How to Push CDR Files from Asterisk to SDReporter. September 27, 2013

Size: px
Start display at page:

Download "How to Push CDR Files from Asterisk to SDReporter. September 27, 2013"

Transcription

1 How to Push CDR Files from Asterisk to SDReporter September 27, 2013

2 Table of Contents Revision History Introduction Build Asterisk Configure Asterisk Load CDR Modules Configure CDR Support Verify CDR Support Status Utility Scripts Rotate Asterisk CDR File Export Asterisk CDR Files... 9 Asterisk is a trademark of Digium, Inc. TransNexus, OSP Secured and SDReporter are trademarks of TransNexus, Inc. 2

3 Revision History Revision Date of Issue Sep 2012 Draft Description Sep 2013 Correct minor typographic errors. Add comments to the cdrpush.sh script in section

4 1 Introduction This documentation explains how to build and configure Asterisk to generate CDR file in CSV format, rotate the CDR file, and export them to SDReporter. This documentation is for the Asterisk users who want to use SDReporter for CDR collection. This documentation is based on Asterisk version Build Asterisk To generate CDR in CSV format, Asterisk must be built with CDR CSV support. cdr_csv module must be built to provide CSV format support for CDR. func_cdr module may also be built to provide CDR dialplan function support. Both modules are built by default for Asterisk. They can be selected in menuselect application GUI (Call Destail Recoring->extended->cdr_csv, and Dialplan Functions->core- >func_cdr). They also can be explicitly selected by the following command lines. menuselect/menuselect --enable cdr_csv menuselect.makeopts menuselect/menuselect --enable func_cdr menuselect.makeopts 3 Configure Asterisk Assume Asterisk has been installed in $Asterisk_HOME folder. To generate the CDR file in CSV format for SDReporter, Asterisk must be configured to load CDR modules in order to generate CDRs in the correct format and with correct fields. 3.1 Load CDR Modules cdr_csv module must be loaded when Asterisk runs. func_cdr module may be loaded too. These two modules can be loaded by $Asterisk_HOME/etc/asterisk/modules.conf. load => func_cdr.so load => cdr_csv.so 3.2 Configure CDR Support There are several parameters in $Asterisk_HOME/etc/asterisk/cdr.conf that should be configured for Asterisk to generate CDRs in CSV format and with correct fields. 4

5 Asterisk Call Detail Record engine configuration A CDR is Call Detail Record, which provides logging services via a variety of pluggable backend modules. Detailed call information can be recorded to databases, files, etc. Useful for billing, fraud prevention, compliance with Sarbanes-Oxley aka The Enron Act, QOS evaluations, and more. [general] Define whether or not to use CDR logging. Setting this to "no" will override any loading of backend CDR modules. Default is "yes". enable=yes Define whether or not to log unanswered calls. Setting this to "yes" will report every attempt to ring a phone in dialing attempts, when it was not answered. For example, if you try to dial 3 extensions, and this option is "yes", you will get 3 CDR's, one for each phone that was rung. Default is "no". Some find this information horribly useless. Others find it very valuable. Note, in "yes" mode, you will see one CDR, with one of the call targets on one side, and the originating channel on the other, and then one CDR for each channel attempted. This may seem redundant, but cannot be helped. In brief, this option controls the reporting of unanswered calls which only have an A party. Calls which get offered to an outgoing line, but are unanswered, are still logged, and that is the intended behaviour. (It also results in some B side CDRs being output, as they have the B side channel as their source channel, and no destination channel.) unanswered = yes Normally, CDR's are not closed out until after all extensions are finished executing. By enabling this option, the CDR will be ended before executing the "h" extension so that CDR values such as "end" and "billsec" may be retrieved inside of of this extension. The default value is "no". endbeforehexten=no Normally, the 'billsec' field logged to the backends (text files or databases) is simply the end time (hangup time) minus the answer time in seconds. Internally, asterisk stores the time in terms of microseconds and seconds. By setting initiatedseconds to 'yes', you can force asterisk to report any seconds that were initiated (a sort of round up method). Technically, this is when the microsecond part of the end time is greater than the microsecond part of the answer time, then the billsec time is incremented one second. The default value is "no". initiatedseconds=no Define the CDR batch mode, where instead of posting the CDR at the end of every call, the data will be stored in a buffer to help alleviate load on the asterisk server. Default is "no". WARNING WARNING WARNING Use of batch mode may result in data loss after unsafe asterisk termination ie. software crash, power failure, kill -9, etc. WARNING WARNING WARNING 5

