Presentation_ID © 2012, Cisco Systems, Inc. All rights reserved. Cisco Confidential.

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

MFA for Business Banking – Security Questions with Reset Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
Copyright © 2003 Pearson Education, Inc. Slide 7-1 The Web Wizards Guide to PHP by David Lash.
Document #07-12G 1 RXQ Customer Enrollment Using a Registration Agent Process Flow Diagram (Switch) Customer Supplier Customer authorizes Enrollment.
Document #07-12G 1 RXQ Customer Enrollment Using a Registration Agent Process Flow Diagram (Switch) Customer Supplier Customer authorizes Enrollment.
Click to edit Master title style Page - 1 OneSky Teams Step-by-Step Online Corporate Communication Support 2006.
GENERAL OVERVIEW OF STEPS TO REQUEST ACCESS TO SPP INDICATOR THROUGH TEASE ( TEXAS EDUCATION AGENCY SECURE ENVIRONMENT) TEASE 1.
1 After completing this lesson, you will be able to: Compose, address, and send messages. Format the body of a message. Attach a file to a message. Check.
Press any key to continue
Course Objectives After completing this course, you should be able to:
Using Meet-Me Conferencing
Copyright © Open Text Corporation. All rights reserved. Slide 1 Automatic Routing With Captaris FaxPress and FaxPress Premier Darin McGinnes Sales Engineer.
What is access control list (ACL)?
ECATS RCCA CAMP PROCESS ENHANCEMENTS
1 1Line Training Capacity Release - Phase II Awards and Recall/Reput.
©2013 PROS, Inc. All rights reserved. Confidential and Proprietary. PROS Connect User Community Website and Support Portal Prepared by Christine Lambden.
© 2010 Cisco and/or its affiliates. All rights reserved.Presentation_IDCisco Confidential CISCO LEARNING CREDITS MANAGEMENT TOOL CLP ADMINISTRATOR – USER.
Customize Your View of Data Training Presentation for Supply Chain Platform: BAE Systems July 2012.
Setting up an E-XL A Step by Step Tutorial Engineering Consultants Group, Inc.
Welcome to Instructions and tips for the online application process 1 June 2012.
Brief introduction to Primary Care (GP) SOAR users Last updated: 24 th August 2012.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
A lesson approach © 2011 The McGraw-Hill Companies, Inc. All rights reserved. a lesson approach Microsoft® PowerPoint 2010 © 2011 The McGraw-Hill Companies,
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for Online.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 VMO and SMTP TOI Aaron Belcher.
Hosted Voice Product Training
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
© 2008 Cisco Systems, Inc. All rights reserved. 1 My Colleagues Aggregate Tool (MCAT) User Guide.
How to Get The Most Out of Outlook 2003 Michele Schwartzman Division of Customer Support Summer 2006.
Salesforce.com Web to Leads. Unit Name Web to Leads A web to lead provides users the ability to gather information from their website visitors which automatically.
1 © 2001, Cisco Systems, Inc. All rights reserved. Voice Connector Features Voic Interoperability – 4.0(5) Voice Connector features Rahul Singh.
© Copyright 2013 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Basic Administrator Training – Release Adding Users.
© 2006 Cisco Systems, Inc. All rights reserved. CUDN v1.1—4-1 Designing VPIM Solutions Migrating Voice Mail to Unified Messaging and Interoperability.
Grants Online Locating and Viewing Documents Attached to a Grant of Aid Step-by-Step Guide February 2013.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 SAN Certificate in Unity Connection Presenter Name: Bhawna Goel.
© 2013 Cisco System Inc. All rights reserved Cisco Confidential 1 © 2013 Cisco System Inc. All rights reserved. 1 Allow System Distribution Lists to be.
 How do I send an via byums.org?  How do I make an template?  Whom can I send s to?  Other features.
NMU Voic Welcome to. This presentation will walk you through the setup and use of the NMU Voic system. Follow the step by step instructions.
Missed Call Notification Unity Connection 11.0
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send.
Copyright © 2002 Deerfield.com. All Rights Reserved. Deerfield.com Distributor Confidential.
Presentation_ID © 2012, Cisco Systems, Inc. All rights reserved. Cisco Confidential.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2012 Cisco and/or its affiliates. All rights reserved. 1 Voice Mailbox.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Partitions & Search Spaces TOI Aaron Belcher.
System Initialization 1)User starts application. 2)Client loads settings. 3)Client loads contact address book. 4)Client displays contact list. 5)Client.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Unity Connection 7.1 Accept and Relay Aaron Belcher.
Presentation_ID © 2012, Cisco Systems, Inc. All rights reserved. Cisco Confidential.
© 2006 Cisco Systems, Inc. All rights reserved.1 Connection 7.0 Serviceability Reports Todd Blaisdell.
© 2013 Cisco System Inc. All rights reserved Cisco Confidential 1 © 2013 Cisco System Inc. All rights reserved. 1 February 14, 2014 Unity Connection Legal.
Consolidating Gmail Accounts Jeff Rew, ITRT Richmond Public Schools.
1 © 2003, Cisco Systems, Inc. All rights reserved. Proprietary and Confidential Unity Connection 7.0(1) Messaging Redundancy TOI July 2008 Jane Rygg
1 © 2005 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Public Cisco Unity Connection Notification Jane Rygg Core Services.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Purpose  The purpose of the cross box handoff feature is to make the.
Enabled Voice Mail (EVM) for Octel Systems Always be In-Touch with EVM! AICT PRESENTS.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
© 2015 Cisco System Inc. All rights reserved Cisco Confidential 1 © 2015 Cisco System Inc. All rights reserved. 1 Subject Line Customization for Notifications.
Performing End User Tasks with Response Point Experiencing Microsoft Response Point end-user features and functionality Joe Schurman Founder, Executive.
Antony Edwin Keane Inc Ltd
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Private Secure Messaging Unity 4.0(5)
DOCUMENT CREATION Main Letter Type: Editor Type: Log Documents: Case
How to Setup and Utilize Functionality
Supplier Portal Self-Registration
5.8 Presentation.
Cisco Unity Connection Logon Session Limit – TUI/VUI
(Includes setup) FAQ ON DOCUMENTS (Includes setup)
Cisco Unity Connection Disable Inactive Users Accounts
Voice User Interface Distribution List Addressing Cisco Unity Connection 1.2 Mike Maas Unified Communications Business Unit (UCBU)
Cisco Unity Connection -
Vendor Management: New Vendor Request Processing
(Includes setup) FAQ ON DOCUMENTS (Includes setup)
Presentation transcript:

