SDM 90 Installation
SDM 90 Installation
SDM 90 Installation
Delivery Manager
Installation Guide
Release 9.0
F52425-02
October 2022
Oracle Communications Session Delivery Manager Installation Guide, Release 9.0
F52425-02
This software and related documentation are provided under a license agreement containing restrictions on
use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your
license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license,
transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse
engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is
prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If
you find any errors, please report them to us in writing.
If this is software, software documentation, data (as defined in the Federal Acquisition Regulation), or related
documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S.
Government, then the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software,
any programs embedded, installed, or activated on delivered hardware, and modifications of such programs)
and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end
users are "commercial computer software," "commercial computer software documentation," or "limited rights
data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental
regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation
of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated
software, any programs embedded, installed, or activated on delivered hardware, and modifications of such
programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and
limitations specified in the license contained in the applicable contract. The terms governing the U.S.
Government's use of Oracle cloud services are defined by the applicable contract for such services. No other
rights are granted to the U.S. Government.
This software or hardware is developed for general use in a variety of information management applications.
It is not developed or intended for use in any inherently dangerous applications, including applications that
may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you
shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its
safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this
software or hardware in dangerous applications.
Oracle®, Java, and MySQL are registered trademarks of Oracle and/or its affiliates. Other names may be
trademarks of their respective owners.
Intel and Intel Inside are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are
used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Epyc,
and the AMD logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered
trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content, products,
and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly
disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise
set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be
responsible for any loss, costs, or damages incurred due to your access to or use of third-party content,
products, or services, except as set forth in an applicable agreement between you and Oracle.
Contents
About This Guide
My Oracle Support viii
Revision History
1 Pre-Installation Tasks
Check System Requirements 1-2
Check Cluster Requirements 1-3
Check Firewall Settings 1-3
Check that Work Orders are in a Committed State 1-7
Upgrade to a Supported Version of Linux 1-7
Upgrade Linux on Your Server 1-7
Check the File Descriptor Count on Your Linux System 1-9
Verify the Required SDM_localhost Entry is in the Hosts File 1-10
Disable the Default HTTP Daemon 1-11
Specify the System Locale 1-12
Set up Local Yum Repository 1-12
Resolve Any Oracle Linux 6 Installation Dependencies 1-13
Resolve Any Oracle Linux 7 Installation Dependencies 1-14
Resolve Any Oracle Linux 8 Installation Dependencies 1-15
Configure the NNCentral Account 1-17
Add the NNCentral Group and NNCentral User Account 1-17
Specify NNCentral User Privileges 1-17
Select the Installation Type for Session Delivery Manager 1-18
R226 Compliance 1-24
iii
3 Perform a New Session Delivery Manager Installation
Start the Standalone Installation 3-1
Start the Cluster Installation 3-2
6 Typical Installation
Start the Typical Installation 6-2
Configure R226 Compliance and Default User Account Passwords 6-2
Specify the Global ID for Northbound Trap Receivers 6-2
Configure Web Server Security 6-3
Configure Fault Management 6-6
Configure RMI Over SSL 6-7
Configuring OCSDM for IPv4 Support 6-8
Configuring OCSDM for IPv6 Support 6-9
7 Custom Installation
Start the Custom Installation 7-1
Configure R226 Compliance and Default User Account Passwords 7-3
Specify the Global ID for Northbound Trap Receivers 7-3
Configure Web Server Security 7-4
Configure Fault Management 7-7
Configure RMI Over SSL - Custom Installation 7-8
Configure the Mail Server 7-8
iv
Configure Route Management Central 7-10
Configure Transport Layer Security Certificates 7-10
Configure Entity Certificates 7-10
Configure Trusted Certificates 7-11
About Creating a Report Manager Database Instance on the External Oracle Database 7-12
8 Easy Installation
Start the Easy Installation 8-1
Configure R226 Compliance and Default User Account Passwords 8-2
Specify the Global ID for Northbound Trap Receivers 8-3
Configure Web Server Security 8-3
Configure Fault Management 8-3
Configure RMI Over SSL - Easy Installation 8-4
Complete the Easy Installation for a Standalone Server 8-4
Complete the Easy Installation for a Cluster 8-4
9 Headless Installation
Unzip the Tar File to Create the SDM Installation Directory 9-1
Specify the Setup Properties File 9-2
Start the Headless Installation 9-4
Configure RMI Over SSL - Headless Installation 9-5
v
About This Guide
Related Documentation
vi
About This Guide
vii
About This Guide
My Oracle Support
My Oracle Support (https://support.oracle.com) is your initial point of contact for all
product support and training needs. A representative at Customer Access Support
(CAS) can assist you with My Oracle Support registration.
Call the CAS main number at 1-800-223-1711 (toll-free in the US), or call the Oracle
Support hotline for your local country from the list at http://www.oracle.com/us/support/
contact/index.html. When calling, make the selections in the sequence shown below
on the Support telephone menu:
1. Select 2 for New Service Request.
2. Select 3 for Hardware, Networking, and Solaris Operating System Support.
3. Select one of the following options:
• For technical issues such as creating a new Service Request (SR), select 1.
• For non-technical issues such as registration or assistance with My Oracle
Support, select 2.
You are connected to a live agent who can assist you with My Oracle Support
registration and opening a support ticket.
My Oracle Support is available 24 hours a day, 7 days a week, 365 days a year.
Emergency Response
In the event of a critical service situation, emergency response is offered by the
Customer Access Support (CAS) main number at 1-800-223-1711 (toll-free in the US),
or call the Oracle Support hotline for your local country from the list at http://
www.oracle.com/us/support/contact/index.html. The emergency response provides
immediate coverage, automatic escalation, and other features to ensure that the
critical situation is resolved as rapidly as possible.
A critical situation is defined as a problem with the installed equipment that severely
affects service, traffic, or maintenance capabilities, and requires immediate corrective
action. Critical situations affect service and/or system operation resulting in one or
several of these situations:
• A total system failure that results in loss of all transaction processing capability
• Significant reduction in system capacity or traffic handling capability
• Loss of the system's ability to perform automatic system reconfiguration
• Inability to restart a processor or the system
• Corruption of system databases that requires service affecting corrective actions
• Loss of access for maintenance or recovery operations
• Loss of the system ability to provide any required critical or major trouble
notification
Any other problem severely affecting service, capacity/traffic, billing, and maintenance
capabilities may be defined as critical by prior discussion and agreement with Oracle.
viii
About This Guide
ix
Revision History
Revision History
This section provides a revision history for this document.
Date Revision
April 2022 • Initial Release.
October 2022 • Includes updates for the SDM 9.0.1
Release.
x
1
Pre-Installation Tasks
Read and understand the summary of pre-installation tasks that need to be done before
installing Oracle Communications Session Delivery Manager. Each of these pre-installation
tasks are described in more detail in subsequent sections.
1. If you have a software version of OCSDM that is installed on your system that is older
than OCSDM, Release 7.5M3, you must upgrade to OCSDM, Release 7.5M3 before you
can install OCSDM, Release 8.x. From 8.x or 8.x.x Release, you can upgrade to OCSDM
9.0.
2. Once the OCSDM system is installed and operational, use the instructions in the Oracle
Communications Session Delivery Manager Administration Guide for more information
regarding the installation of service provider and enterprise product plugins.
3. Read and understand this guide to install OCSDM for the first time or when you upgrade
OCSDM from a previous version. You must do the OCSDM installation before you can
install Oracle Communications Report Manager. Refer to the flow diagram below for more
information:
1-1
Chapter 1
Check System Requirements
Note:
Your system may already have these software libraries.
