Aura Lab Creation
Aura Lab Creation
4. Provide VM Name and browse the OVA file from local and click next.
5. Let the SMGR Maintenance operation complete and install the SMGR Mandatory Patch.
To check this Maintenance Operation login to SMGR from putty again.
5. Resource Pool is selected by default, if not select the proper resource pool and click NEXT.
6. If you see ignore on top right corner click ignore and click next otherwise click next.
If you want to encrypts the data select '1' else select '2' and click next.
If you select '1' system prompts to enter passwords e
Verify that you have entered the correct details and click on FINISH
5. Go to putty, and install the SMGR patch using the following command
# SMGRPatchdeploy /swlibrary/<SMGR Bin Patch>
For example, run the following command: SMGRPatchdeploy /swlibrary/System_Manager_R8.1.0.0_S7_810009814.bin
Next Steps:
a. Login to SMGR GUI using SMGR's default credentials: admin/admin123
b. You must change your SMGR GUI password on your first login.
6. If you see ignore on top right corner click ignore and click next otherwise click next.
9. Select virtual disk format as "Thin Provision" and select any datastore and click Next.
For SM deployment, both Thin or Think provision will work. To save the disk space, select Think provision.
10. Select networks and click on next.
Enter the password for the default "cust" user. You can change the user name if you want.
If you want to encrypt the data select '1' else select '2' and click next.
If you select '1' system prompts to enter passwords e
Verify that you have entered the correct details and click FINISH.
12. Wait for sometime to complete the inistallation.
13. Power On the VM.
4. Provide VM Name and browse the OVA file from local and click next.
3. If the date and time on SM is not matchign with SMGR, then set the date and time in SM.
In SM CLI, run the below command to change the date in SM with root user
# date -s "<Copy SMGR date and paste it in SM CLI>"
For example, date -s "Thu Feb 10 06:17:50 IST 2022"
4. Put SMs FQDN in SMGR.
Note: Make sure SMGR FQDN must existing in SM /etc/hosts file and SM FQDN must existing in SMGR /etc/hosts file
5. Login to SMGR GUI and add Locations and Domains. To add Domains go to Elements »» Routing »» Domains
6. Login to SMGR GUI and add SM in SIP Entities. To add go to Elements »» Routing »» SIP Entities.
Note: SM should have 2 IPs, one is for Management IP (At the deployment time we given this IP) and one for Asset IP which we give while
adding SM in SIP Entities.
In this below screenshot, we should add Asset IP (New IP) for SM.
7. Now add SM in Inventory. To add go to Services »» Inventory »» Manage Elements.
Note: While adding SM in Inventory Use Management IP (which we already provided at the deployment time.)
8. Check the SM current ‘Service State’. To check go to Elements »» Session Manage »» Dashboard.
SM is in No connection state which means Trust and Replication with SMGR is not done.
9. Set the Enrollment Password on SMGR, To set Go To Services »» Security »» Certificates »» Enrollment Password
10. Login to SM using putty, and execute the following command to start Trust and Replication with SMGR
## initTM
If SM is in Maintenance Mode or in Deny state, then the SM services will not work. For example, you can register the phone.
If SM running on ‘Maintenance Mode’, You must change the SM Service State to ‘Accept New Service’ mode.
12. Go To Elements »» Session Manage »» Dashboard, Select the Session Manager entry (check box), and from the "Service State" drop-down,
select Accept New Service.
.
* Select URL option and provide the path of your local server where your CM OVA is available.
* Select Local file and browse the CM OVA from your local machine
5. Resource Pool is selected by default, if not select the proper resource pool and click NEXT.
6. If you see ignore on top right corner, click Ignore and click NEXT, otherwise click NEXT.
8. Select the required configuration (Profiles or user profiles), and click Next.
9. Select virtual disk format as "Thin Provision" and select any datastore and click Next.
For CM deployment, both Thin or Think provision will work. To save the disk space, select Think provision.
credentials.
If you want to encrypts the data select '1' else select '2' and click next.
If you select '1' system prompts to enter passwords e
12. Verify the details and click FINISH.
Additional info:
* When CM is deployed using vCenter server, on your first login, you will be forced to change the Admin password
* On successful deployment, CM provides two default users: init, sroot
Next Steps:
login to CM using the "Privileged Administrator User Login" credentials you provided during the depoyment. On your first login, system prompts
you to change the Admin password.
Set password for the two default users: init, sroot
4. Provide VM Name and browse the OVA file from local and click next.
2. Set the hostname for both Duplex CMs from SMI page.
Go to Administration »» Server Configuration »» Network Configuration
Update Host Name and click on change
3. Install SMGR CA Certificate and Server/Application Certificate on both Duplex CMs. Follow below links.
Note: Before install Certs, ensure that SMGR and LSP must be running on same date and time.
