© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 VMO and SMTP TOI Aaron Belcher.

Slides:



Advertisements
Similar presentations
Dexter Team IPv6 in Connection 8.5.
Advertisements

IMS Client Installation Procedures 1. Copy the Voic Pro from the shared folder on the Voic Pro server. Go to Start, Run, and \\ or \\
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
© 2006 Cisco Systems, Inc. All rights reserved. CUDN v1.1—4-1 Migrating from Voice Mail to Unified Messaging Migrating Voice Mail to Unified Messaging.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Staff Computer Training Exchange 2003: More User Friendly Vicki Hecht Cherry Delaney ITaP Luncheon October 14, 2003.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Network Printing. Printer sharing Saves money by only needing one printer Increases efficiency of managing resources.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
By Laura Trawin.
{ Etiquette Handbook. Feature Creating an Font, colour and sizes etc Sending an Sending using Cc Sending using Bcc Creating a signature.
POP Configuration Microsoft Outlook Express 6.x.
GroupWise Tutorial What is GroupWise? GroupWise is an and calendar service (much like Microsoft outlook) for Collin College faculty and staff.
Welcome u How to use your Phone Effectively u Telephone Features u Voice Messaging Features.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
Setting up in Outlook Express. Select “Tools” from the toolbar menu.
Welcome u How to use your Phone Effectively u Telephone Features u Voice Messaging Features.
Welcome u How to use the new NCAR telephone system u Telephone Features u Voice Messaging Features.
POP Configuration Microsoft Outlook What is POP? Short for Post Office Protocol, a protocol used to retrieve from a mail server. Most.
1 © 2001, Cisco Systems, Inc. All rights reserved. Voice Connector Features Voic Interoperability – 4.0(5) Voice Connector features Rahul Singh.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
© 2006 Cisco Systems, Inc. All rights reserved. CUDN v1.1—4-1 Designing VPIM Solutions Migrating Voice Mail to Unified Messaging and Interoperability.
IT:Network:Applications Fall  Running one “machine” inside another “machine”  OS in Virtual machines sees ◦ CPU(s) ◦ Memory ◦ Disk ◦ USB ◦ etc.
Hosted Exchange The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting. ExchangeDefender.
Microsoft Outlook Web Application (OWA)
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Module 8: Managing Client Configuration and Connectivity.
~FAX, integration~ KX-NS1000 Version1 Unified Messaging ~FAX, integration~
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Module 6: Manage and Configure Messaging. Configuring Internet Mail Using Small Business Server (SBS) 2008 Console Configuring Protection Configuring.
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
| | Tel: | | Computer Training & Personal Development Outlook Express Complete.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
Microsoft Outlook 2010 New Features. Improved Interface “The Ribbon”
Issues # 550 When receiving Yes What is the error message? Can you forward that to me? #553 Is the problem when sending or receiving? What kind of.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialMinFin IPT Phase 2 1 Unity Connection ViewMail for IBM Lotus Notes Release 7.1(2) TOI.
(*Fax messaging is available only upon request; fees apply.) What Is Unified Messaging? Voice, fax* and messaging within a single interface Access.
2. Fax Server (Unified Message)
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2012 Cisco and/or its affiliates. All rights reserved. 1 Voice Mailbox.
Basic User Guide to Outlook. Info: Manage account settings, create automatic replies to s, clean up your mailbox, and create Rules and Alerts Print:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Partitions & Search Spaces TOI Aaron Belcher.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Unity Connection 7.1 Accept and Relay Aaron Belcher.
Voice Mail Options Unified Messaging Voice Mail Web Browser David Howard Les Cottrell August SCCS Managers’ Meeting.
Microsoft Office Outlook 2013 Microsoft Office Outlook 2013 Courseware # 3252 Lesson 6: Organizing Information.
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Module 5 Managing Message Transport. Module Overview Overview of Message Transport Configuring Message Transport.
Module 7: Managing Message Transport. Overview Introduction to Message Transport Implementing Message Transport.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Module 5 Managing Message Transport. Module Overview Overview of Message Transport Configuring Message Transport.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Digital Networking TOI David Smith
Module 3 Managing Recipient Objects. Module Overview Managing Mailboxes Managing Other Recipients Configuring Address Policies Configuring Address.
© 2006 Cisco Systems, Inc. All rights reserved.1 Connection 7.0 Serviceability Reports Todd Blaisdell.
Module 2: Overview of IIS 7.0 Application Server.
Module 12 Upgrading from Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010.
IS 4506 Establishing Microsoft SMTP Service.  Overview Introduction to Microsoft SMTP Service SMTP Service features SMTP administration interface SMTP.
NetTech Solutions Microsoft Outlook and Outlook Express Lesson Four.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Purpose  The purpose of the cross box handoff feature is to make the.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Transfer of Information Features: Carbon-Copy Sender DCR SMTP Notification.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 DeSCA (Device Specific Conversation Attributes)  List of named props.
Draft-lemonade-imap-submit-00.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message.
1] MTNL ID user with/without static IP
Cisco Unity Connection 2.0 Phone View Configuration
IIS.
(Includes setup) FAQ ON DOCUMENTS (Includes setup)
Smart Personal Console (SPC)
(Includes setup) FAQ ON DOCUMENTS (Includes setup)
Presentation transcript:

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 VMO and SMTP TOI Aaron Belcher

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 2 VMO for Unity Connection Similarities  Works with Outlook 2003 and  Same user interface you know and love from Unity.  Same media player with same features speed control slider, pause, location slider, accessibility hotkeys, ect..  Same features set including secure messaging and Trap record/playback.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 3 VMO for Unity Connection differences  Secure messaging and Trap record/playback uses HTTPS  Newer more modern setup.  SMTP routing improvements to work around Outlook’s address books. No need for duplicate entries like “John Doe” and “John Doe – Voic ” (Discussed in detail in the next slide.)

