PDF(639.2 KB) View with Adobe Reader on a variety of devices
ePub(592.3 KB) View in various apps on iPhone, iPad, Android, Sony Reader, or Windows Phone
Mobi (Kindle)(493.4 KB) View on Kindle device or Kindle app on multiple devices
Updated:May 23, 2017
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes how to troubleshoot "no HTTPS response" message on Telepresence Management Suite (TMS).
Cisco recommends that you have knowledge of these topics:
The information in this document is based on these software versions:
TC 7.3.6 and above
CE 8.1.0 and above
Windows Server 2012 R2
SQL Server 2008 R2 and 2012
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.
This issue occurs when the endpoints are migrated to TC 7.3.6 and Collaboration Endpoint (CE) 8.1.0 software or above.
After an endpoint upgrade to TC7.3.6 or above or 8.1.0 or above and the communication method between the endpoint and the TMS is set up as Transport Layer Security (TLS), the error message "no HTTPS response" pops up on TMS by selecting the Endpoint, under System > Navigator.
This happens as a result of this situations.
TC 7.3.6 and CE 8.1.0 and above no longer support TLS 1.0 as per the release notes.
Microsoft Windows server has TLS version 1.1 and 1.2 disabled by default.
TMS tools uses Medium Communication Security in its Transport Layer Security Options by default.
When TLS version 1.0 is disabled and both TLS version 1.1 and 1.2 are enabled, TMS doesn’t send Secure Socket Layer (SSL) Client hello after TCP 3-Way handshake succeeds with the Endpoint. However still able to encrypt data using TLS version 1.2.
Enabling TLS version 1.2 using a Tool or in the Windows Registry is not enough, as the TMS will still only send or advertise 1.0 in its Client hello messages.
The Windows server where the TMS is installed, needs to have TLS version 1.1 and 1.2 enabled, this can be achieved with the next procedure.
Enable TLS 1.1 and 1.2 on TMS Windows Server for TMS 15.x and higher
Step 1. Open a Remote Desktop Connection to Windows Server where TMS is installed.
Step 2. Open Windows Registry editor (Start->Run->Regedit).
Step 3. Take backup of Registry.
If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
Locate and click the key or subkey that you want to back up.
Click the File menu, and then click Export.
In the Save in box, select the location where you want to save the backup copy to, and then type a name for the backup file in the File name box.
Step 4. Enable TLS 1.1 and TLS 1.2.
Navigate to HKEY_LOCAL_MACHINE --> SYSTEM --> CurrentControlSet --> Control --> SecurityProviders--> SCHANNEL --> Protocols
Add TLS 1.1 and TLS 1.2 support
Create TLS 1.1 and TLS 1.2 folders
Create sub-keys as client' and 'server
Create DWORDs for both Client and Server for each TLS key created.
DisabledByDefault [Value = 0]
Enabled [Value = 1]
Step 5. Restart TMS Windows server to ensure TLS take effect.
When the correct versions are enabled, change the Security settings on TMS Tools with this procedure.
Step 1. Open TMS tools
Step 2. Navigate to Security Settings > Advanced Security Settings
Step 3. Under Transport Layer Security Options, set the Communication Security to Medium-High
Step 4. Click Save
Step 5. Then restart both the Internet Information Services (IIS) on the server and TMSDatabaseScannerService and start TMSPLCMDirectoryService (if it’s stopped)
Warning: : When TLS option is changed to Medium-High from Medium, telnet and Simple Network Management Protocol (SNMP) will be disabled. This will cause to TMSSNMPservice to stop and an alert will be raised on TMS web interface.
Considerations in order to upgrade security settings
When SQL 2008 R2 is in use and installed on TMS windows server, we need to ensure TLS1.0 and SSL3.0 should also be enabled or else SQL service stop and it won't start.
Endpoints managed using SNMP or Telnet show "Security violation: Telnet communication is not allowed".
When you change the TLS option from Medium to Medium-High, this ensures that TLS version 1.2 is advertised in the Client Hello after the TCP 3-Way handshake suceeds from TMS:
TLS version 1.2 advertised:
If it's left at medium TMS will only send version 1.0 in the SSL Client hello during the negotiation phase which specifies the highest TLS protocol version it supports as a client, which TMS is, in this case.
For TMS versions lower than 15
Step 1. Even though the TLS version 1.2 is added in the registry
Step 2. The TMS server still doesn’t send the version supported by the Endpoint in its SSL client hello
Step 3. The problem then lies in the fact that we cannot change the TLS Options in TMS tools as this option is not available
Step 4. Then the workaround for this issue is either upgrade TMS to 15.x or downgrade your TC/CE endpoints to 7.3.3, this issue is tracked in software defect CSCuz71542 created for version 14.6.X.