Avaya R3.0 manual Booting into single-user mode

Page 30
Booting into single-user mode

Operating System Recovery

Booting into single-user mode

The advantage of single-user mode is that you do not need a boot diskette or CD-ROM. However, it does not give you the option to

mount the file systems as read-only or

not mount them at all.

If your system boots, but does not allow you to log in when it has completed booting, try single-user

mode. In single-user mode, your computer boots to runlevel 1. Your local file systems are mounted, but your network is not activated. You have a usable system maintenance shell. Unlike rescue mode, single-user mode automatically tries to mount your file system.

!Manual background CAUTION:

Do not use single-user mode if your file system cannot be mounted successfully. You cannot use single-user mode if the runlevel 1 configuration on your system is corrupted.

On an x305 IBM Server system using GRUB as the boot loader, use the following steps to boot into single-user mode:

1.If you have a GRUB password configured, type p and enter the password.

2.Select Red Hat Enterprise Linux with the version of the kernel that you wish to boot and type a to append the line.

3.Go to the end of the line and type single as a separate word. Press [Enter] to exit edit mode.

Manual background Tip:

Press the [Spacebar] and then type single.

4.Back at the GRUB screen, type b to boot into single-user mode.

-On an x305 IBM Server system using LILO as the boot loader, at the LILO boot prompt, type: linux single

Note:

If you are using the graphical LILO, press Ctrl-xto exit the graphical screen and go to the boot: prompt.

- For all other platforms, specify single as a kernel parameter at the boot prompt.

30 Secure Services Gateway (SSG) Maintenance Guide

Image 30
Contents in support of the Secure Access and Control Offer SAC R3.0 Secure Services Gateway SSGMaintenance Guide 19-300174 Issue 6 August2005 Avaya Inc. All Rights Reserved Email totalware@gwsmail.comChapter 5 Operating System Recovery Chapter 1 Maintenance OverviewChapter 2 Hardware Upgrade and Maintenance Chapter 3 Server Initialization and ShutdownContents Chapter 6 SSG Configuration Backup and RestoreIndex 4 Secure Services Gateway SSG Maintenance GuideOverview Chapter 1 Maintenance OverviewChapter contents Overview Related resources Linux operating system manualsTable 1 Related Resources ContentRelated resources Document TitleTable 1 Related Resources continued 2 ofLinux operating system manuals 3. Under the column Support Resources, go to DocumentationInstallation guidelines Removing the cover of the x305 IBM server Chapter 2 Hardware Upgrade and MaintenanceInstallation guidelines In this chapterSystem reliability guidelines Handling static sensitive devicesGeneral safety guidelines Replacing the hard drive Replacing the hard drive in an x305 IBM serverReplacing the hard drive in an x306 IBM server Description Tasks to replace the hard driveTask 4 Replace the hard drive. x305 see Replacing the hard drive in anReplacing the hard drive in an x305 IBM server 3. Installing the new hard drive in the x305 IBM serverRead General safety guidelines and Handling static sensitive devices Removing the cover of the x305 IBM serverFigure 1 Captive screws on cover Removing the hard drive from the x305 IBM server Figure 2 Removing and replacing the drive cageInstalling the new hard drive in the x305 IBM server Replacing the cover of the x305 IBM serverReplacing the hard drive in an x306 IBM server 2. Installing the new hard drive in the x306 IBM serverFigure 3 Removing and installing the hard drive Removing the hard drive from the x306 IBM serverInstalling the new hard drive in the x306 IBM server Replacing the x305 IBM server’s RSAReplacing the server’s dual NIC 20 Secure Services Gateway SSG Maintenance GuideChapter 3 Server Initialization and Shutdown Server initializationServer initialization System shutdown System shutdown Monitoring system processes Chapter 4 Operating System MonitoringGathering system information Gathering system information Monitoring system processesTable 3 Interactive Commands Command Description Memory usageFile systems Virtual memorySpace used by files in a directory Additional resources Root password Chapter 5 Operating System RecoveryHardware/software problems Hardware/software problems Booting into single-user modeBooting into rescue mode linux rescuemount -t ext3 /dev/hda5 /foo sh-2.05b#chroot /mnt/sysimage fdisk -l oneBooting into single-user mode Booting into emergency mode 32 Secure Services Gateway SSG Maintenance Guide Chapter 6 SSG Configuration Backup and Restore Backing up the SSG configurationBacking up the SSG configuration Restoring the SSG configuration Figure 4 Edit Backup Scheduler Configuration Page SSG Configuration Backup and Restore34 Secure Services Gateway SSG Maintenance Guide 6. Click Save Changes a. mkdir tempdir b. cd tempdir Restoring the SSG configurationpgrestore -v -p 6543 -d avssgdb -a -Ft --no-owner dbdumpfilename.tar c. tar zfx ~/SSG-Product Id-Date-Time.tgzIndex Index38 Secure Services Gateway SSG Maintenance Guide