6 batch=no Define the maximum number of CDRs to accumulate in the buffer before posting them to the backend engines. 'batch' must be set to 'yes'. Default is 100. size=100 Define the maximum time to accumulate CDRs in the buffer before posting them to the backend engines. If this time limit is reached, then it will post the records, regardless of the value defined for 'size'. 'batch' must be set to 'yes'. Note that time is in seconds. Default is 300 (5 minutes). time=300 The CDR engine uses the internal asterisk scheduler to determine when to post records. Posting can either occur inside the scheduler thread, or a new thread can be spawned for the submission of every batch. For small batches, it might be acceptable to just use the scheduler thread, so set this to "yes". For large batches, say anything over size=10, a new thread is recommended, so set this to "no". Default is "no". scheduleronly=no When shutting down asterisk, you can block until the CDRs are submitted. If you don't, then data will likely be lost. You can always check the size of the CDR batch buffer with the CLI "cdr status" command. To enable blocking on submission of CDR data during asterisk shutdown, set this to "yes". Default is "yes". safeshutdown=yes CHOOSING A CDR "BACKEND" (what kind of output to generate) To choose a backend, you have to make sure either the right category is defined in this file, or that the appropriate config file exists, and has the proper definitions in it. If there are any problems, usually, the entry will silently ignored, and you get no output. Also, please note that you can generate CDR records in as many formats as you wish. If you configure 5 different CDR formats, then each event will be logged in 5 different places! In the example config files, all formats are commented out except for the cdr-csv format. Here are all the possible back ends: csv, custom, manager, odbc, pgsql, radius, sqlite, tds (also, mysql is available via the asterisk-addons, due to licensing requirements) (please note, also, that other backends can be created, by creating a new backend module in the source cdr/ directory!) Some of the modules required to provide these backends will not build or install unless some dependency requirements are met. Examples of this are pgsql, odbc, etc. If you are not getting output as you would expect, the first thing to do is to run the command "make menuselect", and check what modules are available, by looking in the "2. Call Detail Recording" option in the main menu. If your backend is marked with XXX, you know that the "configure" command could not find 6

7 the required libraries for that option. To get CDRs to be logged to the plain-jane /var/log/asterisk/cdr-csv/master.csv file, define the [csv] category in this file. No database necessary. The example config files are set up to provide this kind of output by default. To get custom csv CDR records, make sure the cdr_custom.conf file is present, and contains the proper [mappings] section. The advantage to using this backend, is that you can define which fields to output, and in what order. By default, the example configs are set up to mimic the cdr-csv output. If you don't make any changes to the mappings, you are basically generating the same thing as cdr-csv, but expending more CPU cycles to do so! To get manager events generated, make sure the cdr_manager.conf file exists, and the [general] section is defined, with the single variable 'enabled = yes'. For odbc, make sure all the proper libs are installed, that "make menuselect" shows that the modules are available, and the cdr_odbc.conf file exists, and has a [global] section with the proper variables defined. For pgsql, make sure all the proper libs are installed, that "make menuselect" shows that the modules are available, and the cdr_pgsql.conf file exists, and has a [global] section with the proper variables defined. For logging to radius databases, make sure all the proper libs are installed, that "make menuselect" shows that the modules are available, and the [radius] category is defined in this file, and in that section, make sure the 'radiuscfg' variable is properly pointing to an existing radiusclient.conf file. For logging to sqlite databases, make sure the 'cdr.db' file exists in the log directory, which is usually /var/log/asterisk. Of course, the proper libraries should be available during the 'configure' operation. For tds logging, make sure the proper libraries are available during the 'configure' phase, and that cdr_tds.conf exists and is properly set up with a [global] category. Also, remember, that if you wish to log CDR info to a database, you will have to define a specific table in that databse to make things work! See the doc directory for more details on how to create this table in each database. [csv] usegmtime=yes log date/time in GMT. Default is "no" loguniqueid=yes log uniqueid. Default is "no" loguserfield=yes log user field. Default is "no" accountlogs=no create separate log file for each account code. Default is "yes" [radius] usegmtime=yes log date/time in GMT loguniqueid=yes log uniqueid loguserfield=yes log user field Set this to the location of the radiusclient-ng configuration file 7

