Installation and Administration Guide for Cisco Unified Mobility Advantage, Release 7.0
Upgrading Cisco Unified Mobility Advantage
Downloads: This chapterpdf (PDF - 249.0KB) The complete bookPDF (PDF - 4.1MB) | Feedback

Upgrading Cisco Unified Mobility Advantage

Table Of Contents

Upgrading Cisco Unified Mobility Advantage

Upgrade Sequence

How to Upgrade Release 3.0.4 to Release 3.0.9

Completing Preinstallation Steps

Installing the Server

Applying Changes

Completing the Upgrade

How to Upgrade Release 3.0.9 to Release 3.1.2

Completing Preinstallation Steps

Installing the Server

Applying Changes

Completing Upgrade Tasks

How to Upgrade Release 3.1.2 to Release 7.0(1)

How to Prepare To Upgrade

Preinstallation Tasks

Saving the SSL Certificate from the Proxy Server

Creating a Backup File of Your Release 3.1.2 Data

How to Configure Release 7.x to Run with Release 3.x Functionality After Upgrade

Configuring Release 7.x to Run With Release 3.x Functionality

Uploading the Proxy Server Certificate to Release 7.x

Downloading the Proxy Server Certificate and Preparing It for Use on the Cisco Adaptive Security Appliance

Downloading a Self-Signed Certificate from Cisco Unified Mobility Advantage for Import into the Cisco Adaptive Security Appliance

Adding New Functionality, Client Software, and Users After Upgrade

Upgrading from Release 7.0(1) to Release 7.0(2)


Upgrading Cisco Unified Mobility Advantage


Revised Date: April 17, 2009

Upgrade Sequence

How to Upgrade Release 3.0.4 to Release 3.0.9

How to Upgrade Release 3.0.9 to Release 3.1.2

How to Upgrade Release 3.1.2 to Release 7.0(1)

Upgrading from Release 7.0(1) to Release 7.0(2)

Upgrade Sequence

Each release upgrades only from the release that immediately preceded it. If you are upgrading from a release that did not immediately precede the release you are installing, you must sequentially upgrade each release. Follow the instructions in each applicable section of this chapter.

How to Upgrade Release 3.0.4 to Release 3.0.9

To upgrade Cisco Unified Mobility Advantage from Release 3.0.4 to Release 3.0.9, upgrade the Managed Server and Cisco Unified Mobility Advantage Proxy Server applications only. Do not upgrade the operating system.

Completing Preinstallation Steps

Installing the Server

Applying Changes

Completing the Upgrade

Completing Preinstallation Steps

Procedure


Step 1 Sign in as root on the machine on which Cisco Unified Mobility Advantage Server is installed.

Step 2 Open a command terminal.

Step 3 Sign in as an "informix" user and create a backup directory for the database export:

su - informix

mkdir /tmp/cumabk

Step 4 As root, stop the Cisco Unified Mobility Advantage Servers (Proxy Server, Enterprise Server, Node Manager Server, and Managed Server):

/sbin/service cuma_proxy stop

/sbin/service cuma_cuma stop

/sbin/service cuma_nm stop

/sbin/service cuma_admin stop

Step 5 Back up the configuration files located under $CUMAROOT/conf/admin/ directory.

The default $CUMAROOT is /opt/cuma. The following examples use /opt/cuma, Replace /opt/cuma with your install directory.

cd /opt/cuma/conf

cp -R admin /tmp/cumabk/

Step 6 Back up the database startup script file /etc/init.d/cuma_db:

cp /etc/init.d/cuma_db /tmp/cumabk/

Step 7 Stop the Cisco Unified Mobility Advantage Servers and take an export dump of the database by executing the following commands as an "informix" user on the server where the database is installed:

su - informix

export INFORMIXDIR=/opt/cuma/informix

export INFORMIXSERVER=mcs

export PATH=$PATH:/opt/cuma/informix/bin

cd $INFORMIXDIR/bin

dbexport cumcsdb -ss -o /tmp/cumabk

Step 8 Back up the orative.keystore file on the Managed Server to a temporary location:

cp /opt/cuma/conf/orative.keystore /tmp/cumabk/


Installing the Server

Procedure


Step 1 Sign in as root and uninstall the Cisco Unified Mobility Advantage Server Release 3.0.4 without uninstalling the underlying database by invoking the uninstaller program using the following command:

/opt/cuma/Uninstall/uninstall -DIDS=false -i silent

Step 2 As root, install the Cisco Unified Mobility Advantage Server Release 3.0.9 without reinstalling the database:


Caution You must be running an X-client if you are installing remotely. If you need an X-client, use WRQ Reflection.

cd $cd_image_root/Disk1 (the default location is: cd /media/cdrom/Disk1)

./install.bin -DIDS=false

Step 3 Restore the backed up configuration files to the new installation location:

cd /tmp/cumabk

cp -R admin /opt/cuma/conf/

Enter Yes for all the overwrite prompts

cp orative.keystore /opt/cuma/conf

cp cuma_db /etc/init.d/

Step 4 Register the database so that it starts automatically, and then restart the database if it has not already been started:

/sbin/chkconfig --add cuma_db

/sbin/service cuma_db start


Applying Changes

Procedure


Step 1 Copy the jtapi jar file that corresponds to the version of Cisco Unified Communications Manager installed in your system to the lib directory on the Managed Server.