SMGRCACertificateInstallationonCM
Server/ApplicationCertificateInstallationonCM
4. Set the hostname and server ID for both the CMs from SMI Page.
Go to Administration »» Server Configuration »» Network Configuration
Update Host Name, Server ID and click on change
Duplex CM1
Duplex CM2
5. Configure Alias and Duplication IP for both Duplex CMs in Network Configuration Page.
Go to Administration »» Server Configuration »» Network Configuration
Note: The Alias IP must be same for both CMs
Duplex CM1
Duplex CM2
6. Update parameters in Duplication Parameters page.
Go to Administration »» Server Configuration »» Duplication Parameters
Provide Duplex CM2 details in Duplex CM1 and
Provide Duplex CM1 details in Duplex CM2
Duplex CM1
Duplex CM2
7. Restart both CMs using reboot command
# reboot
8. By default Duplex CMs starts with BUSY OUT mode. To check execute below command.
# server
After releasing the servers, one Duplex CM will be running in Active Mode and other Duplex CM will be running in Standby Mode. Check below
screenshot.
15. Do Null Translations
16. Adding CM 'procr' IP
1. Login to CM CLI.
2. save translations using cli command 'save_trans' and restart the CommunicaMgr service using using cli command 'drestart 1 4'
3. Go to sat, Add CM procr IP.
Info:
If EASG is enabled during CM deployment, system will ask for Response Code for the default "sroot" and "init" users. "sroot" user is restricted to
CLI only. "init" user can access CLI and SMI pages.
If EASG is disabled during CM deployment, system will directly ask for Password if you login using "sroot" and "init" users. Since, we have NOT
set the passwords, you cannot login at all using these users. In this case, you can login to CM CLI or SMI using the Privileged user "ppminit"
account ONLY (for example, "ppminit" user can only login CLI and SMI)
EASG is used to allow Avaya Support personnel to troubleshoot customer issues.
If Do
Scenario 1: If EASG is enabled, system prompts you to enter the Respone code Generate response code for the sroot user:
http://ssdp.dr.avaya.com/ASG_WebMobile/ind
Scenario 2: If EASG is not enabled, system promts you to enter the password for As a Privileged user, enable EASG:
You must first enable EASG to set the passwords for the default
http://ssdp.dr.avaya.com/ASG_WebMobile/ind
After changing ecs.conf file, You will return to the sroot user. At the "sroot" user level, execute the following command:
# setPlatformAttributes
Note: By default init and sroot password configured as init/itsgrand3 and sroot/sroot01 for
development ova.
Info:
If EASG is enabled during CM deployment, system will ask for Response Code for the default "sroot" and "init" users. "sroot" user is restricted to
CLI only. "init" user can access CLI and SMI pages.
If EASG is disabled during CM deployment, system will directly ask for Password if you login using "sroot" and "init" users. Since, we have NOT
set the passwords, you cannot login at all. In this case, only Privileged user (for example, "ppminit" user can only login CLI and SMI)
EASG is used to allow Avaya Support personnel to troubleshoot customer issues.
If Do
Scenario 1: If EASG is enabled, system prompts you to enter the Respone code Generate response code for the sroot user:
http://ssdp.dr.avaya.com/ASG_WebMobile/ind
Scenario 2: If EASG is not enabled, system promts you to enter the password for As a Privileged user, enable EASG:
You must first enable EASG to set the passwords for the default
http://ssdp.dr.avaya.com/ASG_WebMobile/ind
After changing ecs.conf file, You will return to the sroot user. At the "sroot" user level, execute the following command:
# setPlatformAttributes
Note: By default init and sroot password configured as init/itsgrand3 and sroot/sroot01 for
development ova.
4. Go to Administration »» Server Administration and click on Download files under Miscellaneous. Browse the certificate and click on download
button. Take the File name of Download Files Results.
5. Click on Trusted Certificates under Security, click on add button. Paste the file name which took in above step and click open. Provide any name
and select Repositories C.
20. Server/Application Certificate Installation on CM
Before you begin:
1. Login to CM and generate Certificate Signing Request. Copy the key after generated request.
NOTE: We must give this ‘Common Name’ while adding End Entity in SMGR
2. Login to SMGR and add ‘End Entity’. To add End Entity, go to Services »» Security »» Certificates »» Authority. Provide all required inputs.
NOTE: We must give same ‘Common Name’ here which you already given in CM while generating CSR
In the Certificate Profile drop-down list, if you not see ENDUSER option, select the default option.
3. Check whether the end entity added or not, if added click on PUBLIC WEB. A new tab will open after clicking PUBLIC WEB. Go to that tab and
click on “Create Certificate from CSR” under Enroll. Provide Username and Enrollment code which was already given while adding end entity and
paste key which copied while generating CSR on CM.
After clicking OK a pem will download automatically, if not downloaded then click on Download Certificate.
4. Login to CM SMI page. Go to Administration »» Server Administration and click on Download files under Miscellaneous. Browse the certificate
and click on download button. Copy the File name of Download Files Results (The File name appears under the File column).