8 The default is /etc/radiusclient-ng/radiusclient.conf radiuscfg => /usr/local/etc/radiusclient-ng/radiusclient.conf 3.3 Verify CDR Support Status $ $Asterisk_HOME/sbin/asterisk -Wcdgvvvvv Asterisk , Copyright (C) Digium, Inc. and others. Created by Mark Spencer <markster@digium.com> Asterisk comes with ABSOLUTELY NO WARRANTY type 'core show warranty' for details. This is free software, with components licensed under the GNU General Public License version 2 and other licenses you are welcome to redistribute it under certain conditions. Type 'core show license' for details. ========================================================================= Asterisk Ready. == Parsing '/etc/asterisk/cli.conf': == Found *CLI> cdr show status Call Detail Record (CDR) settings Logging: Enabled Mode: Simple Log unanswered calls: Yes * Registered Backends csv 4 Utility Scripts To collect Asterisk CDRs at SDReporter, the Asterisk CDR file must be rotated and pushed to the correct folders on SDReporter. This section provides two utility scripts for this purpose. 4.1 Rotate Asterisk CDR File According to Asterisk documentation, the Asterisk application does not hold the CDR file (keep it open). The CDR file rotation script does the following things, 1. Generate the new CDR file name. The file name format is defined by SDReporter. 2. Rename the Asterisk CDR file to the new name 3. Generate a new empty Asterisk CDR file.!/bin/sh cdrrotate.sh This cdrrotate script is used to rotate Asterisk Master.csv file. It should be triggered by cron of the user runs Asterisk. When this file is run, the current Master.csv file is renamed. The new file name is Master-YYYYMMDDHHMMSS.csv. 8

9 Where YYYYMMDDHHMMSS stands for the year, month, day, hour, minute and second when the CDR file was renamed. When the Master.csv file is renamed, a new empty Master.csv file is automatically generated. This script should be run by user runs Asterisk. NEW_CDR_FILE_NAME=Master-`date +%Y%m%d%H%M%S`.csv if [! "$Asterisk_HOME" ] then echo "The Asterisk_HOME variable is not set." exit 1 fi cd $Asterisk_HOME/var/log/asterisk/cdr-csv mv Master.csv $NEW_CDR_FILE_NAME touch Master.csv 4.2 Export Asterisk CDR Files The rotated Asterisk CDR files should be exported to SDReporter. SDReproter may be installed on the same host or on a remote host. It should do the following things, 1. Define SCP parameters 2. Every rotated Asterisk CDR file should be copied to the SDReporter folder using scp. 3. If Asterisk CDR file is copied successfully to SDReporter, then remove the copied Asterisk CDR file from Asterisk directory.!/bin/sh cdrpush.sh This script automates the process of pushing rotated Asterisk CDR files to SDReporter. The remote SDReporter must support public key authentication. To enable public key authentication add the following lines to /etc/ssh/sshd_config on the remote SDReporter. RSAAuthentication=yes PubkeyAuthentication=yes Next, restart the ssh daemon (sshd) on the remote SDReporter by executing the command: /etc/init.d/sshd restart Then generate a public RSA key on the Asterisk and copy it to the list of authorized keys on the SDReporter. On the Asterisk machine execute (leave passphrase empty): ssh-keygen -t rsa 9

10 This will create public key at /home/<user>/.ssh/id_rsa.pub. Next, copy the public generated key to the SDReporter (for example by 'scp' command): scp /home/<user>/.ssh/id_rsa.pub After the Asterisk public key is copied to /tmp/id_rsa.pub of the SDReporter, login to the SDReporter and perform the following operation to add the Asterisk public key to the list of authorized keys by executing the command: mkdir /home/ossadmin/.ssh (only if it's needed) cat /tmp/id_rsa.pub >> /home/ossadmin/.ssh/authorized_keys When done, try to login to SDReporter from Asterisk: ssh If you can successfully ssh into the SDReporter from the Asterisk, then Asterisk is ready for scp without a password from this script. This script should be run by user runs Asterisk. Edit the variables shown below to match your systems. REMOTE_USER should be set to the SDReporter user name. The default user name for SDReporter is ossadmin. REMOTE_HOST is the IP address of the server hosting SDReporter. REMOTE_PATH is the SDReporter directory for Asterisk CDR files. If CDR files are created by only one Asterisk then this variable should be set as follows: REMOTE_PATH=/home/ossadmin/OSS/SDReporter/cdrconverter/data/INPUT/Asterisk/1 If there are multiple Asterisk servers, then each Asterisk should push CDR file to a different directory on SDReporter. For example, if there are two Asterisk servers, the second server should push CDR files to INPUT/Asterisk/2 REMOTE_USER=ossadmin REMOTE_HOST= REMOTE_PATH=/home/ossadmin/OSS/SDReporter/cdrconverter/data/INPUT/Asterisk/1 if [! "$Asterisk_HOME" ] then echo "The Asterisk_HOME variable is not set." exit 1 fi FILE_MASK=$Asterisk_HOME/var/log/asterisk/cdr-csv/Master-*.csv for file in $FILE_MASK do scp $file $REMOTE_USER@$REMOTE_HOST:$REMOTE_PATH > /dev/null 2>&1 if [ $? -eq 0 ] then 10

