ActiveEfficiency 1.3 - Prerequisites
The following prerequisites must be met prior to installing ActiveEfficiency.
DNS Alias for AB.test.local.com which points to the CAS server (note: this is only the recommendation and not a requirement)
Installation account
The ActiveEfficiency installation account must have the following permissions:
· db_creator in the SQL Server instance where the ActiveEfficiency database will be created
· Local administrator on the IIS Web Server where ActiveEfficiency will be installed
Installer prerequisites
The ActiveEfficiency installer will automatically check for the presence of the following on the IIS Web Server before installation can proceed:
· .NET Framework 4.5 Full Profile
· IIS 7 and above
· ASP .NET 4.0 or above
· MSMQ
The following checks are made by the installer on Windows Server 2008 R2 and above:
· The WebDAV publishing feature must not be installed - installing WebDAV will prevent ActiveEfficiency from working correctly so the installer checks that it is not present
· Static content Compression must be enabled
A registered 1E ActiveEfficiency Cloud account is a prerequisite for enabling a 1E ActiveEfficiency Cloud Connection . You can register before or during installation of ActiveEfficiency, see Create a 1E ActiveEfficiency Cloud Account for more details.
An SQL Server is required for the ActiveEfficiency database. The prerequisites for the database and SQL Server are explained below.
Operating system support
ActiveEfficiency will install on the following operating systems:
· Windows Server 2012 RTM
· Windows Server 2008 R2
· Windows Server 2008
Database prerequisites
The following prerequisites apply to the ActiveEfficiency database:
· Windows SQL 2005 or above
· SQL collation should be: latin, case-insensitive, accent-sensitive
MSMQ
ActiveEfficiency uses MSMQ to enable communications between itself and the 1E Products. The following ports are required for MSMQ Server communications on Windows Server 2008 and above:
Connection Type | Port | Purpose |
TCP | 1801 | Message Queuing (including HTTP messaging) message traffic and internal session management traffic between Queue Managers. |
RPC_TCP | 135 | Dynamic RPC port typically assigned by RPC for handshaking with an independent client or with an RPC server for the Message Queuing server to determine the fixed ports. |
Nomad 5.0 - Prerequisites
This section describes prerequisites needed to ensure a successful deployment of Nomad.
Requirements | Notes | |||
General | The following requirements should be met before installing Nomad on your network. · · When upgrading we recommend that you update all versions of Nomad running on a single subnet at the same time. It is also highly recommended that all the Site Servers and Distribution Points are updated first with Nomad 5.0 before updating versions of Nomad running on the clients to avoid known compatibility issues between Nomad 5.0 clients and Distribution Points running earlier versions of Nomad. · Ensure DNS is working properly · Ensure client side firewalls allow exceptions to be made for NomadBranch.exe, NomadPackageLocator.exe andPackageStatusRequest.exe. See Windows Security Settings for more details. · Ensure the ConfigMgr Client is healthy and functioning properly | |||
OS | Nomad and Nomad Multicast should install and be configurable on any workstation running the following Microsoft operating systems: · · Windows 8 Enterprise (32-bit and 64-bit) · Windows 7 (Embedded, Professional, Enterprise, Enterprise x64 and Ultimate) · Windows Vista (Business, Enterprise, Enterprise x64 and Ultimate) · Windows XP 32-bit with SP3 applied Nomad and Nomad Multicast should install and be configurable on any server running the following Microsoft operating systems: · · Windows Server 2012 · Windows Server 2008 R2 RTM, SP1 · Windows Server 2008 x64 SP1, SP2 · Windows Server 2008 SP1, SP2 · Windows Server 2003 SP2 | |||
Systems Management | The following versions of ConfigMgr are supported: · · Configuration Manager 2012 RTM, SP1 · Configuration Manager 2007 SP2, R2, R3 | |||
Nomad installers | Nomad has two sets of installers one for 32-bit systems and the other for 64-bit systems. The set that should be used depends on the ConfigMgr client installed on the local machine. · · ConfigMgr 2007 clients are always 32-bit so only the 32-bit Nomad installers should be regardless of whether the target computer is 32-bit or 64-bit. · ConfigMgr 2012 clients may be either 32-bit or 64-bit client so the Nomad installers used must match the local client. The Nomad 32-bit installers are in the NomadBranch.v5.0.x.x.zip file: · · NomadBranch.msi (in both the ConfigMgr2007 and ConfigMgr2012 directories) · NomadBranchAdminUIExt.msi (in ConfigMgr2007) · NomadBranchGui.msi (in DownloadMonitor) The Nomad installers for 64-bit systems are in the ConfigMgr2012 directory in the NomadBranch.v5.0.x.x.zip file: · · NomadBranchAdminUIExt2012.msi (32-bit installer for ConfigMgr 2012 console) · NomadBranchTools.msi · NomadBranch-x64.msi | |||
Distribution Point | To support enhanced Package consistency checking, Nomad requires that the Nomad agent is installed on each ConfigMgr Distribution Point (DP). This agent enables file-level consistency checking by creating a manifest file on the DP for every version of each Package created. This allows Nomad to check that each file it downloads is consistent with the version available on the DP.
If the DP is not installed on a site server you must ensure that the Nomad registry setting PermittedLsZShares on the DP is updated to contain the local share name(s) used on the server (e.g. SMSPKGF$; SMSPKGG$; etc) to host ConfigMgr packages To support RDC you will also need to set the SigsFolder registry entry to point to the ConfigMgr RDC signatures folder. If the DP is installed on a site server this step is not required as Nomad retrieves the DP share name information directly from WMI For more details please refer to the description of the PERMITTEDLSZSHARES and SIGSFOLDER installer command-line properties. | |||
System Center Configuration Manager | For each ConfigMgr Site Server where you intend to administer Task Sequence Packages to use Nomad as the alternate download Provider, you need to ensure the following conditions hold: · · The Configuration Manager Admin Console must be installed – as is the case in a default Configuration Manager installation. This is a prerequisite for the following: · The Nomad Admin Console GUI extensions must be installed · When using ConfigMgr 2012 the Nomad Branch Tools must also be installed. If these conditions do not hold the Nomad settings for Task Sequences will not be created correctly.
| |||
Nomad Download Monitor | The following components must be present prior to installing the Nomad Download Monitor: · · .NET Framework 2 or above · To use the Nomad Download Monitor to monitor remote machines the user account will require DCOM permissions. | |||
Nomad NomadBranchTools | To install the NomadBranchTools for ConfigMgr 2012 the following needs to be present: · · A local installation of the System Center Configuration Manager 2012 Site Server. | |||
Nomad Admin Console GUI extensions | To install the Admin Console GUI extensions the following needs to be present: · · A local installation of the System Center Configuration Manager Admin Console. · .NET Framework 2.0 or .NET Framework 3.5 If you want to install the Admin Console GUI Extensions on a remote ConfigMgr console then you will need to ensure that the Admin Console GUI Extensions have been installed on the site server first. | |||
Nomad Multicast | To use the Multicast functionality for Nomad you will need a specific multicast license key available from 1E. For more information on purchasing license keys contact Sales, details on contacting 1E are provided in Technical Support for Nomad. | |||
Windows security settings | File and Print Sharing The recommended way to facilitate Nomad peer-to-peer communications is to enable Windows File and Print Sharing. If this is not feasible on your network environment you can configure Nomad to use different means to access network shares, see Peer-to-peer enhancements for more details on configuring this option. Nomad port access Nomad uses UDP port 1779, by default, to communicate during the election process for determining the master on a subnet. The Nomad installer will automatically add NomadBranch.exe, NomadPackageLocator.exe and PackageStatusRequest.exe to the list of excepted programs. Manually configuring Nomad port access If you do need to open the Nomad port by hand, the following command-lines will open the firewall for NomadBranch.exe UDP and TCP requests on Windows 7, provided you run the command with sufficient privileges (you will need to run the equivalent for the NomadPackageLocator.exe andPackageStatusRequest.exe executables too):
The equivalent on Windows XP is:
This command-line should be run on every machine where Nomad is installed, a convenient way to do this would be to create a ConfigMgr Package and Program with the above command line and advertise to all your Nomad machines. Using other firewalls If you are using other types of firewall on your systems you will need to open the Nomad port in these. You should refer to the specific firewall documentation for details on how to do this. |
PXE Everywhere 2.1 - Prerequisites
The following operating system and software environment prerequisites should be met in order for PXE Everywhere to be successfully installed and run. |
|
In the requirements that follow, where an image is used as the alternative to a CD, it will be necessary to mount the image.
Requirements | Notes | ||
OS | PXE Everywhere local host is supported on the following Microsoft operating systems: · · Windows 8 Enterprise (32-bit and 64-bit) · Windows 7 (Professional, Enterprise, Enterprise x64 and Ultimate) · Windows Vista (Business, Enterprise, Enterprise x64 and Ultimate) · Windows XP 32-bit with SP3 applied · Windows Server 2012 · Windows Server 2008 R2 RTM, SP1 · Windows Server 2008 x64 SP1, SP2 · Windows Server 2008 SP1, SP2 · Windows Server 2003 SP2 PXE Everywhere central server is supported on the following Microsoft operating systems: · · Windows Server 2012 · Windows Server 2008 R2 RTM, SP1 · Windows Server 2008 x64 SP1, SP2 · Windows Server 2008 SP1, SP2 · Windows Server 2003 SP2 | ||
General requirements | · · A working DHCP implementation to enable TFTP boot image retrieval | ||
Systems Management | · · Configuration Manager 2012 RTM, SP1 · Configuration Manager 2007 SP2, R2, R3 | ||
PXE Everywhere central server | To install PXE Everywhere central server the following needs to be present: · · IIS 6.0 or above with ASP.NET enabled · .NET Framework 2.0
| ||
PXE Everywhere local host | · · Requires at least 2MB free disk space for the application, plus whatever size your boot images require (typically 130MB each). | ||
Target machine | · · Minimum specification as required by the target operating system · Connection to a LAN 100mbps or greater | ||
PXE Everywhere Port Requirements | The following ports must be opened to enable PXE Everywhere to communicate when firewalls are in place: · · TCP/IP default port 2012 (configurable) The following port must be opened on the PXE Everywhere central server: · · HTTP over port 80 The following ports will need to be open for HTTP and DHCP communications to work (as would generally be the case): · · DHCP / BOOTP listens on ports 67 and 4011 · DHCP / BOOTP Client port 68 · TFTP incoming over port 69 |
No comments:
Post a Comment