12. Setup the nncentral group and user account to administer OCSDM server
operations on your Linux server.
13. Decide what type of installation for OCSDM that you want to do (Easy-Install,
Headless, Typical, and Custom) based on the setup options that are available for
each installation type.
14. Start the OCSDM installation.
Note:
Other hardware configurations might work with Oracle Communications
Session Delivery Manager, but Oracle has verified the configurations listed
here.
1-2
Chapter 1
Check Cluster Requirements
Note:
OpenSSL 1.0.2e-fips or later must be installed on your Linux server in order to
use the HTTPS service on the Apache web server. Most Linux distributions
include OpenSSL as part of the OS installation. You can check the version on
your system by using the following command:
openssl version
OpenSSL 1.0.2e-fips 11 Jun 2017
Client Requirements
• Oracle recommends Internet Explorer versions 11.900 and later, Mozilla Firefox versions
44 and later, or Google Chrome version 56 and later.
Note:
SDM 8.2.x and SDM 9.0 do not support Microsoft Edge.
• If the server is not part of your DNS domain, the hosts file on each client must be edited
to include the host name and IP address of the Oracle Communications Session Delivery
Manager server.
Language Requirements
On the Linux server, ensure that the US English language UTF-8 character encoding method
is specified.
1-3
Chapter 1
Check Firewall Settings
(browsers, SOAP, REST etc.) and the OCSDM cluster, and a firewall between the
OCSDM cluster and other devices.
Figure 1-2 OCSDM in your Network with a Firewall between the clients
Session Delivery
Manager Cluster
Network Clients Network
C ons ole
Browser SBC
SOAP
Note:
You cannot have firewalls between the servers in a cluster.
If firewalls exist on either side of the OCSDM cluster, ensure the ports listed in the
following table are open. If your operating system comes with a firewall, you need to
apply the same criteria. You must switch off the firewall in your operating system or
ensure these ports are available.
1-4
Chapter 1
Check Firewall Settings
1-5
Chapter 1
Check Firewall Settings
Either port 8080 (HTTP) or port 8443 (HTTPS) must be open on the firewall,
depending on which port you select between the network client and OCSDM server.
Note:
Ports are assigned dynamically through Remote Method Invocation (RMI)
dynamic port allocation. If you are enabling and configuring iptables, all traffic
must be allowed between servers in the cluster. Communication between
clustered OCSDM servers must not be restricted.
1-6
Chapter 1
Check that Work Orders are in a Committed State
Note:
Ensure that the server is shut down before you do this task. See the Shut Down
Your System section for more information on shutting down the OCSDM server.
cd /<sdm-install-directory>/AcmePacket/NNC<version>/bin
Note:
The backupdbcold.sh -- help script provides all of the arguments that you can
use.
./backupdbcold.sh
1-7
Chapter 1
Upgrade to a Supported Version of Linux
– -d —Use this argument to select a local directory that you want to store
backup archives. For example:
./backupdbcold.sh -d/<sdm-install-directory>/AcmePacket/
<Directory>/
NNC<version>_ColdBackup_yyyy_mm_dd_<number>_all.tar
– -a, --all — Use this argument to run all backups and store them as a
single archive.
./backupdbcold.sh --all
./backupdbcold.sh --core
./backupdbcold.sh --report
./backupdbcold.sh --ocsdmdw
./backupdbcold.sh --excludePlugins
After the script runs, the output displays a section called Backup Results. The
output shows if the core OCSDM application database and reporting databases
are successfully backed up to the default DatabaseBackup directory. The
following example shows the directory on which the application database file was
backed up:
/<sdm-install-directory>/AcmePacket/DatabaseBackup/
NNC<version>_ColdBackup_yyyy_mm_dd_<number>_all.tar
Note:
If you do not have reporting configured on the OCSDM server, the output
shows that the reporting databases failed to be backed up.
1-8
Chapter 1
Check the File Descriptor Count on Your Linux System
5. Repeat the steps above if you need to upgrade another Linux server on which Oracle
Communications Session Delivery Manager needs to run.
ulimit -n
3. If the output displays a value of 20000 or greater, you are finished with this task. If the
output value is less than 20000, continue to the next step.
4. Navigate to the OCSDM installation bin directory.
For example:
cd /<sdm-install-directory>/AcmePacket/NNC<version>/bin
5. Run the shutdownnnc.sh script. By default, the shutdownnnc.sh script detects whether
the existing installation is a standalone or clustered system and prompts you with the
option to shut down the entire cluster if no flag options are provided.
Note:
However, You can script an option ahead of time by adding -local for single
nodes and -cluster to shutdown an entire cluster.
./shutdownnnc.sh
Shutdown back-end server
Do you wish to shut down the entire cluster (Yes/No)? Yes
/etc/security/limits.conf
#<domain> <type> <item> <value>
8. If there are no values after the nofile entries or these entries are less than 20000, enter
each entry as shown above.
9. Exit the shell.
10. Login to the server as the nncentral user.
1-9
Chapter 1
Verify the Required SDM_localhost Entry is in the Hosts File
11. Use the ulimit -n command again to view the number of file descriptors that you
configured (the command should now return a value of 20000).
12. If you have a cluster setup, repeat the previous steps for each cluster member.
Note:
The IP address that is used for the SDM_localhost entry on each OCSDM
cluster member must be registered on the network Domain Name Server
(DNS). If this entry is absent on the DNS server, DNS lookup timeouts occur,
which can cause database problems.
[my_linux_system]$ ifconfig
3. View the /etc/hosts file to verify that there is a SDM_localhost entry and that
the IP address of this entry matches the eth0 interface.
The following example has the correct eth0 interface (shown in the previous
example) and SDM_localhost entry:
[my_linux_system]$ Vi /etc/hosts
10.138.222.189 acme189 SDM_localhost
4. If the /etc/hosts file does not include the eth0 IP address and SDM_localhost
entries, enter them in the /etc/hosts file using the following format:
1-10
Chapter 1
Disable the Default HTTP Daemon
Note:
The order in which this entry appears in the hosts file does not matter.
For example:
Note:
SDM_localhost does not support IPv6 link-local addresses.
If you fail to add the SDM_localhost entry in the hosts file, the following message appears
during the OCSDM setup installation process:
5. Restart the network service to initialize the changes that you made to the hosts file.
The following message appears if the HTTPD is not installed. Continue to the next
sections.
The following message appears if the HTTPD is installed but not running. Continue to the
next sections.
httpd is stopped
1-11
Chapter 1
Specify the System Locale
A message similar to the following appears if the HTTPD is installed and running:
Note:
If your are using Oracle Linux 7 or later, use the following command:
1-12
Chapter 1
Resolve Any Oracle Linux 6 Installation Dependencies
Library Description
apr The Apache Portable Runtime (APR) supporting
library is for the Apache web server that provides
a set of application programming interfaces (APIs)
that map to the underlying operating system (OS).
The APR provides emulation where the OS does
not support a particular function to make a
program portable across different platforms.
apr-util The APR Utility Library (APR-Util) provides a
predictable and consistent interface for underlying
client library interfaces. This API assures
predictable if not identical behavior regardless of
which libraries are available on a given platform.
compat-expat1 Expat is a stream-oriented parser for XML
documents. You register handlers with the parser
before starting the parse and these handlers are
called when the parser discovers the associated
structures in the document being parsed. A start
tag is an example of the kind of structures for
which you may register handlers.
libxslt The package contains extensible style sheet
language transformations (XSLT) libraries. These
are useful for extending libxml2 libraries that are
used to manipulate XML files to support XSLT
files.
libaprutil The APR database binding library for the Apache
web server.
libGL OpenGL-based programs must link with the libGL
library that implements the GLX interface as well
as the main OpenGL API entry points.
libX11 The X.Org stack, which provides an open source
implementation of the X Window System for the C
language X interface. See the X.Org Foundation
for more information.
libXxf86vm X11 XFree86 video mode extension library
provides an interface to the XFree86-
VidModeExtension extension, which allows client
applications to get and set video mode timings in
extensive detail. It is used by the xvidtune program
in particular.
alsa-lib Advanced Linux Sound Architecture (ALSA) library
package used by programs (including ALSA
Utilities ) requiring access to the ALSA sound
interface.
If you are missing any shared software libraries in your Oracle Linux environment, run the
"yum" program. Yum is the primary tool for getting, installing, deleting, querying, and
1-13
Chapter 1
Resolve Any Oracle Linux 7 Installation Dependencies
managing Oracle Linux software packages from official software repositories, as well
as other third-party repositories.
1. Login to your Oracle Linux system on which OCSDM is to be installed as the root
user.
2. Install the Oracle Linux software on your linux system using the "yum" program.
For example:
Library Description
apr The Apache Portable Runtime (APR)
supporting library is for the Apache web server
that provides a set of application programming
interfaces (APIs) that map to the underlying
operating system (OS). The APR provides
emulation where the OS does not support a
particular function to make a program portable
across different platforms.
apr-util The APR Utility Library (APR-Util) provides a
predictable and consistent interface for
underlying client library interfaces. This API
assures predictable if not identical behavior
regardless of which libraries are available on a
given platform.
libxslt The package contains extensible style sheet
language transformations (XSLT) libraries.
These are useful for extending libxml2 libraries
that are used to manipulate XML files to
support XSLT files.
libaprutil The APR database binding library for the
Apache web server.
libGL OpenGL-based programs must link with the
libGL library that implements the GLX interface
as well as the main OpenGL API entry points.
libX11 The X.Org stack, which provides an open
source implementation of the X Window
System for the C language X interface. See
the X.Org Foundation for more information.
libXxf86vm X11 XFree86 video mode extension library
provides an interface to the XFree86-
VidModeExtension extension, which allows
client applications to get and set video mode
timings in extensive detail. It is used by the
xvidtune program in particular.
1-14
Chapter 1
Resolve Any Oracle Linux 8 Installation Dependencies
Library Description
alsa-lib Advanced Linux Sound Architecture (ALSA)
library package used by programs (including
ALSA Utilities ) requiring access to the ALSA
sound interface.
If you are missing any shared software libraries in your Oracle Linux environment, run the
"yum" program. Yum is the primary tool for getting, installing, deleting, querying, and
managing Oracle Linux software packages from official software repositories, as well as other
third-party repositories.
1. Login to your Oracle Linux system on which OCSDM is to be installed as the root user.
2. Install the Oracle Linux software on your linux system using the "yum" program. For
example:
Library Description
apr The Apache Portable Runtime (APR) supporting
library is for the Apache web server that provides
a set of application programming interfaces (APIs)
that map to the underlying operating system (OS).
The APR provides emulation where the OS does
not support a particular function to make a
program portable across different platforms.
apr-util The APR Utility Library (APR-Util) provides a
predictable and consistent interface for underlying
client library interfaces. This API assures
predictable if not identical behavior regardless of
which libraries are available on a given platform.
libxslt The package contains extensible style sheet
language transformations (XSLT) libraries. These
are useful for extending libxml2 libraries that are
used to manipulate XML files to support XSLT
files.
libaprutil The APR database binding library for the Apache
web server.
libGL OpenGL-based programs must link with the libGL
library that implements the GLX interface as well
as the main OpenGL API entry points.
libX11 The X.Org stack, which provides an open source
implementation of the X Window System for the C
language X interface. See the X.Org Foundation
for more information.
1-15
Chapter 1
Resolve Any Oracle Linux 8 Installation Dependencies
Library Description
libXxf86vm X11 XFree86 video mode extension library
provides an interface to the XFree86-
VidModeExtension extension, which allows client
applications to get and set video mode timings in
extensive detail. It is used by the xvidtune program
in particular.
alsa-lib Advanced Linux Sound Architecture (ALSA) library
package used by programs (including ALSA
Utilities ) requiring access to the ALSA sound
interface.
xorg-x11-utils xorg-x11-utils is shipped with common Linux
distributions. The xorg-x11-utils package is
designed for, X.Org X11 X client utilities. The xorg-
x11-utils package is a collection of client utilities
which can be used to query the X server for
various information
libnsl libnsl package contains the libnsl library. The libnsl
package contains the public client interface for
NIS(YP) and NIS+. It replaces the NIS library that
used to be in glibc. It includes IPv6 support.
libapr-1.so.0 libapr-1.so.0 is a dependency of the Apache
Portable Runtime (APR) which is for the Apache
web server that provides a set of application
programminginterfaces (APIs) that map to the
underlying operating system (OS).
libXtst libXtst is a package in Ubuntu which provides an X
Window System client interface to the Record
extension to the X protocol. The Record extension
allows X clients to synthesise input events, which
is useful for automated testing.
libasound.so.2 This is a system library
libXtst.so.6 libXtst.so.6 is from the libXtst package in Ubuntu
which provides an X Window System client
interface to the Record extension to the X
protocol. The Record extension allows X clients to
synthesise input events, which is useful for
automated testing.
libXi.so.6 libXi.so.6is from the libXi package which provides
an X Window System client interface to the
XINPUT extension to the X protocol. The Input
extension allows setup and configuration of
multiple input devices, and hotplugging of input
devices (to be added and removed on the fly).
If you are missing any shared software libraries in your Oracle Linux environment, run
the "yum" program. Yum is the primary tool for getting, installing, deleting, querying,
and managing Oracle Linux software packages from official software repositories, as
well as other third-party repositories.
1. Login to your Oracle Linux system on which OCSDM is to be installed as the root
user.
1-16
Chapter 1
Configure the NNCentral Account
2. Install the Oracle Linux software on your linux system using the "yum" program. For
example:
groupadd nncentral
passwd nncentral
5. If you are prompted to enter a new password, reenter the password that you entered in
step 4.
The following message displays:
Note:
This file can only be edited using Linux visual text editor (vi editor) commands.
1-17
Chapter 1
Select the Installation Type for Session Delivery Manager
# visudo
Note:
The placeholder <my-sdm-install-directory> is the name of the
directory where you installed SDM and the command line as shown
below is not valid without modification. Also, the entire entry must be
entered on the same line. Take notice also that the example below may
wrap as it is shown, depending on how you are viewing this document
(HTML or PDF).
nncentral ALL=/<my-sdm-install-directory>/AcmePacket/NNC*/jre/bin/
java * -Dlog4j.configuration*=* -cp *
com.acmepacket.ems.server.services.snmp.TrapRelay.TrapRelay *
Note:
If you want to quit without saving your changes, press :q!.
7. Ensure that the sudoer configuration for the nncentral user is specified.
1-18
Chapter 1
Select the Installation Type for Session Delivery Manager
• Easy Installation— Specify the minimum number of properties to get started. The majority
of the settings are defaulted.
• Headless Installation—Specify the options supported in the Easy Installation through a
file.
The following table describes each setup option and in which installation type this setup
option is available:
1-19
Chapter 1
Select the Installation Type for Session Delivery Manager
N
o
t
e
:
T
h
e
R
M
I
o
v
e
r
S
S
L
s
e
t
u
p
o
p
t
i
o
n
i
s
a
v
a
i
l
a
b
l
e
f
r
o
m
t
h
e
1-20
Chapter 1
Select the Installation Type for Session Delivery Manager
S
D
M
9
.
0
.
1
r
e
l
e
a
s
e
o
n
w
a
r
d
s
.
1-21
Chapter 1
Select the Installation Type for Session Delivery Manager
1-22
Chapter 1
Select the Installation Type for Session Delivery Manager
The following table describes the parameters that can be configured in the Easy Installation
and Headless Installation.
1-23
Chapter 1
Select the Installation Type for Session Delivery Manager
R226 Compliance
Upon initial installation, the Oracle Communications Session Delivery Manager can be
configured to enable or disable R226 compliance. When R226 compliance is set to
enabled on OCSDM, the Lawful Intercept and SIPREC features and their attributes
are hidden from view and are not configurable.
When R226 compliance is disabled, the Lawful Intercept and SIPREC features and
their attributes can be seen and configured by users with the appropriate permissions.
Note:
Once R226 compliance has been enabled, it cannot be revoked without a
complete reinstallation of the OCSDM. However, if R226 compliance is
disabled, you can enable it at any time.
1-24
2
Create a Session Delivery Manager
Installation Directory
Use this task to unzip the tar file containing the Oracle Communications Session Delivery
Manager software application image and create the OCSDM installation directory called
AcmePacket.
cd /<directory>
or
or
cd /<sdm-install-directory>/AcmePacket/NNC<version>/bin
6. Before you begin your installation, ensure that you are certain what type of installation
that you want to do (Typical, Custom, Easy, or Headless). Refer to the Select Installation
Type for Session Delivery Manager section for more information.
2-1
3
Perform a New Session Delivery Manager
Installation
Use this chapter to perform a new standalone or cluster Oracle Communications Session
Delivery Manager server installation.
Complete the following tasks before you begin this installation:
1. Complete all applicable tasks in the Pre-Installation Tasks chapter.
2. Configure the NNCentral account. Refer to the Configure the NNCentral Account section
for more information.
3. You must unzip the tar file to create the OCSDM installation directory, which contains the
installation program used to run the installation. Refer to the Create a Session Delivery
Manager Installation Directory section for more information.
4. Ensure that this installation is the type of installation that you want to do. Refer to the
Select Installation Type for Session Delivery Manager section for more information.
cd /<sdm-install-directory>/AcmePacket/NNC<version>/bin
./setup.sh
Note:
A warning message appears if you have less than the recommended minimum
physical memory. Proceeding without the recommended minimum physical
memory may result in performance degradation.
WARNING:
This process may take several minutes to complete. Interrupting the setup.sh
process risks corrupting the system.
3-1
Chapter 3
Start the Cluster Installation
4. Complete the OCSDM installation and press Enter to continue to the setup, where
you can select your OCSDM installation type. Depending on the OCSDM
installation type you choose, refer to the Typical Installation, Custom Installation,
Easy Installation, or Headless Installation chapter for more information.
cd /<sdm-install-directory>/AcmePacket/NNC<version>/bin
./setup.sh
Note:
A warning message appears if you have less than the recommended
minimum physical memory. Proceeding without the recommended
minimum physical memory may result in performance degradation.
WARNING:
This process may take several minutes to complete. Interrupting the
setup.sh process risks corrupting the system.
4. Complete the OCSDM installation and press Enter to continue to the setup, where
you can select your OCSDM installation type. Depending on the OCSDM
installation type you choose, refer to the Typical Installation, Custom Installation,
Easy Installation, or Headless Installation chapter for more information.
5. Repeat the previous steps on each server node in the cluster.
6. After the each cluster node is complete, refer to the Configure the Installed
Session Delivery Manager Cluster chapter for more information on associating the
cluster nodes that you installed with each other so that they can function together
as a cluster.
3-2
4
Configure the Installed Session Delivery
Manager Cluster
After you have installed an Oracle Communications Session Delivery Manager standalone
server or cluster of OCSDM servers, use the following sections to configure them.
An OCSDM cluster is comprised of multiple server nodes (members), each of which can be a
candidate node for your file systems, databases or applications. Each cluster node monitors
the health of other cluster nodes. If a node fails, another node in the cluster takes over
services for the failed node. For example, when an interruption or failure occurs in a critical
application on a node, a high-availability cluster combats this disruption by switching
application operations to another node within the cluster to quickly and seamlessly prevent a
complete system failure.
Note:
In an OCSDM cluster, the R226 compliance value for each node must be the same
or the cluster cannot start up. As each node of the cluster starts up, if there is any
mismatch on this value, the cluster startup fails. Cluster nodes that fail due to a
mismatch of R226 compliance value require a complete OCSDM re-installation.
Note:
When configuring or modifying the master cluster server, all cluster replica nodes
must be shut down.
cd /<sdm-install-directory>/AcmePacket/NNC<version>/bin
4-1
Chapter 4
Configure a New Cluster
./setup.sh
Note:
A warning message appears if you have less than the recommended
minimum physical memory. Proceeding without the recommended
minimum physical memory may result in performance degradation.
WARNING:
This process may take several minutes to complete. Interrupting the
setup.sh process risks corrupting the system.
5. From the Customize Configuration menu (after you have started the custom
installation), Select option 6, Cluster management. Press Enter to continue.
6. When you are prompted, enter Yes to continue.
7. Select option 1, Configure and manage members in cluster. Press Enter to
continue.
8. When you are prompted, enter Yes to continue.
See additional sections in this chapter to perform other management operations
on the cluster.
4-2
Chapter 4
Configure a New Cluster
Note:
Do not enter the domain name server (DNS) name or the fully qualified domain
name (FQDN) for the node.
3. Enter the SFTP username, password, confirm password, and for each cluster.
These credentials are stored in the nnc_sftp.ini file which is later used for pulling or
transferring the RMI certificate across the clusters.
4. Repeat steps to add additional nodes to the cluster.
5. When done adding nodes, select option 3, Apply new cluster configuration. Press
Enter to continue.
6. Select option 3, Quit out of cluster configuration. Press Enter to continue.
7. If this system is not part of the cluster, select option 2, No. Otherwise, select option 1,
Yes. Press Enter to continue.
8. If you selected Yes, enter the nncentral user name and nncentral password which other
nodes of the cluster can use to SFTP files from this system. See the Configure the
NNCentral Account section if you need to configure an nncentral account.
Note:
The master server node in the OCSDM cluster must be started and fully
operational before you can start the replica nodes.
If you need to change cluster member IP addresses after a successful OCSDM cluster
deployment, you must backup the OCSDM database, reinstall the cluster (with the new
cluster member IP addresses), and restore the database backup and start each cluster
member node.
4-3
5
Upgrade Session Delivery Manager
Use the tasks in this chapter to shut down the Oracle Communications Session Delivery
Manager server and either upgrade a standalone OCSDM server or OCSDM server cluster.
Ensure that you complete the following tasks before you begin this installation:
1. Complete all applicable tasks in the Pre-Installation Tasks chapter.
2. Configure the NNCentral account. Refer to the Configure the NNCentral Account section
for more information.
