Monitoring GSS Operation
|
|
|
- Barry Pierce
- 9 years ago
- Views:
Transcription
1 CHAPTER 9 The GSS software includes a number of tools that allow you to monitor the operating status of the GSS devices on your GSS network. These tools include CLI-based commands and the primary GSSM GUI pages that display the status of your GSSs, GSSMs (primary and standby), and the GSSM database. This chapter contains the following major sections: Monitoring GSS and GSSM Status Monitoring the GSSM Database Status Viewing the GSS Operating Configuration for Technical Support Configuring the Support Password for Technical Support Note You can use the show statistics CLI command to display content routing and load-balancing statistics for each component of your GSS global server load-balancing operation: Boomerang (CRAs), DNS, DNS sticky, network proximity, and keepalives. See the Cisco Global Server Load-Balancing Configuration Guide (GUI-based or CLI-based version) for details about displaying statistics using the show statistics command. 9-1
2 Monitoring GSS and GSSM Status Chapter 9 Monitoring GSS and GSSM Status From the CLI of each GSS device, you can monitor the following: Online status and resource usage of the individual GSS subsystems (servers) by using the gss status command Current operating status of your GSS device, including online status, current software version, and start date or time for the individual GSS subsystems by using the show system-status command From the primary GSSM GUI, you can monitor the status of the GSS devices in your GSS network, including online status, software version, current device role network address, hostname, and MAC address of each device. This section contains the following topics: Monitoring the GSS Device Online Status from the CLI Monitoring the GSS Device System Status from the CLI Monitoring the GSS Device Status from the Primary GSSM GUI Monitoring the GSS Device Online Status from the CLI To monitor the status and resource usage of a GSS device from the CLI, perform the following steps: 1. Log in to the CLI of a GSS device and enable privileged EXEC mode. gssm1.example.com> enable gssm1.example.com# 2. Display the current running status of the GSS device by using the following command: gssm1.example.com# gss status Cisco GSS - 1.3(1) GSS [Wed Feb 15 21:09:09 UTC 2006] Registered to primary GSSM: Normal Operation [runmode = 5] START SERVER Jul09 Boomerang Jul09 Config Agent (crdirector) Jul09 Config Server (crm) Jul09 DNS Server Jul09 Database Jul09 GUI Server (tomcat) Jul09 Keepalive Engine Jul09 Node Manager Jul09 Proximity Jul09 Sticky Jul09 Web Server (apache) The status of the License Manager (LM) and the Distributed Denial of Service (DDoS) prevention module do not appear in the output of the gss status command. To obtain DDoS status, enter the show ddos status command and to obtain LM status, enter show processes grep license_manager. For example, enter: gssm1.example.com# show processes grep license_manager 9-2
3 Chapter 9 Monitoring GSS and GSSM Status license_manager :00:00 Nov02 Note When the DNS server is ready to serve DNS requests, it generates the following subsystem log message and saves it in the system.log file: Mar 25 10:45:26 gssm1.example.com DNS-5-SELREADYINFO[2073] Selector ready to start serving DNS requests 3. Include statistics about the CPU utilization when displaying information on the current GSS operating state by entering the following command: gssm1.example.com# gss status verbose Cisco GSS - 1.3(1) GSS [Wed Feb 31 21:09:09 UTC 2006] Registered to primary GSSM: Normal Operation [runmode = 5] %CPU START SERVER :55 Boomerang :55 Config Agent (crdirector) :55 Config Server (crm) :55 DNS Server :55 Database :55 GUI Server (tomcat) :55 Keepalive Engine :58 Node Manager :58 Proximity :58 Sticky :55 Web Server (apache) Monitoring the GSS Device System Status from the CLI To monitor the current operating status of a GSS device from the CLI, perform the following steps: 1. Log in to the CLI of a GSS device and enable privileged EXEC mode. gss1.example.com> enable gss1.example.com# 2. Display the current running status of the GSS device by entering the following command: gssm1.example.com# show system-status Cisco GSS - 1.3(1) GSS Manager - primary [Wed Feb 15 16:37:37 UTC 2006] Normal Operation [runmode = 5] START SERVER Jul09 Boomerang Jul09 Config Agent (crdirector) Jul09 Config Server (crm) Jul09 DNS Server Jul09 Database Jul09 GUI Server (tomcat) Jul09 Keepalive Engine Jul09 Node Manager 9-3
