Cisco Unified Serviceability Administration Guide for Cisco Unity Connection Release 2.x

Table Of Contents



This preface describes the purpose, audience, and conventions of this guide, and provides information on how to obtain related documentation.

The preface covers these topics:



Related Documentation


Obtaining Documentation, Obtaining Support, and Security Guidelines

Cisco Product Security Overview


The Cisco Unified Serviceability Administration Guide provides descriptions and procedures for configuring alarms, traces, SNMP, and so on, through Cisco Unified Serviceability. Use this guide in conjunction with the following documents:

Real-Time Monitoring Tool Administration Guide for Cisco Unity Connection—This document describes how to use RTMT, a tool that allows you to monitor many aspects of the system (critical services, alerts, performance counters, and so on).

Administration Guide for Cisco Unity Connection Serviceability—This document provides descriptions and procedures for using alarms, traces, reports, and so on, through Cisco Unity Connection Serviceability.

Tip For Cisco Unity Connection, you must perform serviceability-related tasks in both Cisco Unified Serviceability and Cisco Unity Connection Serviceability; for example, you may need to start and stop services, view alarms, and configure traces in both applications to troubleshoot a problem.

Cisco Unified Serviceability supports the functionality that is described in the Cisco Unified Serviceability Administration Guide; for tasks that are specific to Cisco Unity Connection Serviceability, refer to the Serviceability Administration Guide for Cisco Unity Connection.


The Cisco Unified Serviceability Administration Guide assists administrators that configure, troubleshoot, and support Cisco Unity Connection. This guide requires knowledge of IP networking technology.

Related Documentation

For additional Cisco Unity Connection documentation, refer to the Documentation Guide for Cisco Unity Connection at the following URL:


This document uses the following conventions:


boldface font

Commands and keywords are in boldface.

italic font

Arguments for which you supply values are in italics.

[   ]

Elements in square brackets are optional.

{ x | y | z }

Alternative keywords are grouped in braces and separated by vertical bars.

[ x | y | z ]

Optional alternative keywords are grouped in brackets and separated by vertical bars.


A nonquoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks.

screen font

Terminal sessions and information the system displays are in screen font.

boldface screen font

Information you must enter is in boldface screen font.

italic screen font

Arguments for which you supply values are in italic screen font.


This pointer highlights an important line of text in an example.


The symbol ^ represents the key labeled Control—for example, the key combination ^D in a screen display means hold down the Control key while you press the D key.

<   >

Nonprinting characters, such as passwords, are in angle brackets.

Notes use the following conventions:

Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication.

Timesavers use the following conventions:

Timesaver Means the described action saves time. You can save time by performing the action described in the paragraph.

Tips use the following conventions:

Tip Means the information contains useful tips.

Cautions use the following conventions:

Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.

Warnings use the following conventions:

Warning This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, you must be aware of the hazards involved with electrical circuitry and familiar with standard practices for preventing accidents.

Obtaining Documentation, Obtaining Support, and Security Guidelines

For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

Cisco Product Security Overview

This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at: If you require further assistance please contact us by sending email to