User`s guide

xii Contents
Standard 1.0 System Administration Guide January 1998
Setting the default administration context for NMS . . . . . . . 8-8
Accessing the Add Local Voice User screen . . . . . . . . . . . 8-10
The Add Local Voice User screen . . . . . . . . . . . . . . . . . . . 8-13
Entering user information . . . . . . . . . . . . . . . . . . . . . . . . . . 8-15
Assigning a user to a class of service . . . . . . . . . . . . . . . . . 8-20
Primary DN and extension DNs . . . . . . . . . . . . . . . . . . . . . 8-24
The revert DN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-26
The message waiting indication DN . . . . . . . . . . . . . . . . . . 8-29
Specifying the primary DN, extension DNs,
the revert DN, and message waiting indication DN . . . . . . 8-31
Recording a personal verification for a user . . . . . . . . . . . . 8-34
Creating a remote notification schedule for a user . . . . . . . 8-36
Setting other local voice user characteristics . . . . . . . . . . . 8-39
Section B: Finding local voice users 8-45
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-46
Wildcard characters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-47
Accessing the Find Local Voice Users screen . . . . . . . . . . 8-49
The Find Local Voice Users screen . . . . . . . . . . . . . . . . . . 8-50
Restrictions on how you can combine search criteria. . . . . 8-67
Finding, listing, and printing local voice users . . . . . . . . . . 8-69
Reassigning a subset of local voice users to another
class of service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-73
Section C: Modifying and deleting local voice users 8-79
Accessing the View/Modify Local Voice User screen . . . . 8-80
Viewing and modifying a local voice user . . . . . . . . . . . . . 8-84
Checking a user’s status . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-86
Enabling a disabled mailbox . . . . . . . . . . . . . . . . . . . . . . . . 8-91
Changing a user’s password . . . . . . . . . . . . . . . . . . . . . . . . 8-93
Monitoring mailbox logins for suspected hacker activity. . 8-94
Reassigning a mailbox to another user . . . . . . . . . . . . . . . . 8-96
Deleting a local voice user . . . . . . . . . . . . . . . . . . . . . . . . . 8-97
9 Remote voice users 9-1
Section A: Introduction 9-3
What is a remote voice user?. . . . . . . . . . . . . . . . . . . . . . . . . 9-4
Remote voice user changes and enhancements. . . . . . . . . . . 9-6
Permanent remote voice users. . . . . . . . . . . . . . . . . . . . . . . . 9-8
Temporary remote voice users . . . . . . . . . . . . . . . . . . . . . . . 9-9