QUICK START LINUX AGENT INSTALLATION, CONFIGURATION AND TROUBLESHOOTING GUIDELINES
|
|
|
- Walter Pitts
- 10 years ago
- Views:
Transcription
1 QUICK START LINUX AGENT INSTALLATION, CONFIGURATION AND TROUBLESHOOTING GUIDELINES Introduction: How the Client Agent works (Push Technology) The Common Agent Installation: Installing the agent from CD Installing the agent manually Configuration: Verifying and adding the agent node Configuring the agent port thru a firewall and changing port assignments Configuring the agent to autoload at bootup Verifying and licensing the agent Verifying the version and status of the agent Login/Authentication General Troubleshooting: Where the logs are located Setup environment variables Verifying the proper daemons are running with the ps command Using the netstat command to determine if the agent is hung Using the nslookup command to verify the correct server name and ip address How to put the agent in Debug Performance Connectivity Error Codes 1
2 INTRODUCTION: How the Agent works (Push Technology) All client agents use push technology, which automates the backup and restore process. The client agent contains separate internal client engines that help reduce the resource-intensive backup processes. With this feature, the client agent filters and packages its archive data for reception by the server. This data preparation and transmission method provides real-time directory browsing, offloading system resources from the backup server, improves data transfer through use of packet technology, provides network security, and monitors backup and restore jobs. The Push technology minimizes the transfer of data to the BrightStor ARCserve Backup host, because the Client Agent sends only the data that is needed for backup, thereby reducing the load on your communications network and accelerating the backup process. The host server can operate more efficiently since it no longer has to filter the data for the backup job. Basically, the Agent operates on the basis of a per job request. In this mode, the host server sends an entire list of files to the remote client at one time. The Push Agent then enables the remote client to take an active role in the process by pushing all the requested files to the host server (instead of having them pulled one at a time by the host server). The client agent browses its targeted directories, prepares the data, and transmits the data across the packet network. The backup server then prepares the data for storage on the designated backup devices. These simultaneous processes between the client workstation and the backup server create an efficient, automated backup environment. In this way, use of the Push Agent results in considerable savings in both network traffic and time, because it eliminates the series of request/acknowledge packets that otherwise have to be transmitted for each file. The Push Agent also reduces the host server s processing load by taking over the file processing task. The Common Agent The Common Agent (caagentd binary) is a standard component for all Linux client agents that are installed automatically during the first installation of any Linux client agent. The Common Agent resides in the /opt/ca/babcmagt directory. It keeps track of the client/database agents that are installed on the system in a configuration file named agent.cfg, which also resides in the /opt/ca/babcmagt directory. During the installation of a new agent, the agent.cfg file is updated with the new agent's information. You will seldom need to modify this configuration file. Manual modification of this file is required only to enable some debugging messages or to change the default TCP/IP port on which the Common Agent runs. To initiate a client agent session, the BrightStor ARCserve Backup server requests a connection for a client agent to use a specific backup component (such as BROWSER, BACKUP, or RESTORE). When it receives the request, the Common Agent accepts the connection and verifies the user s credentials for the system. Upon user validation, the Common Agent checks the agent.cfg file for an entry corresponding to that particular client agent and the specified component. Only after it has validated both the client agent and the requested component does the Common Agent activate the client agent and the component. The Common Agent then returns to a state of waiting for additional requests. 2
