Repository Management

Size: px
Start display at page:

Download "Repository Management"

Transcription

1 APPENDIX A Repository management tools are handled through any Web browser, as shown in Chapter 4, VPN Console: File Menu. Additionally, you can do the following: Run dbbackup from the command line to back up your repository, as shown in the Backup from the Command Line section on page A-1. Run recovertool from the command line to recover events recorded in a journal file to re-create a Repository, as shown in the Recovery from the Command Line section on page A-2. Run dbrestore from the command line to restore your repository, as shown in the Restore from the Command Line section on page A-2 Back up a repository using a third party backup program, as shown in the Backup from Third Party Backup Program section on page A-3. Grant access permission to the tools, as shown in the Access Permission to Tools section on page A-3. Populate the VpnInventory Repository by reading information from a file, as shown in the Repository Import Tool section on page A-5. Export the entire Repository into a flat file, as shown in the Repository Export Tool section on page A-7. Backup from the Command Line This section provides the description and syntax for the dbbackup command that can be run from the command line to back up a repository. The dbbackup command backs up a repository from the command line. You can run dbbackup from $ECSP_HOME/bin/solaris. A-1

2 Recovery from the Command Line Appendix A dbbackup -db <dbpath> [-dest <destdir>] [-tar -compress] [-v] [-p <progname>] [-help] -db <dbpath> is the path to the repository you wish to back up. -dest <destdir> is the existing destination directory into which to place the backed up repository. If this parameter is not specified, the default destination directory is /tmp. -tar indicates to tar the backed up repository into the existing destination directory. -compress indicates to tar and compress the backed up repository into the existing destination directory. -v indicates to supply verbose log output. -p <progname> indicates to use <progname> to do the database backup. -help indicates to print this message. Recovery from the Command Line This section provides the description and syntax for the recovertool command that can be run from the command line to recover a repository. The recovertool command can be run from the command line to play back events recorded in a journal file to re-create a repository. You can run recovertool from $ECSP_HOME/bin/solaris. execjava.sh netsys.repository.journal.recovertool.main <journal_dir> <rep_dir> <journal_dir> is the path to the directory containing the journal files dir.jnl and vi.jnl. <rep_dir> is the destination directory (complete path) that contains the Repository on which the journal files are to be played back. Restore from the Command Line This section provides the description and syntax for the dbrestore command that can be run from the command line to restore a repository. The dbrestore command restores a repository from the command line. You can run dbrestore from $ECSP_HOME/bin/solaris. A-2

3 Appendix A Backup from Third Party Backup Program dbrestore <backupfile> -dest <destdir> [-c] [-v] [-help] <backupfile> is the path to the backup file or directory you wish to restore from. -dest <destdir> is the destination directory (complete path) into which to place the restored repository. -c indicates to create the destination directory, as specified, if it does not exist. -v indicates to supply verbose log output. -help indicates to print this message. Backup from Third Party Backup Program This section provides the description and syntax for the dbbackup command that can back up a repository using a third party backup program that is running with the same user ID as the VPN software. The dbbackup command backs up a repository using a third party backup program. You can run dbbackup from $ECSP_HOME/bin/solaris. When you execute the dbbackup command, it automatically does the following: 1. Locks the repository 2. Executes your backup program 3. Unlocks the repository. dbbackup -db <dbpath> -p "<progname -parameters>" -db <dbpath> is the path to the repository you wish to back up. -p "<progname -parameters>" is the backup program name and all its parameters. Access Permission to Tools This section includes the following categories: How to Define the Access Permission File of the Access Permission File Example of Access Permission File A-3

4 Access Permission to Tools Appendix A This feature allows you to specify which machines have access permission to the Repository Management tools. Without an access permission file, every machine has permission to use the tools. How to Define the Access Permission File In $ECSP_HOME/etc, create a file called SecureAccess.id. For example: $ECSP_HOME/etc/SecureAccess.id Within this file, define the machines to which you want to permit and deny access permission, as specified in the section of the Access Permission File. Then restart the httpd server by issuing the following command: wdclient restart httpd. of the Access Permission File {permit deny} {<IPaddress> <MachineName> <SubnetAddress>} You must choose one of the following two arguments: permit gives access permission to the tools. deny denies access permission to the tools. You must choose one of the following three arguments: <IPaddress> is the IP address of the machine. <MachineName> is the name of the machine. <SubnetAddress> is the address of the subnet of multiple machines. Example of Access Permission File The following example of an access permission file, SecureAccess.id, gives permission to the machine with the IP address and the machine with the name machine1.company1.com to use the tools. This example also denies permission to the machine with the name machine2.company1.com and the machines in the subnet /24 to use the Repository Management tools. # start of the id file # # # # end of the comment block permit permit machine1.company1.com deny machine2.company1.com deny /24 A-4

