Backing Up and Restoring Data
|
|
|
- Daisy Stephens
- 10 years ago
- Views:
Transcription
1 Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application to the FTP server and the restore function copies the files from the FTP server to the Cisco Unity Express application. The FTP server can reside anywhere in the network if the backup and restore functions can access it with an IP address. We recommend that backups be done daily to preserve voic messages and configuration data. Backup and restore commands are available in configuration mode and in offline mode. In configuration mode, set the following parameters: Number of backup files to keep (the oldest file is deleted). URL of the FTP server where the files will be stored. In offline mode, perform the backup or restore procedure. Decide the following: Type of files to be backed up: all files (configuration and data), only configuration files, or only data files. Data files consist of voic messages. Configuration files consist of all other system and application parameters. Backup filename (used for restore procedure). URL of the FTP server where the files will be stored. Caution Offline mode terminates all existing voic calls, and no new voic calls are allowed. Calls to auto attendant are allowed. We recommend doing a backup when telephone users are not active on calls. In Cisco Unity Express EXEC mode, the startup configuration and running configuration can be saved to various locations, such as the network FTP server, the network TFTP server, and flash memory. This chapter contains the following sections: Restrictions, page 132 Setting Backup Parameters, page 133 Backing Up Files, page 135 Restoring Files, page 138 Copying Configurations, page 141 Restoring Factory Default Values, page
2 Restrictions Backing Up and Restoring Data Restrictions Cisco Unity Express does not support the following backup and restore capabilities: Scheduled backup and restore operations. The backup and restore procedures begin when the appropriate command is entered. Centralized message storage arrangement. Cisco Unity Express backup files cannot be used or integrated with other message stores. Selective backup and restore. Only full backup and restore functions are available. Individual voic messages or other specific data cannot be stored or retrieved. 132
3 Backing Up and Restoring Data Setting Backup Parameters Setting Backup Parameters The backup parameters define the FTP server to use for storing Cisco Unity Express backup files and the number of files that are stored before the system deletes the oldest one. All Cisco Unity Express backup files are stored on the specified server. You can copy the backup files to other locations or servers, if necessary. Cisco Unity Express automatically assigns a backup ID to the backup file. Use the backup ID to restore the file. Prerequisites The following information is required for setting the backup parameters: Number of revisions to save before the oldest file is written over FTP server URL User ID of the FTP server login Password of the FTP server login SUMMARY STEPS 1. config t 2. backup {revisions number server url ftp-url username ftp-username password ftp-password} 3. exit 4. show backup 133
4 Setting Backup Parameters Backing Up and Restoring Data DETAILED STEPS Step 1 Command or Action config t Purpose Enters configuration mode. Step 2 Step 3 se # config t backup {revisions number server url ftp-url username ftp-username password ftp-password} se (config)# backup server url ftp://main/backups username admin password wxyz se (config)# backup server url ftp:// /backups username admin password wxyz se (config)# backup revisions 5 exit Sets the backup parameters. server url The ftp-url value is the URL to the network FTP server where the backup files will be stored. The ftp-username and ftp-password values are the user ID and password for the network FTP server. Note The backup server must be configured before the backup revisions can be configured. revisions The number of backup files that will be stored. When this number is reached, the system deletes the oldest stored file. In the example, main is the hostname of the FTP server and backups is the directory where backup files are stored. Exits configuration mode. Step 4 se (config)# exit show backup se # show backup Displays the backup server configuration information, including the FTP server URL and the number of revisions. Examples The following example configures a backup server and displays the show backup output: se # config t se #(config)# backup server url ftp:// /backups username admin password voice se #(config)# backup revisions 10 se #(config)# exit se # show backup Server URL: ftp:// /backups User Account on Server: admin Number of Backups to Retain: 10 se # 134
5 Backing Up and Restoring Data Backing Up Files Backing Up Files Backup commands must be entered in EXEC mode while the system is in offline mode. Active calls are terminated, and no new calls are accepted. Consider doing the backup procedure at a time when telephone users are least likely to be on the telephone. Note We recommend that you back up your configuration files whenever changes are made to the system or application files. Data files, which contain voice messages, should be backed up daily to minimize data loss, such as from a hardware failure. Numbering Scheme for Backup Files Three types of backup requests are available: data only, configuration only, or all. Data Backs up greetings, voic messages, recorded names, and custom scripts and prompts. Configuration Backs up only the running configuration. Use the show run command to display the