3 INSTALLATION: Installing the Agent from CD To install the Uagent/Common agent from CD, use the following steps: 1. On the server that you want to install the agent on, log in as root. 2. If the BrightStor ARCserve Backup packages are on CD, mount the CD on your local system. 3. To start the installation, go to the directory where you have mounted the CD, for example: # cd /mnt/cdrom 4. Go to the subdirectory for the platform you want to install the File System Agent, for example: # cd Linux 5. Run the following command: or #./install # path/install where path is the location of the install script. Note: If you have a previous version of the File System Agent installed, BrightStor ARCserve Backup detects this when you enter this command and automatically upgrades for you. Installing the Agent Manually To install the Uagent/Common agent manually, use the following steps: 1. On the server that you want to install the agent on, log in as root. 2. Create a temporary folder on the local system. # mkdir /uagent_install 3. FTP or copy the tar file to the temporary folder on your local system. 4. Untar the tar file with the following command. # tar -xvf uagentxxxx.tar 5. To start the installation, go to the directory where you transferred the tar file to, for example: # cd /uagent_install 6. Run the following commands in the following order: # rpm i ca-lic-xxxxxx.rpm # rpm i babcmagt.rpm # rpm i babagtux.rpm Note: The Common Agent must always be installed first before you install the Uagent or any special agent. 7. caagent list (to verify that the agent is enabled and running) Note: In order for a backup to be launched successfully, the needed agent must be enabled, and the common agent must be running. If the caagent list command shows the agents as enabled, but caagentd is not running you will need to launch the common agent with the caagent start command. 3
4 CONFIGURATION: Verifying and adding the agent node After the installation is complete verify that the agents are enabled and running. 1. On the server that you installed the agent on, enter # caagent list all Object_type Name Version Status 0 BABagntux ENABLED 2. If the BABagntux is not enabled then do the following. # cd path/babuagent #./uagent_setup 3. Once the agent is configured and is enabled and running, the node will have to be added to the client database on the ARCserve server. A. Start the GUI manager B. Login with caroot and select the Database Manager icon. C. The following screen will display. Click the Blue Add Agent icon, circled in yellow. 4
5 D. Select the Client tab and fill in the blank fields and click ok 4. You should now see the server/agent node in the Backup Manager screen. Configuring the Agent Port thru a Firewall MINIMUM PORTS REQUIRED FOR A FIREWALL BEB/BAB requires ports 6050 thru 6090, 80 (on server for GUI), 111 (RPC services) and to be accessible in order to backup thru a firewall. TO CHANGE PORT ASSIGNMENT FOR THE UNIX CLIENTS The default TCP port and UDP port are both The TCP port is used for communication and data transfer between the cprocess and the client agent. The Backup Manager user interface uses the UDP port to browse hosts. If you want to configure either the TCP port, UDP port, or both, the configuration files (below) must be modified on both the ARCserve server (port.cfg) and the agent side (agent.cfg). The values must match in order for communication between the server and the agent to succeed. By default, the Common Agent uses another UDP port, 0xA234 (41524), to receive BrightStor ARCserve Backup requests for the Auto Discovery of Linux client agents. This port is not configurable. An example of the port.cfg or CAportconfig.cfg file is shown below: #Hostname IP address (optional) TCP port UDP port #myhost xxx.xxx.xxx.xxx mymachine An example of the.agent.cfg file is shown below for ARCserve 10.x and above [36] #[BABcmagt] (NOTE: the # must stay for this line) NAME BABcmagt HOME /opt/ca/babcmagt TCP_PORT 6051 UDP_PORT
6 Configuring the agent to Autoload at Bootup The default selection for the ARCserve agent during the install was to allow the agent to be started by the system s runlevel control. If you manually installed the agent or chose not to allow this during the install you can easily add this functionality. Simply execute the /opt/ca/babcmagt/caagent_autostrtstop script. This will create a BAB_agent script, usually in the /etc/init.d folder Verifying and licensing the agent The license is installed with the ca-lic-xxxxxx.rpm package. You can also install the license manually using the CALicense script in the ca_lic folder. # cd /opt/ca/ca_lic #./CALicense <29 Character License Key> If you get 'invalid license' error. Verify that there is a SharedComponents and ca_lic directory under the /opt/ca folder. If not, untar the lic98.tar from cd being used for the client agent install. Change to the directory called lic98_install and run./install. This will create the SharedComponents and ca_lic directories. Rerun uagentsetup Verifying the Release Build of the agent Use the following console commands to verify the version and build of the uagent installed. # uagent -u CA BrightStor ARCserve Backup Agent for UNIX/Linux r11.5 (Build 2417)(Running on Linux el5 #1 SMP Fri Jan 26 14:15:14 EST 2007 x86_64)a Usage: uagent {status start stop} Login/Authentication Alternate users other than the root user can be used to login to the client agent and perform the backups. But keep in mind that we highly recommend that the root user be used. This insures that the user has all the permissions to access and backup the entire file system successfully. Where the Logs are Located All log messages relating to the Uagent are located in the /opt/ca/babuagent/logs directory. cabr.log uag.log uag.ipc All log messages relating to the Common Agent are located in the /opt/ca/babcmagt/logs directory. caagentd.log 6
7 GENERAL TROUBLESHOOTING: Setup Environment Variables A sample structure of the agent.cfg file with a client agent installed is shown below: File Contents Field Description [0] Object type: pre-defined number of a specific agent #[BABagntux] Section Name NAME BABagntux Agent s name VERSION nn.nn.nn Agent s version number HOME /opt/ca/babuagent Home directory for agent ENV CA_ENV_DEBUG_LEVEL=4:$CA_ENV_DEBUG_LEVEL Environment variables passed to agent ENV LD_LIBRARY_PATH=/opt/CA/CAlib:/opt/CA/BABcmagt: $LD_LIBRARY_PATH ENV SHLIB_PATH=/opt/CA/CAlib:/opt/CA/BABcmagt: $SHLIB_PATH ENV LIBPATH=/opt/CA/CAlib:/opt/CA/BABcmagt:$LIBPATH BROWSER cabr Browser module for agent AGENT uagentd Backup module for agent daemon MERGE umrgd Merge daemon VERIFY umrgd Scan daemon [36] DISABLED #[BABcmagt] #NAME BABcmagt #HOME /opt/ca/babcmagt #TCP_PORT 6051 #UDP_PORT 6051 How to put the Agent in Debug Use your preferred text editor to edit the agent.cfg file in the common agent directory (/opt/ca/babcmagt) and remove the # from the line that says debug level 4 like the example below. The complete line is: #ENV CA_ENV_DEBUG_LEVEL=4 Stop and start agent before doing backup. The debug output will be written to the caagentd.log file in the BABcmagt/logs directory. Verifying the Version and Status of the Agent Use the following console commands to verify the status of all the agents installed. # caagent list all Object_type Name Version Status 0 LinuxAgent ENABLED # caagent disable all (will disable all the active agents on the list) # caagent enable all (will enable all the disabled agents on the list) # caagent enable <object> (will enable a specific object/agent on the list) 7
8 Verifying the proper daemons are running With no backups active- one caagentd daemon running # ps -ef grep agent root ? 00:00:00 /usr/bin/ssh-agent /. root :22? 00:00:00 /opt/ca/babcmagt/caagentd root :52 pts/2 00:00:00 grep agent With no backups but the manager browsing two caagent daemons running and one cabr running- note the parentchild relationship with the starting caagentd process # ps -ef grep agent root ? 00:00:00 /usr/bin/ssh-agent /.. root :22? 00:00:00 /opt/ca/babcmagt/caagentd root :06? 00:00:00 /opt/ca/babcmagt/caagentd root :06 pts/2 00:00:00 grep agent # ps -ef grep cabr root :06? 00:00:00 cabr root :07 pts/2 00:00 grep cabr With one backup running while there are 2 or more uagentd processs, note that the parent-child relationship can be followed back to the caagentd process that launched it # ps -ef grep agent root ? 00:00:00 /usr/bin/ssh-agent / root :22? 00:00:00 /opt/ca/babcmagt/caagentd root :10? 00:00:11 uagentd root :10? 00:00:00 uagentd root :11 pts/2 00:00:00 grep agent Connectivity Using the nslookup command to verify the correct server name and IP address On both the Host and Client Agent server, run the command: Ex: by server name # nslookup <servername> Server: test01.com Address: Name: <servername>.com Address: Ex: by IP address # nslookup Server: test01.com Address: Name: <servername>.com Address:
9 Using the netstat command to determine if the agent is hung On the Client Agent server, run the command: # netstat -an grep 6051 tcp : :* LISTEN udp : :* Note: The agent must be loaded (even if hung) to see anything with netstat. If the result you get is a 'closed wait' or 'wait' status for port 6051, then the agent process is hung. Netstat can also be done on the windows side to verify if it is communicating with the client agent. Trouble shooting windows connections Get the following information? 1) From the Windows server: hosts file ipconfig /all tracert <linux machine by name> tracert <linux machine by IP address> nslookup <linux machine by name> nslookup <linux machine by IP> 2) From the linux machine: /etc/hosts /etc/nsswitch.conf ifconfig -a hostname traceroute <win machine by name> traceroute < win machine by IP address> nslookup <win machine by name> nslookup <win machine by IP address> 3) On the linux machine: caagent disable all Make sure that port 6051 is clear and that no caagent process is running. cd /opt/ca/babcmagt mv logs logs_<date> cd to the uagent home directory, put the uagent in single user mode (-S in uag.cfg) caagent enable all 4) Try to login again. If no information is written to the common agent logs about the login attempt, our connection is being denied. Send in or check the iptables config file normally in the /etc/sysconfig folder Also, get a netstat -an and o output from both sides. 9
10 Performance Typically people experiencing throughput problems have run benchmark tests on the same set of data between a command-line backup utility or have noticed what they believe to be slow throughput in their ARCserve backups. The following steps describe a troubleshooting process for throughput issues. 1. On ARCserve: Check the activity log on the backup server ($BAB_HOME/logs/BrightStor.log). For the relevant backups, how many files were backed up, what was the total file size of the backup, and what was the average throughput? If possible, simply include the relevant sections directly from the log file. 2. In order to increase the performance, we have to consider possible bottlenecks. This include physical connection connections to the backup devices, backup device speed, network connections, and disk I/O speed. One possible test is to use the tar system utility for a rough benchmark. How long does it take for tar to archive the identical files to tape? This can be determined by prefacing the tar command with the time command. (e.g. time tar -cvf /dev/rmt/0h /tmp/test_dir) 4. The Unix agents provide several command-line arguments that may increase the throughput of data to the ARCserve engine. Keep in mind that increasing performance will decrease available network bandwidth, and that overall throughput to tape is dependent on a number of factors such as (but not limited to) processor power; number of, layout, and type of SCSI devices and interfaces; average size of files being transferred; and network usage and capacity. Command-line options are entered after the start command, as shown below: # uagent start -b c 1 -m b [ ] Controls the size of the disk I/O buffer, in bytes. The default is Increase this value to improve performance. -s [ ] Specifies the size of the socket buffer. Enter a value from 4096 to c [0-1000] Controls the sleep waiting time-out when shared memory is empty or full. The default is 0, which allows the agent to dynamically control the sleep time-out. Setting this value to 1 will try to devote all available CPU processing to the uagent, and setting it to 1000 will make it more resource-friendly. A value of 1 is suggested when more resources are needed. -m [ ] Controls the number of disk I/O buffers. The default for SCO, UnixWare, and Solaris x86 is 100, and is 256 for all other platforms. Increase this value to improve performance. UAG.CFG default parameters -b bufsize Defines the disk I/O buffer size in bytes. Enter a value from 2048 to bytes. Default: c n Defines the sleep time in milliseconds (ms), while waiting for a shared memory slot to become completely full or empty. Enter a value from 0 to 1000 ms. Default: 0 -m maxbuf Defines the number of buffers allocated for I/O. Specify from 2 to 1024 buffers. Default: 128 -s bufsize Specifies the size of the socket buffer. Enter a value from 4096 to Default:
11 Error Codes E8511 Failed to connect to the client agent. Verify correct user name and password Disable the personal firewall as a test Verify ca_auth equivalency for the owner/user Verify healthy network - NIC cards and cable E8522 Failed to receive data from client ec=-1 This is a connection or network issue and can be exactly that. If the ARCserve server is on the Windows platform, this type of error can be confirmed by looking in the event viewer and seeing "broken-pipe" errors. In this case you will need to verify and correct basic network connectivity, packet corruption and router status Ping the by ip address and server name both ways Verify healthy network - NIC cards and cable Download CA doc ID: TEC Check to see if this document is still available and current location. E8524 Received unrecognized command from the client agent. Verify correct builds of the agent and base Base product should be of higher version/build than that of the agent Disable the personal firewall as a test E8531 Request denied by the client agent Verify correct user name and password Verify correct user permissions E8535 Failed to receive data from client agent Verify correct option usage in the uag.cfg file Comment out the line #ENV LD_ASSUME_KERNEL= from /opt/ca/babcmagt/agent.cfg file and restart the client agent services Ping the by ip address and server name both ways Verify healthy network - NIC cards and cable E9004 Failed to connect to agent <server name>, Is the agent loaded and the TCP port correct? Fairly self-explanatory, this usually means that the uagent is unreachable on the client machine because it has either not been installed, started, or there has been a communications error. There are rare instances in which bad IP address information is passed to the job queue, which will return an abnormal or otherwise incorrect IP address. Enable portmapper and the udp port Disable the firewall as a test Ping the by ip address and server name both ways Verify healthy network - NIC cards and cable 11
12 E9011 Failed to receive packet Address already in use Ping the by ip address and server name both ways Check if the following settings are to low These registry settings are in the Win2k, NT 4, and Win 95/98 Client Agent registry under: HKLM\SOFTWARE\Computer Associates\Brightstor Arcserve Backup\ClientAgent\Parameters: Change the values of ReconectionTimeOut, ReceiveTimeOut and SendTimeOut to the desired number of seconds Verify healthy network - NIC cards and cable E9014 Failed to receive header packet [xxxxxxx: No such file or directory] Ping the by ip address and server name both ways Verify healthy network - NIC cards and cable Lost connection to (machine name) (IPaddress). Do you want to connect? Comment out the line #ENV LD_ASSUME_KERNEL= from /opt/ca/babcmagt/agent.cfg file Getting "invalid command" after issuing "uagent start" Verify that the environment variables are set cd to the BABuagent directory and run uagentsetup Getting the error "Failed to login the agent" even after putting the correct root password. Comment out the line #ENV LD_ASSUME_KERNEL= from /opt/ca/babcmagt/agent.cfg file Getting "failed to connect to merge/scan daemon" at the end of backup. Verify that the environment variables are set cd to the BABuagent directory and run uagentsetup Uagent is not running, scan/merge operation needs uagent up and running. Getting uagent is not registered when trying to load the agent. Verify that the environment variables are set cd to the BABuagent directory and run uagentsetup and reply YES to reregister the uagent 12
13 W300014: Failed to get semaphore. Increase the following kernel parameters: set shmsys:shminfo_shmmax= set shmsys:shminfo_shmmni= set shmsys:shminfo_shmseg= Settings will vary according to the server and amount of memory available. The following parameters should also be checked and may need increasing. set semsys:seminfo_semmni= set semsys:seminfo_semmns= set semsys:seminfo_semmnu= set semsys:seminfo_semmsl= set semsys:seminfo_semopm= set semsys:seminfo_semume= set semsys:seminfo_semvmx= The minimum suggested parameters can be found in the BrightStor for UNIX INSTALLATION and RELEASE NOTES Slow Restores. cstop Follow Doc TEC verify document availability and location. If the ARCserve server is on the Windows platform: Increase the value for WSRcvdBuffSize and WSSendBuffSize in the registry. HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\BrightStor ARCserve Backup\Base\Task\Remote to cstart 13
How to install PowerChute Network Shutdown on VMware ESXi 3.5, 4.0 and 4.1
How to install PowerChute Network Shutdown on VMware ESXi 3.5, 4.0 and 4.1 Basic knowledge of Linux commands and Linux administration is needed before user should attempt the installation of the software.
