L3DGEWorld Asterisk Management System (LAMS)

Size: px
Start display at page:

Download "L3DGEWorld Asterisk Management System (LAMS)"

Transcription

1 L3DGEWorld Asterisk Management System (LAMS) HET556 Design & Development 2 by Alana Huebner Carl Javier under the guidance of Professor Grenville Armitage Faculty of Information Communication Technology Swinburne University of Technology Melbourne, Australia November 2008

2 Abstract High performance computing is needed for evaluating computationally "bulky" problems. For years, computers have progressed in architecture and hardware aspects to exploit parallelism, but the algorithmic or software aspects are yet to be discovered fully in many fields. There are many aspects related to high performance computing, which we need to know before developing algorithms. Linear algebra lies at the heart of most calculations in scientific computing. Thus there is a need for developing computationally "rich" algorithms for linear algebra. In this report we present some ways to exploit parallelism for achieving high performance for linear algorithms, along with a summary of parallel processing and architecture overview with performance evaluation analysis.

3 Contents 1 Introduction L3DGEWorld Asterisk Management System Background Growth of Industry VoIP Telephony D verses 3D Monitoring Object and Scope Aim Our Approach Elements we do not address Overview of LAMS Visual Monitoring Collaborative Monitoring Variation of LAMS setups System Requirement Implementation of LAMS prototype Overview of the LAMS prototype The Scenario The LAMS Virtual World User Experience Simulation of a working VSP L3DGEWorld Map & Model Construction Asterisk Manager Interface Interaction Asterisk Manager Interface Connecting to AMI AMI Scripting and Programming Asterisk Call Records Call Records i

4 5.4.2 Statistics extracted for LAMS Ganglia Cluster Monitoring Utlisation Ganglia Overview Ganglia Installation Ganglia Configuration Custom Metric Insertion FreeBSD Jails Scenario of testing Hardware Specification FreeBSD Installation & Jail Building Creation of first jail Host network settings Jail Management Building Asterisk Jail Cloning Asterisk Jail Extraction of Telephony Statistics Overview of Software Modules AMI-scripts CDR-scripts Gmetric-grazer Scripts Grazer L3DGEWorld input daemon SIP call generation Testing Procedures & Results Impact of system on network Traffic Analaysis Polling Intervals Visual Interpretation Discussion Limitations of system Geographic & Latency issues Development Problems Encountered Timing Issues D verses 3D visual monitoring analysis Future Work More Management & Monitoring Features L3DGEWorld Development VoIP Protocol integration Incorporate Billing Statistics ii

5 8.5 Security Development & Implementation Conclusion 23 A Acronyms & Abbreviations 26 B Pythonising a C library using SWIG 27 B.1 SWIG interface file B.2 Compile C file B.3 Create and link new python module B.4 Testing new l3dgecomms python module iii

6 Chapter 1 Introduction 1.1 L3DGEWorld Asterisk Management System 1

7 Chapter 2 Background 2.1 Growth of Industry 2.2 VoIP Telephony 2.3 2D verses 3D Monitoring 2

8 Chapter 3 Object and Scope 3.1 Aim 3.2 Our Approach 3.3 Elements we do not address 3

9 Chapter 4 Overview of LAMS 4.1 Visual Monitoring 4.2 Collaborative Monitoring 4.3 Variation of LAMS setups 4.4 System Requirement 4

10 Chapter 5 Implementation of LAMS prototype 5.1 Overview of the LAMS prototype The Scenario Banana Beans is an espresso machine rental company that lends machines to Melbourne venues and businesses. They provide a help line for their customers, which is implemented through an IP PBX on the company s private network. Over the years the success of the business has warrented three separate VoIP servers to handle calls coming from differnt regions of Melbourne. Due to a growing number of customers in Geelong, Banana Beans plans to setup a VoIP server to dedicated to handling calls from Geelong customers. Due to the personnel costs of the help line, the company would like to monitor the help line closely. The want to know how often calls occur, who is calling the help line and the average call duration. Currently each server provides 9 channels to the help-line for customers in it s service area The LAMS Virtual World The Banana Beans scenario has been transfered to LAMS three-tiered heirachy. The top of the heirachy represents a map of Victoria. Two entities are placed on this map representing summaries of the VoIP services provided in Geelong and Melbourne. The middle tier of the heirachy represents the VoIP servers within a city. The middle tier representing Melbourne has three pairs of entites. Each pair represents a single server: the VoIP server (Asterisk) is represented by one of the entities and the underlying hardware and operating system represented by the other. The bottom tier of the heirachy represents the 9 help-line channels that a single VoIP server provides. What does it look like, what VR entities represent real world objects. Discuss mappings of metrics to visuals. Why were these choices made? 5

11 5.1.3 User Experience What the user can and cant do. Describe some scenarios and how the world would appear if, for example, a VoIP server went down, was very busy, was not busy at all Simulation of a working VSP Discuss architecture of the prototype network and introduce the methods used to produce traffic. Discussed in detail later. 5.2 L3DGEWorld Map & Model Construction 5.3 Asterisk Manager Interface Interaction L3DGEWorld Asterisk Management System (LAMS) provides network administrators, VoIP and Internet service providers to monitoring a cluster of VoIP servers. Future telecommunicaion companies may roll out VoIP and managing many servers remotely is definitely an advantage. Asterisk is VoIP PBX system. Asterisk can be remotely managed and monitored through ÒAsterisk Management InterfaceÓ (AMI) Asterisk Manager Interface Asterisk has an interface that allows external programs to interface with it for management and monitoring. All Asterisk CLI commands can be executed. AMI listens on a TCP port for a connection and once the connection is established, commands are send through this connection. Asterisk will respond to these commands appropriately. To enable AMI, managers.conf needs to be configured where general and security settings are set. [general] displaysystemname = yes enabled = yes #webenabled = yes port = 5038 [lams] secret=lams18 permit= / ; Authorization for various classes read = system,call,log,verbose,command,agent,user,config write = system,call,log,verbose,command,agent,user,config 6