4 Monitoring the GSSM Database Status Chapter 9 Jul09 Proximity Jul09 Sticky Jul09 Web Server (apache) Note The equivalent CLI command is gss status. Monitoring the GSS Device Status from the Primary GSSM GUI To monitor the status of GSS devices from the primary GSSM GUI, perform the following steps: 1. From the primary GSSM GUI, click the Resources tab. 2. Click the Global Site Selectors navigation link. The Global Site Selector list page appears displaying the status, role, and IP address of each GSS in the network. 3. Click the Modify GSS icon for the GSS or GSSM to monitor. The Global Site Selectors details page appears, displaying configuration and status information about the device at the bottom of the page. The device type (GSS or GSSM) appears in the Node Services column. Displayed information is as follows: Status Online or offline Version Software version currently loaded on the device Node services Current role of the device (GSS, primary or standby GSSM, or both) IP address Network address of the device Hostname Network hostname of the device MAC Machine address of the device 4. Click Cancel to return to the Global Site Selectors list page. Monitoring the GSSM Database Status The GSS software includes a number of CLI commands to monitor the status of the GSSM database and its contents. This section contains the following topics: Monitoring the Database Status Validating Database Records Creating a Database Validation Report Monitoring the Database Status To verify that the database running on the primary GSSM is functioning properly, perform the following steps: 1. Log in to the CLI of the primary GSSM and enable privileged EXEC mode. gssm1.example.com> enable gssm1.example.com# 9-4
5 Chapter 9 Monitoring the GSSM Database Status 2. Display the operating status of the GSSM database by entering the following command: gssm1.example.com# gssm database status GSSM database is running. Validating Database Records To validate the records in your GSSM database, perform the following steps: 1. Log in to the CLI of the primary GSSM and enable privileged EXEC mode. gssm1.example.com> enable gssm1.example.com# 2. Validate the content of your GSSM database by entering the following command: gssm1.example.com# gssm database validate GSSM database passed validation. Creating a Database Validation Report If you encounter problems while validating your GSSM database, you can generate a report, called validation.log, that details which database records failed validation. The gssm database report command constructs a list of invalid records in the GSSM database and writes the results to validation.log in the /home directory. To generate a database validation report, perform the following steps: 1. Log in to the CLI of the primary GSSM and enable privileged EXEC mode. gssm1.example.com> enable gssm1.example.com# 2. Generate a validation report on the content of your GSSM database by entering the following command: gss1.example.com# gssm database report GSSM database validation report written to validation.log. 3. View the contents of your validation report by entering the following command: gss1.example.com# type validation.log validation.log Start logging at Wed Feb 15 19:17:21 GMT+00: storeadmin Validating... Wed Feb 15 19:17:23 GMT+00: ObjectId Object_Name.Field_Name Description - Validating FactoryInfo Validating answerelement Validating answergroup 70 answergroup.ownerid Many-To-One List Validating CachingConfig Validating ClusterConfig Validating CmdControl 9-5
6 Viewing the GSS Operating Configuration for Technical Support Chapter 9 Validating CmdPurgeRd Validating CmdUpdate Validating ConfigProperty Validating Customer Validating DistTree Validating DnsRule Validating DomainElement Validating DomainGroup Validating ENodeConfig Validating ENodeStatus Validating KeepAliveConfig Validating KeepAlive Validating Location Validating OrderedanswerGroup Validating Owner Validating Region Validating RequestHandler Validating RoutedDomain Validating RoutingConfig Validating RrConfig Validating RrStatus Validating SNodeConfig Validating SourceAddressElement Validating SourceAddressGroup Validating SpInfo Validating SystemConfig Validating UpdateInfo Validating UserConfig Validating VirtualCDN Validating WlpanswerElement Validating User Validations End of file validation.log Viewing the GSS Operating Configuration for Technical Support The GSS software includes two CLI commands to assist a Cisco Technical Assistance Center (TAC) representative in troubleshooting potential problems on your GSS network. Use the following CLI commands: show tech-support [config core-files] Displays a report on the current operating configuration of your GSS device that can be used by a Cisco TAC representative in troubleshooting problems on your GSS network. The config option exports the output of all configured fields from the primary GSSM GUI. gss tech-report filename Generates a detailed report for use by a Cisco TAC representative in troubleshooting persistent GSS problems. The file generated is a compressed tar- format archive file with a.tgz extension. The filename argument identifies a user-assigned name for the report generated by the gss tech-report command. For example, to display an operating configuration report for your GSS device, enter: gssm1.example.com(config)# show tech-support Cisco GSS - 1.3(1.0.0) - host-gss GSS software GSSM - standby [[Wed Feb 15 16:39:09 UTC 2006] Registered to primary GSSM: Normal Operation [runmode = 5] START SERVER Sep15 Boomerang Sep15 Config Agent (crdirector) 9-6
