NetTech Solutions Microsoft Outlook and Outlook Express Lesson Four.
POP Configuration Microsoft Outlook What is POP? Short for Post Office Protocol, a protocol used to retrieve from a mail server. Most.
Module 7: Managing Message Transport. Overview Introduction to Message Transport Implementing Message Transport.
© 2006 Cisco Systems, Inc. All rights reserved. CUDN v1.1—4-1 Designing VPIM Solutions Migrating Voice Mail to Unified Messaging and Interoperability.
Microsoft Office Outlook 2013 Microsoft Office Outlook 2013 Courseware # 3252 Lesson 6: Organizing Information.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Transfer of Information Features: Carbon-Copy Sender DCR SMTP Notification.
(*Fax messaging is available only upon request; fees apply.) What Is Unified Messaging? Voice, fax* and messaging within a single interface Access.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
Unified Messaging ~FAX, integration~ KX-NS1000 Version1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 DeSCA (Device Specific Conversation Attributes) List of named props.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
IT:Network:Applications Fall Running one “machine” inside another “machine” OS in Virtual machines sees ◦ CPU(s) ◦ Memory ◦ Disk ◦ USB ◦ etc.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Hosted Exchange The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting. ExchangeDefender.
Basic User Guide to Outlook. Info: Manage account settings, create automatic replies to s, clean up your mailbox, and create Rules and Alerts Print:
Module 6: Manage and Configure Messaging. Configuring Internet Mail Using Small Business Server (SBS) 2008 Console Configuring Protection Configuring.
Introduction to Microsoft Outlook Web Application (OWA) BeVerly J. Sims Computer Specialist 1.
Managing and Avoiding Junkmail. Junk Where does Junk Mail come from? People with whom you do business Pepsi Friends of people with whom you.
By Laura Trawin. Archive Archive is when you I keep the maikl but don’t want it so I put it som.
| | Tel: | | Computer Training & Personal Development Outlook Express Complete.
Microsoft Outlook 2010 New Features. Improved Interface “The Ribbon”
1 External Server Fax Server (Unified Message) Built-in Solution Version 1 Ready Office Your customers leave voice message during your absence.
Setting up in Outlook Express. Select “Tools” from the toolbar menu.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Using Your Voic M6 Release 7.1Business Feature Set Default Menu Options Revised August 31, 2007 TR
Voice Mail Options Unified Messaging Voice Mail Web Browser David Howard Les Cottrell August SCCS Managers’ Meeting.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
IS 4506 Establishing Microsoft SMTP Service. Overview Introduction to Microsoft SMTP Service SMTP Service features SMTP administration interface SMTP.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
GroupWise Tutorial What is GroupWise? GroupWise is an and calendar service (much like Microsoft outlook) for Collin College faculty and staff.
Outlook 2010 Quick Guide Table of Contents: Overview of client, Sending/Receiving , Using the address book………..……… Sent Items……………………………………………………………………………………………..…..8.
Get up to speed Find everyday commands You’ve got Outlook 2007 installed and you’ve taken time to learn about some of the ways it differs from previous.
IT:Network:Applications. How messaging servers work Initial tips for success Exchange management Server roles Exchange Server Management Message.
Draft-lemonade-imap-submit-00.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
© 2017 SlidePlayer.com Inc. All rights reserved.