1. Preinstall checklist
  2. F5 BIG-IP
  3. Network Interfaces
  4. IP
  5. TCP
  6. UDP
  7. Ports
  8. URL
  9. http
  10. sftp
  11. ftp

Preinstall checklist

Some common commands to verify network functionality before installing applications. This example is for an AIX OS.

  1. Verify networking
    1. Check network interfaces

    2. Verify the system has a resolvable fully qualified host name
      # nslookup

      Ping the system

      ping hostname

      If either command fails, correct the /etc/hosts file.


    3. Hosts file

      • Entry for each appserver in the cluster (live appservers should have other live appservers; staging appservers should have other staging appservers) should be added
      • Entry for NDM (live or staging)
      • Entry for database server
      • Entry for each webserver, (DMZ for live and shared for staging)

      Verify the system is DNS enabled so that there is a host name and domain present. Pure IP address environments are not supported by WebSphere Commerce.

      nslookup IP_address


      uname -n

      The result should be a reply with the correct fully qualified host name of the system.

      You must have both a name server and a search domain defined in...


    4. Verify DVD-ROM drive.

    5. Verify Graphics capable monitor.

    6. Verify LAN adapter that supports the TCP/IP protocol.

  2. Ports
  3. Verify there are no port conflicts in the planned configuration.

    To see in-use port numbers...

    netstat -an

    Look for: 80, 443, 5432, 5433, 8000, 8001, 8002, 8004, 8006, or 8007

  4. Verify host name
  5. Verify the host name of the Web server machine does not contain an underscore ( _ ).

  6. Verify nmon is configured
  7. Verify nmon is configured

  8. Verify unzip
  9. Verify unzip 5.42 installed to /opt/freeware with appropriate symlinks in /usr/bin

    # unzip -v 
    UnZip 5.51 of 22 May 2004, by Info-ZIP.  
    Latest sources and executables are at ;
    see for other sites.
    Compiled with cc for Unix (IBM AIX) on Sep 27 2004.
    UnZip special compilation options:
            COPYRIGHT_CLEAN (PKZIP 0.9x unreducing method not supported)
            LZW_CLEAN (PKZIP/Zip 1.x unshrinking method not supported)
            USE_DEFLATE64 (PKZIP 4.x Deflate64(tm) supported)
            [decryption, version 2.9 of 05 May 2000]
    UnZip and ZipInfo environment options:
               UNZIP:  [none]
            UNZIPOPT:  [none]
             ZIPINFO:  [none]
          ZIPINFOOPT:  [none]

  10. GNU wget

    Verify GNU Wget 1.8.2 is installed

    Installed to /usr/local/bin

    To check...

    $ wget -V

  11. lsof
  12. Verify lsof 4.61 is installed to /usr/sbin with appropriate symlink in /usr/local/sbin

    To check:

    $ lsof -v

  13. Set ulimits
  14. ulimit -a
    time(seconds)        unlimited
    file(blocks)         2097151
    data(kbytes)         unlimited<
    stack(kbytes)        32768
    memory(kbytes)       32768
    coredump(blocks)     2097151
    nofiles(descriptors) 10000
    threads(per process) unlimited
    processes(per user)  unlimited

  15. Full core dumps
  16. On Live app servers only, sys0 needs to be changed to allow full core dumps:

    chdev -a fullcore=true -lsys0

    How to check:

    lsattr -El sys0 | grep full
    fullcore true Enable full CORE dump True

  17. Operating System
  18. On AIX, as user root, run slibclean

    On all nodes (appserver, DB, and web server), verify appropriate fixes have been applied...

    myhost1:/tmp # oslevel -s

  19. fileset xlC.rte
  20. Install latest fileset:

    To verify...

    lslpp -l xlC.rte


    myhost3:/tmp # lslpp -l xlC.rte
      Fileset                      Level  State      Description
    Path: /usr/lib/objrepos
      xlC.rte           COMMITTED  XL C/C++ Runtime

  21. Verify LPAR configuration
  22. Verify machine from the IBM POWER processor family.

    prtconf | egrep "Processor Type|Processor Clock|Number Of Processors|Good Memory"
    Processor Type: PowerPC_POWER7
    Number Of Processors: 4
    Processor Clock Speed: 3000 MHz
    Good Memory Size: 6144 MB

  23. Verify time and RAM
  24. Verify time stamps for database server and appserver nodes are the same (ntp).

    Verify minimum of 2 GB of free RAM for the first appserver instance. Each additional instance requires an additional free 1.5 GB of RAM.

    Verify minimum of 1 GB of paging space per processor.

    Set virtual memory optimizations (vmo)

  25. Build files
  26. The following JARs are required for any environment that is connected with MQ for Order processing.

    Unlimited strength encryption jars...

    ...should be copied to...


    Copies of the files can be found in lower life cycle environments.

  27. Verify Asynchronous I/O
  28.  lslpp -l bos.iocp.rte
      Fileset                      Level  State      Description
    Path: /usr/lib/objrepos
      bos.iocp.rte       COMMITTED  I/O Completion Ports API
    Path: /etc/objrepos
      bos.iocp.rte       COMMITTED  I/O Completion Ports API

  29. Required JARs
  30. The following JAR files are required for any application server environment that is connected with MQ for Order processing.


  31. Celerra NFS Filesystems
  32. Is this web server only?

    NFS share is always called "wsvr_dctm" and for non-production servers it is hosted on cpemis15.

    For production servers, it can be cpemis96/97/98/99 (for high availability).

    The filesystem should be mounted on...


    To verify...

    df | grep dctm_nas
    cpemis97:/wsvr_dctm   82606048  74953424   10%   136110     3% /opt/hd/wsvr/dctm_nas

    The NFS mount should be configured to automount. This can be verified in /etc/filesystems:

            dev             = "/wsvr_dctm"
            vfs             = nfs
            nodename        = cpemis97
            mount           = true
            options         = bg,soft,intr,sec=sys
            account         = false

  33. Paging space
  34. 1GB page space per processor (4GB total for production)

    How to check:

    myhost3:/tmp # lsps -a
    Page Space      Physical Volume   Volume Group Size %Used Active  Auto  Type Chksum
    paging02        hdisk18           vg01          1024MB     1   yes   yes    lv     0
    paging01        hdisk18           vg01          1024MB     1   yes   yes    lv     0
    paging00        hdisk18           vg01          1024MB     1   yes   yes    lv     0
    hd6             hdisk0            rootvg        1024MB     1   yes   yes    lv     0

  35. Configure backups
  36. For example, Tivoli Storage Manager (TSM) backups should scheduled sometime between midnight and 0400.



The Transmission Control Protocol (TCP) protocol provides a connection-based channel of data between two computers. TCP guarantees that data sent from one end of the connection actually gets to the other end and in the same order it was sent. Otherwise, an error is reported.

The order of the data packets is important for reconstructing at the receving computer, and is tracked carefully.



The User Datagram Protocol (UDP) is not connection-based like TCP. Rather, UDP sends independent packets of data, called datagrams, from one application to another, with no guarantee that the data actually is received.

The order of the data packets is not important. Each message is independent of any other.

Clock servers are typical examples of apps that will use UDP. If the client misses a packet, it doesn't really make sense to resend it because the time will be incorrect when the client receives it on the second try. The reliability of TCP is unnecessary in this instance because it causes performance degradation and may hinder the usefulness of the service.

Another example of a service that doesn't need the guarantee of a reliable channel is the ping command. Ping needs to know about dropped or out-of-order packets to determine how good or bad the connection is. A reliable channel would invalidate this service altogether.

Note that many firewalls and routers have been configured not to allow UDP packets.



ports are used by computers to route traffic to different applications. A web server will run on port 80, Oracle will run on port 1521, WebLogic Server will run on port 7000, etc...

Data transmitted over the Internet is accompanied by addressing information that identifies the computer and the port for which it is destined. The computer is identified by its 32-bit IP address, which IP uses to deliver data to the right computer on the network. Ports are identified by a 16-bit number, which TCP and UDP use to deliver the data to the right application.

Port numbers range from 0 to 65,535. Ports numbered 0 - 1023 are known as well-known ports and are reserved for use by common applications such as HTTP and FTP.



Uniform Resource Locators (URLs) are used to located internet resources. URLs can refer to Internet addresses or to URL objects

URLs can be absolute, such as, or relative, such as ../directory/filename.html.

A URL has two main components:

  1. Protocol identifier

    Name of the protocol to be used to fetch the resource. For examaple, the following uses the HTTP protocol.

  2. Resource name

    Complete address to the resource. The format depends on the protocol used, but in general includes one or more of the following components:

    Hostname Name of the machine on which the resource lives.
    Port The port number to which to connect. Typically optional.
    Filename The pathname to the file on the machine.
    Reference Reference to a named anchor within a resource that usually identifies a specific location within a file. Typically optional.

    For example:

See also