Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 VMO and SMTP TOI Aaron Belcher.

Similar presentations


Presentation on theme: "© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 VMO and SMTP TOI Aaron Belcher."— Presentation transcript:

1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 VMO and SMTP TOI Aaron Belcher

2 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 2 VMO for Unity Connection Similarities  Works with Outlook 2003 and  Same user interface you know and love from Unity.  Same media player with same features speed control slider, pause, location slider, accessibility hotkeys, ect..  Same features set including secure messaging and Trap record/playback.

3 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 3 VMO for Unity Connection differences  Secure messaging and Trap record/playback uses HTTPS  Newer more modern setup.  SMTP routing improvements to work around Outlook’s address books. No need for duplicate entries like “John Doe” and “John Doe – Voic ” (Discussed in detail in the next slide.)

4 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 4 End user difference between Unity and Unity Connection’s Integrated messaging model.  In Unity Integrated messaging users have two entries in the directory. The user has to pick the correct one so the message shows up in the voice mailbox. For example, “Aaron Belcher” and “Aaron Belcher – Voic ”  In Unity Connection we don’t modify the directory so there is only one “Aaron Belcher”. The message is sent to the correct mailbox by using the correct account to send the message. If client sends the message through the corporate account the message ends up in the corporate box. If client sends the message through the voic account it ends up in the voice mailbox.  This model is mostly transparent to end users, because clients default to sending forwards and replies to a messages through the account the message arrived in, so forwards and replies to voic s end up as voic s.  The model is also transparent to end users when generating new voice messages from the client. In order to generate a new voic end users have to use VMO and VMO sends all messages through the voic account.  If the user chooses someone from the directory who isn’t a voic user, the message will either end up being NDR’d or delivered to the recipient’s corporate mailbox.

5 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 5 New concepts to support addressing messages from clients.  SMTP Proxy addresses: Additional SMTP addresses that each subscriber can have. Message sent to either the subscribers primary or proxy addresses are delivered to the subscriber’s mailbox. The subscriber’s SMTP proxy addresses usually match the subscriber’s corporate addresses. Examples:  Message Actions: Configures how the system handles messages of specific types. Types: Voic , , Fax, Delivery and Receipts. Actions: Accept the Message, Relay the message, or reject the message. SMTP Proxy addresses and Message Actions are per subscriber settings that can be configured in build with Bulk Edit or Bulk Administration Tool.

6 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 6 New server settings to support receiving s through SMTP  System Settings->SMTP Configuration->Server – Allow Connections From untrusted IP Addresss: If it is enabled, SMTP connections are allowed from any IP addresses. (Trusted IP addresses are ones specifically allowed in the access list, authentication and TLS is never required from them.) – Require Authentication from Untrusted IP addresses: If it is enabled, we require for the SMTP “Auth Login” command to complete successfully before we allow the connect to send a message. –Transport Layer Security From untrusted IP Addresses: Required: If the connection doesn’t use TLS, the server will not allow it to authenticate Optional: The server will allow in either TLS or a none TLS connections (Recommended) Disabled: The server doesn’t offer TLS.  System Settings->General Configuration “When a recipient can not be found”: “Send a non-deliverable receipt”: When this option is selected the connection server sends an NDR when the recipient can’t be found “Relay message to smart host”: When this option is selected and the recipient is not found the message is sent to the smart host to be delivered to that recipient. This is usually done so it can be delivered to a remote user’s mailbox.

7 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 7 Addressing and Messaging Routing flow If authentication is turned off and the sender doesn’t have an SMTP address in our system this will fail and the message will be sent to badmail. If the recipient doesn’t have a proxy address we NDR it by default. There is also an option to forward messages to unknown recipients on to the smart host to be delivered in their accounts... There are also message handling properties that can reject, relay, or accept messages based on message types. Reject: NDR’s Relay: Sends message to different address. Accept: Adds it to mailbox. For example, a user may want messages and NDR’s in their corporate account instead. If authentication is turned on then the sender is checked here.

8 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 8 None-VMO Client

9 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 9 None-VMO Clients  Same features as 2.X UCXN.  Plus ability to “reply to” and “forward” a voic with Text and additional attachments  More limited then VMO: no secure messaging, no TRAP, ect...

10 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 10 Deploying VMO and None-VMO clients  Create proxy addresses for each users corporate address with either the Bulk Administration Tool or Bulk Edit.  Turning on the “allow access from untrusted IP addresses” option.  Setup a custom keypad mapping that allows users to list the messages attachment over the telephone if they exists.  Setup an IMAP and authenticated SMTP connection back to the server on each client.  Install VMO if using Outlook and it’s desired.

11 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 11 Miscellaneous Trouble shooting Tips…  VMO traces: Enable:Tools->ViewMail for Outlook Options->Diagnostic tab (Check all boxes.) Can be collected in: %ALLUSERSPROFILE%\Application Data\Cisco Systems\VMO\1.0\Logs  Server side traces: Service: “Connection SMTP Server”, Component: “SMTP”, (All traces) Service: “Connection Message Transfer Agent”, Component: “MTA” (All traces)  Common issues: 1.Symptom: SMTP messages stay in the outbox. Causes: –The sender doesn’t match a SMTP proxy address or primary SMTP address of a subscriber. –The message is larger then the max message size in the SMTP server configuration (defaults to 10 megs). –The address of the SMTP server is incorrect or blocked by firewal. Trouble shooting: Hit the send/receive button in Outllook. It will include the SMTP error. Turn on the SMTP logs and the server and view them. 2.Symptom: VMO form doesn’t appear after an install. Cause: –The Outlook process may not have exited. –Only new messages will be marked with the form. –The VMOExchangeExtension has been disabled by Outllook. Lookin in Help->About Microsoft Office Outlook->Disabled Items.

12 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 12


Download ppt "© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 VMO and SMTP TOI Aaron Belcher."

Similar presentations


Ads by Google