5 Appendix A Repository Import Tool # end of the id file # Repository Import Tool This section provides the description, prerequisites, and syntax for the Repository import tool, the VpnInvImport command. This tool can be run either on the server that runs VPNSC or on a remote machine. Warning You must install the Repository Import/Repository Export license before using this tool. To get this license, send an to the following address, requesting this license: csg-license@cisco.com. Then refer to the License Administration section on page 9-71 to add this license. The VpnInvImport command enables you to populate the VpnInventory Repository by reading information from a file. The file /tmp/vpninvimport.log contains information about each element that was created. In addition, this tool writes output information to stdout for the Inventory Elements that are created as well as the elements that already exist. If an error occurs while populating the Repository, the program exits and a message is printed to stderr. This tool cannot be used to modify an existing Repository. It can only be used to populate an empty Repository or add elements to an existing Repository. This tool populates the Repository currently being used by IPsec VPN Solution. Prerequisites Be sure that the following steps are taken before implementing either of the commands listed in the section on page A-6: Step 1 Step 2 Be sure the IPsec VPN Solution watchdog has been started. In the $ECSP_HOME directory, source as follows. For csh users, enter: source vpnenv.csh For sh and ksh users, enter:../vpnenv.sh Perform Step 3 and Step 4 when running IPsec VPN Solution as a user other than the VPNSC owner. A-5

6 Repository Import Tool Appendix A Step 3 If you choose to run the tool on a remote machine rather than on the same server that runs VPNSC, be sure the Naming Server (NS) and the VpnInvServer running on the VPNSC server have their permissions set correctly. For example: to allow a user (<username>) to run this tool on a remote machine, enter the following commands on the VPNSC server: chmodit NS i+<username> chmodit VpnInvServer i+<username> Step 4 The lowercase letter i indicates to invoke. If the environment variable IT_DAEMON_PORT is not already set, enter the following command: setenv IT_DAEMON_PORT 1570 Be sure you have implemented the prerequisites, as specified in the Prerequisites section on page A-5, before implementing either of the following commands: VpnInvImport -xml <filename> [-u <username>] [-p <password>] [-f <password_file>] [<hostname>] -xml indicates to read from an XML formatted file. If the format of the input file, the Document Type Definition, is not known, run the VpnInvExport tool explained in the Repository Export Tool section on page A-7. All values are case sensitive. Therefore, be sure the Boolean variables are all specified in lowercase. Also be sure that the character & is replaced by & before using XML import format. This is required because the character & has a special meaning in XML. <filename> is the name of the file from which to read data. -u <username> is the name of the valid user on VPNSC. If this optional parameter is not specified, the default for the valid user name is admin. -p <password> is the password for the valid user specified by the -u option above or the password for the default user admin. If this optional parameter is not specified, the default for the password is admin. -f <password_file> is the file during VPNSC installation against which the <username> and <password>, specified above, will be validated. If this optional parameter is not specified, the default for the password_file is the password_file created during VPNSC installation. <hostname> is the name of the host where the Naming Server is running, for example: abc.efgh.com, where abc is the machine name. When this optional parameter is not specified, the default is localhost. or VpnInvImport -h help -h and help (case insensitive) request help text about the VpnInvImport command. A-6

7 Appendix A Repository Export Tool Repository Export Tool This section provides the description, prerequisites, and syntax for the Repository export tool, the VpnInvExport command. This tool can be run either on the server that runs VPNSC or on a remote machine. Warning You must install the Repository Import/Repository Export license before using this tool. To get this license, send an to the following address, requesting this license: csg-license@cisco.com. Then refer to the License Administration section on page 9-71 to add this license. The VpnInvExport command allows the entire VPNSC Repository to be exported into a flat file. With this Repository Export tool, you can get output of the VpnInventory Repository in text format. Prerequisites Be sure that the following steps are taken before implementing either of the commands listed in the section on page A-8: Step 1 Step 2 Be sure the IPsec VPN Solution watchdog has been started. In the $ECSP_HOME directory, source as follows. For csh users, enter: source vpnenv.csh For sh and ksh users, enter:../vpnenv.sh Step 3 Perform Step 3 and Step 4 when running IPsec VPN Solution as a user other than the VPNSC owner. If you choose to run the tool on a remote machine rather than on the same server that runs VPNSC, be sure the Naming Server (NS) and the VpnInvServer running on the VPNSC server have their permissions set correctly. For example: to allow a user (<username>) to invoke this tool on a remote machine, enter the following commands on the VPNSC server: chmodit NS i+<username> chmodit VpnInvServer i+<username> The lowercase letter i indicates to invoke. A-7

8 Repository Export Tool Appendix A Step 4 If the environment variable IT_DAEMON_PORT is not already set, enter the following command: setenv IT_DAEMON_PORT 1570 Be sure you have implemented the prerequisites, as specified in the Prerequisites section on page A-7, before implementing either of the following commands: VpnInvExport -xml <filename> [-u <username>] [-p <password>] [-f <password_file>] [<hostname>] -xml indicates to dump the VPNSC Repository into a flat file in XML format. The Document Type Definition (DTD) is part of the output in the XML document. <filename> is the name of the file to which to dump the Repository. -u <username> is the name of the valid user on VPNSC. If this optional parameter is not specified, the default for the valid user name is admin. -p <password> is the password for the valid user specified by the -u option above or the password for the default user admin. If this optional parameter is not specified, the default for the password is admin. -f <password_file> is the file during VPNSC installation against which the <username> and <password>, specified above, will be validated. If this optional parameter is not specified, the default for the password_file is the password_file created during VPNSC installation. <hostname> is the name of the host where the Naming Server is running, for example: abc.efgh.com, where abc is the machine name. When this optional parameter is not specified, the default is localhost. or VpnInvExport -h help -h and -help requests help text about the VpnInvExport command. A-8