Presentation_ID © 2012, Cisco Systems, Inc. All rights reserved. Cisco Confidential

Existing Functionality in Connection Whats New Trace Snippets Troubleshooting Tips

Existing Intelligent Notifications delivers SMTPbased HTML notifications of new voice message to end users. These notifications can be customized through a notification template Connection follows the below process for delivering message notifications to end users. Connection User A sends a voice mail to the Connection User B. The message notification settings for each User B allow to control how and when Connection notifies a user of new messages When the message arrives from User A and it matches the criteria set in the message notification settings of User B, the Connection Messaging System sends an HTML based notification to an address of User B using SMTP Now User B can check the new Voice mail and perform operation on it Presentation_ID © 2012, Cisco Systems, Inc. All rights reserved. Cisco Confidential

For allowing Voice mail as attachment Admin has to enable the same at global level, System settings Advanced Messaging check the box for Allow voice mail as attachments to HTML notifications Individual users can still disable or enable the functionality under Users Edit Notification Devices HTML check or uncheck Allow voic as attachments Some conditions for voice mail sent as an attachment: Secure messages will not be sent as attachment Private messages will not be sent as attachment Message size limit needs to be followed which is defined at System settings Advanced Messaging Max size of voice mail as attachment to HTML notifications (KB) In case of forwarded or chain messages attachment will be sent only for the latest voic Presentation_ID © 2012, Cisco Systems, Inc. All rights reserved. Cisco Confidential

Admin changes for Flag set can be done via REST API also as mentioned below: PUT /vmrest/configurationvalues/System.Messaging.AllowVoic AsAttachmentToHtmlNotification Request Data: 1 Response code: 204 Admin changes for User flag via REST API: PUT /vmrest/users/{userObjectId}/notificationdevices/htmldevices/{deviceObjectId} Request Data: true true Response code: 204 User can make changes for flag via REST API: PUT /vmrest/user/notificationdevices/htmldevices/{deviceObjectId} Request Data: true true Response code: 204 Presentation_ID © 2012, Cisco Systems, Inc. All rights reserved. Cisco Confidential

Log entry when voic is secure /private or both: 14:51: |17209,,,Notifier,16,SendHTMLSMTPMessage called for 14a35d7b-b749-41e9-82a3-8a d 37a4b15f-83ff f8a1797c345 14:51: |17209,,,Notifier,16,Message is either secure or private so not sending the attachment with the notification, secure=1 private=1 Log entry when voic is beyond the specified size: 17:26: |20482,,,Notifier,-1, Attachment size=28138 Max allowed size= :26: |20482,,,Notifier,-1,Attachment size is beyond the maximum allowed value so not sending it with the notification

Voic is not sent as an attachment Check the message should not be secure or private or both Check for the maximum size of attachments allowed In case of forwarded message only latest voic will be sent as attachment

Presentation_ID © 2012, Cisco Systems, Inc. All rights reserved. Cisco Confidential