Installation and Administration Guide for Cisco Unified Mobility Advantage, Release 7.0
Using the Configuration Wizard in Cisco Unified Mobility Advantage
Downloads: This chapterpdf (PDF - 264.0KB) The complete bookPDF (PDF - 4.1MB) | Feedback

Using the Configuration Wizard in Cisco Unified Mobility Advantage

Table Of Contents

Using the Configuration Wizard in Cisco Unified Mobility Advantage

Logging in to the Admin Portal for the First Time

How to Use the Configuration Wizard

Configuring Security Context Management

Configuring the Connection to Active Directory

Configuring the Connection to Microsoft Exchange

Configuring the Connection to the Voicemail Server

Configuring the Connection to Cisco Unified Communications Manager

Configuring the Connection to Cisco Unified Presence

Viewing Configuration Summaries for Connections to Enterprise Servers

Completing the System Configuration Screen

Configuring Server Setup Network Configuration

Uploading the Client Software to the Server

Managing Provisioning Options

Finishing the Configuration Wizard

Downloading the Self-Signed Certificate (After Running the Configuration Wizard)

Performing Additional Required Procedures


Using the Configuration Wizard in Cisco Unified Mobility Advantage


Revised Date: April 17, 2009

After you install, configure Cisco Unified Mobility Advantage using the configuration wizard.

Logging in to the Admin Portal for the First Time

How to Use the Configuration Wizard

Downloading the Self-Signed Certificate (After Running the Configuration Wizard)

Performing Additional Required Procedures

Logging in to the Admin Portal for the First Time

Before You Begin

Make sure that you have the Cisco Unified Mobility Advantage Administrator password you specified during installation.

Procedure


Step 1 Enter the following URL into a supported web browser:

http://hostname or IP Address of the Cisco Unified Mobility Advantage server:7080/adminportal

For example: http://mycompany.com:7080/adminportal

Step 2 Enter the password

The username is admin; you cannot change it.

Step 3 Select Login.

Step 4 Select Next to start the configuration wizard.


Troubleshooting Tip

If you see a "Page Not Found" error, the system may not yet be ready. Try waiting a few more minutes.

How to Use the Configuration Wizard

The Configuration Wizard prompts you through the steps required to configure Cisco Unified Mobility Advantage for your system.

The main sections of the configuration wizard are:

Configuring Security Context Management

Configuring the Connection to Active Directory

Configuring the Connection to Microsoft Exchange

Configuring the Connection to the Voicemail Server

Configuring the Connection to Cisco Unified Communications Manager

Configuring the Connection to Cisco Unified Presence

Viewing Configuration Summaries for Connections to Enterprise Servers

Completing the System Configuration Screen

Configuring Server Setup Network Configuration

Uploading the Client Software to the Server

Managing Provisioning Options

Finishing the Configuration Wizard


Caution Gather, note, and print the information you will need to complete this Configuration Wizard. See Preparing Information Required for Installation and Configuration, page 1-6.


Note Do not select the Back button in your browser window or you will lose any unsaved information you have entered.



Tip You can stop running the wizard at any time and your changes will be saved. When you next sign in, the wizard will resume where you stopped.


Configuring Security Context Management

Security Contexts manage security policies and server identity-verification certificates for connections between Cisco Unified Mobility Advantage and other enterprise servers.

Configuring server security can be quite complicated. The simplest recommended configuration is documented here. After Cisco Unified Mobility Advantage is up and running and you have verified that all functionality and features are working correctly, you can modify the security configuration if you require greater security.

You will create two Security Contexts in this procedure. Use one for the relationship with the Cisco Adaptive Security Appliance and use the other for relationships with all other enterprise servers. You will configure these relationships later in the Configuration Wizard when you configure the adapters for each enterprise server.

Before You Begin

Obtain the ISO country code for the country where your company is located. Visit http://www.iso.org/iso/country_codes/iso_3166_code_lists/english_country_names_and_code_elements.htm.

Procedure


Step 1 Select Create for Do you want to create/upload a new certificate?

Step 2 Enter information. All information is required.

Field
Values For The First Security Context
Your Value

Context Name

Enter cuma

cuma

Description

Enter trusted_certificates

trusted_certificates

Trust Policy

Select Trusted Certificates

Trusted Certificates

Client Authentication Policy

Select None.

None

Certificate Password

Enter the password you want to assign to this certificate. The password must be at least six characters in length.

Note this password in a safe place. You may need it later.

 

Server Name

Enter the fully qualified hostname of this server.

 

Department Name

Enter the name of the department that will be using Cisco Unified Mobility Advantage, if restricted to one department.

This value must match the OU value you entered when you generated the Certificate Signing Request for the signed certificate from the Cisco Adaptive Security Appliance.

 

Company Name

Enter your company name.

 

City

Enter the city where the department or company is located.

 

State

Enter the state or province where the city is located.

For locations in the United States and Canada, the Certificate Authorities require that you spell out the full name. For example: California (not CA).

For other locations, there are no restrictions on this value.

 

Country Code

Enter the two-letter ISO country code for the country where the company is located.

 

Step 3 Select Next.

Step 4 Ignore this instruction: "Please submit a request to the certificate signing authority (CSA) with the following CSR" and select Next.

You see this question: Is there any certificate that needs to be imported?

Step 5 Select No.

Step 6 Select Next.

Step 7 Select Yes to the question Do you want to create one more context?

Step 8 Select Next.

The Security Context is created with a self-signed certificate. You will return to this later.

Step 9 Select Next.

Step 10 Select Create for Do you want to create/upload a new certificate?

Step 11 Enter information:

Field
Values for The Second Security Context

Context Name

Enter cuma_trust_all

Description

Enter trust_all_certificates.

Trust Policy

Select All Certificates

Client Authentication Policy

Select None

Certificate Password

Enter the password you want to assign to this certificate. The password must be at least six characters in length.

Server Name

This information should be the same as for the Security Context you just configured.

Department Name

Company Name

City

State

Country Code


Step 12 Select Next.

Step 13 Skip this instruction: "Please submit a request to the certificate signing authority (CSA) with the following CSR."

Step 14 Select Next.

Step 15 Select No to the question: Is there any certificate that needs to be imported?

Step 16 Select Next.

Step 17 Select No to the question Do you want to create one more context?

Step 18 Select Next.

The Security Context is created with a self-signed certificate. You will return to this later.

Step 19 Select Next.


Related Topics

Downloading the Self-Signed Certificate (After Running the Configuration Wizard)

Configuring the Connection to Active Directory

Active Directory acts as both the repository for corporate contact information and the authenticating authority for user sessions.

Configure Cisco Unified Mobility Advantage to communicate with Active Directory.


Note Accept the default values where they appear unless you have specific reasons to change them.


Procedure


Step 1 Select and enter your corporate directory server information:

Field
Description

Corporate Directory Type

Select Active Directory.

Other directory types are not supported in this release.

Adapter Name

Enter a name you want to assign to the corporate directory adapter.

Description

Enter a description for the corporate directory adapter.


Step 2 Select Next.

Step 3 Enter the host name or IP address of the corporate directory server:

Field
Description
Your Value

Active Directory

Hostname or IP Address

Hostname or IP address of the Active Directory server.

 

Active Directory Port

LDAP port of the corporate directory server. Cisco Unified Mobility Advantage uses this port to connect to the corporate directory for user directory listing and searches.

Default is 389.

The wizard attempts to detect this port; if successful, do not change it.

 

Step 4 Select Next.

Step 5 Select a Base DN from the list or select Edit if to add or modify the Base DN:

Field
Description
Your Value

Base DN

Distinguished name of the root node in your corporate directory server.

This is the level in the corporate directory hierarchy at which Cisco Unified Mobility Advantage starts searches.

If you are deploying Cisco Unified Mobility Advantage for the entire company, set this value to the base level for the company. For example:

DC=example,DC=com

If you are deploying Cisco Unified Mobility Advantage for a single organizational unit, you may choose the base level for this organizational unit. For example:

OU=Sales,DC=example,DC=com

Microsoft recommends that Organizational Units be limited to fewer than 1000 entries.

 

Step 6 Select Next.

Step 7 Change the additional information that appears, if necessary.

Field
Description
Your Value

Filter Criteria

Criteria that distinguish employees from other resources in Active Directory, such as conference rooms that can be "invited" to meetings.

Do not change the default value unless you have a specific reason to do so.

 

Follow Referral

Determines if Cisco Unified Mobility Advantage follows referrals from the authoritative Active Directory server to cascaded Active Directory servers, for example for subdomains, when searching.

The default value is True.

 

Polling Period (days)

Frequency (in days) with which Cisco Unified Mobility Advantage checks the corporate directory server for updates.

The default is 1 day.

 

Phone Number Format

The format you enter here must match the format of the following phone numbers:

For releases of Cisco Unified Communications Manager later than 4.x: The primary directory number for each person in Cisco Unified Communications Manager.

For Cisco Unified Communications Manager Release 4.x: Phone numbers in Active Directory in the attribute you specify for the Work Phone field in the Advanced Settings described in the table below.

