Cisco Unified Serviceability Administration Guide for Cisco Unified Presence, Release 6.0(1)
Preface
Downloads: This chapterpdf (PDF - 393.0KB) The complete bookPDF (PDF - 3.2MB) | Feedback

Preface

Table Of Contents

Preface


Preface


This preface describes the purpose, audience, organization, and conventions of this guide, and provides information on how to obtain related documentation.

The preface covers these topics:

Purpose

Audience

Organization

Related Documentation

Conventions

Obtaining Documentation, Obtaining Support, and Security Guidelines

Purpose

The Cisco Unified Presence Server Serviceability Administration Guide provides information about the Cisco Unified Presence Serviceability program, including the Real-Time Monitoring Tool (RTMT).

Audience

The Cisco Unified Presence Server Serviceability Administration Guide provides information for network administrators responsible for managing and supporting the Cisco Unified Presence system. Network engineers, system administrators, or telecom engineers use this guide to learn about, and administer, remote serviceability features. This guide requires knowledge of telephony and IP networking technology.

Organization

The following table shows how this guide is organized:

Chapter
Description

Chapter 1, "Introduction"

Provides an overview of the Cisco Unified Presence Serviceability application, remote serviceability applications, and reporting tools.

Chapter 2, "Managing Services"

Provides procedures for activating, deactivating, starting, and stopping Cisco Unified Presence services.

Chapter 3, "Alarm Configuration"

Provides procedures for configuring the Cisco Unified Presence alarms.

Chapter 4, "Alarm Definitions"

Provides procedures for searching and editing Cisco Unified Presence alarm definitions.

Chapter 5, "Trace Configuration"

Provides procedures for configuring trace parameters for Cisco Unified Presence services.

Chapter 6, "Troubleshooting Trace Setting Configuration"

Provides procedures for configuring the troubleshooting trace settings.

Chapter 7, "Real-Time Monitoring Configuration"

Provides procedures for configuring the real-time monitoring tool.

Chapter 8, "Alert Configuration in RTMT"

Provides procedures for working with alerts in the real-time monitoring tool, including setting alert properties, configuring alert actions, and configuring e-mails for alert notification.

Chapter 9, "Configuring and Using Performance Monitoring"

Provides procedures for working with performance monitors, including viewing performance counters and counter descriptions.

Chapter 10, "Trace Collection and Log Central in RTMT"

Provides information on configuring on-demand trace collection for Cisco Unified Presence services and crash dump files as well as on viewing the trace files in the appropriate viewer.

Chapter 11, "Using SysLog Viewer in RTMT"

Provides information on using the SysLog Viewer.

Chapter 12, "Using Plug-ins"

Provides information on installing and using plug-ins in the real-time monitoring tool.

Chapter 13, "Log Partition Monitoring Configuration"

Provides information on configuring Log Partition Monitoring to monitor the disk usage of the log partition on a server (or all servers in the cluster).

Chapter 14, "Serviceability Reports Archive Configuration"

Provides procedures for viewing reports generated by the Serviceability Reporter service.

Chapter 15, "SNMP V1/V2c Configuration"

Provides procedures for configuring SNMP versions 1 and 2c.

Chapter 16, "SNMP V3 Configuration"

Provides procedures for configuring SNMP version 3.

Chapter 17, "MIB2 System Group Configuration"

Provides procedures for configuring the system contact and system location objects for the MIB-II system group.


Related Documentation

Refer to the Cisco Unified Presence Documentation Guide for further information about related Cisco IP telephony applications and products. The following URL shows an example of the path to the documentation guide:

http://www.cisco.com/univercd/cc/td/doc/product/voice/c_callmg/<release #>/doc_gd/index.htm

Conventions

This document uses the following conventions:

Convention
Description

boldface font

Commands and keywords are in boldface.

italic font

Arguments for which you supply values are in italics.

[   ]

Elements in square brackets are optional.

{ x | y | z }

Alternative keywords are grouped in braces and separated by vertical bars.

[ x | y | z ]

Optional alternative keywords are grouped in brackets and separated by vertical bars.

string

A nonquoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks.

screen font

Terminal sessions and information the system displays are in screen font.

boldface screen font

Information you must enter is in boldface screen font.

italic screen font

Arguments for which you supply values are in italic screen font.

 

This pointer highlights an important line of text in an example.

^

The symbol ^ represents the key labeled Control—for example, the key combination ^D in a screen display means hold down the Control key while you press the D key.

<   >

Nonprinting characters, such as passwords, are in angle brackets.


Notes use the following conventions:


Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication.


Timesavers use the following conventions:


Timesaver Means the described action saves time. You can save time by performing the action described in the paragraph.


Tips use the following conventions:


Tip Means the information contains useful tips.


Cautions use the following conventions:


Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.

Warnings use the following conventions:


Warning This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, you must be aware of the hazards involved with electrical circuitry and familiar with standard practices for preventing accidents.


Obtaining Documentation, Obtaining Support, and Security Guidelines

For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

Cisco Product Security Overview

This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately.

Cisco provides a free online Security Vulnerability Policy portal at this URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html