ApsaraDB for RDS. Quick Start (PostgreSQL)

ApsaraDB for RDS. Quick Start (PostgreSQL) Getting started with ApsaraDB The Alibaba Relational Database Service (RDS) is a stable, reliable, and auto-scaling online database service. Based on the Apsara distributed file system and high-performance

More information

User Inputs for Installation

User Inputs for Installation APPENDIXA This appendix provides information on the user inputs during LMS 4.1 installation. Note For information on the Installation of LMS 4.1, see Performing Installation of LMS 4.1. This appendix contains:

More information

Managing Databases. Prerequisites. Information About the Database Administration Tools CHAPTER

Managing Databases. Prerequisites. Information About the Database Administration Tools CHAPTER CHAPTER 4 This chapter describes two Cisco SIP proxy server (Cisco SPS) database administration tools: The registry and routing (regroute) databases tool The MySQL database tool It contains the following

More information

Acronis Backup plugin for WHM and cpanel 1.0

Acronis Backup plugin for WHM and cpanel 1.0 Acronis Backup plugin for WHM and cpanel 1.0 ADMINISTRATOR'S GUIDE Table of contents 1 Introduction...3 2 System requirements...3 3 Obtaining the Acronis product...3 4 Installing the Acronis Backup plugin

More information

MEDIASEAL Encryptor Client Manual

MEDIASEAL Encryptor Client Manual MEDIASEAL Encryptor Client Manual May 2018 Version 3.7.1 Fortium Technologies Ltd www.fortiumtech.com Copyright 2018 - Fortium Technologies Ltd Information contained in this document is subject to change

More information

User and System Administration

User and System Administration CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays

More information

Contents Overview... 5 Upgrading Primavera Gateway... 7 Using Gateway Configuration Utilities... 9

Contents Overview... 5 Upgrading Primavera Gateway... 7 Using Gateway Configuration Utilities... 9 Gateway Upgrade Guide for On-Premises Version 17 August 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Upgrading Primavera Gateway... 7 Prerequisites... 7 Upgrading Existing Gateway Database...

More information

Setting Up Oracle for ISC

Setting Up Oracle for ISC APPENDIXA This appendix describes how to set up an Oracle Database 10g, Enterprise Edition Release 10.2.0.1.0-64 bit Production server that works with Cisco IP Solution Center (ISC). This appendix is written

More information

Exporting and Importing a Virtual Service Blade

Exporting and Importing a Virtual Service Blade This chapter contains the following sections: Information About, page 1 Guidelines and Limitations for, page 1 Exporting a Virtual Service Blade, page 2 Importing a Virtual Service Blade, page 5 Verifying

More information

Security Service tools user IDs and passwords

Security Service tools user IDs and passwords IBM Systems - iseries Security Service tools user IDs and passwords Version 5 Release 4 IBM Systems - iseries Security Service tools user IDs and passwords Version 5 Release 4 Note Before using this information

More information

Configuration Import/Export

Configuration Import/Export About, on page 1 Exporting an FXOS Configuration File, on page 2 Scheduling Automatic Configuration Export, on page 3 Setting a Configuration Export Reminder, on page 4 Importing a Configuration File,

More information

Setting Up Oracle for Prime Fulfillment

Setting Up Oracle for Prime Fulfillment APPENDIXA This appendix describes how to set up an Oracle Database 11g, Enterprise Edition Release 11.2.0.1.0-64 bit Production server that works with Cisco Prime Fulfillment. This appendix is written

More information

ANIXIS Password Reset

ANIXIS Password Reset ANIXIS Password Reset Evaluator s Guide V3.22 Copyright 2003-2018 ANIXIS. All rights reserved. ANIXIS, ANIXIS Password Reset, Password Policy Enforcer, PPE/Web, Password Policy Client, Password Policy

More information

Backup using Quantum vmpro with Symantec Backup Exec release 2012

Backup using Quantum vmpro with Symantec Backup Exec release 2012 Backup using Quantum vmpro with Symantec Backup Exec release 2012 Step 1) If the vmpro appliance name and IP address are not resolved through DNS, update the Windows hosts file to include the IP address

More information

Table of Contents. Tutorial

Table of Contents. Tutorial Copyright Notice All information contained in this document is the property of ETL Solutions Limited. The information contained in this document is subject to change without notice and does not constitute

More information

Mission Guide: GUI Windows

Mission Guide: GUI Windows Mission Guide: GUI Windows Your Mission: Use F-Response to connect to a remote Windows machine Using F-Response to connect to a remote Windows machine and access one or more targets Step 1: Open and start

More information

Configuring Management Access

Configuring Management Access 37 CHAPTER This chapter describes how to access the ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, how to create login banners, and how

More information

WhatsUp Gold Failover Manager for WhatsUp Gold v16.1 Deployment and User Guide

WhatsUp Gold Failover Manager for WhatsUp Gold v16.1 Deployment and User Guide WhatsUp Gold Failover Manager for WhatsUp Gold v16.1 Deployment and User Guide Contents Using the WhatsUp Gold Failover Manager About this guide... 1 About the WhatsUp Gold Failover Manager... 1 System

More information

Installing or Upgrading ANM Virtual Appliance

Installing or Upgrading ANM Virtual Appliance CHAPTER 2 This chapter describes how to deploy Cisco ANM Virtual Appliance 4.3 (new installation) and how to upgrade from ANM software version 4.1 or 4.2 to software version 4.3. This chapter includes

More information

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6 Gateway Installation and Configuration Guide for On-Premises Version 17 September 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites...

More information

Acronis Backup plugin for WHM & cpanel 1.0

Acronis Backup plugin for WHM & cpanel 1.0 Acronis Backup plugin for WHM & cpanel 1.0 ADMINISTRATOR S GUIDE Revision: 7/18/2017 Table of contents 1 Introduction...3 2 System requirements...3 3 Obtaining the Acronis product...4 4 Installing the

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.8 April 2017 Last modified: July 17, 2017 2017 Nasuni Corporation All Rights Reserved Document Information Testing Disaster

More information

MAC Address Filtering Setup (3G18Wn)

MAC Address Filtering Setup (3G18Wn) MAC Address Filtering Setup (3G18Wn) MAC Address Filtering MAC address filtering refers to the process of allowing (or denying) access to your wireless network based on the hardware address of the device

More information

How do I perform a backup and restore from a NOKIA IP VPN 10i to another NOKIA IP VPN 10i in the event of a hardware failure?

How do I perform a backup and restore from a NOKIA IP VPN 10i to another NOKIA IP VPN 10i in the event of a hardware failure? BACKUP AND RESTORE 1 (14) How do I perform a backup and restore from a NOKIA IP VPN 10i to another NOKIA IP VPN 10i in the event of a hardware failure? This document will demonstrate the backup process

More information

Upgrade Tool Guide. July

Upgrade Tool Guide. July Upgrade Tool Guide July 2015 http://www.liveaction.com 4.X to 5.0 The Upgrade Guide from 4.X to 5.0 consists of three parts: Upgrading the LiveAction Server Upgrading the LiveAction Node Upgrading the

More information

VPN Console: Monitoring Menu

VPN Console: Monitoring Menu CHAPTER 8 This chapter provides an explanation of collection tasks and reports categorized under the Monitoring menu option, as follows: Collect Router Configuration Files, page 8-2 Collect VPN Accounting

More information

Disaster Recovery System

Disaster Recovery System Backup and Restore Overview, on page 1 Backup Prerequisites, on page 1 Backup Taskflow, on page 3 Backup and Restore Overview The (DRS) provides full data backup for all servers in a Cisco Unified Intelligence

More information

VSB Backup and Recovery

VSB Backup and Recovery CHAPTER 6 This chapter describes how to backup and recover a VSB, and includes the following sections: Information About, page 6-1 Guidelines and Limitations, page 6-1 Configuring VSB Backup and Restoration,

More information

Installation Considerations: Included: Not Included:

Installation Considerations: Included: Not Included: Installation Considerations: See the Setup Guide for any details related to the steps in this guide; such as power requirements, rack mounting considerations, and other more in-depth instructions. The

More information

Windows Backup Server Installation

Windows Backup Server Installation Windows Backup Server Installation VEMBU TECHNOLOGIES www.vembu.com TRUSTED BY OVER 60,000 BUSINESSES Windows Backup Server Installation Vembu BDR Server is currently supported for below versions of Windows

More information

Installing AX Server with PostgreSQL (multi-server)

Installing AX Server with PostgreSQL (multi-server) Installing AX Server with PostgreSQL (multi-server) Version: 13 Published: Wednesday, November 29, 2017 ACL Services Ltd. 2017 Table of contents Table of contents Table of contents 3 Introduction 7 Intended

More information

Backup and Restore. About Backup and Restore

Backup and Restore. About Backup and Restore About, page 1 Back Up DNA Center, page 2 Restore DNA Center, page 4 Schedule a Backup, page 5 About The backup and restore procedures for DNA Center can be used for the following purposes: To create backup

More information

Installation Guide. Cimatron Site Manager 2.0 Release Note

Installation Guide. Cimatron Site Manager 2.0 Release Note Installation Guide Cimatron Site Manager 2.0 Release Note Installation Guide i Table of Contents Introduction... 1 Cimatron Site Manager Components... 2 Installation... 3 Hardware Requirements... 3 Software

More information

Configuring the SMA 500v Virtual Appliance

Configuring the SMA 500v Virtual Appliance Using the SMA 500v Virtual Appliance Configuring the SMA 500v Virtual Appliance Registering Your Appliance Using the 30-day Trial Version Upgrading Your Appliance Configuring the SMA 500v Virtual Appliance