7 Chapter 9 Viewing the GSS Operating Configuration for Technical Support Sep15 Config Server (crm) Sep15 DNS Server Sep15 Database Sep15 GUI Server (tomcat) Sep15 Keepalive Engine Sep15 Node Manager Sep15 Web Server (apache) *** clock *** System time: Wed Feb 15 16:41:24 UTC 2006 *** uptime *** Uptime: 22 Hours 41 Minutes and 48 seconds *** running-config *** interface ethernet 0 ip address gss-communications interface ethernet 1 ip address gss-tcp-keepalives... To export the output of all configured fields from the primary GSSM GUI, enter: gssm1.example.com(config)# show tech-support config GUI Configuration Export: Wed Feb 15 16:46:24 GMT+00: Global Site Selectors: GSS1: Global Site Selector: charon.cisco.com Status: Online Node Services: GSS IP Address: Location: Region: GSS2: Global Site Selector: geryon.cisco.com Status: Online Node Services: GSS IP Address: Location: Region: GSS3: GGlobal Site Selector: ladon.cisco.com Status: Online Node Services: GSS; Standby GSSM IP Address: Location: Region: GSS4: Global Site Selector: icarus.cisco.com Status: Online Node Services: GSS IP Address: Location: Region: DNS Rules: Rule1: Name: ECommerce Source Address List: Anywhere Domain List: ECommerce Owner: ECommerce-Database Status: Active Match DNS Query Type: A record Answer Group 1: Database-Services Balance Method 1: Hashed 9-7
8 Configuring the Support Password for Technical Support Chapter 9 Balance Clause Options 1: DNS TTL: 20; Return Record Count: 1; Answer Group 2: Balance Method 2: Balance Clause Options 2: Answer Group 3: Balance Method 3: Configuring the Support Password for Technical Support For debugging purposes, a Cisco Technical Assistance Center (TAC) representative may ask you to set the GSS support password using the supportpass command and then communicate that password to the support engineer. The support engineer can then access the engineering mode using the support password that you provide. The syntax of this command is as follows: supportpass After you enter the command, the CLI prompts you for the Admin password, which is required to set the support password. The CLI then prompts you for the support password. Enter an alphanumeric string that can contain spaces and special characters. Though the password can be an unlimited number of characters, we recommend that you limit the number of characters to 10 or less. For example, to set the GSS support password, enter: gss1.example.com# supportpass Admin Password: <admin_password> Set GSS support Password: <support_password> Confirm GSS support Password: <support_password> You can use the show supportpass-status command to see if the GSS support password has been set. For example, enter: gss1.example.com# show supportpass-status GSS support password is set. To delete the support password, enter a null value for the password by pressing Enter without entering a support password. To change the support password, enter the command again and define the new password. 9-8
Backing Up and Restoring Data
Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application
Cisco Global Site Selector CLI-Based Global Server Load-Balancing Configuration Guide
Cisco Global Site Selector CLI-Based Global Server Load-Balancing Configuration Guide Software Version 4.1.2 May 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
Managing User Accounts
Managing User Accounts This chapter includes the following sections: Active Directory, page 1 Configuring Local Users, page 3 Viewing User Sessions, page 5 Active Directory Active Directory is a technology
CLI Commands and Disaster Recovery System
CLI Commands on Cisco Prime Collaboration Deployment, page 1 CLI Commands on Cisco Prime Collaboration Deployment The main functions of Cisco Prime Collaboration Deployment (such as creating migration,
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices Secure Access How-to User Series Author: Technical Marketing, Policy and Access, Security Business Group, Cisco Systems Date: January
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Configure Cisco Emergency Responder Disaster Recovery System
Configure Cisco Emergency Responder Disaster Recovery System Disaster Recovery System overview, page 1 Backup and restore procedures, page 2 Supported features and components, page 4 System requirements,
Single Sign On. Configuration Checklist for Single Sign On CHAPTER
CHAPTER 39 The single sign on feature allows end users to log into a Windows client machine on a Windows domain, then use certain Cisco Unified Communications Manager applications without signing on again.
