Avaya AG250 Hardware Installation Manual Download Page 2

Copyright 2004-200

6

, Avaya Inc.

All Rights Reserved

Notice

Every effort was made to ensure that the information in this document 
was complete and accurate at the time of printing. However, 
information is subject to change.

Warranty

Avaya Inc. provides a limited warranty on this product. Refer to your 
sales agreement to establish the terms of the limited warranty. In 
addition, Avaya’s standard warranty language as well as information 
regarding support for this product, while under warranty, is available 
through the following Web site: 

http://www.avaya.com/support

.

Trademarks

DEFINITY is a registered trademark of Avaya, Inc. MultiVantage is a 
trademark of Avaya, Inc. Windows, Windows 2000, and Windows NT 
are trademarks or registered trademarks of Microsoft Corporation.

Preventing Toll Fraud

“Toll fraud” is the unauthorized use of your telecommunications 
system by an unauthorized party (for example, a person who is not a 
corporate employee, agent, subcontractor, or is not working on your 
company's behalf). Be aware that there may be a risk of toll fraud 
associated with your system and that, if toll fraud occurs, it can result 
in substantial additional charges for your telecommunications 
services.

Avaya Fraud Intervention

If you suspect that you are being victimized by toll fraud and you need 
technical assistance or support, in the United States and Canada, call 
the Technical Service Center's Toll Fraud Intervention Hotline at
1-800-643-2353.

Disclaimer

Avaya is not responsible for any modifications, additions or deletions 
to the original published version of this documentation unless such 
modifications, additions or deletions were performed by Avaya. 
Customer and/or End User agree to indemnify and hold harmless 
Avaya, Avaya's agents, servants and employees against all claims, 
lawsuits, demands and judgments arising out of, or in connection with, 
subsequent modifications, additions or deletions to this documentation 
to the extent made by the Customer or End User. 

How to Get Help

For additional support telephone numbers, go to the Avaya support 
Web site: 

http://www.avaya.com/support

. If you are:

• Within the United States, click the 

Escalation Management

 link. 

Then click the appropriate link for the type of support you need.

• Outside the United States, click the

 Escalation Management 

link. 

Then click the 

International Services

 link that includes telephone 

numbers for the international Centers of Excellence.

Providing Telecommunications Security

Telecommunications security (of voice, data, and/or video 
communications) is the prevention of any type of intrusion to (that is, 
either unauthorized or malicious access to or use of) your company's 
telecommunications equipment by some party.
Your company's “telecommunications equipment” includes both this 
Avaya product and any other voice/data/video equipment that could be 
accessed via this Avaya product (that is, “networked equipment”).
An “outside party” is anyone who is not a corporate employee, agent, 
subcontractor, or is not working on your company's behalf. Whereas, a 
“malicious party” is anyone (including someone who may be 
otherwise authorized) who accesses your telecommunications 
equipment with either malicious or mischievous intent.

Such intrusions may be either to/through synchronous (time-
multiplexed and/or circuit-based) or asynchronous (character-, 
message-, or packet-based) equipment or interfaces for reasons of:

• Utilization (of capabilities special to the accessed equipment)
• Theft (such as, of intellectual property, financial assets, or toll 

facility access)

• Eavesdropping (privacy invasions to humans)
• Mischief (troubling, but apparently innocuous, tampering)
• Harm (such as harmful tampering, data loss or alteration, 

regardless of motive or intent)

Be aware that there may be a risk of unauthorized intrusions 
associated with your system and/or its networked equipment. Also 
realize that, if such an intrusion should occur, it could result in a 
variety of losses to your company (including but not limited to, 
human/data privacy, intellectual property, material assets, financial 
resources, labor costs, and/or legal costs).

Responsibility for Your Company’s Telecommunications Security

The final responsibility for securing both this system and its 
networked equipment rests with you - Avaya’s customer system 
administrator, your telecommunications peers, and your managers. 
Base the fulfillment of your responsibility on acquired knowledge and 
resources from a variety of sources including but not limited to:

• Installation documents
• System administration documents
• Security documents
• Hardware-/software-based security tools
• Shared information between you and your peers
• Telecommunications security experts

To prevent intrusions to your telecommunications equipment, you and 
your peers should carefully program and configure:

• Your Avaya-provided telecommunications systems and their 

interfaces

• Your Avaya-provided software applications, as well as their 

underlying hardware/software platforms and interfaces

• Any other equipment networked to your Avaya products

TCP/IP Facilities

Customers may experience differences in product performance, 
reliability and security depending upon network configurations/design 
and topologies, even when the product performs as warranted.

Standards Compliance

Avaya Inc. is not responsible for any radio or television interference 
caused by unauthorized modifications of this equipment or the 
substitution or attachment of connecting cables and equipment other 
than those specified by Avaya Inc. The correction of interference 
caused by such unauthorized modifications, substitution or attachment 
will be the responsibility of the user. Pursuant to Part 15 of the Federal 
Communications Commission (FCC) Rules, the user is cautioned that 
changes or modifications not expressly approved by Avaya Inc. could 
void the user’s authority to operate this equipment.

