Cisco Emergency Responder (Emergency Responder) is distributed on an installation DVD that contains everything that is required to install Emergency Responder, including the Cisco Unified Communications Operating System software.
See the latest version of the Release Notes for Cisco Emergency Responder for information on upgrades.
Cisco Emergency Responder requires specific hardware and software to run properly. Review the following sections before you proceed with an installation or upgrade:
See the latest version of the Release Notes for Cisco Emergency Responder to verify that you have all the hardware and software, and in the supported versions, that you must install for Emergency Responder and to check that your Cisco MCS Unified Communications Manager Appliance platform provides the Emergency Responder capabilities to meet your configuration needs. (You can also use equivalent Cisco-certified servers.)
See License Requirements to make sure that you have all the required license keys available before you begin the installation process.
The Emergency Responder installation process installs both the platform software and the Emergency Responder software. During the installation, you are prompted to enter information needed by the system to complete the installation.
Cisco recommends that you perform the installation or upgrade during off-peak hours. The installation/upgrade procedure completely reformats the hard disk, so Emergency Responder is unavailable for the duration of the installation or upgrade.
Review the following information before you install Cisco Emergency Responder or upgrade your system to the latest version:
Upgrading Emergency Responder:
Before you upgrade to the latest version of Emergency Responder, you must ensure that it is compatible with your existing version of Unified CM. You can use the Cisco Unified Communications Compatibility Tool to research this issue: http://tools.cisco.com/ITDIT/vtgsca/VTGServlet
You must upgrade Emergency Responder before you upgrade Unified CM. Only after you have installed the new version of Emergency Responder can you then upgrade Unified CM.
After you have upgraded both Emergency Responder and Unified CM, you must then update the Unified CM Version on Emergency Responder.
See Table 1 for the correct upgrade order and additional information about this subject.
Emergency Responder Versions:
Different versions of Emergency Responder cannot be deployed in the same Emergency Responder group. The primary and the standby Emergency Responder servers must be running the same version of Emergency Responder. If you are upgrading to the most recent version of Emergency Responder, make sure to upgrade both Emergency Responder servers also.
Emergency Responder supports interoperability between two server groups in a cluster running different versions of Emergency Responder. For example, one server group in a cluster may be running the most recent version of Emergency Responder while another server group in the cluster is running Emergency Responder 1.3, Emergency Responder 2.x, Emergency Responder 7.x and Emergency Responder 8.0. However, Emergency Responder will not interoperate with versions earlier than Emergency Responder 1.3.
Determine and list your Emergency Responder hostname and passwords.
Decide on a permanent hostname, user interface administrator name and password for the Emergency Responder server before you install Emergency Responder. Changing the hostname of a Emergency Responder server after installation may cause problems.
The hostname for the Emergency Responder Publisher and Subscriber must not contain the underscore character (_). If you have an existing Emergency Responder server with an underscore in its hostname, change the hostname of the server before installing Emergency Responder.
The hostname for the Emergency Responder Publisher and Subscriber must not begin with a numeric value.
Decide on a password for the Cisco Emergency Responder administrative user.
The Emergency Responder administrative users password must be at least six characters long and can contain alphanumeric characters, hyphens, and underscores. It must start with an alphanumeric character.
Ethernet NIC speed and duplex mode:
Decide if you want to enable auto-negotiation of Ethernet NIC speed and duplex
If yes, you do not need any additional information
If no, determine what Ethernet NIC speed and duplex mode you will use
Decide if you want to use the Dynamic Host Configuration Protocol (DHCP) to allocate IP addresses
If yes, you do not need any additional information
If no, you need the hostname, IP address, IP mask, and gateway address to enter for the Static Network Configuration
NTP Client information
The system prompts you to set up external Network Time Protocol (NTP) servers. Cisco recommends that you use external NTP servers to ensure that the system time is accurate.
If you decide to use external NTP servers, you must enter the IP address or hostname of the servers.
If you do not choose to use external NTP servers, you must enter the system date and time clock information manually.