The following example is for Cisco Unified Communications Manager version 6.0:

cp /opt/cuma/var/jtapi/6/cisco_jtapi-6.jar /opt/cuma/jboss-4.0.1sp1/server/cuma/lib/

Step 2 Start the Cisco Unified Mobility Advantage Admin Server and Node Manager Server:

/sbin/service cuma_admin start

/sbin/service cuma_nm start


Completing the Upgrade

Procedure


Step 1 Sign in to the Cisco Unified Mobility Advantage Admin Portal.

For example, http://mycompany.com:7080/adminportal.

Step 2 Upload the orative.keystore file that you backed up earlier to the server.

You may need to download this file to your PC first before uploading it to the server.

Step 3 Upload the Cisco Unified Mobile Communicator .oar files in the Admin Portal. This must be done even if there are no new .oar files.

Step 4 Start the Managed Server.

Step 5 Uninstall Cisco Unified Mobility Advantage Release 3.0.4 from the Proxy Server, and then install Release 3.0.9. Use the old SSL keystore file and ports that you originally used for the Proxy Server installation.

Step 6 Make sure the Managed Server is running, and then start the Proxy Server.


How to Upgrade Release 3.0.9 to Release 3.1.2

To upgrade Cisco Unified Mobility Advantage, upgrade the Cisco Unified Mobility Advantage Server and Cisco Unified Mobility Advantage Proxy Server applications only. Do not upgrade the operating system.

Completing Preinstallation Steps

Installing the Server

Applying Changes

Completing Upgrade Tasks

Completing Preinstallation Steps

Procedure


Step 1 Before you begin the upgrade, make sure that you have up-to-date port configuration information for the Cisco Unified Mobility Advantage Server and the Cisco Unified Mobility Advantage Proxy Server.

Step 2 Sign in as root on the machine where the Proxy Server is installed.

Step 3 Open a command terminal.

Step 4 As root, stop the Proxy Server:

/sbin/service cuma_proxy stop

Step 5 Sign in as root on the machine where the Cisco Unified Mobility Advantage Server is installed.

Step 6 Open a command terminal.

Step 7 Sign in as an "informix" user and create a backup directory for the database export:

su - informix

mkdir /tmp/cumabk

exit

Step 8 As root, stop the Cisco Unified Mobility Advantage Server, Node Manager Server, and Managed Server:

/sbin/service cuma_cuma stop

/sbin/service cuma_nm stop

/sbin/service cuma_admin stop

Step 9 Back up the configuration files located under $CUMAROOT/conf/admin/ directory.

The default $CUMAROOT is /opt/cuma. The following examples use /opt/cuma. Replace /opt/cuma with your install directory.

cd /opt/cuma/conf

cp -R admin /tmp/cumabk/

Step 10 Back up the database startup script file /etc/init.d/cuma_db:

cp /etc/init.d/cuma_db /tmp/cumabk/

Step 11 Stop the Cisco Unified Mobility Advantage Servers and take an export dump of the database by executing the following commands as an "informix" user on the server where the database is installed:

su - informix

export INFORMIXDIR=/opt/cuma/informix

export INFORMIXSERVER=mcs

export PATH=$PATH:/opt/cuma/informix/bin

cd $INFORMIXDIR/bin

dbexport cumcsdb -ss -o /tmp/cumabk

Step 12 Back up the orative.keystore file on the Managed Server to a temporary location:

cp /opt/cuma/conf/orative.keystore /tmp/cumabk/

Step 13 Back up the .WAR files:

cp /opt/cuma/jboss-4.0.1sp1/server/admin/deploy/blackberry-admin.war /tmp/cumabk

cp /opt/cuma/jboss-4.0.1sp1/server/admin/deploy/symbian-admin.war /tmp/cumabk

cp /opt/cuma/jboss-4.0.1sp1/server/admin/deploy/blackberry-user.war /tmp/cumabk

cp /opt/cuma/jboss-4.0.1sp1/server/cuma/deploy/blackberry-user.war /tmp/cumabk

cp /opt/cuma/jboss-4.0.1sp1/server/cuma/deploy/symbian-user.war /tmp/cumabk


Installing the Server

Procedure


Step 1 Sign in as root and uninstall the Cisco Unified Mobility Advantage Server Release 3.0.9 without uninstalling the underlying database by invoking the uninstaller program using this command:

/opt/cuma/Uninstall/uninstall -DIDS=false -i silent

Step 2 As root, install the Cisco Unified Mobility Advantage Server Release 3.1.2 without reinstalling the database:


Caution You must be running an X-client if you are installing remotely. If you need an X-client, use WRQ Reflection.

cd $cd_image_root/Disk1 (the default location is: cd /media/cdrom/Disk1)

./install.bin -DIDS=false

Step 3 Restore the backed up configuration files to the new installation location:

cd /tmp/cumabk

cp -R admin /opt/cuma/conf/

Enter Yes for all the overwrite prompts

cp orative.keystore /opt/cuma/conf

cp cuma_db /etc/init.d/

Step 4 Restore the backed up .WAR files:

cp /tmp/cumabk/blackberry-admin.war /opt/cuma/jboss-4.0.1sp1/server/admin/deploy/

cp /tmp/cumabk/symbian-admin.war /opt/cuma/jboss-4.0.1sp1/server/admin/deploy/

cp /tmp/cumabk/blackberry-user.war /opt/cuma/jboss-4.0.1sp1/server/cuma/deploy/

cp /tmp/cumabk/symbian-user.war /opt/cuma/jboss-4.0.1sp1/server/cuma/deploy/

Step 5 Register the database so that it starts automatically, and then restart the database if it has not already been started:

/sbin/chkconfig --add cuma_db

/sbin/service cuma_db start


Applying Changes

Procedure


Step 1 Sign in as a root user on the server that is running Cisco Unified Mobility Advantage.

Step 2 Open a command terminal and edit the following file using the vi editor:

vi /opt/cuma/conf/admin/admin.xml

Step 3 Change the value of node <vm_system_email_pattern> in <voicemail_from_email_filter> for <!-- Cisco Settings --> to:

.*?(UNITY|unity|VPIM|vpim) .*

Step 4 Add node after <move_on_delete>true</move_on_delete> in <voicemail_from_email_filter> for <!-- Cisco Settings -->:

<voice_introduction>introduction</voice_introduction>

Step 5 Open a command terminal and edit the following file using the vi editor:

vi /opt/cuma/conf/admin/managed_server.xml

Step 6 Change the value of node <vm_system_email_pattern> in <voicemail_from_email_filter> for <!-- Cisco Settings --> to:

.*?(UNITY|unity|VPIM|vpim) .*

Step 7 --Add node after <move_on_delete>true</move_on_delete> in <voicemail_from_email_filter> for <!-- Cisco Settings -->:

<voice_introduction>introduction</voice_introduction>

Step 8 Start the Cisco Unified Mobility Advantage Admin Server and Node Manager Server.

/sbin/service cuma_admin start

/sbin/service cuma_nm start


Completing Upgrade Tasks

Procedure


Step 1 Sign in to the Cisco Unified Mobility Advantage Admin Portal. For example, http://mycompany.com:7080/adminportal.

Step 2 Upload the orative.keystore file that you backed up earlier to the server. You may need to download this file to your PC first before uploading it to the server.

Step 3 Upload the Cisco Unified Mobile Communicator .oar files in the Admin Portal. This must be done even if there are no new .oar files.

Step 4 Go to Enterprise Adapters and select Edit for the Cisco Unified Communications Manager adapter.

Step 5 Make sure the Cisco Unified Communications Manager version is set properly.

Step 6 Select Submit on the Cisco Unified Communications Manager adapter page whether or not you make any changes.

Step 7 Start the Managed Server.

Step 8 Uninstall Cisco Unified Mobility Advantage Release 3.0.9 from the Proxy Server, and then install Release 3.1.2. Use the old SSL keystore file and ports that you originally used for the Proxy Server installation.

Step 9 Make sure the Managed Server is running, and then start the Proxy Server.


How to Upgrade Release 3.1.2 to Release 7.0(1)

To upgrade Cisco Unified Mobility Advantage release 3.1.2 to release 7.0(1), perform the following sets of operations:

How to Prepare To Upgrade

How to Configure Release 7.x to Run with Release 3.x Functionality After Upgrade

Adding New Functionality, Client Software, and Users After Upgrade

How to Prepare To Upgrade

Preinstallation Tasks

Saving the SSL Certificate from the Proxy Server

Creating a Backup File of Your Release 3.1.2 Data

Preinstallation Tasks

Perform these tasks even if you will upgrade to Release 7.0(2).


Caution We recommend that you install Cisco Unified Mobility Advantage Release 7.0(1) on a new server. Installing Release 7.0(1) formats the hard drive.

Procedures

Task
For Information, See

Obtain necessary firewall ports from your IT security department.

Port requirements have changed for Cisco Unified Mobility Advantage Release 7.x.

Opening Firewall Ports, page 1-5

If you will reuse the signed certificate from your Proxy Server on the Cisco Adaptive Security Appliance:

Perform the first procedure required to reuse the signed certificate from your Release 3.1.2 Proxy Server on the Cisco Adaptive Security Appliance.

You will complete the processes required to reuse the certificate after you install Release 7.0(1).

Saving the SSL Certificate from the Proxy Server

If you cannot reuse the signed certificate from your Proxy Server on the Cisco Adaptive Security Appliance:

Obtain a new certificate for the Cisco Adaptive Security Appliance.

(For New Installations) How to Obtain and Import the Cisco Adaptive Security Appliance-to-Client Certificate, page 2-10.

Create a backup file of Release 3.1.2.

Creating a Backup File of Your Release 3.1.2 Data

Notify users that existing voicemail notifications will no longer appear on their mobile devices after you install the upgrade. However, the messages are still available from Microsoft Exchange or Outlook, and from the Telephone User Interface (TUI).


Saving the SSL Certificate from the Proxy Server

In Cisco Unified Mobility Advantage Release 7.x, a Cisco Adaptive Security Appliance performs the functions that the Proxy Server performed in Release 3.1.2. If you meet the restrictions for this section, you can reuse the certificate from the Proxy Server on the Cisco Adaptive Security Appliance.

(The certificate on the Managed Server will be transferred automatically during the upgrade.)

Restrictions

The hostname of the Cisco Unified Mobility Advantage server in Release 7.0(1) must be the same as the hostname of the Managed Server in Release 3.1.2 (and the same as the hostname on the certificate.)

You must know your certificate password. For security reasons, it is not possible to discover this password from Cisco Unified Mobility Advantage. If you do not know this password, you may be able to obtain a replacement certificate from the Certificate Authority; visit their web site to learn your options.

Before You Begin

If your situation does not meet the restrictions above, skip the rest of this section and follow the instructions in (For New Installations) How to Obtain and Import the Cisco Adaptive Security Appliance-to-Client Certificate, page 2-10.

Procedure


Step 1 Note the password for the certificate on your Proxy Server.

Certificate From
Your Password

Proxy Server

 

Step 2 Locate the keystore file on the Proxy Server.

The file is located in: /opt/cuma/conf/orative.keystore

Step 3 Copy the keystore file from the Proxy Server to a safe location.


What To Do Next

After you install the upgrade, do the following in order:

1. Uploading the Proxy Server Certificate to Release 7.x

2. Downloading the Proxy Server Certificate and Preparing It for Use on the Cisco Adaptive Security Appliance

3. (For Upgrades from Release 3.x) Importing the Cisco Adaptive Security Appliance-to-Client Certificate, page 2-8

Creating a Backup File of Your Release 3.1.2 Data

This backup captures your Release 3.1.2 data for import later into your Release 7.0(1) installation.

This procedure is required for all upgrades.

Before You Begin

We recommend storing your backup on an SFTP server, but you can also use an FTP server or a tape backup system. Make sure the volume can accommodate the backup file, which will be 600-700 MB.

Procedure


Step 1 Obtain a copy of the Cisco Unified Mobility Advantage 7.x installation DVD.

Step 2 Copy the cuma_backup_restore.sh backup script located on the DVD to the Cisco Unified Mobility Advantage 3.1.2 server. The backup script is located on the DVD at: ${DVD_MOUNT_POINT}/RedHat/APPRPMS/cuma_backup_restore.sh

Step 3 As root, execute the following script to create a backup tar.gz file of the Cisco Unified Mobility Advantage 3.1.2 server:

./cuma_backup_restore.sh -b /opt/cuma /tmp/mybackup

This command creates a backup tar file /tmp/mybackup.tar.gz on the Cisco Unified Mobility Advantage 3.1.2 server.

For example:

cuma_backup_restore.sh [-b <cuma_dir> {backup_file}] [-r <restore_file>] [-v <restore_file]

-b — Creates a backup of cuma_dir. If backup_file is not specified, then a unique time stamped backup file will be created in /common.

-r — Restores a backup, specified by restore_file.

-v — Displays the server version of the restore_file.


Caution If you will install Release 7.0(1) on this server, do not leave the .tar file on this server.

You will import this data file at the end of the Release 7.0(1) install process.


What To Do Next

Run the installer to perform the upgrade. See Chapter 6, "Installing Cisco Unified Mobility Advantage."

How to Configure Release 7.x to Run with Release 3.x Functionality After Upgrade

Because of changes in port configuration and in the way server security, presence, and voicemail integration are provided in Cisco Unified Mobility Advantage Release 7.x, your existing deployment will not work after upgrade until you make configuration changes. We recommend that you make the required configurations to restore your Release 3.x functionality before you configure new features and devices. This approach will simplify troubleshooting should it be necessary.

Configuring Release 7.x to Run With Release 3.x Functionality

Uploading the Proxy Server Certificate to Release 7.x

Downloading the Proxy Server Certificate and Preparing It for Use on the Cisco Adaptive Security Appliance

Downloading a Self-Signed Certificate from Cisco Unified Mobility Advantage for Import into the Cisco Adaptive Security Appliance

Configuring Release 7.x to Run With Release 3.x Functionality

After you run the installer, perform the following steps to run Cisco Unified Mobility Advantage with Release 3.x functionality.

Restriction

The following must be true:

Your enterprise servers have not changed.

The hostname of the Cisco Unified Mobility Advantage server is the same as the Managed Server.

Before You Begin

Install the upgrade to Release 7.0(1). See Chapter 6, "Installing Cisco Unified Mobility Advantage."

Procedure

 
Do This
For Information, See

Step 1 

Sign in to the Admin Portal using your credentials from Release 3.1.2.

Logging In to the Admin Portal, page 8-1

Note that in Cisco Unified Mobility Advantage Release 7.x the Admin Portal port is fixed at 7080.

Step 2 

Select System Management > Network Properties and specify the required port numbers, if they are different from the defaults.

You obtained these ports in Opening Firewall Ports, page 1-5.

Step 3 

Prepare the required certificate to be presented to the clients.

If you will use the existing certificate from the Proxy Server:

See Uploading the Proxy Server Certificate to Release 7.x and then

Downloading the Proxy Server Certificate and Preparing It for Use on the Cisco Adaptive Security Appliance

If you must obtain a new certificate signed by a Certificate Authority:

How to Obtain and Install a Cisco Adaptive Security Appliance-to-Client Certificate, page 2-8

Step 4 

Determine whether you can re-use a signed certificate from the Managed Server, if you had one in Release 3.1.2.

If you can reuse the certificate, you do not need to do anything in order to use it.

See Downloading a Self-Signed Certificate from Cisco Unified Mobility Advantage for Import into the Cisco Adaptive Security Appliance.

If the Managed Server did not have a signed certificate that you want to reuse, see Downloading a Self-Signed Certificate from Cisco Unified Mobility Advantage for Import into the Cisco Adaptive Security Appliance

Step 5 

Configure the Cisco Adaptive Security Appliance.

Chapter 2, "Configuring the Cisco Adaptive Security Appliance (ASA) for Use With Cisco Unified Mobility Advantage"

Step 6 

(For Cisco Unified Communications Manager Release 7.x only) Update the Cisco Unified Communications Manager adapter:

Select cuma for the Security Context.

Viewing and Changing Enterprise Adapter Settings, page 10-4

About Cisco Unified Communications Manager Enterprise Adapter Settings, page A-6

Step 7 

Create the Cisco Unity or Cisco Unity Connection adapter.

The voicemail integration has changed for Cisco Unified Mobility Advantage Release 7.x; the voicemail settings used in Cisco Unified Mobility Advantage Release 3.x will not work for Release 7.x.

Adding a New Enterprise Adapter, page 10-3

About Cisco Unity or Cisco Unity Connection Enterprise Adapter Settings, page A-14

Enabling and Configuring Voicemail, page 12-4

 

Step 8 

Start Cisco Unified Mobility Advantage using the single control in Server Controls > Cisco > Control Server.

Step 9 

Notify existing users of Release 3.x clients that:

BlackBerry users should upgrade their client software.

Users of Nokia Symbian phones who use the French, German, Spanish, or Italian client do not need to upgrade from Release 3.x.

Users of Nokia Symbian phones who use the English version of the client should upgrade to client Release 7.0 in order to use the new features. However, they cannot use the standard upgrade procedure. Instead, they must delete their existing phones from the User Portal, then add their phones again as new phones. When they sign in to the new client, their data will be restored on the new client. For best results, they should connect to the server immediately before they delete their phones in order to ensure that no data that was added to their client since the last connection is lost.

If voicemail credentials are not the same as Cisco Unified Mobile Communicator credentials, they must set their voicemail usernames and passwords in the User Portal before they can access voicemail from their mobile devices.

They can access their voicemail from other standard methods regardless, such as from their desk phones.

Step 10 

Verify that Release 3.x functionality is working properly with existing Release 3.x clients.

Note that the availability feature will not work until you add Cisco Unified Presence in a later section.

Step 11 

Add new functionality.

Adding New Functionality, Client Software, and Users After Upgrade

Step 12 

Add new users and devices.

Step 13 

Have users of client Release 3.x for Nokia Symbian phones upgrade to client Release 7.x.

Uploading the Proxy Server Certificate to Release 7.x

In Cisco Unified Mobility Advantage Release 7.x, the Cisco Adaptive Security Appliance performs the same function that the Proxy Server provided in Release 3.x. If you choose to re-use the certificate from the Proxy Server on the Cisco Adaptive Security Appliance, you must perform several procedures in order to convert the certificate.

In order to convert the Proxy Server certificate for use on the Cisco Adaptive Security Appliance, you must first create a security context to store certificate and then upload it.

You do not need to upload the Managed Server certificate; it is uploaded automatically during the upgrade.

Before You Begin

You must have performed the procedure in Saving the SSL Certificate from the Proxy Server.

Procedure


Step 1 Sign in to the Admin Portal using your password from Release 3.1.2.

Step 2 Select Security Context Management > Security Contexts.

Step 3 Select Add Context.

Step 4 Select Upload for Do you want to create/upload a new certificate?

Step 5 Enter information:

Option
Value

Context Name

Enter information that describes the certificate, such as its source and type (signed.)

Description

Certificate Type

JKS

Trust Policy

Keep the default.

Client Authentication Policy

Keep the default.

Certificate

Navigate to and choose the Proxy Server certificate that you saved before performing the upgrade.

Certificate Password

Enter the password.


Step 6 Select Submit.


What To Do Next

Perform the procedure in Downloading the Proxy Server Certificate and Preparing It for Use on the Cisco Adaptive Security Appliance.

Downloading the Proxy Server Certificate and Preparing It for Use on the Cisco Adaptive Security Appliance

You must download and modify this certificate before you can upload it to the Cisco Adaptive Security Appliance.

Before You Begin

Perform the procedure in Uploading the Proxy Server Certificate to Release 7.x.

Obtain OpenSSL software. For information, visit www.openssl.org.

Procedure


Step 1 Download the certificate file that was originally on the Proxy Server from Cisco Unified Mobility Advantage Release 7.0(1) and save it with a .p12 extension:

a. Select Security Context Management > Security Contexts.

b. Select Download in the row of the Security Context that holds the former Proxy Server certificate.

The file downloads in PKCS12 format.

c. Save the file.

d. Change the filename extension from .keystore to .p12.

Step 2 Convert the PKCS12 file to PEM format using OpenSSL:

You can run OpenSSL commands through an SSH session on any Linux machine, such as the Cisco Unified Mobility Advantage Release 3.1.2 managed server or Proxy Server.

Run the following OpenSSL command:

openssl pkcs12 -in your_p12cert.p12 -out your_pemcert.pem

Step 3 Open the PEM file in WordPad.

Step 4 Identify each section of the PEM file:

This PEM file generally includes several certificates, each clearly marked with BEGIN CERTIFICATE and END CERTIFICATE labels:

The server certificate that you must manipulate using the rest of the steps in this procedure, along with its private key information.

An intermediate certificate that you will copy and paste into the Cisco Adaptive Security Appliance command-line interface later. If this certificate is not included, you can obtain it later from your Certificate Authority web site.

The root certificate that you will copy and paste into the Cisco Adaptive Security Appliance command-line interface later. If this certificate is not included, you can obtain it later from your Certificate Authority web site.

Step 5 Copy and save the private key section, including the following lines, to a new text file (for example, yourserver_key.txt).

--BEGIN ENCRYPTED PRIVATE KEY----

--END ENCRYPTED PRIVATE KEY----

Step 6 Copy and save the server certificate, including the following lines, to a new text file (for example, yourserver_cert.txt).

--BEGIN CERTIFICATE----

--END CERTIFICATE----

Step 7 Use OpenSSL to combine the key and certificate text files into a new file in PKCS12 format:

openssl pkcs12 -in yourserver_cert.txt -inkey yourserver_key.txt -nodes -passin pass:<cert_password> -passout pass:<cert_password> -export -out sslout.p12

Step 8 Convert the output file to base64:

openssl base64 -in sslout.p12 -out ssl64.p12


What To Do Next

Obtain any applicable intermediate and root certificates from the web site of your Certificate Authority, if they were not included in the PEM file in this procedure.

Upload all required certificates to the Cisco Adaptive Security Appliance using the procedure in (For Upgrades from Release 3.x) Importing the Cisco Adaptive Security Appliance-to-Client Certificate, page 2-8.

Downloading a Self-Signed Certificate from Cisco Unified Mobility Advantage for Import into the Cisco Adaptive Security Appliance

If the Managed Server (as distinct from the Proxy Server) had a certificate that was signed by a recognized Certificate Authority (this release supports VeriSign and GeoTrust), this certificate was automatically uploaded into the "cuma" Security Context in Cisco Unified Mobility Advantage Release 7.0(1) during the upgrade.

If the hostname of the Cisco Unified Mobility Advantage server after upgrade is the same as the hostname of the Managed Server in Release 3.1.2 (and on the certificate), you can reuse this signed certificate for Cisco Unified Mobility Advantage Release 7.x without any further action.

If the Managed Server did not have a signed certificate, you have several options:

You can generate a self-signed certificate from Cisco Unified Mobility Advantage for import into the Cisco Adaptive Security Appliance. Users will see an "untrusted certificate" warning when they access the User Portal, but this warning does not prevent access or represent an actual security risk.

You can also choose to obtain and deploy a new signed certificate now.

You use a self-signed certificate for initial testing and then obtain and deploy a signed certificate later.

Before You Begin

Determine whether you need to perform this procedure. See Downloading a Self-Signed Certificate from Cisco Unified Mobility Advantage for Import into the Cisco Adaptive Security Appliance.

Procedure


Step 1 Select Security Context Management > Security Contexts in the Admin Portal.

Step 2 Select Manage Context beside the cuma security context.

Step 3 Select Download Certificate.

Step 4 Open the certificate in WordPad (not Notepad.)

Step 5 Copy the certificate text.


Related Topics

Deploying Self-Signed Certificates: Cisco Adaptive Security Appliance, page 9-4

Deploying Self-Signed Certificates for Internal Servers: Example, page 9-5

How to Obtain and Deploy a Signed Certificate for the Cisco Unified Mobility Advantage Server, page 9-12

About Secure Connections and SSL Certificates, page 9-1

Explanation of Security Contexts, page 9-4

How to Obtain and Deploy a Signed Certificate for the Cisco Unified Mobility Advantage Server, page 9-12

What To Do Next

Import this certificate into the Cisco Adaptive Security Appliance. See Importing a Self-Signed Certificate from Cisco Unified Mobility Advantage, page 2-12.

Adding New Functionality, Client Software, and Users After Upgrade

After you have verified that the upgrade has been successful, add new features and new users as desired.

Restrictions

See the Restrictions and Limitations in the Release Notes for this release at http://www.cisco.com/en/US/products/ps7270/prod_release_notes_list.html. Note that there may be separate release notes for the client and for the server.

Some features require certain versions of enterprise servers. See the System Requirements in the Compatibility Matrix at http://www.cisco.com/en/US/products/ps7270/products_device_support_tables_list.html.

New features are available only for Release 7.x clients.

Before You Begin

If you are upgrading to Release 7.0(2), install that upgrade before you complete this section. See Upgrading from Release 7.0(1) to Release 7.0(2).

Procedure

 
Do This
For Information, See

Step 1 

Create additional security contexts, if desired, and manage any additional certificates.

During the upgrade, the certificate that was on the Managed Server in Release 3.1.2 is uploaded and a security context named cuma is created for it. Its Trust Policy defaults to All Certificates, and Client Authentication Policy defaults to None. You can assign this Security Context to any and all enterprise adapters that you create, so that you do not need to import or export certificates. You can change security requirements later to require certificates for added security.

Chapter 9, "Managing Server Security in Cisco Unified Mobility Advantage."

Step 2 

Configure settings for Cisco Unified Communications Manager, including the Dial Via Office and integrated call logs features.

a. Configure Cisco Unified Communications Manager.

b. Update the adapter in the Enterprise Configuration > Enterprise Adapter pages in the Admin portal. See information about the fields in the appendix. Be sure to specify a Security Context.

For Release 7.0(2), enter the Web Services information. For Release 7.0(1), enter the "SOAP information."

c. Enable the call log monitoring and Dial via Office features and choose options.

d. Configure users in Cisco Unified Communications Manager and in Cisco Unified Mobility Advantage.

Chapter 3, "Configuring Cisco Unified Communications Manager for Use With Cisco Unified Mobility Advantage"

Be sure to complete the following for each feature you want to enable:

Operations in Before You Begin sections.

Operations in What To Do Next sections.

Step 3 

If the following are true:

You are using Cisco Unified Communications Manager Release 7.x.

There are existing users of the Release 3.x client on Nokia Symbian phones who will migrate to Release 7.x of the client.

These users will use the same mobile phone number with client Release 7.x.

Then you must delete the existing Remote Destination profile in Cisco Unified Communications Manager, then configure the user and device following the instructions for Release 7.x.

How to Configure Cisco Unified Communications Manager for Each User and Device, page 3-19

Step 4 

If you will integrate with Cisco Unified Presence:

a. Configure the Cisco Unified Presence server.

b. Create the enterprise adapter.

Be sure to specify a Security Context.

c. Enable the availability feature.

d. Configure each user.

Chapter 4, "Configuring Cisco Unified Presence for Use With Cisco Unified Mobility Advantage"

Be sure to complete the following:

Operations in any Before You Begin sections.

Operations in any What To Do Next sections.

Procedures in Additional Required Configurations sections.

Step 5 

If you will integrate with Cisco Unified MeetingPlace or Cisco Unified MeetingPlace Express so that users receive alerts when meetings are about to begin, enable notifications.

Enabling Conference Notifications, page 12-5

Step 6 

Upload the new .oar file to Cisco Unified Mobility Advantage.

 

Uploading a Cisco Unified Mobile Communicator Release, page 13-2

Step 7 

Specify the service providers and phones that you will support.

Determining Supported Devices and Service Providers, page 13-2

Step 8 

Activate new users.

Activating Users, page 14-1

Step 9 

Ensure that user access will not be blocked when Cisco Unified Mobility Advantage checks for Device IDs.

By default, Release 3.x clients cannot connect. You must disable either the system-level checking or the setting for each user.

For the system:

Enabling Device ID Checking, page 12-1

For each user:

Restricting Access By Device, page 14-2

Step 10 

Restart Cisco Unified Mobility Advantage.

Stopping Cisco Unified Mobility Advantage, page 11-1

Starting Cisco Unified Mobility Advantage, page 11-1

Step 11 

Have users of client Release 3.x for Nokia Symbian phones upgrade to client Release 7.x.

User documentation for Cisco Unified Mobile Communicator for Nokia Symbian at http://cisco.com/en/US/products/ps7271/products_user_guide_list.html

Chapter 17, "Deploying Cisco Unified Mobile Communicator on Nokia Symbian Phones"

Step 12 

Provision new users.

Chapter 15, "Provisioning Windows Mobile Phones in Cisco Unified Mobility Advantage"

Chapter 16, "Deploying Cisco Unified Mobile Communicator on BlackBerry Devices"

Chapter 17, "Deploying Cisco Unified Mobile Communicator on Nokia Symbian Phones"

Step 13 

Give users the information they need to use Cisco Unified Mobile Communicator.

Information to Give to Users, page 14-3

Upgrading from Release 7.0(1) to Release 7.0(2)

Follow the instructions in this procedure whether you are upgrading from an existing installation of Release 7.0(1) or you have just installed Release 7.0(1) in preparation to upgrade to Release 7.0(2).

You can upgrade to Cisco Unified Mobility Advantage Release 7.0(2) while Release 7.0(1) continues to operate. Two partitions exist on the server: an active, bootable partition and an inactive, bootable partition. The system boots up and operates entirely on the partition that is marked as the active partition.

You install the upgrade on the inactive partition. The system continues to function normally while you are installing the software. When you are ready, you activate the inactive partition and reboot the system with the newly upgraded software. The current active partition becomes the inactive partition after the system restarts. The current software remains in the inactive partition until the next upgrade.

Your configuration information migrates automatically to the upgraded version in the active partition.

If for any reason you decide to back out of the upgrade, you can restart the system to the inactive partition that contains the older version of the software. However, you will lose any configuration changes that you made since upgrading the software.

Before You Begin

If this is a new installation of Cisco Unified Mobility Advantage and you have just installed Release 7.0(1), do both of the following before you upgrade to Release 7.0(2):

Complete the Configuration Wizard in Release 7.0(1) See Using the Configuration Wizard in Cisco Unified Mobility Advantage, page 7-1.

Start Cisco Unified Mobility Advantage and verify that it is running.

If you are upgrading from Release 3.x:

Upgrade, if necessary, to Release 3.1.2 using the appropriate procedures in this chapter.

Prepare to upgrade to Release 7.0(1): Perform the procedures in How to Prepare To Upgrade.

Upgrade to Release 7.0(1). See Chapter 6, "Installing Cisco Unified Mobility Advantage."

Perform essential operations after upgrading to Release 7.0(1): See How to Configure Release 7.x to Run with Release 3.x Functionality After Upgrade.

Stop the server and verify that the server is not running before you continue. See Stopping Cisco Unified Mobility Advantage, page 11-1.

If you will upgrade from an image of the installer that is on a remote filesystem, make sure that you have SFTP access to the image.

Back up your data. See Backing Up Your Cisco Unified Mobility Advantage Server, page 11-3.

If you download the Cisco Unified Mobility Advantage software from Cisco.com, copy or note the MD5 value in the table on the page from which you download the image.

Procedure


Step 1 If you will upgrade using a DVD, insert the DVD into the disc drive of the Cisco Unified Mobility Advantage server.

Step 2 Go to the sign-in page of the Admin Portal.

Step 3 Select Cisco Unified OS Administration from the list box in the top right corner of the window.

Step 4 Select Go.

Step 5 Sign in using your platform administrator credentials.

Step 6 Select Software Upgrades > Install/Upgrade.

Step 7 Choose the location of the installer image from the Source list box.

Step 8 Enter required information:

Field
Installations From DVD
Installations From Remote Filesystem

Directory

Directory on the DVD that holds the installer.

If the file is in the root directory, enter a slash (/).

Directory on the SFTP server that holds the installer.

If the file is in the root directory, enter a slash (/).

Server

Hostname or IP address of the SFTP server

User Name

Credentials for an account that has access to the SFTP server.

User Password

Transfer Protocol

Choose SFTP.


Step 9 Select Next.

Step 10 Choose the software image to install, if prompted, then select Next.

Step 11 Wait for the software to download, if you are installing from a remote volume.

This may take some time.

Step 12 If you are installing from a remote volume, verify that the MD5 Hash Value that you see in the window matches the MD5 value on the page from which you downloaded the software image.

Step 13 Choose one of the following:

To
Do This

Reboot immediately after upgrade and make the new software active.

1. Choose Reboot to upgraded partition.

2. Select Next.

3. Wait for the system to reboot.

This may take some time. The system does not notify you when the process is complete.

4. Sign in to the Admin Portal when it is available.

Install the upgrade and then manually reboot later to the upgraded partition.

1. Choose Do not reboot after upgrade.

2. Select Next.

3. Scroll down periodically in the Installation Log and look for a message that the process is complete.

This process may take some time.

4. Select Finish.

To activate the upgrade:

a. Sign into the Cisco Unified OS Administration page with your platform credentials.

b. Choose Settings > Version.

c. Select Switch Version.

d. Wait for the system to reboot.

This may take some time. The system does not notify you when the process is complete.

e. Try periodically to access the Admin Portal.



Related Topics

For Upgrades from Release 7.0(1): Reverting to a Previous Version of Cisco Unified Mobility Advantage, page 19-22

What To Do Next

If this is an upgrade from Release 3.1.2: Follow the procedures in Adding New Functionality, Client Software, and Users After Upgrade.

If you are upgrading from Release 7.0(1):

You do not need to change existing Release 7.0(1) configurations unless you are adding or changing functionality or enterprise servers.

Upload the new .oar file for the latest client software. See How to Make Client Software Available for Use, page 13-1.

Restart Cisco Unified Mobility Advantage.