Forwarding voicemails between clusters

We have 2 separate clusters. We need to forward voice mails to users on the other cluster. Is there a way to do this, besides unified messaging and forward via emails? Thanks.

There's no way to forward a users personal voice mail.
The solution you mentioned works - creating a work group for each agent and using over flow. Why don't you do that for the all the agents? That could get out of had if yo had a lot of agents.
The best solution, if possible, is not to use personal voice mail but to use group voice mail. If it really is a situation where another person could handle the voice mail.
Another solution would be to train agents to update their voice mail message before they leave to let callers know they are gone.

Similar Messages

  • Transfer voicemails between seperate cue's

    Hello netpro!
    What is needed to transfer voicemails between 2 cisco unity expresses ?
    The customer has 2 sites with separate cme’s and cue's, but there is a wan connection between the sites.
    For the cme’s, it is already configured to transfer calls between the sites, but they would like the ability to transfer voicemails from one extension to another extension on the other cme/cue.
    CME version : 8.6
    CUE : 7.3
    Thank you in advance

    If there is no WAN there is no way to do it outside of forwarding from email client, if you had WAN connection you could integrate them via VPIM.
    HTH,
    Chris

  • Conferencing between clusters

    need some haelp have 2 cucm clusters a 6.1.5 and a 9.1.1 have 40 sites on new cluster 100 on old cluster they all work fine for dn pstn etc.
    we have ict trunks in between as part of the migration to new cluster if we conference on either cluster that is phones on new or old cluster that all works fine but when we conference between clusters it dosent work dial plan si sine as far as we can see just wondering if anyone knows how cross cluter conferencing works i have involved tac and they said on the ict enable mtp which i did and reset the trunks still dosent work.....
    Any ideas ???????????
    MRGL and MRG are sufficent on each cluster

    Yes, it does work, it comes down really to MRG/MRGL on all devices that require it.
    No special config, it will work the same as if this was a PSTN call. Same logic applies.
    HTH
    java
    if this helps, please rate
    www.cisco.com/go/pdihelpdesk

  • Replication between clusters

    I've seen the code examples for replication between clusters, while in my view, that's really should be a feature provided by coherence. Customers always feel amazing that have to be done by coding:( . Does coherence have any plan to provide that feature?
    thanks,
    michael

    Have a look at the new incubator area: http://coherence.oracle.com/display/INCUBATOR/Home
    Regards, Paul

  • Difference between Clustering and Load balancing

              What is the difference between Clustering and Load balancing?
              For example, We use Cisco Arrowpoint to do load balancing and it works fine for 3
              Sun solaris boxes/WebLogic 6.1 SP1.
              So what is the value addition to buy clustering license?
              Thanks
              Selvaraj
              

    Hi.
              Among other things, clustering allows you to share app data (such as http session
              data) across cluster members, allowing you to failover should one cluster member
              crash.
              If your app is stateless then this doesn't mean much - load balancing alone would
              probably be ok for you.
              Regards,
              Michael
              Selvaraji wrote:
              > What is the difference between Clustering and Load balancing?
              >
              > For example, We use Cisco Arrowpoint to do load balancing and it works fine for 3
              > Sun solaris boxes/WebLogic 6.1 SP1.
              >
              > So what is the value addition to buy clustering license?
              >
              > Thanks
              >
              > Selvaraj
              Michael Young
              Developer Relations Engineer
              BEA Support
              

  • What are differences between clustering and partitioning?

    Thank you for reading my post
    Can some one let me know what is different between clustering and partitioning?
    What i think is as follow:
    In clustering we have one storage (one hard disk for example) and several instances which use that storage to server the applications
    in partitioning, we have multiple instances and each of them has its own storage (hard disk) but all of these instances and hard disks serve one application.

    The word "cluster" has different meanings in Oracle.
    Another kind of cluster is a database object where
    master and detail rows are stored together in the
    same block. Table joins are very efficient, but
    reading data from one table and not another tends to
    take longer. These kinds of clusters are vary rarely
    used.Do not forget single table sorted hash cluster!