Use of NTP server is mandatory when installing Emergency Responder on UCS servers.
Decide on a Database Access Security password
The system requires a database access security password to allow the nodes in a servergroup to communicate. The password is shared with all nodes in the servergroup.
The password must be at least six characters long and can contain alphanumeric characters, hyphens, and underscores. It must start with an alphanumeric character.
SMTP Host Configuration (optional)
Decide if you want to use an SMTP host.
If yes, determine the hostname or IP address of the SMTP host.
Review the latest Release Notes for Emergency Responder before installation: http://www.cisco.com/en/US/products/sw/voicesw/ps842/prod_release_notes_list.html
Install the components for Emergency Responder in the order shown in Table 2
Ensure that you use ESXi, rather than ESX, to run Cisco Emergency Responder on the Cisco UCS Server. However, the server can be part of a VMware vCenter that includes ESX hosts.
Cisco does not support vMotion on a VM that is running. However, Cisco does support powering-down a VM, then rebooting the VM on a different rack server. This may be helpful if you want to put a rack server into maintenance mode.
VMware—Site Recovery Manager
VMware—Data Recovery (VDR)
All other unlisted VMware features
To operate Cisco Emergency Responder on the Cisco UCS Server successfully, you should have the experience and skills to manage a host server running VMware ESXi. If you do not have this experience and want to obtain the required information quickly, consider using VMware GO, a Web-based application that facilitates VMware.
This section describes how to prepare to install a Cisco Emergency Responder on the Cisco UCS server in a standalone configuration, meaning that it is not in a datacenter.
You should allocate the following resources before installation:
Space in a rack to receive a 2 RU UCS server
Ethernet ports on a switch close to the UCS server:
One port for the CIMC
Two ports for the LAN on motherboard (LOM) NICs
An IP address for the CIMC management port
An IP address for the virtual host. This is the UCS server's IP address and is used by ESXi.
A hostname, and optionally configure DNS for the virtual host's hostname
IP addresses for the VMs
Set Up RAID
If you purchased the UCS server separately, configure the RAID settings to the following specifications:
The first 2 drives are configured as a RAID 1 (mirrored) drive. This drive is for ESXi installation.
The next 4 drives are configured as a RAID 5 drive. This drive is for VMs.
Number of drives may be different in different version of UCS servers.
Follow this procedure to perform this task:
During server bootup, press Ctrl+Y to enter the preboot CLI.
Enter the following commands to determine the current RAID configuration:
-ldinfo -l0 -a0
-ldinfo -l1 -a0
The required configuration is two drives in a RAID 1 array for logical drive 0, and four drives in a RAID
5 array for Logical drive 1. If the RAID configuration is wrong, continue with this procedure.
Do not continue with this procedure if RAID is configured correctly.
Enter the command -cfgclr -a0 to clear the RAID configuration.
Clearing the RAID configuration deletes all data on the hard drives.
Enter the following commands to configure RAID:
-cfgldadd -r1 [252:0, 252:1] -a0
-cfgldadd -r5 [252:2, 252:3, 252:4, 252:5] -a0
If the hard drives did not have a RAID configuration previously, you are done configuring RAID. If the
hard drives had a RAID configuration before, continue with this procedure.
Enter the following commands to initialize the logical volumes.
-ldinit -start -full -l0 -a0 (l0 is the letter l and the number 0, not the number 10)
-ldinit -start -full -l1 -a0 (l1 is the letter l and the number 1, not the number 11)
This clears data on the drives and initializes the new array.
Allow these commands to finish running before exiting the Preboot CLI. Enter the following commands
to display the progress of the commands:
-ldinit -showprog -l0 -a0
-ldinit -showprog -l1 -a0
When both commands report that no initialization is running, it is safe to quit the Preboot CLI.
After configuring the two logical volumes, you can exit the Preboot CLI by entering q.
vSphere Client Installation
When the virtual host is available on the network, you can browse to its IP address to bring up a web-based interface. The vSphere Client is Windows-based, so the download and install must be performed from a Windows PC.