current running configuration. All Backs up all data and configuration information. Cisco Unity Express automatically numbers and dates the backup files and identifies the revision number in a backupid field. Performing different backup types at various times causes different backup IDs for data backups and configuration backups. For example, the last data backup ID might be 3, and the last configuration backup might be 4. Performing an all backup might result in a backup ID of 5 for both data and configuration. When restoring the files, refer to the backup ID for the backup file that you want to use. Use the show backup server command for a list of backup IDs. Caution Offline mode terminates all existing voic calls, and no new voic calls are allowed. Calls to auto attendant are allowed. We recommend doing a backup when telephone users are not active on calls. SUMMARY STEPS 1. offline 2. backup category {all configuration data} 3. continue 4. show backup history 5. show backup server 135
6 Backing Up Files Backing Up and Restoring Data DETAILED STEPS Step 1 Step 2 Command or Action offline se # offline backup category {all configuration data} Purpose Enters offline mode. All active voic calls are terminated. Specifies the type of data to be backed up and stored. Step 3 se (offline)# backup category all se (offline)# backup category configuration se (offline)# backup category data continue Exits offline mode and returns to EXEC mode. Step 4 Step 5 se (offline)# continue show backup history se # show backup history show backup server se # show backup server Displays the backup and restore procedures and the success or failure of those attempts. Displays the backup files available on the backup server, the date of each backup, and the backup file ID. Examples The following example displays the output from the show backup commands: se # show backup history Start Operation Operation: Backup Backupid: 1 Restoreid: -1 test backup 1 Date: Sun Jun 13 12:23:38 PDT 1993 Result: Failure Reason: Script execution failed: /bin/br_vmconfg_backup.sh: returnvalue:1 ; Server Url:ftp:// /CUE_backup: returnvalue:9 Unable to authenticate Operation: Backup Restoreid: -1 CUE test backup 136
7 Backing Up and Restoring Data Backing Up Files Date: Sun Jun 13 12:32:48 PDT 1993 Result: Success Reason: Category: Data Operation: Backup Restoreid: -1 CUE test backup Date: Sun Jun 13 12:32:57 PDT 1993 Result: Success Reason: Operation: Restore Restoreid: 1 Date: Sun Jun 13 12:37:52 PDT 1993 Result: Success Reason: se # show backup server Category: Data Details of last 5 backups Backupid: 1 Date: Tue Jul 22 10:55:52 PDT 2003 Date: Tue Jul 29 18:06:33 PDT 2003 Backupid: 3 Date: Tue Jul 29 19:10:32 PDT 2003 Details of last 5 backups Backupid: 1 Date: Tue Jul 22 10:55:48 PDT 2003 Date: Tue Jul 29 18:06:27 PDT 2003 Backupid: 3 Date: Tue Jul 29 19:10:29 PDT 2003 se # 137
8 Restoring Files Backing Up and Restoring Data Restoring Files SUMMARY STEPS DETAILED STEPS After the backup files are created, you can restore them when needed. Restoring is done in offline mode, which terminates all voic active calls and does not permit new voic calls (auto attendant calls are permitted). You should consider doing the restore when telephone users are least likely to be on the telephone. Use the show backup server command to locate the backup ID of the file that you want to restore. 1. show backup server 2. offline 3. restore id backupid category {all configuration data} 4. reload 5. show backup history Step 1 Step 2 Step 3 Step 4 Step 5 Command or Action show backup server se # show backup server offline se # offline restore id backupid category {all configuration data} se (offline)# restore id 22 category all se (offline)# restore id 8 category configuration se (offline)# restore id 3 category data reload se (offline)# reload show backup history se # show backup history Purpose Lists the data and configuration backup files. Look at the backup ID field for the revision number of the file that you want to restore. Enters offline mode. All active voic calls are terminated. Specifies the backup ID backupid value and the file type to be restored. Resets the Cisco Unity Express module so that the restored values take effect. Displays the backup and restore procedures and the success or failure of those attempts. 138
9 Backing Up and Restoring Data Restoring Files Examples The following example displays the backup server and backup history: se # show backup server Category: Data Details of last 5 backups Backupid: 1 Date: Tue Jul 22 10:55:52 PDT 2003 Date: Tue Jul 29 18:06:33 PDT 2003 Backupid: 3 Date: Tue Jul 29 19:10:32 PDT 2003 Details of last 5 backups Backupid: 1 Date: Tue Jul 22 10:55:48 PDT 2003 Date: Tue Jul 29 18:06:27 PDT 2003 Backupid: 3 Date: Tue Jul 29 19:10:29 PDT 2003 se # se # show backup history Start Operation Operation: Backup Backupid: 1 Restoreid: -1 test backup 1 Date: Sun Jun 13 12:23:38 PDT 1993 Result: Failure Reason: Script execution failed: /bin/br_vmconfg_backup.sh: returnvalue:1 ; Server Url:ftp:// /CUE_backup: returnvalue:9 Unable to authenticate Category: Data Operation: Backup Backupid: 1 Restoreid: -1 test backup 1 Date: Sun Jun 13 12:23:44 PDT 1993 Result: Failure Reason: Script execution failed: /bin/br_vmdata_backup.sh: returnvalue:1 139
10 Restoring Files Backing Up and Restoring Data Voic Backup failed; Server Url:ftp:// /CUE_backup: returnvalue:9 Unable to authenticate Operation: Backup Restoreid: -1 CUE test backup Date: Sun Jun 13 12:32:48 PDT 1993 Result: Success Reason: Category: Data Operation: Backup Restoreid: -1 CUE test backup Date: Sun Jun 13 12:32:57 PDT 1993 Result: Success Reason: Operation: Restore Restoreid: 1 Date: Sun Jun 13 12:37:52 PDT 1993 Result: Success Reason: Category: Data Operation: Restore Restoreid: 1 Date: Sun Jun 13 12:38:00 PDT 1993 Result: Success Reason: 140
