Preparing for Installation

Ensure that the host on which you are installing this Unwired Server as an application server node is ready for you to begin the installation.

  1. Confirm that the installation target host meets minimum system requirements for all Unwired Platform components you are installing, as specified in Supported Hardware and Software.
  2. Verify that you have Administrator privileges on the installation target host.
  3. If you want to use the target computer name as the default server name (and cluster name in a single-server installation and for the first Unwired Server node in a cluster), make sure the computer name meets the same requirements that a user-entered server or cluster name have to meet.
    See the Computer Name Used as Server or Cluster Name Has Same Requirements as User-Entered Name topic in the Troubleshooting Installation section of this Installation Guide.
  4. If the JAVA_TOOL_OPTIONS environment variable is set, remove it before you start the installation.
    Check for the JAVA_TOOL_OPTIONS environment variable in both User Variables and System Variables panes of the Environment Variables dialog.
    1. Right-click My Computer and select Properties.
    2. Select the Advanced tab, then click Environment Variables.
    3. Select JAVA_TOOL_OPTIONS and click Delete.
    4. Click OK to exit all dialogs.
  5. Shut down all Sybase and SAP software, Sybase and SAP processes, and associated third-party processes running on the installation target host.

    Use the Services panel from Windows Control Panel to verify that services are stopped. The Sybase Unwired Platform services are: “Sybase Control Center” and all services with names that begin with “Sybase Unwired…”

  6. If User Access Control (UAC) is present in the version of Windows where you are installing, disable it. Restart the system for this change to take effect.
  7. To accommodate Unwired Platform internal communications, you may need to reconfigure intrusion detection/prevention systems (either hardware- or software-based).
    See Intrusion Detection and Protection Requirements in Landscape Design and Integration.