|
|
As your network inventory and user base grow, you need to perform certain system administration tasks to accommodate that growth. This chapter describes some of the features this product provides to help you with these tasks.
The following sections are presented in this chapter:
Perform storage management tasks to ensure you have a set of database backups in case your current database becomes corrupted or otherwise unusable.
Use a directory naming scheme that indicates your backup dates in case you need to restore the database. You should create a separate directory for each back up. The backup directory must be writeable by the user bin on Solaris systems. The backup process creates three files:
The px.db file is your database backup. The px.log file is a log of database transactions. Without the px.log file, you cannot restore your database. The CRM_filebackup.tar file contains a collection of backup files created by Essentials applications.
Scenario: You have imported devices into your Essentials database and you need to back up the database.
You can back up your database immediately or you can schedule it for later.
You should create a separate directory for each back up. Store a single set of backup files in each directory. Each time you perform a back up, Essentials stores the most current px.db and px.log files and other files specified by Essentials components in that directory.
To back up the database immediately, perform the following steps:
Step 1 Select Admin > System Admin > Backup Data Now.
The Back Up Now dialog box appears. (See Figure 7-1.)

Step 2 Enter the fully qualified pathname of the back up directory, then click Finish.
A confirmation message appears.
To schedule a backup for later, perform the following steps:
Step 1 Select Admin > System Admin > Schedule Backup.
The Schedule Backup dialog box appears. (See Figure 7-2.)

![]() | Caution Store back ups in a partition other than the one hosting the run-time database. If that partition becomes corrupted, your back up could also become corrupted if it resides on the same partition. |
[***Reviewers: Where did this feature go? It's no longer in Admin.***]
Scenario: You discover your run-time database is corrupted and you want to restore the database.
To restore the database, perform the following steps:
Step 1 Select Admin > System Admin > Restore Data.
The Restore message appears.
Step 2 Read the message, then click Next.
The Restore dialog box appears. (See Figure 7-3.)
(***)
Step 3 Enter the fully qualified pathname of the directory containing the backed up database you want to use.
Step 4 Click Next. [Will this button be changed to Finish in the dialog box?]
The database in that directory will be copied over your current database.
[***Reviewers: Where did this feature go? It's no longer in Admin.***]
Scenario: You notice the file system containing the Essentials database is filling up and you need to move the current run-time database to a new location.
To move the database, perform the following procedure:
Step 1 Select Admin > System Admin > Move Data.
The Move message appears.
Step 2 Read the message, then click Next.
The Move dialog box appears. (See Figure 7-4.)
(***)
Step 3 Enter the fully qualified pathname of the directory to which you want to move the current run-time database.
![]() | Caution The entire application except for the web server will be shut down as part of this process. Be sure you are not running any critical tasks when you move the Essentials database. |
Step 4 Click Finish.
The database is moved and restarted.
Several of the network management and application management operations provided by this product are potentially disruptive to the network (for example, software image downloads) or to Essentials applications themselves (for example, stop a process, move the database) and need to be protected. To prevent such potentially disruptive operations from being used accidentally or maliciously, this product includes a multi-level security system that allows access to such features only to users who can authenticate themselves at the appropriate level.
The security features depend on the platform you are using. The following security levels are available:
| Level | Directory | Description |
|---|---|---|
0 | HD | Help Desk |
1 | AP | Approver |
2 | NO | Network Operator |
4 | NA | Network Administrator |
8 | SA | System Administrator |
Each security level has a different set of available tasks. For example, level 0, Help Desk, only provides access to tasks that are required for help desk activities. Level 8, System Administrator, provides access to all tasks.
The system administrator determines the security level of all users when they are given access to Essentials. Users can change their password but only the system administrator can add and delete users or change a user's password.
You can add and delete users and change passwords by performing the tasks described in the following sections.
Scenario: Your company has just hired a new employee to help manage the network and you want to give the employee administrator-level privileges.
To add a user, perform the following steps:
Step 1 Select Admin > User Accounts > Add Users.
The Add Users dialog box appears. (See Figure 7-5.)

Step 2 Enter the username, password, password confirmation, email address, CCO login, and CCO password, then click Add.
A confirmation message appears.
Scenario: An employee in your network administration group has left your company. You need to delete the employee from the administrator-level user list.
To delete users, perform the following steps:
Step 1 Select Admin > User Accounts > Modify/Delete Users.
The Modify Users dialog box appears. (See Figure 7-6.)

Step 2 Select the name of the user you want to delete from the list, then click Delete.
Step 3 Click Delete again to confirm.
A confirmation message appears.
Scenario: A user wants to change his password to ensure the security of his account.
To change a password, perform the following steps:
Step 1 Select Admin > User Accounts > Modify My Profile.
The Modify My Profile dialog box appears. (See Figure 7-7.)

Step 2 Modify the password and any other settings you want to change, then click Modify.
The password and modified settings change and a confirmation message appears.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Thu Sep 30 10:23:30 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.