12 *NB AMI should be avoided on enabling it on a public IP address Connecting to AMI Any TCP application written can connect to AMI. AMI expects key sequences written in clear text. A simple TCP application that can be used directly with AMI is telnet. Our use of telnet quickly proves you can manage and monitor Asterisk remotely. Though there are some security issues with telnet, they are of no concern in the first prototype and we expect AMI interface to be only enabled on a private and secured network. The sequence of actions AMI expects are the following: Action: <action type> Key 1: Value 1 Key 2: Value 2 etc... Variable: Value Variable: Value etc... An example using telnet to connect to AMI: # telnet localhost 5038 Trying Connected to localhost. Escape character is ^]. Asterisk Call Manager/1.0 Action: Login Username: lams Secret: lams18 Response: Success Message: Authentication accepted Action: Logoff Response: Goodbye Message: Thanks for all the fish. Connection closed by foreign host. AMI tends to show status and event messages so it is also ideal at login to AMI to turn this off with the following sequence: 7

13 Events: off A list of AMI commands can be viewed here though nearly every Asterisk CLI command is executable by the ÒAction: CommandÓ sequence AMI Scripting and Programming AMI is designed to be used by external applications and not by humans. Thus the sequence of commands are in a certain fashion. To script the connection we used a combination of shell, python and system calls to connect. An example script can be showed below and how it is executed. #!/bin/sh # HOST="pbx.javier.home" PORT="5038" echo "open $HOST $PORT" sleep 1 echo "Action: Login" echo "Username: lams" echo "Secret: lams18" echo ÒEvents: offó echo echo "Action: Command" echo "Command: Show Channels" echo /bin/sleep 1 echo echo "Action: Logoff" echo "END" which is then used in the following manner: #./asterisk_showchannels.sh telnet The output of AMI can be used to input data into the LAMS server to show the statistics and status of Asterisk remotely. The following diagram describes the logical and actually physical set up of our LAMS system. 8

14 System Metrics CPU Utlil Memory Disk Space Network Statistics VoIP Server 1 gmond UDP unicast gmetad VoIP Metrics Current Calls Channels in use Queues Application gmetric 5.4 Asterisk Call Records L3DGEWorld Asterisk Management System (LAMS) provides network administrators, VoIP and Internet service providers a way of monitoring a cluster of VoIP servers. An important task for providers is to keep records and charge their users. Asterisk uses a few ways to save all data about what users are using the system for. One of the simple ways Asterisk does this is through ÒCall RecordsÓ Call Records Asterisk by default will save all call statistics in call records. specified in asterisk.conf Logs and statistics are astlogdir => /var/log/asterisk Call records are found in /var/log/asterisk/cdr-csv/ in a file called ÒMaster.csvÓ. Master.csv is a simple file with the following fields. accountcode: What account number to use: Asterisk billing account, (string, 20 characters) src: Caller*ID number (string, 80 characters) dst: Destination extension (string, 80 characters) 9

15 dcontext: Destination context (string, 80 characters) clid: Caller*ID with text (80 characters) channel: Channel used (80 characters) dstchannel: Destination channel if appropriate (80 characters) lastapp: Last application if appropriate (80 characters) lastdata: Last application data (arguments) (80 characters) start: Start of call (date/time) answer: Anwer of call (date/time) end: End of call (date/time) duration: Total time in system, in seconds (integer), from dial to hangup billsec: Total time call is up, in seconds (integer), from answer to hangup disposition: What happened to the call: ANSWERED, NO ANSWER, BUSY, FAILED (on some CDR backends, e.g. ODBC, these may be integers; note that more detailed info can be found in the dialplan variable $HANGUPCAUSE) amaflags: What flags to use: see amaflags: DOCUMENTATION, BILLING, IG- NORE etc, specified on a per channel basis like accountcode. user field: A user-defined field, maximum 255 characters Master.csv will be written to once a call has ended. So Call Records cannot be used to view current statistics. AMI can be used for current calls Statistics extracted for LAMS LAMS will use the call records to provide a summary of how much users of a PBX have been using. Usually a telecommunications provider would use this information to bill their users. As LAMS is only a proof of concept, we will only summarise a few statistics such as Average call duration over all users Number of internal calls Number of local calls Number of interstate calls Number of international calls 10

16 5.5 Ganglia Cluster Monitoring Utlisation L3DGEWorld Asterisk Management System (LAMS) provides network administrators, VoIP and Internet service providers to monitoring a cluster of VoIP servers. As LAMS is a prototype, a tool known as ÔGanglia Monitor CoreÕ will be used to assist in the monitoring of clusters of VoIP servers. Ganglia monitoring core is designed for super computing. Most often researchers use ganglia to manage and monitor a super computer, which comprises of multiple cluster nodes. Each nodeõs metrics such as CPU utilisation, memory allocation and disk space is centralised to one main server. The end product is a tabulated web page that displays the entire super computerõs status at a glance. Our decision to use ganglia is to save time on development and also use gangliaõs method of using multicast to pass statistics to one node Ganglia Overview Ganglia monitor is implemented on every VoIP server. Ganglia comprises of daemons that run on the host system. The following section explains the daemons used by the LAMS system. gmond Daemon that collects information about the host system (eg CPU utilisation, memory usage and disk space). It will tabulate the information gathered and send it to the ganglia core server (gmetad). Also offers statistics on request using simple TCP packets. gmetad Daemon that resides on a central machine that collects all the statistics from other host machines running gmond. All the information collected is stored in a database. The database is then used to create a tabulated webpage of all the cluster node statistics. gmetric Tool to inject and monitor custom metrics of the host system. gmetric communicates with the host gmond daemon which in turn informs the central gmetad daemon running on the LAMS server. gmetric is one of the reasons we can adapt ganglia to a cluster of VoIP servers. All daemonsõ on each component of the system talk to each using multicast and pass around small XML files that include system statistics. Having this system already in built has saved us time at developing a way to transfer data from each VoIP server to the LAMS server. The following is diagram on how ganglia monitor core works. The following diagram describes the logical and actually physical set up of our LAMS system. 11

17 System Metrics CPU Utlil Memory Disk Space Network Statistics VoIP Server 1 gmond UDP unicast gmetad VoIP Metrics Current Calls Channels in use Queues Application gmetric Ganglia Installation Ganglia monitoring core and web interface under FreeBSD 7.0 can be built from ports: #cd /usr/ports/sysutils/ganglia-monitor-core #make install #cd /usr/ports/sysutils/ganglia-webfrontend #make install *NB. In order to use the ganglia webfront, a webserver such as Apache that supports PHP must be installed and configured. To test gmond and invoke an XML response: #gmond #telnet localhost Ganglia Configuration gmond.conf is used to set the configuration for the gmond daemon. By default the gmond config file is located in /usr/local/etc/gmond.conf. Each VoIP server will have the same gmond configuration. We leave the default system metrics. The following are the lines needed for LAMS setup: 12

18 cluster { name = "LAMS 1.0 Server" owner = "HET556" latlong = "unspecified" url = " } host { location = "Core Network" } gmetad.conf sets how many clusters gmetad will display. The lines edited in this file is the following : data_source "LAMS 1.0" localhost gridname ÒLAMS 1.0Ó For security reasons, trusted hosts can be set by the following: trusted_hosts cjavier.caia.siwn.edu.au Custom Metric Insertion Custom metrics can be inserted into the ganglia system. gmetric is the tool that is used to achieve this. To insert a custom metric use the following metric: #gmetric -name MetricName -value MetricValue -unit MetricUnit Ðtype MetricType *NB. MetricValue can be a script that writes to stdout. For example a script or tool called ÔnocurrentcallsÕ returns the value of how many calls are made on the VoIP server. The following will inject the custom metric value into the ganglia system. #gmetric -name PBX1-currentcalls -value nocurrentcalls --unit Calls -type int8 Once geometric is executed, the database and any other gmetad daemons listening will receive the update. In order to renew the value of the custom metric, the command needs to be run again. A cron job can be used to continually update the custom metric. 5.6 FreeBSD Jails L3DGEWorld Asterisk Management System (LAMS) provides network administrators, VoIP and Internet service providers to monitoring a cluster of VoIP servers. As LAMS 13

19 is a prototype and due to hardware availability and time restraints, VoIP clusters can be created by using FreeBSD jails. FreeBSD jails are sub systems within a host FreeBSD system that act as real systems. Jails are used to imprison services such as web and name servers. If the server is attacked or corrupted, the whole system is not compromised, only the jail. Jails are also useful for small scale system testing. This report outlines the steps taken to implement more than one identical FreeBSD jails for networking and testing purposes. Each jail is configured to run Asterisk 1.4 and act as an individual IP PBX Scenario of testing For testing/prototyping purposes we want to simulate a scaled down LAMS system. These consist of three VoIP servers, at least four to ten VoIP clients for each VoIP server and one LAMS monitoring server. Due to time and hardware availability, we are forced to simulate a working scaled down version of LAMS. The following diagram describes the logical and actually physical set up of our LAMS system Hardware Specification According to Asterisk PBX documentation a 3 GHz system with 1 GB of RAM can support up to 25 channels [insert reference]. Have three Asterisk jail systems with 3 5 phones requiring a channel each leaves us with left over CPU power for others applications we will be running. Our host jail system has the following system specifications: CPU: Intel Celeron 2.8GHz RAM: 1024 MB Hard Drive: 60 GB FreeBSD Installation & Jail Building A standard FreeBSD 7.0 installation with the source files and ports tree was made on our host jail system Creation of first jail Majority of the steps followed correspond to the FreeBSD handbook documentation [insert reference], but with added steps here and there. #mkdir - p /usr/home/jail/asterisk1 #cd /usr/src #make world DESTDIR=/usr/home/jail/asterisk1 #cd etc/ 14

20 #make distribution DESTDIR=/usr/home/jail/askterisk1 #mount - t devfs devfs /usr/home/jail/asterisk1/dev Host network settings Each jail can be assigned another address. The host system needs to alias the address to the network card. #ifconfig fxp netmask alias To start jail #jail /usr/home/jail/asterisk1 pbx1.lams.home /bin/tcsh A shell prompt and you should now be inside your jail pbx1# Create an empty /etc/fstab file so at startup there is no complaining. Edit /etc/rc.conf with the following IP address Hostname rpcbind_enable= NO default route sshd_enable= YES Edit /etc/resolv.conf for DNS resolving Add a primary user Create a root password Once created, run the following to load /etc/rc.conf pbx1# /bin/sh /etc/rc sshd and other services you have enabled in /etc/rc.conf should be running Jail Management From the host system, jails can be managed with the following: // can be used to start a jail #jail [path to jail] [hostname] [ip address] [shell to start] #jls // lists all the jails running on the host system jexec // can be used to enter an existing jail from the host system. 15