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 4 End user difference between Unity and Unity Connection’s Integrated messaging model.  In Unity Integrated messaging users have two entries in the directory. The user has to pick the correct one so the message shows up in the voice mailbox. For example, “Aaron Belcher” and “Aaron Belcher – Voic ”  In Unity Connection we don’t modify the directory so there is only one “Aaron Belcher”. The message is sent to the correct mailbox by using the correct account to send the message. If client sends the message through the corporate account the message ends up in the corporate box. If client sends the message through the voic account it ends up in the voice mailbox.  This model is mostly transparent to end users, because clients default to sending forwards and replies to a messages through the account the message arrived in, so forwards and replies to voic s end up as voic s.  The model is also transparent to end users when generating new voice messages from the client. In order to generate a new voic end users have to use VMO and VMO sends all messages through the voic account.  If the user chooses someone from the directory who isn’t a voic user, the message will either end up being NDR’d or delivered to the recipient’s corporate mailbox.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 5 New concepts to support addressing messages from clients.  SMTP Proxy addresses: Additional SMTP addresses that each subscriber can have. Message sent to either the subscribers primary or proxy addresses are delivered to the subscriber’s mailbox. The subscriber’s SMTP proxy addresses usually match the subscriber’s corporate addresses. Examples:  Message Actions: Configures how the system handles messages of specific types. Types: Voic , , Fax, Delivery and Receipts. Actions: Accept the Message, Relay the message, or reject the message. SMTP Proxy addresses and Message Actions are per subscriber settings that can be configured in build with Bulk Edit or Bulk Administration Tool.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 6 New server settings to support receiving s through SMTP  System Settings->SMTP Configuration->Server – Allow Connections From untrusted IP Addresss: If it is enabled, SMTP connections are allowed from any IP addresses. (Trusted IP addresses are ones specifically allowed in the access list, authentication and TLS is never required from them.) – Require Authentication from Untrusted IP addresses: If it is enabled, we require for the SMTP “Auth Login” command to complete successfully before we allow the connect to send a message. –Transport Layer Security From untrusted IP Addresses: Required: If the connection doesn’t use TLS, the server will not allow it to authenticate Optional: The server will allow in either TLS or a none TLS connections (Recommended) Disabled: The server doesn’t offer TLS.  System Settings->General Configuration “When a recipient can not be found”: “Send a non-deliverable receipt”: When this option is selected the connection server sends an NDR when the recipient can’t be found “Relay message to smart host”: When this option is selected and the recipient is not found the message is sent to the smart host to be delivered to that recipient. This is usually done so it can be delivered to a remote user’s mailbox.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 7 Addressing and Messaging Routing flow If authentication is turned off and the sender doesn’t have an SMTP address in our system this will fail and the message will be sent to badmail. If the recipient doesn’t have a proxy address we NDR it by default. There is also an option to forward messages to unknown recipients on to the smart host to be delivered in their accounts... There are also message handling properties that can reject, relay, or accept messages based on message types. Reject: NDR’s Relay: Sends message to different address. Accept: Adds it to mailbox. For example, a user may want messages and NDR’s in their corporate account instead. If authentication is turned on then the sender is checked here.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 8 None-VMO Client

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 9 None-VMO Clients  Same features as 2.X UCXN.  Plus ability to “reply to” and “forward” a voic with Text and additional attachments  More limited then VMO: no secure messaging, no TRAP, ect...

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 10 Deploying VMO and None-VMO clients  Create proxy addresses for each users corporate address with either the Bulk Administration Tool or Bulk Edit.  Turning on the “allow access from untrusted IP addresses” option.  Setup a custom keypad mapping that allows users to list the messages attachment over the telephone if they exists.  Setup an IMAP and authenticated SMTP connection back to the server on each client.  Install VMO if using Outlook and it’s desired.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 11 Miscellaneous Trouble shooting Tips…  VMO traces: Enable:Tools->ViewMail for Outlook Options->Diagnostic tab (Check all boxes.) Can be collected in: %ALLUSERSPROFILE%\Application Data\Cisco Systems\VMO\1.0\Logs  Server side traces: Service: “Connection SMTP Server”, Component: “SMTP”, (All traces) Service: “Connection Message Transfer Agent”, Component: “MTA” (All traces)  Common issues: 1.Symptom: SMTP messages stay in the outbox. Causes: –The sender doesn’t match a SMTP proxy address or primary SMTP address of a subscriber. –The message is larger then the max message size in the SMTP server configuration (defaults to 10 megs). –The address of the SMTP server is incorrect or blocked by firewal. Trouble shooting: Hit the send/receive button in Outllook. It will include the SMTP error. Turn on the SMTP logs and the server and view them. 2.Symptom: VMO form doesn’t appear after an install. Cause: –The Outlook process may not have exited. –Only new messages will be marked with the form. –The VMOExchangeExtension has been disabled by Outllook. Lookin in Help->About Microsoft Office Outlook->Disabled Items.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 12