© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Partitions & Search Spaces TOI Aaron Belcher.

Slides:



Advertisements
Similar presentations
How to Use Stowe School District
Advertisements

Virtual LANs.
Dexter Team IPv6 in Connection 8.5.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 VMO and SMTP TOI Aaron Belcher.
Using Your Voic M6 Release 7.1Business Feature Set Default Menu Options Revised August 31, 2007 TR
© 2006 Cisco Systems, Inc. All rights reserved.1 TOI Cisco Unity 8.0(3)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 W. Schulte Chapter 5: Inter-VLAN Routing Routing And Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
© 2008 Cisco Systems, Inc. All rights reserved.CIPT1 v6.0—4-1 Enabling Single-Site On-Net Calling Implementing Call Coverage in Cisco Unified Communications.
Welcome u How to use your Phone Effectively u Telephone Features u Voice Messaging Features.
How to Get The Most Out of Outlook 2003 Michele Schwartzman Division of Customer Support Summer 2006.
Welcome u How to use your Phone Effectively u Telephone Features u Voice Messaging Features.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Unity Connection 7.0 Directory Integration TOI Manoj Agrawal
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
1 © 2001, Cisco Systems, Inc. All rights reserved. Voice Connector Features Voic Interoperability – 4.0(5) Voice Connector features Rahul Singh.
Snippet Management The following screens demonstrate how to: 1. Access and view snippets 2. Create a local standard snippet, or a local class snippet 3.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2012 Cisco and/or its affiliates. All rights reserved. 1 Tenant Partitioning.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
© 2006 Cisco Systems, Inc. All rights reserved. CUDN v1.1—4-1 Designing VPIM Solutions Migrating Voice Mail to Unified Messaging and Interoperability.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Backup, Restore, and Server Replacement Josh Rose UCBU Software Engineer.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing And Switching.
ClearPath Hosted MVP Web Portal 1. Log In Page Users are able to access the Web Portal by using their assigned user name and password. Access Web Browser.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
© 2013 Cisco System Inc. All rights reserved Cisco Confidential 1 © 2013 Cisco System Inc. All rights reserved. 1 Allow System Distribution Lists to be.
9/8/20151 Voice Mail Training for State Employees Presented by: Stacy Knickerbocker Telecommunications Specialist DOA/ITSD/NTSB
Features and Applications for Multisite Deployments
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Unity Connection 2.0 VUI Troubleshooting Mike Maas, Unified Communications.
Maysville Community and Technical College IP Phone and Voice Mail Training.
© 2008 Cisco Systems, Inc. All rights reserved.CIPT1 v6.0—5-1 Implementing Media Resources, Features, and Applications Integrating Cisco Unified Communications.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Confidential Configuring Attendant Console.
Understanding Call Pickup
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
Missed Call Notification Unity Connection 11.0
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 VUI Directory Handler Ben Shanfelder UCBU Software Engineer.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialMinFin IPT Phase 2 1 Unity Connection ViewMail for IBM Lotus Notes Release 7.1(2) TOI.
1 © 2002, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Key differences between Cisco Unity Connection and Cisco Unity Manjit.
Contact Manager / Client Connect. Contacts vs. Prospects? LPS Real Estate Group2 Formerly in Paragon 4, Contacts where either a general contact or considered.
Welcome u How to use NCAR’s telephone system u Telephone Features u Voice Messaging Features.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Unity Connection 7.1 Accept and Relay Aaron Belcher.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Unity Connection 2.0 Phone View Troubleshooting Mike Maas, Unified.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Digital Networking TOI David Smith
© 2006 Cisco Systems, Inc. All rights reserved.1 Connection 7.0 Serviceability Reports Todd Blaisdell.
© 2013 Cisco System Inc. All rights reserved Cisco Confidential 1 © 2013 Cisco System Inc. All rights reserved. 1 February 14, 2014 Unity Connection Legal.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 New Call Sender Feature  There is now a second live reply option in.
1 © 2003, Cisco Systems, Inc. All rights reserved. Proprietary and Confidential Unity Connection 7.0(1) Messaging Redundancy TOI July 2008 Jane Rygg
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Lucas TOI – CUC Upgrade and Rollback Monica Price Cohen.
1 © 2005 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Public Cisco Unity Connection Notification Jane Rygg Core Services.
Welcome u How to use the new NCAR telephone system u Telephone Features u Voice Messaging Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Unity Connection 2.0 Phone View Usage Mike Maas, Unified Communications.
Unity 5.0 TOI. © 2006 Cisco Systems, Inc. All rights reserved.2 Logging changes Licensing changes 144 port support Michael McCann
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 Multicasting within UCS Qiese Dides.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Purpose  The purpose of the cross box handoff feature is to make the.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Three Managing Recipients.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Transfer of Information Features: Carbon-Copy Sender DCR SMTP Notification.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 DeSCA (Device Specific Conversation Attributes)  List of named props.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Unity 5.0 Update Consultants Briefing March 30, 2007 Todd Tatum UCBU.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 UC 7.0 Install and Upgrade Changes TOI Josh Rose UCBU Software Engineer.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
UC Pro Troubleshooting Guide
Cisco Call Manager Attendant Console
Configuring Attendant Console
Virtual LANs.
Introduction of z practice-questions.html.
Voice User Interface Voice Directory Cisco Unity Connection 1.2
Cisco 7841 End User Training
Unity Connection 7.0 Addressing Priority Lists (APL)
Unity Connection 7.0 Dispatch Messages
Presentation transcript:

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Partitions & Search Spaces TOI Aaron Belcher

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 2 Overview This feature is an attempt to create a grouping mechanism for Unity Connection that maps to CUCM's call search space and route partition features. CUCM object to corresponding CUC object:  route partition -> partition  call search space -> search space

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 3 Partitions:  Addressable objects are assigned to a primary partition. The primary partition contains the object and the objects primary extension.  Subscribers can also have alternate extensions in other partitions called alternate partitions. The alternate partition contains the subscriber and the subscribers alternate extension.  When an object is created it is assigned to the search space and partition of the template if one is used or the system default settings when a template wasn’t used.  Alternate extensions are always create in the primary partition of the subscriber, but the administrator can move them to a different partition.  All the extensions within a partition must be unique.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 4 Search Space usage:  Search spaces limit the objects that a caller or logged in subscriber can see in the system.  The search space’s partition order is used in a numeric search to decided on a single, unique match.  These objects have search spaces: Subscribers, Directory Handlers, Call Handlers, VPIM Locations, Subscriber Templates, and System Call Handler Templates.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 5 Searches using Search Spaces  When Unity Connection searches for an extension, caller id, or forwarding id it looks through the search space's partition list in order until it finds a primary or alternate extension that matches.  When Unity Connection performs other types of searches it returns all objects that are in the search space's partition list that match the search criteria.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 6 Search space of the call concept:  Each call is assigned a search space by the routing rule. These search spaces are used when matching the caller/forwarding ID to a subscriber, when a caller tries to sign in, or when a caller enters an extension in a call handler.  The search space of the call is changed when the caller hits a call handler with a different search space. The search space of the call can only be changed by a routing rule or a call handler. The search space of the call is not changed when a user logs in or a directory handler with a different search space is used.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 7 Subscribers and Search Spaces While a subscriber is logged into either the TUI, VUI and CPCA, all searches that a subscriber does use the subscribers search space. The subscribers search space is also used when searching for recipients while a message is delivered. If the recipient isn’t in the search space an NDR is created. During message deliver, we only check the search space membership of top level recipients. We don’t check each member of a distribution list.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 8 Handlers and Search Spaces  Directory handlers can be configured to use either the call’s search space or a specific search space to scope its searches.  Call Handlers can be configured to either change the search space of the call, or inherit the calls search space. The search space of the call is used in the call handler when doing extension based searches or signing in.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 9 Other objects and Search Spaces  VPIM Locations: A VPIM locations search space is used for matching incoming VPIM messages from the sending VPIM Location to extensions.  Routing Rules: When a routing rule is matched, the routing rule’s search space is set to be the search space of the call.  Templates: When an object is created using a template the object is created with the templates search space.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 10 Deleting a partition To delete a partition it must be empty. If you try to delete a partition that is in use you will get an error. You can look at each object using the “Limit the Search to” “partition” option. Here is a list of objects: subscriber (Check the Display and Alternate Extensions radio button), contacts, VPIM locations, System Call Handlers, Interview Handlers, and Directory Handlers.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 11 Deleting a search space: When an administrator deletes a search space the administrator is asked to select a replacement search space. All objects assigned to use the original search space, will be assigned to use the replacement search space, and the original search space will be deleted. There will be a log file called SearchspaceRemovalLog.txt describing what happened during this operation.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 12 Advanced Searches using Search Spaces When Unity Connection is doing a search using the VPIM location’s “dtmf access id” plus “VPIM Remote Mailbox Number” or Vui’s “Contact’s name or VPIM Remote Mailbox Number ” at “VPIM location’s name” syntax the VPIM’s locations partition membership is checked. Then all contact’s associated with the VPIM location that match the “VPIM Remote Mailbox Number” or “Contacts name” are returned regardless of their partition membership. For example, if you have a VPIM location with the “Seattle” name and a dtmf access id of 8256, then these searches will all work if the VPIM location is in a partition in the current search space: , “Aaron Belcher” at “Seattle” and “3071” at “Seattle”