After the vSphere Client is installed, you can run it and log into the virtual host using the virtual host's name or IP address, the root login ID, and the password you configured.
You can join the host to a vCenter if you want to manage it through vCenter.
Aligning The Datastore Used for VMs
When you install VMware ESXi, the second logical volume is automatically imported unaligned. VMs have better disk performance when all partitions (physical, ESXi and VM) start on the same boundary.
This prevents disk blocks being fragmented across the different boundaries.
To ensure that the ESXi partition used for VMs are aligned, you should delete the unaligned datastore (the larger disk partition - 407 GB), then recreate the datastore using vSphere client.
Create Virtual Machines
Cisco provides a VM template for you to download and transfer to your Virtual Host. Use this template to create the VM for Cisco Emergency Responder on the Cisco UCS Server installation.
Before you deploy the template and create the VM, you should have a hostname and IP address allocated for the new VM.
Follow these steps to create a VM and prepare to install Cisco Emergency Responder on the Cisco UCS Server:
Cisco Emergency Responder on the Cisco UCS Server uses a different licensing model than Cisco Emergency Responder on an MCS server. The MAC address of the NIC card is no longer used to associate the license to the server.
Instead, the license gets associated to a license MAC, which is a 12 digit HEX value created by hashing the following parameters that you configure on the server:
NTP server 1 (or "none"
NIC speed (or "auto")
IP Address (or "dhcp")
IP Mask (or "dhcp")
Gateway Address (or "dhcp")
Primary DNS (or "dhcp")
SMTP server (or "none")
Certificate Information (Organization, Unit, Location, State, Country)
You can obtain the license MAC by performing one of the following:
After installation, navigate to Show > Network in Cisco Emergency Responder OS Administration web page
After installation, use the CLI command show status.
The process to redeem a Product Activation Key (PAK) for licenses at https://tools.cisco.com/SWIFT/Licensing/PrivateRegistrationServlet is changed for a license MAC. When redeeming a PAK for a license MAC at this URL, you get prompted to select the type of license that you want to obtain:
A physical MAC address — this is used when Cisco Emergency Responder are installed on an MCS server.
A license MAC address — this is used when Cisco Emergency Responder are installed on the Cisco UCS Servers.
After you make this selection, the generation and installation of the license file follows the same process.
MAC Parameter License Changes and Rehosted Licenses
When you change the parameters that create the license MAC, the license that you obtained with it becomes invalid. You must request a rehosting of the license to obtain a valid license. The old license continues to work for a 30-day grace period.
To rehost your licenses, you must open a case with the licensing team. Contact the licensing team at firstname.lastname@example.org.
Virtual Machine Configurations and Licensing
The virtual machine configuration for running Cisco Emergency Responder on the Cisco UCS Server, the Vmware server must match the specifications described in the System Requirements to get support from Cisco.
While Cisco Emergency Responder can be installed and licensed in other virtual machine configurations, Cisco does not support these configurations.
Migrate to Emergency Responder on Cisco UCS Server
Migrating from a Media Convergence Server (MCS server) to a Cisco Emergency Responder on the Cisco UCS Server follows a procedure that is very similar to replacing server hardware.
The following procedure outlines the migration process and references to other pertinent documentation.
Upgrade the MCS server to most recent version of Cisco Emergency Responder.
If the Emergency Responder VM uses a different IP address than the MCS server, change the IP address of the MCS server to the value used by the Emergency Responder VM.
The hostname on the Emergency Responder VM must remain the same as that on the MCS Server.
Applications running in a VM have no ability to monitor the physical hardware. Hardware monitoring must be done from the CIMC, ESXi plugins, vCenter, or by physical inspection (for example for flashing LEDs.).