More information

Avalanche Remote Control User Guide. Version 4.1

Avalanche Remote Control User Guide. Version 4.1 Avalanche Remote Control User Guide Version 4.1 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

Working with Configuration Files

Working with Configuration Files This chapter contains the following sections: Finding Feature Information, page 1 Information About Configuration Files, page 1 Licensing Requirements for Configuration Files, page 2 Managing Configuration

More information

Using the SSM Administration Console

Using the SSM Administration Console CHAPTER 6 Your user role controls whether you can access the SSM Administration Console. The following information is included in this section: SSM Administration Console Overview, page 6-1 Launching the

More information

QUICK START GUIDE Cisco Virtual Network Management Center 2.0 Quick Start Guide

QUICK START GUIDE Cisco Virtual Network Management Center 2.0 Quick Start Guide QUICK START GUIDE Cisco Virtual Network Management Center 2.0 Quick Start Guide 1 Preface 2 Installation Prerequisites 3 Installing VNMC 4 Configuring VNMC 5 Troubleshooting VNMC Installation and Configuration

More information

Hotfix 913CDD03 Visual Data Explorer and SAS Web OLAP Viewer for Java

Hotfix 913CDD03 Visual Data Explorer and SAS Web OLAP Viewer for Java Hotfix 913CDD03 Visual Data Explorer and SAS Web OLAP Viewer for Java BEFORE DOWNLOADING: The hot fix 913CDD03 addresses issue(s) in 9.1.3 of Component Design and Development Components on Windows as documented

More information

Backing Up and Restoring Data

Backing Up and Restoring Data Backing Up and Restoring Data Last Updated: July 25, 2006 Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco

More information

Quick Setup Guide. 2 System requirements and licensing

Quick Setup Guide. 2 System requirements and licensing Kerio Control Virtual Appliance for Hyper-V Quick Setup Guide This document provides detailed description on installation and basic configuration of the Kerio Control Virtual Appliance for Hyper-V, version

More information

Setting Up the Dell DR Series System as an NFS Target on Amanda Enterprise 3.3.5

Setting Up the Dell DR Series System as an NFS Target on Amanda Enterprise 3.3.5 Setting Up the Dell DR Series System as an NFS Target on Amanda Enterprise 3.3.5 Dell Engineering September 2015 A Dell Technical White Paper Revisions Date June 2015 September 2015 Description Initial

More information

Backup the System. Backup Overview. Backup Prerequisites

Backup the System. Backup Overview. Backup Prerequisites Backup Overview Backup Overview, on page 1 Backup Prerequisites, on page 1 Backup Task Flow, on page 2 Backup Interactions and Restrictions, on page 7 Cisco recommends performing regular backups. You can

More information

Setting Up the DR Series System as an NFS Target on Amanda Enterprise 3.3.5

Setting Up the DR Series System as an NFS Target on Amanda Enterprise 3.3.5 Setting Up the DR Series System as an NFS Target on Amanda Enterprise 3.3.5 Dell Engineering November 2016 A Quest Technical White Paper Revisions Date June 2015 November 2016 Description Initial release

More information

BLUEPRINT TEAM REPOSITORY. For Requirements Center & Requirements Center Test Definition

BLUEPRINT TEAM REPOSITORY. For Requirements Center & Requirements Center Test Definition BLUEPRINT TEAM REPOSITORY Installation Guide for Windows For Requirements Center & Requirements Center Test Definition Table Of Contents Contents Table of Contents Getting Started... 3 About the Blueprint

More information

PROXY Pro Deployment Tool v10.0. User Guide October 2017

PROXY Pro Deployment Tool v10.0. User Guide October 2017 PROXY Pro Deployment Tool v10.0 User Guide October 2017 Table of contents 1. System Requirements...3 2. Target Computer Requirements...4 3. Deployment Tool Operation...5 3.1 Loading a Host Install File...6

More information

CKHS VPN Connection Instructions

CKHS VPN Connection Instructions CKHS VPN Connection Instructions This document provides all authorized colleagues with instruction for accessing the CKHS network via a Virtual Private Network. Connection Prerequisites: 1. Operating System:

More information

Configuring ILMT/TAD4d security to use Active Directory.

Configuring ILMT/TAD4d security to use Active Directory. Configuring ILMT/TAD4d security to use Active Directory. Warning: Please bear in mind that this is a technical note, and it is not a part of the official documentation. The described procedure may work

More information

LiveNX Upgrade Guide from v5.1.2 to v Windows

LiveNX Upgrade Guide from v5.1.2 to v Windows LIVEACTION, INC. LiveNX Upgrade Guide from v5.1.2 to v5.1.3 - Windows UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the

More information

User Administration Vaultview Security

User Administration Vaultview Security User Administration Vaultview Security User Administration using Vaultview Security allows Vaultview Administrators to define Roles and Permissions within Vaultview to grant users access to functions and

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Installation Considerations: Included: Not Included:

Installation Considerations: Included: Not Included: Installation Considerations: See the Setup Guide for any details related to the steps in this guide; such as power requirements, rack mounting considerations, and other more in-depth instructions. The

More information

Using ANM With Virtual Data Centers

Using ANM With Virtual Data Centers APPENDIXB Date: 3/8/10 This appendix describes how to integrate ANM with VMware vcenter Server, which is a third-party product for creating and managing virtual data centers. Using VMware vsphere Client,

More information

Oracle Collaboration Suite

Oracle Collaboration Suite Oracle Collaboration Suite Quick Installation Guide Release 2 (9.0.4.1) for hp-ux PA-RISC (64-bit), Linux x86, and Solaris Operating Environment (SPARC 32-bit) September 2003 Part No. B10885-02 This document

More information

Backing Up and Restoring the Configuration

Backing Up and Restoring the Configuration Backing Up and Restoring the Configuration This chapter includes the following sections: Backup and Export Configuration, page 1 Backup Types, page 1 Considerations and Recommendations for Backup Operations,

More information

Configuring the Cisco VPN 3000 Concentrator with MS RADIUS

Configuring the Cisco VPN 3000 Concentrator with MS RADIUS Configuring the Cisco VPN 3000 Concentrator with MS RADIUS Document ID: 20585 Contents Introduction Prerequisites Requirements Components Used Conventions Install and Configure the RADIUS Server on Windows

More information

Defining IPsec Networks and Customers

Defining IPsec Networks and Customers CHAPTER 4 Defining the IPsec Network Elements In this product, a VPN network is a unique group of targets; a target can be a member of only one network. Thus, a VPN network allows a provider to partition

More information

Configuring the Cisco Emergency Responder 8.0 Disaster Recovery System

Configuring the Cisco Emergency Responder 8.0 Disaster Recovery System CHAPTER 9 Configuring the Cisco Emergency Responder 8.0 Disaster Recovery System These topics describe how to configure the Cisco Emergency Responder (Cisco ER) 8.0 Disaster Recovery System: What is the

More information

SECURE Gateway with Microsoft Azure Installation Guide. Version Document Revision 1.0

SECURE  Gateway with Microsoft Azure Installation Guide. Version Document Revision 1.0 SECURE Email Gateway with Microsoft Azure Installation Guide Version 4.7.0 Document Revision 1.0 Copyright Revision 1.0, November, 2017 Published by Clearswift Ltd. 1995 2017 Clearswift Ltd. All rights

More information

GSS Administration and Troubleshooting

GSS Administration and Troubleshooting CHAPTER 9 GSS Administration and Troubleshooting This chapter covers the procedures necessary to properly manage and maintain your GSSM and GSS devices, including login security, software upgrades, GSSM

More information

Phone Inventory 1.1 (1012)

Phone Inventory 1.1 (1012) (1012) 2015 VoIP Integration July 28, 2015 Table of Contents Product Overview... 3 Requirements... 3 Application Requirements... 3 Call Manager... 3 Network Connectivity... 3 IP Phones... 3 Installation

More information

upgrade-mp through xlate-bypass Commands

upgrade-mp through xlate-bypass Commands CHAPTER 33 upgrade-mp To upgrade the maintenance partition software, use the upgrade-mp command. upgrade-mp {http[s]://[user:password@]server[:port]/pathname tftp[://server/pathname]} tftp http[s] server

More information

Using the aregcmd Commands

Using the aregcmd Commands CHAPTER 2 This chapter describes how to use each of the aregcmd commands. The Cisco Access Registrar aregcmd command is a command-line based configuration tool. It allows you to set any Cisco Access Registrar

More information

Clientless SSL VPN Troubleshooting

Clientless SSL VPN Troubleshooting Recover from Hosts File Errors When Using Application Access, page 1 WebVPN Conditional Debugging, page 4 Capture Data, page 5 Protect Clientless SSL VPN Session Cookies, page 6 Recover from Hosts File

More information

FIMS V You will need to know all of the following items before customizing the script and setting up the schedule.

FIMS V You will need to know all of the following items before customizing the script and setting up the schedule. Customizing and Using DBbackup.bat Purpose The dbbackup.bat file is provided to allow the customer to schedule a backup of their database using the Windows task scheduler without the need to shut the database

More information

Installing Cisco Broadband Access Center on Linux

Installing Cisco Broadband Access Center on Linux CHAPTER 4 Installing Cisco Broadband Access Center on Linux This chapter explains the procedure and sequence of event for a successful installation of Cisco Broadband Access Center (Cisco BAC) on Linux

More information

NetExtender for SSL-VPN

NetExtender for SSL-VPN NetExtender for SSL-VPN Document Scope This document describes how to plan, design, implement, and manage the NetExtender feature in a SonicWALL SSL-VPN Environment. This document contains the following

More information

Installing or Upgrading the Cisco Nexus Data Broker Software in Centralized Mode

Installing or Upgrading the Cisco Nexus Data Broker Software in Centralized Mode Installing or Upgrading the Cisco Nexus Data Broker Software in Centralized Mode This chapter contains the following sections: Installing Cisco Nexus Data Broker in Centralized Mode, page 1 Installing

More information

Deploying Cisco Nexus Data Broker

Deploying Cisco Nexus Data Broker This chapter contains the following sections: Installing Cisco Nexus Data Broker, page 1 Installing Cisco Nexus Data Broker Installing or Upgrading the Cisco Nexus Data Broker Software Important There

More information

LiveNX Upgrade Guide from v5.2.0 to v5.2.1

LiveNX Upgrade Guide from v5.2.0 to v5.2.1 LIVEACTION, INC. LiveNX Upgrade Guide from v5.2.0 to v5.2.1 UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the LiveAction

More information

CDP Data Center Console User Guide CDP Data Center Console User Guide Version

CDP Data Center Console User Guide CDP Data Center Console User Guide Version CDP Data Center Console User Guide CDP Data Center Console User Guide Version 3.18.2 1 README FIRST Welcome to the R1Soft CDP Data Center Console User Guide The purpose of this manual is to provide you

More information

Red Hat Enterprise Linux 7 Getting Started with Cockpit

Red Hat Enterprise Linux 7 Getting Started with Cockpit Red Hat Enterprise Linux 7 Getting Started with Cockpit Getting Started with Cockpit Red Hat Enterprise Linux Documentation Team Red Hat Enterprise Linux 7 Getting Started with Cockpit Getting Started

More information

OpenGeo Suite for Windows Release 3.0.1

OpenGeo Suite for Windows Release 3.0.1 OpenGeo Suite for Windows Release 3.0.1 OpenGeo February 04, 2013 Contents 1 Prerequisites i 2 New Installation i 3 Upgrading vi 3.1 Upgrading from version 2.x to 3.x....................................

More information

Configuration Note. AudioCodes One Voice for Microsoft Skype for Business. CloudBond 365. Backup and Restore Functionality. Version 9.

Configuration Note. AudioCodes One Voice for Microsoft Skype for Business. CloudBond 365. Backup and Restore Functionality. Version 9. 7 Configuration Note AudioCodes One Voice for Microsoft Skype for Business CloudBond 365 Backup and Restore Functionality Version 9.5 Update 4 Configuration Note Contents Table of Contents 1 Introduction...

More information

Perceptive Interact for EpicCare Link

Perceptive Interact for EpicCare Link Perceptive Interact for EpicCare Link Installation and Setup Guide Version: 2.1.x Written by: Product Knowledge, R&D Date: July 2018 Copyright 2014-2018 Hyland Software, Inc. and its affiliates. Table

More information

VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database

VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database For multiple versions Have documentation feedback? Submit a Documentation Feedback support ticket using

More information

MMS Backup Manual Release 1.4

MMS Backup Manual Release 1.4 MMS Backup Manual Release 1.4 MongoDB, Inc. Jun 27, 2018 MongoDB, Inc. 2008-2016 2 Contents 1 Getting Started with MMS Backup 4 1.1 Backing up Clusters with Authentication.................................

More information

Using Secondary ehealth Consoles

Using Secondary ehealth Consoles Using Secondary ehealth Consoles If you have several ehealth administrators at your site, each administrator can use an ehealth console to perform administrative tasks. The primary ehealth console and

More information

Installation Instructions for SAS Activity-Based Management 6.2

Installation Instructions for SAS Activity-Based Management 6.2 Installation Instructions for SAS Activity-Based Management 6.2 Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Installation Instructions for SAS

More information

Configuring and Monitoring the GeoDB

Configuring and Monitoring the GeoDB CHAPTER 8 This chapter describes how to implement the GeoIP database (GeoDB) proximity computation mechanism in GSS. From the latitudinal and longitudinal information in the GeoDB, GSS decides the proximity,

More information

A QUICK GUIDE TO THE NEW AND UPDATED FUNCTIONS AVAILABLE

A QUICK GUIDE TO THE NEW AND UPDATED FUNCTIONS AVAILABLE NS AVAILABLE e@syfile EMPLOYER A QUICK 2012 GUID A QUICK GUIDE TO THE NEW AND UPDATED FUNCTIONS AVAILABLE e@syfile EMPLOYER 2 APRIL 2012 I NS AVAILABLE e@syfile EMPLOYER A QUICK GUID 2012 A QUICK GUIDE

More information

Command-Line Interface Command Summary

Command-Line Interface Command Summary CHAPTER 1 Command-Line Interface Command Summary This chapter provides a summary of the command-line interface (CLI) commands included in the Cisco Global Site Selector (GSS) software. The command summary

More information

Server Automation. Software Version: Install Guide

Server Automation. Software Version: Install Guide Server Automation Software Version: 10.50 Install Guide Document Release Date: July, 2016 Software Release Date: July, 2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise products

More information

Using Virtualization Environments to Support Migration to SAS 9.2

Using Virtualization Environments to Support Migration to SAS 9.2 WHITE PAPER Using Virtualization Environments to Support Migration to SAS 9.2 Scenario: AIX 5.3 environment with WebSphere 6.1 Table of Contents Abstract... 1 Introduction... 1 Overview of migration environment...

More information

Ahsay Online Backup. MS Exchange Mail Level Backup

Ahsay Online Backup. MS Exchange Mail Level Backup Version 5.1 May 2006 Table of Content 1 Introduction...3 2 How To - Backup Individual Emails...3 2.1 Granting Full Mailbox Access Privileges...3 2.1.1 For one specific mailbox...3 2.1.2 For mailboxes located

More information

CPM Quick Start Guide V2.2.0

CPM Quick Start Guide V2.2.0 CPM Quick Start Guide V2.2.0 1 Content 1 Introduction... 3 1.1 Launching the instance... 3 1.2 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 3 3 Creating a Simple Backup

More information

Configuring Symantec Protection Engine for Network Attached Storage. Dell FluidFS 5.0

Configuring Symantec Protection Engine for Network Attached Storage. Dell FluidFS 5.0 Configuring Symantec Protection Engine for Network Attached Storage Dell FluidFS 5.0 Contents Abstract... 2 About software component... 2 How does FluidFS antivirus protect data on FluidFS cluster... 2

More information

5/20/2007. Touring Essential Programs

5/20/2007. Touring Essential Programs Touring Essential Programs Employing fundamental utilities. Managing input and output. Using special characters in the command-line. Managing user environment. Surveying elements of a functioning system.

More information

A. INSTALLATION OF THE CLIENT SOFTWARE B. CONFIGURATION OF THE CLIENT SOFTWARE NETWORKS AND COMMUNICATIONS SECTOR, 2011

A. INSTALLATION OF THE CLIENT SOFTWARE B. CONFIGURATION OF THE CLIENT SOFTWARE NETWORKS AND COMMUNICATIONS SECTOR, 2011 INFORMATION SYSTEMS SERVICEE NETWORKS AND COMMUNICATIONS SECTOR VPN Remote Accesss Installation and Configuration Guide Operating System: Windows 7 ΥΠΣ ΕΔ/50 August 12 th, 2011 A. INSTALLATION OF THE CLIENT

More information

Table of Contents DATA MANAGEMENT TOOLS 4. IMPORT WIZARD 6 Setting Import File Format (Step 1) 7 Setting Source File Name (Step 2) 8

Table of Contents DATA MANAGEMENT TOOLS 4. IMPORT WIZARD 6 Setting Import File Format (Step 1) 7 Setting Source File Name (Step 2) 8 Data Management Tools 1 Table of Contents DATA MANAGEMENT TOOLS 4 IMPORT WIZARD 6 Setting Import File Format (Step 1) 7 Setting Source File Name (Step 2) 8 Importing ODBC Data (Step 2) 10 Importing MSSQL

More information

1 Login AppServ Hosting Control System

1 Login AppServ Hosting Control System Login -1- AppServ Hosting Control System 1. /vhcs2 Control System http://www.yourdomainname.com/vhcs2 2. Username Login appservhosting.com 3. Password Login 4. AppServ Hosting Control System 1 Login AppServ

More information

American Dynamics RAID Storage System iscsi Software User s Manual

American Dynamics RAID Storage System iscsi Software User s Manual American Dynamics RAID Storage System iscsi Software User s Manual Release v2.0 April 2006 # /tmp/hello Hello, World! 3 + 4 = 7 How to Contact American Dynamics American Dynamics (800) 507-6268 or (561)

More information

Online Help StruxureWare Data Center Expert

Online Help StruxureWare Data Center Expert Online Help StruxureWare Data Center Expert Version 7.2.7 What's New in StruxureWare Data Center Expert 7.2.x Learn more about the new features available in the StruxureWare Data Center Expert 7.2.x release.

More information

F-Secure SSH and OpenSHH. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

F-Secure SSH and OpenSHH. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved F-Secure SSH and OpenSHH VPN Authentication Configuration Guide Copyright 2005 CRYPTOCard Corporation All Rights Reserved http://www.cryptocard.com Overview OpenSSH works with CRYPTOCard PAM authentication

More information

Virtual Appliance User s Guide

Virtual Appliance User s Guide Cast Iron Integration Appliance Virtual Appliance User s Guide Version 4.5 July 2009 Cast Iron Virtual Appliance User s Guide Version 4.5 July 2009 Copyright 2009 Cast Iron Systems. All rights reserved.

More information

Microsoft Unified Access Gateway 2010

Microsoft Unified Access Gateway 2010 RSA SecurID Ready Implementation Guide Partner Information Last Modified: March 26, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description Microsoft www.microsoft.com

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:

More information

Borland Search 2009 Administration Guide. StarTeam and CaliberRM

Borland Search 2009 Administration Guide. StarTeam and CaliberRM Borland Search 2009 Administration Guide StarTeam and CaliberRM Borland Software Corporation 8310 N Capital of Texas Hwy Bldg 2, Ste 100 Austin, Texas 78731 http://www.borland.com Borland Software Corporation

More information

Link Gateway Initial Configuration Manual

Link Gateway Initial Configuration Manual Link Gateway Initial Configuration Manual Copyright 2016 NetLinkz. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization

More information