5. Click on Server/Application Certificates under Security, click on add button. Paste the file name which took in above step and give enrollment
password and click open select Repository C. Restart CM.
6. Reboot the CM.
If Do
Option 2: If you want to Add TLS signaling-group to AMS. Check AMS ‘Node Name’ and ‘Far-end Domain’.
use TLS
a. CM and AMS must have the same SMGR CA, so install the SMGR CA Certificate on AMS which is already
installed on CM.
To Install SMGR CA on AMS
Login to SMGR GUI.
Go to Services »» Security »» Certificates »» Authority
Under CA Functions click on CA Structures & CRLs and Download PEM file.
a. Login to AMS GUI and install SMGR CA Cert to Trust Store.
https://<AMS IP>:8443/emlogin/
3. Add TLS signaling-group to AMS. Check AMS ‘Node Name’ and ‘Far-end Domain’.
If added TCP signaling-group to AMS then add CM IP in AMS under Trusted Nodes.
Login to AMS GUI.
https://<AMS IP>:8443/emlogin/
If AMS is still showing Pending In Service (PINS) then restart AMS from GUI.
22. Add Media Gateway to CM
1. Login to Media Gateway and take the ‘Serial No’ by executing ‘show sys’ command.
# Execute ‘show mgc list’, if MG displays any CM IP which means currently this MG is registered with that CM. Execute below command to
remove that CM ip.
# Execute ‘clear mgc list’
# Now set your CM ip in MGs mgc list by executing below command.
# set mgc list < cm ip >
# Check whether your CM ip is added in the mgc list or not by executing below command.
# ‘show mgc list’
# Save the above configuration
# copy running-config startup-config
# Restart the Media Gateway.
# reset
Download SMGR CA Cert (SystemManagerCA.cacert.pem) and copy to any server like Linux or SM
Login to Media Gateway and execute below command to load .crt certificate
# Go to sat
# ch media-gateway 1
Link Encryption Type: tls-only
# save trans
Note:
CM Type is Standalone for Non-Cluster/Array CM
CM Type is Node for Cluster/Array CM
1. Make sure CM, SM, Domains and Location must be added in SMGR.
2. Add Entity Links in SMGR from SM to CM. Go to Elements »» Routing »» Entity Links »» New
SIP Entity 1 Means »» SM, SIP Entity 2 Means »» CM
3. Check Entity Links added or not.
Info: If, In case, Numbering Format field does not accept "private" value, then you must go to "change system-parameters customer options"
screen and go to page 6, and set the "Private Networking" field to "y".
5.
5. Check If Trunk Group is added or not.
Note: Incase if you are using public trunk then specify your dialed string details in
public-numbering page. # change public-numbering page
Check the Routing Policies added or not by just refreshing this page.
2. Add Dial Patterns. Go to Elements »» Routing »» Dial Patterns »» New and click on New, specify Dial Pattern, Min length, Max length and SIP
domain. Click on Add under ‘Originating Locations
and Routing Policies’ and select your location and Routing Policies, and click on commit.
Check the Dial Patterns added or not by just refreshing this page.
3. Check added Dial Patterns are reflected in matching Routing Policies or not. Go to Elements »» Routing »» Routing Policies »» Edit
1. Make sure the Dialed String is added in both SMGR and CM.
2. To add SIP station, Go to Users »» User Management »» Manage Users. Click on New button and provide all required data.
Login name will be in the email format. For example, [email protected]
4. To check in CM, Login to CM CLI, Goto SAT and execute ‘list station’
31. Generate and Install License For SMGR, SM, CM and AMS.
1. Login to SMGR UI and take the Primary Host ID.
Go to Services »» Licenses »» Server properties
2. Login to Weblg site with your handle and check whether you have permission for generating license. If you don’t have then either you Request
Access or reach out to respective product person for the license.
https://weblg.global.avaya.com/WebLGAura/
Prerequisite, Take Primary Host ID from SMGR, Login to SMGR GUI Go to Services »» Licenses »» Server properties
2. Select SMGR product from drop down and click on SMGR Version and paste the Primary Host ID that you copied in step1 and click on Add. After
Add that host ID must list under Host ID List. Also select the License Duration and Feature and click on Generate. Download the xml file.
Login to SMGR and install SMGR License which is generated above. To install Go To
Services »» Licenses »» Install license
31.2. Session Manager, SM
1. Take Primary Host ID from SMGR and login to Weblg site https://weblg.global.avaya.com/WebLGAura/
Go to Services »» Licenses »» Server properties
2. Select SM product from drop down and click on SM and paste the Primary Host ID that you copied in step1 and click on Add.
After you click Add, that host ID must list under Host ID List. Also select the License Duration, Product Information and Feature Information and
click on Generate. Download the xml file.
Note: Here I am generating license for 2 SMs that’s why I mentioned 2 for Session Manager Instances. So, based on your requirement fill the
Feature Information.