Hardware Monitoring from CIMC
The CIMC provides the following hardware monitoring:
An overview of CPU, memory and power supply health
An overview of hardware inventory, including CPUs, memory, power supplies and storage
Monitoring of sensors for power supplies, fans, temperature and voltage
A system event log that contains BIOS and sensor entries
Hardware Monitoring from vSphere Client and vCenter
The vSphere Client provides the following monitoring features:
When you are logged in to vCenter, the vSphere Client displays hardware and system alarms defined on the Alarms tab.
VM resource usage displays on the Virtual Machines tab, and on the Performance tab for each VM.
Host performance and resource usage display on the Performance tab for the Host.
When ESXi is used standalone (without vCenter), hardware status and resource usage are available, but alarming is not possible.
The"UCS RAID Controller SMI-S Reference Guide", which describes Storage Management Initiative Specification (SMI-S) support in the Cisco UCS Servers, is available at the following URL:
This procedure describes how to install Emergency Responder as a new installation.
You enter Emergency Responder group configuration through the Emergency Responder Administration web interface based on Publisher (primary) and Subscriber (secondary) server pairs as described in the following sections.
To install Emergency Responder, you install the Publisher (primary) first, then you install the Subscriber (backup) on a separate server. You must install Emergency Responder on separate servers from Cisco Unified Communications Manager or any Cisco Unified Communications applications.
Allow approximately 1 hour to perform a new installation.
To install the Publisher, follow these steps:
Insert the Emergency Responder Installation DVD.
If the system finds the DVD, you are asked if you want to perform a media check before installation to determine if there are problems with the DVD. The system displays the checksum of the DVD and instructs you to verify this checksum on the Emergency Responder website.
At the bottom of the screen you will see instructions for moving between elements and for selecting elements, as follows:
Use the Tab key to advance to the next element
Use the Alt-Tab key combination to return to the previous element
Use the Space bar to select a highlighted element
If you choose to perform the media check, the system performs the media check and displays the results.
If the result of the media check is PASS, click OK. The system install begins the installation. Skip to Step 2.
If the result of the media check is FAIL, obtain a new installation DVD from Cisco Systems.
The Cisco Emergency Responder system installer starts. The Product Deployment Selection screen displays a message saying the Cisco Emergency Responder product suite is installing. Click OK to continue.
The Proceed with Install page displays the current software version on the hard drive and the software version on the installation DVD.
If you are performing a fresh installation, there will be no software on the hard drive and the system asks if you want to proceed with the installation. Click Yes to proceed.
If you are performing an upgrade, the system displays the current software version and asks it you want to overwrite the hard drive. Click Yes to proceed.
If you click Yes, the system continues with the installation and the Platform Configuration Wizard appears.
If you click No, the installation is terminated.
On the Platform Configuration Wizard page, click Proceed to continue with the platform installation. The Import Windows Data page appears. Skip to Step 5.
If you click Skip, the system installs both the platform and Emergency Responder software without prompting you to provide information during the installation. After the installation is completed and the system reboots, you are prompted to enter the required configuration details.
The Import Windows Data page prompts you to import data from a Windows version of Emergency Responder. This page does not apply to fresh installations or to upgrades from earlier Linux-based versions of Emergency Responder. Click No to proceed with the fresh installation. The Basic Install page appears.
Click Continue to proceed. The Timezone Configuration page appears.
Choose the correct time zone to use from the list provided.
Use the following keys to move between elements on the Timezone Configuration page:
Arrow Up or Arrow Down to select a time zone from the list
After selecting the correct time zone, click OK. The Auto Negotiation Configuration page appears.
Click Yes to enable autonegotiation of the Ethernet NIC speed and duplex mode. The DHCP Configuration page appears. If you click Yes, skip to Step 11.
If you click No, the NIC Speed and Duplex Configuration page appears.
On the NIC Speed and Duplex Configuration page, do the following:
Select the NIC Speed. The available options are 10 Megabit, 100 Megabit, or 1000 Megabit.
Select the NIC Duplex setting. The available options are Full or Half.
Click OK. The DHCP Configuration page appears.
