Platform Guide¶
Overview¶
Node Deployment¶
Provisioning¶
Networking¶
Application Control¶
System Control¶
Diagnostics¶
- Health Report
- Cluster Check
- Enable Health Monitoring
- Enable Database Scheduling
- Command History
- Logs
- Viewing Logs
- Sending and Collecting Logs
- Log Types
- Log Type Commands
- Audit Log Format and Details
- Event Log Format and Details
- Remote Log Type Encryption
- The Mail Command
- Diagnostic Tools
- Diagnostic Troubleshooting
Notifications¶
SNMP¶
MIB and Trap Details¶
- SNMPv2-MIB - RFC 3418 - Management Information Base (MIB) for the Simple Network Management Protocol (SNMP)
- IF-MIB - RFC 2863 - The Interfaces Group MIB
- MIB-II - RFC 1213 - Management Information Base for Network Management of TCP/IP- based internets
- IP-MIB - RFC 4293 - Management Information Base for the Internet Protocol (IP)
- TCP-MIB - RFC 4022 - Management Information Base for the Transmission Control Protocol (TCP)
- UDP-MIB - RFC 4113 - Management Information Base for the User Datagram Protocol (UDP)
- HOST-RESOURCES-MIB - RFC 2790 - Management Information Base for Host Resources
- SNMP Traps: System Startup
- SNMP Traps: Service Startup Changes Made
- SNMP Traps: Service Monitoring - Changes Made
- SNMP Traps: Service Status
- SNMP Traps: System Shutdown
- SNMP Trap: Disk Status
- SNMP Trap: Database Usage
- SNMP Trap: Database Maintenance
- SNMP Trap: Excessive Load
- SNMP Trap: Backup and Restore
- SNMP Trap: Health Emails
- SNMP Trap: Disk Latency
- SNMP Trap: Mailbox Status
- SNMP Trap: Cluster Status
- SNMP Trap: Database Failover Status
- SNMP Trap: Large Log Files
- SNMP Trap: Network Status
- SNMP Trap: NGINX Status
- SNMP Trap: Security Updates
- SNMP Trap: Memory Usage
- SNMP Trap: NTP Status
- SNMP Trap: DNS status
- SNMP Trap: Domain Status
- SNMP Trap: NTP Offset
- SNMP Trap: Process Memory Threshold Status
Scheduling¶
Backups¶
System Security¶
- Security Overview
- Security Patches and Updates
- Configuration Encrypted
- Backup Encrypted
- Application Install Files Encrypted
- File Integrity
- Protected Application Environments (Jails)
- Restricted User Shell
- User Security and Security Policy Management
- Creating Additional Users
- Creating and Managing SFTP Users
- Granting and revoking user rights
- Password Strength Rules
- SSH Login Fail Limit
- SSH Session Limit
- SSH key management
- SSH Algorithm Management
- Adding a Key for Automatic User Login
- Prevention of DOS Attacks
- Memory Dumps and Security
- Manage Read-Only Database Users
Network Security¶
- Network Communications between Nodes within the Cluster
- Network Communications External to the Cluster
- Dynamic Firewall
- Web Certificate Setup Options
- VOSS-4-UC Setup a Web Certificate
- Own Web Certificate Setup
- Web Certificate Expiration Notice
- Convert Web Certificates from P7B to PEM Format
- Web Certificate Commands
- Web TLS Protocol Configuration
- Web TLS Cipher Management
- Network URI specification
High Availability and Disaster Recovery (DR)¶
DR Failover and Recovery¶
- DR Failover
- Cluster Failure Scenarios
- Election of a New Primary and Failover
- DR Failover and Recovery Scenarios
- Create a New VM Using the Platform-Install OVA
- Scenario: Power Off and On of a Node
- Scenario: Loss of a Non-primary Node in the Primary Site
- Scenario: Loss of a Non-primary Server in the DR Site
- Scenario: Loss of the Primary Database Server
- Scenario: Loss of a Primary Site
- Scenario: Loss of a DR Site
- DR Failover and Recovery in a 2 Node Cluster
Troubleshooting¶
Appendices¶
Data Export Types¶
- Analogue line MGCP Data Export
- Analogue Line SCCP Data Export
- Call Pickup Group Data Export
- Contact Center Enterprise Data Export
- Contact Center Express Data Export
- Customer Data Export
- Extension Mobility Data Export
- FMC Data Export
- Hunt Group Data Export
- Line Data Export
- Phones Data Export
- Site Data Export
- Subscriber Data Export
- Webex Teams Data Export