Download the ".xml" license file. (Optionally, rename it appropriately for your identification. For example, SMLicenseForSMGR229)
2. Select CM product from drop down and click on CM Version, Select Communication Manager and Call Center, Click on Next, Paste the Primary
Host ID that you copied in step1 and remove hyphen symbol from Host ID and again add hyphen symbol after Host ID and add five-digit number
click on Add button. After Add that host ID must list under Host ID List.
Also select the License Duration, Feature Information for Communication Manager and Call Center and click on Generate. Download the xml file.
Note: For Cluster/Array CM please do check Distributed CM and specify Distributed CM Instances.
Login to SMGR and install SM License which is generated above. To install Go To
Services »» Licenses »» Install license
31.4. Media Server, AMS
1. Take Primary Host ID from SMGR and login to weblg site https://weblg.global.avaya.com/WebLGAura/
Go to Services »» Licenses »» Server properties
To get the Primiary Host ID, Login to SMGR UI and take the Primary Host ID.
Go to Services »» Licenses »» Server properties
Note: Here I am generating license for 2 AMS that’s why I mentioned 2 for Media Server Instances so, based on your requirement fill the Feature
Information.
Login to SMGR and install AMS License which is generated above. To install Go To
Services »» Licenses »» Install license
32. Endpoints Configuration
3. Admin Procedure,
Select ADDR, and Specify Gateway, Mask and HTTP Server save the configuration.
Select SIP, Select SIP Global Settings, Specify the SIP Domain, and set Proxy Policy to Manual, save the configuration.
Select SIP Proxy Server, and Click on New, Give SIP Proxy (SM Asset IP), Transport Type and SIP Port (TCP: 5060, TLS: 5061), save the
configuration.
<For documentation team, use TCP>
Note: For TLS you must configure Http Server IP (Linux server and enable httpd service) in ADDR and have 46xxsettings.txt, 96x1Supgrade.txt/
96xxSupgrade.txt (Based on phone type), and SMGR CA cert file in /var/www/html location
46xxsettings.txt File
SET TLSSRVRID 0
SET TRUSTCERTS <SMGRCA Cert Name>
4. Restart the Emulator or Close and Open emulator again. And check the configuration.
Emulator should get your windows IP as phone IP.
Note: SIP Proxy Configuration must look like below which means the emulator get the cert for TLS registration from Httpd server.
32.2. J179Emulator
1. Download and install J179Emulator
http://135.27.162.154/share_folder/SetupJ179EmulatorSIP4_0_6_0.exe
2. Open J179 Emulator, click on Admin and provide default access code 27238, and click Enter
Perform the following Administration using the Up and Down arrows:
IP Configuration »» Check the Ethernet IPv4 address. (By default, softphone will take the IP address of your system on which the softphone
is installed)
IP configuration > Servers »» Specify HTTP Server IP (This is mandatory for SIP TLS calls). (Not requried for TCP)
SIP »» SIP global settings. Set SIP domain name and SIP proxy policy to Manual. (In the SIP domain field, enter the name provided for Hos
tname Domain field during the SM deployment)
SIP proxy list »» Give SIP Proxy (SM Asset IP), Transport Type and SIP Port (TCP: 5060, TLS: 5061), save the configuration.
Note: For TLS 221. you must configure Http Server IP (Linux server and enable httpd service) in ADDR and have 46xxsettings.txt, 96x1Supgrade.
txt/ 96xxSupgrade.txt (Based on phone type), and SMGR CA cert file in /var/www/html location
46xxsettings.txt File
SET TLSSRVRID 0
SET TRUSTCERTS <SMGRCA Cert Name>
3. Restart the Emulator or Close and Open emulator again. And check the configuration.
Emulator should get your windows IP as phone IP.
Note: SIP Proxy Configuration must look like below which means the emulator get the cert for TLS registration from Httpd server.
For Duplex CM
* In the Hostname or IP Address field, enter one of the duplex CM IP
* In the Alternate IP Address field, enter other Duplex CM IP
* In the Alias IPv4 Address field, Enter the Duplex CM Alias IP which is provided during Duplex CM Configuration in CM SMI Page.
For Simplex CM
* For Simplex CM, Hostname or IP Address and Alias IPv4 Address will be same
2. Select CM Type as Node.
3. Provide all required values in SNMP Attributes (S) Page
2. Check whether Load Balancer is enabled or not by just refreshing the page.
2. Check whether Load Balancer Details added or not by refreshing this page
4. Add Dialed String for DAC, this combination of code we will provided in Trunk group as TAC.
Backup Server Network Region is recommended to use. Because if the Preferred CM is down then the station/user can't Home on Preferred CM.
To avoid this configure Backup Server Network Region field (1-2000) and configure the Backup CMs in the same Network Region.
In this Configuration if the Preferred CM(ALMOND) goes down, then the user/station will home on the BACKUP SERVERS (CM) in the priority
defined above screenshot.
