Installing and Configuring Cisco Unified Mobility Advantage, Release 7.1
Using the Configuration Wizard in Cisco Unified Mobility Advantage
Downloads: This chapterpdf (PDF - 688.0KB) The complete bookPDF (PDF - 1.62MB) | Feedback

Using the Configuration Wizard in Cisco Unified Mobility Advantage

Contents

Using the Configuration Wizard in Cisco Unified Mobility Advantage

After a new install, configure Cisco Unified Mobility Advantage using the configuration wizard.

You will not use the configuration wizard for upgrades.

Logging in to the Admin Portal for the First Time

Before You Begin
  • You will need the password that you specified for the Cisco Unified Mobility Advantage Admin Portal during installation.

  • You can access the Cisco Unified Mobility Advantage Admin Portal using commonly-used web browsers.

  • The portal is designed for viewing at 96 DPI.


Procedure
Step 1   Enter the IP address or hostname of your Cisco Unified Mobility Advantage server into a supported web browser.
Step 2   Select Cisco Unified Mobility Advantage Administration.

If you see a "Page Not Found" error, the system may not yet be ready. Try waiting a few more minutes.

Step 3   Enter the password

The username is admin; you cannot change it.

Step 4   Select Login.

How to Use the Configuration Wizard

The Configuration Wizard prompts you through the steps required to configure Cisco Unified Mobility Advantage for your system.


Caution


Do not select the Back button in your browser window or you will lose any unsaved information you have entered.



Tip


You can stop running the wizard at any time and your changes will be saved. When you next sign in, the wizard will resume where you stopped.


Accepting the Usage Tracking Agreement

The first time you sign in to the Admin Portal, the system prompts you to respond to a Usage Tracking agreement.

In order to improve our products, Cisco uses a third-party tool, Google Analytics, to collect general information about activity and errors in the Admin and User Portals and in Cisco Mobile clients.

By default, Cisco does not collect personal information such as contact names, phone numbers dialed, caller identities, or any voicemail content. All information collected is stored by Google and is confidential.

Only Cisco has access to this information. This functionality is not currently available as a reporting tool for Administrators.

You can increase, decrease, or disable data collection after you complete the Configuration Wizard.

For more information, see the Usage Reporting documentation module for this release at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html.

Procedure
Step 1   Read the agreement.
Step 2   Select an option to continue with the Configuration Wizard.
Option Description

Accept

Enables data collection at the default level.

Reject

Disables data collection.

Step 3   Select Next.

Configuring Security Contexts

Security Contexts manage security policies and server identity-verification certificates for connections between Cisco Unified Mobility Advantage and other enterprise servers.

Configuring server security can be quite complicated, and exact requirements depend on the security requirements at your company. A configuration that should work in most environments is documented here. For more information, see the Security documentation module for your release at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html.

You will create two Security Contexts in this procedure. Use the first one for the relationship with the Cisco Adaptive Security Appliance (or your Cisco Mobile for BlackBerry clients, if your deployment includes no other devices or clients) and use the second one for relationships with all other internal servers. You will configure these relationships later in the Configuration Wizard when you configure the connection to each enterprise server.

Before You Begin
  • For the first security context:


  • For the second security context:

    Configure the simplest scenario by creating a security context that does not require an exchange of certificates between servers.


Procedure
Step 1   Select Add Context
Step 2   Select Create for Do you want to create/upload a new certificate?
Step 3   Enter information. All information is required.
Option For Deployments with a Cisco Adaptive Security Appliance For Deployments Without a Cisco Adaptive Security Appliance Your Value

Context Name

To coordinate with references elsewhere in this documentation, name this security context cuma.

cuma

Description

Enter trusted_certificates

trusted_certificates

Trust Policy

This value determines the type of certificate Cisco Unified Mobility Advantage requires of an enterprise server with which it initiates communication, such as Cisco Adaptive Security Appliance and Cisco Unified Communications Manager.

Select Trusted Certificates

Trusted Certificates

Client Authentication Policy

This setting determines whether Cisco Unified Mobility Advantage requires a certificate from clients or other servers that initiate a connection to it.

Select None.

None

Certificate Password

Enter the password you want to assign to this certificate. The password must be at least six characters in length.

Note this password in a safe place. You may need it later.

 

Server Name

Enter the fully qualified hostname of your Cisco Unified Mobility Advantage server.

This is different from the Proxy Host Name you entered when you created the Certificate Signing Request on the Cisco Adaptive Security Appliance.

Enter the fully qualified hostname of your Cisco Unified Mobility Advantage server.

 

Department Name

This value must match the OU value you entered when you generated the Certificate Signing Request for the signed certificate from the Cisco Adaptive Security Appliance.

Enter the name of the department that will be using Cisco Unified Mobility Advantage, if restricted to one department.

 

Company Name

This value must match the O value (company or organization name) you entered when you generated the Certificate Signing Request for the signed certificate from the Cisco Adaptive Security Appliance.

Enter your company name.

Use the exact name under which your company or organization is officially registered to conduct business. The certificate signing authority may validate this name against public business registration documents.

This value cannot contain any commas.

If the company name includes symbols requiring the shift key, see instructions at your Certificate Authority website.

 

City

Use the same value you entered when you generated the Certificate Signing Request for the signed certificate from the Cisco Adaptive Security Appliance.

Enter the city where the department or company is located.

 

State

Enter the state or province where the city is located.

Check with your supported Certificate Authority to determine exact requirements for this value. At publication, the requirements are:


  • For locations in the United States and Canada, spell out the full name. For example: California (not CA).

  • For other locations, there are no restrictions on this value.

 

Country Code

Enter the two-letter code for the country where the company is located.

You obtained this value while completing the prerequisites for this procedure.

 
Step 4   Select Next.
Step 5   Select Next. (Ignore this instruction: Please submit a request to the certificate signing authority (CSA) with the following CSR.)

You see this question: Is there any certificate that needs to be imported?

Step 6   Select No.
Step 7   Select Next.
Step 8   Select Yes to the question Do you want to create one more context?
Step 9   Select Next.
Step 10   Select Create for Do you want to create/upload a new certificate?
Step 11   Enter information for the security context for connections between Cisco Unified Mobility Advantage and other internal servers:
Option For Connections to Internal Servers Your Value

Context Name

To coordinate with references elsewhere in this documentation, name this security context trust_all

 

Description

Enter no_cert_required

 

Trust Policy

Select All Certificates

 

Client Authentication Policy

Select None.

None

Certificate Password

Enter the password you want to assign to this certificate. The password must be at least six characters in length.

Note this password in a safe place. You may need it later.

 

Server Name

This information should be the same as for the Security Context you just configured.

 

Department Name

Company Name

City

State

Country Code

Step 12   Select Next
Step 13   Skip this instruction: "Please submit a request to the certificate signing authority (CSA) with the following CSR."
Step 14   Select Next.
Step 15   Select No to the question: Is there any certificate that needs to be imported?
Step 16   Select Next
Step 17   Select No to the question Do you want to create one more context?
Step 18   Select Next

You see a list of the security contexts that you created.

Step 19   Select Next

Configuring the Connection to Active Directory

Configure Cisco Unified Mobility Advantage to communicate with Active Directory.

Cisco Unified Mobility Advantage uses Active Directory for:


  • Access authentication to the User Portal and Cisco Unified Mobile Communicator.

    All Cisco Unified Mobile Communicator users must be in Active Directory to enable Single Sign On.

  • Directory search for contacts from Cisco Unified Mobile Communicator

  • Number-to-name resolution for caller identification in the call logs in Cisco Unified Mobile Communicator.

  • Locating user information in Microsoft Exchange, if your deployment includes Exchange.

Restriction:
  • At least one Active Directory server is required.

  • Cisco Unified Mobility Advantage can connect to multiple Active Directory servers and to multiple OUs on the same Active Directory server, for example if you need to include users in different OUs. Create an adapter for each server or OU. Each user ID can appear in only one Active Directory.

  • If you deploy Cisco Unified Presence to provide availability status, Cisco Unified Mobility Advantage and Cisco Unified Personal Communicator must point to the same Active Directory server.

  • User IDs in Active Directory must match User IDs in Cisco Unified Communications Manager.

  • User IDs must be unique within the Search Base.

    All users sign in to Cisco Unified Mobile Communicator with their Active Directory credentials. Usernames cannot include any of the following: / \ [ ] : ; | = , + * ? < > @ \ " or spaces. Passwords cannot be blank. Passwords for iPhone clients are limited to 1024 characters. Passwords for other clients are limited to 14 characters. For iPhone users, credentials must include only characters that can be entered using the iPhone keypad.

  • Cisco Unified Mobility Advantage supports integration with multiple domains under the same directory tree structure. However, the domain of each user is not specified when you add users or in search results; if you have two users with the same name, you may need to add both and check the details for each user in Search/ Maintenance to see the OU. Note that for Exchange authentication, you must configure an Exchange adapter for each domain.


Note


Accept the default values where they appear unless you have specific reasons to change them.


Procedure
Step 1   Select and enter your corporate directory server information:
Option Description

Corporate Directory Type

Select Active Directory.

Other directory types are not supported in this release.

Adapter Name

Enter a name you want to assign to the corporate directory adapter.

Description

Enter a description for the corporate directory adapter.

Step 2   Select Next.
Step 3   Enter the host name or IP address of the corporate directory server:
Option Description Your Value

Host Name/ IP address

Hostname or IP address of the corporate directory server.

Step 4   Select Next.
Step 5   Enter the port if the system cannot automatically detect it:
Option Description Your Value

Port

LDAP port of the corporate directory server. Cisco Unified Mobility Advantage uses this port to connect to the corporate directory for adding users to Cisco Unified Mobility Advantage and for user directory listing and searches.

The default value for this field is 389.

The wizard attempts to detect this port; if successful, do not change the detected value.

 
Step 6   Select Next if you changed the default port.
Step 7   Select a Base DN from the list or select Edit if to add or modify the Base DN:
Option Description Your Value

Base DN

Distinguished name of the root node in your corporate directory server.

This is the level in the corporate directory hierarchy at which Cisco Unified Mobility Advantage starts searches.

If you are deploying Cisco Unified Mobility Advantage for the entire company, set this value to the base level for the company. For example:

DC=example,DC=com

If you are deploying Cisco Unified Mobility Advantage for a single organizational unit, you may choose the base level for this organizational unit. For example:

OU=Sales,DC=example,DC=com

Microsoft recommends that Organizational Units be limited to fewer than 1000 entries.

 
Step 8   Select Next.
Step 9   Change the additional information that appears, if necessary.
Option Description Your Value

Filter criteria

Criteria that distinguish employees from other resources in Active Directory, such as conference rooms that can be "invited" to meetings.

Do not change the default value unless you have a specific reason to do so.

 

Follow Referral

Determines if Cisco Unified Mobility Advantage follows referrals from the authoritative Active Directory server to cascaded Active Directory servers, for example for subdomains, when searching.

The default value is True.

If you select True, make sure the DNS names of all cascaded Active Directory servers are resolvable.

 

Polling Period (days)

Frequency (in days) with which Cisco Unified Mobility Advantage checks the corporate directory server for updates.

The default is 1 day.

 

Phone Number Format

In order to identify voice messages and dialed and received calls by name, Cisco Unified Mobility Advantage compares the dialed or received phone number with phone numbers in the various directories that are associated with Cisco Unified Mobility Advantage. When searching Active Directory, it looks at the numbers in the attributes that represent home phone, work phone and mobile phone. When a match is found, the name associated with the number is displayed in the call history or voicemail entry.

Use this field to specify the formatting required for matches with phone numbers in Active Directory to occur successfully.

Enter any number of any of the following: # ( ) - , and space, and, for Cisco Unified Communications Manager releases earlier than 7.1(3), . Be careful not to include any extra spaces, including at the beginning or end of your number format.

Cisco Unified Mobility Advantage transforms phone numbers for matching according to the pattern you enter, by inserting the phone number into the format digit by digit from right to left. It also searches for the unformatted number.

Thus, if your Phone Number Format is ## (###) ###-#### and a dialed number has 5 digits (for example, 12345), Cisco Unified Mobility Advantage searches for the number in the formats 1-2345 and 12345.

If Cisco Unified Communications Manager passes numbers with a leading +, for example if you use Directory Lookup rules to transform numbers for global dialing, substitute a #for the +. For example, instead of +# (###) ###-####, enter ## (###) ###-####.

If no single phone number format can represent all of the formats in your Active Directory, choose the single format that will result in the most matches. This release is limited to matching only one format string.

If you need to change this value after Cisco Unified Mobility Advantage is running, restart Cisco Unified Mobility Advantage after you make this change.

 

Connection Type

Type of connection to use between Cisco Unified Mobility Advantage and the corporate directory server.

Use SSL for secure connections.

Use Plain for nonsecure connections.

Make sure Active Directory supports the connection type you choose.

 

Security Context

This setting appears only if you choose SSL for Connection Type.

Select a Security Context for connections between Cisco Unified Mobility Advantage and Active Directory.

If you choose a security context that has the Trust Policy set to Trusted Certificates, you must validate the identity of the Active Directory server, for example by importing a self-signed certificate from Active Directory into the security context.

 
Step 10   Select Next.
Step 11   Enter information for the account that Cisco Unified Mobility Advantage Server uses to read data from your corporate directory server:
Option Description Your Value

Admin DN

The distinguished name of the account that Cisco Unified Mobility Advantage uses to read data from your corporate directory server.

For example:

CN=CUMA Read Only User,OU=Users,DC=department,DC=example,DC=com

This account must have at least read-only permissions in your corporate directory server.

 

Admin Password

The password for the Admin DN account.

 

Append Base DN

If you entered the short form of the Admin DN (Domain name/User ID) instead of the long form including the container name, check the box to append the Base DN to the Admin DN.

 
Step 12   Select Next.

If you see the fields in Active Directory that hold directory information for each user, accept the defaults unless you have reason to change them. Otherwise, skip to the end of this procedure.

Option Description Your Value

Distinguished Name

Attribute name in Active Directory that represents the distinguished name of a user. For example:

distinguishedName

 

First Name

Attribute name in Active Directory that represents the first name of a user. For example:

givenName

 

Last Name

Attribute name in Active Directory that represents the family name of a user. For example:

sn

 

User ID

Attribute name in Active Directory that represents the corporate name of a user.

This value must be sAMAccountName.

This must match the User ID for each user in Cisco Unified Communications Manager.

 

Email

Attribute name in Active Directory that represents the email address of a user. For example:

mail

 
Step 13   Select Edit only if you have a specific reason to change the default values.
Step 14   Check your configuration:
  1. Click Test Config.

  2. Look for the test result near the top of the page.

  3. Correct any errors indicated.

Step 15   Select Next.
Step 16   Review the information on the Corporate Directory Configuration Summary screen.

To change any setting, select Reset to clear this entire section and configure it again. Otherwise, select Next.


Configuring the Connection to Microsoft Exchange

Configure Cisco Unified Mobility Advantage to communicate with Microsoft Exchange, if your deployment includes Microsoft Exchange.

Cisco Unified Mobility Advantage uses Exchange for:


  • Directory Lookup for personal contacts of users

  • Caller identification of people who are in the personal contact list of users

  • Triggering meeting notifications or adding meetings to the Meeting List, depending on the client release

  • Deriving availability status from the Exchange calendar of each user (Release 7.0 clients only)

  • Voicemail retrieval (For Cisco Unity in Unified Messaging Mode)

Restriction:
  • Outlook Web Access must be enabled.

  • "Form Based Authentication" enabled on the Exchange server is not supported.

  • If you have multiple Exchange servers, create a single adapter for any one of the servers, unless they are completely independent of each other.

Before You Begin

Outlook Web Access must be enabled.


Procedure
Step 1   Answer the question Do you want to configure Personal Contact adapter?

If your deployment will include Microsoft Exchange, select Yes. Otherwise, select No.

Step 2   Select or enter personal contact server information.
Option Description

Personal Contact Server Type

Select MS Exchange 2000/2003.

Exchange 2007 is also supported.

Other personal contact servers are not supported in this release.

Adapter Name

Enter a name that you want to assign to this adapter.

Description

Enter a description for this adapter.

Step 3   Select Next
Step 4   Enter information:
Option Description Your Value

Hostname/IP Address

The hostname or IP address of the Exchange server.

If Microsoft Exchange is clustered, use the hostname associated with the Outlook Web Access (OWA) bridgehead.

 

Transport Type

TLS is the secure transport type. Select TLS if Exchange is running SSL.

TCP is the nonsecure transport type. Select TCP if Exchange is not running SSL.

 
Step 5   Select Next
Step 6   Enter information:
Option Description Your Value

Port

The port used to connect the Cisco Unified Mobility Advantage Server to the Exchange server. This is the Outlook Web Access (OWA) port of the Exchange server.

The default port for SSL connections is 443.

The default port for non-SSL connections is 80.

 

Exchange Domain

The domain for this instance of the Exchange server. For example, CORP.

This is the domain that users use when logging into their Windows desktops.

 

User Name Suffix

The suffix that is appended to usernames to complete their corporate email address.

Leave this setting blank unless you have a specific reason to change it, for example if you have email addresses with subdomains such as "sales.yourcompany.com" that resolve to a single domain such as "yourcompany.com".

If email addresses cannot be determined from Active Directory, obtain this value from your Exchange administrator.

This suffix must be a fully qualified DNS domain name. It is often, but not always, yourcompany.com. Do not include the @ character.

 
Step 7   Check your configuration:
  1. Click Test Config.

  2. Look for the test result near the top of the page.

  3. Correct any errors indicated.

Step 8   Select Next
Step 9   Specify information about integrating Cisco Unified Mobility Advantage with Cisco Unified MeetingPlace:
Option Description Your Value

Enable Meeting Service

Select Yes to enable the following meeting features:


  • Call Me (Cisco Mobile clients)

  • Meeting List (iPhone)

  • Meeting notifications (all other devices)

 

Polling Period (sec)

These options are available only if you have configured an Exchange adapter.

Do not change the default values unless you have specific reason to do so.

 

Max Threads

 

Polling Offset (min)

 
Step 10   Select Next
Step 11   Review the information on the summary screen. To change any setting, select Reset to clear this entire section and configure it again.
Step 12   Select Next

Configuring the Connection to the Voicemail Server

Before You Begin

Make sure you have met all requirements in Requirements for Voicemail

If you have multiple voicemail servers, you can create one adapter to connect to one server now and add the others later, or add all adapters later.


Procedure
Step 1   Select Yes to configure a voicemail adapter if Cisco Unified Mobility Advantage will connect to Cisco Unity or Cisco Unity Connection.
Step 2   Select Next.
  • If you selected Yes, continue with this procedure.

  • If you selected No, skip the rest of this procedure.

Step 3   Select or enter the voicemail server information:
Option Description

Voicemail Adapter Type

Select the type of voicemail server that your company uses. For example, Cisco Unity.

Adapter Name

Enter a name that you want to assign to the voicemail adapter.

Description

Enter a description for the voicemail adapter.

Step 4   Select Next.
Step 5   Enter information:
Option Description Your Value

IMAP Information

Unity Exchange Hostname/IP Address


  • For Cisco Unity Connection:

    Hostname or

    IP address of the Cisco Unity Connection server.

    If you have users on more than one Cisco Unity Connection server, create a separate adapter for each Cisco Unity Connection server.

  • For Cisco Unity:

    Hostname of the Exchange server.

    If you have users on more than one Exchange server, create a separate Cisco Unity adapter for each Exchange server.

 

Transport Type

The connection type for connections to the Exchange server (for Cisco Unity) or to the Cisco Unity Connection server.

For Cisco Unity Connection, this setting must match the setting on the Cisco Unity Connection server. For Cisco Unity deployments, this setting must match the security setting for IMAP connections on the Exchange server.

Select TLS for secure connections (SSL on Exchange or TLS on Cisco Unity Connection).

Select TCP for nonsecure connections.

 

Port


  • For Cisco Unity Connection: Enter 7993

  • For Cisco Unity:


    • If Transport Type is TCP: Default is 143.

    • If Transport Type is TLS: Default is 993

 

Polling Period (sec)

The frequency with which Cisco Unified Mobility Advantage checks for new voice messages.

The default is every 600 seconds.

Very frequent polling may decrease performance.

 

Are the Voicemail credentials for the user the same as the corporate credentials?

Select Yes if the user ID and password for user account on the voicemail system is the same as in Active Directory.

Select No otherwise.

If you select No, you must tell users to enter their voicemail credentials into the User Portal.

 

Unity Version

If you are using Cisco Unity Release 7.x, enter the following SOAP information.

 

SOAP Information

Information in this section applies only to Cisco Unity Release 7.x.

Unity Host Name/ IP Address

The host name or IP address of the Cisco Unity server.

This may or may not be the same as the Unity Exchange Host Name/IP Address which hosts the voice messages that are retrieved by IMAP, which you entered above.

 

Transport Type

Select TLS for SSL connections.

Select TCP for nonsecure connections.

This must match the connection type you specify in Cisco Unity.

 

Port

The SOAP port.

 

Unity Backup Host Name/ IP Address

The host name or IP address of a back up Cisco Unity server if you have one.

 

Application User Name

The Cisco Unity Application user ID. This is the same user ID that you use to sign in to the Cisco Unity Administration page.

 

Application Password

The Password for the Unity Application User.

 

Domain

The Microsoft Exchange or NT domain of the Cisco Unity inbox.

Note    This is not the Fully Qualified Domain Name domain.
 

Additional Information

Security Context

You see this option only if you are connecting to Cisco Unity Connection and you chose TLS as the Transport Type.

Choose cuma_trust_all.

 
Step 6   Check your configuration:
  1. Click Test Config.

  2. Look for the test result near the top of the page.

  3. Correct any errors indicated.

Step 7   Select Next.
Step 8   Accept the default values for the following fields unless you have specific reason to change them.
Option Description Your Value

Phone number search field name

Field to search the phone number of a caller.

Default is Subject.

We recommend that you do not change the default value.

 

Phone number search pattern

Regular expression for the search pattern that should be used in the Phone Number Search Field Name field.

This information is used to identify callers by matching information from Cisco Unity and Cisco Unified Communications Manager with existing contact information in Exchange and Active Directory.

Default is the regular expression [0-9]{4,}

We recommend that you do not change the default value.

 
Step 9   Select Next.
Step 10   Select options for voicemail integration.
Option Description Your Value

Enable Corporate Voicemail Integration

Select whether or not Cisco Unified Mobility Advantage connects to your corporate voicemail system and provides voicemail viewing and downloading capabilities on Cisco Mobile and Cisco Unified Mobile Communicator.

 

Maximum Expiry of Voicemails (days)

Enter the maximum number of days that voice messages will be listed in Cisco Mobile and Cisco Unified Mobile Communicator.

 
Step 11   Select Next.
Step 12   Review the information on the summary screen. To change any setting, select Reset to clear this entire section and configure it again.
Step 13   Select Next.

Configuring the Connection to Cisco Unified Communications Manager

Configure Cisco Unified Mobility Advantage to integrate with Cisco Unified Communications Manager to provide call-related features such as unified call logs, MobileConnect, and Dial via Office. Available features and exact configuration depend on your version of Cisco Unified Communications Manager.

Procedure
Step 1   Select Yes at the prompt to configure a call control adapter.
Step 2   Select Next.
Step 3   Enter information:
Option Description

Call Control Server Type

Select Cisco Unified Communications Manager.

Adapter Name

Enter a name of your choice.

Description

Enter a description

Step 4   Select Next.
Step 5   Enter information for Cisco Unified Communications Manager. The exact fields you see depend on the Cisco Unified Communications Manager version. Be sure to scroll down in the wizard to see all fields.
Option Description Your Value

Address Information

Primary Host Name

The hostname or IP address of the primary Cisco Unified Communications Manager server that is running the CTI -enabled account or accounts that you created.

 

Primary Server Port

The port used to communicate with the primary Cisco Unified Communications Manager server.

The default is 5060.

 

Backup Host Name

The backup server host name or IP address.

If you enter a backup server, Cisco Unifed Communications Manager version, ports, security requirements, and CTI and AXL API user credentials must be identical on the primary and backup servers.

 

Backup Server Port

The port used to communicate with the backup Cisco Unified Communications Manager server.

 

CTI User Credentials

User Name

Enter the username of the CTI-enabled account you created in Cisco Unified Communications Manager.

If you created more than one of these CTI-enabled accounts, select Add More to add each.

 

Password

Enter the password or passwords associated with the user name or names above.

 

SIP Information

Transport Type

Select TLS for secure connections.

Select TCP for normal connections.

The default transport type is TCP.

This must match the setting in the "CUMA Server Security Profile" on the Cisco Unified Communications Manager server.

 

Communications Manager Version

Choose the version.

 

Web Services Information.

Information in this section appears only if you choose a Cisco Unified Communications Manager version 7.0 or greater.

Https Port

The SIP port number of the Cisco Unified Communications Manager server. This is often the same secure port that runs the Cisco Unified Communications Manager Administration page.

Cisco Unified Communications Manager runs the AXL interface on this port.

The default is 8443.

 

User Name

The Cisco Unified Communications Manager Application User Name to which you assigned standard AXL API access.

 

Password

The Password for the user in the row above.

 

Additional Information

Security Context

This field appears only if you are using Cisco Unified Communications Manager Release 7.0 or greater. It may not appear unless you selected TLS for Transport Type.

Select cuma_trust_all.

 
Step 6   Check your configuration:
  1. Click Test Config.

  2. Look for the test result near the top of the page.

  3. Correct any errors indicated.

    Tip   
    • Try removing the backup server hostname and port and test again; if the test is successful, the problem is a configuration issue on your backup server. Your backup server should be configured identically to your primary server.

    • Verify that you can successfully sign in to Cisco Unified Communications Manager with each set of credentials that you entered on this page.

Step 7   Select Next.
Step 8   Select Next on the Dial Rule Instructions page if you are using any version of Cisco Unified Communications Manager other than Release 4.x.
Step 9   For Cisco Unified Communications Manager Release 4.x only) Enter the directory lookup rules you planned earlier.
Step 10   Select Next.
Step 11   Select options for Cisco Unified Communications Manager integration.
Option Description

Enable Corporate PBX Integration

Select Yes to:


  • Allow users to view in Cisco Unified Mobile Communicator lists of calls they make and receive on all of their office phones AND

  • Enable the Dial via Office feature.

Select No to:


  • Allow users to view in Cisco Unified Mobile Communicator only the calls they make and receive on Cisco Unified Mobile Communicator, AND

  • Disable the Dial via Office feature.

Enable Dial via Office

Select Yes or No.

Dial Via Office Policy

Select an option:


  • Force Dial Via Office to require all users to make all mobile phone calls via their office numbers.

    If calls cannot be dialed via office for any reason, they can be dialed directly from the mobile device.

  • User Option to allow users to choose which calls they dial direct and which they dial via office.

Dial via Office Emergency Numbers

Specify numbers that will always be dialed direct from the mobile phone and never via the corporate PBX system.

Separate the list with a comma between each number.

Enter the numbers as they would be dialed directly from the mobile phone, for example 112,911,999.

These should include emergency numbers and can include numbers such as directory information.

Include emergency numbers from all countries to which your users will travel.

Maximum Expiry of Call Logs (days)

Enter the maximum number of days that users can keep call history data on their mobile phones before automatic cleanup. For example, 30.

Step 12   Select Next.
Step 13   Review the information on the summary screen. To change any setting, select Reset to clear this entire section and configure it again.

The "Dial Rule Configuration" section is referring to the Directory Lookup configuration.

Step 14   Select Next.

Configuring the Connection to Cisco Unified Presence

This server allows users of Cisco Unified Mobile Communicator Release 7.0 clients to see the availability status of other users.

Configure Cisco Unified Mobility Advantage to communicate with Cisco Unified Presence to provide this service.

Procedure
Step 1   Choose Yes if you want to integrate Cisco Unified Mobility Advantage with a Cisco Unified Presence server.
Step 2   Select Next.
  • If you selected Yes, continue with this procedure.
  • If you selected No, skip the rest of this procedure.
Step 3   Enter the Cisco Unified Presence Server adapter information:
Option Description

CUP Server Type

Select Cisco Unified Presence.

Adapter Name

Enter a name that you want to assign to the Cisco Unified Presence Server adapter.

Description

Enter a description for the Cisco Unified Presence Server adapter.

Step 4   Select Next.
Step 5   Enter information:
Option Description Your Value

Host Name/IP Address

Hostname or IP address of the Cisco Unified Presence server to which all Cisco Unified Mobility Advantage users are assigned.

 

Port

Port on which Cisco Unified Mobility Advantage will communicate with Cisco Unified Presence.

(The port of the SOAP Web Service interface that Cisco Unified Presence listens on to accept user sign-in requests.)

The default is 8443.

 

Backup Host Name/ IP Address

(Optional) Hostname or IP address of the backup Cisco Unified Presence Server, if you have one.

 

Application User Name

The user ID of the Application User you created in Cisco Unified Presence.

 

Application Password

Password for this Application User.

 

Security Context

Select cuma_trust_all.

 
Step 6   Check your configuration:
  1. Click Test Config.

  2. Look for the test result near the top of the page.

  3. Correct any errors indicated.

Step 7   Select Next.
Step 8   Accept the default SIP settings for the Cisco Unified Presence Server, unless you have specific reasons to change them.
Option Description Your Value

SIP Settings

Default Subscription Interval

Default is 3600.

 

Transport Type

Default is TCP.

If you configured Cisco Unified Presence to require a TLS connection, you must select TLS here.

 

Listen Port

Default is 5060.

 

Min Connections

Default is 5.

 

Max Connections

Default is 20.

 

Max Load Per Connection

Default is 200.

 
Step 9   Check your configuration:
  1. Click Test Config.

  2. Look for the test result near the top of the page.

  3. Correct any errors indicated.

Step 10   Select Next.
Step 11   Select Yes for Enable Presence Service to enable users to share availability status information.
Step 12   Select Next.
Step 13   Review the information on the summary screen. To change any setting, select Reset to clear this entire section and configure it again.
Step 14   Select Next.

Configuring the Connection to Cisco Unified MeetingPlace

Configure Cisco Unified Mobility Advantage to communicate with Cisco Unified MeetingPlace to provide the Call Me feature that allows users to select a link to join meetings. (The Meeting List feature does not require this adapter.)

Procedure
Step 1   Choose Yes if you want to integrate Cisco Unified Mobility Advantage with Cisco Unified MeetingPlace.
Step 2   Select Next.
  • If you selected Yes, continue with this procedure.
  • If you selected No, skip the rest of this procedure.
Step 3   Enter the Cisco Unified MeetingPlace Server adapter information:
Option Description

Server Type

Select Cisco Unified MeetingPlace.

Adapter Name

Enter a name that you want to assign to the Cisco Unified MeetingPlace adapter.

Description

Enter a description for the Cisco Unified MeetingPlace adapter.

Step 4   Select Next.
Step 5   Enter information:
Option Description Your Value

Connection Type

Enter http or https, depending on whether you enabled SSL for your Cisco Unified MeetingPlace application or web server.

 

Cisco Meeting Place version

Version of Cisco Unified MeetingPlace

 

Cisco Meeting Place Host Name / IP Address


  • For Cisco Unified MeetingPlace Release 7.x:

    IP address or host name of the Cisco Unified MeetingPlace application server to which Cisco Unified Mobility Advantage will connect.

  • For Cisco Unified MeetingPlace Release 6.0:

    IP address or host name of the Cisco Unified MeetingPlace web server to which Cisco Unified Mobility Advantage will connect.

 

Port

Port on the Cisco Unified MeetingPlace server for communications with Cisco Unified Mobility Advantage.

Enter 80 if you entered Http for Connection Type above.

Enter 443 if you entered Https for Connection Type.

Default is 80.

 

User Name

These options are available only if you select Cisco Unified MeetingPlace Release 7.x above.

Credentials of the Attendant or Administrator account you created in Cisco Unified MeetingPlace.

 

Password

 
Step 6   Check your configuration:
  1. Click Test Config.
  2. Look for the test result near the top of the page.
  3. Correct any errors indicated.
Step 7   Select Next.
Step 8   Review the information on the summary screen. To change any setting, select Reset to clear this entire section and configure it again.
Step 9   Select Next.

Viewing Configuration Summaries for Connections to Enterprise Servers

Procedure
Step 1   Select the Host Name/IP Address of any server for which you want to view a configuration summary.
Step 2   Select Next when you are satisfied with your configurations.

You see the System Configuration screen


Completing the System Configuration Screen

Specify a domain and a session timeout length.

Enable the Cisco Unified Mobility Advantage to send email messages to iPhones and BlackBerry devices, including provisioning messages that allow users to quickly and easily set up the client application for use.

Before You Begin

Your SMTP Server must allow relaying from Cisco Unified Mobility Advantage. For information, contact your SMTP server administrator or see the documentation for your SMTP server.


Procedure
Step 1   Enter information:
Option Description Your Value

General

Domain

Enter the domain that completes the email address of the Cisco Unified Mobile Communicator user. For example:

cisco.com

This domain will be used to send provisioning email messages to iPhone and BlackBerry users.

If you deploy Cisco Unified Presence, this domain must match the Proxy domain of the Cisco Unified Presence server as specified on the Cisco UP SIP Proxy Service Parameters page.

 

Session Timeout (days)

Enter the number of days after which users must sign in again to Cisco Unified Mobile Communicator.

 

SMTP Server Configuration

Host Name

Hostname of your SMTP gateway. This must be the same as your Exchange hostname if you use the Exchange server as your SMTP gateway.

 

Port

Port number for the SMTP gateway. Usually, this is 25.

 

Authentication Required

Identifies whether or not your organization requires authentication on the mail server. If the value for this field is True, you must enter a password for the Admin Email account (see the next two options below).

 

Admin Email

Email address for the administrator responsible for management of Cisco Unified Mobility Advantage.

Cisco Unified Mobility Advantage uses this email address to send provisioning emails and alerts to BlackBerry users and to send provisioning messages to iPhone users.

 

SMTP Authentication Password

Password associated with the Admin Email address.

Required only if the SMTP server requires authentication.

 
Step 2   Select Next.

Configuring Server Setup Network Configuration

For deployments that include only Cisco Mobile for BlackBerry Release 7.1 and no other devices or clients: Configure Cisco Unified Mobility Advantage to communicate with Cisco Mobile clients. These clients connect through the BlackBerry Enterprise Server.

For all other deployments: Configure Cisco Unified Mobility Advantage to communicate with the Cisco Adaptive Security Appliance and Cisco Unified Mobile Communicator clients.

Before You Begin

For deployments with Cisco Adaptive Security Appliance: Make sure you have selected the required ports within the permitted ranges, as specified in (For Deployments with Cisco Adaptive Security Appliance) Opening Firewall Ports.


Procedure
Step 1   Enter information:
Setting Deployments with Cisco Adaptive Security Appliance Deployments without Cisco Adaptive Security Appliance Your Value

Proxy Server Information

Proxy Host Name

Host name that clients will use to connect through the Cisco Adaptive Security Appliance to Cisco Unified Mobility Advantage.

The hostname must be routable from the Internet.

The Proxy Host Name must resolve to the external IP address that you received from your IT administrator.

Enter the host name of the Cisco Unified Mobility Advantage server.

 

Proxy Client Connection Port

The port that is used for secure communications between the Cisco Unified Mobile Communicator client and the Cisco Adaptive Security Appliance.

Enter the same value you enter for the Client Connection Port, below.

 

Proxy Client Download Port

The port through which clients connect to the Cisco Adaptive Security Appliance for wireless downloads of Cisco Unified Mobile Communicator.

If you will deploy only iPhone and BlackBerry devices, enter a dummy value.

Enter a dummy value.

 

Managed Server Information

Client Connection Port

The port that Cisco Adaptive Security Appliance uses to connect to Cisco Unified Mobility Advantage.

The Cisco Adaptive Security Appliance translates this port to the Proxy Client Connection Port for Cisco Unified Mobile Communicator client connections to the Cisco Adaptive Security Appliance.

BlackBerry clients connect to this port through the BlackBerry Enterprise Server instead of through the Cisco Adaptive Security Appliance.

Permitted range: 5400-5500

Default: 5443

 

User Portal Port

The port users will use to access the User Portal.

The range is 9400-9500.

The default is 9443.

For security, this port should be available only behind your corporate firewall.

 

Client Download Port

The port on which users will download the client software.

This port is translated to the Proxy Client Download Port for client connections to the Cisco Adaptive Security Appliance.

If users will use only iPhone and BlackBerry devices, enter a dummy value.

Leave the default value as a dummy value.

BlackBerry users obtain the client from the BlackBerry Enterprise Server.

 

Security Context

Select the Security Context that governs connections with the Cisco Adaptive Security Appliance.

At the beginning of the Configuration Wizard, you created the cuma Security Context for this purpose.

This Security Context must have the Trust Policy set to Trusted Certificates.

At the beginning of the Configuration Wizard, you created the cuma Security Context for this purpose.

This Security Context will hold the signed certificate that Cisco Unified Mobility Advantage will display to BlackBerry clients.

 
Step 2   Select Next.

The Server Setup Summary screen appears.

Step 3   Review the information. To change information, select Reset.
Step 4   Select Next.

Preparing Client Software

This procedure is required in order to determine the devices you will support and to make client software available for download (for devices other than iPhone.)

Client software for all devices except iPhones is distributed in a single file with a .oar filename extension. This .oar file also provides the list of devices, service providers, and languages from which you will choose the devices, providers, and languages you want to support.

You must upload the .oar file software onto the Cisco Unified Mobility Advantage server, even if all of your users will use iPhones.

Before You Begin

Obtain the .oar file for this release. See Obtaining Client Software and The List of Supported Devices.

The .oar file is provided on a separate CD from Cisco Unified Mobility Advantage, or you can download it from Cisco.com.

You should be looking at the Handset Platform Management window in the Configuration Wizard.


Procedure
Step 1   Browse to or enter the location of the Cisco Unified Mobile Communicator software.
Step 2   Select Next.

Wait for the file to upload. This may take some time.

When the upload is successful, you see a list of the handset platforms and versions of Cisco Unified Mobile Communicator now installed in Cisco Unified Mobility Advantage.

Step 3   Select Next.

Managing Provisioning Options

Choose the devices and client versions your deployment will support.

Devices that Cisco Unified Mobility Advantage supports for Release 3.x clients vary by country and service provider. Release 7.x client support is not tied to country and service provider. Use this procedure to view and select from available device options.

You can restrict the countries, service providers, and devices that you will support. More supported variations adds flexibility for your users, while fewer supported variations simplifies control and management of your client base.

Important:
  • You must select all clients your deployment will support, whether or not users will download the client software from the Cisco Unified Mobility Advantage server.

    For example, select iPhone to enable it as a supported device where applicable, even though users will obtain the client software from the Apple App Store.

  • If you are upgrading from an existing client release:

    In order to avoid immediately unprovisioning existing clients on user devices, do NOT deselect the earlier release when you enable support for the new release. Instead, have users migrate to the new release, then deselect support for older releases.

Procedure
Step 1   Select the arrow beside a country to view the supported mobile service providers in that location.

If you do not see your country, or your country does not list the platform you seek, select Other.

Step 2   Select the arrow beside a provider to view the devices that provider supports.
Step 3   Select the country, mobile phone service providers, and supported devices for your deployment.

If you do not see the device you are looking for, select Other for country and service provider.

Checking a box selects each box in the list under that entity, whether or not you see the list. Uncheck boxes as needed, or start by checking each device to support.

Step 4   Select Next

Finishing the Configuration Wizard

The Summary screen displays your Cisco Unified Mobility Advantage settings.

Procedure
Step 1   Review the configuration summary. Select Reset under any area to make changes to that area.
Step 2   Select Finish.
Step 3   Select No if you see a prompt to start the Managed Server (Cisco Unified Mobility Advantage).

How to Finalize Certificate Exchange with the Cisco Adaptive Security Appliance

Download a Self-Signed Certificate from Cisco Unified Mobility Advantage for the Cisco Adaptive Security Appliance

Procedure
Step 1   Select the [+] beside Security Context Management.
Step 2   Select Security Contexts.
Step 3   Select Manage Context beside the cuma security context.

This is the security context you created above with Trust Policy set to Trusted Certificates.

Step 4   Select Download Certificate.
Step 5   Save the file.

Importing a Certificate from Cisco Unified Mobility Advantage into the Cisco Adaptive Security Appliance

The Cisco Adaptive Security Appliance requires a certificate in order to trust Cisco Unified Mobility Advantage. Depending on your deployment, this certificate can be signed or self-signed.

The Cisco Adaptive Security Appliance does not automatically trust certificates signed by a recognized certificate signing authority, so perform this procedure even if you deploy a signed certificate on Cisco Unified Mobility Advantage.

Procedure
Step 1   Open the self-signed certificate from Cisco Unified Mobility Advantage in WordPad (not Notepad): Right-click the certificate file and select Open with > Wordpad.
Step 2   Sign in to the Cisco Adaptive Security Appliance and enter configuration mode.
Step 3   Import the certificate into the Cisco Adaptive Security Appliance trust store:
crypto ca trustpoint <trustpoint-cuma>
enrollment terminal 
crypto ca authenticate <trustpoint-cuma>

Select All and copy the contents of the certificate from WordPad.

Include the following lines. Make sure that there are no extra spaces or blank lines at the end.

----BEGIN CERTIFICATE---- 
----END CERTIFICATE----

Paste into the Cisco Adaptive Security Appliance command-line interface window.


Importing a Self-Signed Certificate into Cisco Unified Mobility Advantage from the Cisco Adaptive Security Appliance

Import the required self-signed certificate from the Cisco Adaptive Security Appliance into Cisco Unified Mobility Advantage.

Before You Begin

Locate the self-signed certificate you generated from the Cisco Adaptive Security Appliance in Generating a Certificate for Cisco Unified Mobility Advantage from the Cisco Adaptive Security Appliance.

You will import this certificate into the cuma security context that you created above in Configuring Security Contexts.


Procedure
Step 1   Open the certificate file in WordPad (not Notepad): Right-click the file and select Open with > Wordpad.
Step 2   Sign in to the Cisco Unified Mobility Advantage Admin Portal.
Step 3   Select the [+] beside Security Context Management.
Step 4   Select Security Contexts.
Step 5   In the right pane, select Manage Context for the Security Context into which you want to import the certificate.
Step 6   Select Import on the Trusted Certificate(s) line.
Step 7   Enter a certificate name (no spaces).

For example, enter ASA_selfsigned for the self-signed certificate from the Cisco Adaptive Security Appliance.

Step 8   Copy and paste the text from the certificate into the Certificate field.

Include the following lines. Make sure that there are no extra spaces or blank lines at the end.

----BEGIN CERTIFICATE----

----END CERTIFICATE----

Step 9   Select Import.

Performing Additional Required Procedures

Perform the following procedures in order.

To More Information

(Optional) Increase data collection via Google Analytics to help Cisco to improve this product.

See the Usage Reporting documentation module at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html

If any of your enterprise servers require the exchange of certificates, exchange the required certificates.

See the Configuring Security documentation module for this release at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html

If you will deploy BlackBerry devices, configure the BlackBerry Enterprise Server, obtain a signed certificate, and complete required setup.

See the BlackBerry chapter in the Enabling Support for Clients documentation module for this release at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html.

By default, Enforce Device ID Check is enabled for the system.

Consider setting this to to False until you have verified that everything works and you are ready to add device identity information for your users.


  1. Sign in to the Cisco Unified Mobility Advantage Admin Portal.

  2. Select the [+] beside System Management.

  3. Select System Properties.

  4. Select False for Enforce Device ID Checking.

  5. Select Submit.

To enable device ID checking later, see the Security documentation module for this release.

Allow iPhone users to receive notifications of missed calls and new voice messages even when the client is not running.

Disable this feature if your users do not have iPhones or your Cisco Unified Mobility Advantage server cannot telnet to gateway.push.apple.com on port 2195.

See the Enabling Support for Clients documentation module for this release at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html.

If you will use this feature, make sure your system meets the requirements in the Before You Begin section.

If you skipped any of the configurations described in this book, complete those configurations now.

To configure the Cisco Adaptive Security Appliance, see the chapter in this book.

To configure and enable features, see the feature configuration modules at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html

Start Cisco Unified Mobility Advantage


  1. Select the [+] beside Server Controls.

  2. Select Cisco.

  3. Select Control Server.

  4. Select Start next to Change Status.

    Cisco Unified Mobility Advantage has started when Server Status changes to Running.

Add and set up a single user and device for testing purposes.

See the Adding Users and Devices documentation module at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html.

Configure settings on the client as needed.

Test the features you have configured.

If necessary, revisit configurations described in the feature configuration modules and see the Troubleshooting documentation module at http://www.cisco.com/en/US/products/ps7270/prod_troubleshooting_guides_list.html.


  • Users may see an "untrusted certificate" warning when they access the User Portal. This warning is benign but may confuse users. Consider obtaining a signed certificate for your Cisco Unified Mobility Advantage server so that users do not see this warning.

  • If your enterprise servers do not currently require a certificate from Cisco Unified Mobility Advantage: After your deployment is running successfully, consider deploying certificates to increase your server security.

See the Configuring Security documentation module at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html

Activate users

See the Adding Users and Devices documentation module at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html.

Set up devices

Give users the information they need in order to use Cisco Unified Mobile Communicator

Switching From a Lab to Production Deployment

Before you switch from a lab deployment to a production deployment that uses the same Cisco Unified Communications Manager server, be sure all users on the lab system are logged out of the client, then remove ("melt") all phones in the lab Cisco Unified Mobility Advantage server. Multiple Cisco Unified Mobility Advantage servers cannot be associated with a single Cisco Unified Communications Manager cluster.


Tip


To unprovision a device so that you can associate the client with a different Cisco Unified Mobility Advantage server without reinstalling the client, "melt" the device on the old server, then sign in from the client to the old server.