AdministeringSALGateway 4.0
AdministeringSALGateway 4.0
SAL Gateway
Release 4.0
Issue 1
January 2022
© 2017-2022, Avaya Inc. documentation does not expressly identify a license type, the
All Rights Reserved. applicable license will be a Designated System License as set forth
below in the Designated System(s) License (DS) section as
Notice applicable. The applicable number of licenses and units of capacity
While reasonable efforts have been made to ensure that the for which the license is granted will be one (1), unless a different
information in this document is complete and accurate at the time of number of licenses or units of capacity is specified in the
printing, Avaya assumes no liability for any errors. Avaya reserves documentation or other materials available to You. “Software” means
the right to make changes and corrections to the information in this computer programs in object code, provided by Avaya or an Avaya
document without the obligation to notify any person or organization Channel Partner, whether as stand-alone products, pre-installed on
of such changes. hardware products, and any upgrades, updates, patches, bug fixes,
or modified versions thereto. “Designated Processor” means a single
Documentation disclaimer stand-alone computing device. “Server” means a set of Designated
“Documentation” means information published in varying mediums Processors that hosts (physically or virtually) a software application
which may include product information, operating instructions and to be accessed by multiple users. “Instance” means a single copy of
performance specifications that are generally made available to users the Software executing at a particular time: (i) on one physical
of products. Documentation does not include marketing materials. machine; or (ii) on one deployed software virtual machine (“VM”) or
Avaya shall not be responsible for any modifications, additions, or similar deployment.
deletions to the original published version of Documentation unless License types
such modifications, additions, or deletions were performed by or on
the express behalf of Avaya. End User agrees to indemnify and hold Designated System(s) License (DS). End User may install and use
harmless Avaya, Avaya's agents, servants and employees against all each copy or an Instance of the Software only: 1) on a number of
claims, lawsuits, demands and judgments arising out of, or in Designated Processors up to the number indicated in the order; or 2)
connection with, subsequent modifications, additions or deletions to up to the number of Instances of the Software as indicated in the
this documentation, to the extent made by End User. order, Documentation, or as authorized by Avaya in writing. Avaya
may require the Designated Processor(s) to be identified in the order
Link disclaimer by type, serial number, feature key, Instance, location or other
Avaya is not responsible for the contents or reliability of any linked specific designation, or to be provided by End User to Avaya through
websites referenced within this site or Documentation provided by electronic means established by Avaya specifically for this purpose.
Avaya. Avaya is not responsible for the accuracy of any information, Concurrent User License (CU). End User may install and use the
statement or content provided on these sites and does not Software on multiple Designated Processors or one or more Servers,
necessarily endorse the products, services, or information described so long as only the licensed number of Units are accessing and using
or offered within them. Avaya does not guarantee that these links will the Software at any given time. A “Unit” means the unit on which
work all the time and has no control over the availability of the linked Avaya, at its sole discretion, bases the pricing of its licenses and can
pages. be, without limitation, an agent, port or user, an e-mail or voice mail
Warranty account in the name of a person or corporate function (e.g.,
webmaster or helpdesk), or a directory entry in the administrative
Avaya provides a limited warranty on Avaya hardware and software. database utilized by the Software that permits one user to interface
Refer to your sales agreement to establish the terms of the limited with the Software. Units may be linked to a specific, identified Server
warranty. In addition, Avaya’s standard warranty language, as well as or an Instance of the Software.
information regarding support for this product while under warranty is
available to Avaya customers and other parties through the Avaya Cluster License (CL). End User may install and use each copy or an
Support website: https://support.avaya.com/helpcenter/ Instance of the Software only up to the number of Clusters as
getGenericDetails?detailId=C20091120112456651010 under the link indicated on the order with a default of one (1) Cluster if not stated.
“Warranty & Product Lifecycle” or such successor site as designated “Cluster” means a group of Servers and other resources that act as a
by Avaya. Please note that if You acquired the product(s) from an single system.
authorized Avaya Channel Partner outside of the United States and Enterprise License (EN). End User may install and use each copy or
Canada, the warranty is provided to You by said Avaya Channel an Instance of the Software only for enterprise-wide use of an
Partner and not by Avaya. unlimited number of Instances of the Software as indicated on the
Licenses order or as authorized by Avaya in writing.
THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA Named User License (NU). You may: (i) install and use each copy or
WEBSITE, HTTPS://SUPPORT.AVAYA.COM/LICENSEINFO, Instance of the Software on a single Designated Processor or Server
UNDER THE LINK “AVAYA SOFTWARE LICENSE TERMS (Avaya per authorized Named User (defined below); or (ii) install and use
Products)” OR SUCH SUCCESSOR SITE AS DESIGNATED BY each copy or Instance of the Software on a Server so long as only
AVAYA, ARE APPLICABLE TO ANYONE WHO DOWNLOADS, authorized Named Users access and use the Software. “Named
USES AND/OR INSTALLS AVAYA SOFTWARE, PURCHASED User”, means a user or device that has been expressly authorized by
FROM AVAYA INC., ANY AVAYA AFFILIATE, OR AN AVAYA Avaya to access and use the Software. At Avaya’s sole discretion, a
CHANNEL PARTNER (AS APPLICABLE) UNDER A COMMERCIAL “Named User” may be, without limitation, designated by name,
AGREEMENT WITH AVAYA OR AN AVAYA CHANNEL PARTNER. corporate function (e.g., webmaster or helpdesk), an e-mail or voice
UNLESS OTHERWISE AGREED TO BY AVAYA IN WRITING, mail account in the name of a person or corporate function, or a
AVAYA DOES NOT EXTEND THIS LICENSE IF THE SOFTWARE directory entry in the administrative database utilized by the Software
WAS OBTAINED FROM ANYONE OTHER THAN AVAYA, AN AVAYA that permits one user to interface with the Software.
AFFILIATE OR AN AVAYA CHANNEL PARTNER; AVAYA Shrinkwrap License (SR). You may install and use the Software in
RESERVES THE RIGHT TO TAKE LEGAL ACTION AGAINST YOU accordance with the terms and conditions of the applicable license
AND ANYONE ELSE USING OR SELLING THE SOFTWARE agreements, such as “shrinkwrap” or “clickthrough” license
WITHOUT A LICENSE. BY INSTALLING, DOWNLOADING OR accompanying or applicable to the Software (“Shrinkwrap License”).
USING THE SOFTWARE, OR AUTHORIZING OTHERS TO DO SO,
YOU, ON BEHALF OF YOURSELF AND THE ENTITY FOR WHOM Support tools
YOU ARE INSTALLING, DOWNLOADING OR USING THE “AVAYA SUPPORT TOOLS” MEAN THOSE SUPPORT TOOLS
SOFTWARE (HEREINAFTER REFERRED TO PROVIDED TO PARTNERS OR CUSTOMERS IN CONNECTION
INTERCHANGEABLY AS “YOU” AND “END USER”), AGREE TO WITH MAINTENANCE SUPPORT OF AVAYA EQUYIPMENT (E.G.,
THESE TERMS AND CONDITIONS AND CREATE A BINDING SAL, SLA MON, AVAYA DIAGNOISTIC SERVER, ETC.) AVAYA
CONTRACT BETWEEN YOU AND AVAYA INC. OR THE SUPPORT TOOLS ARE INTENDED TO BE USED FOR LAWFUL
APPLICABLE AVAYA AFFILIATE (“AVAYA”). DIAGNOSTIC AND NETWORK INTEGRITY PURPOSES ONLY. The
Avaya grants You a license within the scope of the license types customer is responsible for understanding and complying with
described below, with the exception of Heritage Nortel Software, for applicable legal requirements with regard to its network. The Tools
which the scope of the license is detailed below. Where the order may contain diagnostic capabilities that allow Avaya, authorized
Avaya partners, and authorized customer administrators to capture
packets, run diagnostics, capture key strokes and information from (“AVC VIDEO”) AND/OR (II) DECODE AVC VIDEO THAT WAS
endpoints including contact lists, and remotely control and monitor ENCODED BY A CONSUMER ENGAGED IN A PERSONAL
end-user devices. The customer is responsible for enabling these ACTIVITY AND/OR WAS OBTAINED FROM A VIDEO PROVIDER
diagnostic capabilities, for ensuring users are aware of activities or LICENSED TO PROVIDE AVC VIDEO. NO LICENSE IS GRANTED
potential activities and for compliance with any legal requirements OR SHALL BE IMPLIED FOR ANY OTHER USE. ADDITIONAL
with respect to use of the Tools and diagnostic capabilities on its INFORMATION FOR H.264 (AVC) AND H.265 (HEVC) CODECS
network, including, without limitation, compliance with laws regarding MAY BE OBTAINED FROM MPEG LA, L.L.C. SEE HTTP://
notifications regarding capture of personal data and call recording. WWW.MPEGLA.COM.
Avaya Support Tools are provided as an entitlement of Avaya Compliance with Laws
Support Coverage (e.g., maintenance) and the entitlements are
established by Avaya. The scope of the license for each Tool is You acknowledge and agree that it is Your responsibility for
described in its License terms and/or the applicable service complying with any applicable laws and regulations, including, but not
description document. limited to laws and regulations related to call recording, data privacy,
intellectual property, trade secret, fraud, and music performance
Copyright rights, in the country or territory where the Avaya product is used.
Except where expressly stated otherwise, no use should be made of Preventing Toll Fraud
materials on this site, the Documentation, Software, Hosted Service,
or hardware provided by Avaya. All content on this site, the “Toll Fraud” is the unauthorized use of your telecommunications
documentation, Hosted Service, and the product provided by Avaya system by an unauthorized party (for example, a person who is not a
including the selection, arrangement and design of the content is corporate employee, agent, subcontractor, or is not working on your
owned either by Avaya or its licensors and is protected by copyright company's behalf). Be aware that there can be a risk of Toll Fraud
and other intellectual property laws including the sui generis rights associated with your system and that, if Toll Fraud occurs, it can
relating to the protection of databases. You may not modify, copy, result in substantial additional charges for your telecommunications
reproduce, republish, upload, post, transmit or distribute in any way services.
any content, in whole or in part, including any code and software Avaya Toll Fraud intervention
unless expressly authorized by Avaya. Unauthorized reproduction,
transmission, dissemination, storage, and or use without the express If You suspect that You are being victimized by Toll Fraud and You
written consent of Avaya can be a criminal, as well as a civil offense need technical assistance or support, call Technical Service Center
under the applicable law. Toll Fraud Intervention Hotline at +1-800-643-2353 for the United
States and Canada. For additional support telephone numbers, see
Third Party Components the Avaya Support website: https://support.avaya.com or such
“Third Party Components” mean certain software programs or successor site as designated by Avaya.
portions thereof included in the Software or Hosted Service may Security Vulnerabilities
contain software (including open source software) distributed under
third party agreements (“Third Party Components”), which contain Information about Avaya’s security support policies can be found in
terms regarding the rights to use certain portions of the Software the Security Policies and Support section of https://
(“Third Party Terms”). As required, information regarding distributed support.avaya.com/security.
Linux OS source code (for those products that have distributed Linux Suspected Avaya product security vulnerabilities are handled per the
OS source code) and identifying the copyright holders of the Third Avaya Product Security Support Flow (https://
Party Components and the Third Party Terms that apply is available support.avaya.com/css/P8/documents/100161515).
in the products, Documentation or on Avaya’s website at: https://
support.avaya.com/Copyright or such successor site as designated Downloading Documentation
by Avaya. The open source software license terms provided as Third For the most current versions of Documentation, see the Avaya
Party Terms are consistent with the license rights granted in these Support website: https://support.avaya.com, or such successor site
Software License Terms, and may contain additional rights benefiting as designated by Avaya.
You, such as modification and distribution of the open source
software. The Third Party Terms shall take precedence over these Contact Avaya Support
Software License Terms, solely with respect to the applicable Third See the Avaya Support website: https://support.avaya.com for
Party Components to the extent that these Software License Terms product or Hosted Service notices and articles, or to report a problem
impose greater restrictions on You than the applicable Third Party with your Avaya product or Hosted Service. For a list of support
Terms. telephone numbers and contact addresses, go to the Avaya Support
Service Provider website: https://support.avaya.com (or such successor site as
designated by Avaya), scroll to the bottom of the page, and select
THE FOLLOWING APPLIES TO AVAYA CHANNEL PARTNER’S Contact Avaya Support.
HOSTING OF AVAYA PRODUCTS OR SERVICES. THE PRODUCT
OR HOSTED SERVICE MAY USE THIRD PARTY COMPONENTS Trademarks
SUBJECT TO THIRD PARTY TERMS AND REQUIRE A SERVICE The trademarks, logos and service marks (“Marks”) displayed in this
PROVIDER TO BE INDEPENDENTLY LICENSED DIRECTLY FROM site, the Documentation, Hosted Service(s), and product(s) provided
THE THIRD PARTY SUPPLIER. AN AVAYA CHANNEL PARTNER’S by Avaya are the registered or unregistered Marks of Avaya, its
HOSTING OF AVAYA PRODUCTS MUST BE AUTHORIZED IN affiliates, its licensors, its suppliers, or other third parties. Users are
WRITING BY AVAYA AND IF THOSE HOSTED PRODUCTS USE not permitted to use such Marks without prior written consent from
OR EMBED CERTAIN THIRD PARTY SOFTWARE, INCLUDING Avaya or such third party which may own the Mark. Nothing
BUT NOT LIMITED TO MICROSOFT SOFTWARE OR CODECS, contained in this site, the Documentation, Hosted Service(s) and
THE AVAYA CHANNEL PARTNER IS REQUIRED TO product(s) should be construed as granting, by implication, estoppel,
INDEPENDENTLY OBTAIN ANY APPLICABLE LICENSE or otherwise, any license or right in and to the Marks without the
AGREEMENTS, AT THE AVAYA CHANNEL PARTNER’S EXPENSE, express written permission of Avaya or the applicable third party.
DIRECTLY FROM THE APPLICABLE THIRD PARTY SUPPLIER.
Avaya is a registered trademark of Avaya Inc.
WITH RESPECT TO CODECS, IF THE AVAYA CHANNEL
PARTNER IS HOSTING ANY PRODUCTS THAT USE OR EMBED All non-Avaya trademarks are the property of their respective owners.
THE H.264 CODEC OR H.265 CODEC, THE AVAYA CHANNEL Linux® is the registered trademark of Linus Torvalds in the U.S. and
PARTNER ACKNOWLEDGES AND AGREES THE AVAYA other countries.