4. Administer COR in station form so that the user/station can act as per the homing policy.
In this configuration COR1 is CallByCall Policy and COR11 is Persistent Policy.
Note:
* CallByCall Policy behavior: When the call is initiating(off hook), User/Station can Home on any one of the Cluster CM. After call ends the user
/station will UNHOME from the CM.
* Persistent Policy behavior: When the call is initiating for the first time, user/station will home on the preferred CM. On all future calls user
/station will use same preferred CM for call processing.
Go to following page of Cluster FQDN and click "Download as PEM" under "CA: CertManagerCA"
https://Cluster_FQDN/ejbca/retrieve/ca_certs.jsp
Example: https://pusntzh135.apac.avaya.com/ejbca/retrieve/ca_certs.jsp
1. FTP SMGR's CA cert to CCM and execute the following commands on CCM. These commands are to be given from root ("su -" and not "su
root")
# ccm release cert-manager crtmgr -ac eventing-kafka-cp-kafka-kafkatruststore <smgr-ca.pem>
1.
"status": "CREATED",
"statusCode": 201,
Restart Kafka.
# kubectl -n avaya-kafka rollout restart sts eventing-kafka-cp-kafka
Restart Zookeeper
Sambhaji Gayake
3. Click on Trusted Certificates under Security, click on Add button. Paste the file name which you took in above step and click open. Provide any
name and select Repositories C.
4. Save the page once you are done with the required config. CM will prompt you to restart the CM.
5. Check kafka status using below command and verify the highlighted in the screenshot.
# kafkactl status
6. Login to CM CLI, Go to sat, Add CM procr IP and save the translations using sat command 'save translation'
Note: You must perform this on the first CM that you configured in Cluster environment .
7. Verify the Master CM IP in "cluster master-cm" page.
Login to CM CLI, Go to SAT and execute the following command.
# display cluster master-cm
8. Repeat step1 to step4 and step6 for remaining CMs in the cluster.
9. Stop all CMs using 'stop -acf' command.
2. Check Synchronization is automatically started with Master CM ( When SMGR recognized Master first time ), If not started then start
synchronization manually.
To do, Login to SMGR UI, Go to Inventory »» Synchronization »» Communication System
a. Deploy Duplex CMs with "CM Main/Survivable Max Users 41000", Follow below Link for deploying CM.
DeployingCMSimplexusingvCenterserver
b. Power ON both Duplex ESS CMs
c. Set the hostname for both the CMs from SMI Page.
Go to Administration »» Server Configuration »» Network Configuration
Update Host Name and click on change
d. Do the Duplex Configuration between ESS CMs. Follow below link.
CMDuplexConfiguration
e. Make sure that ESS CM version must be equivalent or greater than Main CM version. To check this execute below command and verify
Contains and UPDATE
# swversion
f.
g.
h.
Note: Starting from CM 10.2 Encrypt backup using pass phrase is mandatory. so please do provide a 14 digit pass phrase code
3. To check that the backup file is properly created with proper size.
Go to Administration »» Data Backup/Restore »» Backup Logs
Here two options are available to restore the backup. One is restore backup from remote server and the other one is to restore backup from CM
itself (for this you need to copy the backup file to CM )
3. Once you click on View button you will see all backup files available in that directory.
Identify the backup file and select the file and also fill the Restore/Preview Settings
Note: The Pass Phrase is mandatory if the backup file is take on 10.2 CM and you need to provide the same Pass Phrase code to restore the
backup.
4. After successful restore Restart the CM.
Go to Administration »» Server »» Shutdown Server
3. Ensure that you configured proper repo, if not please use below repo
vi /etc/yum.repos.d/rhel8.repo
[codeready]
name=Red Hat Enterprise Linux $releasever $basearch
baseurl=http://10.129.176.245/RHEL-REPOSITORY/RHEL8/updates/codeready-builder-for-rhel-8-x86_64-rpms
enabled=1
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
[appstream]
name=Red Hat Enterprise Linux $releasever $basearch
baseurl=http://10.129.176.245/RHEL-REPOSITORY/RHEL8/updates/rhel-8-for-x86_64-appstream-rpms
enabled=1
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
[server-base]
name=Red Hat Enterprise Linux $releasever $basearch
baseurl=http://10.129.176.245/RHEL-REPOSITORY/RHEL8/updates/rhel-8-for-x86_64-baseos-rpms
enabled=1
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
[epel]
name=Red Hat Enterprise Linux $releasever $basearch
baseurl=http://10.129.176.245/RHEL-REPOSITORY/RHEL8/updates/epel
enabled=1
gpgcheck=0
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
6. Verify that the manifest is for the files in the current directory
cd /mnt/iso
sha256sum -c CM-*.mf
7. (optional) Verify that the certificate file is from Avaya (Download# https://confluence.forge.avaya.com/download/attachments/137162082
/AvayaRootCert.pem?api=v2)
10. Install the Red Hat RPMs required by CM, you can run ./install-CM -c Large to copy/paste the yum install command
yum localinstall -y /mnt/iso/avaya-cm-setup*.rpm
Note: As below RPM versions are updating in 10.2 we need to execute below commands for 10.2 Software Only CM
