User`s guide

Contents xiii
Standard 1.0 System Administration Guide January 1998
Section B: Adding remote voice users 9-11
The Add Remote Voice User screen. . . . . . . . . . . . . . . . . . 9-12
Adding remote voice users through User Administration. . 9-17
Recording a personal verification for a remote voice user . 9-19
Adding temporary remote voice users using RVU
Propagation via Enterprise Networking . . . . . . . . . . . . . . . 9-21
Adding remote voice users using RVU Propagation via
Bulk Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-24
Section C: Finding remote voice users 9-27
Accessing the Find Remote Voice Users screen. . . . . . . . . 9-28
The Find Remote Voice Users screen. . . . . . . . . . . . . . . . . 9-29
Wildcard characters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-32
Finding, listing, and printing remote voice users . . . . . . . . 9-34
Section D: Modifying and deleting remote voice users 9-39
Viewing and modifying remote voice users . . . . . . . . . . . . 9-40
Manually deleting remote voice users. . . . . . . . . . . . . . . . . 9-45
How temporary remote voice users are automatically
deleted from the system. . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-49
10 Directory entry users 10-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2
What is a directory entry user? . . . . . . . . . . . . . . . . . . . . . . 10-3
The Add Directory Entry User screen. . . . . . . . . . . . . . . . . 10-4
Adding directory entry users. . . . . . . . . . . . . . . . . . . . . . . . 10-7
Recording a personal verification . . . . . . . . . . . . . . . . . . . . 10-8
The Find Directory Entry Users screen. . . . . . . . . . . . . . . 10-10
Finding directory entry users. . . . . . . . . . . . . . . . . . . . . . . 10-12
The List of Directory Entry Users screen . . . . . . . . . . . . . 10-13
Printing directory entry users . . . . . . . . . . . . . . . . . . . . . . 10-15
Viewing or modifying directory entry users . . . . . . . . . . . 10-16
Deleting directory entry users . . . . . . . . . . . . . . . . . . . . . . 10-18
11 Distribution lists 11-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-2
Understanding distribution lists . . . . . . . . . . . . . . . . . . . . . 11-3
Limitations on distribution lists. . . . . . . . . . . . . . . . . . . . . . 11-4
Accessing the Distribution Lists softkeys screen . . . . . . . . 11-7