Tasks to be Performed after Session Monitor Installation from the .Zip File

Perform the tasks given here after the .Zip installation.

  1. Verify the installation by doing the following:
    1. Navigate to /var/log/ocsm file
    2. Verify if the following log file exists: ocsm_installed_*.log
  2. Adjust the firewall to access the Session Monitor applications by doing the following tasks:
    1. Run this command to allow the firewall to access the HTTPS service (port 443) by running the following command:
      firewall-cmd --permanent --zone=public --add-service=https
    1. (Optional) If you are planning to configure the system as a Mediation Engine, allow the firewall to access the probe connection by doing these tasks:
      For SBC (embedded) probes:

      firewall-cmd --permanent --zone=public --add-port=4739/tcp
      firewall-cmd --permanent --zone=public --add-port=4740/tcp



      For standalone probes:

      


firewall-cmd --permanent --zone=public --add-port=4741/tcp
      firewall-cmd --permanent --zone=public --add-port=4742/tcp

      Note:

      The ports 4740/4742 are the preferred ports for connecting to SBC and standalone probes respectively. So, the firewall must be opened for ports 4739/4741 only if you agree to have non-TLS connections.

  3. Run this command to reload the configuration:
    firewall-cmd --reload

    Note:

    If you are planning to enable additional services, see the discussion about network security in the Oracle Communications Session Monitor Security Guide for a complete list of services and their respective ports.

  4. Enable or Disable SELinux as per your requirement. For more information, see Enabling SELinux.