Description:
This document is meant to validate basic configuration of the Cloud Service Appliance. It takes into account most all potential configuration issues. Please read step-by-step as that is how this document was created.
Here is a video of the process that includes core and agent side information: LANDESK - CSA - Installation and Configuration - YouTube
Note: With the Virtual CSA you may see eth0 and eth1, or eth2 and eth3, etc… this is normal. The lowest numbered NIC is typically the external NIC.
Steps:
- Click System > Configure date and time
- Click Save
- Click on System > Network Settings
- Remove any references to the 192.168.0.1 and 192.168.0.2
- Set IP, subnet, and gateway for your network on eth0
- Click add
- If you are setting up dual NIC repeat steps 5 and 6 for eth1, else move on to 7
- Enter DNS server if applicable
- Click add
- Set the hostname and DNS suffix for your device
- Click save
- Click on the hostnames tab
- Remove any references to the 192.168.0.1 and 192.168.0.2
- We will want to add the core server(s) here
- Take note of the format as it is different for different items
- Core IP, Core FQDN, Core Hostname (no caps) click add
- Ping license.landesk.com, patch.landesk.com and patchec.landesk.com to validate the IP addresses as they are always subject to change
- Enter 204.246.148.180, license.landesk.com, license.landesk.com click add
- Enter 64.40.112.186, patch.landesk.com, patch.landesk.com click add
- Enter 67.59.141.4, patchec.landesk.com, patchec.landesk.com click add
- Enter 84.51.239.169, patchemea.landesk.com, patchemea.landesk.com click add
- Click save
- Click on the security section
- Remove any subnets you use from the blocked list
- Take note of the subnets and if they overlap your ranges
- Add the core IP to trusted list, even if you plan to disable the firewall it will ensure if for some reason it is turned back on your core will still connect
- Add the 204.246.148.180, 64.40.112.186, 84.51.239.169, and 67.59.141.4 IP's in the trusted. These are the LANDESK patch and license servers
- Click save at the bottom
- Click on the users section. Make sure you know the service account password; we will need this to configure the core. It will only be used on the core server(s) in one location(Configure > Manage Gateway/Manage Cloud Service Appliances), so if you don't know it go ahead and reset it so you can have the correct password
- Click on the Gateway Service Section. In the additional Hostnames section you will want anything the gateway can resolve to or from, FQDN, internal and external IP. DO NOT ADD SHORTNAMES
- Click Save
- Install Patches (See link for order of operation in regards to 4.2 CSA)
- The next steps apply only to 4.3 CSA and only after the first time its patched
- Click Manage LDMG Certificates
- For self-signed certificates only, click Remove
- Click OK to verify you want to remove the certificate
- Repeat process to remove the second certificate
- Click System
- Click Appliance
- Click Reboot
- Click OK to verify the reboot
- If this is a VM take a snapshot at this point as it will be your base configuration
- Access CSA via web browser http://CSAIP
- Click Cloud Service Appliance Console link
- Login with the admin user
- Click System > Backup and restore
- Click Backup Now
- Export backup
- Your CSA is now ready to have the core server connection configured