Avaya R3.0 manual Avaya Inc. All Rights Reserved, Email totalware@gwsmail.com

Page 2

© 2005 Avaya Inc. All Rights Reserved.

Notice

While reasonable efforts were made to ensure that the information in this document was complete and accurate at the time of printing, Avaya Inc. can assume no liability for any errors. Changes and corrections to the information in this document may be incorporated in future releases.

Documentation disclaimer

Avaya Inc. is not responsible for any modifications, additions, or deletions to the original published version of this documentation unless such modifications, additions, or deletions were performed by Avaya.

Link disclaimer

Avaya Inc. is not responsible for the contents or reliability of any linked Web sites referenced elsewhere within this Documentation, and Avaya does not necessarily endorse the products, services, or information described or offered within them. We cannot guarantee that these links will work all of the time and we have no control over the availability of the linked pages.

License

USE OR INSTALLATION OF THE PRODUCT INDICATES THE END USER’S ACCEPTANCE OF THE TERMS SET FORTH HEREIN AND THE GENERAL LICENSE TERMS AVAILABLE ON THE AVAYA WEBSITE AT http://support.avaya.com/LicenseInfo/ (“GENERAL

LICENSE TERMS”). IF YOU DO NOT WISH TO BE BOUND BY THESE TERMS, YOU MUST RETURN THE PRODUCT(S) TO THE POINT OF PURCHASE WITHIN TEN (10) DAYS OF DELIVERY FOR A REFUND OR CREDIT.

Avaya grants End User a license within the scope of the license types described below. The applicable number of licenses and units of capacity for which the license is granted will be one (1), unless a different number of licenses or units of capacity is specified in the Documentation or other materials available to End User. “Designated Processor” means a single stand-alone computing device. “Server” means a Designated Processor that hosts a software application to be accessed by multiple users. “Software” means the computer programs in object code, originally licensed by Avaya and ultimately utilized by End User, whether as stand- alone Products or pre-installed on Hardware. “Hardware” means the standard hardware Products, originally sold by Avaya and ultimately utilized by End User.

License Type(s): Designated System(s) License (DS).

End User may install and use each copy of the Software on only one Designated Processor, unless a different number of Designated Processors is indicated in the Documentation or other materials available to End User. Avaya may require the Designated Processor(s) to be identified by type, serial number, feature key, location or other specific designation, or to be provided by End User to Avaya through electronic means established by Avaya specifically for this purpose.

Shrinkwrap License (SR)

With respect to Software that contains elements provided by third party suppliers, End user may install and use the Software in accordance with the terms and conditions of the “shrinkwrap” or “clickwrap” license accompanying the Software (“Shrinkwrap License”). The text of the Shrinkwrap License will be available from Avaya upon End User’s request (see “Copyright” below for more information).

Copyright

Except where expressly stated otherwise, the Product is protected by copyright and other laws respecting proprietary rights. Unauthorized reproduction, transfer, and or use can be a criminal, as well as a civil, offense under the applicable law.

Third-party Components

Certain software programs or portions thereof included in the Product may contain software distributed under third party agreements (“Third Party Components”), which may contain terms that expand or limit rights to use certain portions of the Product (“Third Party Terms”). Information identifying Third Party Components and the Third Party Terms that apply to them is available on Avaya’s web site at: http://support.avaya.com/LicenseInfo/

Avaya fraud intervention

If you suspect that you are being victimized by toll fraud and you need technical assistance or support, call Technical Service Center Toll Fraud Intervention Hotline at +1-800-643-2353 for the United States and Canada. Suspected security vulnerabilities with Avaya Products should be reported to Avaya by sending mail to: securityalerts@avaya.com.

For additional support telephone numbers, see the Avaya Web site: http://www.avaya.com/support

Trademarks

Avaya is a trademark of Avaya Inc.

All non-Avaya trademarks are the property of their respective owners.