11 done fi rm $file 11

Accounting Manager. User Guide A31003-P1030-U114-2-7619

Accounting Manager. User Guide A31003-P1030-U114-2-7619 Accounting Manager User Guide A31003-P1030-U114-2-7619 Our Quality and Environmental Management Systems are implemented according to the requirements of the ISO9001 and ISO14001 standards and are certified

More information

Laboration 3 - Administration

Laboration 3 - Administration Laboration 3 - Administration During this laboration we will learn how to install, configure and test servers that will allow you to have access remote machines, copy files between computers and file sharing.

More information

CASHNet Secure File Transfer Instructions

CASHNet Secure File Transfer Instructions CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

White Paper. Fabasoft on Linux Cluster Support. Fabasoft Folio 2015 Update Rollup 2

White Paper. Fabasoft on Linux Cluster Support. Fabasoft Folio 2015 Update Rollup 2 White Paper Fabasoft Folio 2015 Update Rollup 2 Copyright Fabasoft R&D GmbH, Linz, Austria, 2015. All rights reserved. All hardware and software names used are registered trade names and/or registered

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Source Code Management for Continuous Integration and Deployment. Version 1.0 DO NOT DISTRIBUTE

Source Code Management for Continuous Integration and Deployment. Version 1.0 DO NOT DISTRIBUTE Source Code Management for Continuous Integration and Deployment Version 1.0 Copyright 2013, 2014 Amazon Web Services, Inc. and its affiliates. All rights reserved. This work may not be reproduced or redistributed,

More information

Automated Offsite Backup with rdiff-backup

Automated Offsite Backup with rdiff-backup Automated Offsite Backup with rdiff-backup Michael Greb 2003-10-21 Contents 1 Overview 2 1.1 Conventions Used........................................... 2 2 Setting up SSH 2 2.1 Generating SSH Keys........................................

More information

HIPAA Compliance Use Case

HIPAA Compliance Use Case Overview HIPAA Compliance helps ensure that all medical records, medical billing, and patient accounts meet certain consistent standards with regard to documentation, handling, and privacy. Current Situation

More information

High-Performance Reservoir Risk Assessment (Jacta Cluster)

High-Performance Reservoir Risk Assessment (Jacta Cluster) High-Performance Reservoir Risk Assessment (Jacta Cluster) SKUA-GOCAD 2013.1 Paradigm 2011.3 With Epos 4.1 Data Management Configuration Guide 2008 2013 Paradigm Ltd. or its affiliates and subsidiaries.

More information

Configuring a Windows 2003 Server for IAS

Configuring a Windows 2003 Server for IAS Configuring a Windows 2003 Server for IAS When setting up a Windows 2003 server to function as an IAS server for our demo environment we will need the server to serve several functions. First of all we

More information

PUBLIC Model Manager User Guide

PUBLIC Model Manager User Guide SAP Predictive Analytics 2.4 2015-11-23 PUBLIC Content 1 Introduction....4 2 Concepts....5 2.1 Roles....5 2.2 Rights....6 2.3 Schedules....7 2.4 Tasks.... 7 3....8 3.1 My Model Manager....8 Overview....

More information

HADOOP - MULTI NODE CLUSTER

HADOOP - MULTI NODE CLUSTER HADOOP - MULTI NODE CLUSTER http://www.tutorialspoint.com/hadoop/hadoop_multi_node_cluster.htm Copyright tutorialspoint.com This chapter explains the setup of the Hadoop Multi-Node cluster on a distributed

More information

Training module 2 Installing VMware View

Training module 2 Installing VMware View Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and

More information

Moxa Device Manager 2.3 User s Manual

Moxa Device Manager 2.3 User s Manual User s Manual Third Edition, March 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

sqlcmd -S.\SQLEXPRESS -Q "select name from sys.databases"

sqlcmd -S.\SQLEXPRESS -Q select name from sys.databases A regularly scheduled backup of databases used by SyAM server programs (System Area Manager, Management Utilities, and Site Manager can be implemented by creating a Windows batch script and running it

More information

Setting Up One Search

Setting Up One Search Your teachers and students can take advantage of your school s subscription databases all in one place through Destiny One Search. One Search saves staff and patrons time and effort by letting them search