Be careful not to include any extra spaces, especially at the beginning or end of your number format.

The correct phone number format enables the system to identify callers by name if the phone numbers in your Active Directory do not use the North American Numbering Plan.

By default, Cisco Unified Mobility Advantage formats numbers using the North American Numbering Plan, (###) ###-####, where each # represents a digit. Up to ten digits will be formatted according to this pattern, starting from the right. Therefore:

If a number has five digits (for example, 12345), Cisco Unified Mobility Advantage searches Active Directory for the number in the format 1-2345.

If a number has six digits (for example, 123456), Cisco Unified Mobility Advantage searches Active Directory for the number in the format 12-3456.

If you do not use any punctuation at all, the number format for the same number of digits as the default would be ##########.

If you need to change this value after Cisco Unified Mobility Advantage is running, restart Cisco Unified Mobility Advantage after you make this change.

 

Connection Type

Type of connection to use between Cisco Unified Mobility Advantage and the Active Directory server.

Select SSL for secure connections.

Select Plain for nonsecure connections.

This should match the connection type that Active Directory requires.

 

Security Context

This field appears if you selected SSL for Connection Type.

Select the cuma_trust_all Security Context that you created at the beginning of the wizard.

 

Step 8 Select Next.

Step 9 Enter information for the account that Cisco Unified Mobility Advantage Server uses to read data from your corporate directory server:

Field
Description
Your Value

Admin DN

Enter the distinguished name of the account that Cisco Unified Mobility Advantage uses to read data from your corporate directory server.

For example:

CN=CUMA Read Only User,CN=Users,DC=department,DC=example,DC=com

This account must have at least read-only permissions in your corporate directory server.

It must also have a valid Exchange mailbox.

 

Password

The password for the Admin DN account.

 

Append Base DN

If you entered the short form of the Admin DN (Domain name/User ID) instead of the long form including the container name, check the box to append the Base DN to the Admin DN.

 

Step 10 Select Next.

You see the fields in Active Directory that hold directory information for each user.

Field
Description
Your Value

Distinguished Name

Attribute name in Active Directory that represents the distinguished name of a user. For example:

distinguishedName

 

First Name

Attribute name in Active Directory that represents the first name of a user. For example:

givenName

 

Last Name

Attribute name in Active Directory that represents the last name of a user. For example:

sn

 

User ID

Attribute name in Active Directory that represents the corporate name of a user. For example:

sAMAccountName

 

Email

Attribute name in Active Directory that represents the email address of a user. For example:

mail

 

Step 11 Select Edit only if you have a specific reason to change the default values.

Step 12 Select Next.

You see information that Cisco Unified Mobility Advantage uses to determine which Microsoft Exchange server at your company holds the information for each user:

Field
Description
Your Value

Contact Adapter

Enter the name of the attribute within the corporate directory that identifies the logical Exchange server resource name for a user.

For example:

msExchHomeServerName

 

DNS Host Name

Enter the name of the attribute within the corporate directory that identifies the DNS host name of a server machine.

For example:

dNSHostName

 

Contact Adapter DN Mask

Enter a mask for the Contact Adapter DN value. The format of the DN Mask is:

??,CN=Computer,DC=department,DC=example,DC=com

Cisco Unified Mobility Advantage will use the value of the Contact Adapter field (entered above) in combination with this DN Mask to search for the DNS hostname of a user's Exchange Server.

?? is substituted with the CN=<hostname of the Exchange server>. The following part is used to complete the DN. This complete string is then used to retrieve details about the user's Exchange host.

The hostname is retrieved from Active Directory using the Contact Adapter attribute of the user entry. Contact Adapter (msExchHomeServerName).

For example, if in Active Directory for user test1, the msExchHomeServerName is "myExchange" and the DN Mask is configured as ??, CN=Computer, DC=myDivision, DC=somecompany, DC=com, then the Cisco Unified Mobility Advantage Enterprise server will lookup the following entry in Active Directory to get details about the Exchange server and use it to store personal contacts of the test1 user:

CN=myExchange, CN=Computer, DC=myDivision, DC=somecompany, DC=com

 

Contact Adapter Search Base

Enter the Distinguished Name of the root node that contains your Exchange Server's information in your corporate directory. For example:

CN=Computers,DC=department,DC=example,DC=com

Cisco Unified Mobility Advantage searches the Exchange Server from this root node.

Use the lowest node that includes the necessary names. Using a higher node will create a larger search base and thus reduce performance if the directory is very large.

Microsoft retrieves up to 1000 results per search.

 

Step 13 Select Edit only if you have a specific reason to change the default values.

Step 14 Select Next.

Step 15 Review the information on the Corporate Directory Configuration Summary screen.

To change any setting, select Reset. Otherwise, select Next.


Configuring the Connection to Microsoft Exchange

Cisco Unified Mobility Advantage uses Microsoft Exchange for:

Directory Lookup for personal contacts of users

Caller identification of people who are in the personal contact list of users

Triggering meeting notifications

Configure Cisco Unified Mobility Advantage to communicate with the Exchange server.

Procedure


Step 1 Select or enter personal contact server information.

Field
Description

Personal Contact Server Type

Select MS Exchange 2000/2003.

Other personal contact servers are not supported in this release.

Adapter Name

Enter a name that you want to assign to this adapter.

Description

Enter a description for this adapter.


Step 2 Select Next

Step 3 Enter information:

Field
Description
Your Value

Hostname/IP Address

The hostname or IP address of the Exchange server.

If Microsoft Exchange is clustered, use the hostname associated with the Outlook Web Access (OWA) bridgehead.

 

Transport Type

TLS is the secure transport type. Select TLS if Exchange is running SSL.

TCP is the nonsecure transport type. Select TCP if Exchange is not running SSL.

 

Step 4 Select Next.

Step 5 Enter information:

Field
Description
Your Value

Port

The port used to connect the Cisco Unified Mobility Advantage Server to the Exchange server. This is the Outlook Web Access (OWA) port of the Exchange server.

The default port for SSL connections is 443.

The default port for non-SSL connections is 80.

 

Exchange Domain

The domain for this instance of the Exchange server. For example, CORP.

This is the domain that users use when logging into their Windows desktops.

 

User Name Suffix

The suffix that is appended to usernames to complete corporate email addresses.

Leave this field blank unless you have a specific reason to change it, for example if you have email addresses with subdomains such as sales.yourcompany.com that resolve to a single domain such as yourcompany.com.

If email addresses cannot be determined from Active Directory, obtain this value from your Exchange administrator.

This suffix must be a fully qualified DNS domain name. It is often, but not always, yourcompany.com. Do not include the @ character.

 

Step 6 Select Next.

Step 7 Specify whether Cisco Unified Mobility Advantage will integrate with your conferencing application (Cisco Unified MeetingPlace or Cisco Unified MeetingPlace Express):

Field
Description
Your Value

Enable Conference Integration

Specify whether or not to provide conference notifications to Cisco Unified Mobile Communicator users.

 

Polling Period (sec)

These values apply when you integrate Cisco Unified Mobility Advantage with your conferencing system.

Do not change the default values.

 

Max Threads

 

Polling Offset (min)

 

Step 8 Select Next.

Step 9 Review the information on the summary screen. To change any setting, select Reset.

Step 10 Select Next.


Configuring the Connection to the Voicemail Server

Procedure


Step 1 Select Yes to configure a voicemail adapter if Cisco Unified Mobility Advantage will connect to Cisco Unity or Cisco Unity Connection.

Step 2 Select Next.

If you selected Yes, continue with this procedure.

If you selected No, skip the rest of this procedure.

Step 3 Select or enter the voicemail server information:

Field
Description

Voicemail Adapter Type

Select the type of voicemail server that your company uses. For example, Cisco Unity.

Adapter Name

Enter a name that you want to assign to the voicemail adapter.

Description

Enter a description for the voicemail adapter.


Step 4 Select Next.

Step 5 Enter information:

Field
Description
Your Value
IMAP Information

Unity Exchange Hostname/IP Address

For Cisco Unity: Hostname of the Exchange server.

If you have users on more than one Exchange server, create a separate Cisco Unity adapter for each Exchange server.

For Cisco Unity Connection: IP address of the Cisco Unity Connection server.

If you have users on more than one Cisco Unity Connection server, create a separate adapter for each Cisco Unity Connection server.

 

Transport Type

Choose the connection type for connections to the Exchange server (for Cisco Unity) or to the Cisco Unity Connection server.

This setting must match the setting on the Exchange or Cisco Unity Connection server.

Select TLS for secure connections (SSL on Exchange or TLS on Cisco Unity Connection).

Select TCP for nonsecure connections.

 

Security Context

You see this option only if you chose TLS as the Transport Type and you are connecting to Cisco Unity Connection.

Choose cuma_trust_all.

 

Port

If Transport Type is TCP:

For Cisco Unity: Default is 143.

For Cisco Unity Connection: Default is 7993

If Transport Type is TLS:

For Cisco Unity: Default is 993

For Cisco Unity Connection: Default is 7993

 

Polling Period (sec)

Enter the frequency with which Cisco Unified Mobility Advantage checks for new voice messages.