3. You must unzip the tar file to create the OCSDM installation directory, which contains the
installation program used to run the installation. Refer to the Create a Session Delivery
Manager Installation Directory section for more information.
cd /<sdm-install-directory>/AcmePacket/NNC<version>/bin
3. Run the shutdownnnc.sh script. By default, the shutdownnnc.sh script detects whether
the existing installation is a standalone or clustered system and prompts you with the
option to shut down the entire cluster if no flag options are provided.
Note:
However, You can script an option ahead of time by adding -local for single
nodes and -cluster to shutdown an entire cluster.
./shutdownnnc.sh
Shutdown back-end server
Do you wish to shut down the entire cluster (Yes/No)? Yes
5-1
Chapter 5
Upgrade the Session Delivery Manager Standalone Server
Note:
If you are running any version of OCSDM prior to Release 7.5M3, you cannot
install OCSDM Release 9.x. Ensure that you are currently running OCSDM,
Release 7.5M3 or later. After 7.5M3, you can install OCSDM 8.x. You can
upgrade to OCSDM 9.0 from OCSDM 8.x or 8.x.x.
Note:
It is recommended that you take a cold DB back up of the system before
proceeding with upgrade.
Use the following summary of tasks to upgrade your OCSDM standalone server:
1. You must unzip the tar file to create the OCSDM installation directory, which
contains the installation program used to run the installation. Refer to the Create a
Session Delivery Manager Installation Directory section for more information.
2. If you are upgrading Report Manager, the Oracle Database and Oracle BI
Publisher must be running before you upgrade OCSDM so that Report Manager
database data is migrated.
3. Start the installation.
Note:
The previous release of Oracle Communications Session Delivery Manager
must manage at least one device to be upgraded successfully.
cd /<sdm-install-directory>/AcmePacket/NNC<version>/bin
3. Run the setup application with the setup.sh script. The setup application
determines that a migration of the application data needs to occur from the current
release and that specific plugin(s) need to be installed based on the product
devices (SBCs, E-SBCs, or both) OCSDM managed in the previous release.
./setup.sh
5-2
Chapter 5
Upgrade the Session Delivery Manager Standalone Server
Note:
A warning message appears if you have less than the recommended minimum
physical memory. Proceeding without the recommended minimum physical
memory may result in performance degradation.
WARNING:
This process may take several minutes to complete. Interrupting the setup.sh
process risks corrupting the system.
4. The data migration tool automatically detects the previous release. When you are
prompted, select that you have a standalone system and use the following section to
complete your upgrade.
2. Enter Yes to migrate data from the previous Oracle Communications Session Delivery
Manager installation.
Pressing a key anytime during the process aborts the current migration. You cannot be
able to launch the target version of Oracle Communications Session Delivery Manager
until setup is re-run and database migration is performed.
3. When you are prompted, specify the directory path on your server where you
downloaded the requested product plugin(s). Once the directory path(s) to the product
plugin(s) are provided, the migration process continues migrating application data to
SDM 9.x.
5-3
Chapter 5
Upgrade the Session Delivery Manager Cluster
4. Press Enter and continue to the setup, where you can select your OCSDM
installation type. You must re-enter the setup parameters that you used when you
previously setup OCSDM. Refer to the Typical Installation, Custom Installation,
Easy Installation, or Headless Installation chapter for more information.
Note:
Ensure that you are currently running OCSDM, Release 7.5M3. If you are
running any version of OCSDM prior to Release 7.5M3, you cannot install
OCSDM Release 8.x. After installing OCSDM 8.x, you can upgrade to
OCSDM 9.0 from OCSDM 8.x or 8.x.x.
Note:
It is recommended that you take a cold DB backup from the master node
before proceeding with upgrade.
5-4
Chapter 5
Upgrade the Session Delivery Manager Cluster
Note:
The previous release of Oracle Communications Session Delivery Manager must
manage at least one device to be upgraded successfully.
cd /<sdm-install-directory>/AcmePacket/NNC<version>/bin
3. Run the setup application with the setup.sh script. The setup.sh application determines
that a migration of the application data needs to occur from the current version to 9.x. If
you are migrating from OCSDM Release 7.5M3, specific plugin(s) may need to be
installed based on the product devices (SBCs, E-SBCs, or both).
./setup.sh
Note:
A warning message appears if you have less than the recommended minimum
physical memory. Proceeding without the recommended minimum physical
memory may result in performance degradation.
WARNING:
This process may take several minutes to complete. Interrupting the setup.sh
process risks corrupting the system.
4. The data migration tool automatically detects the previous release. When you are
prompted, select that you have a clustered system and use the following section to
complete your upgrade.
5-5
Chapter 5
Upgrade the Session Delivery Manager Cluster
2. When prompted, enter Yes to transfer application data from the previous OCSDM
installation.
3. When you are prompted, specify the directory path on your server where you
downloaded the requested product plugin(s). Once the directory path(s) to the
product plugin(s) are provided, the migration process continues migrating current
application data to the new release. During this process, the setup application
asks you if you want to transfer a backup of the migrated database (DB) to other
members of the cluster. If you answer yes, a backup is done and transferred to the
targeted members of the server cluster.
4. Enter 1 to copy the transferred database to other cluster nodes.
5-6
Chapter 5
Upgrade the Session Delivery Manager Cluster
For example, a successful application data transfer shows information similar to the
following:
7. Press Enter and continue to the setup, where you can select your OCSDM installation
type. You must re-enter the setup parameters that you used when you previously setup
OCSDM. Refer to the Typical Installation, Custom Installation, Easy Installation, or
Headless Installation chapter for more information.
8. Once you have completed the setup on the master node, go to the Migrate Application
Data on Each Cluster Replica Node section to complete the cluster upgrade on the
replica nodes in the cluster.
5-7
Chapter 5
Upgrade the Session Delivery Manager Cluster
3. Enter 1 to continue.
5. Enter the full path to the database backup and enter yes to continue the import
process.
6. Press Enter to continue the Typical Installation and later the Custom Installation of
Oracle Communications Session Delivery Manager (depending on your installation
requirements of Oracle Communications Session Delivery Manager). These
installation(s) must be completed to use the current Oracle Communications
Session Delivery Manager software version on this replica node system.
7. Press Enter and continue to the setup, where you can select your OCSDM
installation type. You must re-enter the setup parameters that you used when you
previously setup OCSDM. Refer to the Typical Installation, Custom Installation,
Easy Installation, or Headless Installation chapter for more information.
5-8
Chapter 5
Upgrade the Session Delivery Manager Cluster
8. Repeat the previous steps if you need to transfer application data on another replica
node (member) of the cluster system.
5-9
6
Typical Installation
The following tasks are accomplished in the Typical installation to specify the most common
setup properties to get a basic Oracle Communications Session Delivery Manager installation
running on the server.
1. The setup program loads and installs the appropriate product plugins (if you are
upgrading OCSDM from a previous version).
Note:
If you are installing OCSDM for the first time, the appropriate product plugins
must be installed after the OCSDM server installation. See the Manage Product
Plugins chapter in the Oracle Communications Session Delivery Manager
Administration Guide for more information.
2. Configure R226 Compliance. For more information on R226 compliance, see "R226
Compliance" section.
3. Configure passwords for the default user accounts.
Note:
Verify that you have the correct sudo password before you do this task.
Note:
RMI over SSL support is available from the SDM 9.0.1 release onwards.
Note:
Once you have accomplished the applicable tasks, and the required configuration of
the NNCentral account in the "Pre-Installation Tasks" chapter, you are ready to
begin this installation. We recommend that you record all the setup parameters that
you configure in this chapter. You will need to use them again the next time you
upgrade OCSDM and run the Typical installation.