21 5.6.7 Building Asterisk Jail 1 From the host system, the jail should have a basic FreeBSD file system. To be able to build asterisk, the src and port tree should be added. #mkdir -p /usr/home/jail/asterisk1/usr/ports #mount_nullfs /usr/ports /usr/home/jail/asterisk1/usr/ports #mount_nullfs /usr/src /usr/home/jail/asterisk1/usr/src Once inside the jail, the ports tree is read only, thus the WRKDIRPREFIX and DISTDIR need to be specified as an environmental variable. pbx1#mkdir /usr/portswork pbx1#set env WRKDIRPREFIX=/usr/portswork pbx1#set env DISTDIR=/usr/portsworks/usr/ports/distfiles Now from within the jail, ports building will work Cloning Asterisk Jail 1 Our first jail is up and running with all the modifications we want. We want another two identical. To clone the first jail all that is required is to copy the jail root directory to another location making sure to preserve. cp - pr asterisk1 asterisk2 cp - pr asterisk1 asterisk3 Each jail needs the following tasks edit the [asterisk]/etc/rc.conf - for the hostname and ip address touch the etc/fstab any sripts or daemons specific to hosts. assign the IP address alias on the host system. 5.7 Extraction of Telephony Statistics L3DGEWorld Asterisk Management System (LAMS) provides network administrators, VoIP and Internet service providers a way of monitoring a cluster of VoIP servers. A standard Asterisk server has been set up with simulated calls coming in and out to and from any kinds of numbers. One task that LAMS needs to achieve is to extract the telephony and server statistics from Asterisk. 16

22 5.7.1 Overview of Software Modules To ease the asterisk information extraction development process, scripts were divided into three distinct purposes. AMI-scripts, CDR-scripts and Gmetric scripts AMI-scripts Scripts that interact with the Asterisk Manager Interface CDR-scripts Scripts that use the Call Records to extract information Gmetric-grazer Scripts Scripts that call ami and cdr scripts then inject that information into the ganglia system. A diagram of the scripts the information flow is shown below. The functionality of these scripts can be used to create one daemon that sits on the PBX server. 5.8 Grazer L3DGEWorld input daemon 5.9 SIP call generation 17

23 Logical Setup fxp0 LAMS fxp fxp0 Physical Setup fxp0 jail1 fxp0 alias1 jail2 fxp0 alias2 fxp0 alia fxp0 alias2 fxp0 alias3 LAMS jail3 fxp0 alias3 18

24 gmetric-grazer.py Asterisk Manager Interface Scripts Call Record Scripts active_calls.py active_channels.py asterisk-clients.py asterisk-uptime.sh asterisk_hangchannel.sh asterisk_reload.sh asterisk_showchannel.sh asterisk_showpeers.sh no_internal_calls.py no_local_calls.py no_insterstate_calls.py no_internal_calls.py call_duration.py 19

25 Chapter 6 Testing Procedures & Results 6.1 Impact of system on network Traffic Analaysis 6.2 Polling Intervals 6.3 Visual Interpretation 20

26 Chapter 7 Discussion 7.1 Limitations of system Geographic & Latency issues 7.2 Development Problems Encountered Timing Issues 7.3 2D verses 3D visual monitoring analysis 21

27 Chapter 8 Future Work 8.1 More Management & Monitoring Features 8.2 L3DGEWorld Development 8.3 VoIP Protocol integration 8.4 Incorporate Billing Statistics 8.5 Security Development & Implementation 22

28 Chapter 9 Conclusion 23

29 Acknowledgment We would like to express my deep sense of gratitude to Professor Grenville Armitage, for hist invaluable help and guidance during the course of project. We are highly indebted to them for constantly encouraging me by giving their critics on my work. We are grateful to them for having given me the support and confidence. Gaurav Trivedi May 2000 Indian Institute of Technology, Bombay 24

30 References 25

31 Appendix A Acronyms & Abbreviations 26

32 Appendix B Pythonising a C library using SWIG L3DGEWorld Asterisk Management System (LAMS) provides network administrators, VoIP and Internet service providers to monitoring a cluster of VoIP servers. Primarily its purpose is for intrusion detection systems for networks. L3DGEWorld has been used for many other monitoring systems in the past [INSERT REFERENCE]. As L3DGEWorld is a diverse concept, various input daemons have been written to interact with the Quake III engine that L3DGEWorld sits on. The various daemon inputs all implement a variation on a C library called Ôl3dgecommsÕ. As it is written in C, developers are sometimes force to write the entire daemon in C. SWIG is a solution to porting a C library to higher level languages such as Perl, Java and Python. This report outlines how Ôl3dgecommsÕ library was ported as a Python module. B.1 SWIG interface file SWIG needs an interface file into the C library. The interface file allows SWIG to create a wrapper for the C. The following Ôl3gecomms.iÕ interface file was created. \%module l3dgecomms \%{ /* Place include tags in this section */ #include "l3dgecomms.h" \%} \%include "l3dgecomms.h" /* Define all extern functions in C file */ Then swig is used to create a wrapper c file. 27

33 #swig -python l3dgecomms.i B.2 Compile C file Compile the c file and wrapper c file. ÐI is the location of the c header files on your system. It will vary from system to system. #gcc -c l3dgecomms.c l3dgecomms_wrap.c -I /usr/local/include/python2.5 B.3 Create and link new python module #ld -shared l3dgecomms.o l3dgecomms_wrap.o Ðo _l3dgecomms.so B.4 Testing new l3dgecomms python module Python can now use the l3dgecomms module and use all functions that are in the c library. To test the library, we use the three functions needed to update the LAMS server. import os, sys, string import l3dgecomms l3dgecomms.setupcomms(none,0," ",27960) l3dgecomms.sendmessage(1,1,"r","6") l3dgecomms.closecomms() 28

GANGLIA INSTALLATION GUIDE

GANGLIA INSTALLATION GUIDE GANGLIA INSTALLATION GUIDE -Prashant Bhamidipati (prashant@hepmail.uta.edu) Section-1 : Ganglia installation procedure Section-2 : GMOND & GMETAD Configuration 1 Section 1 Ganglia installation procedure

More information

CycleServer Grid Engine Support Install Guide. version 1.25

CycleServer Grid Engine Support Install Guide. version 1.25 CycleServer Grid Engine Support Install Guide version 1.25 Contents CycleServer Grid Engine Guide 1 Administration 1 Requirements 1 Installation 1 Monitoring Additional OGS/SGE/etc Clusters 3 Monitoring

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne

More information

How to Push CDR Files from Asterisk to SDReporter. September 27, 2013

How to Push CDR Files from Asterisk to SDReporter. September 27, 2013 How to Push CDR Files from Asterisk to SDReporter September 27, 2013 Table of Contents Revision History... 3 1 Introduction... 4 2 Build Asterisk... 4 3 Configure Asterisk... 4 3.1 Load CDR Modules...

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

The QueueMetrics Uniloader User Manual. Loway

The QueueMetrics Uniloader User Manual. Loway The QueueMetrics Uniloader User Manual Loway The QueueMetrics Uniloader User Manual Loway Table of Contents 1. What is Uniloader?... 1 2. Installation... 2 2.1. Running in production... 2 3. Concepts...

More information

STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM

STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM Albert M. K. Cheng, Shaohong Fang Department of Computer Science University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0

Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0 Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0 Third edition (May 2012). Copyright International Business Machines Corporation 2012. US Government Users Restricted

More information

CLC Server Command Line Tools USER MANUAL

CLC Server Command Line Tools USER MANUAL CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej

More information

Setup Guide: on the MyNetFone Service. Revision History

Setup Guide: on the MyNetFone Service. Revision History Setup Guide: on the MyNetFone Service Revision History Version Author Revision Description Release Date 1.0 Sampson So Initial Draft 02/01/2008 2.0 Sampson So Update 27/09/2011 1 Table of Contents Introduction...

More information

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation

More information

ASTERISK & PHP. Hans-Christian Otto International PHP Conference 2010 SE Berlin, June 1, 2010

ASTERISK & PHP. Hans-Christian Otto International PHP Conference 2010 SE Berlin, June 1, 2010 ASTERISK & PHP Hans-Christian Otto International PHP Conference 2010 SE Berlin, June 1, 2010 1 ABOUT ME PHP since 2004 Asterisk since 2007 working as a freelancer for various companys computer science

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

DNA. White Paper. DNA White paper Version: 1.08 Release Date: 1 st July, 2015 Expiry Date: 31 st December, 2015. Ian Silvester DNA Manager.

DNA. White Paper. DNA White paper Version: 1.08 Release Date: 1 st July, 2015 Expiry Date: 31 st December, 2015. Ian Silvester DNA Manager. DNA White Paper Prepared by Ian Silvester DNA Manager Danwood Group Service Noble House Whisby Road Lincoln LN6 3DG Email: dna@danwood.com Website: www.danwood.com\dna BI portal: https:\\biportal.danwood.com

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

FioranoMQ 9. High Availability Guide

FioranoMQ 9. High Availability Guide FioranoMQ 9 High Availability Guide Copyright (c) 1999-2008, Fiorano Software Technologies Pvt. Ltd., Copyright (c) 2008-2009, Fiorano Software Pty. Ltd. All rights reserved. This software is the confidential

More information

Using RADIUS Agent for Transparent User Identification

Using RADIUS Agent for Transparent User Identification Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your

More information

Network Probe User Guide

Network Probe User Guide Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5

More information

Mediatrix 3000 with Asterisk June 22, 2011

Mediatrix 3000 with Asterisk June 22, 2011 Mediatrix 3000 with Asterisk June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Introduction... 3 Network Topology... 3 Equipment Detail... 3 Configuration of the Fax Extension... 4 Configuration

More information

End User Guide The guide for email/ftp account owner

End User Guide The guide for email/ftp account owner End User Guide The guide for email/ftp account owner ServerDirector Version 3.7 Table Of Contents Introduction...1 Logging In...1 Logging Out...3 Installing SSL License...3 System Requirements...4 Navigating...4

More information

Kerio Operator. Administrator s Guide. Kerio Technologies

Kerio Operator. Administrator s Guide. Kerio Technologies Kerio Operator Administrator s Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio Operator, version 1.0. All additional modifications

More information

Signiant Agent installation

Signiant Agent installation Signiant Agent installation Release 11.3.0 March 2015 ABSTRACT Guidelines to install the Signiant Agent software for the WCPApp. The following instructions are adapted from the Signiant original documentation

More information

Network Traffic Analysis

Network Traffic Analysis 2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing

More information

s@lm@n Oracle Exam 1z0-102 Oracle Weblogic Server 11g: System Administration I Version: 9.0 [ Total Questions: 111 ]

s@lm@n Oracle Exam 1z0-102 Oracle Weblogic Server 11g: System Administration I Version: 9.0 [ Total Questions: 111 ] s@lm@n Oracle Exam 1z0-102 Oracle Weblogic Server 11g: System Administration I Version: 9.0 [ Total Questions: 111 ] Oracle 1z0-102 : Practice Test Question No : 1 Which two statements are true about java

More information

PVFS High Availability Clustering using Heartbeat 2.0

PVFS High Availability Clustering using Heartbeat 2.0 PVFS High Availability Clustering using Heartbeat 2.0 2008 Contents 1 Introduction 2 2 Requirements 2 2.1 Hardware................................................. 2 2.1.1 Nodes...............................................