System Administration and Log Management
CHAPTER 6 System Overview System Administration and Log Management Users must have sufficient access rights, or permission levels, to perform any operations on network elements (the devices, such as routers,
You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource
The feature enables the configuration of a Virtual Private Network (VPN) routing and forwarding instance (VRF) table so that the domain name system (DNS) can forward queries to name servers using the VRF
GLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
Single Sign On. Configuration Checklist for Single Sign On CHAPTER
CHAPTER 39 The single sign on feature allows end users to log into a Windows client machine on a Windows domain, then use certain Cisco Unified Communications Manager applications without signing on again.
Ensure that your environment meets the requirements. Provision the OpenAM server in Active Directory, then generate keytab files.
This chapter provides information about the feature which allows end users to log into a Windows client machine on a Windows domain, then use certain Cisco Unified Communications Manager applications without
Encrypted Preshared Key
The feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Release Modification 12.3(2)T This feature was introduced. Finding Support Information
Managing User Accounts
Managing User Accounts This chapter includes the following sections: Configuring Local Users, page 1 Active Directory, page 2 Viewing User Sessions, page 6 Configuring Local Users Before You Begin You
Cisco Unified CM Disaster Recovery System
Disaster Recovery System, page 1 Quick-Reference Tables for Backup and Restore s, page 3 Supported Features and Components, page 4 System Requirements, page 5 Log In to Disaster Recovery System, page 7
Configuring System Message Logging
CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records
IM and Presence Disaster Recovery System
Disaster Recovery System, page 1 Access the Disaster Recovery System, page 2 Back up data in the Disaster Recovery System, page 3 Restore scenarios, page 9 Backup and restore history, page 15 Data authentication
Managing User Accounts
Managing User Accounts This chapter includes the following sections: Configuring Local Users, page 1 Active Directory, page 3 Viewing User Sessions, page 6 Configuring Local Users Before You Begin You
Configuring Virtual Blades
CHAPTER 14 This chapter describes how to configure virtual blades, which are computer emulators that reside in a WAE or WAVE device. A virtual blade allows you to allocate WAE system resources for use
User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1
The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)
Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
Encrypted Preshared Key
Encrypted Preshared Key The Encrypted Preshared Key feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Encrypted Preshared Key Release
Using the VCDS Application Monitoring Tool
CHAPTER 5 This chapter describes how to use Cisco VQE Client Configuration Delivery Server (VCDS) Application Monitoring Tool (AMT). VCDS is a software component installed on each VQE Tools server, the
Domain Name System Server Round-Robin Functionality for the Cisco AS5800
Domain Name System Server Round-Robin Functionality for the Cisco AS5800 This feature module describes Domain Name System (DNS) server round-robin functionality for the Cisco AS5800 universal access server.
NetIQ Advanced Authentication Framework - MacOS Client
NetIQ Advanced Authentication Framework - MacOS Client Installation Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 About MacOS Client 4 System Requirements
Pre-Change Tasks and System Health Checks
Pre-Change Task List for Cisco Unified Communications Manager Nodes, page 1 Pre-Change Task List for IM and Presence Service Nodes, page 2 System Health Checks, page 4 Pre-Change Setup, page 6 Pre-Change
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S This feature was introduced This document describes the Enhanced Password Security feature in It includes the following sections: Feature Overview,
Installing and Using the vnios Trial
Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM
Configuring the Content Routing Software
CHAPTER 2 This chapter describes the basic steps for configuring the Content Router software. Performing a Basic Startup Configuration After you physically install the Content Router hardware, configure
CLC Server Command Line Tools USER MANUAL
CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej
Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.
VYATTA, INC. Vyatta System Basic System REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com
Cisco Global Site Selector CLI-Based Global Server Load-Balancing Configuration Guide
Cisco Global Site Selector CLI-Based Global Server Load-Balancing Configuration Guide Software Version 3.1(1) September 2009 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
Administering Cisco ISE
CHAPTER 8 This chapter describes the administrative activities for the Cisco Identity Services Engine (ISE) and how to perform them. The following topics are covered: Logging In, page 8-1 System Time and
Managing the System Event Log
Managing the System Event Log This chapter includes the following sections: System Event Log, page 1 Viewing the System Event Log for an Individual Server, page 2 Viewing the System Event Log for the Servers
Using Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
Determine the process of extracting monitoring information in Sun ONE Application Server
Table of Contents AboutMonitoring1 Sun ONE Application Server 7 Statistics 2 What Can Be Monitored? 2 Extracting Monitored Information. 3 SNMPMonitoring..3 Quality of Service 4 Setting QoS Parameters..
Router CLI Overview. CradlePoint, Inc.
Router CLI Overview CradlePoint, Inc. Preface CradlePoint reserves the right to revise this publication and to make changes in the content thereof without obligation to notify any person or organization
Disaster Recovery System Administration Guide for Cisco Unified Communications Manager, Release 10.0(1)
Disaster Recovery System Administration Guide for Cisco Unified Communications Manager, Release 10.0(1) First Published: December 03, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive
Veritas Cluster Server
APPENDIXE This module provides basic guidelines for the (VCS) configuration in a Subscriber Manager (SM) cluster installation. It assumes basic knowledge of the VCS environment; it does not replace the
This is a training module for Maximo Asset Management V7.1. It demonstrates how to use the E-Audit function.
This is a training module for Maximo Asset Management V7.1. It demonstrates how to use the E-Audit function. Page 1 of 14 This module covers these topics: - Enabling audit for a Maximo database table -
1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router
1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains
Configure NFS Staging for ACS 5.x Backup on Windows and Linux
Configure NFS Staging for ACS 5.x Backup on Windows and Linux Document ID: 119030 Contributed by Piotr Borowiec and Aditya Ganjoo, Cisco TAC Engineers. Jul 21, 2015 Contents Introduction Prerequisites
v7.8.2 Release Notes for Websense Content Gateway
v7.8.2 Release Notes for Websense Content Gateway Topic 60086 Web Security Gateway and Gateway Anywhere 12-Mar-2014 These Release Notes are an introduction to Websense Content Gateway version 7.8.2. New
- The PIX OS Command-Line Interface -
1 PIX OS Versions - The PIX OS Command-Line Interface - The operating system for Cisco PIX/ASA firewalls is known as the PIX OS. Because the PIX product line was acquired and not originally developed by
Configuring Cisco CallManager IP Phones to Work With IP Phone Agent
Configuring Cisco CallManager IP Phones to Work With IP Phone Agent Document ID: 40564 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration Procedures in Cisco CallManager
Installing, Uninstalling, and Upgrading Service Monitor
CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page
Managing the System Event Log
This chapter includes the following sections: System Event Log, page 1 Viewing the System Event Log for an Individual Server, page 2 Viewing the System Event Log for the Servers in a Chassis, page 2 Configuring
DC Agent Troubleshooting
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
Enabling Remote Access to the ACE
CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.