6-1
Chapter 6
Start the Typical Installation
Note:
If you set R226 compliance to enabled, you can no longer create LIadmin
user groups and are not prompted to provide an LIadmin password. For
more information on R226 compliance, see "R226 Compliance".
1. Select option 1, R226 compliance and Default user account passwords. Press
Enter to continue.
2. Enter Yes or No when prompted Do you want to enable R226 compliance?.
You are prompted for a confirmation when enabling this feature since it cannot be
undone without a complete re-installation.
3. Enter the admin password and confirm by re-entering it.
4. Enter the LIadmin password and confirm by re-entering it.
6-2
Chapter 6
Configure Web Server Security
notification on their northbound system, the originating device can be determined by viewing
the global ID contained in the SNMP trap fault notification.
Note:
The global identifier must be the same for all nodes in a clustered system.
Note:
This section does not discuss the importation or deletion of Transport Layer security
certificates for east-west peer OCSDM server communication, and for southbound
communication with network function (NF) devices. These actions are handled in
the Custom Installation when using the OCSDM setup installation program. Refer to
the Configure Transport Layer Security Certificates section for more information.
1. Select option 3, Web Server configuration. Press the Enter key to continue.
2. Option 1 (HTTP/HTTPS configuration) is selected by default to configure the your web
server parameters. Press Enter to continue.
a. We highly recommend that you keep HTTPS mode (default) as the system running
mode for your system to create secure web connections. If you need HTTP
(unsecured) select option 2. Press Enter to continue.
6-3
Chapter 6
Configure Web Server Security
Note:
OpenSSL 1.0.2e-fips or later must be installed on your linux server in
order to use the HTTPS service on the Apache web server to
support the options of running HTTPS with Transport Layer Security
(TLS) 1.0, 1.1, and 1.2.
Note:
You cannot use the value root for the Apache user.
Note:
You cannot use the value root for either the Apache group name.
d. Enter an Apache port number or accept the default port of 8443 (secure
HTTPS).
Note:
Port 8080 is the port number for unsecured HTTP.
6-4
Chapter 6
Configure Web Server Security
Note:
The specified DNS server name must match the common name (CN) of the
certificate.
Certificate file []
iii. If there are intermediate certificates, select option 1. Press Enter to continue.
Then enter the absolute path to the certificate chain file. Otherwise, select the
default option 2.
g. If you want to create a self signed certificate, select option 1, Yes. Press Enter to
continue.
h. Accent nncentral as the certificate alias name.
i. Specify a truststore password that provides write protection to the truststore where
X.509 certificates are kept. X.509 certificates are used in many internet protocols,
including TLS/SSL, which is the basis for HTTPS.
Truststore password []
The upper-level the security configuration is complete and the main web server menu
returns. If you do not need to adjust the default maximum file size for files that are
uploaded to the web server, your web server configuration is complete.
3. (Optional) Select option 2, Security configuration to update the Apache HTTP Daemon
(HTTPD) server configuration files, if you need to change the default value set by Oracle
Communications Session Delivery Manager for files that can be uploaded to the web
server. Press the Enter key to continue.
6-5
Chapter 6
Configure Fault Management
c. You are next prompted to enter the upload file size limit in gigabytes (GB). The
default size limit is 2 gigabytes.
If the entered value exceeds the file-size limit, an error message displays and
prompts you to re-enter the value.
4. (Optional) By default, Transport Layer Security (TLS) 1.0 is used for HTTPS.
Select option 2, Security configuration if you want to enable TLS versions 1.1
and 1.2 to be used for HTTPS instead.
6-6
Chapter 6
Configure RMI Over SSL
3. Either enter the port number that your server will listen on for SNMP traps or press Enter
to accept the default port of 162.
Note:
You cannot use a port number reserved for Oracle Communications Session
Delivery Manager components.
Enter the port number that Trap Relay should listen on: (1-65535) [162]
4. The system requires the entry of the sudo password to support internal components that
require sudo user privileges. If prompted (you entered a port below 1024 in the previous
step), enter the sudo password. Then re-enter the sudo password to confirm.
5. Select option 5, RMI over SSL setup option. Press Enter to continue.
The RMI over SSL setup option is available from the SDM 9.0.1 release onwards.
Next Step
See Configuring OCSDM for IPv4 Support .
1. Note:
Support for RMI over SSL is available from the SDM 9.0.1 release.
6-7
Chapter 6
Configuring OCSDM for IPv4 Support
<Connector protocol="AJP/1.3"
address="::"
port="8009"
2. In this line, for the address attribute which is currently address="::"', modify the
value as address="0.0.0.0". After modification it should look as below:
<Connector protocol="AJP/1.3"
address="0.0.0.0"
port="8009"
3. You need to make the changes for SDM versions from 8.2.2 to 8.2.3, if IPV6 is not
enabled.
Start the Oracle Communications Session Delivery Manager server.
6-8
Chapter 6
Configuring OCSDM for IPv6 Support
<Connector protocol="AJP/1.3"
address="0.0.0.0"
port="8009"
3. In this line, for the address attribute which is currently address="0.0.0.0"', modify the
value as address="::". After modification it should look as shown below:
<Connector protocol="AJP/1.3"
address="::"
port="8009"
6-9
7
Custom Installation
The custom installation options are for more advanced users.
Note:
The feature RMI over SSL has been introduced in the SDM 9.0.1 release.
If you are installing SDM 9.0, the first four steps of the custom installation are
identical to the steps of the typical installation. If you are installing SDM 9.0.1, the
first five steps of the custom installation are identical to the steps of the typical
installation.
The first four steps of the custom installation are identical to the steps of the typical
installation. The following custom options are displayed:
• Mail server configuration
• Cluster management—See the Configure the New Cluster section in the Typical
Installation chapter and the Session Delivery Manager Server Cluster Maintenance
chapter in the Oracle Communications Session Delivery Manager Administration Guide
for more information.
• Route Manager configuration
• Transport layer security (TLS) configuration
• Oracle Database configuration
Note:
Once you have accomplished the applicable tasks, and the required configuration of
the NNCentral account in the Pre-Installation Tasks chapter, you are ready to begin
this installation. We recommend that you record all the setup parameters that you
configure in this chapter. You will need to use them again the next time you upgrade
OCSDM and run the Custom installation.
cd /<sdm-install-directory>/AcmePacket/NNC<version>/bin
7-1
Chapter 7
Start the Custom Installation
./setup.sh
Note:
A warning message appears if you have less than the recommended
minimum physical memory. Proceeding without the recommended
minimum physical memory may result in performance degradation.
WARNING:
This process may take several minutes to complete. Interrupting the
setup.sh process risks corrupting the system.
7-2
Chapter 7
Configure R226 Compliance and Default User Account Passwords
Please note:
• Support for RMI over SSL is available from the SDM 9.0.1 release onwards.
• Starting from SDM 8.2.2 version, you must enable IPV6 on the system where
OCSDM is running. For more information, see Configuring OCSDM for IPv4 Support.
• Option 8, SAML Single sign on configuration for importing self-signed certificates into
the Route Manager certificates file (cacerts), is not supported in this release.
Note:
If you set R226 compliance to enabled, you can no longer create LIadmin user
groups and are not prompted to provide an LIadmin password. For more
information on R226 compliance, see "R226 Compliance".
1. Select option 1, R226 compliance and Default user account passwords. Press Enter
to continue.
2. Enter Yes or No when prompted Do you want to enable R226 compliance?.
You are prompted for a confirmation when enabling this feature since it cannot be undone
without a complete re-installation.
3. Enter the admin password and confirm by re-entering it.
4. Enter the LIadmin password and confirm by re-entering it.
Note:
The global identifier must be the same for all nodes in a clustered system.
7-3
Chapter 7
Configure Web Server Security
2. Enter a global unique identifier for the system and press Enter. For example:
Note:
This section does not discuss the importation or deletion of Transport Layer
security certificates for east-west peer OCSDM server communication, and
for southbound communication with network function (NF) devices. These
actions are handled in the Custom Installation when using the OCSDM setup
installation program. Refer to the Configure Transport Layer Security
Certificates section for more information.
1. Select option 3, Web Server configuration. Press the Enter key to continue.
2. Option 1 (HTTP/HTTPS configuration) is selected by default to configure the your
web server parameters. Press Enter to continue.
a. We highly recommend that you keep HTTPS mode (default) as the system
running mode for your system to create secure web connections. If you need
HTTP (unsecured) select option 2. Press Enter to continue.
Note:
OpenSSL 1.0.2e-fips or later must be installed on your linux server in
order to use the HTTPS service on the Apache web server to
support the options of running HTTPS with Transport Layer Security
(TLS) 1.0, 1.1, and 1.2.
7-4
Chapter 7
Configure Web Server Security
Note:
You cannot use the value root for the Apache user.
Note:
You cannot use the value root for either the Apache group name.
d. Enter an Apache port number or accept the default port of 8443 (secure HTTPS).
Note:
Port 8080 is the port number for unsecured HTTP.
Note:
The specified DNS server name must match the common name (CN) of the
certificate.
Certificate file []
7-5
Chapter 7
Configure Web Server Security
g. If you want to create a self signed certificate, select option 1, Yes. Press Enter
to continue.
h. Accent nncentral as the certificate alias name.
Truststore password []
The upper-level the security configuration is complete and the main web
server menu returns. If you do not need to adjust the default maximum file size
for files that are uploaded to the web server, your web server configuration is
complete.
3. (Optional) Select option 2, Security configuration to update the Apache HTTP
Daemon (HTTPD) server configuration files, if you need to change the default
value set by Oracle Communications Session Delivery Manager for files that can
be uploaded to the web server. Press the Enter key to continue.
c. You are next prompted to enter the upload file size limit in gigabytes (GB). The
default size limit is 2 gigabytes.
7-6
Chapter 7
Configure Fault Management
If the entered value exceeds the file-size limit, an error message displays and
prompts you to re-enter the value.
4. (Optional) By default, Transport Layer Security (TLS) 1.0 is used for HTTPS. Select
option 2, Security configuration if you want to enable TLS versions 1.1 and 1.2 to be
used for HTTPS instead.
3. Either enter the port number that your server will listen on for SNMP traps or press Enter
to accept the default port of 162.
Note:
You cannot use a port number reserved for Oracle Communications Session
Delivery Manager components.
Enter the port number that Trap Relay should listen on: (1-65535) [162]
7-7
Chapter 7
Configure RMI Over SSL - Custom Installation
4. The system requires the entry of the sudo password to support internal
components that require sudo user privileges. If prompted (you entered a port
below 1024 in the previous step), enter the sudo password. Then re-enter the
sudo password to confirm.
5. Select option 5, RMI over SSL setup option. Press Enter to continue.
The RMI over SSL setup option is available from the SDM 9.0.1 release onwards.
Next Step
See Configuring OCSDM for IPv4 Support .
Note:
If you want Session Delivery Manager products to send out emails, you can
setup the mail server credentials to enable the sending of emails to a
targeted Microsoft Exchange and Gmail server.
7-8
Chapter 7
Configure the Mail Server
Note:
Customers may select none, but Oracle recommends all customers select
starttls or ssl.
8. Choose a port number or press Enter to select the default port 465.
9. Select option 1, Configure mail from. Press Enter to continue.
10. Enter the address you want used for the From address.
13. Select option 1, Configure mail logon required. Press Enter to continue.
14. Select either true or false.
a. If you set the mail logon required to true, select option 1, Configure mail logon user
password. Press Enter to continue.
7-9
Chapter 7
Configure Route Management Central
16. Enter the extra mail server properties you want to configure.
property1:value1;property2:value2;property3:value3
17. Select option 2, Apply new mail server configuration. Press Enter to continue.
18. Select option 2, Quit out of mail server configuration. Press Enter to continue.
Please enter the maximum number of route set backups per route set/
backup type combination
# of backups (1-500) [10]
Note:
This section does not discuss the importation or deletion of HTTPS
certificates for the web service. Refer to the Configure Web Server Security
section for more information.
7-10
Chapter 7
Configure Transport Layer Security Certificates
• Organization
• City or locality
• State or province
• Country code
• Key size
• The number of days during which this certificate is valid
After creating an Entity Certificate, new options appear.
5. Select the action you wish to perform.
• View Entity Certificates
• Export Entity Certificate
• Generate Certificate Signing Request (CSR)
• Import Signed Entity Certificate
• Delete Entity Certificates
• Return to Main Menu
6. If you select the option to export the certificate, import a certificate, or generate a CSR,
provide the absolute path to the file.
7. When finished configuring the entity certificate, select option 6, Quit and back to Main
Menu. Press Enter to continue.
7-11
Chapter 7
About Creating a Report Manager Database Instance on the External Oracle Database
7-12
8
Easy Installation
The Easy-Install option is provided for an Oracle Communications Session Delivery Manager
(OCSDM) server installation that has specific, simplified setup options.
The Easy-Install option can be used to deploy an OCSDM instance with basic configuration
options to run Oracle Communications Session Element Manager and Oracle
Communications Route Manager. Additional installation steps are required for Report
Manager and a more comprehensive set of options is offered for the Typical and Custom
installation options in the setup program.
Note:
We recommend that you record all the setup parameters that you configure in this
chapter. You will need to use them again the next time you upgrade OCSDM and
run the Easy Install.
cd /<sdm-install-directory>/AcmePacket/NNC<version>/bin
./setup.sh
8-1
Chapter 8
Configure R226 Compliance and Default User Account Passwords
Note:
A warning message appears if you have less than the recommended
minimum physical memory. Proceeding without the recommended
minimum physical memory may result in performance degradation.
WARNING:
This process may take several minutes to complete. Interrupting the
setup.sh process risks corrupting the system.
Note:
If you set R226 compliance to enabled, you can no longer create LIadmin
user groups and are not prompted to provide an LIadmin password. For
more information on R226 compliance, see "R226 Compliance".
8-2
Chapter 8
Specify the Global ID for Northbound Trap Receivers
• The OCSDM global identifier is selected by default. Choose from the following options to
enter the global ID:
• If you want to retain the default global ID, press Enter. For example:
• If you want to enter another global ID for the system, enter the global ID and press
Enter. For example:
Truststore password []
8-3
Chapter 8
Configure RMI Over SSL - Easy Installation
listen on port 162 and forward device traps from OCSDM to its main northbound trap
receiver(s).
1. Enter the sudo password.
2. Re-enter the sudo password to confirm the sudo password that you set.
If you are doing a standalone installation, go to the Start the Server after Standalone
Installation section. If you are doing a cluster installation go to the Configure the
Cluster and Start the Server Installation section.