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.
TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure
CA /BrightStor ARCserve9 Backup Software
CA /BrightStor ARCserve9 Backup Software The CA BrightStor ARCserve9 Backup program can be installed on the TANDBERG NAS and launched from a browser. You can use this software to manage either an autoloader
BrightStor ARCserve Backup for Linux
BrightStor ARCserve Backup for Linux Agent for MySQL Guide r11.5 D01213-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Attix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
CA arcserve Unified Data Protection Agent for Linux
CA arcserve Unified Data Protection Agent for Linux User Guide Version 5.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as
Managing Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot
DC Agent Troubleshooting
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
Signiant Agent installation
Signiant Agent installation Release 11.3.0 March 2015 ABSTRACT Guidelines to install the Signiant Agent software for the WCPApp. The following instructions are adapted from the Signiant original documentation
DS License Server V6R2013x
DS License Server V6R2013x DS License Server V6R2013x Installation and Configuration Guide Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology
Installing a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2. Summary
Technical Bulletin Application Note April 2013 Installing a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2 Summary This application note describes how to install the
Avalanche Remote Control User Guide. Version 4.1.3
Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095
Acronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
DS License Server. Installation and Configuration Guide. 3DEXPERIENCE R2014x
DS License Server Installation and Configuration Guide 3DEXPERIENCE R2014x Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology Edition, Version
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
Veritas Cluster Server
APPENDIXE This module provides basic guidelines for the (VCS) configuration in a Subscriber Manager (SM) cluster installation. It assumes basic knowledge of the VCS environment; it does not replace the
How To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
Enterprise Reporting Server v3.5
Enterprise Reporting Server v3.5 Administrator s Guide January 2001 Edition 2001 WebTrends Corporation Disclaimer WebTrends Corporation makes no representations or warranties with respect to the contents
Use of Commercial Backup Software with Juris (Juris 2.x w/msde)
Use of Commercial Backup Software with Juris (Juris 2.x w/msde) Juris databases hosted on a Microsoft SQL Server 2000 Desktop Engine (MSDE) instance can be backed up manually through the Juris Management
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers
W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault
EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...
Hands On Activities: TCP/IP Network Monitoring and Management
Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
Configuring MailArchiva with Insight Server
Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Network Setup Instructions
Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical
Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
Configuring Logging. Information About Logging CHAPTER
52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page
McAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
NetSpective Logon Agent Guide for NetAuditor
NetSpective Logon Agent Guide for NetAuditor The NetSpective Logon Agent The NetSpective Logon Agent is a simple application that runs on client machines on your network to inform NetSpective (and/or NetAuditor)
Homework 3 TCP/IP Network Monitoring and Management
Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report
Laptop Backup - Administrator Guide (Windows)
Laptop Backup - Administrator Guide (Windows) Page 1 of 86 Page 2 of 86 Laptop Backup - Administrator Guide (Windows) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL
Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012
Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012 1 The person installing the VC is knowledgeable of the Linux file system
Novell ZENworks Asset Management
Novell ZENworks Asset Management Administrative Best Practices and Troubleshooting www.novell.com APRIL 19, 2005 2 GETTING THE MOST OUT OF NOVELL ZENWORKS ASSET MANAGEMENT The award-winning asset tracking
