This material is protected by the copyright laws of the United States and other
countries. It may not be reproduced, distributed, or altered in any fashion by
any entity (either internal or external to Lucent Technologies), except in
accordance with applicable agreements, contracts or licensing, without the
express written consent of the Enterprise Networks (EN) Global Learning
Solutions (GLS) organization and the business management owner of the
material.
Lucent Technologies. Offices are located in Denver CO, Columbus OH,
Middletown NJ, and Basking Ridge NJ, USA.
Copyright and legal notices
Trademarks Lucent Technologies has made every effort to supply the following trademark
information about company names, products, and services mentioned in the
UCS 1000 R4.2 documentation library:
•Adobe Systems, Inc. — Trademarks: Adobe, Acrobat.
•Enhanced Software Technologies, Inc. — Trademark: Quickstart.
•Equinox Systems, Inc. — Registered trademark: Equinox
•PCI Industrial Computer Manufacturers Group — Registered trademarks:
CompactPCI and PICMG.
•Santa Cruz Operation, Inc. — Registered trademarks: UnixWare.
•Sun Microsystems — Registered trademarks: Sun, Sun Microsystems,
Sun Workstation, Solaris (computer and peripherals). Trademarks:
Solaris (operating system utilities) and Java
•UNIX System Laboratories, Inc. — Registered trademarks: UNIX.
•Xerox Corporation — Trademarks: Ethernet.
Limited WarrantyLucent Technologies provides a limited warranty on this product. Refer to the
“Limited Use Software License Agreement” card provided with your package.
Lucent Technologies has determined that use of this electronic data delivery
system cannot cause harm to an end user's computing system and will not
assume any responsibility for problems that may arise with a user's computer
system while accessing the data in these documents.
Every effort has been made to make sure that this document is complete and
accurate at the time of release, but information is subject to change.
UCS 1000 R4.2 Administration 585-313-507Issue 3 April 2000 v
Copyright and legal notices
United States FCC
Compliance
Information
Part 15: Class A statement. This equipment has been tested and found to
comply with the limits for a Class A digital device, pursuant to Part 15 of the
FCC Rules. These limits are designed to provide reasonable protection
against harmful interference when the equipment is operated in a commercial
environment. This equipment generates, uses, and can radiate radiofrequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause harmful
interference, in which case the user will be required to correct the
interference at his own expense.
Canadian
Department of
Communications
(DOC) Interference
Information
This digital apparatus does not exceed the Class A limits for radio noise
emissions set out in the rad io interference regulati ons of the Canadian
Department of Communications.
Le Présent Appareil Nomérique n’émet pas de bruits radioélectriques
dépassant les limites applicables aux appareils numériques de la class A
préscrites dans le reglement sur le brouillage radioélectrique édicté par le
ministére des Communications du Canada.
Toll FraudToll fraud is the unauthorized use of your telecommunications system by an
unauthorized party, for example, persons other than your company’s
employees, agents, subcontractors, or persons working on your company’s
behalf. Note that there may be a risk of toll fraud associated with your
telecommunications system and, if toll fraud occurs, it can result in
substantial additional charges for your telecommunications services.
UCS 1000 R4.2 Administration 585-313-507Issue 3 April 2000 vi
Copyright and legal notices
Your Responsibility for Your System’s Security
You and your system manager are responsible for the security of your system
and for preventing unauthorized use. You are also responsible for reading all
installation, instruction, and system administration documents provided with
this product in order to fully understand the features that can introduce risk of
toll fraud and the steps that can be taken to reduce that risk. Lucent
Technologies does not warrant that this product is immune from or will
prevent unauthorized use of common-carrier telecommunication services or
facilities accessed through or connected to it. Lucent Technologies will not be
responsible for any charges that result from such unauthorized use.
Lucent Technologies Fraud Intervention and Corporate Security
If you suspect that you are being victimized by toll fraud and you need
technical support or assistance, call the Lucent Technologies National
Customer Care Center Toll Fraud Intervention Hotline at 1 800 643-2353.
Aside from whether immediate support is required, all toll fraud incidents
involving Lucent products or services should be reported to Lucent Corporate
Security at 1 800 821-8235. In addition to recording the incident, Lucent
Corporate Security is available for consultation on security issues,
investigation support, referral to law enforcement agencies, and educational
programs.
UCS 1000 R4.2 Administration 585-313-507Issue 3 April 2000 vii
Copyright and legal notices
Documentation
Ordering
Information
Call or Write
Lucent Technologies Publications Center
2855 N. Franklin Road
Indianapolis, IN 46219
To order a document, contact the Lucent Technologies Publications Center
and specify the 9-digit document number, the issue number, and the issue
date.
Standing Orders
You can be placed on a standing order list for this and other documents you
may need. Standing order will enable you to automatically receive updated
versions of individual documents or document sets, billed to account
information that you provide. For more information on standing orders, or to
be put on a list to receive future issues of this document, contact the Lucent
Technologies Publications Center (see the contact information above).
UCS 1000 R4.2 Administration 585-313-507Issue 3 April 2000 viii
Contents
Copyright and legal noticesiii
About This Bookxxii
UCS 1000 R4.2 Administration 585-313-507Issue 3 April 2000 xxi
Overview
About This Book
This document describes the procedures needed to perform full system
administration for the following areas:
•The UNIX operating system
•The voice system
•Databases
•Switch interfaces
This document also describes the procedures needed to create and access
system reports and to monitor the system.
UCS 1000 R4.2 Administration 585-313-507Issue 3 April 2000 xxii
About This Book Intended Audiences
Intended Audiences
The primary audience for this document are system administrators. This
includes:
•On-site technicians who perform system administration at the customer
site
•End customers who choose to administer their own systems
Secondary audiences include the field support personnel.
We assume that the primary users of this book have completed the UCS
1000 R4.2 hardware installation and maintenance training course. See Using
the CD-ROM Documentation on page xxxvi for more information.
How This Book Is Organized
This document is designed to take you step by step through the system
administration process. Each chapter contains procedures for a specific
product area that requires administration.
UCS 1000 R4.2 Administration 585-313-507Issue 3 April 2000 xxiii
About This Book How This Book Is Organized
Administration Procedures and Information
See Chapter 1, Administration Overview , to familiarize yourself with the user
interface and the system administration process including the user interface
and the menus.
See Chapter 2, UNIX Administration
SYSADM menu and the procedures to perform basic UnixWare-level
administration.
See Chapter 3, Voice System Administration
access the Voice System Administration menu and a description of all the
administrative options. This chapter also contains the reference and
procedural information for the Configuration Management option.
See Chapter 4, Switch Interface Administration
reference information for administering the supported analog and digital
switch interfaces.
See Chapter 5, Database Administration
information for administering databases for use with the voice system.
See Chapter 6, Peripheral Administration , for procedures and reference
information for configuring and administering the peripheral equipment
connected to your voice system, namely modems, printers, and remote
terminals.
UCS 1000 R4.2 Administration 585-313-507Issue 3 April 2000 xxiv
, for information about how to access the
, for information about how to
, for the procedures and
, for the procedures and reference
About This Book Conventions Used in This Book
See Chapter 7, Common Administration , for quick-reference information for
some of the more common administrative tasks. Daily administration includes
running system reports; performing common procedures such as system
monitoring, media formatting, and backups; and administering the date and
time.
Reference Material
See Appendix A, Summary of Commands, for an alphabetical list of the
commands in the UCS 1000 R4.2 command language.
See the Glossary for help in identifying and defining commonly used terms
and acronyms.
To Locate Specific Topics
This book includes an alphabetical index at the end for quick access to
specific topics.
Conventions Used in This Book
This section describes the typography and other conventions that are used in
this book.
UCS 1000 R4.2 Administration 585-313-507Issue 3 April 2000 xxv
About This Book Conventions Used in This Book
Note:The screens shown in this book are examples only. The screens
you see on your system may be similar, but not exactly the same
in all cases.
Terminology•The word “type” means to press the key or sequence of keys specified.
For example, an instruction to type the letter “y” is shown as
Type y to continue.
•The word “enter” means to type a value and then press the ENTER key
on the keyboard. For example, an instruction to type the letter “y” and
ENTER is shown as
press
Enter y to continue.
•The word “select” means to move the cursor to the desired menu item
and then press
the start test option on the Network Loop-Around Test screen and then
ENTER is shown as
press
Select:
> Start Test
ENTER. For example, an instruction to move the cursor to
UCS 1000 R4.2 Administration 585-313-507Issue 3 April 2000 xxvi
About This Book Conventions Used in This Book
•The system displays menus, screens, and windows. Menus (Figure 1)
present options from which you can choose to view another menu, or a
screen or window. Screens and windows both show (Figure 2 on page
xxviii and Figure 3 on page xxix) and request (Figure 4 on page xxix and
Figure 5 on page xxx
Figure 1. Example of a UCS 1000 R4.2 Menu
) system information.
UCS 1000 R4.2 Administration 585-313-507Issue 3 April 2000 xxvii
About This Book Conventions Used in This Book
Figure 2. Example of a UCS 1000 R4.2 Screen Showing Information
UnixWare Installation Primary Hard Disk Partitioning
In order to install LINCS, you should reserve a UNIX system
partition (a portion of your hard disk’s space) containing 100%
of the space on your primary hard disk. After you press ’ENTER’
you will be shown a screen that will allow you to create new
partitions, delete existing partitions or change the active
partition of your primary hard disk (the partition that your
computer will boot from).
WARNING: All files in any partition(s) you delete will be
destroyed. If you wish to attempt to preserve any files from an
existing UNIX system, do not delete its partitions(s).
The UNIX system partition that you intend to use on the primary
hard disk must be at lease 4200 MBs and labeled “ACTIVE.”
Press ’ENTER’ to continue
UCS 1000 R4.2 Administration 585-313-507Issue 3 April 2000 xxviii
About This Book Conventions Used in This Book
Figure 3. Example of a UCS 1000 R4.2 Window Showing Information
Figure 4. Example of a UCS 1000 R4.2 Screen Requesting Information
UNIX System Installation Set Slice Sizes
Please select whether you would like the recommended slice
sizes or would like to customize the slice sizes.
Your choices are:
1. Recommended Slice Sizes
2. Customize Slice Sizes
Press ’1’ or ’2’ followed by ’ENTER’: 1
UCS 1000 R4.2 Administration 585-313-507Issue 3 April 2000 xxix
About This Book Conventions Used in This Book
Figure 5. Example of a UCS 1000 R4.2 Window Requesting Information
Keyboard and
Telephone Keypad
Representations
•Keys that you press on your terminal or PC are represented as capitalized
BOLD text. For example, an instruction to press the Enter key is shown
as
Press ENTER.
•Two or three keys that you press at the same time on your terminal or PC
(that is, you hold down the first key while pressing the second and/or third
key) are represented as a series of small, capitalized
separated by the
plus sign (+). For example, an instruction to press and
BOLD text
hold “Alt” while typing the letter “d” is shown as
Press ALT+D
•Function keys on your terminal, PC, or system screens, also known as
soft keys, a re represented as capitalized
BOLD text followed by the
function or value of that key enclosed in parentheses. For example, an
instruction to press function key 2 is shown as
F2 (Choices).
Press
UCS 1000 R4.2 Administration 585-313-507Issue 3 April 2000 xxx
Loading...
+ 715 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.