  • Wat is the exact differences between clustered table and pooled table

    hi,
       can you tell me ravi...wat is the exact differences between clustered table and pooled table
    with regards//
    anilreddyg

    Hi Anil Reddy
    Pooled Tables, Table Pools, Cluster Tables, and Table Clusters
    These types of tables are not transparent in the sense that they are not legible or manageable directly using the underlying database system tools. They are managed from within the R/3 environment from the ABAP dictionary and also at runtime when they are loaded into application memory.Pool and cluster tables are logical tables. Physically, these logical tables are arranged as records of transparent tables. The pool and cluster tables are grouped together in other tables, which are of the transparent type. The tables that group together pool tables are known as table pools, or just pools; similarly, table clusters, or just
    clusters, are the tables which group cluster tables.Not all operations that can be performed over transparent tables can be executed over pool or cluster tables.
    For instance, you can manage these tables using Open SQL calls from ABAP, but not Native SQL.These tables are meant to be buffered and loaded in memory, because they are commonly used for storing internal control information and other types of data with no external (business) relevance. SAP recommends that tables of pool or cluster type be used exclusively for control information such as
    program parameters, documentation, and so on. Transaction and application data should be stored in transparent tables.
    Table Pools
    From the point of view of the underlying DBMS as from the point of view of the ABAP dictionary, a table pool is a transparent table containing a group of pooled tables which, when created, were assigned to this table pool.
    Field Type Description
    TABNAME CHAR(10) Table name
    VARKEY CHAR(n) Maximum key length n =< 110
    DATALN INT2(5) Length of the VARDATA record returned
    VARDATA RAW(m) Maximum length of the data varies according to DBMS
    Table Clusters
    Similarly to pooled tables, cluster tables are logical tables which, when created, are assigned to a table cluster. Therefore, a table cluster, or just cluster, groups together several tables of type clusters.Several logical rows from different cluster tables are brought together in a single physical record. The records
    from the cluster tables assigned to a cluster are thus stored in a single common table in the database.A cluster contains a transparent cluster key which must be located at the start of the key of all logical cluster tables to be included in the cluster. As well, a cluster contains a long field (VARDATA), which contains the
    data of the cluster tables for this key. If the data does not fit into a field, continuation records are created.
    Field Type Description
    CLKEY1 CHAR(*) First key fields
    CLKEY2 CHAR(*) Second key field
    CLKEYN CHAR(*) nth key field
    PAGENO INT2(5) Number of the next page
    TIMESTMP CHAR(14) Time stamp
    PAGELG INT2(5) Length of the VARDATA record returned
    VARDATA RAW(*) Maximum length of the data section; varies according to database system
    Working with Tables
    The dictionary includes many functions for working with tables. There are five basic operations you can perform on tables: display, create, delete, modify, copy. Please do not confuse displaying a table with displaying the table entries (table contents). In order to display a table, it must previously exist; otherwise the system will display an error message in the status bar. For the following example, the table TABNA is used. To display this table, from the main dictionary screen, enter the table name in the Object name
    input field with the radio button selected next to Tables. Then, click on the Display button at the bottom of the screen, or press the F7 function key, or, alternatively,
    select Dictionary object Display from the menu.
    In this screen, you can see table information such as
    ¨ Table type, shown next to the name of the object. In the example, it is a transparent table.
    ¨ Short text description.
    ¨ Name of the user who made the last change, and the date of the change.
    ¨ Master language.
    ¨ Table status. On the screen, you can see this table is saved and active.
    ¨ Development class. For information on development classes, refer to Chap. 6.
    Delivery class, which sets the maintenance group for the table. It controls how tables will behave during client copy procedures, upgrades, and so forth.¨
    Tab. Maint. Allowed flag, which indicates whether you can generate a screen for maintaining table entries.
    ¨Then, on the lower part of the screen, you can see the table fields with all associated characteristics such as:
    ¨ Field name.
    ¨ Key indicator. When set, this field is the primary key, or part of it.
    ¨ Data element.
    ¨ Basic data type.
    ¨ Length.
    ¨ Check table.
    ¨ Short text, describing the field.
    Additional information about the table can be displayed by selecting the corresponding functions from the menu or directly from the application toolbar, such as keys, indexes, or technical settings
    Standard table:
    The key access to a standard table uses a sequential search. The time required for an access is linearly dependent on the number of entries in the internal table.
    You should usually access a standard table with index operations.
    Sorted table:
    The table is always stored internally sorted by its key. Key access to a sorted table can therefore use a binary search. If the key is not unique, the entry with the lowest index is accessed. The time required for an access is logarithmically dependent on the number of entries in the internal table.
    Index accesses to sorted tables are also allowed. You should usually access a sorted table using its key.
    Hash table:
    The table is internally managed with a hash procedure. All the entries must have a unique key. The time required for a key access is constant, that is it does not depend on the number of entries in the internal table.
    You cannot access a hash table with an index. Accesses must use generic key operations (SORT, LOOP, etc.).
    Index table:
    The table can be a standard table or a sorted table.
    Index access is allowed to such an index table. Index tables can be used to define the type of generic parameters of a FORM (subroutine) or a function module.
    Just have a look at these links:
    http://help.sap.com/saphelp_nw04/helpdata/en/90/8d7304b1af11d194f600a0c929b3c3/frameset.htm
    http://help.sap.com/saphelp_nw04/helpdata/en/74/83015785d811d295a800a0c929b3c3/frameset.htm
    Regards
    Sreeni

  • Forwarding voicemails individually

    I have a new iPhone 3G running the new OS 3.0. For business, I need to forward individual voicemails periodically to my wife for her to handle. I can't figure out how to do that on this phone. What I'm looking for is a way to make a quick verbal comment like, "please call this person", then send that with the voicemail to her phone.
    Any suggestions?

    Visual voicemail messages are downloaded to the iPhone from AT&T servers, and other phones that support visual voicemail are few and far between which does not include any "dumb" phones, which access voicemail the old fashioned way - by accessing the carrier's server by calling.
    Copied from my first post in this thread.
    I don't know if AT&T provides for this when checking voicemail the old fashioned way.
    Try accessing your voicemail the old fashioned way to see if AT&T includes an option to forward a voicemail message on their server to another phone.

  • CUCME 8.6 Call not forwarding Voicemail

    Hi frieds,
         In our office we are using  CUCME 8.6 on Cisco 2951 and unity express 8.5 in ISM module. As per our configuration  whenever user is busy or not answering , the call will forward to voicemail. Totally we have 24 PSTN line. So we have an additional gateway 2901. The Issue I’m facing is that, when a PSTN incoming call coming through the second gateway(2901), if the extension is busy or not answering the call is disconnecting instead of forwarding to voicemail.
    My 2951 configurations
    voice service voip
    ip address trusted list
    ipv4 172.16.19.80
    ipv4 172.16.19.81
    allow-connections h323 to h323
    allow-connections h323 to sip
    allow-connections sip to h323
    allow-connections sip to sip
    fax protocol t38 version 0 ls-redundancy 0 hs-redundancy 0 fallback none
    sip
    bind control source-interface GigabitEthernet0/1
    bind media source-interface GigabitEthernet0/1
    registrar server.
    Dial peer we are using for voice mail:
    dial-peer voice 99 voip
    destination-pattern 1099
    session protocol sipv2
    session target ipv4:172.16.19.81
    dtmf-relay sip-notify
    codec g711ulaw
    no vad.
    2901 Configurations
    voice service voip
    ip address trusted list
      ipv4 172.16.19.80
      ipv4 172.16.19.81
      ipv4 172.16.19.82
    allow-connections h323 to h323
    allow-connections h323 to sip
    allow-connections sip to h323
    allow-connections sip to sip
    fax protocol t38 version 0 ls-redundancy 0 hs-redundancy 0 fallback none
    dial-peer voice 99 voip
    destination-pattern 1099
    session protocol sipv2
    session target ipv4:172.16.19.81
    dtmf-relay sip-notify
    codec g711ulaw
    no vad
    ============================
    Debug CCSIP Calls
    Dec 15 15:23:23.448: //37497/8FD56BBAA9EA/SIP/Call/sipSPICallInfo:
    The Call Setup Information is:
    Call Control Block (CCB) : 0xAF40FD8
    State of The Call        : STATE_DEAD
    TCP Sockets Used         : YES
    Calling Number           : 5000
    Called Number            : 1099
    Source IP Address (Sig  ): 172.16.19.80
    Destn SIP Req Addr:Port  :
    Destn SIP Resp Addr:Port :
    Destination Name         :
    Dec 15 15:23:23.448: //37497/8FD56BBAA9EA/SIP/Call/sipSPIMediaCallInfo:
    Number of Media Streams: 1
    Media Stream             : 1
    Negotiated Codec         : No Codec
    Negotiated Codec Bytes   : 0
    Nego. Codec payload      : 255 (tx), 255 (rx)
    Negotiated Dtmf-relay    : 0
    Dtmf-relay Payload       : 0 (tx), 0 (rx)
    Source IP Address (Media): 172.16.19.80
    Source IP Port    (Media): 25364
    Destn  IP Address (Media):  -
    Destn  IP Port    (Media): 0
    Orig Destn IP Address:Port (Media): [ - ]:0
    Dec 15 15:23:23.448: //37497/8FD56BBAA9EA/SIP/Call/sipSPICallInfo:
    Disconnect Cause (CC)    : 47
    Disconnect Cause (SIP)   : 200
    For your reference I here attach a network diagram
    What the command which I missed?

