Introduction
This document describes how to configure and enable Web Bridge service on Cisco Meeting Server (CMS) version 3.0.
Contributed by Jefferson Madriz and Octavio Miralrio, Cisco TAC Engineers.
Prerequisites
Requirements
Cisco recommends that you have knowledge of these topics:
- Domain Name System (DNS)
- CMS general configuration
- Certificate Signing Request (CSR)
- Secure Shell (SSH) client
Components Used
The information in this document is based on these software and hardware versions:
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
Configuration
Step 1. Assign the interface to Web Bridge.
Note: The Web Bridge 3 and Call Bridge to Web Bridge (c2w) configuration use the fullchain certificate files. They do not use the server certificate file as with previous Cisco Meeting Server conventions.
- Access the CMS Command Line Interface (CLI) with your preferred SSH client.
- Configure Web Bridge 3 to listen on Interface a and port 443.
webbridge3 https listen a:443
- Configure Web Bridge 3 service with the certificate key and full chain certificate file generated.
webbridge3 https certs singleCert.key mxcbundle.crt
- The Web Bridge 3 supports Hypertext Transfer Protocol Secure (HTTPS) redirection. Use this command to enable it, if desired:
webbridge3 http-redirect enable
Step 2. Configure the c2w connection.
- Configure the Call Bridge to Web Bridge 3 (c2w) connection to listen on Interface a and port 9999.
webbridge3 c2w listen a:9999
- Configure the c2w interface to use the server certificate, private key and full chain certificate file generated.
webbridge3 c2w certs singleCert.key mxcbundle.pem
- Configure the c2w interface to trust the Call Bridge certificate, use the full chain certificate file generated.
webbridge3 c2w trust mxcbundle.pem
- Enable the Web Bridge 3 service.
webbridge3 enable
- Validate that the outputs are SUCCESS messages as shown in the image:

Step 3. Define Web Bridge 3 in Call Bridge.
The Call Bridge must be told where to connect to Web Bridge and how to verify the certificate that the c2w interface presents. This requires both Mainboard Management Processor (MMP) and Application Programing Interface (API) configuration.
- Configure the Call Bridge to trust the c2w interface of Web Bridge 3, use the full chain certificate file assigned to the c2w interface of Web Bridge 3.
callbridge trust c2w mxcbundle.pem
- Create an API object on /api/v1/webBridges.
- Log in to the Meeting Server Web Admin interface and select Configuration > API:
- In the Filter input box, type webBridges to filter the list view.

- Select the arrow next to webBridges.
- Select Create new to create a new webBridge object.

- Enter the url field, use the format c2w://:9999 with the FQDN value used on the CMS certificate, as shown in the image:

- From the Web Admin interface, select Configuration > General.
- On Web Bridge URI setting, configure the HTTPS URL for your Meeting Server.

- Select Submit to save the changes.
Verify
- Open an SSH session to the CMS.
- Run the command webbridge3 to display the configuration.

- From the Web Admin interface, select Status > General and validate that there are no alarms in Fault Conditions.