Forwarding voicemails between clusters
We have 2 separate clusters. We need to forward voice mails to users on the other cluster. Is there a way to do this, besides unified messaging and forward via emails? Thanks.
There's no way to forward a users personal voice mail.
The solution you mentioned works - creating a work group for each agent and using over flow. Why don't you do that for the all the agents? That could get out of had if yo had a lot of agents.
The best solution, if possible, is not to use personal voice mail but to use group voice mail. If it really is a situation where another person could handle the voice mail.
Another solution would be to train agents to update their voice mail message before they leave to let callers know they are gone.
Similar Messages
-
Transfer voicemails between seperate cue's
Hello netpro!
What is needed to transfer voicemails between 2 cisco unity expresses ?
The customer has 2 sites with separate cme’s and cue's, but there is a wan connection between the sites.
For the cme’s, it is already configured to transfer calls between the sites, but they would like the ability to transfer voicemails from one extension to another extension on the other cme/cue.
CME version : 8.6
CUE : 7.3
Thank you in advanceIf there is no WAN there is no way to do it outside of forwarding from email client, if you had WAN connection you could integrate them via VPIM.
HTH,
Chris -
need some haelp have 2 cucm clusters a 6.1.5 and a 9.1.1 have 40 sites on new cluster 100 on old cluster they all work fine for dn pstn etc.
we have ict trunks in between as part of the migration to new cluster if we conference on either cluster that is phones on new or old cluster that all works fine but when we conference between clusters it dosent work dial plan si sine as far as we can see just wondering if anyone knows how cross cluter conferencing works i have involved tac and they said on the ict enable mtp which i did and reset the trunks still dosent work.....
Any ideas ???????????
MRGL and MRG are sufficent on each clusterYes, it does work, it comes down really to MRG/MRGL on all devices that require it.
No special config, it will work the same as if this was a PSTN call. Same logic applies.
HTH
java
if this helps, please rate
www.cisco.com/go/pdihelpdesk -
I've seen the code examples for replication between clusters, while in my view, that's really should be a feature provided by coherence. Customers always feel amazing that have to be done by coding:( . Does coherence have any plan to provide that feature?
thanks,
michaelHave a look at the new incubator area: http://coherence.oracle.com/display/INCUBATOR/Home
Regards, Paul -
Difference between Clustering and Load balancing
What is the difference between Clustering and Load balancing?
For example, We use Cisco Arrowpoint to do load balancing and it works fine for 3
Sun solaris boxes/WebLogic 6.1 SP1.
So what is the value addition to buy clustering license?
Thanks
Selvaraj
Hi.
Among other things, clustering allows you to share app data (such as http session
data) across cluster members, allowing you to failover should one cluster member
crash.
If your app is stateless then this doesn't mean much - load balancing alone would
probably be ok for you.
Regards,
Michael
Selvaraji wrote:
> What is the difference between Clustering and Load balancing?
>
> For example, We use Cisco Arrowpoint to do load balancing and it works fine for 3
> Sun solaris boxes/WebLogic 6.1 SP1.
>
> So what is the value addition to buy clustering license?
>
> Thanks
>
> Selvaraj
Michael Young
Developer Relations Engineer
BEA Support
-
What are differences between clustering and partitioning?
Thank you for reading my post
Can some one let me know what is different between clustering and partitioning?
What i think is as follow:
In clustering we have one storage (one hard disk for example) and several instances which use that storage to server the applications
in partitioning, we have multiple instances and each of them has its own storage (hard disk) but all of these instances and hard disks serve one application.The word "cluster" has different meanings in Oracle.
Another kind of cluster is a database object where
master and detail rows are stored together in the
same block. Table joins are very efficient, but
reading data from one table and not another tends to
take longer. These kinds of clusters are vary rarely
used.Do not forget single table sorted hash cluster! -
Wat is the exact differences between clustered table and pooled table
hi,
can you tell me ravi...wat is the exact differences between clustered table and pooled table
with regards//
anilreddygHi Anil Reddy
Pooled Tables, Table Pools, Cluster Tables, and Table Clusters
These types of tables are not transparent in the sense that they are not legible or manageable directly using the underlying database system tools. They are managed from within the R/3 environment from the ABAP dictionary and also at runtime when they are loaded into application memory.Pool and cluster tables are logical tables. Physically, these logical tables are arranged as records of transparent tables. The pool and cluster tables are grouped together in other tables, which are of the transparent type. The tables that group together pool tables are known as table pools, or just pools; similarly, table clusters, or just
clusters, are the tables which group cluster tables.Not all operations that can be performed over transparent tables can be executed over pool or cluster tables.
For instance, you can manage these tables using Open SQL calls from ABAP, but not Native SQL.These tables are meant to be buffered and loaded in memory, because they are commonly used for storing internal control information and other types of data with no external (business) relevance. SAP recommends that tables of pool or cluster type be used exclusively for control information such as
program parameters, documentation, and so on. Transaction and application data should be stored in transparent tables.
Table Pools
From the point of view of the underlying DBMS as from the point of view of the ABAP dictionary, a table pool is a transparent table containing a group of pooled tables which, when created, were assigned to this table pool.
Field Type Description
TABNAME CHAR(10) Table name
VARKEY CHAR(n) Maximum key length n =< 110
DATALN INT2(5) Length of the VARDATA record returned
VARDATA RAW(m) Maximum length of the data varies according to DBMS
Table Clusters
Similarly to pooled tables, cluster tables are logical tables which, when created, are assigned to a table cluster. Therefore, a table cluster, or just cluster, groups together several tables of type clusters.Several logical rows from different cluster tables are brought together in a single physical record. The records
from the cluster tables assigned to a cluster are thus stored in a single common table in the database.A cluster contains a transparent cluster key which must be located at the start of the key of all logical cluster tables to be included in the cluster. As well, a cluster contains a long field (VARDATA), which contains the
data of the cluster tables for this key. If the data does not fit into a field, continuation records are created.
Field Type Description
CLKEY1 CHAR(*) First key fields
CLKEY2 CHAR(*) Second key field
CLKEYN CHAR(*) nth key field
PAGENO INT2(5) Number of the next page
TIMESTMP CHAR(14) Time stamp
PAGELG INT2(5) Length of the VARDATA record returned
VARDATA RAW(*) Maximum length of the data section; varies according to database system
Working with Tables
The dictionary includes many functions for working with tables. There are five basic operations you can perform on tables: display, create, delete, modify, copy. Please do not confuse displaying a table with displaying the table entries (table contents). In order to display a table, it must previously exist; otherwise the system will display an error message in the status bar. For the following example, the table TABNA is used. To display this table, from the main dictionary screen, enter the table name in the Object name
input field with the radio button selected next to Tables. Then, click on the Display button at the bottom of the screen, or press the F7 function key, or, alternatively,
select Dictionary object Display from the menu.
In this screen, you can see table information such as
¨ Table type, shown next to the name of the object. In the example, it is a transparent table.
¨ Short text description.
¨ Name of the user who made the last change, and the date of the change.
¨ Master language.
¨ Table status. On the screen, you can see this table is saved and active.
¨ Development class. For information on development classes, refer to Chap. 6.
Delivery class, which sets the maintenance group for the table. It controls how tables will behave during client copy procedures, upgrades, and so forth.¨
Tab. Maint. Allowed flag, which indicates whether you can generate a screen for maintaining table entries.
¨Then, on the lower part of the screen, you can see the table fields with all associated characteristics such as:
¨ Field name.
¨ Key indicator. When set, this field is the primary key, or part of it.
¨ Data element.
¨ Basic data type.
¨ Length.
¨ Check table.
¨ Short text, describing the field.
Additional information about the table can be displayed by selecting the corresponding functions from the menu or directly from the application toolbar, such as keys, indexes, or technical settings
Standard table:
The key access to a standard table uses a sequential search. The time required for an access is linearly dependent on the number of entries in the internal table.
You should usually access a standard table with index operations.
Sorted table:
The table is always stored internally sorted by its key. Key access to a sorted table can therefore use a binary search. If the key is not unique, the entry with the lowest index is accessed. The time required for an access is logarithmically dependent on the number of entries in the internal table.
Index accesses to sorted tables are also allowed. You should usually access a sorted table using its key.
Hash table:
The table is internally managed with a hash procedure. All the entries must have a unique key. The time required for a key access is constant, that is it does not depend on the number of entries in the internal table.
You cannot access a hash table with an index. Accesses must use generic key operations (SORT, LOOP, etc.).
Index table:
The table can be a standard table or a sorted table.
Index access is allowed to such an index table. Index tables can be used to define the type of generic parameters of a FORM (subroutine) or a function module.
Just have a look at these links:
http://help.sap.com/saphelp_nw04/helpdata/en/90/8d7304b1af11d194f600a0c929b3c3/frameset.htm
http://help.sap.com/saphelp_nw04/helpdata/en/74/83015785d811d295a800a0c929b3c3/frameset.htm
Regards
Sreeni -
Forwarding voicemails individually
I have a new iPhone 3G running the new OS 3.0. For business, I need to forward individual voicemails periodically to my wife for her to handle. I can't figure out how to do that on this phone. What I'm looking for is a way to make a quick verbal comment like, "please call this person", then send that with the voicemail to her phone.
Any suggestions?Visual voicemail messages are downloaded to the iPhone from AT&T servers, and other phones that support visual voicemail are few and far between which does not include any "dumb" phones, which access voicemail the old fashioned way - by accessing the carrier's server by calling.
Copied from my first post in this thread.
I don't know if AT&T provides for this when checking voicemail the old fashioned way.
Try accessing your voicemail the old fashioned way to see if AT&T includes an option to forward a voicemail message on their server to another phone. -
CUCME 8.6 Call not forwarding Voicemail
Hi frieds,
In our office we are using CUCME 8.6 on Cisco 2951 and unity express 8.5 in ISM module. As per our configuration whenever user is busy or not answering , the call will forward to voicemail. Totally we have 24 PSTN line. So we have an additional gateway 2901. The Issue I’m facing is that, when a PSTN incoming call coming through the second gateway(2901), if the extension is busy or not answering the call is disconnecting instead of forwarding to voicemail.
My 2951 configurations
voice service voip
ip address trusted list
ipv4 172.16.19.80
ipv4 172.16.19.81
allow-connections h323 to h323
allow-connections h323 to sip
allow-connections sip to h323
allow-connections sip to sip
fax protocol t38 version 0 ls-redundancy 0 hs-redundancy 0 fallback none
sip
bind control source-interface GigabitEthernet0/1
bind media source-interface GigabitEthernet0/1
registrar server.
Dial peer we are using for voice mail:
dial-peer voice 99 voip
destination-pattern 1099
session protocol sipv2
session target ipv4:172.16.19.81
dtmf-relay sip-notify
codec g711ulaw
no vad.
2901 Configurations
voice service voip
ip address trusted list
ipv4 172.16.19.80
ipv4 172.16.19.81
ipv4 172.16.19.82
allow-connections h323 to h323
allow-connections h323 to sip
allow-connections sip to h323
allow-connections sip to sip
fax protocol t38 version 0 ls-redundancy 0 hs-redundancy 0 fallback none
dial-peer voice 99 voip
destination-pattern 1099
session protocol sipv2
session target ipv4:172.16.19.81
dtmf-relay sip-notify
codec g711ulaw
no vad
============================
Debug CCSIP Calls
Dec 15 15:23:23.448: //37497/8FD56BBAA9EA/SIP/Call/sipSPICallInfo:
The Call Setup Information is:
Call Control Block (CCB) : 0xAF40FD8
State of The Call : STATE_DEAD
TCP Sockets Used : YES
Calling Number : 5000
Called Number : 1099
Source IP Address (Sig ): 172.16.19.80
Destn SIP Req Addr:Port :
Destn SIP Resp Addr:Port :
Destination Name :
Dec 15 15:23:23.448: //37497/8FD56BBAA9EA/SIP/Call/sipSPIMediaCallInfo:
Number of Media Streams: 1
Media Stream : 1
Negotiated Codec : No Codec
Negotiated Codec Bytes : 0
Nego. Codec payload : 255 (tx), 255 (rx)
Negotiated Dtmf-relay : 0
Dtmf-relay Payload : 0 (tx), 0 (rx)
Source IP Address (Media): 172.16.19.80
Source IP Port (Media): 25364
Destn IP Address (Media): -
Destn IP Port (Media): 0
Orig Destn IP Address:Port (Media): [ - ]:0
Dec 15 15:23:23.448: //37497/8FD56BBAA9EA/SIP/Call/sipSPICallInfo:
Disconnect Cause (CC) : 47
Disconnect Cause (SIP) : 200
For your reference I here attach a network diagram
What the command which I missed?Check License status on your CUE, I had same issue.. Finally figured out its about license.. sh license status
Sent from Cisco Technical Support iPhone App -
Hi,
I regularly use bridge domains to connect sub interfaces on different vlans using this sort of configuration:
interface GigabitEthernet0/0/0/5.21 l2transport
description CUSTOMER A WAN
encapsulation dot1q 21
rewrite ingress tag pop 1 symmetric
interface GigabitEthernet0/0/0/10.3122 l2transport
description CUSTOMER A CORE
encapsulation dot1q 3122
rewrite ingress tag pop 1 symmetric
l2vpn
bridge group WANLINKS
bridge-domain CUSTOMERA
interface GigabitEthernet0/0/0/5.21
interface GigabitEthernet0/0/0/10.3122
When I try to use the same method to bridge two sub interfaces on the same physical interface so as to create a L2 VPN no data flows:
interface GigabitEthernet0/0/0/5.21 l2transport
description CUSTOMER A WAN
encapsulation dot1q 21
rewrite ingress tag pop 1 symmetric
interface GigabitEthernet0/0/0/5.22 l2transport
description CUSTOMER A WAN2
encapsulation dot1q 22
rewrite ingress tag pop 1 symmetric
l2vpn
bridge group WANLINKS
bridge-domain CUSTOMERA
interface GigabitEthernet0/0/0/5.21
interface GigabitEthernet0/0/0/5.22
If I add a BVI interface to the bridge domain then the CE devices at the remote end of the WAN interface can both ping the BVI IP but they remain unable to ping each other.
Is this because tag rewrites are not happening since packets don't leave the physical interface?
How can I work around this and establish a L2 connection between the two subinterfaces?
Thank youa vlan is usually the equivalent of an l3 subnet, so linking 2 vlans together in the same bridge domain, likely needs to come with some sort of routing (eg a BVI interface).
If these 2 vlans are still in the same subnet, then there is still arp going on, from one host to the other that traverses the bD.
you will need to verify the state of the AC, the forwarding in the BD and see if something gets dropped somewhere and follow the generic packet troubleshooting guides (see support forums for that also).
that might give a hint to what the precise issue in your forwarding is.
regards
xander -
Data affinity between clusters separated via WAN
Hi,
I need your help, again! :)
In the scenario where I have two clusters separated via WAN, I want to know if it is possible to create data affinity to each cluster.
That is, this scenario is not the same as Push Replication Pattern solve, because I want to avoid the data management conflict between the updates on the both clusters. If I create data affinity to each cluster, the Cluster A is responsible for data objects X and Y (and the same data object in the other cluster is considered as secondary/backup) and Cluster B is responsible for data objects W and Z (also has a backup on Cluster A).
Thanks.
Regards,
AndréHi ggleyzer,
Thanks for the help.
But, how can I routing different keys to different caches, if I want to have two clusters with the same information and caches due to possible disaster recover scenario?
The scenario that I imagine is almost the same as Push Replication Pattern - Active-Active. (http://coherence.oracle.com/display/INCUBATOR/Auction+Site+Demo+1.0.0)
I want to have 2 Clusters (e.g. "A" and "B") and have exactly the same information in each one. However, I want to create affinity of objects to each Cluster, for example, the objects X and Y are processed by "ClusterA" (even the request arrive to "ClusterB") but still have of copy of them in "ClusterB" (X' and Y', just for the case of disaster). So: can I specify the namedCache of "ClusterA" to objects X and Y (having a copy of that objects on "ClusterB") and assure that all processing of this type of objects are done by "ClusterA"?
If it's possible, do you think that approach is more suitable than Push Replication Pattern? A problem that occurs with this pattern is the Conflit Resolver. However, I don't know which problems I will face with the other. Maybe the main disadvantage is the information crossed over the WAN, because "ClusterB" can send processing to objects that has affinity to "ClusterA".
Thanks,
Regards,
André -
Callback feature between clusters
Hello,
Could you please help me to make the callback feature available between two clusters using Inter-cluster trunk ?
Thanks in advance.
Abdelatif.if you have your ICT configured and operating properly, then the callBack feature only needs a few things in place to operate:
1) css/partition of the ICT must have access on both sides to the phones/DNs that you wish to have callBack feature working for.
2) each cluster must have the dial plan updated for all phones on each side of the ICT that wish to be able to communicate across the ICT.
example:
cluster1/phone1/DN=8855
- needs a route pattern on cluster2 using the ICT as its gateway
(ie: cluster2/routePattern=8855; gateway=ICT)
cluster2/phone1/DN=7855
- needs a route pattern on cluster1 using the ICT as its gateway
(ie: cluster1/routePattern=7855; gateway=ICT)
the cluster1 ICT needs css/partition access to the cluster2/phone1/DN=7855
the cluster2 ICT needs css/partition access to the cluster1/phone1/DN=8855 -
Communication between Clusters Problem
Hi all
1. Is it possible for a bean, being hosted in a cluster to call a bean which is hosted in another cluster?
We have a problem with the role information, which gets wrong at every second call.
We have the following setup:
- A cluster called "web-cluster" consists of two machines with one weblogic 9.2 server per machine.
- We have another cluster called "ID-Cluster" with the same setup (2 Machines, 2 WLS).
- In the "Web-Cluster" we have a bean deployed called "SecurityProxy".
- In the "Web-Cluster" we have a Web-Application ("WebApp") deployed which use the "SecurityProxy"
- In the ID-Cluster we have a Bean called "SecurityBean". - The SecurityProxy makes a login to the ID-Cluster with a technical user, role "techSecurityProxy".
- Calls from SecurityProxy to SecurityBean alternate with each call.
Problem:
User logs in to the "WebApp" and gets role "customer" associated.
First call from SecurityProxy to SecurityBean: call is done with the correct role "techSecurityProxy" second call is done with the role "customer" !?! It seams as if the security context gets propageted...
We have no trust defined between the clusters and we have no runas configured in den deployment descriptors. Can anyone help?<p>Frank, the security context is propagted between the JVM's. I have asked BEA support to specify if this can be configured or turned off to resolve another issue I have but to date I have not had a response.</p>
<p>In your case can you not add the new principle like -useProxy to authenticated users which allows them to use the proxy once they are authenticated?</p>
<p>
Hussein Badakhchani
London Middleware
</p> -
Shared Corporate directory between clusters
Hello All,
Is it possible to share a single corporate directory between two clusters, without using a 3rd party software or external server ?
Cluster A is 8.0(3) and Cluster B is 8.6(2). I have a working intercluster trunk at this time, all 1xxx DN are on cluster B and all the 2-9xxx are on cluster A.Hello!
There is no way to configure shared directory without using 3rd party software (AD as example).
You can try to configure to use corporate directory from one cluster from another.
Regards,
Kirill -
Forwarding Voicemails from user on vacation
How can I set up a user's voicemails to forward to another workgroup or user? That's either for voicemails they already own OR for new incoming voicemails.
Alternatively, can an administrator (or user) reassign them. (For most of our users we had actually set up a workgroup, like x[User Name]. In those cases I just set their workgroup to overflow. Unfortunately, not all of our users got set up that way.)There's no way to forward a users personal voice mail.
The solution you mentioned works - creating a work group for each agent and using over flow. Why don't you do that for the all the agents? That could get out of had if yo had a lot of agents.
The best solution, if possible, is not to use personal voice mail but to use group voice mail. If it really is a situation where another person could handle the voice mail.
Another solution would be to train agents to update their voice mail message before they leave to let callers know they are gone.
Maybe you are looking for
-
I have always paid for apps with a credit card and now need to use an app store card but I can't get past the point where it keeps wanting my credit card updated. And can't used the app card number. Any advice???
-
My charger for my MacBook Pro is not working
The charger cord for my MacBook Pro is not working. This happened before but I do not remember what the tech guy had me do. It was a simple fix....
-
How to use Adobe Distiller in Win 2k8 server 64-bit for Financial Reporting
Hi All, We need to use the Adobe Distiller in Windows 2008 Server SP2 OS for generating PDF reports in Financial Reporting. However, the Adobe Distiller installation recognises the OS version i.e. 32-bit or 64-bit and installs itself automatically. N
-
Automator: Create new folders from .csv file and put images inside.
I have a challenging Automator task to achieve. I need to 1) create a set of folders labeled with the contents in column A of a csv file. (example: column A1 JoeBrown A2 SuzyBrown A3 JimBrown etc..) resulting in 3 folders titled JoeBrown, SuzyBrown,
-
How to start a J2EE application in command line?
Dear all, As known to all, in Visual Administrator we can start or stop an application in Deploy node easily. my question is - Is there any command can we use in command line to start/stop an application like 'startapp.bat sap.com/app1' or 'java xxx.