Cisco Systems MGC Node Manager manual To Update Existing SSH-Enabled Network Elements

Page 24

Chapter 2 Installing Cisco MGC Node Manager

Performing a New Installation of the Cisco MGC Node Manager

Getting Started with Secure Communications on Cisco MGC Node Manager

This section describes how to enable secure communications on network devices managed with Cisco MGC Node Manager.

Before you begin: You must have installed the Cisco EMF strong cryptographic add-on package in Task 8 and you must know the security policy for the elements you are enabling. (Secure communications are enabled on the network elements directly, not using Cisco MGC Node Manager. See the component SSH installation documentation, such as http://www.cisco.com/univercd/cc/td/doc/product/access/sc/rel9/mgcfm/941fm/ for the Cisco PGW 2200 Release 9.5(2).) You do not need to know the specific SSH version; Cisco MGC Node Manager automatically negotiates the correct SSH version, SSH 2 if available or SSH 1.x..

Do you have existing (already deployed in Cisco MGC Node Manager) network elements that are now SSH-enabled? See “To Update Existing SSH-Enabled Network Elements” section on page 2-14.

Do you want to deploy new network elements that are SSH-enabled? See “To Deploy New SSH-Enabled Elements” section on page 2-14.

To Update Existing SSH-Enabled Network Elements

Use this procedure to set SSH as the security policy for network elements that are already deployed and have SSH enabled.

Step 1 In the Map Viewer, select the SSH-enabled element you want to update.

Step 2 Right-click and choose Tools > Accounts. The Accounts dialog box appears.

Step 3 For Security Policy, select SSH. (None is the default.)

Step 4 Click Save.

Step 5 Repeat the above steps for the remaining SSH-enabled elements.

To Deploy New SSH-Enabled Elements

Use this procedure to deploy new elements that have been SSH-enabled.

Step 1 In the Deployment Wizard template, for Security Policy select SSH. Enter other information as usual.

Step 2 Click Finish.

Cisco MGC Node Manager discovers the element using the appropriate SSH protocol. Non-SNMP communication with the element will now use SSH secure utilities.

To Identify SSH-Enabled Elements

You can identify whether an element uses SSH by checking the Security Policy in its Accounts dialog box.

Installation Guide for the Cisco MGC Node Manager 2.5(2)

2-14

OL-4062-02

 

 

Image 24
Contents Installation Guide for the Cisco MGC Node Manager Corporate HeadquartersInstallation Guide for the Cisco MGC Node Manager N T E N T S Creating an Xdmcp Connection Installation Overview and Planning Who Should Install Cisco MGC Node Manager?Determine Your Hardware Requirements Supported Configurations Standalone and Distributed ConfigurationsHardware Requirements Disk Drives and Database StorageSmall Network Medium Network1 Large Network Operators Nodes Trap / min Traps / minInstallation Checklist OL-4062-02 Installation Software Before you beginRequired Information Terminal SoftwareInformation Where To Find It Value HostnameHost ID IP addressVersion Where To Check for Upgrades Task 3 Plan and Execute Hard Drive PartitioningSetting Up IP and Remote User Access Information Task 5 Obtain a Cisco EMF LicenseTask 6 Make System Modifications Task 7 Install CiscoView File ModificationTask 8 Install Cisco EMF Installing Cisco EMF PatchesCemf install -show About Client Workstation SoftwareInstalling the Cisco EMF SSH Add-On Package Starting Cisco EMFCemf start Installing Cisco MGC Node Manager Verifying the Installation Verifying Element ManagersPkginfo CSCOcmnm Cisco EMF Basedir/bin/cmnmversion -verbosePatch Verifying the Installation of CiscoView CmnmupdateCVip -sStarting Cisco MGC Node Manager To Update Existing SSH-Enabled Network Elements Task 10. Install the CiscoView Security Module Creating an Xdmcp Connection Creating a Workstation Connection#cd /opt/cemf/bin #./cemf sessionTask 13 Configure Network Devices to Forward Alarms Fixing the Insufficient Colors ProblemTask 12. Synchronize Time Enter ./installCSCOcmnm -upgrade Root 363 1 0 May 23 ? 001 /usr/sbin/voldBacking Up Your Databases Verifying Uninstallation of Cisco MGC Node Manager CEMFROOT/uninstall/uninstallCSCOcmnmContinue with CSCOcmnm uninstall y,n,? y Have your databases been backed up y/n n yCemfinstall -remove Cd /opt/CEMFROOT/binRelated Topics Problem Suggested Steps Opt/cemf/bin/cemf updateIP -mOpt/cemf/bin/cemf updateName -m Opt/cemf/bin/cemf stopShtml. For instructions, see Task 4 Ensure That OL-4062-02 D E IN-2 IN-3 IN-4

MGC Node Manager specifications

Cisco Systems MGC (Media Gateway Controller) Node Manager is a vital component in the realm of telecommunications, particularly in the development and management of Voice over IP (VoIP) networks. As a software-based solution, it plays a crucial role in integrating and controlling various media gateways, ensuring efficient handling of voice and multimedia traffic.

One of the main features of the Cisco MGC Node Manager is its ability to provide centralized control and management of media gateways. This centralized approach enables network operators to have a single point of management for multiple gateways, simplifying configuration, monitoring, and troubleshooting processes. The manager can handle thousands of calls simultaneously, making it suitable for both small and large enterprise environments.

In terms of technology, Cisco MGC Node Manager is built on robust protocols like H.323 and SIP (Session Initiation Protocol). These protocols are essential for establishing, maintaining, and terminating communication sessions in VoIP systems. The flexibility to support multiple protocols ensures interoperability among various network components and third-party devices. This cross-compatibility is vital for organizations that use diverse hardware and software solutions.

Another noteworthy characteristic of the MGC Node Manager is its scalability. As business needs grow, the Node Manager can easily scale to accommodate increased traffic and additional gateways. This feature is particularly important for enterprises that experience fluctuating demand, allowing them to adapt to changing usage patterns without investing in significant new infrastructure.

Security is also a prominent focus within the MGC Node Manager’s architecture. By utilizing advanced encryption techniques and implementing robust authentication protocols, it ensures that sensitive voice data remains protected from potential threats. This is critical in maintaining regulatory compliance and safeguarding user privacy.

Furthermore, it offers detailed analytics and reporting capabilities, providing insights into call quality, traffic patterns, and system performance. This data assists network operators in optimizing the network for improved performance and user experience, ultimately supporting business continuity.

In summary, Cisco Systems MGC Node Manager provides a powerful, centralized solution for managing media gateways within VoIP networks. Its support for multiple protocols, scalability, robust security features, and detailed analytics make it an essential tool for organizations looking to enhance their telecommunications infrastructure and drive greater efficiency.