Cisco Systems OL-8155-01 manual Definitions of Service Request Severity, Xvii

Page 17

Preface

Obtaining Technical Assistance

solutions. If your issue is not resolved using the recommended resources, your service request is assigned to a Cisco engineer. The TAC Service Request Tool is located at this URL:

http://www.cisco.com/techsupport/servicerequest

For S1 or S2 service requests or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly.

To open a service request by telephone, use one of the following numbers:

Asia-Pacific: +61 2 8446 7411 (Australia: 1 800 805 227)

EMEA: +32 2 704 55 55

USA: 1 800 553-2447

For a complete list of Cisco TAC contacts, go to this URL:

http://www.cisco.com/techsupport/contacts

Definitions of Service Request Severity

To ensure that all service requests are reported in a standard format, Cisco has established severity definitions.

Severity 1 (S1)—Your network is “down,” or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.

Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your business operation are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.

Severity 3 (S3)—Operational performance of your network is impaired, but most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.

Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.

 

 

Cisco IPICS Server Installation Guide

 

 

 

 

 

 

OL-8155-01

 

 

xvii

 

 

 

Image 17
Contents Release Page Iii N T E N T SManaging Licenses with the Ops Views Feature Upgrading Cisco Ipics Contents Cisco Ipics Server Installation Guide Vii IntroductionAudience Viii OrganizationRelated Documentation Cisco CallManager Documentation Cisco Land Mobile Radio over IP Cisco IP Phone DocumentationCisco Security Agent Cisco IOS DocumentationBoldface font Document Notes and ConventionsCisco.com Obtaining DocumentationProduct Documentation DVD XiiXiii Ordering DocumentationXiv Documentation FeedbackCisco Product Security Overview Obtaining Technical Assistance Reporting Security Problems in Cisco ProductsXvi Submitting a Service RequestCisco Technical Support & Documentation Website Xvii Definitions of Service Request SeverityXviii Obtaining Additional Publications and InformationXix OL-8155-01 Overview Installation OverviewInstallation CD Step Description Cisco Ipics server software Hardware Requirements Installed ComponentsSystem Requirements PMC Requirements Internet Browser Software RequirementsBefore You Begin Installing the Cisco Ipics Server SoftwareObtaining the IP Addresses for Your Cisco Ipics System Preinstallation ChecklistInstalling the Cisco Linux Operating System Procedure Press the Down Arrow key to highlight Virtual Install Disk Overwrite Hard Drive Message Cisco Linux Installing Packages Window Installation Complete Window OL-8155-01 Cisco Linux Welcome Window Date and Time Window Cisco Ipics Server Installation Guide System User Window Additional CDs Window Finish Setup Window Gnome Username Field NIC2 11 Network Device Control Window 12 Network Configuration Window 13 Ethernet Device Window 14 Entering the Static IP Address 15 Entering DNS Information 16 Network Device Control Window Tools Terminal Installing Cisco Ipics Server SoftwareCSA Installing the Cisco Ipics Server Software at the ServerProcedure 18for an example 18 Installer File on the Cisco Ipics CD 19 Run or Display Message Window 20 Introduction in the Installer Window 21 Install Set Window Appendix A, Changing the Cisco Linux Root Password OL-8155-01 23 Preinstallation Summery 24 Cisco Ipics Installation Progress Window 25 Install Complete Window 26 Restart Computer Window Copying the File from the CD Drive in the Server Installing Cisco Ipics from a Remote LocationTransferring the File from the your PC to the Server Root #./name of installer file.bin -i console 27 Starting the Remote Installation 29 Install Set Options OL-8155-01 30 Preinstallation Summary 32 Install Complete Message Root #rpm -Uv kernel-source-2.4.21-32.0.1.EL.i386.rpm Manually Installing CSATerminal Root CSCOcsa #sh installrpm.sh Checking the InstallationPreparing to Use Cisco Ipics Root tmp #tar xvf /root/CSAStandAlone.tar35 Cisco Ipics Manage License Window Obtaining Your License File Managing Your LicensesProcedure 11for an example of the window Obtain the MAC address with a Cisco Linux command OL-8155-01 Purchasing Additional Licenses Opt/cisco/ipics/tomcat/current/webapps/ipicsserver/license Uploading the Cisco Ipics Licenses39 Refreshing the License Window Managing Licenses with the Ops Views Feature Cisco Ipics Login window displays Generating the Cisco Ipics PMC Application InstallerAdministration Guide Click Generate PMC InstallerOL-8155-01 Upgrading Cisco Ipics Cisco Ipics Backup and Restore Guide Performing the Upgrade from a CD2for an example Installer File on the Cisco Ipics CD Run or Display Message Window Upgrade Available Message Introduction in the Installer Window Enter Installer prompts you to re-enter the informix passwordInstall Complete Window Transferring the Upgrade File to the Server Performing the Upgrade from a Downloaded FileSSH Tectia Client SSH Tectia Client File Transfer Saving the Upgrade File to Your ComputerPerforming the Upgrade at the Server Root #./name of upgrade file.bin 10 Introduction in the Installer Window 11 Preinstallation Summery To close the installer and complete the upgrade, press Enter Performing the Upgrade from a Remote Location Root #./name of upgrade file.bin -i console OL-8155-01 OL-8155-01 Uninstalling Cisco Ipics Uninstalling Cisco Ipics from the Cisco Ipics Server Introduction Window of the Uninstaller Uninstallation Progress Uninstalling Cisco Ipics from a Remote Location Root #./uninstallipicsxx -i console Uninstall Complete Message To close the SSH Tectia Client window, click Troubleshooting the Installation No Ports Are Listed in the Network Device Control Menu Cisco Ipics Installation IssuesPing default gateway IP address Cannot Connect to the Server after InstallationRoot #/etc/init.d/ipicstomcat start Authorization Error after InstallationRoot #ps -ef grep tomcat Root #/etc/init.d/ipicsdb start Root #ps -ef grep oninitRoot #./name of installer file.bin -i console Error Displays When Performing Remote InstallationRoot #rpm -ev `rpm -qf /opt/CSCOcsa/bin/ciscosecd` Uninstalling CSAOL-8155-01 Root #sh /root/.security/unimmunize.sh Changing the Cisco Linux Root PasswordYou are returned to the Linux desktop GL-1 O S S a R YGL-2 GL-3 GL-4 GL-5 GL-6 GL-7 GL-8 GL-9 Allocation for the 821-824 MHz and 866-869 MHz bands Channels that occupy less than 20 kHzAn interconnection of communications entities GL-10GL-11 GL-12 GL-13 GL-14 GL-15 GL-16 GL-17 GL-18 GL-19 GL-20 IN-1 D EIN-2 IN-3 IN-4 GnomeIN-5 IN-6

OL-8155-01 specifications

Cisco Systems OL-8155-01 is a vital component in the landscape of networking and IT infrastructure, designed for high performance and reliability in a variety of applications. This model is a part of Cisco's extensive offerings tailored for enterprise-level networking solutions, ensuring that organizations can effectively manage their networks to meet increasing demands.

One of the main features of the OL-8155-01 is its robust support for virtualization technologies. It provides an integrated platform that allows businesses to deploy virtual machines with ease. This capability is crucial as companies increasingly migrate to cloud-based services and seek to optimize their existing resources. The model supports various hypervisors, thereby offering flexibility in deployment scenarios.

Another standout characteristic of the OL-8155-01 is its advanced security features. Built with Cisco’s renowned security protocols, it helps safeguard sensitive data against cyber threats. The inclusion of features such as encryption and identity management allows organizations to maintain compliance with industry regulations while ensuring that their networks are protected from unauthorized access.

The OL-8155-01 is also designed with high availability in mind. It includes redundant components and failover capabilities that make sure network uptime is maximized. Organizations can rely on this system to keep their operations running smoothly, even in the event of hardware failures or unexpected disruptions.

In terms of connectivity, the OL-8155-01 supports a wide range of network interfaces, enabling seamless integration with existing network infrastructure. This versatility is essential for businesses that require flexibility in their networking solutions, as it allows for easy scaling and adaptation to changing business needs.

Performance is another critical area where the OL-8155-01 excels. It is engineered to handle high volumes of traffic, making it ideal for data-intensive applications such as video conferencing, online collaboration tools, and large-scale data analysis. The model's ability to maintain speed and efficiency under load is a significant advantage for organizations that rely heavily on data transmission.

In summary, Cisco Systems OL-8155-01 stands out with its combination of virtualization support, advanced security measures, high availability, versatile connectivity options, and robust performance capabilities. These features make it a compelling choice for enterprises looking to enhance their networking infrastructure and support their digital transformation initiatives. As businesses navigate the complexities of modern IT environments, the OL-8155-01 offers a solid foundation for achieving their networking goals.