The default is every 600 seconds.

Very frequent polling may impact performance.

 

Are the Voicemail credentials for the user the same as the corporate credentials?

Select Yes if the user ID and password for the user account on the voicemail system are the same as in Active Directory.

Select No otherwise.

 

Unity Version

This field applies only if you are connecting to Cisco Unity.

Select the Unity server version.

If your version is Cisco Unity 7.x, enter the following SOAP information.

 
SOAP Information
Information in this section applies only if you are connecting to Cisco Unity Version is Release 7.x.

Unity Host Name/ IP Address

Enter the host name or IP address of the Cisco Unity server.

This may or may not be the same as the Unity Exchange Host Name/IP Address which hosts the voice messages that are retrieved by IMAP, which you entered above.

 

Transport Type

Select TLS for SSL connections.

Select TCP for nonsecure connections.

This must match the connection type you specify in Cisco Unity.

 

Port

Enter the SOAP port. The default port for TLS is 443, and the default for TCP is 80.

 

Unity Backup Host Name/ IP Address

Enter the host name or IP address of a back up Cisco Unity server if you have one.

 

Application User Name

Enter the Unity Application User ID. This is the same user ID that you use to sign in to the Cisco Unity Administration page.

 

Application Password

Enter the Password for the Unity Application User.

 

Domain

Enter the Microsoft Exchange or NT domain of the Cisco Unity inbox.

Note This is not the Fully Qualified Domain Name domain.

 
Additional Information

Security Context

Choose cuma_trust_all.

 

Step 6 Select Next.

Step 7 Accept the default values for the following fields unless you have specific reason to change them.

Field
Description
Your Value

Phone number search field name

Field to search the phone number of a caller.

Default is Subject.

We recommend that you do not change the default value.

 

Phone number search pattern

Regular expression for the search pattern that should be used in the Phone Number Search Field Name field.

This information is used to identify callers by matching information from Cisco Unity and Cisco Unified Communications Manager with existing contact information in Exchange and Active Directory.

Default is the regular expression [0-9]{4,}

We recommend that you do not change the default value.

 

Step 8 Select Next.

Step 9 Select options for voicemail integration.

Field
Description
Your Value

Enable Corporate Voicemail Integration

Determine whether or not the Cisco Unified Mobility Advantage Server integrates with your corporate voicemail system and provides voice message viewing and listening capabilities on Cisco Unified Mobile Communicator.

 

Maximum Expiry of Voicemails (days)

The maximum number of days that voice messages will be listed in the client.

Default is 30.

 

Step 10 Select Next.

Step 11 Review the information on the summary screen. To change any setting, select Reset.

Step 12 Select Next.


Configuring the Connection to Cisco Unified Communications Manager

Configure Cisco Unified Mobility Advantage to integrate with Cisco Unified Communications Manager to provide call-related features such as unified call logs, MobileConnect, and Dial via Office. Available features and exact configuration depend on your version of Cisco Unified Communications Manager.

Before You Begin

You will need the following information:

The usernames and passwords for the CTI-enabled "super user" accounts you created in Creating CTI-Enabled "Super User" Accounts, page 3-3.

(For Cisco Unified Communications Manager Release 5.x through 7.x) The AXL User ID and password in Configuring Standard AXL API Access to Retrieve User Information, page 3-5.

(For Cisco Unified Communications Manager Release 4.x) The Directory Lookup rules you will need. You determined these in Preparing Information Required for Installation and Configuration, page 1-6.

Procedure


Step 1 Select Yes at the prompt to configure a call control adapter.

Step 2 Select Next.

Step 3 Enter information:

Field
Description

Call Control Server Type

Select Cisco Unified Communications Manager.

Adapter Name

Enter a name of your choice.

Description

Enter a description.


Step 4 Select Next.

Step 5 Enter information for Cisco Unified Communications Manager. The exact fields you see depend on the Cisco Unified Communications Manager version. Be sure to scroll down in the wizard to see all fields.

Field
Description
Your Value
Address Information
 

Primary Host Name

Enter the hostname or IP address of the primary Cisco Unified Communications Manager server on which you configured the CTI-enabled "super user" account or accounts.

 

Primary Server Port

Enter the port used to communicate with the primary Cisco Unified Communications Manager server.

The default is 5060.

 

Backup Host Name

(Optional) Enter the backup server host name or IP address.

 

Backup Server Port

Enter the port used to communicate with the backup Cisco Unified Communications Manager server.

 
CTI User Credentials
 

User Name

Enter the CTI-enabled "super user" you created in Cisco Unified Communications Manager.

If you created more than one "super user," select Add More to add each.

 

Password

Enter the password or passwords associated with the user ID or names above.

 
SIP Information

Transport Type

Select TLS for secure connections.

Select TCP for normal connections.

Select UDP for connections without error correction.

The default transport type is TCP.

This must match the setting in the "CUMA Server Security Profile" on the Cisco Unified Communications Manager server.

 

Communications Manager Version

Select the version of Cisco Unified Communications Manager.

 

For Release 7.0(1): SOAP Information

(In the Admin Portal in Release 7.0(2), this label is Web Services Information)

The following fields appear only if you choose Cisco Unified Communications Manager Release 7.x.

 

Https Port

Enter the SIP port number of the Cisco Unified Communications Manager server. This is often the same secure port that runs the Cisco Unified Communications Manager Administration page.

Cisco Unified Communications Manager runs the AXL interface on this port.

The default is 8443.

 

User Name

Enter the Cisco Unified Communications Manager Application User ID to which you assigned standard AXL API access.

 

Password

Enter the Password for the user in the row above.

 
Additional Information
 

Security Context

This field appears only if you selected TLS for Transport Type.

Select cuma_trust_all.

 

Step 6 Select Next.

Step 7 Select Next on the Dial Rule Instructions page if you are using any version of Cisco Unified Communications Manager other than Release 4.x.

Step 8 (For Cisco Unified Communications Manager Release 4.x only) Enter the directory lookup rules you planned earlier.

Step 9 Select Next.

Step 10 Select options for Cisco Unified Communications Manager integration.

Field
Description

Enable Corporate PBX Integration

Select Yes:

To allow users to view in Cisco Unified Mobile Communicator lists of calls they make and receive on all of their office phones

To enable the Dial via Office feature.

Select No to allow users to view in Cisco Unified Mobile Communicator only the calls they make and receive on Cisco Unified Mobile Communicator, and to disable the Dial via Office feature.

Enable Dial Via Office

This option is available only for Cisco Unified Communications Manager Release 7.x and only if you enable corporate PBX integration.

Select Yes to enable the Dial via Office feature on Cisco Unified Mobile Communicator.

To enable Dial Via office, both "Enable Corporate PBX Integration" and "Enable Dial Via Office" must be set to Yes.

Dial Via Office Policy

This option is available only for Cisco Unified Communications Manager Release 7.x, and only if you enable Dial Via Office.

Select User Option to allow users to choose whether to use the Dial via Office feature for dialing calls.

Select Force Dial Via Office to require all users to dial all calls as if they were coming from the office.

Dial Via Office Emergency Numbers

This option is available only for Cisco Unified Communications Manager Release 7.x, and only if you enable Dial Via Office.

Enter phone numbers that will always be dialed directly from the mobile phone and never be dialed via the office.

These can be emergency numbers or other numbers such as directory information numbers.

For example, in the United States these might include 911 and 411.

Maximum Expiry of Call Logs (days)

Indicates the maximum value that a user can select for the number of days within which call logs will be sent to the client.

Default is 30.


Step 11 Select Next.

Step 12 Review the information on the summary screen. To change any setting, select Reset.

The "Dial Rule Configuration" section is referring to the Directory Lookup configuration.

Step 13 Select Next.


Configuring the Connection to Cisco Unified Presence

This server allows Cisco Unified Mobile Communicator users to see the availability status of other users.

Configure Cisco Unified Mobility Advantage to communicate with Cisco Unified Presence to provide this service.

Procedure


Step 1 Choose Yes if you want to integrate Cisco Unified Mobility Advantage with a Cisco Unified Presence server.

Step 2 Select Next.

If you selected Yes, continue with this procedure.

If you selected No, skip the rest of this procedure.

Step 3 Enter the Cisco Unified Presence Server adapter information:

Field
Description

CUP Server Type

Select Cisco Unified Presence.

Adapter Name

Enter a name that you want to assign to the Cisco Unified Presence Server adapter.

Description

Enter a description for the Cisco Unified Presence Server adapter.


Step 4 Select Next.

Step 5 Enter information:

Field
Description
Your Value

Host Name/IP Address

Hostname or IP address of the Cisco Unified Presence server to which all Cisco Unified Mobility Advantage users are assigned.

 

Port

Port on which Cisco Unified Mobility Advantage will communicate with Cisco Unified Presence.

(The port of the SOAP Web Service interface that Cisco Unified Presence listens on to accept user sign-in requests.)

The default is 8443.

 

Backup Host Name/ IP Address

(Optional) Hostname or IP address of the backup Cisco Unified Presence Server, if you have one.

 

Application User Name

The user ID of the Application User you created in Cisco Unified Presence for Cisco Unified Mobility Advantage.

 

Application Password

Password for this Application User.

 

Security Context

Select cuma_trust_all.

 

Step 6 Select Next.

Step 7 Accept the default SIP settings for the Cisco Unified Presence Server, unless you have specific reasons to change them.

Field
Description
Your Value

Default Subscription Interval

Default is 3600.

 

Transport Type

Default is TCP.

If you configured Cisco Unified Presence to require a TLS connection, you must select TLS here.

 

Listen Port

Default is 5060.

 

Min Connections

Default is 5.

 

Max Connections

Default is 20.

 

Max Load Per Connection

Default is 200.

 

Step 8 Select Yes to enable users to share availability status information.

Step 9 Select Next.

Step 10 Review the information on the summary screen. To change any setting, select Reset.

Step 11 Select Next.


Viewing Configuration Summaries for Connections to Enterprise Servers

Procedure


Step 1 Select the Host Name/IP Address of any server for which you want to view a configuration summary.

Step 2 Select Next when you are satisfied with your configurations.

You see the System Configuration screen


Completing the System Configuration Screen

The System Configuration screen allows you to determine the Cisco Unified Mobility Advantage Server domain information and SMTP server information. The Cisco Unified Mobility Advantage Server uses the SMTP server to send out device provisioning to BlackBerry clients.

Before You Begin

The SMTP Server must allow relaying from Cisco Unified Mobility Advantage. For information, contact your SMTP server administrator or see the documentation for your SMTP server.

Procedure


Step 1 Enter information:

Field
Description
Your Value
General
 

Domain

Enter a domain name for this instance of the Cisco Unified Mobility Advantage Server. This forms the address of the Cisco Unified Mobile Communicator user. For example:

cisco.com

This should match the Proxy domain of the Cisco Unified Presence server.

 

Session Timeout (days)

Enter the number of days after which users must sign in again to Cisco Unified Mobile Communicator.

 
SMTP Server Configuration
 

Host Name

Enter the hostname of your SMTP gateway. This must be the same as your Exchange hostname if you use the Exchange server as your SMTP gateway.

 

Port

Enter the port number for the SMTP gateway. Usually, this is 25.

 

Authentication Required

Specify whether or not your organization requires authentication for access to the SMTP server.

 

Admin Email

Enter the email address of the Cisco Unified Mobility Advantage administrator.

Cisco Unified Mobility Advantage uses this email address to send provisioning messages and alerts to users.

 

SMTP Authentication Password

If you selected True for Authentication Required, enter the password associated with the account you entered for the Admin Email address in the previous row of this table.

 

Step 2 Select Next.


Configuring Server Setup Network Configuration

Configure Cisco Unified Mobility Advantage to communicate with the Cisco Adaptive Security Appliance and Cisco Unified Mobile Communicator clients.

Before You Begin

You will need the Proxy Host Name that you obtained in Obtaining IP Addresses and DNS Names from IT, page 1-3.

You will need the port numbers you obtained in Opening Firewall Ports, page 1-5.

Procedure


Step 1 Enter information:

Field
Description
Your Value
Proxy Server Information
 

Proxy Host Name

Host name that clients will use to connect through the Cisco Adaptive Security Appliance to Cisco Unified Mobility Advantage. You obtained this value when you completed preinstallation steps.

The hostname must be routable from the Internet.

The Proxy Host Name should resolve to the external IP address that you received from your IT administrator.

 

Proxy Client Connection Port

Enter the port that is used for secure communication between the Cisco Unified Mobile Communicator client and the Cisco Adaptive Security Appliance.

 

 

Proxy Client Download Port

Enter the port through which clients connect to the Cisco Adaptive Security Appliance for wireless downloads of Cisco Unified Mobile Communicator.

For BlackBerry-only deployments:

This field is not used for BlackBerry clients if you will distribute the client software only through the BlackBerry Enterprise Server. However, you must enter a value. Enter any number within the allowed range.

 
Managed Server Information
 

Client Connection Port

Enter the port that Cisco Adaptive Security Appliance uses to connect to Cisco Unified Mobility Advantage.

The Cisco Adaptive Security Appliance translates this port to the Proxy Client Connection Port for Cisco Unified Mobile Communicator client connections to the Cisco Adaptive Security Appliance.

 

 

User Portal Port

Enter the port users will use to access the Cisco Unified Mobile Communicator User Portal.

The range is 9400-9500.

The default value is 9443.

For security, this port should be available only behind your corporate firewall.

 

Client Download Port

The port on which users will download the client software.

This port is translated to the Proxy Client Download Port for client connections to the Cisco Adaptive Security Appliance.

For BlackBerry-only deployments:

This field is not used for BlackBerry clients if you will distribute the client software through the BlackBerry Enterprise Server. However, you must enter a value. Enter any number within the allowed range.

 

Security Context

Select the cuma Security Context that you created at the beginning of the wizard.

 

Step 2 Select Next.

The Server Setup Summary screen appears.

Step 3 Review the information. To change information, select Reset.

Step 4 Select Next.


Uploading the Client Software to the Server

You must upload the Cisco Unified Mobile Communicator client software onto the Cisco Unified Mobility Advantage server for distribution to user devices. All client software for this release is distributed in a single file with a .oar filename extension.

Before You Begin

Obtain the Cisco Unified Mobile Communicator software .oar file for this release.

Cisco Unified Mobile Communicator is provided on a separate CD from Cisco Unified Mobility Advantage, or you can download it from Cisco.com. The CD or downloaded software file contains Cisco Unified Mobile Communicator software for supported mobile phone technologies and information for configuring supported phones.

You should be looking at the Handset Platform Management window in the Configuration Wizard.

Procedure


Step 1 Browse to or enter the location of the Cisco Unified Mobile Communicator software.

Step 2 Select Next.

When the upload is successful, you see a list of the handset platforms and versions of Cisco Unified Mobile Communicator now installed in Cisco Unified Mobility Advantage.

Step 3 Select Next.


Managing Provisioning Options

Choose the country, mobile phone service providers, and supported handset models your deployment will support.

Procedure


Step 1 Select the arrow beside a country to view the supported mobile service providers in that location.

Step 2 Select the arrow beside a provider to view the devices that provider supports.

Step 3 Select the country, mobile phone service providers, and supported handset models for your deployment.

Checking a box selects each box in the list under that entity, whether or not you see the list. Uncheck boxes as needed, or start by checking each device to support.

Windows Mobile is currently available in English only.

On Nokia Symbian phones, Release 7.0 is available in English, while French, German, Spanish, and Italian are supported in Release 3.x.

BlackBerry clients have separate installers for each supported language:

de = German

en = English

es = Spanish

fr = French

it = Italian

Step 4 Select Next.


Finishing the Configuration Wizard

The Summary screen displays your Cisco Unified Mobility Advantage settings.

Procedure


Step 1 Review the configuration summary. Select Reset under any area to make changes to that area.

Step 2 Select Finish.

Step 3 Select No if you see a prompt to start the Managed Server (Cisco Unified Mobility Advantage).


What To Do Next

Continue with the remaining sections in this chapter.

Downloading the Self-Signed Certificate (After Running the Configuration Wizard)

You must import this certificate into the Cisco Adaptive Security Appliance.

Procedure


Step 1 Sign in to the Cisco Unified Mobility Advantage Admin Portal.

Step 2 Select Security Context Management.

Step 3 Select Security Contexts.

Step 4 Select Manage Context beside the cuma security context.

This is the first Security Context you created above.

Step 5 Select Download Certificate.

Step 6 Save the file.


What To Do Next

See Importing a Self-Signed Certificate from Cisco Unified Mobility Advantage.

Performing Additional Required Procedures

Before Cisco Unified Mobile Communicator clients can connect, you must also perform the following procedures in order.

Procedure

To
More Information

Complete essential security configuration.

All remaining procedures in Deploying Self-Signed Certificates: Cisco Adaptive Security Appliance.

Depending on the security requirements of your other enterprise servers, download certificates from Cisco Unified Mobility Advantage and import them into the relevant servers.

Downloading Self-Signed Certificates from Cisco Unified Mobility Advantage, page 9-11.

Importing Certificates into Cisco Unified Operating System Servers, page 3-16.

For other enterprise servers (such as Active Directory or Cisco Unity), see the documentation for those servers.

Start Cisco Unified Mobility Advantage

Starting Cisco Unified Mobility Advantage, page 11-1

Activate users

Activating Users, page 14-1

Restricting Access By Device, page 14-2

Provision devices

Chapter 15, "Provisioning Windows Mobile Phones in Cisco Unified Mobility Advantage"

Chapter 16, "Deploying Cisco Unified Mobile Communicator on BlackBerry Devices"

Give users the information they need in order to use Cisco Unified Mobile Communicator

Information to Give to Users, page 14-3

Consider obtaining and deploying a signed certificate on the Cisco Unified Mobility Advantage server

This is recommended but not required, and you can do it later, after your system is running and you have tested it. See About Required and Recommended SSL Certificates, page 9-2.