Document ordering information:

Avaya Publications Center

Voice: +1-207-866-6701

1-800-457-1764 (Toll-free, U.S. and Canada only)

Fax: +1-207-626-7269

1-800-457-1764 (Toll-free, U.S. and Canada only)

Write: Globalware Solutions

200 Ward Hill Avenue

Haverhill, MA 01835 USA

Attention: Avaya Account Manager

Web: http://www.avaya.com/support

Email: totalware@gwsmail.com

Order: Document No. 19-300174, Issue 6.0 August 2005

For the most current versions of documentation, go to the Avaya support Web site:

http://www.avaya.com/support

Avaya Support

Avaya provides a telephone number for you to use to report problems or to ask questions about your contact center. The support telephone number is 1 800 242 2121 in the United States. For additional support telephone numbers, see the Avaya Web site:

http://www.avaya.com/support

© 2005 Avaya Inc. All rights reserved. Last modified August, 2005.

Image 2
Contents in support of the Secure Access and Control Offer SAC R3.0 Secure Services Gateway SSGMaintenance Guide 19-300174 Issue 6 August2005 Avaya Inc. All Rights Reserved Email totalware@gwsmail.comChapter 5 Operating System Recovery Chapter 1 Maintenance OverviewChapter 2 Hardware Upgrade and Maintenance Chapter 3 Server Initialization and ShutdownContents Chapter 6 SSG Configuration Backup and RestoreIndex 4 Secure Services Gateway SSG Maintenance GuideOverview Chapter 1 Maintenance OverviewChapter contents Overview Related resources Linux operating system manualsTable 1 Related Resources ContentRelated resources Document TitleTable 1 Related Resources continued 2 ofLinux operating system manuals 3. Under the column Support Resources, go to DocumentationInstallation guidelines Removing the cover of the x305 IBM server Chapter 2 Hardware Upgrade and MaintenanceInstallation guidelines In this chapterSystem reliability guidelines Handling static sensitive devicesGeneral safety guidelines Replacing the hard drive in an x306 IBM server Replacing the hard driveReplacing the hard drive in an x305 IBM server Description Tasks to replace the hard driveTask 4 Replace the hard drive. x305 see Replacing the hard drive in anReplacing the hard drive in an x305 IBM server 3. Installing the new hard drive in the x305 IBM serverRead General safety guidelines and Handling static sensitive devices Removing the cover of the x305 IBM serverFigure 1 Captive screws on cover Removing the hard drive from the x305 IBM server Figure 2 Removing and replacing the drive cageInstalling the new hard drive in the x305 IBM server Replacing the cover of the x305 IBM serverReplacing the hard drive in an x306 IBM server 2. Installing the new hard drive in the x306 IBM serverFigure 3 Removing and installing the hard drive Removing the hard drive from the x306 IBM serverInstalling the new hard drive in the x306 IBM server Replacing the x305 IBM server’s RSAReplacing the server’s dual NIC 20 Secure Services Gateway SSG Maintenance GuideServer initialization System shutdown Chapter 3 Server Initialization and ShutdownServer initialization System shutdown Monitoring system processes Chapter 4 Operating System MonitoringGathering system information Gathering system information Monitoring system processesTable 3 Interactive Commands Command Description Memory usageSpace used by files in a directory File systemsVirtual memory Additional resources Root password Chapter 5 Operating System RecoveryHardware/software problems Hardware/software problems Booting into single-user modeBooting into rescue mode linux rescuemount -t ext3 /dev/hda5 /foo sh-2.05b#chroot /mnt/sysimage fdisk -l oneBooting into single-user mode Booting into emergency mode 32 Secure Services Gateway SSG Maintenance Guide Backing up the SSG configuration Restoring the SSG configuration Chapter 6 SSG Configuration Backup and RestoreBacking up the SSG configuration 34 Secure Services Gateway SSG Maintenance Guide Figure 4 Edit Backup Scheduler Configuration PageSSG Configuration Backup and Restore 6. Click Save Changes a. mkdir tempdir b. cd tempdir Restoring the SSG configurationpgrestore -v -p 6543 -d avssgdb -a -Ft --no-owner dbdumpfilename.tar c. tar zfx ~/SSG-Product Id-Date-Time.tgzIndex Index38 Secure Services Gateway SSG Maintenance Guide