We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byIyanna McCracken
Modified about 1 year ago
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 VMO and SMTP TOI Aaron Belcher
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 2 VMO for Unity Connection Similarities Works with Outlook 2003 and Same user interface you know and love from Unity. Same media player with same features speed control slider, pause, location slider, accessibility hotkeys, ect.. Same features set including secure messaging and Trap record/playback.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 3 VMO for Unity Connection differences Secure messaging and Trap record/playback uses HTTPS Newer more modern setup. SMTP routing improvements to work around Outlook’s address books. No need for duplicate entries like “John Doe” and “John Doe – Voic ” (Discussed in detail in the next slide.)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 4 End user difference between Unity and Unity Connection’s Integrated messaging model. In Unity Integrated messaging users have two entries in the directory. The user has to pick the correct one so the message shows up in the voice mailbox. For example, “Aaron Belcher” and “Aaron Belcher – Voic ” In Unity Connection we don’t modify the directory so there is only one “Aaron Belcher”. The message is sent to the correct mailbox by using the correct account to send the message. If client sends the message through the corporate account the message ends up in the corporate box. If client sends the message through the voic account it ends up in the voice mailbox. This model is mostly transparent to end users, because clients default to sending forwards and replies to a messages through the account the message arrived in, so forwards and replies to voic s end up as voic s. The model is also transparent to end users when generating new voice messages from the client. In order to generate a new voic end users have to use VMO and VMO sends all messages through the voic account. If the user chooses someone from the directory who isn’t a voic user, the message will either end up being NDR’d or delivered to the recipient’s corporate mailbox.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 5 New concepts to support addressing messages from clients. SMTP Proxy addresses: Additional SMTP addresses that each subscriber can have. Message sent to either the subscribers primary or proxy addresses are delivered to the subscriber’s mailbox. The subscriber’s SMTP proxy addresses usually match the subscriber’s corporate addresses. Examples: Message Actions: Configures how the system handles messages of specific types. Types: Voic , , Fax, Delivery and Receipts. Actions: Accept the Message, Relay the message, or reject the message. SMTP Proxy addresses and Message Actions are per subscriber settings that can be configured in build with Bulk Edit or Bulk Administration Tool.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 6 New server settings to support receiving s through SMTP System Settings->SMTP Configuration->Server – Allow Connections From untrusted IP Addresss: If it is enabled, SMTP connections are allowed from any IP addresses. (Trusted IP addresses are ones specifically allowed in the access list, authentication and TLS is never required from them.) – Require Authentication from Untrusted IP addresses: If it is enabled, we require for the SMTP “Auth Login” command to complete successfully before we allow the connect to send a message. –Transport Layer Security From untrusted IP Addresses: Required: If the connection doesn’t use TLS, the server will not allow it to authenticate Optional: The server will allow in either TLS or a none TLS connections (Recommended) Disabled: The server doesn’t offer TLS. System Settings->General Configuration “When a recipient can not be found”: “Send a non-deliverable receipt”: When this option is selected the connection server sends an NDR when the recipient can’t be found “Relay message to smart host”: When this option is selected and the recipient is not found the message is sent to the smart host to be delivered to that recipient. This is usually done so it can be delivered to a remote user’s mailbox.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 7 Addressing and Messaging Routing flow If authentication is turned off and the sender doesn’t have an SMTP address in our system this will fail and the message will be sent to badmail. If the recipient doesn’t have a proxy address we NDR it by default. There is also an option to forward messages to unknown recipients on to the smart host to be delivered in their accounts... There are also message handling properties that can reject, relay, or accept messages based on message types. Reject: NDR’s Relay: Sends message to different address. Accept: Adds it to mailbox. For example, a user may want messages and NDR’s in their corporate account instead. If authentication is turned on then the sender is checked here.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 8 None-VMO Client
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 9 None-VMO Clients Same features as 2.X UCXN. Plus ability to “reply to” and “forward” a voic with Text and additional attachments More limited then VMO: no secure messaging, no TRAP, ect...
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 10 Deploying VMO and None-VMO clients Create proxy addresses for each users corporate address with either the Bulk Administration Tool or Bulk Edit. Turning on the “allow access from untrusted IP addresses” option. Setup a custom keypad mapping that allows users to list the messages attachment over the telephone if they exists. Setup an IMAP and authenticated SMTP connection back to the server on each client. Install VMO if using Outlook and it’s desired.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 11 Miscellaneous Trouble shooting Tips… VMO traces: Enable:Tools->ViewMail for Outlook Options->Diagnostic tab (Check all boxes.) Can be collected in: %ALLUSERSPROFILE%\Application Data\Cisco Systems\VMO\1.0\Logs Server side traces: Service: “Connection SMTP Server”, Component: “SMTP”, (All traces) Service: “Connection Message Transfer Agent”, Component: “MTA” (All traces) Common issues: 1.Symptom: SMTP messages stay in the outbox. Causes: –The sender doesn’t match a SMTP proxy address or primary SMTP address of a subscriber. –The message is larger then the max message size in the SMTP server configuration (defaults to 10 megs). –The address of the SMTP server is incorrect or blocked by firewal. Trouble shooting: Hit the send/receive button in Outllook. It will include the SMTP error. Turn on the SMTP logs and the server and view them. 2.Symptom: VMO form doesn’t appear after an install. Cause: –The Outlook process may not have exited. –Only new messages will be marked with the form. –The VMOExchangeExtension has been disabled by Outllook. Lookin in Help->About Microsoft Office Outlook->Disabled Items.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 12
Copyright© 2005, Objectworld Communications Corp. All rights reserved. Page 1 Intelligent Unified Communications End User Training CAO v3.2 04/05.
Voic Training v Press any key to continue.
FaxPress Administrator Training Advanced Installation and Configuration A New Generation of Network Fax Servers for Business and Enterprise.
Mozilla Thunderbird Management. Topic 1: Changing How is Organized Topic 2: Creating and Using Folders Topic 3: Attachments Topic 4: Organizing.
Version 4.1 CCNA Discovery 2– Chapter 7. Contents 7.1: ISP Services : TCP / IP Protocols 7.2: 7.3: DNS 7.3: 7.4: Application Layer Protocols 7.4.
Jet Enterprise Installation Instructions for Jet Partners V
MXIE Zultys End User Training /14/2013End User Training1.
Web Shift Booking System An Introduction. Getting Started You will have received an giving you the address of the website. Using your web browser.
The next generation of voic on Main Campus The University of Toledo Unified Messaging.
Setting up an E-XL A Step by Step Tutorial Engineering Consultants Group, Inc.
Working with Outlook 2007 at CERN Outlook Main window Customize views Send s Organize s: Category, Follow-up flag, To-Do Bar Create signatures.
Web Hosting. The purpose of this Startup Guide is to familiarize you with Own Web Now's Web Hosting. Own Web Now offers two web hosting platforms, one.
Microsoft SQL Server 2005 Express Edition & SQL Server Management Studio Express Installation and Configuration Guides.
SK-NET Tutorial SK-NET is a Windows® based software program designed to monitor and control a network of up to 100 Secura Key SK-ACP 2-door control panels.
Microsoft ® Office Outlook ® 2003 Training Outlook can help protect you from junk Upstate Technology Services presents:
GPC VOIC MODULAR MESSAGING 3.0. Welcome to the GPC Voic Modular Messaging 3.0 training presentation. This course provides an overview of the.
The ESC-QuickBooks Integration For Use with ESC Version 12.
Windows 2008 Active Directory Configuration – Week 4 of 6 Microsoft Test: Mark McCoy MCSE, CNE, CISSP.
Window Media Encoder Scorpio I Nyoman Nicharee Srirochanakul.
Microsoft ® Office Outlook ® 2007 Training Get out of your Inbox Sweetwater ISD presents:
NIMAC 2.0: The Accessible Media Producer Portal NIMAC 2.0 for AMPs.
Enabling Secure Internet Access with ISA Server. Enabling Secure Access to Internet Resources What Is Secure Access to Internet Resources? –Users can.
Telework Technologies March 15, CIT Presenters IntroductionTina Jocktane Voice Services Frank Lubsey Central FaxJonathan JT Thomas Office Communicator.
Peer to Peer Client Server Two Types of Networks.
SK-NET™ 4.0 Tutorial SK-NET™ is a Windows® based software program designed to monitor and control a network of Secura Key SK-ACP 2-door control panels.
Introducing The IP550 IP Telephone. Things you should know about an IP Telephone system The IPitomy system has many of the same features of traditional.
OSMOSiS S.C. Systems Limited. OSMOSiS What is OSMOSiS ? The OSMOSiS software suite is a complete environment for creating and managing comprehensive.
Point-to-Point Protocol (PPP) In order for any layer 3 protocol to traverse the WAN over a dialup or dedicated link, it must be encapsulated by a data-link.
Users Guide. You can create requisitions with multiple suppliers. There is automatic Purchase Order dispatch to multiple suppliers. It allows you to search.
SubCAT Purpose built Job and Business Administration for Australian and New Zealand Trade Contractors By Construction People for Construction People.
© 2016 SlidePlayer.com Inc. All rights reserved.