More information

SAIP 2012 Performance Engineering

SAIP 2012 Performance Engineering SAIP 2012 Performance Engineering Author: Jens Edlef Møller (jem@cs.au.dk) Instructions for installation, setup and use of tools. Introduction For the project assignment a number of tools will be used.

More information

Command Line Interface User Guide for Intel Server Management Software

Command Line Interface User Guide for Intel Server Management Software Command Line Interface User Guide for Intel Server Management Software Legal Information Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel

More information

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark

More information

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Basic Installation of the Cisco Collection Manager

Basic Installation of the Cisco Collection Manager CHAPTER 3 Basic Installation of the Cisco Collection Manager Introduction This chapter gives the information required for a basic installation of the Cisco Collection Manager and the bundled Sybase database.

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical

More information

This chapter describes how to set up and manage VPN service in Mac OS X Server.

This chapter describes how to set up and manage VPN service in Mac OS X Server. 6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure

More information

Syncplicity On-Premise Storage Connector

Syncplicity On-Premise Storage Connector Syncplicity On-Premise Storage Connector Implementation Guide Abstract This document explains how to install and configure the Syncplicity On-Premise Storage Connector. In addition, it also describes how

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

IP Phone Presence Setup

IP Phone Presence Setup Static Route Configuration on IM and Presence Service, page 1 Presence Gateway Configuration on IM and Presence Service, page 6 Configure SIP Publish Trunk on IM and Presence Service, page 7 Configure

More information

Oracle EXAM - 1Z0-102. Oracle Weblogic Server 11g: System Administration I. Buy Full Product. http://www.examskey.com/1z0-102.html

Oracle EXAM - 1Z0-102. Oracle Weblogic Server 11g: System Administration I. Buy Full Product. http://www.examskey.com/1z0-102.html Oracle EXAM - 1Z0-102 Oracle Weblogic Server 11g: System Administration I Buy Full Product http://www.examskey.com/1z0-102.html Examskey Oracle 1Z0-102 exam demo product is here for you to test the quality

More information

Rally Installation Guide

Rally Installation Guide Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access

More information

Following the general section, clients are defined, one per section. Sections are delineated by their name in brackets.

Following the general section, clients are defined, one per section. Sections are delineated by their name in brackets. Iax.conf Synopsis This file is used to configure clients connecting via the Inter-Asterisk Exchange protocol. IAX is primarily used for passing calls between Asterisk servers. Frequently Multiple Asterisk

More information

42goISP Documentation

42goISP Documentation 42goISP Documentation 42goISP Documentation I Table of Contents General...1 1 What is 42goISP?...1 2 Terms and structure of the manual...1 3 Installation/Upgrade/Deinstallation...1 3.1 Installation...1

More information

Installation and Deployment

Installation and Deployment Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

RSA Security Analytics Virtual Appliance Setup Guide

RSA Security Analytics Virtual Appliance Setup Guide RSA Security Analytics Virtual Appliance Setup Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks or

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Aqua Connect Load Balancer User Manual (Mac)

Aqua Connect Load Balancer User Manual (Mac) Aqua Connect Load Balancer User Manual (Mac) Table of Contents About Aqua Connect Load Balancer... 3 System Requirements... 4 Hardware... 4 Software... 4 Installing the Load Balancer... 5 Configuration...

More information

Scalable Linux Clusters with LVS

Scalable Linux Clusters with LVS Scalable Linux Clusters with LVS Considerations and Implementation, Part II Eric Searcy Tag1 Consulting, Inc. emsearcy@tag1consulting.com May 2008 Abstract Whether you are perusing mailing lists or reading

More information

Installing, Uninstalling, and Upgrading Service Monitor

Installing, Uninstalling, and Upgrading Service Monitor CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page

More information

QuickDNS 4.6 Installation Instructions

QuickDNS 4.6 Installation Instructions QuickDNS 4.6 Installation Instructions for Windows, Solaris, Linux, FreeBSD and Mac OS Table of Contents INTRODUCTION 3 QuickDNS system requirements 3 INSTALLING QUICKDNS MANAGER 4 Windows installation

More information

Deploy the ExtraHop Discover Appliance with Hyper-V

Deploy the ExtraHop Discover Appliance with Hyper-V Deploy the ExtraHop Discover Appliance with Hyper-V 2016 ExtraHop Networks, Inc. All rights reserved. This manual, in whole or in part, may not be reproduced, translated, or reduced to any machine-readable

More information

1z0-102 Q&A. DEMO Version

1z0-102 Q&A. DEMO Version Oracle Weblogic Server 11g: System Administration Q&A DEMO Version Copyright (c) 2013 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration purpose only, this free version

More information

Penetration Testing LAB Setup Guide

Penetration Testing LAB Setup Guide Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - magikh0e@ihtb.org Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this

More information

Application Servers - BEA WebLogic. Installing the Application Server

Application Servers - BEA WebLogic. Installing the Application Server Proven Practice Application Servers - BEA WebLogic. Installing the Application Server Product(s): IBM Cognos 8.4, BEA WebLogic Server Area of Interest: Infrastructure DOC ID: AS01 Version 8.4.0.0 Application

More information

Troubleshooting This document outlines some of the potential issues which you may encouter while administering an atech Telecoms installation.

Troubleshooting This document outlines some of the potential issues which you may encouter while administering an atech Telecoms installation. Troubleshooting This document outlines some of the potential issues which you may encouter while administering an atech Telecoms installation. Please consult this document before contacting atech Telecoms

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

FileCruiser Backup & Restoring Guide

FileCruiser Backup & Restoring Guide FileCruiser Backup & Restoring Guide Version: 0.3 FileCruiser Model: VA2600/VR2600 with SR1 Date: JAN 27, 2015 1 Index Index... 2 Introduction... 3 Backup Requirements... 6 Backup Set up... 7 Backup the

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

The Benefits of Verio Virtual Private Servers (VPS) Verio Virtual Private Server (VPS) CONTENTS

The Benefits of Verio Virtual Private Servers (VPS) Verio Virtual Private Server (VPS) CONTENTS Performance, Verio FreeBSD Virtual Control, Private Server and (VPS) Security: v3 CONTENTS Why outsource hosting?... 1 Some alternative approaches... 2 Linux VPS and FreeBSD VPS overview... 3 Verio VPS

More information

VoIP and FreeBSD. The daemon meets the phone. May 15th, 2008 University of Ottawa,, Ottawa, Canada Massimiliano Stucchi stucchi@briantel.

VoIP and FreeBSD. The daemon meets the phone. May 15th, 2008 University of Ottawa,, Ottawa, Canada Massimiliano Stucchi stucchi@briantel. VoIP and FreeBSD The daemon meets the phone May 15th, 2008 University of Ottawa,, Ottawa, Canada Massimiliano Stucchi stucchi@briantel.com Agenda Introduction Terms Introduction to Asterisk key concepts

More information

Linux VPS with cpanel. Getting Started Guide

Linux VPS with cpanel. Getting Started Guide Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3

More information

White Paper. Intrusion Detection Deploying the Shomiti Century Tap

White Paper. Intrusion Detection Deploying the Shomiti Century Tap White Paper Intrusion Detection Deploying the Shomiti Century Tap . Shomiti Tap Deployment Purpose of this Paper The scalability of Intrusion Detection Systems (IDS) is often an issue when deploying an

More information

Cluster@WU User s Manual

Cluster@WU User s Manual Cluster@WU User s Manual Stefan Theußl Martin Pacala September 29, 2014 1 Introduction and scope At the WU Wirtschaftsuniversität Wien the Research Institute for Computational Methods (Forschungsinstitut

More information

The Monitis Monitoring Agent ver. 1.2

The Monitis Monitoring Agent ver. 1.2 The Monitis Monitoring Agent ver. 1.2 General principles, Security and Performance Monitis provides a server and network monitoring agent that can check the health of servers, networks and applications

More information

Product Version 1.0 Document Version 1.0-B

Product Version 1.0 Document Version 1.0-B VidyoDashboard Installation Guide Product Version 1.0 Document Version 1.0-B Table of Contents 1. Overview... 3 About This Guide... 3 Prerequisites... 3 2. Installing VidyoDashboard... 5 Installing the

More information

Hadoop Lab - Setting a 3 node Cluster. http://hadoop.apache.org/releases.html. Java - http://wiki.apache.org/hadoop/hadoopjavaversions

Hadoop Lab - Setting a 3 node Cluster. http://hadoop.apache.org/releases.html. Java - http://wiki.apache.org/hadoop/hadoopjavaversions Hadoop Lab - Setting a 3 node Cluster Packages Hadoop Packages can be downloaded from: http://hadoop.apache.org/releases.html Java - http://wiki.apache.org/hadoop/hadoopjavaversions Note: I have tested

More information

Introduction to Running Computations on the High Performance Clusters at the Center for Computational Research

Introduction to Running Computations on the High Performance Clusters at the Center for Computational Research ! Introduction to Running Computations on the High Performance Clusters at the Center for Computational Research! Cynthia Cornelius! Center for Computational Research University at Buffalo, SUNY! cdc at

More information

Monitoring Cluster on Online Compiler with Ganglia

Monitoring Cluster on Online Compiler with Ganglia Monitoring Cluster on Online Compiler with Ganglia Nuryani, Andria Arisal, Wiwin Suwarningsih, Taufiq Wirahman Research Center for Informatics, Indonesian Institute of Sciences Komp. LIPI, Gd. 20, Lt.

More information

Preinstallation Requirements Guide

Preinstallation Requirements Guide Preinstallation Requirements Guide Synergy 3.4.9 June 2015 Synergy 2015 TOC 1: Introduction 4 Synergy platform modules 4 Synergy install procedure - your responsibilities 4 Further information about Synergy

More information

Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop

Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop 14/01/05 file:/data/hervey/docs/pre-sanog/web/ha/security/apache-ssl-exercises.html #1 Exercises Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop 1. Install Apache with SSL support 2. Configure

More information

EQUELLA. Clustering Configuration Guide. Version 6.0

EQUELLA. Clustering Configuration Guide. Version 6.0 EQUELLA Clustering Configuration Guide Version 6.0 Document History Document No. Reviewed Finalised Published 1 17/10/2012 17/10/2012 17/10/2012 October 2012 edition. Information in this document may change