Device Interface IP Address Subnet Mask Default Gateway
Felix Rohrer Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 192.168.99.11 255.255.255.0 192.168.99.1 S2 VLAN 99 192.168.99.12 255.255.255.0 192.168.99.1
Cisco CNR and DHCP FAQs for Cable Environment
Table of Contents CNR and DHCP FAQs for Cable Environment...1 Questions...1 Introduction...1 Q. How do I access CNR remotely?...1 Q. How do I access CNR remotely if the CNR server is behind a firewall?...2
Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.5(1)
Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.5(1) Published: Decemer 02, 2010 This guide provides an overview of the Disaster Recovery System, describes
TEL 500 WRITE UP WEEK 8 FREE PBX SIP LAB SUBMITTED TO: PROF. RONNY BULL BY: ANUSHA ALIGAPALLY
TEL 500 WRITE UP WEEK 8 FREE PBX SIP LAB SUBMITTED TO: PROF. RONNY BULL BY: ANUSHA ALIGAPALLY DATE: 11/05/2014 ABSTRACT: Private Branch Exchange has multiple phones connected to it which are in the same
Transferring Files Using HTTP or HTTPS
Transferring Files Using HTTP or HTTPS First Published: May 5, 2005 Last Updated: May 14, 2009 Cisco IOS Release 12.4 provides the ability to transfer files between your Cisco IOS software-based device
Managing Cisco ISE Backup and Restore Operations
CHAPTER 14 This chapter describes the Cisco Identity Services Engine (ISE) database backup and restore operations, which include Cisco ISE application configuration and Cisco Application Deployment Engine
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Changing Passwords in Cisco Unity 8.x
CHAPTER 9 Changing Passwords in Cisco Unity 8.x This chapter contains the following sections: Changing Passwords for the Cisco Unity 8.x Service Accounts (Without Failover), page 9-1 Changing Passwords
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Configuring Basic Settings
CHAPTER 12 This chapter describes how to configure basic settings on your ASASM that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
Configuring MailArchiva with Insight Server
Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any
Command Line Interface User Guide for Intel Server Management Software
Command Line Interface User Guide for Intel Server Management Software Legal Information Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel
NETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
Domain Name System (DNS) Services
12 Domain Name System (DNS) Services Contents Overview..................................................... 12-3 Host and Domain Names.................................... 12-3 Host Tables...............................................
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S 121(8a)E 122(14)S This feature was introduced Support for this feature was integrated into Cisco IOS Release 121(8a)E This feature was integrated
Tracking Network Changes Using Change Audit
CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and
Monitor Print Popup for Mac. Product Manual. www.monitorbm.com
Monitor Print Popup for Mac Product Manual www.monitorbm.com Monitor Print Popup for Mac Product Manual Copyright 2013 Monitor Business Machines Ltd The software contains proprietary information of Monitor
RADIUS Server Load Balancing
The feature distributes authentication, authorization, and accounting (AAA) authentication and accounting transactions across RADIUS servers in a server group These servers can share the AAA transaction
Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4
Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4 Updated: May 31, 2011 Contents This document describes the Cisco AnyConnect Secure Mobility Client 2.4 for devices running Symbian.
Configuring Health Monitoring Using Health Probes
CHAPTER10 Configuring Health Monitoring Using Health Probes This chapter describes how to configure a health probe on the Cisco 4700 Series Application Control Engine (ACE) appliance. This chapter contains
Server Configuration. Server Configuration Settings CHAPTER
CHAPTER 2 This chapter contains information on the following topics: Settings, page 2-1 Finding a Server, page 2-4 Configuring a Server, page 2-5 Deleting a Server, page 2-6 Related Topics, page 2-8 Settings
How To Backup In Cisco Uk Central And Cisco Cusd (Cisco) Cusm (Custodian) (Cusd) (Uk) (Usd).Com) (Ucs) (Cyse
This chapter includes the following sections: Backup and Import in Cisco UCS Central, page 1 Backing up and Restoring Cisco UCS Central, page 4 Backing up and Restoring Cisco UCS Domains, page 8 Import
Configuring Role-Based Access Control
5 CHAPTER This chapter describes how to configure role-based access control (RBAC) on the Cisco Application Control Engine (ACE) module. This chapter contains the following sections: Information About
How To Configure Rmon On Cisco Me 2600X On Ios 2.5A (Cisco) With A Network Monitor On A Network Device (Network) On A Pnet 2.2.1 (Network Monitor) On An Ip
Remote Network Monitoring and Alarm Troubleshooting This chapter describes remote network monitoring (RMON) and alarm troubleshooting. RMON Procedures, page 1 Understanding RMON, page 1 Alarm Troubleshooting,
Installing a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2. Summary
Technical Bulletin Application Note April 2013 Installing a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2 Summary This application note describes how to install the
LICENSE4J FLOATING LICENSE SERVER USER GUIDE
LICENSE4J FLOATING LICENSE SERVER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 2 Floating License Usage... 2 Installation... 4 Windows Installation... 4 Linux
Set Up Panorama. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Set Up Panorama Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
DHCP Server Port-Based Address Allocation
The feature provides port-based address allocation support on the Cisco IOS Dynamic Host Configuration Protocol (DHCP) server for the Ethernet platform. The DHCP server provides address assignment support
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
Configuration Guide for Active Directory Integration
Configuration Guide for Active Directory Integration Workspot, Inc. 12/4/2015 Workspot Active Directory Integration The Enterprise Connector provides synchronization between an on-premise Active Directory
Dynamic DNS How-To Guide
Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol
Download and Install the Citrix Receiver for Mac/Linux
Download and Install the Citrix Receiver for Mac/Linux NOTE: WOW can only be used with Internet Explorer for Windows. To accommodate WOW customers using Mac or Linux computers, a Citrix solution was developed
Digitally Signed Cisco Software
Digitally Signed Cisco Software Last Updated: January 16, 2013 The Digitally Signed Cisco Software feature describes how to identify digitally signed Cisco software, gather software authentication information
HIPAA Compliance Use Case
Overview HIPAA Compliance helps ensure that all medical records, medical billing, and patient accounts meet certain consistent standards with regard to documentation, handling, and privacy. Current Situation
Server Management Tools (ASMT)
1 Auspex Server Management Tools (ASMT) Introduction This module presents the Auspex Server Management Tools, or ASMT. This is a graphical interface which allows you to perform most NetServer system administration
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
HOW TO CONFIGURE CISCO FIREWALL PART I
HOW TO CONFIGURE CISCO FIREWALL PART I Cisco Abstract: Please find below a step by step process to configure the PIX Firewall from scratch. A simple scenario is given here where you have a corporate network
Disaster Recovery System Administration Guide for Cisco Unified Contact Center Express Release 8.5(1)
Disaster Recovery System Administration Guide for Cisco Unified Contact Center Express Release 8.5(1) This guide provides an overview of the Disaster Recovery System, describes how to use the Disaster
RADIUS Server Load Balancing
First Published: March 20, 2006 Last Updated: September 22, 2009 The feature distributes authentication, authorization, and accounting (AAA) authentication and accounting transactions across servers in
Lab 7.2.9 Load Balancing Across Multiple Paths
Lab 7.2.9 Load Balancing Across Multiple Paths Objective Configure Load balance across multiple paths. Observe the load balancing process. Background/Preparation Cable a network similar to the one in the
Cannot send Autosupport e-mail, error message: Unknown User
Cannot send Autosupport e-mail, error message: Unknown User Symptoms Unable to send Autosupport e-mails and the following error message is reported: asup.smtp.fail http://now.netapp.com/eservice/ems?emsaction=details&eventid=200573&software=ontap&em
Handle Tool. User Manual
User Manual Corporation for National Research Initiatives Version 2 November 2015 Table of Contents 1. Start the Handle Tool... 3 2. Default Window... 3 3. Console... 5 4. Authentication... 6 5. Lookup...
Managing the System Event Log
Managing the System Event Log This chapter includes the following sections: System Event Log, page 1 Viewing the System Event Log for an Individual Server, page 2 Viewing the System Event Log for the Servers
WhatsUpGold. v12.3.1. NetFlow Monitor User Guide
WhatsUpGold v12.3.1 NetFlow Monitor User Guide Contents CHAPTER 1 WhatsUp Gold NetFlow Monitor Overview What is NetFlow?... 1 How does NetFlow Monitor work?... 2 Supported versions... 2 System requirements...
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Lab Configuring Syslog and NTP (Instructor Version)
(Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask
