|
Table Of Contents
A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - R - S - T - U - V - W -
Index
A
accounts
Microsoft SQLServer
CDR database B-6
device database B-6
Unified Communications Manager Applications Billing Server B-4
ACS mode
authentication 6-10
Service Monitor, using in 6-12
user roles and privileges, modifying 6-12
users, configuring 6-10
adding
Cisco 1040 4-8
TFTP server to Service Monitor 4-3
threshold groups
CVTQ 5-4
sensor 5-9
Unified Communications Manager credentials 3-4
administering Service Monitor
SNMP, using to manage Service Monitor
queries, configuring for 6-14
security, configuring for queries 6-15
system application MIB log file, viewing 6-15
Applications Billing Server. See accounts.
archiving call metrics
disabling 4-5
enabling 4-5
audience for this document ix
authentication
ACS
ACS mode 6-10
and authorization 6-10
fallback mode F-2
Microsoft SQLServer
enabling mixed authentication B-6
user accounts B-6
non-ACS mode 6-10
B
backing up
call metrics files 6-7
Service Monitor
database, manually 6-4
database, using Common Services 6-5
data files 6-7
C
CallManager. See Cisco Unified Communications Manager (Unified Communications Manager)
call metrics
archiving, enabling and disabling 4-5
files 6-7
backing up 6-7
deleting 6-7
cautions
license limit
exceeding D-4
incrementing beyond D-3
significance of x
smuser password, updating 3-14
space in cluster ID 3-4
Unified Communications Manager database B-5
CDR database
account B-6
password B-6
Unified Communications Manager credential status 3-3
CDR DB. See CDR database
Cisco 1040
adding 4-8
deleting 4-12
failover, understanding 4-16
resetting 4-11
unreachable, trap 4-18
web interface 4-15
Cisco Secure Access Control Server (ACS) 6-10
Cisco Security Agent B-6
Cisco Unified Communications Manager (Unified Communications Manager)
configuring B-1
credentials 3-2
hostname 3-6
version used 3-10
Cisco Unified Operations Manager, as a trap receiver 3-1
clusters. See Cisco Unified Communications Manager (Unified Communications Manager)
codecs
in MOS violation SNMP trap C-3
reports, generated by 2-5
CVTQ report 2-9
sensor report 2-13
thresholds, setting
for CVTQ groups 5-4
for sensor groups 5-9
global values 5-2
concealment ratios C-3
configuring
DHCP 4-6
DNS 4-6
sensor
default configuration file 4-4
primary Service Monitor 4-4
secondary Service Monitor 4-4
Service Monitor
as a billing server B-4
initially 2-2
SSL 6-16
system, SNMP queries 6-14
Unified Communications Manager B-1
users 6-10
CiscoWorks local login module 6-10
using ACS mode 6-10
credentials, Unified Communications Manager
adding 3-4
editing 3-6
verifying 3-2
CVTQ
reports 2-8
threshold group
adding 5-4
deleting 5-8
D
daemon manager, starting and stopping 6-20
database
application suite 6-6
backup, scheduling considerations 6-5
cmf password, changing 6-18
directory and virus scanning software A-1
Service Monitor
backing up, manually 6-3
backing up, using Common Services 6-5
password, changing 6-7
retention period 3-13
data purge schedule, updating 6-1
data-retention-days
configuration-specific default values 3-13
configuration-specific recommendations 3-13
Daylight Saving Time 4-11
debugging, enabling 6-8
deleting
call metrics archive files 6-7
Cisco1040 4-12
CVTQ group 5-8
files from TFTP server 4-12
sensor 4-12
sensor group 5-12
TFTP server from Service Monitor 4-4
Unified Communications Manager credentials 3-8
device database
account B-6
name B-6
password B-6
Unified Communications Manager credential status for 3-3
device DB. See device database
DHCP, configuring 4-6
directory number
entering, as endpoint 5-11
wild cards, using in 2-3
disabling
call metrics archiving 4-5
debugging 6-8
DN. See directory number
DNS configuration
and sensors 4-6
and Unified Communications Manager 3-2
documentation x
audience for this ix
typographical conventions in ix
E
editing
Cisco 1040
default configuration 4-16
threshold groups
CVTQ 5-4
sensor 5-9
Unified Communications Manager credentials 3-6
enabling
call metrics archiving 4-5
debugging 6-8
endpoint
IP address 5-11
wild cards, using 2-3
exporting
most impacted endpoints reports, automatically 3-12
PDF file, limits 2-2
reports, manually 2-2
F
failover, Cisco 1040 4-16
filenames
log files 6-9
reports, automatically generated 3-13
sensor configuration
default 4-15
sensor-specific 4-15
sensor image 4-8
files
call metrics 6-7
configuration
sensor default 4-4
history log file, maintaining 6-8
log files 6-8
G
global thresholds 5-2
restoring default 5-2
updating 5-2
H
hostname
Service Monitor, changing 6-16, 6-19
Unified Communications Manager, confirming 3-6
HTTP
Unified Communications Manager credential status 3-3
username and password 3-6
HTTPS
Unified Communications Manager credential status 3-3
username and password 3-6
I
IP address
entering as endpoint 5-11
Service Monitor system, changing 6-19
wild cards, used when entering 2-3
K
keepalive 4-16
known phone count
understanding 3-9
updating 3-11
L
license
evaluation, using D-3
file
obtaining D-2
registering D-2
limit 3-9
exceeded D-3
increasing D-2
upgrading D-2
log files
by module 6-9
debugging, enabling and disabling 6-8
history 6-8
location 6-8
maintaining 6-8
login, CiscoWorks
failure F-2
fallback mode F-2
login module F-2
low-volume schedule, viewing 3-13
M
managing log files 6-8
MIBs
system application, log file 6-15
used by Service Monitor C-1
N
non-ACS mode
authentication 6-10
CiscoWorks Local Login module 6-10
users, configuring 6-10
O
Operations Manager, as a trap receiver 3-1
P
password
CDRM database 3-3
cmf database 6-18
Service Monitor database 6-7
Permission Report 6-10
phones
license limit 3-9
monitored 3-9
total known count 3-9
updating known phone count 3-11
popup blockers, disabling A-1
port monitor 4-12
primary Service Monitor
configuring 4-4
setting a 4-8
viewing 4-13
privileges, configuring on Cisco Secure ACS 6-12, F-2
processes
Service Monitor 6-13
starting and stopping 6-13
properties, configuring
data purge 6-1
diagnostic report wait 3-15
export limit, configuring 3-15
low-volume schedule 6-1
R
registering sensors 4-15
reports
accessing more than 2,000 records 2-4
configuring
export, number of CSV records 3-15
number of endpoints for 3-12
search time 3-15
filenames, automatically generated 3-13
most impacted endpoints, exporting 3-12
resetting Cisco 1040 4-11
restoring database
from Common Services backup 6-6
manually 6-4
resuming
sensor for monitoring 3-11
Unified Communications Manager cluster for monitoring 3-11
roles, user
Cisco Secure ACS, configuring 6-12
Cisco Secure ACS, modifying 6-10
Common Services 6-11
RSPAN 4-12
S
schedule
data purge, updating 6-1
low-volume, updating 6-1
low-volume, viewing 3-13
scheduling
database backup 6-5
secondary Service Monitor
configuring 4-4
setting a 4-8
viewing 4-13
secure mode 6-16
Secure Socket Layer 6-16
security
browser-server 6-16
certificate 6-18
SNMP queries 6-15
sensor
registration explained 4-15
report 2-5
Service Monitor
IP address, changing 6-19
processes, stopping and starting 6-13
SFTP
directory path B-4
server process 6-13
shut switch port 4-12
smuser
password, updating B-5
SNMP
queries, configuring security for 6-15
trap receivers 3-1
Windows service 6-14
SNMP, using to manage Service Monitor 6-13
SNMP queries, configuring for 6-14
Windows SNMP Service, enabling or disabling 6-14
Windows SNMP Service, installing and uninstalling 6-14
Windows SNMP Service status, determining 6-14
SNMP queries, configuring security for 6-15
system application MIB log file, viewing 6-15
SNMP MIBs, Service Monitor support for E-1
sample MIB walk E-7
system application MIB implementation E-1
SPAN 4-12
SQL authentication on Unified Communications Manager B-6
SSL, enabling 6-16
starting
daemon manager 6-20
Service Monitor
processes 6-13
user interface 1-4
stopping
daemon manager 6-20
QOVR process 4-7
Service Monitor processes 6-13
suspending
sensor from monitoring 3-11
Unified Communications Manager cluster from monitoring 3-11
switch
IP address for 4-15
port, shutting 4-12
system administration 6-1
system application MIB implementation E-1
resource MIB tables E-1
element status information E-4
installed elements E-2
installed packages E-2
package status information E-3
process map E-7
scalar variables E-6
status of elements previously run E-5
status of packages previously run E-5
sample MIB walk E-7
System Identity Setup User
in Common Services F-2
on Cisco Secure ACS F-3
T
TFTP server
adding to Service Monitor 4-3
deleting from Service Monitor 4-4
thresholds
global 5-2
group
CVTQ 5-4
priority for CVTQ 5-8
sensor 5-9
sensor priority 5-12
time, updating on the server 6-20
trap receivers
configuring 3-1
default port number for 3-1
Operations Manager 3-1
traps, SNMP
Cisco 1040 unreachable
definition C-4
understanding 4-18
from sensors, suppressing 4-5
MOS violation, definition C-1
typographical conventions in this document ix
U
Unavailable
device type, reason for 2-7
updating
server time 6-20
thresholds
CVTQ group 5-6
global 5-2
sensor group 5-10
users
configuring 6-10
using ACS mode 6-10
using CiscoWorks local login module 6-10
privileges
modifying 6-12
Permission Report 6-10
System Identity Setup User F-1
V
verifying Unified Communications Manager credentials 3-4
versions, Unified Communications Manager 3-4, B-1
viewing
log files by module 6-9
sensor configuration
in Service Monitor 4-13
on Cisco 1040 4-15
on TFTP server 4-14
Unified Communications Manager credential status 3-3
virus scanning software A-1
W
warnings
sensor safety information 4-16
significance of x
Windows SNMP Service
disabling 6-14
enabling 6-14
installing 6-14
status, determining 6-14
uninstalling 6-14
Posted: Fri Aug 31 12:44:21 PDT 2007
All contents are Copyright © 1992--2007 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.