    Check License status on your CUE, I had same issue.. Finally figured out its about license.. sh license status
    Sent from Cisco Technical Support iPhone App

  • How to make ASR9000 bridge domain forward traffic between sub interfaces of same physical interface?

    Hi,
    I regularly use bridge domains to connect sub interfaces on different vlans using this sort of configuration:
    interface GigabitEthernet0/0/0/5.21 l2transport
    description CUSTOMER A WAN
    encapsulation dot1q 21
    rewrite ingress tag pop 1 symmetric
    interface GigabitEthernet0/0/0/10.3122 l2transport
    description CUSTOMER A CORE
    encapsulation dot1q 3122
    rewrite ingress tag pop 1 symmetric
    l2vpn
    bridge group WANLINKS
      bridge-domain CUSTOMERA
       interface GigabitEthernet0/0/0/5.21
       interface GigabitEthernet0/0/0/10.3122
    When I try to use the same method to bridge two sub interfaces on the same physical interface so as to create a L2 VPN no data flows:
    interface GigabitEthernet0/0/0/5.21 l2transport
    description CUSTOMER A WAN
    encapsulation dot1q 21
    rewrite ingress tag pop 1 symmetric
    interface GigabitEthernet0/0/0/5.22 l2transport
    description CUSTOMER A WAN2
    encapsulation dot1q 22
    rewrite ingress tag pop 1 symmetric
    l2vpn
    bridge group WANLINKS
      bridge-domain CUSTOMERA
       interface GigabitEthernet0/0/0/5.21
       interface GigabitEthernet0/0/0/5.22
    If I add a BVI interface to the bridge domain then the CE devices at the remote end of the WAN interface can both ping the BVI IP but they remain unable to ping each other.
    Is this because tag rewrites are not happening since packets don't leave the physical interface?
    How can I work around this and establish a L2 connection between the two subinterfaces?
    Thank you

    a vlan is usually the equivalent of an l3 subnet, so linking 2 vlans together in the same bridge domain, likely needs to come with some sort of routing (eg a BVI interface).
    If these 2 vlans are still in the same subnet, then there is still arp going on, from one host to the other that traverses the bD.
    you will need to verify the state of the AC, the forwarding in the BD and see if something gets dropped somewhere and follow the generic packet troubleshooting guides (see support forums for that also).
    that might give a hint to what the precise issue in your forwarding is.
    regards
    xander

  • Data affinity between clusters separated via WAN

    Hi,
    I need your help, again! :)
    In the scenario where I have two clusters separated via WAN, I want to know if it is possible to create data affinity to each cluster.
    That is, this scenario is not the same as Push Replication Pattern solve, because I want to avoid the data management conflict between the updates on the both clusters. If I create data affinity to each cluster, the Cluster A is responsible for data objects X and Y (and the same data object in the other cluster is considered as secondary/backup) and Cluster B is responsible for data objects W and Z (also has a backup on Cluster A).
    Thanks.
    Regards,
    André

    Hi ggleyzer,
    Thanks for the help.
    But, how can I routing different keys to different caches, if I want to have two clusters with the same information and caches due to possible disaster recover scenario?
    The scenario that I imagine is almost the same as Push Replication Pattern - Active-Active. (http://coherence.oracle.com/display/INCUBATOR/Auction+Site+Demo+1.0.0)
    I want to have 2 Clusters (e.g. "A" and "B") and have exactly the same information in each one. However, I want to create affinity of objects to each Cluster, for example, the objects X and Y are processed by "ClusterA" (even the request arrive to "ClusterB") but still have of copy of them in "ClusterB" (X' and Y', just for the case of disaster). So: can I specify the namedCache of "ClusterA" to objects X and Y (having a copy of that objects on "ClusterB") and assure that all processing of this type of objects are done by "ClusterA"?
    If it's possible, do you think that approach is more suitable than Push Replication Pattern? A problem that occurs with this pattern is the Conflit Resolver. However, I don't know which problems I will face with the other. Maybe the main disadvantage is the information crossed over the WAN, because "ClusterB" can send processing to objects that has affinity to "ClusterA".
    Thanks,
    Regards,
    André

  • Callback feature between clusters

    Hello,
    Could you please help me to make the callback feature available between two clusters using Inter-cluster trunk ?
    Thanks in advance.
    Abdelatif.

    if you have your ICT configured and operating properly, then the callBack feature only needs a few things in place to operate:
    1) css/partition of the ICT must have access on both sides to the phones/DNs that you wish to have callBack feature working for.
    2) each cluster must have the dial plan updated for all phones on each side of the ICT that wish to be able to communicate across the ICT.
    example:
    cluster1/phone1/DN=8855
    - needs a route pattern on cluster2 using the ICT as its gateway
    (ie: cluster2/routePattern=8855; gateway=ICT)
    cluster2/phone1/DN=7855
    - needs a route pattern on cluster1 using the ICT as its gateway
    (ie: cluster1/routePattern=7855; gateway=ICT)
    the cluster1 ICT needs css/partition access to the cluster2/phone1/DN=7855
    the cluster2 ICT needs css/partition access to the cluster1/phone1/DN=8855

  • Communication between Clusters Problem

    Hi all
              1. Is it possible for a bean, being hosted in a cluster to call a bean which is hosted in another cluster?
              We have a problem with the role information, which gets wrong at every second call.
              We have the following setup:
              - A cluster called "web-cluster" consists of two machines with one weblogic 9.2 server per machine.
              - We have another cluster called "ID-Cluster" with the same setup (2 Machines, 2 WLS).
              - In the "Web-Cluster" we have a bean deployed called "SecurityProxy".
              - In the "Web-Cluster" we have a Web-Application ("WebApp") deployed which use the "SecurityProxy"
              - In the ID-Cluster we have a Bean called "SecurityBean". - The SecurityProxy makes a login to the ID-Cluster with a technical user, role "techSecurityProxy".
              - Calls from SecurityProxy to SecurityBean alternate with each call.
              Problem:
              User logs in to the "WebApp" and gets role "customer" associated.
              First call from SecurityProxy to SecurityBean: call is done with the correct role "techSecurityProxy" second call is done with the role "customer" !?! It seams as if the security context gets propageted...
              We have no trust defined between the clusters and we have no runas configured in den deployment descriptors. Can anyone help?

    <p>Frank, the security context is propagted between the JVM's. I have asked BEA support to specify if this can be configured or turned off to resolve another issue I have but to date I have not had a response.</p>
              <p>In your case can you not add the new principle like -useProxy to authenticated users which allows them to use the proxy once they are authenticated?</p>
              <p>
              Hussein Badakhchani
              London Middleware
              </p>

  • Shared Corporate directory between clusters

    Hello All,
    Is it possible to share a single corporate directory between two clusters, without using a 3rd party software or external server ?
    Cluster A is 8.0(3) and Cluster B is 8.6(2). I have a working intercluster trunk at this time, all 1xxx DN are on cluster B and all the 2-9xxx are on cluster A.

    Hello!
    There is no way to configure shared directory without using 3rd party software (AD as example).
    You can try to configure to use corporate directory from one cluster from another.
    Regards,
    Kirill

  • Forwarding Voicemails from user on vacation

    How can I set up a user's voicemails to forward to another workgroup or user? That's either for voicemails they already own OR for new incoming voicemails.
    Alternatively, can an administrator (or user) reassign them. (For most of our users we had actually set up a workgroup, like x[User Name]. In those cases I just set their workgroup to overflow. Unfortunately, not all of our users got set up that way.)

    There's no way to forward a users personal voice mail.
    The solution you mentioned works - creating a work group for each agent and using over flow. Why don't you do that for the all the agents? That could get out of had if yo had a lot of agents.
    The best solution, if possible, is not to use personal voice mail but to use group voice mail. If it really is a situation where another person could handle the voice mail.
    Another solution would be to train agents to update their voice mail message before they leave to let callers know they are gone.

Maybe you are looking for