Info |
---|
This section makes frequent use of data contained in the Technical Requirements. All relevant sections of the Technical Requirements Data collection should be completed or known before commencing with the steps in this section. |
There are two parts to the configuration, the first being the server(s) under management, and the second being the supporting configuration on the web portal. Both are covered in this chapter.
Table of Contents |
---|
AES Configuration
Adding a new AES Login
Create an Administrator account. The VSM collector requires access with Administrative rights. Add an account that when used provides access to the Linux bash prompt.
The new account should be similar to the default “craft” account.
- Start an SSH session. At the command prompt type su root. When prompted enter the ‘root’ user password.
- Use the command useradd NAME; where NAME is the account name to create and hit enter.
- Use the command passwd NAME; where NAME is the account name created above and hit enter. Enter the password then hit enter (need to do this twice).
- Enter the command chage –M 99999 NAME; where NAME is the account created above and hit enter to set the System Manager account password to not expire.
Info |
---|
If you do not have root access Your Business Partner or Avaya may be able to create this account on your behalf, or you can use the ‘cust’ credentials instead. |
SNMP
SNMP is used to capture alarms raised by AES and VSM also queries the AES via SNMP to retrieve TSAPI and DMCC licensing usage statistics. The VSM collector must be added as a destination for SNMP traps and also allowed to Query the AES.
SNMP queries are configured via the AES management portal Utilities> SNMP> SNMP Agent. Enable SNMP Version 2c and set the community name to the same value as was administered in the AES setup form within VSM.
Set the ‘Authorized IP Addresses for SNMP Access’ to ‘Any IP Address’ or ‘Following IP Address’, if the latter then ensure the VSM collector IP address is populated in one of the IP address boxes below this setting, then click ‘Apply Changes’:
AES SNMP Query Field Description
Fields | Setting |
Enable SNMP Version 2c | Ticked |
Community Name | Same as Administered in VSM for the AES |
Authorized IP Addresses for SNMP Access | Any IP address ‘or’ Following IP Addresses |
If using ‘Following IP Addresses’ | IP Address of the VSM collector |
SNMP Traps are configured via the AES management portal Utilities> SNMP> SNMP Trap Receivers, then click ‘Add’:
Populate the required fields as per the table below and then click ‘Apply changes’:
AES SNMP Trap Field Description
Fields | Setting |
Device | SSG |
IP Address | IP address of VSM collector |
Port | 162 |
Notification type | Trap |
SNMP Version | 2c |
Security Name | public |
Authentication Protocol | None (Password to be blank) |
Privacy Password | None (Password to be blank) |
Configuring Syslog
Navigate to the Application Enablement Services Management Console then Status > Log Manager > System Logging. Select the ‘Enable Remote Logging’ checkbox, and fill in the fields as per the table below.
AES Syslog Field Description
Field | Setting |
Hostname(FQDN)/IP Address | IP Address of the VSM collector |
Port | 514 |
Enable TLS Remote Logging | NO |
Facility | Choose logging facility from dropdown |
Web Portal Configuration
Add AES
Login to the VSM web portal using your credentials and password.
For your customer, select Service Desk > Equipment Locations. Right-click on the Equipment Location that will serve this particular AES and select ‘Manage Equipment’
At the bottom of the ‘Manage Equipment’ page click on the ‘Add Equipment’ Button
A form will open which you can populate with the equipment details as per table 51.
Select the Vendor ‘Avaya’ and Product ‘Application Enablement Server’.
If you are adding more than one piece of the same equipment type check the ‘Add another’ box at the bottom of the form and the bulk of the configuration will be carried over for the next item.
Web Portal – Add AES Field Description
Field | Setting |
Vendor | Avaya |
Product | Application Enablement Server |
Equipment Name | Friendly name for this ACM |
Username | The administrative username you added to AES earlier |
Password | The administrative password you added to AES earlier |
IP Address / Host Name | IP Address of server (Virtual in duplicated servers) |
Site | Friendly name for core site (where this server is located) |
Include Page | ||||
---|---|---|---|---|
|
Test Access
Once all fields are populated Click on the Test Access button. This will test that VSM can connect to the AES using the settings you have entered:
Both SSH and SNMP should return success. If not, troubleshoot the configuration.
Info |
---|
The SSH test ensures the VSM collector can connect to, and login using the account configured. |
Info |
---|
The SNMP test ensures an SNMP query can be run. |
Once testing is successful, click Add.