yum module reset -q -y php
yum module enable -y php:7.4
yum module reset -q -y nginx
yum module enable -y nginx:1.20
yum update -y php
yum update -y nginx-filesystem
2. Ensure that the proper repo is configured in Rhel8.4, if not please use below repo.
vi /etc/yum.repos.d/rhel8.repo
[codeready]
name=Red Hat Enterprise Linux $releasever $basearch
baseurl=http://10.129.176.245/RHEL-REPOSITORY/RHEL8/updates/codeready-builder-for-rhel-8-x86_64-rpms
enabled=1
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
[appstream]
name=Red Hat Enterprise Linux $releasever $basearch
baseurl=http://10.129.176.245/RHEL-REPOSITORY/RHEL8/updates/rhel-8-for-x86_64-appstream-rpms
enabled=1
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
[server-base]
name=Red Hat Enterprise Linux $releasever $basearch
baseurl=http://10.129.176.245/RHEL-REPOSITORY/RHEL8/updates/rhel-8-for-x86_64-baseos-rpms
enabled=1
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
[epel]
name=Red Hat Enterprise Linux $releasever $basearch
baseurl=http://10.129.176.245/RHEL-REPOSITORY/RHEL8/updates/epel
enabled=1
gpgcheck=0
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
c. Ensure that the network interface naming convention is configured to old network scheme names. System Manager requires old network
scheme eth0 and eth1.
Note: If you do not configure the old network scheme names, the deployments fails.
d. Procedure:
e. Log in to the RHEL instance as a default user and switch to the root account. To create a directory, run the following command:
mkdir /swlibrary/installer
h. To copy the ISO content to the directory, run the following command
cp -rvf /mnt/* /swlibrary/installer
m. Set the system-wide crypto policy to LEGACY on the RHEL 8.x and later operating system by running the following command.
update-crypto-policies --set LEGACY
p. Run below command to change Network interface names to eth0 and eth1
sh /swlibrary/installer/setnetwork.sh
r.
b. Log in to the RHEL instance as a default user and switch to the root account. You must run the installer as a root user.
c.
4.
b.
c. Go to, cd /swlibrary/installer.
The system checks for the environment against the installer. During this time, you cannot perform any other action.
If the check fails, take necessary steps to fix errors and perform the installer check again.
g. In the Enter profile field, check the message and type the required System Manager profile from the following:
Press 1 for profile 2
Press 2 for profile 3
Press 3 for profile 4
k. At the Enhanced Access Security Gateway (EASG) prompt, read the EASG information, and do one of the following:
To enable EASG (Recommended), type 1.
To disable EASG, type 2.
l. Select the required Backup definition parameter for System Manager schedule backup.
4. Please see the log /var/log/Avaya/SMGR_Patch.log for more details about patch installation.
a. Contain the same version of the software that includes software packs.
b. Contain the same profile for primary and secondary System Manager Geographic
c. Contain the same version of the System Manager software that includes service pack and software patches.
d. Contain the same parent domain names for two System Manager systems. For example, smgr.abc.com and smgr.xyz.com are invalid
domain names because the parent domain names abc and xyz are different.
e. Communicate with each other over the network by using the IP address and FQDN.
f. In the Geographic Redundancy setup, the primary and secondary System Manager must use the same VFQDN.
h. Use DNS to ensure that the name resolution is automatic. Otherwise, you must resolve the IP address and the host name in the /etc
/hosts file on the primary and secondary System Manager servers.
i.
h.
a. On the web browser, type https://<Fully Qualified Domain Name>/SMGR, the System Manager URL
b. On the address bar, click the Lock icon.
c. Click View certificates.
d. On the Certificate dialog box, do the following:
Click on the Details tab.
Scroll down and click the CRL Distribution Points field.
The system displays the CRL URL in the text box.
For example: http://<vFQDN>/ejbca/publicweb/webdist/certdist?cmd=crl&issuer=CN=System%20Manager%20CA,OU=MGMT,
O=AVAYA
Press Ctrl+C and copy the URL in Notepad for configuring CRL download in the Geographic Redundancy set up.
Click Ok
a. On the web browser, type https://<Fully Qualified Domain Name>/SMGR, the System Manager URL
b. On the address bar, click the 'Not Secure'
c. On pop up click on Certificate is not valid, a new certificate viewer will be opened
d. On Certificate Viewer popup, click on Details
Under Certificate Fields, Select CRL Distribution Points
From Field Value copy URL and paste it in notepad
For example: http://grsmgr.avaya.com/ejbca/publicweb/webdist/certdist?cmd=crl&issuer=CN=System%20Manager%20CA,OU=MGMT,
O=AVAYA
e. Close the pop window
f.
c. Replace the vFQDN in the CRL with the IP address of the primary System Manager server.
For example, the CRL in the certificate is:
http://grsmgr.avaya.com/ejbca/publicweb/webdist/certdist?cmd=crl&issuer=CN=System%20Manager%20CA,OU=MGMT,O=AVAYA
Where, <vFQDN> and <ip-address> are the respective vFQDN and IP address.
e. On the System Manager web console, click Services > Security > Configuration > CRL Download > Add
In Job Name, type the job name
In Job Frequency, set the frequency and recurrence to schedule the job within a few minutes after the CRL addition. (Just increase the
Task time)
In CRL Distribution Point, paste new CRL and click on Add.
Once you click on Add, a CRL URL will be listed under Distribution Point
Click on Commit
Adding the trusted certificate of primary server to the secondary System Manager server
Procedure:
b. On the System Manager web console, click Services > Security > Certificates > Authority > CA Functions > CA Structure & CRLs
download the PEM file
c. Log in to the secondary System Manager web console.
d. On the System Manager web console, click Services > Inventory > Manage Elements
Select the System Manager and click on More Actions > Manage Trusted Certificates > Add
Select Import from file and choose file
Click on Retrieve Certificate
Click on Commit
Configuring Geographic Redundancy
Before you begin
a. Log on to the Secondary System Manager web console of the standalone server that you require to designate as the secondary server
and perform the following:
On the System Manager web console, click Services > Geographic Redundancy >Configure
In the dialog box, provide the details of the primary System Manager server in the following fields:
* Primary Server Username
Enter the system administrator user name that you use to log on to the primary System Manager server.
Note: The configuration process takes about 30 minutes. However, the duration might vary depending on the size of the
data on the primary System Manager server.
The server that you configured becomes the secondary server and the other standalone server becomes the primary System Manager
server.
b. To view the status of the Geographic Redundancy configuration during the restart of the two application servers, perform one of the
following:
Log on to the web console of the primary System Manager server and perform the following:
a. On the System Manager web console, click Services > Geographic Redundancy
b. Refresh the GR Health page.
If Enable is available, the configuration is complete.
Log in to the secondary System Manager server as system administrator by using the command line interface and perform the following:
a. Do tail –f /home/ucmdeploy/quantum/autoReconfig.log
The system displays the progress during the restart of the two application servers. When the second application server restart
completes, the system displays the following messages:
SMGR :: operationStatus=success
Ensure that CLI passwords on primary and secondary System Manager servers do not expire.
60 days after the System Manager CLI password expires, Geographic Redundancy becomes nonoperational. You must set a new password on
primary and secondary System Manager servers for Geographic Redundancy to become operational again.
Procedure:
a. On the System Manager web console, click Services > Geographic Redundancy.
Note: Because the server becomes unavailable, you cannot gain access to the web console. Wait until the process is complete
before you continue with the next step.
c. If the enabling process is successful, the system displays the Geographic Redundancy replication status as Enabled.
If the process fails, the system displays an error message with the replication status as Failed on the primary the System Manager web
console.
The primary server remains in the failed state while the secondary server rolls back to the previous state. Verify if the system has raised
an alarm for a temporary network connectivity failure. Retry when the network connectivity is restored. If the problem persists, contact
Avaya service personnel.
d.
# tail -f /var/log/Avaya/datamigration/data_migration.log
# show system
Check the Model and download the firmware as per your MG Model
2. Download G450/G430 latest firmware from below link to any linux server.
Username and Password qualityrules/qualityrules
G450 http://info.dr.avaya.com/defty/mg/callaway_hw/BUILD_43_11_0
G450v4 http://info.dr.avaya.com/defty/mg/saturn_hw/BUILD_43_11_0
G430 http://info.dr.avaya.com/defty/mg/venus_hw/BUILD_43_11_0
G430v3 http://info.dr.avaya.com/defty/mg/mars_hw/BUILD_43_11_0
Here,
/home/dvit/g450_sw_43_11_0.bin is the firmware full path in the linux server
172.16.0.2 is the linux server IP
1. Deploy CM with "CM Survivable Max Users 1000", Follow below Link for deploying CM.
DeployingCMSimplexusingvCenterserver
2. Power ON LSP.
3. Make sure that LSP CM version must be equivalent or greater than Main CM version. To check this execute below command and verify Contains
and UPDATE
# swversion
Info: When deploying CM, by default the host name is taken as "server1". This leads to confusion when taking backup or generating a license (as
we give the CM host name value), as all CMs by default take "server1" as their host name.
Note: Before install Certs, ensure that SMGR and LSP must be running on same date and time.
5. Install SMGR CA Certificate and Server/Application Certificate on LSP. Follow below links.
SMGRCACertificateInstallationonCM
Server/ApplicationCertificateInstallationonCM
Ensure that SMGR is always greater or equal to CM version.