More information

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan

More information

Configuring Nex-Gen Web Load Balancer

Configuring Nex-Gen Web Load Balancer Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting

More information

WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES

WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES WEBTITAN CLOUD User Identification Guide This guide explains how to install and configure the WebTitan Cloud Active Directory components required

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records

More information

OS Installation Guide Red Hat Linux 9.0

OS Installation Guide Red Hat Linux 9.0 OS Installation Guide Red Hat Linux 9.0 C o n t e n t s Contents 3 About This Guide 5 1 Planning Your Installation 7 Requirements 7 2 Installing Red Hat 9.0 Error! Bookmark not defined. What s Next? 19

More information

Integrating VoltDB with Hadoop

Integrating VoltDB with Hadoop The NewSQL database you ll never outgrow Integrating with Hadoop Hadoop is an open source framework for managing and manipulating massive volumes of data. is an database for handling high velocity data.

More information

virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06

virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 SWsoft Virtuozzo 3.5.1 (for Windows) Review 2 Summary 0. Introduction 1. Installation 2. VPSs creation and modification

More information

Firewall Builder Architecture Overview

Firewall Builder Architecture Overview Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.

More information

Source Code Management for Continuous Integration and Deployment. Version 1.0 DO NOT DISTRIBUTE

Source Code Management for Continuous Integration and Deployment. Version 1.0 DO NOT DISTRIBUTE Source Code Management for Continuous Integration and Deployment Version 1.0 Copyright 2013, 2014 Amazon Web Services, Inc. and its affiliates. All rights reserved. This work may not be reproduced or redistributed,

More information

IMPLEMENTING GREEN IT

IMPLEMENTING GREEN IT Saint Petersburg State University of Information Technologies, Mechanics and Optics Department of Telecommunication Systems IMPLEMENTING GREEN IT APPROACH FOR TRANSFERRING BIG DATA OVER PARALLEL DATA LINK

More information

TEL 500 WRITE UP WEEK 8 FREE PBX SIP LAB SUBMITTED TO: PROF. RONNY BULL BY: ANUSHA ALIGAPALLY

TEL 500 WRITE UP WEEK 8 FREE PBX SIP LAB SUBMITTED TO: PROF. RONNY BULL BY: ANUSHA ALIGAPALLY TEL 500 WRITE UP WEEK 8 FREE PBX SIP LAB SUBMITTED TO: PROF. RONNY BULL BY: ANUSHA ALIGAPALLY DATE: 11/05/2014 ABSTRACT: Private Branch Exchange has multiple phones connected to it which are in the same

More information

ELIXIR LOAD BALANCER 2

ELIXIR LOAD BALANCER 2 ELIXIR LOAD BALANCER 2 Overview Elixir Load Balancer for Elixir Repertoire Server 7.2.2 or greater provides software solution for load balancing of Elixir Repertoire Servers. As a pure Java based software

More information

Oracle Fusion Middleware 11gR2: Forms, and Reports (11.1.2.0.0) Certification with SUSE Linux Enterprise Server 11 SP2 (GM) x86_64

Oracle Fusion Middleware 11gR2: Forms, and Reports (11.1.2.0.0) Certification with SUSE Linux Enterprise Server 11 SP2 (GM) x86_64 Oracle Fusion Middleware 11gR2: Forms, and Reports (11.1.2.0.0) Certification with SUSE Linux Enterprise Server 11 SP2 (GM) x86_64 http://www.suse.com 1 Table of Contents Introduction...3 Hardware and

More information

Discovering passwords in the memory

Discovering passwords in the memory Discovering passwords in the memory Abhishek Kumar (abhishek.kumar@paladion.net) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability

More information

Veritas Cluster Server

Veritas Cluster Server APPENDIXE This module provides basic guidelines for the (VCS) configuration in a Subscriber Manager (SM) cluster installation. It assumes basic knowledge of the VCS environment; it does not replace the

More information

Avira Update Manager User Manual

Avira Update Manager User Manual Avira Update Manager User Manual Table of contents Table of contents 1. Product information........................................... 4 1.1 Functionality................................................................

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

Configuring and Monitoring Hitachi SAN Servers

Configuring and Monitoring Hitachi SAN Servers Configuring and Monitoring Hitachi SAN Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

Test on IX130 Performance

Test on IX130 Performance Test on IX130 Performance This document aims to report the performance of IX130. We design a few scenarios where uses IX130, including gateway and PBX and how well the performance of handling transcoding.

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

ODBC Driver User s Guide. Objectivity/SQL++ ODBC Driver User s Guide. Release 10.2

ODBC Driver User s Guide. Objectivity/SQL++ ODBC Driver User s Guide. Release 10.2 ODBC Driver User s Guide Objectivity/SQL++ ODBC Driver User s Guide Release 10.2 Objectivity/SQL++ ODBC Driver User s Guide Part Number: 10.2-ODBC-0 Release 10.2, October 13, 2011 The information in this

More information

Configuration Notes 283

Configuration Notes 283 Mediatrix 4400 Digital Gateway VoIP Trunking with a Legacy PBX June 21, 2011 Proprietary 2011 Media5 Corporation Table of Contents Table of Contents... 2 Introduction... 3 Mediatrix 4400 Digital Gateway

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Kerio Operator. Administrator s Guide. Kerio Technologies

Kerio Operator. Administrator s Guide. Kerio Technologies Kerio Operator Administrator s Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio Operator, version 1.1.1. All additional modifications

More information

How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions

How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions Overview: This document provides a reference for configuration of the Cisco UC500 IP PBX to connect to Integra Telecom SIP Trunks.

More information