10.10.10.2, 10.10.10.3
Please enter the sftp password for member IP [XX.XX.XX.XX]
Password []
Please confirm the password
Confirm password []
4. When prompted, enter the Secure File Transfer Protocol (SFTP) password, which
is the clear-text nncentral user password and press Enter. Refer to the Configure
the NNCentral Account section in the Pre-installation Tasks chapter for more
information.
5. Re-enter the SFTP password to confirm it.
8-4
9
Headless Installation
The Headless Installation of Oracle Communications Session Delivery Manager is a fast,
simplified installation process that runs without the setup application. Use the tasks in this
chapter to specify the user_setup.properties file and run a setup script that points to this file.
When you run the setup script, OCSDM is installed on your server.
Complete the following tasks before you begin this installation:
1. Complete all applicable tasks in the Pre-Installation Tasks chapter.
2. Configure the NNCentral account. Refer to the Configure the NNCentral Account section
for more information.
3. You must unzip the tar file to create the OCSDM installation directory, which contains the
installation program used to run the installation. Refer to the Create a Session Delivery
Manager Installation Directory section for more information.
4. Ensure that this installation is the type of installation that you want to do. Refer to the
Select Installation Type for Session Delivery Manager section for more information.
cd /<directory>
or
or
9-1
Chapter 9
Specify the Setup Properties File
cd /<sdm-install-directory>/AcmePacket/NNC<version>/bin
Note:
After you complete the Headless Installation and decide to run the Typical or
Custom Installation, any changes that you make in these installations are not
propagated to the user_setup.properties file. The changes you made in the
Typical or Custom Installation need to be added to the user_setup.properties
file to keep this file current in the event that you need to use this file again in
a future headless installation.
$ AcmePacket/NNC<version>/conf/setup
2. In the setup directory, you can edit the user_setup.properties setup file with
your inputs by using a built-in text editing program such as nano, vi, or emacs. The
following example shows how to access and show the contents of the
user_setup.properties file.
$ vi user_setup.properties
1 # Password value for default admin user (e.g.
ADMIN_PASSWORD=admin)
2 ADMIN_PASSWORD=abc123
3
4 # Password value for default LIadmin user (e.g.
LI_ADMIN_PASSWORD=LIadmin)
5 LI_ADMIN_PASSWORD=abc123
6
7 # Value for toggling R226 compliance (valid values are enabled/
disabled) (e.g. R226_COMPLIANCE=enabled)
8 R226_COMPLIANCE=enabled
9
10 # Global configuration value (e.g. GLOBAL_CONFIG_ID=OCSDM)
11 GLOBAL_CONFIG_ID=OCSDM
12
13 # Server name for HTTPS configuration (must match CN or Common
Name value of the certificate)
14 SERVER_NAME=name.server.com
15
16 # Password value for Trust Store (e.g.
TRUST_STORE_PASSWORD=abc123)
17 TRUST_STORE_PASSWORD=abc123
9-2
Chapter 9
Specify the Setup Properties File
18
19 # Support for RMIOverSSL is available from the SDM 9.0.1 release
onwards.
20 # Password value for RMIOverSSL (e.g.
RMI_TRUST_STORE_PASSWORD=example123).
21 # The parameter can be used from SDM 9.0.1 release onwards
22 # RMI_TRUST_STORE_PASSWORD=abc123
23
24 # Password value for sudo user 'nncentral' (e.g.
SUDO_PASSWORD=abc123)
25 # SUDO_PASSWORD=abc123
26
27 # Password value for SFTP user 'nncentral' (e.g.
SFTP_PASSWORD=abc123)
28 SFTP_PASSWORD=abc123
29
30 # Comma-separated list of cluster member IP addresses
31 #(e.g for SDM.9.0.1 onwards :-
CLUSTER_MEMBERS=IP-1:sftpPwd,IP-2:sftpPwd, [...] IP-N:sftpPwd )
32 # CLUSTER_MEMBERS=
10.10.10.2:abc123,10.10.10.3:abc123,10.10.10.4:abc123
33 # OR
34 #( e.g for SDM 9.0 :- e.g. CLUSTER_MEMBERS=IP-1, IP-2, [...] IP-N )
35 # CLUSTER_MEMBERS=10.10.10.2,10.10.10.3,10.10.10.4
The following table describes each input used to configure your OCSDM server:
9-3
Chapter 9
Start the Headless Installation
Note:
This is available from the SDM 9.0.1
release onwards.
Note:
If you are doing a standalone installation,
enter the pound symbol (#) to omit the
CLUSTER_MEMBERS= entry. For example:
22 # CLUSTER_MEMBERS=
3. Save the inputs you made to the user_setup.properties file in the text editor.
9-4
Chapter 9
Configure RMI Over SSL - Headless Installation
For example:
cd <sdm-install-directory>/AcmePacket/NNC<version>/bin
3. Run the setup application with the setup.sh script with the headless syntax and the full
path to the user_setup.properties file that you specified for this installation. For
example:
Note:
A warning message appears if you have less than the recommended minimum
physical memory. Proceeding without the recommended minimum physical
memory may result in performance degradation.
WARNING:
This process may take several minutes to complete. Interrupting the setup.sh
process risks corrupting the system.
Note:
The RMI over SSL setup option is supported from the SDM.9.0.1 release onwards.
By default, a self-signed certificate option has been configured for RMI over SSL.
1. In the AcmePacket/NNC90_1/conf/setup/user_setup.properties file, provide
RMI_TRUST_STORE_PASSWORD.
2. Update the user_setup.properties file for the below line:
9-5
10
Start the Session Delivery Manager Server
Use the tasks in this chapter to start Oracle Communications Session Delivery Manager
server(s) after a standalone or cluster. You can also use this chapter to check the status of
OCSDM server processes to make sure the server(s) are running properly.
cd /<sdm-install-directory>/AcmePacket/NNC<version>/bin
./startnnc.sh
After all services have started, the system is ready for use. Do not attempt to log in until
the console has indicated that the web servers are up. If you are upgrading from 7.5M3,
the plugin service management system automatically uploads the plugins from the path
you identified earlier, and installs them. The console displays the number of services
started. For example:
4. Once the system is started, you can begin using OCSDM by entering the server host
name or IP address, and port number in your web browser navigation bar.
For example:
https://example.com:8443
5. In the login page, enter the administrator login name and password that you configured in
the Configure User Account Passwords section.
Next Steps
• Check OCSDM server processes.
10-1
Chapter 10
Start the Server after a Cluster Installation
Note:
If you are migrating from SDM 7.5M3 to SDM 8.x, ensure that the application
data migration from SDM 7.5M3 to SDM 8.x has successfully completed
before starting the cluster. The migration to OCSDM 9.0 is from OCSDM 8.x
or 8.x.x.
1. Once the installation completes, switch to the nncentral user from the root user on
any cluster node. For example:
cd /<sdm-install-directory>/AcmePacket/NNC<version>/bin
./startnnc.sh
After all services have started, the system is ready for use. Do not attempt to log in
until the console has indicated that the web servers are up. If you are upgrading
from 7.5M3, the plugin service management system automatically uploads the
plugins from the path you identified earlier, and installs them. The console displays
the number of services started. For example:
4. Once the system is started, you can begin using OCSDM by entering the server
host name or IP address, and port number in your web browser navigation bar.
For example:
https://example.com:8443
5. Once this server has started on this node and it is operational, you can start the
other server node(s).
6. Enter the administrator login name and password that you configured in the
Configure User Account Passwords section.
10-2
Chapter 10
Check Server Processes
Next Steps
• Check OCSDM server processes.
10-3