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 13 Using Search Spaces to Restrict access to contacts. If the customer want’s to restrict the contacts that a subscriber can access, they should:  1. Not add the VPIM locations partition to the subscriber’s search space. (This affectively, disabled the dtmfaccessid and “at” VUI syntax.  2. Assign the contacts that the subscriber can access to a partition in the subscribers search space.  3. Assign the contacts that the subscriber can’t access to a partition outside of the subscribers search space.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 14 Deployment Recommendation’s for multi-site deployments.  Create one partition for globally unique numbers on each server.  Create one partition for each site homed on each server or rename the default partition.  Create one search space per site or rename the default search space.  Add the site’s partition followed by a globally unique partition’s to it’s search space.  Assign all the subscribers to corresponding partition/search space.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 15 Configuring dial plan with CUCM: 1.Unique outdial numbers: Create a hunt pilot per site on CUCM Create a routing rule to match the hunt pilot and assign the search space of the call to associated site. For transfers and outdials always use the unique number outdial number… 2.Per site/voic ports. Create a set of voic ports per site on CUCM Create a switch on Unity Connection per set of voic ports Create a routing rule to match the switch and assign the search space of call to the site.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 16 Trouble shooting Tips…  Reports: Dial Plan Report Dial Search Scope Report  Traces: Generic trouble shooting: Service “Connection Conversation Manager”, Macro Trace: “Call Flow Diagnostics->Conversation Flow Diagnostics” Micro Trace: Component CDE, 04 Search Space Troubleshooting NDRs: Service: “Connection Message Transfer Agent”, Micro Trace: Component MTA, all flags

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 17 Common Issue 1: Can’t find remote Users  Issue: A networking node was added but users can’t find remote users.  Solution: Add the remote partitions to the local search space once replication has completed.  Diagnostics: Conversation Manager

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 18 Common Issue 2: User can’t login  Issue: A user can’t log in over the TUI.  Solution: Make sure the routing rule is pointing to call search space that include the subscriber  Diagnostics: Conversation Manager

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 19 Common Issue 3: NDR’s from VPIM  Issue: NDR’s from VPIM  Solution: Make sure that the recipient’s extension is in a partition that is in the search space of the VPIM Location.  Diagnostics: MTA

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 20