To order copies of this and other documents:

Call:

Avaya Publications Center
Voice 1.800.457.1235 or 1.207.866.6701
FAX 1.800.457.1764 or 1.207.626.7269

Write:

Globalware Solutions
200 Ward Hill Avenue
Haverhill, MA 01835 USA
Attention: Avaya Account Management

E-mail:

[email protected]

For the most current versions of documentation, go to the Avaya 
support Web site: 

http://www.avaya.com/support

Summary of Contents for AG250

Page 1: ...AG250 Application Gateway Server Hardware Installation Guide Release 2 1 Service Pack 16 300260 Issue 2 1 April 2006...

Page 2: ...s a malicious party is anyone including someone who may be otherwise authorized who accesses your telecommunications equipment with either malicious or mischievous intent Such intrusions may be either...

Page 3: ...ion Gateways in Your Enterprise Network 3 Rack Mounting the Application Gateway 6 Separating the Rail Sections 6 Connecting the Chassis Rails to the Server 7 Connecting the Rack Rails to the Rack 8 In...

Page 4: ...Contents Application Gateway Hardware Installation Guide iv...

Page 5: ...cation Gateway and for administrators who need to troubleshoot the hardware Organization This guide is organized as follows Chapter Appendix Title Description Chapter 1 Installing the Application Gate...

Page 6: ...troubleshooting or even an action but could be useful information Cautions use the following conventions Caution Means reader be careful In this situation you might do something that could result in e...

Page 7: ...in transformation capabilities of the Application Gateway gaining access to applications built for desktop browsers The Application Gateway determines the type of device making a connection and forma...

Page 8: ...erprise Network page 3 Verifying the Box Contents The box in which your Application Gateway is shipped contains the following components If something is missing please contact support at http www avay...

Page 9: ...operate with the Application Gateway Locating Application Gateways in Your Enterprise Network This topic provides information intended to help you determine where to locate Application Gateways in you...

Page 10: ...describe some possible deployment scenarios Connection to Application Server In Line In this configuration you connect an Application Gateway directly to an application server as shown in Figure 1 Fi...

Page 11: ...er checks the browser type associated with the request If the request is from a microbrowser the application server redirects the request back to the requesting device pointing it to the Application G...

Page 12: ...of time Please read this guide in its entirety before you begin the installation Each of the rail assemblies consist of two sections an inner fixed chassis rail that secures to the server A and an out...

Page 13: ...rver in place when the rail is fully extended from the rack This prevents the server from coming out of the rack when you pull it out for servicing To connect the chassis rails to the server 1 Positio...

Page 14: ...ding rail guide facing the inside of the rack Screw the assembly securely to the rack using the brackets provided Attach the other assembly to the other side of the rack making sure that both are at t...

Page 15: ...rails into the rack rails keeping the pressure even on both sides you may have to depress the locking tabs when inserting Refer to the illustration below 3 When the server has been pushed completely...

Page 16: ...a Two Post Rack If you are installing the server into a two post Telco rack follow the directions given on the previous pages for rack installation The only difference in the installation procedure w...

Page 17: ...Application Gateway Hardware Installation Guide Chapter 1 Installing the Application Gateway Rack Mounting the Application Gateway 11...

Page 18: ...l as follows If the Application Gateway can access the connected device router application server etc from the same subnet as it receives client requests use one network cable Connect Application Gate...

Page 19: ...iguring the Application Gateway for the First Time page 13 Configuring the Application Gateway for the First Time The first time that you power on the Application Gateway you are prompted for basic co...

Page 20: ...t the Application Gateway can ping connected network devices Type 1 Ping press Enter and enter the IP address that you want to ping If the ping is successful you have completed the initial configurati...

Page 21: ...r supply 260W AC Voltage 100 240V 60 5 Hz 5 3 Amp Maximum BTU hr 887 15 System cooling fan 1 x 90mm blower fan Drive bay 1 x 3 5 internal drive bay 40 gigabytes Drives 1 x Slim 32x CD ROM drive 1 x 3...

Page 22: ...ENTER SETUP One or more of the following messages may be displayed if the BIOS detects an error during the POST This list includes messages for both the ISA and the EISA BIOS APPENDIX A CMOS BATTERY...

Page 23: ...ITIALIZING HARD DRIVE The hard drive cannot be initialized Be sure the adapter is installed correctly and all cables are correctly and firmly attached Also be sure the correct hard drive type is selec...

Page 24: ...e problem cannot be isolated OFFENDINGSEGMENT This message is used in conjunction with the I O CHANNEL CHECK and RAM PARITY ERROR messages when the segment that has caused the problem has been isolate...

Page 25: ...he key BIOS detect the keyboard is locked P17 of the keyboard controller is pulled low Keyboard error or no keyboard present Cannot initialize the keyboard Make sure that the keyboard is attached corr...

Page 26: ...Part Number 300 60 00...

Reviews: