Cisco CNS Network Registrar Installation Guide, 6.1
Index
Downloads: This chapterpdf (PDF - 270.0KB) The complete bookPDF (PDF - 805.0KB) | Feedback

Index

Table Of Contents

A - B - C - D - E - G - H - I - J - K - L - M - N - O - P - R - S - T - U - V - W -

Index

A

Add License page, Web UI     2-8

antivirus software     2-2

archive directories     2-5

archiving     2-5

B

before you begin     1-2

C

CCM port     2-5

certificate file, importing     2-3

checklist, installation     2-1

Cisco Access Registrar, incompatibility with     1-3

CLI     1-1

license set key command     2-8

requirements     1-3

starting     2-7

client-only installation     2-5

clusters

local     2-4

modes     2-4

regional     2-4

cnr_status utility     2-6, 2-9

command line interface     1-1

connection type     2-6

CPU architecture     1-2

D

database status     2-5

debug_install script     2-10

DHCP servers     1-1

disk space requirements     1-2

DNS servers     1-1

Dr. Watson     2-2

E

error logging     1-3

evaluation licenses     2-2, 2-7

excluding directories for virus scanning     1-3

G

gtar utility     2-4

gunzip utility     2-4

gzip utility     2-4

H

HTTP connection     2-6

HTTPS connection     2-6

I

install_cnr_log file     2-10

install_cnr utility     2-4, A-2

installation     2-1

CCM port     2-5

CD     2-4

checklist     2-1

closing antivirus software     2-2

cluster mode     2-4

connection type     2-6

directory     2-4

JAVA_HOME setting     2-2

Java directory     2-5

JRE/JDK requirements     2-2

JSSE location     2-3

lab evaluation     B-1

license keys     2-2

log files

install_cnr_log     2-10

lease_upgrade_log     2-10

mcdupgrade_log     2-10

modes

new     1-2

upgrade with data migration     1-2

upgrade without data migration     1-2

network distribution     2-4

noninteractive     2-3, A-1

preparing     2-2

process     2-2

processing messages     2-6

requirements     1-2

secure login     2-3

silent     2-3, A-1

system privileges     2-2

troubleshooting     2-10

types     2-5

Web UI port     2-6

J

Java

directory     2-5

requirements     1-2

JAVA_HOME setting     2-2

Java Development Kit (JDK)     2-2

Java Runtime Environment (JRE)     2-2

Java Secure Socket Extension (JSSE)     2-3

K

keystore file     2-3

keytool utility     2-3

L

lab evaluation installations     B-1

lease_upgrade_log file     2-10

license keys     1-2, 2-2, 2-7

central configuration     2-2, 2-7

evaluation     2-2, 2-7

local cluster     2-2, 2-7

node count     2-2, 2-7

regional address space     2-2, 2-7

router management     2-2, 2-7

license set key command (CLI)     2-8

Linux

cnr_status     2-6, 2-9

gtar     2-4

gzip     2-4

install_cnr     2-4, A-2

requirements     1-2

superuser/root accounts     2-2

uninstall_cnr     2-8

uninstallation     2-8

variable declaration file     A-1

Local.sav directory     2-5

Local directory     2-4

local mode     2-4

log files     2-10

logging

server events     1-3

startups     1-3

Windows     1-3

M

mcdupgrade_log file     2-10

N

name changes in 6.1     1-4

noninteractive installations     2-3, A-1

nwreg2 package     2-4

nwreglocal utility     2-9

nwregregion utility     2-9

O

operating system versions     1-2

P

passwords     1-4

pkgadd utility     2-4, A-2

pkgask utility     A-1

pkgrm utility     2-8, A-2

postinstallation     1-5

processing messages     2-6

R

RAM requirements     1-2

Regional.sav directory     2-5

Regional directory     2-4

regional mode     2-4

Release 6.1, name changes     1-4

requirements, server     1-2

RIC server     2-2, 2-7

RIC servers     1-1

root accounts     2-2

Router Interface Configuration server     2-2, 2-7

router interface configuration servers     1-1

S

secure login     2-3

self-extracting executable     2-4

self-signed certificates     2-3

server agents, checking status     2-6

server-client installation     2-5

servers

DHCP     1-1

DNS     1-1

events, logging     1-3

requirements     1-2

RIC     1-1

running with other     1-4

starting/stopping     2-9

TFTP     1-1

setup.exe file     2-4

silent installations     2-3, A-1

Solaris

cnr_status     2-6, 2-9

gtar     2-4

gzip     2-4

nwreg2     2-4

nwreglocal and nwregregion     2-9

pkgadd     2-4, A-2

pkgask     A-1

pkgrm     2-8, A-2

requirements     1-2

superuser/root accounts     2-2

uninstallation     2-8

starting

CLI     2-7

logging when     1-3

servers     2-9

Web UI     2-7

Start menu

access     2-7

setup     2-4

status of server agents     2-6

stopping servers     2-9

superuser accounts     2-2

swap space requirements     1-2

system privileges     2-2

system requirements     1-2

T

tail command (Solaris)     1-3

TFTP servers     1-1

troubleshooting     2-10

U

uncompressing the media     2-4

uninst.exe utility     A-2

uninstall_cnr utility     2-8

uninstallation     2-8

lab evaluation     B-1

Linux     2-8

Solaris     2-8

Windows     2-8

unpacking the media     2-4

upgrade     2-1

archive directories     2-5

archiving     2-5

CCM port     2-5

CD     2-4

checklist     2-1

cluster mode     2-4

connection type     2-6

database status     2-5

JAVA_HOME setting     2-2

Java directory     2-5

JRE/JDK requirements     2-2

JSSE location     2-3

lab evaluation     B-1

license keys     2-2

network distribution     2-4

noninteractive     2-3, A-1

preparing     2-2

process     2-2

processing messages     2-6

secure login     2-3

silent     2-3, A-1

system privileges     2-2

types     2-5

Web UI port     2-6

usernames     1-4

V

viewing server logs     1-3

virus scanning, excluding directories     1-3

visual notification, disabling     2-2

W

web-based user interface     1-1

Web UI     1-1

Add License page     2-8

ports     2-6

requirements     1-3

starting     2-7

Windows

antivirus software     2-2

Dr. Watson     2-2

logging     1-3

program run location     2-4

requirements     1-2

self-extracting executable     2-4

setup.exe file     2-4

Start menu     2-4, 2-7

uninst.exe     A-2

uninstallation programs     2-8

visual notification, disabling     2-2