6. Login to LSP CM SMI Page and configure the below parameters in the Server Role page
Go to Administration »» Server Configuration »» Server Role
* SID
* MID
* Registration address at the main server
Note:
If your Main CM is Duplex CM then provide Duplex CM Alias/Virtual IP here.
If your Main CM is Simplex CM then provide Simplex CM Physical IP here.
* File Synchronization address at the main cluster
Note:
If your Main CM is Duplex CM then provide Duplex CMs physical IPs as mentioned below.
If your Main CM is Simplex CM then provide Simplex CM Physical IP here.
* Main Server's Memory Setting
By default, SID and MID value is set to 1. However, you can configure MID value.
7. Login to LSP CM SMI Page and change the SID value in Network Configuration Page
Go to Administration »» Server Configuration »» Network Configuration
By default, the Server ID set to 1, you can change as per your configuration requirement.
8. Login to CM CLI go to SAT and add LSP IP in node-name page using below command.
# change node-names ip
8.
9. To register LSP with Main CM we need media resource. Media resource can be Media Gateway (G450/430) Or Media Server (AMS)
Register LSP using Media Gateway
* Login to Media Gateway CLI and execute command and ensure that your Main CM IP is configured under PRIMARY MGC HOST. Check
below
* Now add your LSP IP in SECONDARY MGC HOST and ensure that IP is displayed.
Register LSP Using Media Server
* Before you begin make sure Main CM is configured at least one AMS. To check this go to Main CM SAT and execute below command.
# list media-server
* If Media Server is configured and showing its state as INS then add this Media Server number in Survivable page using below command.
# change survivable-processor NLSP (LSP name )
Go to page 2, and set Priority with respect to Media servers : 2
Go to page 3 and provide Media Server number and submit the form.
10. Once all above configuration is done LSP should registered with Main CM. To check this go to Main CM SAT and execute below command
# list survivable-processor
11.
Limitations (and work arounds)
Limitation: Every license generated is linked to a specific SMGR (SMGR Host ID)
Description: When we generate a license for CM, SM, or other components, we must specify the Host ID of the SMGR. Every SMGR has a Unique Host
ID. This means, if you generate a License using an SMGR's Host ID deployed on 148.147.161.229, then all the licenses generated using this Host ID must
be installed on the same SMGR.(Users > User Management > Manage Users).
For example, if your SMGR IP is 148.147.161.229, and the Primary Host ID of this SMGR is V4-DB-16-B3-3A-D4-01, then if you generate a License for
CM using this Host ID (V4-DB-16-B3-3A-D4-01), then you must install this license on the same SMGR (148.147.161.229). This License will not work if you
try to install in on another SMGR that a different IP.
Troubleshooting:
If your Stations are not getting registered to Session Manager, then check the following:
1. On SMGR, go to Elements > Session Manager > Dashboard. In the below screenshot, the License Mode is Restricted. Which means your SM license is
not active, or invalid, or expired.
Solution: Go to WebLg, and generate a new SM license. Then, install the SM license in SMGR (Services > Licenses > Install License). The status of the Li
cense Mode must display, "Normal".
2. While you "Add SIP stations from SMGR", when you click Commit, you might encournter possible errors, and here they are.
Scenario 1: For example, Unable to add Stations. Check your System Customer options page.
For this, go to CM CLI and enter: ch sys cus.
Increase the "Maximum Stations" limit. For example, enter 1000 or based on your CM Footprint you selected during deployment.
Scenario 3: If you get the following errors, in SMGR, go to Users > User Management > Manage Users. Select the user for which the error popped up, and
click Edit.
Click Identity tab, and update the Password. Provide a new password that was not provided to other users earlier.
3. When you launch a Softphone, ideally it should open the Admin Password screen. If your Softphone opens with a dafult Extention, then you must do the
following:
On the Keyboard, press "NumLock" key (lock your numbers), and press "Del" key. It will then delete the extension and opens up the Admin Password
screen. Then enter, 27238 (craft) and login.
Approach 2
1. Login to CM CLI and switch to sroot user. Stop CM services using below command.
# stop -acf
2. Install cluster on CM using below command and provide necessary inputs.
# installCMCluster -i
2.
Customer ID:
Data Center Name:
Other Data Center Name/s:
Kafka FQDN:
Primary Zookeeper FQDN:
Secondary Zookeeper FQDN:
ADC URL:
My FQDN:
Alias FQDN:
Note: For Simplex CM My FQDN and Alias FQDN is same.
For Duplex CM these two will be different.
3.
3. Start CM using below command.
# start -ac
Note: If the configuration is not proper/missed/CSP is not in good state, then CommunicaMgr Service will be taking more time for UP. This we
can check by doing below step 4.
4. Check kafka status using below command and verify the highlighted in the screenshot.
# kafkactl status