Chapter 5 Customizing the Cisco Unity Platform

Configuring a Dual NIC in the Cisco Unity Server

10.Configure TCP/IP properties. See the “Configuring TCP/IP Properties” section on page 5-12.

11.Confirm that the server has a valid IP address and is connected to the network. See the “Verifying the IP Address and the Network Connection” section on page 5-13.

12.If antivirus software or Cisco Security Agent for Cisco Unity is installed on the Cisco Unity server: Disable virus-scanning and Cisco Security Agent for Cisco Unity services. See the “Disabling Antivirus and Cisco Security Agent Services” section on page 5-14.

13.Install Microsoft Active Directory, or add the Cisco Unity server to an existing domain. See the “Installing Active Directory or Adding the Cisco Unity Server to an Existing Domain” section on page 5-15.

When you are finished with this chapter, return to Chapter 1, “Overview of Mandatory Tasks for Installing Cisco Unity” to continue installing the Cisco Unity system.

Note The tasks in the list reference detailed instructions in the Cisco Unity installation guide and in other Cisco Unity documentation. Follow the documentation for a successful installation.

Configuring a Dual NIC in the Cisco Unity Server

Note If the Cisco Unity server does not contain a dual NIC, skip this section.

We recommend that a dual NIC be configured in adapter fault tolerant mode (AFT) or network fault tolerant (NFT) mode. One NIC is designated as the primary and the other NIC as the secondary for active-passive fault tolerance. In this configuration, the primary (active) NIC handles 100 percent of the traffic. Only in the event that the primary NIC becomes unavailable does the secondary NIC then become active and handle 100 percent of the traffic.

Alternatively, if you do not want to configure AFT or NFT, or do not have a second LAN port available, the following configurations are supported, though not recommended:

Disable TCP/IP for the second NIC, which allows you to re-enable the second NIC remotely if the first NIC fails. (Use the Network and Dial-up Connections Control Panel to disable TCP/IP for the second NIC.)

Disable the second NIC in the BIOS. (On some Cisco Unity servers, the second NIC is disabled in the BIOS by default.)

Caution Not plugging a network cable into the second NIC is not sufficient. You must either disable TCP/IP for the second NIC or disable the second NIC in the BIOS, or Cisco Unity may not work properly.

If you installed Windows by using the Cisco Unity Platform Configuration discs, skip to the “Configuring a Dual NIC” section on page 5-4. (The NIC-configuration utility was installed automatically.)

If you installed Windows by using a retail Windows disc, you need to install the NIC-configuration utility before you can configure the dual NIC. Do the applicable procedures in the following two sections, “Installing the NIC-Configuration Utility” and “Configuring a Dual NIC.”

Installation Guide for Cisco Unity Release 5.x with IBM Lotus Domino (Without Failover)

5-2

OL-13599-01

 

 

Page 44
Image 44
Cisco Systems OL-13599-01 manual Configuring a Dual NIC in the Cisco Unity Server

OL-13599-01 specifications

Cisco Systems OL-13599-01 is an integral part of Cisco's portfolio of networking equipment, designed to enhance the efficiency and performance of various networking environments. This model is particularly notable for its robust features, cutting-edge technologies, and adaptable characteristics, making it suitable for enterprise-level applications.

Main features of Cisco OL-13599-01 include advanced routing capabilities that facilitate seamless data transmission across complex networks. It supports a range of protocols, ensuring compatibility and interoperability with various networking devices. The system is optimized for high throughput, enabling the handling of multiple concurrent connections without compromising performance. Additionally, it offers enhanced security measures, including integrated firewalls, intrusion prevention systems, and advanced encryption standards, which protect sensitive data and safeguard against unauthorized access.

Technologically, OL-13599-01 is built on Cisco's state-of-the-art architecture, allowing for virtualization and automation. This means users can efficiently manage their network resources, deploy applications swiftly, and even automate routine maintenance tasks. The system supports Software-Defined Networking (SDN), which promotes greater flexibility in network management by enabling centralized control over traffic flows and configurations. This technology reduces operational complexity and fosters a more agile networking environment.

Another characteristic of Cisco OL-13599-01 is its scalability. As organizations grow, their networking needs evolve, and OL-13599-01 can easily scale to accommodate increased demands. It supports modular components that allow for easy upgrades and expansions, ensuring the system remains relevant and effective over time. Furthermore, the device is designed for energy efficiency, which not only contributes to sustainability efforts but also reduces operational costs.

In conclusion, Cisco Systems OL-13599-01 stands out as a powerful networking solution that combines robust features, advanced technologies, and versatile characteristics. Its ability to handle high traffic, support various protocols, and provide strong security measures makes it a favored choice among enterprises aiming to enhance their networking infrastructure. With its focus on scalability and efficiency, OL-13599-01 is crafted to meet the dynamic demands of modern businesses, ensuring they remain competitive and resilient in an ever-evolving digital landscape.