
•
Installs the HA Server.
•
Performs post installation tasks.
Several messages display to confirm the installation progress.
The installer generates a log file with the output of the installation commands for
troubleshooting purposes. The naming convention used for the installation log file is:
netmgtInstallLog.<current date><current time>
For example if you ran the installer on December 1, 2003 at 6:00 PM, the installation log
file would be named:
netmgtInstallLog.20031201180000
After the installation script finishes, it indicates the name of the installation log file and
the directory location where it is saved.
NOTE:
If the installation script fails to install NSM, the installation log file
will be in
/tmp
.
The installer runs for several minutes, and then returns you to the command prompt.
NOTE:
If you are installing NSM for the first time on a Solaris server, you must
reboot the server after installation.
Typical Output for a Standalone Installation
An example of the output for a typical standalone installation is as follows:
[root@/h ~]# sh nsm2010.4_servers_linux_x86.sh
########## PERFORMING PRE-INSTALLATION TASKS ##########
Creating staging directory...ok
Running preinstallcheck...
Checking if platform is valid...............................ok
Checking for correct intended platform......................ok
Checking for CPU architecture...............................ok
Checking if all needed binaries are present.................ok
Checking for platform-specific binaries.....................ok
Checking for platform-specific packages.....................ok
Checking in System File for PostgreSQL and XDB parameters...ok
Checking for PostgreSQL.....................................ok
Checking if user is root....................................ok
Checking if user nsm exists.................................ok
Checking if iptables is running.............................ok
Checking if system meets RAM requirement....................ok
Checking for sufficient disk space..........................ok
Noting OS name..............................................ok
Stopping any running servers
########## EXTRACTING PAYLOADS ##########
Extracting and decompressing payload........................ok
Extracting license manager package..........................ok
35
Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Installing NSM in a Standalone Configuration
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 14: ...Copyright 2010 Juniper Networks Inc xiv Network and Security Manager Installation Guide...
Page 22: ...Copyright 2010 Juniper Networks Inc xxii Network and Security Manager Installation Guide...
Page 24: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Installation Guide...
Page 42: ...Copyright 2010 Juniper Networks Inc 20 Network and Security Manager Installation Guide...
Page 70: ...Copyright 2010 Juniper Networks Inc 48 Network and Security Manager Installation Guide...
Page 92: ...Copyright 2010 Juniper Networks Inc 70 Network and Security Manager Installation Guide...
Page 152: ...Copyright 2010 Juniper Networks Inc 130 Network and Security Manager Installation Guide...
Page 214: ...Copyright 2010 Juniper Networks Inc 192 Network and Security Manager Installation Guide...
Page 239: ...PART 3 Index Index on page 219 217 Copyright 2010 Juniper Networks Inc...
Page 240: ...Copyright 2010 Juniper Networks Inc 218 Network and Security Manager Installation Guide...
Page 244: ...Copyright 2010 Juniper Networks Inc 222 Network and Security Manager Installation Guide...