Cisco Unified Serviceability Administration Guide, Release 6.1(1)
Downloads: This chapterpdf (PDF - 391.0 KB) The complete bookPDF (PDF - 4.49 MB) | Feedback


Table Of Contents



This preface describes the purpose, audience, organization, and conventions of this guide, and provides information on how to obtain related documentation.

Note This document may not represent the latest Cisco product information that is available. You can obtain the most current documentation by accessing Cisco product documentation page at this URL:

The preface covers these topics:




Related Documentation


Obtaining Documentation, Obtaining Support, and Security Guidelines

Cisco Product Security Overview


The Cisco Unified Serviceability Administration Guide provides descriptions and procedures for configuring alarms, traces, SNMP, and so on, through Cisco Unified Serviceability. Use this guide in conjunction with the following documents:

Cisco Unified Communications Manager CDR Analysis and Reporting Administration GuideThis document describes how to configure and use Cisco Unified Communications Manager CDR Analysis and Reporting (CAR), a tool that is used to create user, system, device, and billing reports. This document also includes CDR definitions.

Cisco Unified Communications Manager Real-Time Monitoring Tool Administration Guide—This document describes how to use RTMT, a tool that allows you to monitor many aspects of the system (critical services, alerts, performance counters, and so on).


The Cisco Unified Serviceability Administration Guide assists administrators that configure, troubleshoot, and support Cisco Unified Communications Manager. This guide requires knowledge of telephony and IP networking technology.


The following table shows the organization for this guide:

Table 1 Organization of Cisco Unified Serviceability Administration Guide 

Part 1

"Understanding Cisco Unified Serviceability"

Provides an overview of Cisco Unified Serviceability, including browser support and information on how to access and use the GUI.

Part 2


Provides an overview of Cisco Unified Serviceability alarms and alarm definitions.

Provides procedures for configuring alarms in Cisco Unified Serviceability; provides procedures for searching and editing Cisco Unified Serviceability alarm definitions.

Part 3


Provides an overview for configuring trace parameters in Cisco Unified Serviceability; also provides an overview of trace collection in the Cisco Unified Communications Manager Real-Time Monitoring Tool.

Provides procedures for configuring trace parameters for Cisco Unified Serviceability network and feature services; provides procedures for configuring the troubleshooting trace settings for services in Cisco Unified Serviceability.

Part 4


Provides a description of each network and feature service that displays in Cisco Unified Serviceability; provides procedures and recommendations for activating, deactivating, starting, and stopping Cisco Unified Serviceability feature and network services.

Provides information on using the CDR Management Configuration window to set the amount of disk space to allocate call detail record (CDR) and call management record (CMR) files, configure the number of days to preserve files before deletion, and configure billing application server destinations for CDRs.

Provides an overview on the reports that are generated by the Cisco Serviceability Reporter service; provides procedures for viewing reports that are generated by the Cisco Serviceability Reporter service.

Part 5

"Simple Network Management Protocol"

Provides an overview of Cisco Unified Communications Manager support of SNMP versions 1, 2c, and 3. Administrators use SNMP to troubleshoot and to perform diagnostics and network management tasks.

Provides procedures for configuring SNMP versions 1, 2c, and 3.

Provides procedures for configuring the system contact and system location objects for the MIB-II system group.

Related Documentation

For additional Cisco Unified Communications Manager documentation, refer to the Cisco Unified Communications Manager Documentation Guide at the following URL:


This document uses the following conventions:


boldface font

Commands and keywords are in boldface.

italic font

Arguments for which you supply values are in italics.

[   ]

Elements in square brackets are optional.

{ x | y | z }

Alternative keywords are grouped in braces and separated by vertical bars.

[ x | y | z ]

Optional alternative keywords are grouped in brackets and separated by vertical bars.


A nonquoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks.

screen font

Terminal sessions and information the system displays are in screen font.

boldface screen font

Information you must enter is in boldface screen font.

italic screen font

Arguments for which you supply values are in italic screen font.


This pointer highlights an important line of text in an example.


The symbol ^ represents the key labeled Control—for example, the key combination ^D in a screen display means hold down the Control key while you press the D key.

<   >

Nonprinting characters, such as passwords, are in angle brackets.

Notes use the following conventions:

Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication.

Timesavers use the following conventions:

Timesaver Means the described action saves time. You can save time by performing the action described in the paragraph.

Tips use the following conventions:

Tip Means the information contains useful tips.

Cautions use the following conventions:

Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.

Warnings use the following conventions:

Warning This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, you must be aware of the hazards involved with electrical circuitry and familiar with standard practices for preventing accidents.

Obtaining Documentation, Obtaining Support, and Security Guidelines

For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

Cisco Product Security Overview

This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at: If you require further assistance please contact us by sending email to