On the MTU Configuration page, you can set the maximum transmission unit (MTU) that can be sent in a network as follows:
Click Yes if you want to configure a a MTU value of less than 1500 bytes.
Click No to use the default MTU value of 1500 bytes.
Click Yes if you want to use Dynamic Host Configuration Protocol (DHCP). The Administration Login Configuration page appears. Skip to Step 15.
If you click No, the Static Network Configuration page appears.
If you chose not to use DHCP, enter the following information about the Static Network Configuration page:
Gateway (GW) Address
Click OK. The DNS Client Configuration page appears.
On the DNS Client Configuration page, you are asked if you want to configure the Domain Name System (DNS) client.
Click the Help button for details about configuring DNS.
If you select Yes, a second DNS Client Configuration page appears.
If you select No, the Administration Login Configuration page appears. Skip to Step 15.
On the second DNS Client Configuration page, you are prompted to enter the following information:
Secondary DNS (optional)
Click OK. The Administration Login Configuration page appears.
On the Administration Login Configuration page, enter an ID and password for the Administrator account. This password is used to access the CLI and the Cisco Unified OS Administration and Disaster Recovery System (DRS) websites. Click Help to display guidelines for creating this password.
When you have finished, click OK. The Certificate Information page appears.
Enter the following information about the Certificate Information page:
Country (select from the scroll-down menu).
Click OK. The Publisher Configuration page appears.
Based on the type of installation you are performing, do one of the following:
If the server you are configuring is the Publisher in the server group, click Yes. The Network Time Protocol Client Configuration page appears. Proceed to Step 18.
If the server you are installing is not the Publisher in the server group, you must first configure this server on the Publisher before you can proceed. Also, this server must have network access to the Publisher, which must be in service for the installation to complete successfully. Click No only if you are configuring the Subscriber. See Install Emergency Responder Subscriber for information about installing the Subscriber.
On the Network Time Protocol Client Configuration page, you are asked if you want to set up external Network Time Protocol (NTP) servers.
Cisco strongly recommends that you use external NTP servers to ensure that the system time is kept accurate.
For Emergency Responder install on UCS servers, it is mandatory to configure NTP server.
If you click Yes, the system displays a second Network Time Protocol Client Configuration page. In the fields provided, enter the IP address or hostname of the external NTP servers, then click OK. The Database Access Security Configuration page displays. Skip to Step 19.
If you click No, the Hardware Clock Configuration page appears. Enter the following information:
When you finish entering this information, click OK. The Database Access Security Configuration page appears.
On the Database Access Security Configuration page, enter the security password and then confirm the password in the fields provided.
The security password must be at least six characters long and can contain alphanumeric characters, hyphens, and underscores. It must start with an alphanumeric character. The security password is used for secure communications between Emergency Responder server groups when performing installation/upgrade, DRS backup or restore, and "Point to a new Publisher" operations.
Click Help to display guidelines. When you finish, click OK. The SMTP Host Configuration page appears.
You are asked if you want to configure a Simple Mail Transport Protocol (SMTP) host. This step is optional.
If you click Yes, a second SMTP Host Configuration page appears. Click Help for guidelines, then enter the SMTP hostname or IP address in the field provided. When you are finished, click OK. The Platform Configuration Confirmation page appears.
If you click No, the Platform Configuration Confirmation page appears.
On the Platform Configuration Confirmation page, do one of the following:
Select OK to save the platform configuration information and continue with the installation. The Cisco Emergency Responder Configuration page appears.
After you select OK, you cannot modify the platform configuration information.
Select Back if you want to return to the previous page to make modifications. Continue to select Back to scroll through each platform configuration page.
Select Cancel to cancel the installation.
On the Cisco Emergency Responder Configuration page, do the following:
Enter the emergency number (for example, 911).
Select the Cisco Unified Communications Manager version. Use the Up or Down arrows to select the version number and then select OK.
On the Security End User Language Selection page, choose a language for the Cisco Emergency Responder web pages. The system defaults to the English language.
The Application User Password Configuration page appears.