11 Backing Up and Restoring Data Copying Configurations Copying Configurations The following Cisco Unity Express EXEC commands are available to copy the startup configuration and running configuration to and from flash memory, the network FTP server, and the network TFTP server. Copying from Flash Memory to Another Location Starting in Cisco Unity Express EXEC mode, use the following command to copy the startup configuration in flash memory to another location: copy startup-config {ftp: tftp:tftp-server-address} filename Keyword or Argument ftp: ftp-server-address directory tftp:tftp-server-address filename Description User ID and password for the FTP server. Include the colon (:) and the at sign in your entry. IP address of the FTP server. (Optional) Directory on the FTP server where the copied file will reside. If you use it, precede the name with the forward slash (/). IP address of the TFTP server. Name of the destination file that will contain the copied startup configuration. This command is interactive and prompts you for the information. You cannot enter the parameters in one line. The following examples illustrate this process. In this example, the startup configuration is copied to the FTP server, which requires a user ID and password to transfer files. The IP address of the FTP server is The startup configuration file is saved on the FTP server with the filename start. se # copy startup-config ftp Address or name of remote host? admin:voice@ Source filename? start The following example shows the startup configuration copied to the TFTP server, which does not require a user ID and password. The IP address of the TFTP server is The startup configuration is saved in the TFTP directory configs as filename temp_start. se # copy startup-config tftp Address or name of remote host? /configs Source filename? temp_start Copying from the Network FTP Server to Another Location Starting in Cisco Unity Express EXEC mode, use the following command to copy the network FTP server configuration to another location: copy ftp: {running-config startup-config} user-id:password@ftp-server-address/[directory] filename 141
12 Copying Configurations Backing Up and Restoring Data Keyword or Argument running-config startup-config ftp-server-address directory filename Description Active configuration in flash memory. Startup configuration in flash memory. User ID and password for the FTP server. Include the colon (:) and the at sign in your entry. IP address of the FTP server. (Optional) Directory name for retrieving the file. If you use it, precede the name with the forward slash (/). Name of the source file to be copied. This command is interactive and prompts you for the information. You cannot enter the parameters in one line. The following example illustrates this process. In this example, the FTP server requires a user ID and password. The IP address of the FTP server is The file start in the FTP server configs directory is copied to the startup configuration. se # copy ftp: startup-config!!!warning!!! This operation will overwrite your startup configuration. Do you wish to continue[y]? y Address or name or remote host? admin:voice@ /configs Source filename? start Copying the Flash Running Configuration to Another Location Starting in Cisco Unity Express EXEC mode, use the following command to copy the running configuration in flash memory to another location: copy running-config {ftp: user-id:password@ftp-server-address/[directory] startup-config tftp:tftp-server-address} filename Keyword or Argument ftp: user-id:password@ ftp-server-address directory startup-config tftp:tftp-server-address filename Description User ID and password for the FTP server. Include the colon (:) and the at sign (@) in your entry. IP address of the FTP server. (Optional) Directory on the FTP server where the copied file will reside. If you use it, precede the name with the forward slash (/). Startup configuration in flash memory. IP address of the TFTP server. Name of the destination file that will contain the copied running configuration. When you copy the running configuration to the startup configuration, enter the command on one line. When you copy to the FTP or TFTP server, this command becomes interactive and prompts you for the information. You cannot enter the parameters in one line. The following example illustrates this process. 142
13 Backing Up and Restoring Data Restoring Factory Default Values In the following example, the running configuration is copied to the FTP server, which requires a user ID and password. The IP address of the FTP server is The running configuration is copied to the configs directory as file saved_start. se # copy running-config ftp: Address or name of remote host? admin:voice@ /configs Source filename? saved_start In the following example, the running configuration is copied to the startup configuration as file start. In this instance, enter the command on a single line. se # copy running-config startup-config start Copying the Network TFTP Configuration to Another Location Starting in Cisco Unity Express EXEC mode, use the following command to copy the network TFTP configuration to another location: se # copy tftp: {running-config startup-config} tftp-server-address/[directory] filename Keyword or Argument running-config startup-config tftp-server-address directory filename Description Active configuration in flash memory. Startup configuration in flash memory. IP address of the TFTP server. (Optional) Directory on the TFTP server where the copied file will reside. If you use it, precede the name with the forward slash (/). Name of the source file to be copied. This command is interactive and prompts you for the information. You cannot enter the parameters in one line. The following example illustrates this process. In this example, the TFTP server has IP address The file start in directory configs on the TFTP server is copied to the startup configuration. se # copy tftp: startup-config!!!warning!!! This operation will overwrite your startup configuration. Do you wish to continue [y]? y Address or name of remote host? /configs Source filename? start Restoring Factory Default Values Cisco Unity Express provides a command to restore the factory default values for the entire system. Restoring the system to the factory defaults erases the current configuration. This function is available in offline mode. Caution This feature is not reversible. All data and configuration files are erased. Use this feature with caution. It is recommended that you do a full system backup before proceeding with this feature. 143
14 Restoring Factory Default Values Backing Up and Restoring Data After the administrator enters the command to restore system defaults, the system requests confirmation before starting the procedure. Upon receiving the confirmation, the system does the following: Replaces the current database with an empty database. Initializes the Lightweight Directory Access Protocol (LDAP) to an empty state. Replaces the startup configuration with the template startup configuration that ships with the system. Erases all postinstallation configuration data. Deletes all user and custom prompts. When the system is clean, the administrator sees a message that the system will reload, and the system begins to reload. When the reload is complete, the system prompts the administrator to go through the postinstallation process. When logging in to the graphical user interface (GUI), the administrator has the option to run the initialization wizard. Perform the following steps to reset the system to Cisco Unity Express factory default values. Step 1 Step 2 Step 3 se # offline This command puts the system into offline mode. (offline)# restore factory default This operation will cause all the configuration and data on the system to be erased. This operation is not reversible. Do you wish to continue? (n) Do one of the following: Enter n if want to retain the system configuration and data. The operation is cancelled, but the system remains in offline mode. To return to online mode, enter continue. Enter y if you want to erase the system configuration and data. When the system is clean, a message appears indicating that the system will start to reload. When the reload is complete, a prompt appears to start the postinstallation process. 144
Connecting to the Firewall Services Module and Managing the Configuration
CHAPTER 3 Connecting to the Firewall Services Module and This chapter describes how to access the command-line interface and work with the configuration. This chapter includes the following sections: Connecting
Managing ACE Software Licenses
CHAPTER 2 This chapter describes how to manage the software licenses for your Cisco 4700 Series Application Control Engine (ACE) appliance. It contains the following major sections: Information about ACE
Managing Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
Configuring SSH and Telnet
This chapter describes how to configure Secure Shell Protocol (SSH) and Telnet on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About
Upgrading Software Using the Online Installer
Upgrading Software Using the Online Installer Last Updated: December 8, 2009 This chapter provides the procedures for upgrading from a previous software version of the Cisco Integrated Storage System module
Chapter 6 Updating Software Images and Configuration Files
Chapter 6 Updating Software Images and Configuration Files This chapter describes how to copy and save configuration files and software image files. Downloading and Uploading a Software Image on a TFTP
Router Recovery with ROM Monitor
CHAPTER 2 This chapter describes the router recovery methods in ROM Monitor mode (ROMMON) of the router. This chapter contains the following sections: Overview, page 2-19 About ROMMON Installation Files,
Backup and Recovery Procedures
CHAPTER 10 This chapter provides Content Distribution Manager database backup and ACNS software recovery procedures. This chapter contains the following sections: Performing Backup and Restore Operations
How To Install Cisco Asr 9000 Series Router Software On A Mini Mini Mini (Cisco Ios) Router
This chapter describes the router recovery methods in ROM Monitor (ROMMON) mode of the router. Table 1: Feature History for Router Recovery with the ROM Monitor Release Modification Release 4.2.0 A new
Configuring System Message Logging
CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records
Basic Configuration of the Cisco 12000 Series Internet Router
CHAPTER 2 Basic Configuration of the Cisco 12000 Series Internet Router This chapter describes how to boot and configure the Cisco 12000 Series Internet Router. It discusses the following subjects: Cisco
3.1 Connecting to a Router and Basic Configuration
3.1 Connecting to a Router and Basic Configuration Objective This lab will focus on the ability to connect a PC to a router in order to establish a console session and observe the user interface. A console
Enabling Remote Access to the ACE
CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.
Transferring Files Using HTTP or HTTPS
Transferring Files Using HTTP or HTTPS First Published: May 5, 2005 Last Updated: May 14, 2009 Cisco IOS Release 12.4 provides the ability to transfer files between your Cisco IOS software-based device
enetworks TM Using the Syslog Feature C.1 Configuring the Syslog Feature
encor! enetworks TM Version A, March 2010 2013 Encore Networks, Inc. All rights reserved. Using the Syslog Feature This document provides basic information for using the syslog feature in the ELIOS software.
Basic Router and Switch Instructions (Cisco Devices)
Basic Router and Switch Instructions (Cisco Devices) Basic Device Connection 1. Connect to the device via the console cable (light blue cable) and the use of a terminal program (Windows Hyperterminal,
http://computernetworkingnotes.com/ccna-study-guide/cisco-ios-naming-convention-explainedwith-examples.html
IOS is the most critical part of any cisco device. We should always keep a backup copy of IOS to deal with any unwanted situation. In this article I will explain the backup and restore process of IOS in
Meter Proxy Quick Start Guide
Meter Proxy Quick Start Guide Copyright Notice Copyright Notice Notice Document information is subject to change without notice by Siemens Industry, Inc. Companies, names, and various data used in examples
Configuring the Scheduler
CHAPTER 10 This chapter describes how to configure the scheduler on Cisco NX-OS devices. This chapter includes the following sections: Information About the Scheduler, page 10-1 Licensing Requirements
Encrypted Preshared Key
The feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Release Modification 12.3(2)T This feature was introduced. Finding Support Information
How To Backup In Cisco Uk Central And Cisco Cusd (Cisco) Cusm (Custodian) (Cusd) (Uk) (Usd).Com) (Ucs) (Cyse
This chapter includes the following sections: Backup and Import in Cisco UCS Central, page 1 Backing up and Restoring Cisco UCS Central, page 4 Backing up and Restoring Cisco UCS Domains, page 8 Import
SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION
SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION Table of content ScopTel with Active Directory... 3 Software Features... 3 Software Compatibility... 3 Requirements... 3 ScopTel Configuration... 4 Prerequisites...
Planning Maintenance for Complex Networks
Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks Olga Torstensson TSHOOT v6 1 Maintenance Models and Methodologies A network engineer s job description
Chapter 1: Planning Maintenance for Complex Networks. TSHOOT v6 Chapter 1 2007 2010, Cisco Systems, Inc. All rights reserved.
: Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks TSHOOT v6 1 Objectives Evaluate commonly-practiced models and methodologies for network maintenance
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
Encrypted Preshared Key
Encrypted Preshared Key The Encrypted Preshared Key feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Encrypted Preshared Key Release
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S This feature was introduced This document describes the Enhanced Password Security feature in It includes the following sections: Feature Overview,
Unity Error Message: Your voicemail box is almost full
Unity Error Message: Your voicemail box is almost full Document ID: 111781 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Solution Delete Voice Mail Messages from
- Advanced IOS Functions -
1 The Configuration Register - Advanced IOS Functions - The configuration register (config-register) is a hexadecimal value that controls various aspects of how a router boots, including: Baud Rate Boot
Configuring Virtual Blades
CHAPTER 14 This chapter describes how to configure virtual blades, which are computer emulators that reside in a WAE or WAVE device. A virtual blade allows you to allocate WAE system resources for use
Managing the System Event Log
Managing the System Event Log This chapter includes the following sections: System Event Log, page 1 Viewing the System Event Log for an Individual Server, page 2 Viewing the System Event Log for the Servers
System Administration and Log Management
CHAPTER 6 System Overview System Administration and Log Management Users must have sufficient access rights, or permission levels, to perform any operations on network elements (the devices, such as routers,
NAS 253 Introduction to Backup Plan
NAS 253 Introduction to Backup Plan Create backup jobs using Backup Plan in Windows A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Create backup
IM and Presence Disaster Recovery System
Disaster Recovery System, page 1 Access the Disaster Recovery System, page 2 Back up data in the Disaster Recovery System, page 3 Restore scenarios, page 9 Backup and restore history, page 15 Data authentication
Managing the System Event Log
Managing the System Event Log This chapter includes the following sections: System Event Log, page 1 Viewing the System Event Log for an Individual Server, page 2 Viewing the System Event Log for the Servers
Configuring Basic Settings
CHAPTER 10 This chapter describes how to configure basic settings on your ASA that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
Installing New Software Using the Online Installer (Backup and Restore Required)
Installing New Software Using the Online Installer (Backup and Restore Required) Last Updated: September 7, 2010 This chapter provides procedures for installing a new version of the Cisco Video Management
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S 121(8a)E 122(14)S This feature was introduced Support for this feature was integrated into Cisco IOS Release 121(8a)E This feature was integrated
Managing the System Event Log
This chapter includes the following sections: System Event Log, page 1 Viewing the System Event Log for an Individual Server, page 2 Viewing the System Event Log for the Servers in a Chassis, page 2 Configuring
Maintaining the Content Server
CHAPTER 7 This chapter includes the following Content Server maintenance procedures: Backing Up the Content Server, page 7-1 Restoring Files, page 7-3 Upgrading the Content Server, page 7-5 Shutting Down
Image Verification. Finding Feature Information. Restrictions for Image Verification
The feature allows users to automatically verify the integrity of Cisco IOS images. Thus, users can be sure that the image is protected from accidental corruption, which can occur at any time during transit,
Configuring Role-Based Access Control
5 CHAPTER This chapter describes how to configure role-based access control (RBAC) on the Cisco Application Control Engine (ACE) module. This chapter contains the following sections: Information About
Honeywell Internet Connection Module
Honeywell Internet Connection Module Setup Guide Version 1.0 - Page 1 of 18 - ICM Setup Guide Technical Support Setup - Guide Table of Contents Introduction... 3 Network Setup and Configuration... 4 Setting
Cisco Router Configuration Tutorial
Cisco Router Configuration Tutorial Cisco Inter-network Operating System: Cisco IOS Modes of Operation The Cisco IOS software provides access to several different command modes. Each command mode provides
Lab 4.2.4 Advanced Telnet Operations
Lab 4.2.4 Advanced Telnet Operations Objective Use the telnet command to remotely access other routers. Verify that the application layer between the source and the destination is working properly. Suspend
IP Phone Configuration and Troubleshooting Guide
IP Phone Configuration and Troubleshooting Guide NetVanta 7000 Series and IP 700 Series Phones Overview The purpose of this guide: Explain the default configuration. Explain how to configure the NetVanta
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
Installing, Uninstalling, and Upgrading Service Monitor
CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page
Configuring Logging. Information About Logging CHAPTER
52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page
Configure Cisco Emergency Responder Disaster Recovery System
Configure Cisco Emergency Responder Disaster Recovery System Disaster Recovery System overview, page 1 Backup and restore procedures, page 2 Supported features and components, page 4 System requirements,
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides
USB Disable for Cisco ISRs Feature Module
USB Disable for Cisco ISRs Feature Module First Published: March 28, 2011 Part Number: This guide describes the USB Disable feature in the following major sections: Feature Introduction, page 1 Restrictions,
Cisco Unified Communications Express - Quick Configuration Tool User Guide
Cisco Unified Communications Express - Quick Configuration Tool User Guide Revised: October 12, 2006 First Published: November 2005 This guide describes how to use the Cisco Unified Communications Express
Technical Support Set-up Procedure
Technical Support Set-up Procedure How to Setup the Amazon S3 Application on the DSN-320 Amazon S3 (Simple Storage Service) is an online storage web service offered by AWS (Amazon Web Services), and it
Managing Cisco ISE Backup and Restore Operations
CHAPTER 14 This chapter describes the Cisco Identity Services Engine (ISE) database backup and restore operations, which include Cisco ISE application configuration and Cisco Application Deployment Engine
NetVanta 7060/7100 Configuration Checklist
NetVanta 7060/7100 Configuration Checklist AOS Versions Supported: AOS A1.01.00 and above. AOS Versions Supporting SIP Trunking and Networking: AOS A2.02.00 and above. This document is designed to provide
File Transfers. Contents
A File Transfers Contents Overview..................................................... A-2................................... A-2 General Switch Software Download Rules..................... A-3 Using
Disaster Recovery System Administration Guide for Cisco Unified Contact Center Express Release 8.5(1)
Disaster Recovery System Administration Guide for Cisco Unified Contact Center Express Release 8.5(1) This guide provides an overview of the Disaster Recovery System, describes how to use the Disaster
Using Debug Commands
Using Debug Commands This chapter explains how you use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug commands Using the debug?
SteelEye Protection Suite for Windows Microsoft SQL Server Recovery Kit. Administration Guide
SteelEye Protection Suite for Windows Microsoft SQL Server Recovery Kit Administration Guide June 2013 This document and the information herein is the property of SIOS Technology Corp. (previously known
Configuring CyberData VoIP Ceiling Speakers
NetVanta Unified Communications Technical Note Configuring CyberData VoIP Ceiling Speakers Introduction The CyberData Voice over IP (VoIP) ceiling speaker connects to existing local area networks (LANs)
Basic Software Configuration Using the Cisco IOS Command-Line Interface
Basic Software Configuration Using the Cisco IOS Command-Line Interface This document describes how to use the Cisco IOS command-line interface (CLI) to perform a basic software configuration for your
MS SQL Server Database Management
MS SQL Server Database Management Contents Creating a New MS SQL Database... 2 Connecting to an Existing MS SQL Database... 3 Migrating a GoPrint MS SQL Database... 5 Troubleshooting... 11 Published April
Disaster Recovery System Administration Guide for Cisco Unified Contact Center Express Release 8.0(2)
Disaster Recovery System Administration Guide for Cisco Unified Contact Center Express Release 8.0(2) This guide provides an overview of the Disaster Recovery System, describes how to use the Disaster
Configuring System Message Logging
CHAPTER 25 This chapter describes how to configure system message logging on the Catalyst 2960 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco
LifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
User Guide. Voice Services Self Care Portal. Logging In. Welcome to the Self Care Portal
Logging In 1. From your Internet browser, enter the following URL: http://selfcare.ucc.ny.gov 2. Choose End User Self Care. 3. Enter your username and password: a. Username: Enter your LDAP user ID. (same
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
OpenScape Business V1R3
OpenScape Business V1R3 How To Configure OpenScape Business X model for use with OpenScape Contact Center Version 1.1 Table of Contents 1. Connecting OSCC to an OpenScape Business V1R3 3 2. Configuring
Cisco Configuration Professional Quick Start Guide
Cisco Configuration Professional Quick Start Guide April 29, 2011 This document explains how to start using Cisco Configuration Professional Express (Cisco CP Express) and Cisco Configuration Professional
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces
Lab 1.2.3 Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips
Lab 1.2.3 Review of Basic Router Configuration with RIP Objective Cable and configure workstations and routers Setup IP addressing scheme using Class B networks Configure Routing Information Protocol (RIP)
Cisco ISE Command-Line Interface
This chapter provides information on the Cisco Identity Services Engine (Cisco ISE) command-line interface (CLI) that you can use to configure and maintain Cisco ISE. Cisco ISE Administration and Configuration
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example Document ID: 45843 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Passwords
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
LifeSize Control TM Deployment Guide
LifeSize Control TM Deployment Guide July 2011 LifeSize Control Deployment Guide 2 LifeSize Control This guide is for network administrators who use LifeSize Control to manage video and voice communications
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
CCNA 2 Chapter 5. Managing Cisco IOS Software
1 CCNA 2 Chapter 5 Managing Cisco IOS Software The default source for Cisco IOS Software depends on the hardware platform; most commonly, though, the router looks to the configuration commands that are
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
Maintaining the Central Management System Database
CHAPTER 12 Maintaining the Central Management System Database This chapter describes how to maintain the Central Management System (CMS) database using CLI commands as well as using the Content Distribution
Router Security Audit Logs
Router Security Audit Logs The Router Security Audit Logs feature allows users to configure audit trails, which track changes that have been made to a router that is running Cisco IOS software. History
Configure NFS Staging for ACS 5.x Backup on Windows and Linux
Configure NFS Staging for ACS 5.x Backup on Windows and Linux Document ID: 119030 Contributed by Piotr Borowiec and Aditya Ganjoo, Cisco TAC Engineers. Jul 21, 2015 Contents Introduction Prerequisites
Lab 5.3.8 Configuring PAT with SDM and Static NAT using Cisco IOS Commands
Lab 5.3.8 Configuring PAT with SDM and Static NAT using Cisco IOS Commands Device Host Name Interface IP Address Subnet Mask R1 CustomerRouter Serial 0/0/0 (DTE) 209.165.200.225 255.255.255.224 Fast Ethernet
Configure Backup Server for Cisco Unified Communications Manager
Configure Backup Server for Cisco Unified Communications Manager Document ID: 110309 Contents Introduction Prerequisites Requirements Components Used Conventions Configure a Backup Server for Cisco Unified
Configuring Access Service Security
CHAPTER 3 Configuring Access Service Security The access service security paradigm presented in this guide uses the authentication, authorization, and accounting (AAA) facility. Authentication requires
NS Series Programmable Terminal FTP Function
NS Series Programmable Terminal FTP Function Created by OMRON HMI Contents 1. FTP on the NS Series... 3 1.1. Intended Purpose... 3 1.2. Models... 3 2. External Interfaces... 3 2.1. Data Storage Location...
How Do I Upgrade Firmware and Save Configurations on PowerConnect Switches?
PowerConnect Application Note #12 February 2004 How Do I Upgrade Firmware and Save Configurations on PowerConnect Switches? This Application Notes relates to the following Dell PowerConnect products: PowerConnect
Configuring Basic Settings
CHAPTER 9 This chapter describes how to configure basic settings on your ASASM that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
Applicazioni Telematiche
Angelo Coiro Laboratorio Applicazioni Telematiche L emulatore Packet Tracer Packet Tracer Cisco Packet Tracer is an academic software that allows to emulate Cisco devices Packet Tracer can be used for
Cisco Unity Express 8.5 Voice-Mail System User s Guide for Advanced Features
Cisco Unity Express 8.5 Voice-Mail System User s Guide for Advanced Features First Published: January 18, 2011 This guide provides information about using some of the advanced voice-mail features of your
Lab 5.3.9b Managing Router Configuration Files Using TFTP
Lab 5.3.9b Managing Router Configuration Files Using TFTP Device Host Name Interface IP Address Subnet Mask R1 R1 Fast Ethernet 0/0 172.17.0.1 255.255.0.0 Objectives Download and install TFTP server software.
Video Administration Backup and Restore Procedures
CHAPTER 12 Video Administration Backup and Restore Procedures This chapter provides procedures for backing up and restoring the Video Administration database and configuration files. See the following
Avaya Network Configuration Manager User Guide
Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information
Comware versus Cisco IOS Command Guide
Technical Marketing Engineering Routing and Switching Technology Routing and Switching Comware versus Cisco IOS Command Guide Technical Marketing Brief Revision v5 March 23, 2009 http://www.3com.com 3Com
Troubleshooting the Firewall Services Module
25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
IPPBX FAQ. For Firmware Version: V2.0/V3.0 2013-12-11
For Firmware Version: V2.0/V3.0 2013-12-11 Contents 1. IPPBX Access... 3 1.1 How to access IPPBX via SSH?... 3 1.2 How to access IPPBX if I forget the IP of WAN?... 4 1.3 How to retrieve WEB password via
Using Debug Commands
CHAPTER 1 Using Debug Commands This chapter explains how you use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug commands Using
Lab 7.2.9 Load Balancing Across Multiple Paths
Lab 7.2.9 Load Balancing Across Multiple Paths Objective Configure Load balance across multiple paths. Observe the load balancing process. Background/Preparation Cable a network similar to the one in the
Intronis RMM Deployment Kit
This kit will help you increase efficiency and streamline operations by integrating Intronis into your RMM solution. Deploy and monitor Intronis agents through a single interface that your technicians
Getting Started. Backup Repositories. Getting Started 1/6
Getting Started 1/6 Getting Started The Server Backup application enables you to backup and restore data that is stored on the OmniVista server. You can specify that a backup be performed immediately,