More information

Step One: Installing Rsnapshot and Configuring SSH Keys

Step One: Installing Rsnapshot and Configuring SSH Keys Source: https://www.digitalocean.com/community/articles/how-to-installrsnapshot-on-ubuntu-12-04 What the Red Means The lines that the user needs to enter or customize will be in red in this tutorial! The

More information

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Contents File Transfer Protocol...3 Setting Up and Using FTP Accounts Hosted by Adobe...3 SAINT...3 Data Sources...4 Data Connectors...5

More information

WinSCP PuTTY as an alternative to F-Secure July 11, 2006

WinSCP PuTTY as an alternative to F-Secure July 11, 2006 WinSCP PuTTY as an alternative to F-Secure July 11, 2006 Brief Summary of this Document F-Secure SSH Client 5.4 Build 34 is currently the Berkeley Lab s standard SSH client. It consists of three integrated

More information

Quick Start Guide. IT Management On-Demand

Quick Start Guide. IT Management On-Demand 1 Quick Start Guide Quick Start Guide IT Management On-Demand Introduction... 2 Getting Started... 3 Planning Your Deployment... 5 Performing a Test Deployment... 6 Enterprise Deployment Options... 8 Remote

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

PowerPanel Business Edition Installation Guide

PowerPanel Business Edition Installation Guide PowerPanel Business Edition Installation Guide For Automatic Transfer Switch Rev. 5 2015/12/2 Table of Contents Introduction... 3 Hardware Installation... 3 Install PowerPanel Business Edition Software...

More information

Tera Term Telnet. Introduction

Tera Term Telnet. Introduction Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start

More information

System Administration and Log Management

System Administration and Log Management CHAPTER 6 System Overview System Administration and Log Management Users must have sufficient access rights, or permission levels, to perform any operations on network elements (the devices, such as routers,

More information

Configuring MailArchiva with Insight Server

Configuring MailArchiva with Insight Server Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any

More information

Ciphermail Gateway Separate Front-end and Back-end Configuration Guide

Ciphermail Gateway Separate Front-end and Back-end Configuration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway Separate Front-end and Back-end Configuration Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction

More information

iview (v2.0) Administrator Guide Version 1.0

iview (v2.0) Administrator Guide Version 1.0 iview (v2.0) Administrator Guide Version 1.0 Updated 5/2/2008 Overview This administrator guide describes the processes and procedures for setting up, configuring, running and administering the iview Operator

More information

Backing up the Embedded Oracle database of a Red Hat Network Satellite

Backing up the Embedded Oracle database of a Red Hat Network Satellite Backing up the Embedded Oracle database of a Red Hat Network Satellite By Melissa Goldin and Vladimir Zlatkin Abstract This document will help you create a backup of the Oracle database of a Red Hat Network

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

What is new in Switch 12

What is new in Switch 12 What is new in Switch 12 New features and functionality: Remote Designer From this version onwards, you are no longer obliged to use the Switch Designer on your Switch Server. Now that we implemented the

More information

Aradial Installation Guide

Aradial Installation Guide Aradial Technologies Ltd. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document

More information

Syslog & xinetd. Stephen Pilon

Syslog & xinetd. Stephen Pilon Syslog & xinetd Stephen Pilon What create log files? Logging Policies Throw away all data immediately Reset log files at periodic intervals Rotate log files, keeping data for a fixed time Compress and

More information

HSearch Installation

HSearch Installation To configure HSearch you need to install Hadoop, Hbase, Zookeeper, HSearch and Tomcat. 1. Add the machines ip address in the /etc/hosts to access all the servers using name as shown below. 2. Allow all

More information

Secure Shell Demon setup under Windows XP / Windows Server 2003

Secure Shell Demon setup under Windows XP / Windows Server 2003 Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}

More information

Management Utilities Configuration for UAC Environments

Management Utilities Configuration for UAC Environments Management Utilities Configuration for UAC Environments For optimal use of SyAM Management Utilities, Windows client machines should be configured with User Account Control disabled or set to the least

More information

IceWarp to IceWarp Server Migration

IceWarp to IceWarp Server Migration IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone

More information

File Transfers. Contents

File Transfers. Contents A File Transfers Contents Overview..................................................... A-2................................... A-2 General Switch Software Download Rules..................... A-3 Using

More information

This appendix describes the following procedures: Cisco ANA Registry Backup and Restore Oracle Database Backup and Restore

This appendix describes the following procedures: Cisco ANA Registry Backup and Restore Oracle Database Backup and Restore APPENDIXA This appendix describes the following procedures: Cisco ANA Registry Oracle Database Cisco ANA Registry This section describes the Cisco ANA Registry backup and restore procedure. Overview Provides

More information

Install and configure SSH server

Install and configure SSH server Copyright IBM Corporation 2009 All rights reserved Install and configure SSH server What this exercise is about... 1 What you should be able to do... 1 Introduction... 1 Part 1: Install and configure freesshd

More information

EVALUATION ONLY. WA2088 WebSphere Application Server 8.5 Administration on Windows. Student Labs. Web Age Solutions Inc.

EVALUATION ONLY. WA2088 WebSphere Application Server 8.5 Administration on Windows. Student Labs. Web Age Solutions Inc. WA2088 WebSphere Application Server 8.5 Administration on Windows Student Labs Web Age Solutions Inc. Copyright 2013 Web Age Solutions Inc. 1 Table of Contents Directory Paths Used in Labs...3 Lab Notes...4

More information

XCloner Official User Manual

XCloner Official User Manual XCloner Official User Manual Copyright 2010 XCloner.com www.xcloner.com All rights reserved. xcloner.com is not affiliated with or endorsed by Open Source Matters or the Joomla! Project. What is XCloner?

More information

How to backup a remote MySQL server with ZRM over the Internet

How to backup a remote MySQL server with ZRM over the Internet How to backup a remote MySQL server with ZRM over the Internet White paper "As MySQL gains widespread adoption and moves more broadly into the enterprise, ZRM for MySQL addresses the growing need among

More information

DiskBoss. File & Disk Manager. Version 2.0. Dec 2011. Flexense Ltd. www.flexense.com info@flexense.com. File Integrity Monitor

DiskBoss. File & Disk Manager. Version 2.0. Dec 2011. Flexense Ltd. www.flexense.com info@flexense.com. File Integrity Monitor DiskBoss File & Disk Manager File Integrity Monitor Version 2.0 Dec 2011 www.flexense.com info@flexense.com 1 Product Overview DiskBoss is an automated, rule-based file and disk manager allowing one to

More information

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3 White Paper Fabasoft Folio 2015 Update Rollup 3 Copyright Fabasoft R&D GmbH, Linz, Austria, 2016. All rights reserved. All hardware and software names used are registered trade names and/or registered

More information

Using Network Application Development (NAD) with InTouch

Using Network Application Development (NAD) with InTouch Tech Note 256 Using Network Application Development (NAD) with InTouch All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.

More information

Command Line Interface User Guide for Intel Server Management Software

Command Line Interface User Guide for Intel Server Management Software Command Line Interface User Guide for Intel Server Management Software Legal Information Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel

More information

Framework 8.1. External Authentication. Reference Manual

Framework 8.1. External Authentication. Reference Manual Framework 8.1 External Authentication Reference Manual The information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent of Genesys

More information

Parallels Plesk Control Panel

Parallels Plesk Control Panel Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,

More information

1.6 HOW-TO GUIDELINES

1.6 HOW-TO GUIDELINES Version 1.6 HOW-TO GUIDELINES Setting Up a RADIUS Server Stonesoft Corp. Itälahdenkatu 22A, FIN-00210 Helsinki Finland Tel. +358 (9) 4767 11 Fax. +358 (9) 4767 1234 email: info@stonesoft.com Copyright

More information

Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08

Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08 Technical Note Secure File Transfer Installation Sender Recipient Attached FIles Pages Date Development Internal/External None 11 6/23/08 Overview This document explains how to install OpenSSH for Secure

More information

Sage Abra Timesheet. Quick Start Guide

Sage Abra Timesheet. Quick Start Guide Sage Abra Timesheet Quick Start Guide 2010 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks

More information

VPS Remote Computing. Connecting to a Windows Server for the first time. 1 Your Server has been installed. 2 Finding the login details for your Server

VPS Remote Computing. Connecting to a Windows Server for the first time. 1 Your Server has been installed. 2 Finding the login details for your Server Connecting to a Windows Server for the first time This document will take you through the process of connecting to a Windows Virtual server for the first time. To connect to your server you need to find

More information

Insight Video Net. LLC. CMS 2.0. Quick Installation Guide

Insight Video Net. LLC. CMS 2.0. Quick Installation Guide Insight Video Net. LLC. CMS 2.0 Quick Installation Guide Table of Contents 1. CMS 2.0 Installation 1.1. Software Required 1.2. Create Default Directories 1.3. Create Upload User Account 1.4. Installing

More information

4PSA Total Backup 3.0.0. User's Guide. for Plesk 10.0.0 and newer versions

4PSA Total Backup 3.0.0. User's Guide. for Plesk 10.0.0 and newer versions 4PSA Total Backup 3.0.0 for Plesk 10.0.0 and newer versions User's Guide For more information about 4PSA Total Backup, check: http://www.4psa.com Copyright 2009-2011 4PSA. User's Guide Manual Version 84359.5

More information

Universal Management Service 2015

Universal Management Service 2015 Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,

More information

Installation & Maintenance Guide

Installation & Maintenance Guide The instruction booklet is also included on the CD in Word and Acrobat formats, which may be easier to print. (If you want to install Acrobat Reader run d:\acroread\setup.exe (where d:\ is the identifier

More information

KeyAdvantage System DMS Integration. Software User Manual

KeyAdvantage System DMS Integration. Software User Manual KeyAdvantage System DMS Integration Software User Manual ii Copyright Disclaimer Trademarks and patents Intended use EMC Directive Regulatory 2013 United Technologies Corporation. All rights reserved.

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

Forms Printer User Guide

Forms Printer User Guide Forms Printer User Guide Version 10.51 for Dynamics GP 10 Forms Printer Build Version: 10.51.102 System Requirements Microsoft Dynamics GP 10 SP2 or greater Microsoft SQL Server 2005 or Higher Reporting

More information

FileMaker Server 14. FileMaker Server Help

FileMaker Server 14. FileMaker Server Help FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks

More information

PBXware End User Guide. 2003-2008 Bicom Systems

PBXware End User Guide. 2003-2008 Bicom Systems PBXware End User Guide Part I Introduction 3 1 Introduction PBXware End User Guide PBXware system is a scalable telephony solution featuring a range of traditional telephony and emerging VoIP technologies.

More information

CS SoftDent Practice Management Software Installation Guide for Client/Server Configurations

CS SoftDent Practice Management Software Installation Guide for Client/Server Configurations DE1005-15 CS SoftDent Practice Management Software Installation Guide for Client/Server Configurations Notice Carestream Health, Inc., 2012. No part of this publication may be reproduced, stored in a retrieval

More information

1. GridGain In-Memory Accelerator For Hadoop. 2. Hadoop Installation. 2.1 Hadoop 1.x Installation

1. GridGain In-Memory Accelerator For Hadoop. 2. Hadoop Installation. 2.1 Hadoop 1.x Installation 1. GridGain In-Memory Accelerator For Hadoop GridGain's In-Memory Accelerator For Hadoop edition is based on the industry's first high-performance dual-mode in-memory file system that is 100% compatible

More information

GUARD1 PLUS SE Administrator's Manual

GUARD1 PLUS SE Administrator's Manual GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 info@guard1.com www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS

More information

Crystal Reports Installation Guide

Crystal Reports Installation Guide Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks

More information

For Active Directory Installation Guide

For Active Directory Installation Guide For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Spectrum Technology Platform. Version 9.0. Spectrum Spatial Administration Guide

Spectrum Technology Platform. Version 9.0. Spectrum Spatial Administration Guide Spectrum Technology Platform Version 9.0 Spectrum Spatial Administration Guide Contents Chapter 1: Introduction...7 Welcome and Overview...8 Chapter 2: Configuring Your System...9 Changing the Default

More information

Sophos Mobile Control Installation guide

Sophos Mobile Control Installation guide Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running

More information

Novell Identity Manager

Novell Identity Manager Password Management Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 3.6.1 June 05, 2009 www.novell.com Identity Manager 3.6.1 Password Management Guide Legal Notices Novell, Inc. makes no representations

More information

Outcall User Manual. 2003-2008 Bicom Systems

Outcall User Manual. 2003-2008 Bicom Systems Outcall User Manual Part I 4 Outcall User Manual 1 Introduction OutCALL User Manual Part II 6 Outcall User Manual 2 Overview OutCALL application is designed for integration with MS Outlook giving users

More information

Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0

Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0 Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Installation Manual v2.0.0

Installation Manual v2.0.0 Installation Manual v2.0.0 Contents ResponseLogic Install Guide v2.0.0 (Command Prompt Install)... 3 Requirements... 4 Installation Checklist:... 4 1. Download and Unzip files.... 4 2. Confirm you have

More information

Installing the BlackBerry Enterprise Server Management Software on an administrator or remote computer

Installing the BlackBerry Enterprise Server Management Software on an administrator or remote computer Installing the BlackBerry Enterprise Server Management Software on an administrator or Introduction Some administrators want to install their administrative tools on their own Windows 2000 computer. This

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

Comsol Multiphysics. Running COMSOL on the Amazon Cloud. VERSION 4.3a

Comsol Multiphysics. Running COMSOL on the Amazon Cloud. VERSION 4.3a Comsol Multiphysics Running COMSOL on the Amazon Cloud VERSION 4.3a Running COMSOL on the Amazon Cloud 1998 2012 COMSOL Protected by U.S. Patents 7,519,518; 7,596,474; and 7,623,991. Patents pending. This

More information

Extending Remote Desktop for Large Installations. Distributed Package Installs

Extending Remote Desktop for Large Installations. Distributed Package Installs Extending Remote Desktop for Large Installations This article describes four ways Remote Desktop can be extended for large installations. The four ways are: Distributed Package Installs, List Sharing,

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall

More information

How To Back Up Your Pplsk Data On A Pc Or Mac Or Mac With A Backup Utility (For A Premium) On A Computer Or Mac (For Free) On Your Pc Or Ipad Or Mac On A Mac Or Pc Or

How To Back Up Your Pplsk Data On A Pc Or Mac Or Mac With A Backup Utility (For A Premium) On A Computer Or Mac (For Free) On Your Pc Or Ipad Or Mac On A Mac Or Pc Or Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,

More information

IPPBX FAQ. For Firmware Version: V2.0/V3.0 2013-12-11

IPPBX FAQ. For Firmware Version: V2.0/V3.0 2013-12-11 For Firmware Version: V2.0/V3.0 2013-12-11 Contents 1. IPPBX Access... 3 1.1 How to access IPPBX via SSH?... 3 1.2 How to access IPPBX if I forget the IP of WAN?... 4 1.3 How to retrieve WEB password via

More information

RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide

RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide Contact Information See our Web sites for regional Customer Support telephone and fax numbers. RSA Security Inc. RSA Security

More information

enetworks TM Using the Syslog Feature C.1 Configuring the Syslog Feature

enetworks TM Using the Syslog Feature C.1 Configuring the Syslog Feature encor! enetworks TM Version A, March 2010 2013 Encore Networks, Inc. All rights reserved. Using the Syslog Feature This document provides basic information for using the syslog feature in the ELIOS software.

More information

Automating client deployment

Automating client deployment Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark

More information

IBM Tivoli Storage Manager for Virtual Environments Version 7.1.3. Data Protection for Microsoft Hyper-V Installation and User's Guide IBM

IBM Tivoli Storage Manager for Virtual Environments Version 7.1.3. Data Protection for Microsoft Hyper-V Installation and User's Guide IBM IBM Tivoli Storage Manager for Virtual Environments Version 7.1.3 Data Protection for Microsoft Hyper-V Installation and User's Guide IBM IBM Tivoli Storage Manager for Virtual Environments Version 7.1.3

More information

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research

More information

CA arcserve Unified Data Protection Agent for Linux

CA arcserve Unified Data Protection Agent for Linux CA arcserve Unified Data Protection Agent for Linux User Guide Version 5.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

BCM CALL LOGGER. Version 1.3.3 USER GUIDE

BCM CALL LOGGER. Version 1.3.3 USER GUIDE BCM CALL LOGGER Version 1.3.3 USER GUIDE BCM Call Logger User Guide Page 1 Contents Contents... 2 Legal Guff... 3 About BCM Call Logger... 4 Installation and prerequisites... 5 Running for the first time...

More information

Server & Workstation Installation of Client Profiles for Windows

Server & Workstation Installation of Client Profiles for Windows C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing

More information

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

Security Configuration Guide P/N 300-010-493 Rev A05

Security Configuration Guide P/N 300-010-493 Rev A05 EMC VPLEX Security Configuration Guide P/N 300-010-493 Rev A05 June 7, 2011 This guide provides an overview of VPLEX security configuration settings, including secure deployment and usage settings needed

More information

Job Scheduler Daemon Configuration Guide

Job Scheduler Daemon Configuration Guide Job Scheduler Daemon Configuration Guide A component of Mark Dickinsons Unix Job Scheduler This manual covers the server daemon component of Mark Dickinsons unix Job Scheduler. This manual is for version

More information

Issue Tracking Anywhere Installation Guide

Issue Tracking Anywhere Installation Guide TM Issue Tracking Anywhere Installation Guide The leading developer of version control and issue tracking software Table of Contents Introduction...3 Installation Guide...3 Installation Prerequisites...3

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using

More information

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5

GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5 GWAVA 5 Migration Guide for Netware GWAVA 4 to Linux GWAVA 5 Copyright 2010 GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com Overview While GWAVA

More information

Device Log Export ENGLISH

Device Log Export ENGLISH Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information