CHANNEL PARTNER IS RESPONSIBLE FOR ANY AND ALL
RELATED FEES AND/OR ROYALTIES. THE H.264 (AVC) CODEC
IS LICENSED UNDER THE AVC PATENT PORTFOLIO LICENSE
FOR THE PERSONAL USE OF A CONSUMER OR OTHER USES
IN WHICH IT DOES NOT RECEIVE REMUNERATION TO: (I)
ENCODE VIDEO IN COMPLIANCE WITH THE AVC STANDARD
Contents
Chapter 1: Introduction.......................................................................................................... 10
Purpose of the document....................................................................................................... 10
Change history...................................................................................................................... 10
Chapter 2: SAL Gateway overview........................................................................................ 14
SAL Gateway........................................................................................................................ 14
Capacity of a standalone SAL Gateway................................................................................... 14
Other SAL components.......................................................................................................... 15
SAL Core and Remote Servers........................................................................................ 15
Secure Tunnel Connectors............................................................................................... 15
SAL Policy Manager with SSH Proxy................................................................................ 16
Functions of SAL components................................................................................................ 16
Administrator responsibilities............................................................................................. 18
Chapter 3: SAL Gateway management through the SAL Gateway web interface............ 19
SAL Gateway web interface overview..................................................................................... 19
Capacity of the SAL Gateway web interface...................................................................... 19
Browser requirements to access the SAL Gateway web interface........................................ 20
SAL Gateway home page...................................................................................................... 20
Accessing the SAL Gateway web interface.............................................................................. 22
SAL Gateway user authentication........................................................................................... 23
Logging in with local credentials....................................................................................... 23
Logging in with a certificate.............................................................................................. 23
Logging out of the SAL Gateway user interface........................................................................ 24
Chapter 4: Administering SAL Gateway configurations..................................................... 25
SAL Gateway administration overview.................................................................................... 25
Administering SAL Gateway Solution Element ID .................................................................... 25
Automatic Solution Element ID generation overview........................................................... 25
Configuring the Solution Element ID of SAL Gateway manually .......................................... 26
Generating the Solution Element ID of SAL Gateway automatically..................................... 27
Editing the SAL Gateway identification information................................................................... 29
Gateway Configuration field descriptions........................................................................... 30
Configuring SAL Gateway with a proxy................................................................................... 31
HTTP/SOCKS Proxy Server field descriptions................................................................... 32
Uploading the proxy server certificate to SAL Gateway....................................................... 33
Reviewing SAL Core Server configuration............................................................................... 34
Core Server field descriptions........................................................................................... 34
Reviewing SAL Remote Server configuration........................................................................... 35
Remote Server field descriptions...................................................................................... 36
SAL Hosted Concentrator overview........................................................................................ 36
Avaya Hosted Configuration for BP field descriptions......................................................... 36
Change history
SAL Gateway
SAL Gateway centralizes remote access, alarm transfer, and access control policies for Avaya
devices across the customer network. SAL Gateway provides a secure remote access connection
between Avaya and Avaya devices on the customer network. Through SAL, Avaya Service tools
and engineers can access customer devices to resolve network and product-related issues.
The key feature of SAL is simple network integration. Instead of opening numerous inbound and
outbound ports between the customer and the service provider, SAL consolidates the entire traffic
and uses a single outbound firewall port to facilitate secure HTTPS communication. Therefore,
SAL minimizes network impact.
SAL uses CA certificate-based authentication for remote access requests. You can intelligently
establish access policies using an optional SAL Policy Manager.
For information about new features and enhancements introduced in Avaya Diagnostic Server
Release 4.0, see Deploying Avaya Diagnostic Server 4.0 or Avaya Diagnostic Server 4.0 Release
Notes.
Avaya Diagnostic Server Release 4.0 introduces Flex support for cloud based Avaya products.
Flex platform assists in uniform installation and standardizes the product packaging for all the
types of deployment.
The flex supported products are:
• Cluster Control Manager
• Common Service Platform
• Avaya Analytics
Note:
SAL Gateway performs at the maximum capacity when:
• The host server of SAL Gateway meets the Avaya-recommended specifications and
requirements.
• The alarm flow, remote sessions, and network conditions are normal.
When you upgrade SAL Gateway Release 4.0 on a host with 2-GB RAM, the maximum
capacity remains the same:
• 500 managed elements
• 50 simultaneous remote sessions
completes the secure and high-performance link for each remote access session created by the
service personnel to a customer product. STCs are geographically distributed to ensure minimal
network delay between the personnel and SAL Gateway. The browser of the personnel and the
remote agent for the target device are automatically directed to the nearest STC with available
capacity.
You need not administer the STC host names on SAL Gateway or the host sever.
communicate with SAL Policy Manager, SAL Gateway checks the local policies provided by Policy
Manager. If the request meets the policy conditions, SAL Gateway establishes an end-to-end
connection for remote access from the desktop of the support personnel to the managed device.
If Secure Tunnel Connectors (STC) are present in the SAL architecture, SAL uses STC as the
channel of remote access connection between the desktop of the support personnel and the SAL
Gateway on the customer network. Secure Tunnel Connector completes the secure, high-
performance link for each session created from Avaya to a customer product.
With the latest SAL enhancements, applicable to Avaya managed services customers under
APCS offer, SAL now also provides a secure transport between customer devices and all APCS
tools.
SAL architecture
The following figure illustrates a SAL architecture-based scenario for alarm flow and secure
remote access.
Administrator responsibilities
As the administrator of SAL Gateway, you are responsible for:
• Administering the SAL Gateway configuration to facilitate alarm transfer and remote access
support.
• Administering managed elements on SAL Gateway.
• Managing inventory collection from managed devices.
• Managing the redundant SAL Gateways.
• Managing user and remote access security.
• Managing certificates on SAL Gateway.
• Monitoring the SAL Gateway status and logs.
• Managing software updates.
• Backing up and restoring SAL Gateway.
Note:
If you see the SMTP Configuration page after logging in, it means
that the configured Simple Mail Transfer Protocol (SMTP) details
are incomplete or not in the required format. The SAL Gateway
user interface restricts your access to any other pages on the
user interface. You must update the SMTP configuration with
correct details before you can navigate to other pages on the user
interface. To receive notifications about new software releases,
software download status, and software installation status, ensure
that the SMTP details are correct.
A Health icon is available in the top-right corner of the SAL Gateway UI. The different icons indicate the
cumulative status of SAL Gateway services and connectivity.
Icon Description
The status of the SAL Gateway components is between 0-19%.
Note:
For more information about the components that have issues, see the SAL Gateway Service
Control and Status page.
Note:
Contact your system administrator for local Linux login credentials.
• A computer with a web browser and access to the network where SAL Gateway is installed.
Procedure
1. Open a web browser from the computer on your network.
2. Browse to the host name and port configured for SAL Gateway using one of the following
two methods:
• To access the SAL Gateway user interface on the local network, type the following URL:
https://[host name or IP address of SAL Gateway]:7443
• To access the SAL Gateway user interface through SAL Remote Server, type the
following URL:
https://localhost:7443/
The system displays a login screen.
3. On the login page, enter your login credentials to log on to the SAL Gateway user
interface.
Through the SAL Gateway user interface, you can configure the correct Solution Element ID using
one of the following options:
• If you have already registered SAL Gateway with Avaya and obtained the SAL Gateway IDs
from Avaya, configure the correct IDs manually.
• If you are yet to register SAL Gateway with Avaya, generate the Solution Element ID
automatically through the SAL Gateway user interface.
Related links
Configuring the Solution Element ID of SAL Gateway manually on page 26
Generating the Solution Element ID of SAL Gateway automatically on page 27
Caution:
While copying and pasting the XML response, ensure the following:
• Do not include the additional XML tag <?xml version="1.0"
encoding="UTF-8" standalone="true"?>.
• Do not miss any XML tags or characters from the XML response.
• Do not include any additional characters to the XML response.
10. Click Next.
The Registration Wizard window displays the generated Solution Element ID and the
Product ID of SAL Gateway.
11. Click Save.
The system saves the SAL Gateway registration information.
12. Click Close.
Next steps
For the configuration changes to take effect immediately, restart the SAL Gateway services
through the Apply Configuration Changes page.
Important:
Restarting the SAL Gateway services might terminate established connections and might
result in SNMP traps being missed.
Related links
Configuring the Solution Element ID of SAL Gateway manually on page 26
Note:
To avoid mysterious traffic accidentally being logged by firewalls, ensure that the host
name and IP address are correctly entered. A typographic error, such as avay.com,
can introduce domains that are NOT owned by Avaya.
4. To activate alarm transfer through SAL Gateway, select the Alarm Enabled check box.
5. To activate inventory collection from SAL Gateway, perform the following:
a. Select the Inventory Collection check box.
b. In the Inventory collection frequency field, enter a value to specify the inventory
collection interval.
6. Click Apply.
Next steps
For the configuration changes to take effect immediately, restart the SAL Gateway services
through the Apply Configuration Changes page. However, this is optional because the services
are restarted automatically at a scheduled time.
Important:
Restarting the SAL Gateway services might terminate established connections and might
result in SNMP traps being missed.
Related links
Gateway Configuration field descriptions on page 30
Name Description
Inventory Collection The check box to enable inventory collection for SAL Gateway. When
this check box is selected, SAL Gateway collects and sends its
inventory information to SAL Core Server at regular interval for Avaya
reference.
Inventory collection frequency The interval in hours at which SAL Gateway collects inventory data.
Inventory The status of the last inventory collection attempt from SAL Gateway.
The status can be:
• Not available: Indicates that the inventory collection option is
disabled for SAL Gateway and no inventory data is collected.
• Last inventory collection attempt failed: Indicates that the last
inventory collection attempt failed.
• A timestamp: Indicates that the last inventory collection attempt
was successful. You can click the timestamp link to view the
inventory report of SAL Gateway.
Related links
Editing the SAL Gateway identification information on page 29
Name Description
Login The login ID that authenticates you to the proxy. This field is required
only if you configured authentication for your proxy.
Important:
SAL Gateway on System Platform does not support
authentication of proxy.
Password The password associated with the login ID. This field is required only
if you fill the Login field.
Test URL An external HTTP URL to test the connection from SAL Gateway
through the proxy.
Related links
Configuring SAL Gateway with a proxy on page 31
Procedure
1. Log on to the SAL Gateway user interface.
2. On the main menu, click Security > Certificate Management.
3. On the Certificate Management page, click Upload.
4. Click Browse to locate and select the certificate.
5. Click Upload.
The system uploads the certificate to the truststore of SAL Gateway.
6. Restart the SAL services to apply the new certificate.
Related links
Configuring SAL Gateway with a proxy on page 31
Important:
SAL Gateway Release 3.0 does not support Core Server of Business Partners. You cannot
change the default values on this page.
Name Description
Platform Qualifier An alphanumeric string to establish a channel for communication
between SAL Gateway and SAL Core Server.
The default platform qualifier is Enterprise-production.
Primary Core Server The fully qualified host name of the SAL Core Server that SAL
Gateway first contacts.
The default value is secure.alarming.avaya.com, which is the
SAL Core Server located at Avaya.
Port The port number of the primary SAL Core Server.
The default port is 443, which is for the SAL Core Server at Avaya.
Button Description
Test Starts the diagnostic tests for connectivity to the defined SAL Core
Server host. The tests, however, do not validate the platform qualifier.
Related links
Reviewing SAL Core Server configuration on page 34
Button Description
Test Connectivity Starts a connectivity test to the defined SAL Remote Server.
Related links
Reviewing SAL Remote Server configuration on page 35
Important:
You cannot change the default values on this page other than the Business Partners Link Id
allotted for your authorized Avaya Partner.
Note:
After you update the BP Link ID, the BP Name is displayed as Default for 30 first seconds
before displaying the correct BP name.
If Managed Services mode is enabled for SAL Gateway, SAL Hosted Concentrator
configuration is disabled. Log on to SAL Core to disable the Managed Services mode.
Field Name Description
SAL Hosted Concentrator The check box to enable the Business Partners connection to the
Connectivity Enabled Avaya Hosted Server.
SAL Hosted Concentrator Host name of the Avaya Hosted Server for BP that can request and
Server facilitate remote access for service personnel.
Port The port number of the Avaya Hosted Server.
BP Name The Business Partners name is auto populated by the Avaya hosted
server, after verifying the Business Partners name assigned to the
Link ID. If the Link ID is invalid or not configured with SAL Gateway,
this field will be set to the default value and SAL Gateway will not be
accessible by the Business Partners.
BP Link ID The unique identifier assigned to all the authorised Avaya Partners.
Contact Avaya or your Avaya authorised Partner to obtain this Link
ID.
Remote Access Enabled This check box enables the Business Partners to gain Customer
Remote access. The field is read only.
Alarming Enabled This check box enables SAL Gateway to send alarms to Avaya
hosted Concentrator. The field is read only.
Button Description
Edit Makes the fields available for editing.
Test Connectivity Initiates a connectivity test to the defined primary SAL Remote
Server.
Apply Applies the changes made to BP configuration.
Note:
• You can only edit the BP Link ID field and SAL Hosted Concentrator Connectivity
Enabled check box on the Avaya Hosted Configuration for Business Partners page. The
other fields are auto populated after communicating with SAL Hosted Concentrator.
• After you update the BP Link ID, the BP Name is displayed as Default for 30 first
seconds before displaying the correct BP name.
• If Managed Services mode is enabled for SAL Gateway, SAL Hosted Concentrator
configuration is disabled. Log on to SAL Core to disable the Managed Services mode.
Before you begin
Contact Avaya or your Authorized Avaya Partner to obtain the Business Partners Link ID.
Procedure
1. On the main menu of the SAL Gateway user interface, click Configuration > Avaya
Hosted Configuration for Business Partners.
2. On the Avaya Hosted Configuration for Business Partners page, click Edit.
3. Select the SAL Hosted Concentrator Connectivity Enabled check box.
4. In the BP Link ID field, enter the Link ID assigned to your Business Partner.
5. Click Apply.
If the Link ID is invalid or not configured with SAL Gateway, the BP Link ID field is set to
the default value. The Business Partners cannot access SAL Gateway for remote
connectivity.
6. (Optional) To verify the connection between the SAL Hosted Concentrator and SAL
Gateway, click Test Connectivity.
Modifying BP Link ID
About this task
Use the following procedure to change a BP link ID for SAL Hosted Concentrator.
Before you begin
Contact Avaya or your Authorized Avaya Partner to obtain the Business Partners Link ID.
Procedure
1. On the main menu of the SAL Gateway user interface, click Configuration > Avaya
Hosted Configuration for Business Partners.
2. On the Avaya Hosted Configuration for Business Partners page, click Edit.
3. In the BP Link ID field, enter 2 and click Apply.
The BP Link ID field is set to default.
4. Click Edit again and enter the correct BP Link ID that you want to associate with the SAL
Gateway.
5. Click Apply.
The correct BP name is displayed against the BP Name field along with the new Link ID.
6. (Optional) To verify the connection, click Test Connectivity.
5. In the Port field, enter the port number that SAL Policy Manager uses for inbound traffic
from SAL Gateway.
6. (Optional) To verify the connection to the configured SAL Policy Manager, click Test.
7. Click Apply.
Next steps
Through the SAL Gateway user interface, upload the server certificate of SAL Policy Manager.
This certificate is exported from SAL Policy Manager, to the truststore of SAL Gateway. Fore more
information, see the related links.
For information about exporting the server certificate from Policy Manager, see Deploying SAL
Policy Manager with SSH Proxy.
For the configuration changes to take effect immediately, restart the SAL Gateway services
through the Apply Configuration Changes page.
Important:
Restarting the SAL Gateway services might terminate established connections and might
result in SNMP traps being missed.
Related links
Policy Manager field descriptions on page 40
Uploading a certificate to SAL Gateway on page 109
Button Description
Test Initiates a connectivity test to the configured SAL Policy Manager.
Table continues…
Button Description
Edit Makes the fields available for editing.
Apply Applies the changes made to the SAL Policy Manager configuration.
Related links
Configuring SAL Policy Manager details on page 39
Note:
• If you select an incorrect encryption method, the configuration is interrupted and the
system displays an error.
• If system displays an error for TLS or SSL certificates, import the certificates from
Certificate Mangement or Import Client Certificate page.
6. (Optional) If the SMTP server requires authentication, perform the following steps:
a. In the Username field, enter the user name for SMTP server authentication.
b. In the Password field, enter the password of the user who is to be authenticated.
If the SMTP server does not require authentication, leave the Username and Password
field empty.
7. In the Administrator’s Email Address field, enter the administrator email address where
you want to receive email notifications.
8. (Optional) In the Secondary Email Address field, enter a secondary email address
where you want to receive email notifications.
9. (Optional) To send a test email to the configured email addresses, click Send Test Mail.
Note:
If you do not receive the test email in the mailbox of the configured email address,
recheck the SMTP details you entered.
10. Click Apply.
Next steps
For the configuration changes to take effect immediately, restart the SAL Gateway services
through the Apply Configuration Changes page.
Important:
Restarting the SAL Gateway services might terminate established connections and might
result in SNMP traps being missed.
Related links
SMTP Configuration field descriptions on page 42
Name Description
Encryption Method The method of encryption for SMTP server. The options are:
• None
• STARTTLS
• SSL/TLS
Username The name of the user to be authenticated.
The field is mandatory only when the SMTP server is configured to
authenticate users.
Password The password of the user to be authenticated.
The field is optional but mandatory when you enter a user name for
authentication.
Administrator’s Email Address The administrator email address where you want to receive email
notifications.
Secondary Email Address A secondary email address to receive email notifications. This field is
optional.
Button Description
Edit Makes the fields available for modification in an existing SMTP
Configuration,.
Send Test Mail Sends a Test mail to Administrator's email ID.
Apply Applies the changes made to the SMTP Configuration.
Related links
Configuring SMTP server details on page 41
Note:
The iptables of SAL Gateway require modification to support SNMP get queries from the
NMS. You must open port 161. For more information about configuring the firewall to open
port 161, see Deploying Avaya Diagnostic Server and Secure Access Link Gateway Port
Matrix.
Configuring NMS
About this task
Use this procedure to specify a customer NMS as a SNMP trap destination for SAL Gateway.
When you configure an NMS, SAL Gateway sends SNMP traps and alarms to each NMS that you
configure.
You can configure to send either SNMP v2c or v3 traps to the NMSs. You cannot send v2c traps to
one and v3 traps to another NMS.
Note:
SNMP v3 is more secure than v2c. If your NMS supports v3, select v3.
Procedure
1. On the main menu of the SAL Gateway user interface, click Configuration > NMS
Configuration.
2. On the Network Management Systems page, select one of the following two SNMP
versions for the NMS:
• v2c
• v3
The options are available for selection only when no NMS is already added to SAL
Gateway. If an NMS is already added, you cannot change the option. The SNMP version
for the next NMSs that you want to add must be the same as the first NMS added.
3. Click Add.
4. In the Add SNMP Details window, complete the following fields:
• NMS Host Name/IP Address
• Trap Port
5. For a v2c NMS, in the Community field, enter the community string of the NMS server.
6. For a v3 NMS, complete the following additional fields:
• UserName
• Priv Protocol
• Priv Password
• Auth Protocol
• Auth Password
7. Click Apply.
The details of the newly added NMS is displayed on the Network Management Systems
page.
8. (Optional) To add multiple NMSs, click Add, and repeat Step 4 to Step 7.
Next steps
For the configuration changes to take effect immediately, restart the SAL Gateway services
through the Apply Configuration Changes page.
Important:
Restarting the SAL Gateway services might terminate established connections and might
result in SNMP traps being missed.
Related links
Network Management Systems field descriptions on page 45
Note:
After you add the first NMS, the system disables the options to
select an SNMP version. To change the SNMP version, you
must delete all entries for the existing NMS, and apply the
changes.
Table continues…
Name Description
v3 The option to indicate that NMS servers are configured to listen to v3
traps.
SNMP v3 provides authorized, authenticated, and encrypted
communication.
Important:
When you add v3 NMS servers, ensure that the SNMP master
agent service, snmpd, is running so that the v3 traps can reach
the NMS locations successfully. If the service is not running
when you add v3 NMS servers, ensure that after applying the
changes, you first start the snmpd service and then restart the
SAL Agent service.
Note:
After you add the first NMS, the system disables the options to
select an SNMP version. To change the SNMP version, you
must delete all entries for the existing NMS, and apply the
changes.
NMS Host Name/IP Address The IP address or host name of the NMS server.
Caution:
Do not enter localhost or 127.0.0.1 as an NMS location. If
you add localhost as an NMS location, SAL Gateway
forwards all traps coming from managed devices to itself as a
trap destination. After receiving the forwarded traps, SAL
Gateway processes the traps and again forwards the traps to
itself. As a result of this action, the traps go into a loop.
Trap port The port number that the NMS server uses to receive to SNMP traps.
Note:
The iptables of SAL Gateway require modification to support
SNMP get queries from the NMS. You must ensure that port 161
on the Linux host is open. For more information about firewall
configuration to open port 161, see Deploying Avaya Diagnostic
Server.
Community The community string that the SNMP entity of the NMS server uses
for authentication.
This field is available only for the v2c NMS configuration.
Username The user name configured for the SNMP entity of the NMS.
This field is available only when you select v3.
Table continues…
Name Description
Priv Protocol The private authentication protocol configured for the SNMP entity of
the NMS.
This field is available only when you select v3.
The supported options are:
• DES: Data Encryption Standard, a cryptographic block cipher.
• AES 128: Advanced Encryption Standard 128.
• AES 192: Advanced Encryption Standard 192.
• AES 256: Advanced Encryption Standard 256.
Note:
SAL Gateway supports HP Open View (HPOV) NMSs. This
support extends to both SNMP v2 and v3 traps. However, as
HPOV does not support AES, you must configure DES to send
SNMP v3 traps to HPOV. However, the US government NIST
organization does not recommend DES to be used for security.
If you have questions, contact your network security
administrator.
Priv Password The password configured for the private protocol that the SNMP
entity of the NMS uses.
This field is available only when you selected v3.
Table continues…
Name Description
Auth Protocol The authentication protocol configured for the SNMP entity of the
NMS.
This field is available only if you select v3.
The supported options are as follows:
• MD5: The MD5 hash, also known as the checksum for a file, is a
128-bit value, something like a fingerprint of the file. This feature
can be useful both for comparing files and for their integrity control.
Note:
The US government NIST organization does not recommend
MD5 to be used. If your NMS supports other options, do not
use this option.
• SHA: Secure Hash Algorithm (SHA) is a simple program that
hashes files. SHA is useful for file integrity checking. The supported
options are:
- SHA
- SHA 224
- SHA 256
- SHA 384
- SHA 512
Auth Password The password configured for the authentication protocol that the
SNMP entity of the NMS uses.
This field is available only if you select v3.
You must follow your company policies on password strength or
contact your NMS administrator if needed.
Button Description
Add Displays the Add SNMP Details window, where you can enter the
details of the NMS that you want to add.
Delete Deletes the details of the selected NMS from SAL Gateway.
Edit Displays the details of the selected NMS in the Add SNMP Details
window for modification.
Related links
Configuring NMS on page 44
Editing the details of an NMS on page 49
Deleting an NMS record on page 50
Adding an NMS on page 49
Adding an NMS
Procedure
1. On the main menu of the SAL Gateway user interface, click Configuration > NMS
Configuration.
2. On the Network Management Systems page, click Add.
3. In the Add SNMP Details window, enter the SNMP details of the additional NMS.
4. Click Apply.
Next steps
For the configuration changes to take effect, restart the SAL Gateway services through the Apply
Configuration Changes page.
Important:
Restarting the SAL Gateway services might terminate established connections and might
result in SNMP traps being missed.
Related links
Network Management Systems field descriptions on page 45
4. In the Master Agent AgentX Port field, type the AgentX listener port number of the SNMP
master agent.
You must enter values in both fields.
5. Click Apply.
Important:
Any changes to the SNMP configuration require an SNMP subagent restart because
the SNMP subagent needs to reconnect to the SNMP master agent after every
configuration change. A restart reconnects both the SNMP agents.
Related links
SNMP SubAgent Configuration field descriptions on page 51
Related links
Configuring the SNMP subagent on page 50
Note:
Restarting the SAL Gateway services terminates all connections and might result in SNMP
traps being missed. To minimize disruption of services and alarms, Avaya recommends that
you apply configuration changes only after you finish all the configuration of SAL Gateway.
Procedure
1. Do one of the following:
• On the main menu of the SAL Gateway user interface, click Advanced > Apply
Configuration Changes.
• At the top of the SAL Gateway page where you currently are, click the Restart the SAL
Agent and Gateway UI services to apply configuration changes link.
2. On the Apply Configuration Changes page, click Apply.
The system restarts the SAL Gateway services and updates SAL Gateway with the new
values you configured. Some changes might require the restart of the SAL Gateway UI
service. In such cases, all open SAL Gateway web sessions are disconnected. You can log
on to the SAL Gateway web interface again after a few minutes.
If no configuration changes are found, the page displays the following message:
There are no configuration changes to be applied.
For the Flex supported devices, ensure you have obtained the following:
• Cluster Control Manager – FQDN
• Common Services Platform – FQDN and Cluster ID
• Avaya Analytics – FQDN, Cluster ID, and Product Instance ID
Note:
Avaya advises to add Cluster Control Manager and Common Services Platform, before adding
Avaya Analytics as a managed element.
Similarly, Avaya advises to add Cluster Control Manager before adding Common Services
Platform as a managed element.
Avaya recommends you to deploy Flex supported products over full-scale SAL Gateway
deployments only. However, SAL Gateway does not restrict you from adding the Flex supported
products over lower-scale deployments too.
Note:
When you register a device using GRT for support through SAL, the details of the
device become available to the SAL Gateway instances present in your network. When
you enter a Solution Element ID for which the device information is available to SAL
Gateway, SAL Gateway automatically populates additional information, such as SAL
model, product type, and product ID, in the respective fields.
4. Perform the following to select the applicable model for the product:
a. In the Model field, click the model that is applicable to the product.
If SAL Gateway automatically populates the Model and the Product fields after you
provide the Solution Element ID, the fields become read only.
The system displays the Product field in accordance with the selected model.
b. (Optional) To view the applicable products under a selected model, click Show
model applicability.
The applicable products of the selected model are displayed in a new window.
c. In the Product field, click an appropriate option from the list of supported product
versions.
5. In the Product ID field, type the product ID or the alarm ID of the device.
If SAL Gateway automatically populates this field after you provide the Solution Element
ID, the field becomes read only.
Caution:
Exercise caution when you enter the product ID of a device.
6. For non-Flex product, complete the following fields for the product that you want to add:
• Host Name
• IP Address
7. For Cluster Control Manager, enter the FQDN.
8. For Common Service Platform, complete the following fields:
• FQDN
• ClusterID
9. For Avaya Analytics, complete the following fields:
• FQDN
• ClusterID
• ProductInstanceID
10. If the device is under managed services offer, select the Is this device under managed
services offer? check box.
Note:
System displays Is this device under managed services offer? check box, only if
the SAL Gateway is under managed services offer.
11. To provide Avaya the ability to connect to the managed element remotely, select the
Provide remote access to this device check box.
12. To enable alarm transfer from the managed element through SAL Gateway, select the
Transport alarms from this device check box.
If the model you select does not support alarm transfer, the Transport alarms from this
device check box is unavailable for selection.
13. To enable inventory collection from this managed element through SAL Gateway, perform
the following:
a. Select the Collect inventory for this device check box.
b. In the Inventory collection frequency field, enter the interval for inventory collection.
14. Click Add.
SAL Gateway adds the device as a managed element.
If you enabled inventory collection for the managed element, the system displays the
Inventory support page. On this page, you can add or edit the credentials to be used for
inventory collection.
Next steps
If you enabled inventory collection for the managed element, add the credentials to be used for
inventory collection on the Inventory support page.
For the configuration changes to take effect immediately, restart the SAL Gateway services
through the Apply Configuration Changes page. However, this is optional because the services
are restarted automatically at a scheduled time.
Important:
Restarting the SAL Gateway services might terminate established connections and might
result in SNMP traps being missed.
Related links
Managed Element Configuration field descriptions on page 59
Managed Element field descriptions on page 57
Inventory support field descriptions on page 82
Note:
If SAL Gateway is not running in Managed Services mode then
the field name is displayed as Solution Element ID.
Product ID The product ID of the managed device that you want to search.
Model The model applied to the managed devices that you want to filter.
Offer The services offer for the device. The options are:
• Maintenance
• Managed
This search filter is enabled only if SAL Gateway is under managed
services offer.
Button Description
Search Retrieves managed devices that match the search criteria that you
define, and displays the details of the managed devices in a tabular
format.
Clear Search Clears the values entered as search criteria.
Button Description
Delete Deletes the record of the selected managed elements from SAL
Gateway.
Export Exports the data related to the managed elements in the comma
separated values (.csv) format to the local computer.
Import Imports device data from a .csv file and adds the devices as
managed elements to SAL Gateway.
Add new Displays the Managed Element Configuration page, where you can
enter the details of a device to add it as a managed element to SAL
Gateway.
Print Sends the details of the managed elements to a printer.
Related links
Adding a managed element to SAL Gateway on page 54
Editing the configuration of a managed element on page 62
Deleting the record of a managed element on page 63
Exporting managed element data on page 63
Importing managed elements to SAL Gateway on page 64
Name Description
CI Name CI Name is a 256 characters unique identifier assigned by Avaya to
a third party device that is managed by SAL Gateway. This field is
displayed only if SAL Gateway supports third party devices (APCS
offer).
The format for CI Name is: ipo-
svr.125_vapour_avonside.bt_acss_wolverhampton.btw
Where,
• ipo-svr is the type of device or model.
• 125_vapour_avonside is the device identifier or hostname.
• bt_acss_wolverhampton is the location or site name.
• btw is the short name or nickname of the company.
Model The model that is applicable to the managed device. It also includes
Flex supported models.
A model is a collection of remote access, alarm transfer, inventory,
and other configuration rules that define how SAL Gateway provides
services to a particular set of managed devices.
The Flex supported models are:
• Cluster Control Manager
• Common Services Platform
• Avaya Analytics
If SAL Gateway automatically populates the Model and the Product
fields after you provide the Solution Element ID, the fields become
read only.
Product The product version that the selected model supports.
A model can have more than one version of inventory or alarming
rules to support variations between products. If the selected model
has multiple alarm or inventory rules associated with a version, then
you must select a product version from the set of supported versions
available in the Product field.
If SAL Gateway automatically populates the Model and the Product
fields after you provide the Solution Element ID, the fields become
read only.
Product ID The unique 10-character ID, also known as Alarm ID, assigned to the
device.
The Product ID is included in alarms that are sent to alarm receivers
from the managed device. The Product ID identifies the device that
generates the alarms.
If SAL Gateway automatically populates this field after you provide
the Solution Element ID, the field is read only.
Table continues…
Name Description
FQDN The Fully Quallified Domain Name for Cluster Control Manager that
identifies the host name of the device that you want to add as a
managed element. This field is displayed for Flex supported models.
ClusterID Identifier for each deployment of Flex cluster. This field is displayed
for the following Flex supported models:
• Common Services Platform
• Avaya Analytics
ProductInstanceID The identifier for an instance of the product deployed within Flex
platform.
The product may have many independent instances running in Flex
platform, the product instance ID uniquely identifies the product (and
its services).
This field is displayed for Avaya Analytics.
IP address The IP address of the device. This field is not displayed for Flex
supported models.
SAL Gateway takes both IPv4 and IPv6 addresses as input.
Host Name The host name of the device that you want to add as a managed
element. This field is not displayed for Flex supported models.
Is this device under managed The check box to select if the device is under managed services
services offer? offer. This option is available only if SAL Gateway is under managed
services offer.
Provide Remote Access to this The check box to enable remote connectivity to the managed device.
device
Transport alarms from this The check box to enable SAL Gateway to accept and forward alarms
device from this managed device to Avaya and other Network Management
Systems (NMS).
If the model you select does not support alarming, this check box is
unavailable for selection.
Collect Inventory for this device The check box to enable inventory collection from the managed
device through SAL Gateway.
When this check box is selected, SAL Gateway collects inventory
information about the managed device and sends the information to
Avaya. This feature is to aid services personnel working on tickets
who requires to review the configuration details of managed devices.
If the model you select does not support inventory collection, this
check box is unavailable for selection.
Inventory collection frequency The interval in hours at which SAL Gateway collects inventory
information about the managed device.
Table continues…
Name Description
Inventory The status of the last inventory collection attempt from the device.
The ready-only field indicates whether inventory information has
been collected from the device.
The status can be:
• Not available: Indicates that the inventory collection option is
disabled for the device and no inventory data is collected.
• Last inventory collection attempt failed: Indicates that the last
inventory collection attempt failed.
• A timestamp: Indicates that the last inventory collection attempt
was successful. You can click the timestamp link to view the
inventory report of the device.
• Model
• IP Address
• Remote Access
• Product ID
• Alarm Flag
• Last Inventory
• Inventory Collection Hours
• Attribute1
• Attribute2
• UserName
• EngineId
• Auth Protocol
• Auth Password
• Priv Protocol
• Priv Password
• Offer
• FL Number
Note:
FL Number is retrieved only for the SEIDs that are registered with Avaya and managed
by SAL Gateway.
Attribute1 and Attribute2 are ClusterID and ProductInstanceID respectively.
The following configuration details related to the managed elements are not exported to
the .csv file:
• Inventory collection enablement configuration.
• Device credentials configured for inventory collection, if any.
CI Name for third party devices is displayed in the SEID column.
You can export the configuration data of managed elements from one SAL Gateway instance and
import the data to another SAL Gateway instance. For example, when setting up a second SAL
Gateway for redundancy, you can import the data exported from the first SAL Gateway to the
second one. You can also import the .csv file to the same SAL Gateway to retrieve the managed
element configurations. You can import the exported .csv file data as it is or, if required, you can
modify, delete, or add entries in the file.
Note:
If SAL Gateway is under maintenance offer, then only the devices under the maintenance offer
are imported.
If SAL Gateway is under managed services offer, then the devices under both, maintenance
and managed services offer are imported.
Before you begin
Ensure the following:
• The .csv file, which contains the information of the devices you want to import, is available on
the system from where you are accessing SAL Gateway.
• The device information in the .csv file are correct and complete. SAL Gateway does not
import the devices with incomplete or incorrect information.
You can open and edit the .csv file using Microsoft Excel. The .csv file contains the following
details about the devices:
- Host Name
- Solution Element ID
- Model
- IP Address
- Remote Access
- Product ID
- Alarm Flag
- Last Inventory
- Inventory Collection Hours
- Attribute1
- Attribute2
- UserName
- EngineId
- Auth Protocol
- Auth Password
- Priv Protocol
- Priv Password
- Offer
- FL Number
Import of devices using the .csv file does not import the following configuration details related to
the devices:
• Inventory collection enablement flag.
• Device credentials for inventory collection.
• The product type when the model supports more than one products and the product is not
the default product for that model.
Include the CI Name for third party devices in the SEID column.
After the import operation, you must therefore verify the configurations of the devices. Wherever
required, make the necessary changes to the mentioned configurations from the respective pages
on the user interface.
Procedure
1. On the main menu of the SAL Gateway user interface, click Devices > View/Search.
2. On the Managed Element page, click Import.
3. In the Import CSV File window, click Browse to locate and select the .csv file that you want
to import.
4. Click Upload.
The window displays the number of devices to be imported and their Solution Element IDs.
If the file contains some incorrect or incomplete device information, an error summary
report is displayed for those Solution Element IDs. SAL Gateway does not import the
devices with incomplete or incorrect information.
5. (Optional) For the Solution Element IDs with error messages, correct the information in
the .csv file and upload the file again.
6. Click Apply.
The devices that pass the validation checks are imported to SAL Gateway as managed
elements.
If the .csv file contains the Solution Element ID of SAL Gateway and its configuration
details in the file are different from the existing configuration, those changes are not
applied. To change the SAL Gateway configuration, you can navigate to the Gateway
Configuration page. If the file contains a record of any other SAL Gateway instance, then
that record is not imported.
7. Verify the configuration details of the imported managed elements, and do the following as
required:
a. (Optional) If the model associated with an imported device supports multiple
products, ensure that the correct product type is selected for that managed element.
When the model supports multiple products, the device is added to SAL Gateway with
the default product for that model. For example, if the model assigned to the device is
CM_Media_Server_<version>, this model supports more than one product. When
imported, the device is added as CM Media Server, which is the default product for
the model. Edit the configuration of such managed devices to select the correct
product.
b. (Optional) Wherever required, make the configuration changes related to SNMP v3,
inventory collection, and device credentials for inventory collection.
4. Complete the following fields according to the SNMP mode that is configured on the
device:
• UserName
• Auth Protocol
• Auth Password
• Priv Protocol
• Priv Password
5. Click Apply.
Next steps
For the configuration changes to take effect immediately, restart the SAL Gateway services
through the Apply Configuration Changes page. However, this is optional because the services
are restarted automatically at a scheduled time.
Important:
Restarting the SAL Gateway services might terminate established connections and might
result in SNMP traps being missed.
Related links
Device SNMP v3 Credentials field descriptions on page 68
SNMP modes on page 70
Applying configuration changes on page 51
Name Description
Auth Protocol The authentication protocol configured to send SNMPv3 traps from
the managed element. The following are the supported authentication
protocols:
• MD5: The MD5 hash, also known as the checksum for a file, is of
128-bit value. This feature can be useful both for comparing files
and for their integrity control.
Note:
The US government NIST organization does not recommend
MD5 to be used. If your NMS supports other options, do not
use this option.
• SHA: Secure Hash Algorithm (SHA) is useful for file integrity
checking. SAL Gateway supports:
- SHA
- SHA 224
- SHA 256
- SHA 384
- SHA 512
Auth Password The password configured for the authentication protocol that is used
to send SNMPv3 traps from the managed element.
You must follow your company policies on password strength or
contact your NMS administrator if needed.
Priv Protocol The privacy protocol configured to send SNMPv3 traps from the
managed element. The following are the supported privacy protocols:
• DES: Data Encryption Standard, a cryptographic block cipher.
• AES 128: Advanced Encryption Standard 128.
• AES 192: Advanced Encryption Standard 192.
• AES 256: Advanced Encryption Standard 256.
Note:
SAL Gateway supports HP Open View (HPOV) NMSs. This
support extends to both SNMP v2 and v3 traps. However, as
HPOV does not support AES, you must configure DES to send
SNMP v3 traps to HPOV. However, the US government NIST
organization does not recommend DES to be used for security.
If you have questions, contact your network security
administrator.
Priv Password The password configured for the privacy protocol that is used to send
SNMPv3 traps from the managed element.
The values you enter in the fields on this page decide the SNMP mode that SAL Gateway
employs for the managed element.
Related links
Configuring SNMP v3 credentials of managed element on page 67
SNMP modes on page 70
SNMP modes
The following table provides the three SNMP modes and the values you have to configure to use
the SNMP modes for the managed devices.
Mode Values entered
Mode 1: No authentication/No privacy Only user name
Mode 2: Authentication/No privacy User name and authentication protocol with password
Mode 3: Authentication/Privacy User name, authentication protocol with password, and
privacy protocol with password
Note:
• If the registered device information is available with SAL Gateway, SAL Gateway
automatically populates some of the fields, such as Product ID and Model. Such
auto-populated fields become read only.
• If the device is already registered with another SAL Gateway as a managed
element, all the fields associated with the device are disabled. The device cannot be
imported and configured.
6. Click Confirm.
The system displays the Import and Configure Confirmation page for confirmation of the
action. The page displays the following:
• The information about the devices to be imported.
• The total number of devices to be imported.
If some mandatory device information, such as IP address, host name, or model, is
incorrect or incomplete, the system displays the error messages at the top of the page. You
can enter the valid information in the respective fields and try to import the devices again.
7. Click Apply Changes.
The selected devices are submitted for importing. The import operation might take several
minutes. The affected SAL Gateway is restarted.
Note:
If you submit an import request for an already added device, SAL Core Server filters
the request and ignores the duplication.
Related links
Import and Configure Devices field descriptions on page 72
Name Description
Model The version of the model that is applicable for the device.
If the registered device information is available to SAL Gateway,
SAL Gateway automatically populates this field and makes the
field read only.
IP Address The IP address of the device.
You can edit this value.
Host Name The host name of the device.
You can edit this value.
Attribute1 The ClusterID of the Flex supported devices. This field is disabled
if the device is not a Flex supported product.
You can edit this value.
Note:
For the details of this field, hover your mouse on the field
input box.
Attribute2 The ProductInstanceID of the Flex supported devices. This field is
disabled if the device is not a Flex supported product.
You can edit this value.
Note:
For the details of this field, hover your mouse on the field
input box.
Remote Access The check box to enable remote access to the device through
SAL Gateway.
Transport Alarms The option for the alarm transfer service from the device through
SAL Gateway. The available options are:
• SNMP V2C
• SNMP V3
• No
If you select SNMP V3 for alarm transfer, the system displays the
Device SNMP v3 Credentials window for configuring the SNMP v3
credentials to be used for alarm transfer to SAL Gateway.
Collect Inventory The check box to enable inventory collection from the device.
Import The check box to indicate whether you want the device to be
imported to the selected SAL Gateway instance.
Note:
• Depending on the deployment environment, the maximum number of managed elements
that a SAL Gateway instance can support differs. After you reach the maximum limit, you
cannot onboard additional managed elements to the SAL Gateway instance.
• If the device is already registered with another SAL Gateway, as a managed element, all
the fields associated with the device are disabled. The device cannot be imported and
configured.
Button Description
Reset Resets values and reverts to the original status of the devices.
Confirm Displays the Import and Configure Confirmation page with the
number of devices to be imported.
Related links
Importing devices across SAL Gateway instances on page 70
5. SAL Gateway transfers the CIM-format inventory data to SAL Core Server.
Access methods used for inventory collection
The access methods defined for inventory support through SAL include SSHv2 and Telnet.
For inventory collection that uses Telnet, you must ensure that the FTP configurations are enabled
on managed devices, such as Communication Manager, Call Management System, Intuity, and
others. Inventory collection through Telnet works only if you complete all the required FTP
configurations on the target device. Inventory collection using Telnet involves FTP file transfer for
inventory collection. If the managed device is not FTP enabled, SAL Gateway cannot collect
inventory data from the device.
SSH-enabled devices that run with SFTP do not need any additional configuration for collecting
inventory.
Use of DataSource in inventory collection
DataSource is a configuration that is required to collect inventory of a managed device. To collect
inventory from a device, SAL Gateway establishes connection to the managed device. To connect
to the managed device, SAL Gateway requires certain configuration details, including the type of
connection that needs to be established. DataSource, which is defined inside the SAL model
associated with a managed device, provides this information.
For each managed device, the type of DataSource is already defined and is configured in the SAL
model.
More than one DataSource can be supported for a managed device. In that case, you have to
configure all supported DataSources for the managed device. For some managed devices with
specific DataSource implementation, you do not need to provide any additional input for inventory
collection.
DataSource can be of the following types: syncDataSource, asyncDataSource, and
WindowsSource.
• Collection using WindowsDataSource:
Managed devices with Windows operating systems adopt this approach.
• Synchronous collection using syncDataSource:
Synchronous inventory collection maintains the connection to the managed device until
inventory collection is complete.
• Asynchronous collection using asyncDataSource:
Asynchronous inventory collection closes the connection to the managed device during the
inventory collection process.
Related links
SAL inventory collection overview on page 76
SAL model
The SAL model is a collection of the alarming configuration, inventory configuration, and SAL
Gateway component configurations that define how a SAL Gateway provides service to a
particular set of remotely managed devices. The SAL model includes the remote access model,
which is a collection of XML and configuration files that define the remote access characteristics
for a particular set of managed devices.
The model of the managed device has the following configuration files that the Inventory
component requires:
• Inventory collection script, to be downloaded to the device, if required.
• The DataSource file that has commands to be executed for inventory collection.
• The PERL parser script, required to construct CIM Inventory. SAL Gateway runs commands
or scripts on the managed device to collect inventory. The PERL parser converts the raw
inventory data to the standard CIM Inventory format.
• The Device file with instruction for the SAL Gateway tool used to obtain device connection for
the execution of the Inventory command. This command obtains the device prompt of the
device.
If you want to change the way the inventory is collected for a device, you must change the model
of the device. You must make changes to the Data Source file and to the parser.
Related links
SAL inventory collection overview on page 76
CIM
SAL Gateway uses Common Information Model (CIM) to provide a standard inventory model that
can accommodate any managed device. The CIM structure supports an evolving view of
inventory. As the kinds of managed devices that SAL Gateway supports increase, you can add
other defined elements of the full CIM model to accommodate new aspects of the inventory.SAL
Gateway uses CIM information for the following tasks:
• Display inventory reports
• Export inventory reports
• Transmit inventory information to the Secure Access Concentrator Core Server
Related links
SAL inventory collection overview on page 76
Types of credentials
SAL Gateway might require credentials to access a managed device for inventory collection. As
different kinds of devices support different access methods for inventory collection, different kinds
of credentials are available to support inventory collection.
ASG credentials
SAL Core Enterprise Server transports Access Security Guard (ASG) keys, which are used to
access managed devices, to SAL Gateway. After SAL Gateway receives the keys, SAL Gateway
executes instructions in the key package to place the data into the encrypted tool that resides on
SAL Gateway.
SAL Gateway extracts the credential data when SAL Gateway needs to authenticate itself to
managed devices for inventory collection.
The acquisition of the ASG credentials for a managed element with ASG protected user name
differs from a password only in two aspects:
• The system presents the ASG challenge and product ID instead of the password challenge.
• The tool for ASG keys returns an ASG response to the challenge instead of returning a
password.
Procedure
1. On the main menu of the SAL Gateway user interface, click Devices > Device
Credentials And Inventory.
2. On the Inventory support page, in the Managed Device field, click the managed device for
which you want to collect inventory.
The Managed Device field provides the list of the entire set of inventory-enabled managed
devices.
3. In the Connectivity Method field, click the connectivity method to be used for inventory
collection.
This field displays all connectivity methods supported by the selected managed device. For
some devices, you do not need to provide any additional input for inventory collection as
the device does not require any input from the user. In such cases, this field does not
display any selection option for the selected managed device.
4. Click Edit.
5. Select the Use Avaya-provided credentials check box.
The system displays the Avaya-provided login IDs of the ordinary user and the super user
of the device in the Login and SU Login fields, respectively.
Note:
Devices that are managed through SAL have different levels of security defined for
them. When a user attempts to access the device, depending on the security level
defined for a device, the system displays a message to log in as an ordinary or super
user. No standard set of permissions is available for a super user. Different devices
provide different permissions. The login information of a device is available in the
model of the device.
6. Click Apply.
Next steps
For the configuration changes to take effect immediately, restart the SAL Gateway services
through the Apply Configuration Changes page. However, this is optional because the services
are restarted automatically at a scheduled time.
Important:
Restarting the SAL Gateway services might terminate established connections and might
result in SNMP traps being missed.
Related links
User names and passwords on page 79
Related links
User names and passwords on page 79
Name Description
Connectivity Method The connectivity method with the managed device for inventory
collection.
This field displays all connectivity methods supported by the
selected managed device. For some devices, you do not need to
provide any additional input for inventory collection as the device
does not require any input from the user. In such cases, this field
does not display any connectivity method for the managed
device.
Model The model of the selected managed device. A model is a
collection of the remote access, alarming, inventory, and other
configurations that define how SAL Gateway provides services to
a particular set of remotely managed devices.
Based on the model and the supported connectivity method, the page provides additional fields to
configure the device credentials for inventory collection.
Name Description
Use Avaya-provided credentials The check box to indicate whether to use the Avaya-provided
credentials of the device for inventory collection.
When this check box is selected, SAL Gateway uses the Avaya-
provided credentials of the device for inventory collection. To use
user-defined local credentials of the device, you must clear this
check box and enter the login details that are local to the device.
Login The user ID to be used for inventory collection from the device.
If you select the Use Avaya-provided credentials check box,
this field displays the user name that Avaya provides for the
device access. You cannot edit the Avaya-provided credentials.
If you do not select the Use Avaya-provided credentials check
box, you can enter a password-protected or an Access Security
Guard (ASG) protected user ID in this field.
Username/Password The option to indicate that the user ID in the Login field is
password protected.
This option is available only when you clear the Use Avaya-
provided credentials check box.
Password The password of the user ID.
This field is available only when you select Username/
Password.
Table continues…
Name Description
ASG The option to indicate that the user ID in the Login field is ASG
protected.
This option is available only when you clear the Use Avaya-
provided credentials check box.
Note:
For products that support Enhanced Access Security
Gateway (EASG), this field is not relevant.
ASG Key The ASG key associated with the user ID.
This field is available only when you select ASG.
SU Login The user ID of the super user that is to be used for inventory
collection from the device.
If you select the Use Avaya-provided credentials check box,
this field displays the user name of the super administrator that
Avaya provides for the device access. You cannot edit the Avaya-
provided credentials.
If you do not select the Use Avaya-provided credentials check
box, you can enter a password-protected or an ASG protected
user ID in this field.
Username/Password The option to indicate that the user ID in the SU Login field is
password protected.
This option is available only when you clear the Use Avaya-
provided credentials check box.
SU Password The password of the super user ID.
This field is available only when you select Username/
Password.
ASG The option to indicate that the user ID in the SU Login field is
ASG protected.
This option is available only when you clear the Use Avaya-
provided credentials check box.
Note:
For products that support Enhanced Access Security
Gateway (EASG), this field is not relevant.
SU ASG Key The ASG key associated with the super user ID.
This field is available only when you select ASG.
Button Descriptions
Edit Enables the credential fields on the page for the selected
managed device for editing.
Table continues…
Button Descriptions
Apply Applies changes to the credential information.
Cancel Cancels any changes and reverts to the home page.
Collect Inventory Now Initiates inventory collection so that changes to a managed
device can be viewed immediately. Using this button, you can
manually initiate an inventory collection instead of waiting for the
scheduled inventory collection process to run.
Related links
Editing device credentials for inventory collection on page 82
Enabling inventory collection from a managed device on page 85
Collecting inventory on demand for a device on page 88
Next steps
On the Inventory Support page, if required, add or edit the credentials to be used for inventory
collection from the device.
For the configuration changes to take effect immediately, restart the SAL Gateway services
through the Apply Configuration Changes page. However, this is optional because the services
are restarted automatically at a scheduled time.
Related links
Inventory support field descriptions on page 82
Name Description
Solution Element identifier A unique identifier in the form (xxx)xxx-xxxx where x
is a digit from 0 to 9.
Product identifier The unique 10-digit number used to uniquely
identify a customer application.
Model name Name of the model of the managed device.
Model version Version number of the model of the managed
device.
Model patch Patch number of the model of the managed device.
Product IP address The IP address of the managed device.
System ID The Product ID of the SAL Gateway that provides
inventory service to the device.
Table continues…
Name Description
SAL version The version of SAL that is used for the inventory
collection.
Collection date The date on which inventory was collected.
Inventory checksum The unique checksum of the inventory information
collected.
Note:
Additional attributes beyond the common set, including Avaya product type and OS version,
are also defined within the corresponding SAL CIM classes in the SAL CIM Model.
Related links
Viewing inventory report of a device on page 87
Note:
For some connection types, you do not need to provide any additional input for
inventory collection.
4. Click Collect Inventory Now.
SAL Gateway collects inventory of the selected device.
You can view the status of the inventory collection attempt by navigating to the Managed
Element Configuration page for the selected device.
Related links
Inventory support field descriptions on page 82
Using Avaya-provided credentials for inventory collection on page 79
Using user-defined credentials on page 81
Note:
For more information on inventory exceptions in log files, see the topic, Inventory-
related exceptions in SAL Gateway logs.
Related links
Inventory-related exceptions in SAL Gateway logs on page 188
Inventory diagnostics
To align itself with the inventory functionality, SAL Gateway provides two forms of diagnostics
output:
• A basic connectivity test that establishes a TCP socket connection to managed devices
• A more advanced test that uses the onboard credentials of the gateway to attempt a device
connection by means of the SAL inventory system.
If you enter the same SAL Gateway details in both fields, you cannot proceed further.
4. Click Add.
The system adds a row to the Redundancies table to display the new redundancy
established.
5. (Optional) Repeat Step 2 to Step 4 to add more redundancy.
6. Click Next.
The system displays the Redundancy Confirmation page with the new redundancies.
7. Click Apply Changes.
The system displays the following message after the page title:
Gateway Redundant Actions successfully submitted. This operation
may take several minutes and will restart the affected gateways.
8. To revert to the original redundancy configuration, click Reset
Related links
Redundant Gateways field descriptions on page 94
Example: Lowest common denominator rule for redundant Gateways on page 95
Redundancies section
The Redundancies table displays the following details of the redundancies created:
• The Solution Element ID of the primary SAL Gateway
• The Solution Element ID of the redundant SAL Gateway
When you select a pair of redundant SAL Gateways, the page displays the list of managed
devices that the SAL Gateways support. The list contains the following device details:
Name Description
Device The Solution Element ID assigned to the device when you register
the device with Avaya. The ID is a unique identifier in the format
(NNN)NNN-NNNN where N is a digit from 0 to 9. Using this ID,
Avaya Services or Avaya Partners can uniquely identify and connect
to the managed device.
Product ID The unique 10-character ID, also known as Alarm ID, assigned to
the device when you register the device with Avaya. The Product ID
is included in alarms that are sent to alarm receivers from the
managed device to identify the device that generated the alarm.
IP Address The IP address of the device.
Button Description
Add Adds a row to the Redundancies table to display the new
redundancy established.
Reset Resets to the original redundancy configuration.
Next Displays the Redundancy Confirmation page where you can commit
the new redundancy.
Apply Changes Commits the addition of a redundancy instance.
Related links
Creating redundant SAL Gateways on page 93
Removing a redundancy of SAL Gateways on page 96
PKI configuration
This role provides the capability to access and change everything on the SAL Gateway user
interface.
PKI
Public Key Infrastructure (PKI) is an authentication scheme that uses the exchange of certificates
that are usually stored in an e-token. The certificates use asymmetric public key algorithms to
avoid sending shared secrets such as passwords over the network. A public/private certificate
authority such as VeriSign usually generates and signs certificates. Certificate authorities and
certificates have expiry dates and can be revoked.
Authentication with certificates requires verification that:
• The certificate is valid.
• The entity, such as SAL Gateway, sending the certificate possesses the private key for the
certificate.
• The certificate is signed by a trusted certificate authority.
• The certificate and the signs are not expired.
• The certificates and certificate authority are not revoked.
If you want to check a certificate for revocation, you must query an Online Certificate Status
Protocol (OCSP) service or search for the certificate in a Certificate Revocation List (CRL).
• Administrator
• Security Administrator
Note:
Select Deny if you want to deny access to an organization.
6. Click Apply.
Result
You have defined the role for the organization.
Next steps
For the configuration changes to take effect immediately, restart the SAL Gateway services
through the Apply Configuration Changes page. However, this is optional because the services
are restarted automatically at a scheduled time.
Important:
Restarting the SAL Gateway services might terminate established connections and might
result in SNMP traps being missed.
Related links
Creating a role mapping for an organizational unit within an organization on page 99
• Security Administrator
7. Click Apply.
Result
You have defined the role for the organizational unit.
Next steps
For the configuration changes to take effect immediately, restart the SAL Gateway services
through the Apply Configuration Changes page. However, this is optional because the services
are restarted automatically at a scheduled time.
Important:
Restarting the SAL Gateway services might terminate established connections and might
result in SNMP traps being missed.
Related links
Creating a role mapping on page 98
Note:
The system makes the Delete button available only when you select one or more
check boxes.
5. Click OK.
The local role mapping for the group is deleted.
If you erroneously attempt to delete all groups, the system displays the following security
warning: Do you want to delete all groups? Click ‘YES’ only if you
can edit the role mapping file or can log into a security
administrator role account with a certificate.
Next steps
For the configuration changes to take effect immediately, restart the SAL Gateway services
through the Apply Configuration Changes page. However, this is optional because the services
are restarted automatically at a scheduled time.
Important:
Restarting the SAL Gateway services might terminate established connections and might
result in SNMP traps being missed.
3. To check the PKI certificate of the user for validity against OCSP and CRL, select the
Check for OCSP/CRL check box.
The default option for this validation is Off.
Important:
Before selecting this check box, ensure that the proxy server is set correctly.
4. To deny a user the access to SAL Gateway when the user certificate is invalid or not
available, select the Deny access if OCSP/CRL is not available check box.
5. Click Apply.
Next steps
For the configuration changes to take effect immediately, restart the SAL Gateway services
through the Apply Configuration Changes page. However, this is optional because the services
are restarted automatically at a scheduled time.
Important:
Restarting the SAL Gateway services might terminate established connections and might
result in SNMP traps being missed.
Related links
OCSP/CRL Configuration field descriptions on page 106
Name Description
Deny access if OCSP/CRL is not The check box to indicate that SAL Gateway is to deny access to a
available user if the status of the user certificate is found to be old or revoked.
Related links
Configuring OCSP or CRL for SAL Gateway on page 105
Editing OCSP/CRL settings on page 106
Certificate authority
A certificate authority (CA) is an authority on a network that issues and manages security
credentials and public keys for message encryption. As part of a public key infrastructure (PKI), a
CA checks with a registration authority (RA) to verify information provided by the requestor of a
digital certificate. If the RA verifies the information of the requestor, the CA can issue a certificate.
Depending on the public key infrastructure implementation, the certificate includes the owner's
public key, the expiration date of the certificate, the owner's name, and other information about the
public key owner.
SAL Gateway uses CA certificates for authentication of communication with SAL Core Server,
Policy Manager with SSH Proxy, and other Avaya products.
For more information about CA definition, see http://searchsecurity.techtarget.com/definition/
certificate-authority.
Viewing certificates
About this task
Use this procedure to view the certificates available in the SAL Gateway trust store.
Procedure
1. On the main menu of the SAL Gateway user interface, click Security > Certificate
Management.
The system displays the Certificate Management page with the list of all available
certificates.
2. To view the details of a certificate, click the name of the certificate in the Distinguished
Name column.
The system displays the Certificate Information box with the following certificate details:
issued to, issued by, expiration date, and serial number.
Button Description
Upload Uploads a certificate to the spirit-trust.jks file.
Delete Deletes a certificate from the spirit-trust.jks file.
Reset certificates to factory Resets the certificates to the default settings.
settings
3. Click Upload.
The system uploads the certificate to the spirit-trust.jks file. The system also adds
the certificate to the Privacy Enhanced Mail (PEM) file.
Next steps
Restart the SAL services to apply the new certificates.
Deleting a certificate
Procedure
1. On the main menu of the SAL Gateway user interface, click Security > Certificate
Management.
2. Select the check box beside a certificate you want to delete.
3. Click Delete.
Result
The system deletes the certificate from the spirit-trust.jks and PEM files.
Next steps
Restart the SAL services to apply the new certificates.
Caution:
You must neither delete nor move the 12 default files. The Reset certificates to
factory settings button works only when all 12 default certificates authority files are
available in the certificate install directory.
If any certificate is unavailable, the system displays the following error: The current
operation failed; please see the debug log for the details of
exception.
Importing certificates
About this task
SAL Gateway users can use certificates other than those provided in the Avaya default truststore.
SAL Gateway supports adding new Certificate Authorities (CAs) to the trust keystore so that SAL
Gateway can authenticate Concentrator Servers and other products with customer-provided TLS
certificates.
You can use the keytool command in JAVA to import certificates into spirit-trust.jks in SAL
Gateway.
Procedure
1. Log on to the SAL Gateway host as root.
2. Run the following command from the command prompt:
<$JAVA_HOME>/bin/keytool -import -alias <Alias name given in the
customer certificate> -keystore spirit-trust.jks -file <Customer
Certificate file>
Note:
Provide the path of the jks file on SAL Gateway. The trust store is available at the
location that was provided while installing SAL Gateway.
Example: <$JAVA_HOME>/bin/keytool -importcert -alias SVRootCA -
keystore spirit-trust.jks -file ESDPTest.cer
Exporting certificates
About this task
If you have certificates other than the ones Avaya delivered in a trust store of your own, you can
export the certificates from your trust store and then import the certificates into the SAL Gateway
trust store, spirit-trust.jks.
Result
SAL Gateway refreshes CA certificates after:
• Component startup.
• Receipt of heartbeat acknowledgement from the upstream Core Server.
Next steps
From the SAL Gateway UI, restart the SAL components to apply the new certificates.
Button Description
Connect Connects to the client server. On successful connection, page
displays the URL and certificate details.
Import Imports the certificate from the client server.
Cancel Resets all the fields.
The Model Distribution feature of SAL Gateway ensures that the products managed through SAL
are associated with the latest model definitions. SAL Gateway checks the SAL Enterprise server for
new and updated models. If SAL Gateway finds any new models, SAL Gateway downloads them.
SAL ensures that SAL Gateway users always have access to the latest model versions. The user
preferences that are configured on SAL Gateway determine how and when models are applied.
Related links
Model Distribution Preferences field descriptions on page 116
Model application indicators on page 116
Related links
Indicating model distribution preferences on page 115
Note:
If the SAL user is not added to the SAL sudoers file, the auto upgrade might get
interrupted or disabled.
You receive email notifications about download status, installation status, installation reminders,
and other related events of the available software packages. The email notifications come to the
administrator mailbox that you configured at the time of installing or upgrading SAL Gateway. You
can update the administrator mailbox information through the SMTP Configuration page on the
SAL Gateway UI.
Important:
During a software update, SAL remote access and other Avaya Diagnostic Server services
become unavailable. A software update might also result in alarms being missed. To minimize
disruption of services and alarms, choose a time for applying software updates when the
impact of a system downtime is the least.
Related links
Setting preferences for automatic software update on page 118
Configuring SMTP server details on page 41
Applying a software update manually on page 206
Tip:
A software update might result in alarms being missed and stop all remote
connections. To minimize disruption of services and alarms, choose a time frame when
the impact of a system downtime is the least.
4. To deactivate the automatic software update feature, clear the Enable Automatic
Software Update check box.
5. Click Apply.
Next steps
For the configuration changes to take effect immediately, restart the SAL Gateway services
through the Apply Configuration Changes page. However, this is optional because the services
are restarted automatically at a scheduled time.
Important:
Restarting the SAL Gateway services might terminate established connections and might
result in SNMP traps being missed.
Related links
Automatic Software Update field descriptions on page 122
Note:
The Apply button is available only for successfully downloaded packages. The Apply
button is unavailable for the applied and earlier versions of software packages. The
Apply button becomes unavailable for all eligible packages if a package is already
scheduled to be applied in the next available administered time frame. The button
becomes available after the scheduled package is applied.
If the package you want to apply is not the latest, the system displays a message with the
release number of the latest available package. You can continue with the selected
package or can return to the Automatic Software Update page to select the latest package.
If an End User License Agreement (EULA) is available for the downloaded software
package, the system displays the License Agreement window. Otherwise, the system
displays the Apply Software window instead of the License Agreement window.
4. Read the EULA, and click Accept to continue with the software update.
If you decline the End User License Agreement, the system cancels the update process
and takes you back to the Automatic Software Update page.
The system displays the Apply Software window.
5. Click Apply Now.
The system stops the Avaya Diagnostic Server services and starts applying the software
update. The SAL Gateway UI service also stops during the update. After the software
update is applied, the services become available again.
Related links
Automatic Software Update field descriptions on page 122
Procedure
1. On the main menu of the SAL Gateway user interface, click Advanced > Automatic
Software Update.
The system displays the Automatic Software Update page.
2. In the Automatic Software Update History section, click the Plus ( ) icons to expand the
release buckets and to view the details of the available software packages.
The system displays the download status, installation status, and other details of the
software packages in the descending order according to the release versions.
3. Click Apply beside a downloaded software package that you want to install.
Note:
The Apply button is available only for successfully downloaded packages. The Apply
button is unavailable for the applied and earlier versions of software packages. The
Apply button becomes unavailable for all eligible packages if a package is already
scheduled to be applied in the next available administered time frame. The button
becomes available after the scheduled package is applied.
If the package you want to apply is not the latest, the system displays a message with the
release number of the latest available package. You can continue with the selected
package or can return to the Automatic Software Update page to select the latest package.
If an End User License Agreement (EULA) is available for the downloaded software
package, the system displays the License Agreement window. Otherwise, the system
displays the Apply Software window instead of the License Agreement window.
4. Read the EULA, and click Accept to continue with the software update.
If you decline the End User License Agreement, the system cancels the update process
and takes you back to the Automatic Software Update page.
The system displays the Apply Software window.
5. Click Apply Later.
Note:
The Apply Later button is available only when automatic software update is enabled.
The system schedules the software update to be applied in the next available time frame
that you set as automatic update preference.
The Apply Later selection takes effect within 24 hours as defined by the time in the
"Administered time window" and it is not possible to cancel.
The Apply button for the downloaded software packages becomes unavailable until the
scheduled software update is applied. After the software update is applied, the button
becomes available again for downloaded packages.
The SAL Gateway UI displays the following messages at the top of the work area:
Tip:
A software update might terminate all remote connections and
result in alarms being missed. To minimize disruption of
services and alarms, select a time frame when the impact of a
system downtime is the least.
Name Description
Release Version The version number of the release.
When you click the version number, the system displays the
Package Detail dialog box. The dialog box displays details of the
package, including version, status, and the new features or
enhancements delivered in the software update.
Hash Value Hash value or checksum of the software package that uniquely
identifies the package.
Status The download status or installation status of the software package.
Last Action TS The date and time when SAL Gateway tried to download or apply the
package last.
Auto Apply Date The date when SAL Gateway will install the downloaded software
package.
The field displays a date only if the automatic software update
feature is active and SAL Gateway downloaded the package
successfully.
Apply Now The field displays an Apply button for the successfully downloaded
software packages.
The Apply button becomes unavailable for all eligible packages if a
package is already scheduled to be applied in the next available
administered time frame. The button becomes available after the
scheduled package is applied.
Note:
The section shows a maximum of 10 records if at least 1 of the packages from the list is
already applied. Else, the section shows all the records.
Related links
Setting preferences for automatic software update on page 118
Applying a software update immediately on page 119
Scheduling an automatic software update to the next available time frame on page 120
Procedure
1. On the main menu of the SAL Gateway user interface, click Advanced > Automatic
Software Update.
The system displays the Automatic Software Update page with the Automatic Software
Update History table. The table contains the details of the software updates that SAL
Gateway downloaded, tried to download, installed, or tried to install.
2. Click the version number of the software package for which you want to view the details.
The Package Detail dialog box displays the details of the software update, including
version number, status, and enhancements that are included in the software update. If the
update was already installed, the dialog box displays the details of the installed
components.
Note:
The restore.sh script, which you can run from the CLI to restore a backed up state of
SAL Gateway, is located inside the <Gateway_Install_path>/GatewayUI/
scripts/ directory. When you run the restore.sh script, the system lists ahe local
backup points from where you can restore configuration data. After you select a
particular backup point, the script starts the restore operation. For more information
about how to restore configuration data, see Restoring SAL Gateway configuration data
using CLI on page 135.
• If a backup fails, SAL Gateway sends an email notification to the email address of the
Gateway administrator and an SNMP trap to the configured customer NMS servers. The
email address is configured on the SMTP Configuration page of SAL Gateway UI. For more
information about how to configure the SMTP server and the NMS server, see Configuring
SMTP server details on page 41 and Configuring NMS on page 44.
Note:
When a backup operation is in progress, the SAL alarming and the remote access facilities
continue to be available.
Related links
Backing up the SAL Gateway configuration data on page 126
Scheduling a backup on page 127
Viewing backup history on page 130
Scheduling a backup
About this task
Use this procedure to schedule an automatic backup of SAL Gateway configuration data at regular
intervals.
Procedure
1. On the SAL Gateway user interface, click Configuration > Backup Configuration.
2. On the Backup Configuration page, select Schedule Backup.
3. Specify the following:
• Frequency
• Day
• Start Time
• Archives kept on server
Note:
Available only when the selected backup method is Local
• Backup Method
- Local: Select to store the backup archive file on the SAL Gateway host server in
the /saldata/backup/archives directory.
- SFTP: Select to store the backup archive file in a specified directory on the
designated SFTP host server.
4. If you selected SFTP as the backup method, enter the host name, directory, user name,
and password for the SFTP host server.
5. Click Schedule Backup.
Related links
Backing up the SAL Gateway configuration data on page 126
Scheduling a backup on page 127
Viewing backup history on page 130
Backup Configuration field descriptions on page 128
Note:
If an SFTP transfer fails but the backup archive was successful,
then the copy of the archive file is saved on the local server in
the /saldata/backup/archives directory.
The following fields are available only when you select the backup method as SFTP:
SFTP Hostname/IP The hostname or IP address of the SFTP host server.
SFTP Directory The directory on the SFTP host server where the backup archive is
to be saved.
SFTP Username The user name to log on to the SFTP host server.
SFTP Password The password associated with the username to log on to the SFTP
host server.
If you select Schedule Backup, the following additional fields become available for you to
schedule an automatic backup at regular intervals:
Name Description
Frequency The frequency of the scheduled backup. The options are:
• Daily
• Weekly
• Monthly
Day The day of the week when the weekly data backup is run or the date
of the month when the monthly data backup is run. This field is
required if you select Weekly or Monthly as the data backup
frequency.
For a weekly data backup, select the day when the backup is to be
run.
For a monthly data backup, select the date when the backup is to be
run.
Start Time The start time for the backup operation. You must provide The time
in the HH:MM format.
For example, enter 11:30 PM as 23:30.
Archives kept on server The number of local backup archives to store on the SAL Gateway
host server. The default value is 3.
This field is available only when you select the backup method as
Local.
For SFTP backups, there is no limitation.
Button Description
Backup Now Starts the backup operation immediately.
This button is available only when you select Backup Now at the top
of the Backup Configuration page.
Schedule Backup Schedules the backup process according to the data you entered in
the fields available for scheduling.
This button is available only when you select Schedule Backup at
the top of the Backup Configuration page.
Cancel Schedule Cancels an existing backup schedule.
This button is available only when you click Edit and a backup
schedule is already in place.
Edit For an existing backup schedule, makes the fields available for
modification.
Undo Edit Cancels the changes you make on an existing backup schedule.
Related links
Backing up the SAL Gateway configuration data on page 126
Scheduling a backup on page 127
Viewing backup history on page 130
Backing up the SAL Gateway configuration data on page 126
Scheduling a backup on page 127
Viewing backup history on page 130
Note:
Use the CLI for a restore operation only when the Gateway UI is not accessible. The
restore script, restore.sh, is located inside the directory
<Gateway_Install_Path>/GatewayUI/scripts/. When you run this script, the
system lists a number of backup points from where you can restore configuration data.
After you select a particular backup point then the script starts the restore operation. For
more information, see Restoring SAL Gateway configuration data using CLI on page 135.
• You can restore the backup data either on the same Gateway instance or on a different
instance of SAL Gateway.
Note:
If you restore data on a different instance, the installation path and the major and the
minor versions of the SAL Gateway instances must be identical. For example, if one SAL
Gateway version is 2.2.0.1 and the other is 2.2.0.4, data restore from one instance to
another is possible. If the SAL Gateway versions are 2.3.0.1 and 2.2.0.1, data restore
from one instance to another is not possible.
Note:
If you restore data from an earlier version to a SAL Gateway version that has some
patches applied, which introduced configuration changes, SAL Gateway retains the
configuration changes. An automated post restore operation reapplies the same
configuration changes in the patches at the end of the restore operation.
Important:
After a restore operation, you must verify and, if required, update the SAL Gateway
configuration information using the Gateway UI, especially on the following pages: Gateway
Configuration, Core Server, Remote Server, Policy Manager, Proxy Server, SNMP SubAgent
Configuration, and Certificate Management. This check is important for the proper functioning
of the SAL Gateway services, such as alarming, remote connection, and inventory collection.
Also, .
The backup process does not take a backup of the SNMP agent service related files. After a
restore operation, you must reconfigure the SNMP agent details on SAL Gateway. See
Installing and configuring Net-SNMP in Deploying Avaya Diagnostic Server.
A restore operation overwrites the existing configuration data of SAL Gateway. If you restore
data from another SAL Gateway to your SAL Gateway instance, you must update the
configuration information on the Gateway Configuration page, specially the host name, IP
address, Solution Element ID, and alarm ID of SAL Gateway, to reflect the values belonging to
your SAL Gateway.
Caution:
The SAL Gateway restore operation does not guarantee an actual serviceability status of the
devices. The operation restores whatever configurations were captured at the time of backup.
Related links
Restoring SAL Gateway configuration data using the SAL Gateway UI on page 132
Restoring SAL Gateway configuration data using CLI on page 135
Viewing restore history on page 137
Restoring data from an SFTP host server using CLI on page 136
The Restore page displays a list of previously backed up local archives of the SAL
Gateway configuration data.
2. Select one of the following two options to restore a backup archive file:
• Local: To restore from an archive file on the SAL Gateway host server. If you select this
option, the Restore page displays a list of previously backed up archives on the SAL
Gateway host server.
• SFTP: To restore from an archive file on an SFTP host server.
3. If you selected SFTP as the option, enter the SFTP hostname or IP address, directory
where the archive file is located, the user name and password to log on to the SFTP host
server, and then click Search.
4. Select an archive file from the list, and click Restore to restore from the selected archive.
Result
After a successful restoration, a link to restart SAL Gateway UI appears on the Gateway UI. Use
this link to restart the SAL Gateway UI.
Note:
If the SAL Gateway is in Managed Services mode, then openvpnAgent service will also restart
along with other services.
Important:
When you trigger a restore operation, the system stops all SAL Gateway services except the
Gateway UI service. The alarming and the remote access facilities are not available during the
restoration process. After the Gateway data is restored, all services resume their operational
state.
Note:
If a restore operation fails, the system displays an error message with the status of SAL
Gateway. Check the Gateway UI logs for details of the cause. If the restore operation failure
affected the SAL Gateway state, you must update the system to rectify the configuration to
bring SAL Gateway to a working state. For more information about troubleshooting restore
operations, see Chapter 17, Troubleshooting.
Related links
Restoring SAL Gateway configuration data using the SAL Gateway UI on page 132
Restoring SAL Gateway configuration data using CLI on page 135
Viewing restore history on page 137
Restoring data from an SFTP host server using CLI on page 136
Restore field descriptions on page 133
Name Description
Restore From The location of the backup archive file from which you want to
restore configuration information. The options are:
• Local: To restore from an archived file on the SAL Gateway host
server. The Restore page displays a list of previously backed up
archives on the SAL Gateway server.
• SFTP: To restore from an archived file on an SFTP host server. To
log on to the SFTP host server, enter the SFTP hostname or IP
address directory where the archived file is located, and the user
name and password .
Archive Filename The file name of the backup archived files at the location you specify.
Archive Date The date on which the file was created.
Gateway Services The status of the SAL Gateway services when the backup archive
was created. You can view the status of the SAL Gateway services
for local backups only. , you cannot view the service status of
backups on an SFTP host server.
Note:
This field represents the status of the SAL Gateway services at
the time this backup was taken. This status does not reflect the
current status of the SAL Gateway services
The displayed status does not guarantee that services will be
restored to the same status after a restore operation.
Selection The field to restore configuration data from an archived file.
The following additional fields are available when you select the restore method as SFTP:
SFTP Hostname/IP The hostname or IP address of the SFTP host server.
SFTP Directory The directory on the SFTP host server where the restored archived
file is saved.
SFTP Username The user name to log on to the SFTP host server.
SFTP Password The password associated with the user name to log on to the SFTP
host server.
Button Description
Search Searches for archived files in the specified directory of the SFTP
host server.
This button is available only when you select SFTP.
Restore Starts the restore operation.
Delete Deletes a local archive file.
Important:
When you trigger a restore operation, the system stops all SAL Gateway services except the
SAL Gateway UI service. The alarming and remote access facilities are unavailable during the
restoration process.
Related links
Restoring SAL Gateway configuration data using the SAL Gateway UI on page 132
Restoring SAL Gateway configuration data using CLI on page 135
Viewing restore history on page 137
Restoring data from an SFTP host server using CLI on page 136
Restoring SAL Gateway configuration data using the SAL Gateway UI on page 132
Viewing restore history on page 137
Note:
The restore script lists only local backup points. If you want to restore an archive saved
on an SFTP host server using CLI, you must perform some additional manual steps.
For more information about restoring data, see Restoring data from an SFTP host
server using CLI on page 136
5. Type the number for a particular backup, and press Enter.
Result
The script starts the restore operation.
Important:
While the restore operation is in progress, do not stop the process. Let the restore operation
complete. Stopping the operation before completion might result in corruption of the SAL
Gateway configuration files.
Related links
Restoring SAL Gateway configuration data using the SAL Gateway UI on page 132
Restoring SAL Gateway configuration data using CLI on page 135
Viewing restore history on page 137
Restoring data from an SFTP host server using CLI on page 136
In the above entry, replace Archive Name with the actual archive file name. Also, retrieve
the file creation time from the file name, which is suffixed to the file name in the format
yyyy_MM_dd_HH_mm_ss. Convert the file creation time to the 12-hour date and time
format dd/MM/yy hh:mm:ss AM/PM and finally replace the Date placeholder with the file
creation time. For example, if the name of the remote archive is
backup_puvmlx140_2011_10_18_22_40_36.zip, the new entry would be as the
following:
<backup-history-entry>
<archiveName>backup_puvmlx140_2011_10_18_22_40_36.zip</archiveName>
Procedure
1. On the SAL Gateway user interface, click Configuration > Managed Services
Configuration.
2. Click Resync and Run to refresh the Managed Services configuration details.
System displays the following Managed Services details:
• Username
• Subnets
• Connection Type
• Destination
• Protocol
• Port
Button Description
Resync and Run The button to refresh the Managed Services configuration details.
When you click this button, the Managed services configuration on
SAL Gateway gets replaced with the corresponding file from SAL
Core.
Note:
You cannot start or stop the SAL Agent and the SAL Watchdog services. As the
administrator, you can control all other services.
3. If you have not configured the SAL Gateway connectivity to a server, such as proxy server
or SAL Policy Manager, click Configure to go to the relevant page to configure the server
details.
4. If the system displays the status of the SAL Gateway connectivity to a server as
Connectivity Failed, click Re-Configure to go to the relevant page to modify the
server configuration details.
Related links
Gateway Service Control field descriptions on page 141
The following icons indicate the connectivity of SAL Gateway to various servers in the table:
Icon Name Action that can be Description
performed
Connectivity verified — Indicates that SAL
Gateway could establish
connection with the
server.
Connectivity failed Re-configure the server Indicates that an error
information occurred while
establishing connection
with the server.
You can click Re-
Configure to edit the
server information.
Not configured Configure the server Indicates that the server
information details are not configured
for SAL Gateway.
You can click Configure
to configure the server
information for SAL
Gateway.
Button Description
Check Health for the Gateway Starts the status check of the SAL Gateway services and connectivity
to SAL servers and generates the status report.
Test Sends a test alarm to SAL Core Server to test the alarm transfer
service.
Start Starts a stopped service.
Stop Stops a running service.
Configure Displays the relevant page for the configuration of the server.
This link is available beside a server when the server details are not
configured in SAL Gateway.
Re-Configure Displays the relevant page for the configuration of the server.
This link is available beside a server when SAL Gateway cannot
establish a connection with the server.
A Health icon is available in the top–right corner of the SAL Gateway UI. The different icons
indicate the cumulative status of SAL Gateway services and connectivity.
Icon Description
The status of the SAL Gateway components is between 0-19%.
Note:
For more information about the components that have issues, see the SAL Gateway Service
Control and Status page.
Related links
Managing SAL Gateway services on page 140
Overview
Monitoring the operational status of SAL Gateway is important to ensure proper functioning of SAL
Gateway. To monitor the SAL Gateway status, you can view SAL Gateway diagnostics,
configuration files, and status reports.
Customers or support personnel might want to diagnose SAL Gateway to determine the
operational status of the SAL Gateway components:
• When SAL Gateway fails to function as expected.
• Before the start of a support action.
• After a support action is complete.
Running diagnostics
About this task
Use this procedure to run a diagnostics to check the status of the SAL Gateway components.
Note:
SAL Gateway runs only one diagnostics at a time. If a user runs a diagnostics on SAL
Gateway, no other user can simultaneously run another diagnostics on that SAL Gateway.
Before you begin
The SAL Agent service must be in the running status.
Procedure
1. On the main menu of the SAL Gateway user interface, click Diagnostics > Diagnostics
Viewer.
2. On the Diagnostics Viewer page, click Run Diagnostics.
Result
The system runs diagnostics and displays the message Diagnostics is running.
SAL Gateway at this point runs through a list of SAL Gateway components, and invokes each to
run diagnostics. The system displays the collective output of all of these diagnostic tests as a
diagnostics report.
Note:
While a diagnostics runs, you can navigate elsewhere on the SAL Gateway user interface.
Next steps
View the diagnostic report generated to check the status of the SAL Gateway components.
Related links
Diagnostics Viewer field descriptions on page 146
Procedure
1. On the main menu of the SAL Gateway user interface, click Diagnostics > Diagnostics
Viewer.
2. On the Diagnostics Viewer page, If required, run a diagnostics.
3. From the diagnostics report list, select a report and click Export.
The system displays the File Download box with the message: Do you want to open
or save this file?
4. Perform one of the following:
• Click Open to view the file.
• Click Save to save the file to a location to which you can browse.
Related links
Diagnostics Viewer field descriptions on page 146
Button Description
Show Report Displays a selected diagnostic report.
You can copy the diagnostic text into an email message or a note-
taking application.
Run Diagnostics Runs diagnostics and displays the report on the page. SAL Gateway
saves the report as a .rpt file, which becomes available in the drop-
down list for later viewing.
Export Exports the diagnostic report to the local system as a .rpt file.
Related links
Running diagnostics on page 144
Viewing a diagnostics report on page 145
Exporting a diagnostics report on page 145
Related links
Configuration Viewer field descriptions on page 148
Button Description
Display Displays the selected XML configuration file.
Export Exports the selected XML configuration file to the local system.
Related links
Exporting a configuration file on page 147
Viewing a configuration file on page 147
Note:
If you search without giving any inputs in the search criteria, all the registration requests made
to this SAL Gateway are displayed.
Name Description
Batch Request ID The request ID assigned to your device registration request.
SEID The unique identifier assigned to the device when the device is
registered with Avaya
Product IP Address The IP address of the device that you want to search.
Status The status of the device registration request. It can be:
• All
• REQUEST_ACCEPTED
• SUBMITTED_TO_AVAYA
• COMPLETED
SSO User The Single Sign On credentials used for registering the product.
Result The result of device registration request. It can be:
• All
• SUCCESS
• ERROR
Start Date (MM/DD/YYYY) The date when the device registration request was initiated in
MM/DD/YYYY format.
End Date (MM/DD/YYYY) The date when the device registration request was completed or
declined, in MM/DD/YYYY format.
Product Type The type of product or device for which the registration request was
originated.
Button Description
Search Initiates the search for devices that matches the search criteria.
Note:
If you click Search without giving any inputs in the search
criteria, a list of all the registration requests made to SAL
Gateway is displayed.
Clear Search Erases all the data from the search fields..
Refresh Updates the search result to include the latest registered device.
The search results are displayed in the search result section. The Details link in the search results
includes the following additional information:
Name Description
Request ID The request ID assigned to your device registration request.
Table continues…
Name Description
Alarm ID A 10-digit numeric field where the first two digits indicate the product
family and the remaining numbers are a sequential assignment
created the registration tool.
Client The client associated with the product or device.
Nick Name Product name assigned to the device
Sold To/FL Functional location number that identifies the installation location of
SAL Gateway.
Result Sub Type Displays system messages after the registration process is
completed, either successfully or with an error.
Description Additional information about device registration. In case the device
registration has failed, this field gives the description of the error.
Updated Timestamp The date and time when the status of device registration request was
last updated.
• Alarm ID
• Client
• Nick Name
• Sold To/FL
• Result Sub Type
• Description
• Updated Timestamp
Button Description
Refresh Updates the list of live remote connections to include or remove the
latest active session.
Procedure
Click the Gateway Status icon that is available on the upper right corner of the user interface just
before the User icon ( ).
The system displays the Gateway Service Control page.
Related links
Gateway Service Control field descriptions on page 141
Button Description
Display Displays a selected status report.
Export Exports the status report to the local system as a .rpt file.
The SAL Gateway status report tabulates health status information under the following three
heads:
Name Description
Service/Server Name The name of the SAL services and servers whose operational status
the report provides.
The report displays the status information about the following SAL
services:
• SAL Agent
• Alarming
• Inventory
• Remote Access
• SAL SNMP Sub Agent
• Package Distribution
• SAL Watchdog
• SAL Managed Service Agent
The report displays the connectivity status information of the
following servers:
• Primary Core Server
• Primary Remote Server
• HTTP Proxy Server
• Policy Manager
• SAL Hosted Concentrator for BPs
Status The icons that indicates the operational status of a service and
connectivity status of a server.
Table continues…
Name Description
Status Message If the process to determine status fails, the reasons for the failure.
For example: IP Address of the host [secavaya.com]
could not be determined.
If the status indicates that the server is not configured, the system
displays the message: The server details are not
configured for SAL Gateway.
Note:
If there is no status message to be displayed for a service or
server, the locally saved report displays the value as null. This
null value is not an error condition, but just the absence of any
error message.
Related links
Viewing a status report of SAL Gateway on page 153
Exporting a status report of SAL Gateway on page 153
The following table contains a list of all application logging files for different SAL Gateway
components.
SAL component Log files
Gateway web interface $INSTALL_PATH/GatewayUI/logging/gw-ui.log
$INSTALL_PATH/GatewayUI/logging/spirit-agent-
debug.log
$INSTALL_PATH/GatewayUI/logging/gcm-sec.log
$INSTALL_PATH/GatewayUI/logging/gcm-op.log
$INSTALL_PATH/GatewayUI/logging/gcm-debug.log
$INSTALL_PATH/GatewayUI/logging/gcm-audit.log
$INSTALL_PATH/GatewayUI/logging/ca-refresh-
diagnose.log
SAL Agent $INSTALL_PATH/SpiritAgent/logging/
spiritAgentAudit.log
$INSTALL_PATH/SpiritAgent/logging/
spiritAgentOperational.log
$INSTALL_PATH/SpiritAgent/logging/
spiritAgentSecurity.log
$INSTALL_PATH/SpiritAgent/logging/spirit.log
Remote access:
$INSTALL_PATH/SpiritAgent/logging/sal-ra-debug.log
Package deployment:
$INSTALL_PATH/SpiritAgent/logging/sal-pd-debug.log
Device data management:
$INSTALL_PATH/SpiritAgent/logging/sal-dd-debug.log
SAL Watchdog $INSTALL_PATH/SALWatchdog/logging/
SALWatchdogOperational.log
$INSTALL_PATH/SALWatchdog/logging/
SALWatchdogDebug.log
Table continues…
Viewing logs
About this task
You can use the SAL Gateway UI to view the SAL Gateway logs. You can view logs to determine
the cause of an outage, track intermittent problems, or analyze performance data.
Procedure
1. On the main menu of the SAL Gateway user interface, click Diagnostics > Log Viewer.
2. On the Log Viewer page, in the Categories field, select a log category.
The Log Files list displays the name of the available log files under the selected category.
3. In the Log Files field, select one or more log files.
To select multiple files, pressing Ctrl, click the files you want to view.
4. Click View.
The system displays the logs in a tabular format under the Tabular Result tab.
5. Click the Raw Result tab to view the logs in the raw format.
Related links
Log Viewer field descriptions on page 159
Filter section
Name Description
Select Filter The link to display the options and fields to set up the filter criteria.
Remove Filters The link to clear any filter criteria you have selected and hide the
filter section.
Basic The option to display the fields to specify one basic criteria to filter
the log data from the selected log files.
Advanced The option to display the fields and buttons to set up a filter
expression that can be a combination of two or more filter criteria
joined by the AND or OR operator.
Table continues…
Name Description
Criteria The filter criteria against which the log data are matched and filtered.
Some available options include:
• Text
• Date
• Host Name
• Process Name
• Process ID
The options in the drop-down list vary according to the availability of
the criteria fields in the selected log files. If you select multiple log
files, the drop-down list displays only those criteria that are common
to all the selected log files.
Operations The operator to join a selected criterion from the Criteria field to the
Value(s) field.
Based on the selected criterion, you can select one of the following
operators:
• Equals
• Contains
• Between
Examples:
Host Name Equals puvmlx.avaya.com
Text Contains puvmlx
Date Between 31-01-11 & 12-12-11
Value (s) The value of the selected criterion. The value is matched against the
data in the selected log files to filter the data.
If you select the filter criterion as Date, the system displays two fields
to enter a date range.
If you select the filter criterion as Log Level, the system displays a
drop-down list from which you can select a log level.
Table continues…
Name Description
Filter Expression A combination of two or more filter criteria joined by the AND or the
OR operators. The system filters the log files to obtain only those log
data that satisfy the criteria in the filter expression. The system
evaluates a filter expression as a Boolean expression and the AND
operator takes precedence over the OR operator.
This field becomes available only when you select the Advanced
option.
Example filter expressions:
Host Name Equals puvmlx.avaya.com
And
Date Between 31-01-11 & 12-12-11
Host Name Equals puvmlx.avaya.com
Or
Text Contains puvmlx
The following buttons are available only when you select the Advanced option:
Button Description
Add Adds the filter criterion you define using the Criteria, Operations,
and Value (s) fields to the Filter Expression field.
You can add more than one criterion joined by the AND or the OR
operators to form a filter expression.
And Joins two filter criteria using the AND operator. The system extracts
only those log data that satisfy both the criteria that are joined by the
AND operator.
After you Add a criterion to the Filter Expression field, you can click
And to be able to define and add the next filter criterion.
Example filter expression joined by the AND operator:
Host Name Equals puvmlx.avaya.com
And
Date Between 31-01-11 & 12-12-11
Or Joins two filter criteria using the OR operator. The system extracts
only those log data that satisfy any one of the two criteria that are
joined by the OR operator.
Example filter expression joined by the OR operator:
Host Name Equals puvmlx.avaya.com
Or
Text Contains puvmlx
Table continues…
Button Description
Group Groups two or more filter criteria together in the filter expression to
change the priority of the criteria during the evaluation of the filter
expression. You can select the criteria you want to group from the
Filter Expression field, and then click Group to group the criteria
together. The Filter Expression filed displays the grouped criteria
within simple brackets.
Example:
Host Name Equals puvmlx.avaya.com
Or
(
Date Between 31-01-11 & 12-12-11
And
Text Contains puvmlx
)
Ungroup Removes a grouping of criteria in a filter expression. To remove the
grouping, you can select the grouped criteria along with the closed
brackets that mark the grouping, and then click Ungroup. The
brackets that mark the grouping are removed.
Clear All Clears all filter criteria you have added to the Filter Expression
field.
Edit Enables you to modify a filter criterion selected from the Filter
Expression field.
When you select a particular filter criterion from the Filter
Expression field and click Edit, the system displays the parameters
for the criterion in the Criteria, Operations, and Value (s) fields. You
can modify the values in the fields, and then click Update to update
the Filter Expression field with the modified criterion.
Update Updates the filter expression with the modifications you have made
on a filter criterion that was already in the Filter Expression field.
Related links
Viewing logs on page 158
Downloading logs on page 163
Filtering logs using the basic filter options on page 164
Filtering logs using the advanced filter options on page 165
Downloading logs
About this task
You can download log files or filtered log data to the local system in the raw or CSV format to view
and analyze the logs offline. The downloaded log files are contained in a ZIP file.
Procedure
1. On the main menu of the SAL Gateway user interface, click Diagnostics > Log Viewer.
2. On the Log Viewer page, in the Categories field, select a log category.
The Log Files list displays the name of the available log files under the selected category.
3. In the Log Files field, select one or more log files.
To select multiple files, pressing Ctrl, click the files you want to view.
4. If you want to download a subset of the selected log, click Select Filter, and specify the
filter criteria.
For more information about how to set the filter criteria, see the topics on filtering logs.
5. Perform one of the following:
• To download logs in the CSV format, click Download > CSV.
• To download logs in the raw format, click Download > Raw.
The system displays the File download dialog box.
6. Perform one of the following:
• To open the ZIP file that contains the log files, click Open.
• To save the ZIP file that contains the log files to a local directory, click Save.
Related links
Log Viewer field descriptions on page 159
Filtering logs using the basic filter options on page 164
Filtering logs using the advanced filter options on page 165
8. To join another filter criterion with the existing criterion in the Filter Expression field, do
one of the following:
• To join two criteria by the AND operator, click And, and repeat Step 6 to Step 7.
• To join two criteria by the OR operator, click Or, and repeat Step 6 to Step 7.
You can repeat Step 8 to add more criteria to the filter expression.
9. To group two or more filter criteria together, from the Filter Expression field, select the
criteria you want to group, and click Group.
10. To remove a grouping of criteria in a filter expression, select the grouped criteria along with
the closed brackets that mark the grouping, and click Ungroup.
11. To modify a criterion definition in the Filter Expression field, perform the following:
a. Select the criterion in the Filter Expression field, and click Edit.
The system displays the parameters of the criteria in the Criteria, Operations, and
Value (s) fields.
b. Modify the values in the fields, and click Update.
The Filter Expression field displays the modified criterion definition.
12. Click Filter.
The system filters the selected log files according to the filter criterion you have set up and
displays the filtered log data under the Tabular Result tab as wrapped lines in a tabular
format.
13. To download the filtered log data to the local system, click Download > CSV or
Download > Raw.
Related links
Log Viewer field descriptions on page 159
Downloading logs on page 163
Syslog overview
Syslog is the standard for forwarding log messages to event message collectors on an IP network.
Syslog encompasses the protocol for sending and collecting log messages. Event message
collectors are also known as syslog servers.
Syslog is a client-server protocol. The syslog sender sends small (less than 1KB) textual
messages to the syslog receiver. The syslog receiver is commonly called syslogd, syslog daemon,
or syslog server. Syslog is typically used for computer system management and security auditing.
Logging through syslog is a way of sending system information to a common collection site by
means of either UDP, or TCP/IP, or both. Product support personnel can analyze this information
to:
• Pinpoint system failures
• Pinpoint security breaches
• Analyze specific system events
Related links
Syslogd service on page 167
Uses of logging on page 168
Syslogd service
The syslogd service is a system service that co-ordinates the syslog activity of the host. Syslog
activity includes receiving, categorizing, and logging external log messages.SAL Gateway can
read the syslogd logs and process the logs with the event processor to provide alarming
capabilities for managed devices. Red Hat Enterprise Linux uses sysklogd as its syslogd
equivalent.
The ability to log events proves useful in several areas.
Related links
Syslog overview on page 167
Uses of logging
Logging can be used to:
• Benchmark new applications so that faults are more easily detected in the future.
• Troubleshoot existing applications.
The log messages help service personnel understand how the system is operating or if something
is wrong.
The syslog application is designed to take messages from multiple applications or devices, and
write the messages to a single location. Logging can be local or remote. You can set up most
systems to log messages to the system itself (local), or to log messages to a syslog server
residing at a different location (remote).
Related links
Syslog overview on page 167
Syslog configuration
On RHEL 7.x and 8.x, you can configure the /etc/rsyslog.conf file to add the necessary
syslog rules to relocate the SAL-related logs.
Each rule consists of three fields: facility, priority and action.
• Facility identifies the subsystem that generated the log entry used and is one of the following:
Local0, Local4, or Local5.
• Priority defines the severity of the log entry to be written as:
Debug info notice warning err crit alert emerg
• Action specifies the destination log file or server for the log entry.
The SAL Gateway UI reads this file to determine the location of the log files that syslog creates.
SAL Gateway writes logs in two locations:
• The log files specific to the SAL Gateway components.
• Syslog: Syslogs makes it possible to have logs stored externally for any duration that the
customer wants.
Note:
Create a new file, if an existing file is not available.
3. Verify whether the file contains the following entries:
local4.* /var/log/SALLogs/audit.log
local5.* /var/log/SALLogs/messages.log
4. If the file does not contain the mentioned lines, add the lines to the file.
5. To enable SAL Gateway syslog on the local server, open the /etc/rsyslog.conf file. Ensure
that the following lines are present in the file and are uncommented, that is, no pound (#)
sign remains at the start of the lines:
$ModLoad imudp
$UDPServerRun 514
$IncludeConfig /etc/rsyslog.d/*.conf
Note:
If any of these lines are missing, add the lines and update the file.
6. Save and close the file.
7. Restart the rsyslog service using the appropriate command from the following:
• On an RHEL 7.x and 8.x system:
systemctl restart rsyslog
Viewing syslogs
About this task
SAL logging capabilities are extremely useful to service personnel. Virtually anything that happens
on a SAL Gateway at any given time is, or can be, logged. This facility provides a user materials to
determine the cause of an outage, track intermittent problems, or simply analyze performance
data.
Procedure
1. On the main menu of the SAL Gateway user interface, click Diagnostics > Log Viewer.
2. On the Log Viewer page, in the Categories field, click Syslogs.
The Log Files list displays the name of the available syslog files.
3. In the Log Files field, select one or more syslog files.
To select multiple files, pressing Ctrl, click the files you want to view.
4. Click View.
The system displays the logs in a tabular format under the Tabular Result tab.
5. Click the Raw Result tab to view the logs in the raw format.
6. (Optional) To export logs, select the log files, and click Download > Raw or Download >
CSV.
Related links
Log Viewer field descriptions on page 159
Note:
The only corrective action needed is to restart SAL Gateway.
- NEEDS_ATTENTION: The results of the diagnostic test indicate a condition that might
need the attention of a support personnel.
The following situations might require corrective action.
- A configuration for SAL Gateway to collect inventory for a device that still awaits
installation: SAL Gateway must pause until the device becomes available.
Diagnostics cannot decipher your intent regarding the missing device.
- SAL Gateway cannot parse a configuration that contains a typographical error. This means
that a component is not functioning as expected. Diagnostics cannot correct this condition
by itself.
• A Description of the results of the test.
Multiple lines of descriptive text might exist in the description.
You should rarely see the Status values of NEEDS_REPAIR and NEEDS_RESTART.
Even if you see these status values, you do not require to take immediate action because the
Watchdog process automatically follows a planned series of corrective actions.
The Watchdog process retries these corrective actions up to six times at five-minute intervals.
Note:
If the system continues to display these status codes after 30 minutes, you must report the
fault to Avaya.
Status values of NEEDS_ATTENTION might be more common during routine operations of
SAL Gateway. However, you must be certain that you understand the cause of these
conditions and only leave such conditions unattended if you expect the conditions to correct
themselves in due course, for example, when a configured device is eventually deployed.
StartedStopped CollectionMan OK Collection Manager thread This thread manages all the
agerThread operational alarm listeners. The thread
could be stopped if the
alarming component is
stopped. The description will
then be: Collection
Manager thread
stopped.
StartedStopped CollectionMan OK CollectionManager has been This component is the class
ager created that owns and starts the
manager thread mentioned
earlier. This component
could be non-existent if the
alarming component is
stopped. The description will
then be: Collection
Manager not created.
Table continues…
1 Stop all services on SAL Gateway. Log on to the SAL Gateway host as the root
user, and stop the following services:
• spiritAgent
• gatewayUI
For example, run the following command to
stop the spiritAgent service:
service spiritAgent stop
Run the following command to check the
status of the services and ensure that the
services are not running:
service <servicename> status
2 Uninstall SAL Gateway. See Deploying Avaya Diagnostic Server.
The message indicates that the system or a user might have stopped the restore operation
abruptly before the operation is complete. The restore operation might also be accidentally
stopped when someone stops the gatewayUI JVM from the backend.
The impact of this event on the SAL Gateway depends on the stage at which the restore operation
is stopped. If the restore operation was in an advanced stage when the operation was stopped,
some SAL Gateway configuration files might get overwritten.
Related links
Viewing inventory log files on page 89
Documentation
The following table lists the documents related to Avaya Diagnostic Server. Download the
documents from the Avaya Support website at http://support.avaya.com.
Title Description Audience
Implementation
Deploying Avaya Diagnostic Server Describes the implementation requirements Sales engineers,
and procedures to deploy the Avaya solution architects,
Diagnostic Server software. implementation
engineers, and
customers
Deploying SAL Policy Manager with Describes the implementation requirements Solution architects,
SSH Proxy and procedures to deploy the SAL Policy implementation
Manager with SSH Proxy software. engineers, support
personnel, and
customers
Administration
Administering Avaya Diagnostic Provides information about configuring and Solution architects,
Server with SLA Mon™ administering Avaya Diagnostic Server for implementation
the remote diagnostics of Avaya endpoints engineers, support
and network condition monitoring through personnel, and
the SLA Mon server. customers
Administering SAL Policy Manager Provides information about configuring, Solution architects,
with SSH Proxy administering, and using SAL Policy implementation
Manager with SSH Proxy to control and engineers, support
monitor remote sessions to Avaya products personnel, and
at the customer site. customers
Other
Avaya Diagnostic Server Additional Provides information on the additional Implementation
Security Configuration Guidance measures that you can take on the Avaya engineers, support
Diagnostic Server host to meet customer personnel, and
security requirements and policies. customers
Table continues…
Related links
Finding documents on the Avaya Support website on page 203
Note:
Videos are not available for all products.
Support
Go to the Avaya Support website at https://support.avaya.com for the most up-to-date
documentation, product notices, and knowledge articles. You can also search for release notes,
downloads, and resolutions to issues. Use the online service request system to create a service
request. Chat with live agents to get answers to questions, or request an agent to connect you to a
support team if an issue requires additional expertise.
Related links
Using the Avaya InSite Knowledge Base on page 204
SAL Gateway can generate the following traps. All traps use the INADS MIB. SAL Gateway sends
these traps to the configured NMSs.
• SAL Gateway received an alarm from a product that is not registered in the configuration file
for supported products.
- o xxxxxxxxxx 10/09:28,EOF,ACT|ALARMING,UNKNOWN-
DEVICE,n,WRN,$ipaddr is not a supported device;
• EventProcessorAlarmHandler received a message that had no body.
- o xxxxxxxxxx 10/09:31,EOF,ACT|
ALARMING,ALMFAILED,n,MAJ,EventProcessorAlarmHandler Received
Message Containing No Body.
• A trap decoding exception occurred in the EventProcessorAlarmHandler.
- o xxxxxxxxxx 10/09:31,EOF,ACT|ALARMING,ALMFAILED,n,MAJ,
EventProcessorAlarmHandler encountered an SnmpDecodingException.
• A trap encoding exception occurred in the EventProcessorAlarmHandler.
- o xxxxxxxxxx 10/09:31,EOF,ACT|ALARMING,ALMFAILED,n,MAJ,
EventProcessorAlarmHandler encountered an SnmpEncodingException.
• AFM variables could not be added to a trap.
- o xxxxxxxxxx 10/09:31,EOF,ACT|ALARMING,ALMFAILED,n,MAJ, Could not
add AFM varbinds to alarm. Alarm not delivered to Enterprise.
• EventProcessorNmsHandler received a message that had no body.
- o 10/09:31,EOF,ACT|
ALARMING,ALMFAILED,n,MAJ,EventProcessorNmsHandler Received Message
Containing No Body.
• A trap decoding exception occurred in the EventProcessorNmsHandler.
- o xxxxxxxxxx 10/09:31,EOF,ACT|ALARMING,ALMFAILED,n,MAJ,
EventProcessorNmsHandler encountered an SnmpDecodingException.
• The SAL Gateway CLI changed the configuration.
- o xxxxxxxxxx 10/09:49,EOF,ACT|SPIRIT,CONFIG-CHANGE,n,WRN,CLI
changed configuration.
• Heartbeat failed.
- o xxxxxxxxxx 10/09:53,EOF,ACT|SPIRIT,HB-FAILED,n,MAJ,$message from
exception.
Alarm ID A 10-digit numeric field where the first two digits indicate the product
family and the remaining numbers are a sequential assignment created
by ART. For example, 1012345678. The Product ID and Alarm ID are
exactly the same number.
Avaya Aura® A key component of Avaya Aura®. It delivers rich voice and video
Communication capabilities and provides a resilient, distributed network for media
Manager gateways and analog, digital, and IP-based communication devices. It
includes advanced mobility features, built-in conference calling, contact
center applications and E911 capabilities.
Avaya Diagnostic Avaya Diagnostic Server is an Avaya application suite to provide secure
Server remote access and advanced diagnostics services on the customer
network.
The terms Avaya Diagnostic Server and Diagnostic Server are used
interchangeably.
Credential Package Package containing ASG keys and Passwords from Avaya back-office.
Demilitarized Zone In computer networking, DMZ is a firewall configuration for securing local
(DMZ) area networks (LANs).
Domain Name A hierarchical distributed naming system for computers, services, or any
System (DNS) resource connected to the Internet or a private network. A DNS resolves
queries for domain names into IP addresses for the purpose of locating
computer services and devices worldwide.
Graphical User A type of user interface which allows people to interact with a computer
Interface (GUI) and computer-controlled devices, which employ graphical icons, visual
indicator or special graphical elements along with text or labels to
represent the information and actions available to a user.
Internet Engineering A technical working body of the Internet Activities Board. Internet
Task Force Engineering Task Force (IETF) develops new TCP/IP standards for the
Internet.
Lightweight A data store used to store user information such as name, location,
Directory Access password, group permissions, and pseudo permissions.
Protocol
Product ID A 10-digit numeric field where the first two digits indicate the product
family and the remaining numbers are a sequential assignment created
by ART. For example, 1012345678. The Product ID and Alarm ID are
exactly the same number.
Public Key An authentication scheme that uses exchange of certificates which are
Infrastructure (PKI) usually stored on a fob. The certificates use asymmetric public key
algorithms to avoid sending shared secrets such as passwords over the
network. Certificates are usually generated and signed by a certificate
authority (CA) such as VeriSign. CAs and the signing certificates have
expiry dates, and all can be revoked. Authentication with certificates
requires verification that the certificate is valid, that the client sending the
certificate possesses the private key for the certificate, that the certificate
is signed by a trusted certificate authority, that the certificate and its
signers have not expired and that the certificate and signers have not
been revoked. Checking a certificate for revocation requires looking up
the certificate in a Certificate Revocation List (CRL) or querying an Online
Certificate Status Protocol (OCSP) service.