Laptop Backup - Administrator Guide (Macintosh)
Laptop Backup - Administrator Guide (Macintosh) Page 1 of 75 Page 2 of 75 Laptop Backup - Administrator Guide (Macintosh) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL
F-Secure Internet Gatekeeper
F-Secure Internet Gatekeeper TOC F-Secure Internet Gatekeeper Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper...5 1.1 Features...6 Chapter 2: Deployment...8 2.1 System requirements...9 2.2
CA ARCserve D2D for Linux
CA ARCserve D2D for Linux User Guide r16.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
Tracking Network Changes Using Change Audit
CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
BrightStor ARCserve Backup for Windows
BrightStor ARCserve Backup for Windows Agent for Microsoft SQL Server r11.5 D01173-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Moxa Device Manager 2.0 User s Guide
First Edition, March 2009 www.moxa.com/product 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Moxa Device Manager 2.0 User Guide The software described in this manual
IBM Security QRadar Version 7.2.2. WinCollect User Guide V7.2.2
IBM Security QRadar Version 7.2.2 WinCollect User Guide V7.2.2 Note Before using this information and the product that it supports, read the information in Notices on page 47. Product information This
Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux
Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com [email protected] August 2015 Copyright 2015 1&1
Automation Engine 14. Troubleshooting
4 Troubleshooting 2-205 Contents. Troubleshooting the Server... 3. Checking the Databases... 3.2 Checking the Containers...4.3 Checking Disks...4.4.5.6.7 Checking the Network...5 Checking System Health...
DOCSVAULT Document Management System for everyone
Installation Guide DOCSVAULT Document Management System for everyone 9 v Desktop and Web Client v On Premises Solution v Intelligent Data Capture v Email Automation v Workflow & Record Retention Installing
Local Caching Servers (LCS): User Manual
Local Caching Servers (LCS): User Manual Table of Contents Local Caching Servers... 1 Supported Browsers... 1 Getting Help... 1 System Requirements... 2 Macintosh... 2 Windows... 2 Linux... 2 Downloading
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6
KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly
User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1
The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)
ilaw Installation Procedure
ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing
CA ARCserve Backup. UNIX and Linux Data Mover Guide. r16
CA ARCserve Backup UNIX and Linux Data Mover Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation )
CA ARCserve Backup. Client Agents Guide. r16
CA ARCserve Backup Client Agents Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
3M Command Center. Installation and Upgrade Guide
3M Command Center Installation and Upgrade Guide Copyright 3M, 2015. All rights reserved., 78-8129-3760-1d 3M is a trademark of 3M. Microsoft, Windows, Windows Server, Windows Vista and SQL Server are
FileMaker Server 7. Administrator s Guide. For Windows and Mac OS
FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
Network Scanner Tool R3.1. User s Guide Version 3.0.04
Network Scanner Tool R3.1 User s Guide Version 3.0.04 Copyright 2000-2004 by Sharp Corporation. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,
Double-Take AVAILABILITY
Double-Take AVAILABILITY Version 8.0.0 Double-Take Availability for Linux User's Guide Notices Double-Take Availability for Linux User's Guide Version 8.0, Monday, April 25, 2016 Check your service agreement
Troubleshooting File and Printer Sharing in Microsoft Windows XP
Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows
[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1
[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1 How to Recover an infiniti/evolution Modem Software Reference idx 3.0.0.0 (12.0.0.0) Updated: November 17 th 2011 Overview Recovery Procedures
Troubleshooting / FAQ
Troubleshooting / FAQ Routers / Firewalls I can't connect to my server from outside of my internal network. The server's IP is 10.0.1.23, but I can't use that IP from a friend's computer. How do I get
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
CommandCenter Secure Gateway
CommandCenter Secure Gateway Quick Setup Guide for CC-SG Virtual Appliance and lmadmin License Server Management This Quick Setup Guide explains how to install and configure the CommandCenter Secure Gateway.