On the Application User Configuration page, enter the username and password. This username and password is associated with the default administrative account and is used to log in to the Emergency Responder Administration web page. Click Help for guidelines.
When you are finished, click OK. The Cisco Emergency Responder Configuration Confirmation page appears.
On the Cisco Emergency Responder Configuration Confirmation page, do one of the following:
Select OK to save the Cisco Emergency Responder configuration information and continue with the installation. The system continues the installation process and then reboots.
After you select OK, you can not modify the Cisco Emergency Responder configuration information.
Select Back if you want to return to the previous page to make modifications. Continue to select Back to scroll through each Emergency Responder Application User Configuration page.
Select Cancel to cancel the installation.
After the system reboots, it checks the status of various system components. If the system finds any problems, you are prompted to correct the problem.
If the system does not find any problems, the installation process continues. The system ejects the installation DVD, reboot, and then finish the installation. When the installation is complete, a CLI prompt appears.
During this process, the system displays the MAC address of the Publisher. Write down the MAC address when it displays; you use the MAC address later to acquire Emergency Responder licenses. If you are not able to capture the MAC address during installation, you can look it up later. See Server Licenses for information about looking up the server MAC address.
To bring up the Emergency Responder websites, go to any Windows system on the network, start a supported web browser, and enter the following URL:
http://your Emergency Responder hostname/
http://your Emergency Responder IP address/
Make sure that the Emergency Responder is configured with DNS so that hostname is resolved to the IP address.
Install Emergency Responder Subscriber
You must install Subscriber only after you have installed the Publisher. You must install the Subscriber on a separate server from the Emergency Responder Publisher.
You must complete the installation of the Publisher, which includes a system reboot, before you start to install the Subscriber.
To install the Emergency Responder Subscriber, follow these steps:
On the Publisher server, add the details about the Subscriber server by doing the following:
Log in the Publisher Emergency Responder Administration website.
Select System > Add Subscriber. The Add Server page appears.
Enter the hostname of the new Subscriber and click Insert. The Add Subscriber page appears again.
In the Configured Servers list, check that the hostname/IP address of the new Subscriber is listed.
On the Publisher Configuration page, select No to indicate that you are installing a Subscriber, not a Publisher. The system displays a warning saying that if this is not the Publisher, you must first configure this server using the Publisher Administration web interface before you can proceed (see Step 1 of this procedure for more information). Also, this server being added must have network access to the Publisher, which must be in service for the installation to complete successfully.
Click OK to close the warning.
The Network Connectivity Test Configuration page appears. The system attempts to verify system connectivity. Click No to continue the installation.
The Publisher Access Configuration page appears. Enter the following:
Publisher IP address
Publisher Database/Security password
Verify that the Publisher information is correct and click OK.
The SMTP Host Configuration page appears. Choose Yes if you want to configure the SMTP Host.
The Platform Configuration Complete page appears.Select one of the following options:
If the Publisher information is correct, click OK.
If the information is not correct, click the Back button and make the needed corrections on the Publisher Access Configuration page. Then, click OK.
The installation of the Emergency Responder Subscriber begins and takes an additional 20 to 30 minutes to complete.
When the installation completes, go to the Emergency Responder Administration website on the Subscriber to verify that the Subscriber was installed successfully. If the installation succeeded, a message saying "Primary Cisco Emergency Responder is active" appears. This message indicates that the Subscriber was installed successfully.
To upgrade from 7.1(1) or a later version of Cisco Emergency Responder to the most recent version of Emergency Responder, use the Cisco Unified OS Administration web interface. See Performing Software Upgrades section for information about performing upgrades.
To upgrade from Emergency Responder 7.0 to the most recent version of Emergency Responder, you must first complete an upgrade to Emergency Responder 7.1, using the software upgrade available for download from Cisco.com. See "Performing Software Upgrades" section of the Cisco Emergency Responder Administration Guide for Emergency Responder 7.1 for information about performing direct upgrades to Emergency Responder 7.1.