SuperLumin Nemesis. Administration Guide. February 2011
SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
Features - Microsoft Data Protection Manager
Page 1 of 63 Features - Microsoft Data Protection Manager TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS - MICROSOFT DATA PROTECTION MANAGER INSTALLATION Install the Microsoft Data Protection Manager BACKUP
User's Guide - Beta 1 Draft
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent vnext User's Guide - Beta 1 Draft SC27-2319-05 IBM Tivoli Composite Application Manager for Microsoft
MFPConnect Monitoring. Monitoring with IPCheck Server Monitor. Integration Manual Version 2.05.00 Edition 1
MFPConnect Monitoring Monitoring with IPCheck Server Monitor Integration Manual Version 2.05.00 Edition 1 TABLE OF CONTENTS 1. INTRODUCTION...3 2. REQUIREMENTS...4 3. RESTRICTIONS...5 4. INSTALLATION...6
Konica Minolta s Optimised Print Services (OPS)
Konica Minolta s Optimised Print Services (OPS) Document Collection Agent (DCA) Detailed Installation Guide V1.6 Page 1 of 43 Table of Contents Notes... 4 Requirements... 5 Network requirements... 5 System
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies,
Spector 360 Deployment Guide. Version 7
Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...
CA ARCserve Backup. UNIX and Linux Data Mover Guide. r15
CA ARCserve Backup UNIX and Linux Data Mover Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes
External Data Connector (EMC Networker)
Page 1 of 26 External Data Connector (EMC Networker) TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS INSTALLATION (WINDOWS) INSTALLATION (UNIX) GETTING STARTED Perform a Discovery Perform a Migration ADVANCED
5nine Cloud Monitor for Hyper-V
5nine Cloud Monitor for Hyper-V Getting Started Guide Table of Contents System Requirements... 2 Installation... 3 Getting Started... 8 Settings... 9 Authentication... 9 5nine Cloud Monitor for Hyper-V
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that
c. Securely insert the Ethernet cable from your cable or DSL modem into the Internet port (B) on the WGT634U. Broadband modem
Start Here Follow these instructions to set up your router. Verify That Basic Requirements Are Met Assure that the following requirements are met: You have your broadband Internet service settings handy.
UltraBac Documentation. UBDR Gold. Administrator Guide UBDR Gold v8.0
UltraBac Documentation UBDR Gold Bare Metal Disaster Recovery Administrator Guide UBDR Gold v8.0 UBDR Administrator Guide UBDR Gold v8.0 The software described in this guide is furnished under a license
TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS - SAP FOR ORACLE IDATAAGENT GETTING STARTED - DEPLOYING ON WINDOWS
Page 1 of 44 Quick Start - SAP for Oracle idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Full Range of Backup and Recovery Options SnapProtect Backup Command Line Support Backup and Recovery
How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
Snare Agent Management Console User Guide to the Snare Agent Management Console in Snare Server v6
User Guide to the Snare Agent Management Console in Snare Server v6 InterSect Alliance International Pty Ltd Page 1 of 14 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
CHANGES IN GECS 3.50 PACKAGES
CHANGES IN GECS 3.50 PACKAGES GECS version 3.50 started shipping January 20 th, 2005. You can find the date of the last GECS package installed by looking in the file named PKGDATE.TXT located in your GECS
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
Backup & Restore Guide
The email Integrity Company Sendio Email Security Platform Appliance Backup & Restore Guide Sendio, Inc. 4911 Birch St. Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com 2010 Sendio,
JAMF Software Server Installation Guide for Linux. Version 8.6
JAMF Software Server Installation Guide for Linux Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate.
VeriCentre 3.0 Upgrade Pre-Installation and Post Installation Guidelines
VeriCentre 3.0 Upgrade Pre-Installation and Post Installation Guidelines * For actual installation steps, please refer to the VeriCentre 3.0 Installation guide that came with the VeriCentre 3.0 software.
HOWTO: Set up a Vyatta device with ThreatSTOP in router mode
HOWTO: Set up a Vyatta device with ThreatSTOP in router mode Overview This document explains how to set up a minimal Vyatta device in a routed configuration and then how to apply ThreatSTOP to it. It is
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange
