Compatibility Matrix for Cisco Unified Communications Manager and the IM and Presence Service

Revision History

Date

Revision

Sept. 19, 2018

Added LDAP directory support for the IM and Presence Service

Upgrade Paths

This section contains upgrade paths for this release. This release of Cisco Unified Communications Manager and the IM and Presence Service supports virtualized deployments only. However, depending on your current setup, you may be upgrading from a Cisco Media Convergence Server deployment or from a virtualized deployment. The upgrade paths are slightly different for each type of upgrade.

Deployments on Cisco Media Convergence Servers Hardware

You cannot install or run Cisco Unified Communications Manager and the IM and Presence Service directly on server hardware; you must run these applications on virtual machines. The tables below list the supported migration paths for deployments that are currently running on Cisco 7800 Series Media Convergence Server (MCS 7800) hardware. All of the supported migration paths listed below are physical-to-virtual (P2V) migrations.


Note

The tables below list the upgrade paths supported for MCS 7800 Series servers, with the following exceptions:

  • MCS 7816-C1 for Business Edition 3000 (BE3000)

  • MCS 7828 for Business Edition 5000 (BE5000)

PCD migrations are not supported for BE3000 and BE5000 deployments. We recommend a fresh installation for upgrades from these products.


Table 1. Cisco Unified Communications Manager Releases Installed on MCS 7800 Series Hardware

From

To

Supported Method

6.1(5)

11.5(x)

PCD Migration

7.1(3) and 7.1(5)

11.5(x)

PCD Migration

8.x

11.5(x)

PCD Migration

9.x

11.5(x)

PCD Migration

Table 2. Cisco Unified Presence and IM and Presence Releases Installed on MCS 7800 Series Hardware

From

To

Supported Method

CUP 8.5(4)

11.5(x)

PCD Migration

CUP 8.6(3), 8.6(4), and 8.6(5)

11.5(x)

PCD Migration

IM and Presence 9.x

11.5(x)

PCD Migration

Deployments on Virtual Machines

The tables below list the supported upgrade and migration paths for Cisco Unified Communications Manager and IM and Presence Service deployments that are currently running on virtual machines. All of the supported upgrade and migration paths listed below are virtual-to-virtual (V2V). Service Updates (SU) within each path are supported, unless otherwise indicated.

Table 3. Cisco Unified Communications Manager Releases Installed on Virtual Machines

From

To

Supported Method

8.6(x)

11.5(x)

Cisco Unified OS Admin (Direct Refresh)

PCD Migration

PCD Upgrade (Direct Refresh)

9.0(x)

11.5(x)

PCD Migration

PCD Upgrade (Direct Refresh)

9.1(x)

11.5(x)

PCD Migration

PCD Upgrade (Direct Refresh)

Cisco Unified OS Admin (Direct Refresh)

10.0(x)

11.5(x)

PCD Migration

PCD Upgrade (Direct Standard)

10.5(x)

11.5(x)

PCD Migration

PCD Upgrade (Direct Standard)

Cisco Unified OS Admin (Direct Standard)

11.0(1)

11.5(x)

Cisco Unified OS Admin (Direct Standard)

PCD Migration

PCD Upgrade (Direct Standard)

11.5(x)

11.5(y)

Cisco Unified OS Admin (Direct Standard)

PCD Migration

PCD Upgrade (Direct Standard)

Table 4. Cisco Unified Presence and IM and Presence Releases Installed on Virtual Machines

From

To

Supported Method

CUP 8.5(4)

11.5(x)

PCD Migration

CUP 8.6(3), 8.6(4), and 8.6(5)

11.5(x)

PCD Migration

PCD Upgrade (Direct Refresh)

CUP 8.6(x)

11.5(x)

Cisco Unified OS Admin (Direct Refresh)

IM and Presence 9.0(x)

11.5(x)

PCD Migration

PCD Upgrade (Direct Refresh)

IM and Presence 9.1(x)

11.5(x)

PCD Migration

PCD Upgrade (Direct Refresh)

Cisco Unified OS Admin (Direct Refresh)

IM and Presence 10.0(x)

11.5(x)

PCD Migration

PCD Upgrade (Direct Standard)

PCD Upgrade (Direct Standard)

IM and Presence 10.5(x)

11.5(x)

PCD Migration

PCD Upgrade (Direct Standard)

Cisco Unified OS Admin (Direct Standard)

IM and Presence 11.0(1)

11.5(x)

Cisco Unified OS Admin (Direct Standard)

PCD Migration

PCD Upgrade (Direct Standard)

IM and Presence 11.5(x)

11.5(y)

Cisco Unified OS Admin (Direct Standard)

PCD Migration

PCD Upgrade (Direct Standard)

COP Files Required for Upgrades to Release 11.5

The tables below lists the upgrade paths that require COP files. You must install COP files on each node before you begin an upgrade using the Cisco Unified OS Admin interface, or before you begin an upgrade or migration using the Prime Collaboration Deployment (PCD) tool. If you are using PCD, you can perform a bulk installation of the COP files before you begin the upgrade.

Table 5. Required COP Files for Upgrades and Migrations to Cisco Unified Communications Manager Release 11.5(x)
From To Upgrade Type

8.6(x)

11.5(x)

Refresh upgrade. Required COP files:

  • ciscocm.version3-keys.cop.sgn

Optional COP files:

  • ciscocm.vmware-disk-size-reallocation-<latest_version>.cop.sgn)

  • ciscocm.free_common_space_v<latest_version>.cop.sgn

9.1(x)

11.5(x)

Refresh upgrade. Required COP files:

  • ciscocm.version3-keys.cop.sgn

Optional COP files:

  • ciscocm.vmware-disk-size-reallocation-<latest_version>.cop.sgn)

  • ciscocm.free_common_space_v<latest_version>.cop.sgn

10.5(x)

11.5(x)

Standard upgrade; no COP file required.

11.0(x)

11.5(x)

Standard upgrade; no COP file required.

11.5(x)

11.5((y)

Standard upgrade; no COP file required.

Table 6. Required COP Files for Refresh Upgrades from Cisco Unified Presence Releases
From Cisco Unified Presence Release To IM and Presence Release Upgrade Type

8.5(4) through 8.6(1)

11.5(x)

Refresh upgrade. Requires the following COP files:

  • cisco.com.cup.refresh_upgrade_v<latest_version>.cop

  • ciscocm.version3-keys.cop.sgn

Table 7. Required COP Files for Refresh Upgrades from IM and Presence Service Releases

From IM and Presence Release

To IM and Presence Release

Upgrade Type

9.1(x)

11.5(x)

Refresh upgrade. Requires the following COP file:

  • ciscocm.version3-keys.cop.sgn

10.5(x)

11.5(x)

Standard upgrade; no COP file required.

11.0(x)

11.5(x)

Standard upgrade; no COP file required.

11.5(x)

11.5(y)

Standard upgrade; no COP file required.

Cisco Unified Communications Manager Compatibility Information

Cisco Collaboration Applications

This release of Cisco Unified Communications Manager and the IM and Presence Service are compatible wth the Cisco Collaboration Systems release 11.5. For a list of Cisco Collaboration applications that are supported with release 11.5, see the Cisco Collaboration Systems Release Compatibility Matrix at:

https://www-author3.cisco.com/c/dam/en/us/td/docs/voice_ip_comm/uc_system/unified/communications/system/Compatibility/CSR-Compatibility-Matrix-InteractiveHTML.html

Virtualization Requirements

This release of Cisco Unified Communications Manager and the IM and Presence Service supports virtualized deployments only. Deployments on Cisco Media Convergence Servers are not supported.

Virtualization Requirements for Cisco Unified Communications Manager

For information about Cisco Unified Communications Manager virtualization requirements, go to https://www.cisco.com/c/dam/en/us/td/docs/voice_ip_comm/uc_system/virtualization/virtualization-cisco-unified-communications-manager.html.

Virtualization Requirements for the IM and Presence Service

For information about the IM and Presence Service virtualization requirements, go to https://www.cisco.com/c/dam/en/us/td/docs/voice_ip_comm/uc_system/virtualization/virtualization-cisco-ucm-im-presence.html

Virtualization Requirements for Cisco Business Edition Deplloyments

For information on the virtualization requirements for Cisco Unified Communications Manager in a collaboration solution deployment such as Cisco Business Edition, go to https://www.cisco.com/c/dam/en/us/td/docs/voice_ip_comm/uc_system/virtualization/collaboration-virtualization-hardware.html

Supported LDAP Directories

The following LDAP directories are supported:

  • Microsoft Active Directory 2003 R1/R2 (32-bit)

  • Microsoft Active Directory 2008 R1 (32-bit) / R2 (64-bit)

  • Microsoft Active Directory Application Mode 2003 R1/R2 (32-bit)

  • Microsoft Active Directory 2012

  • Microsoft Active Directory 2016

  • Microsoft Lightweight Directory Services 2008 R1(32-bit) / R2(64-bit)

  • Microsoft Lightweight Directory Services 2012

  • Sun ONE Directory Server 7.0

  • Open LDAP 2.3.39

  • Open LDAP 2.4

  • Oracle Directory Server Enterprise Edition 11gR1

  • Other LDAPv3 Compliant Directories

Supported Web Browsers

The following web browsers are supported:

  • Firefox, latest browser version only, with Windows 10 (64-bit)

  • Chrome, latest browser version only, with Windows 10 (64-bit)

  • IE 11 with Windows 10 (64-bit)

  • IE 11 with Windows 7 (64-bit)

  • IE 11 with Windows 8.1 (64-bit)

  • Edge browser with Windows 10 (32-bit/64-bit)

  • Safari, latest browser version only, with MacOS (10.x)

SFTP Server Support

For internal testing, Cisco uses the SFTP Server on Cisco Prime Collaboration Deployment (PCD) which is provided by Cisco, and which is supported by Cisco TAC. Refer to the following table for a summary of the SFTP server options:

Table 8. SFTP Server Support

SFTP Server

Support Description

Cisco Prime Collaboration Deployment

This server is the only SFTP server that is provided and tested by Cisco, and which is fully supported by Cisco TAC.

Version compatibility depends on your version of Unified Communications Manager and Cisco Prime Collaboration Deployment. See the Cisco Prime Collaboration Deployment Administration Guide before you upgrade its version (SFTP) or Unified Communications Manager to ensure that the versions are compatible.

SFTP Server from a Technology Partner

These servers are third party provided and third party tested. Version compatibility depends on the third party test. See the Technology Partner page if you upgrade their SFTP product and/or upgrade Unified Communications Manager for which versions are compatible:

https://marketplace.cisco.com

SFTP Server from another Third Party

These servers are third party provided, have limited Cisco testing, and are not officially supported by Cisco TAC.

Version compatibility is on a best effort basis to establish compatible SFTP versions and Unified Communications Manager versions.

Note 

These products have not been tested by Cisco and we cannot guarantee functionality. Cisco TAC does not support these products. For a fully tested and supported SFTP solution, use Cisco Prime Collaboration Deployment or a Technology Partner.

SAML SSO Support

Although Cisco Collaboration infrastructure may prove to be compatible with other IdPs claiming SAML 2.0 compliance, only the following IdPs have been tested with Cisco Collaboration solutions:

  • OpenAM 10.0.1

  • Microsoft® Active Directory Federation Services 2.0 (AD FS 2.0)

  • PingFederate® 6.10.0.4

  • F5 BIG-IP 11.6.0

API Development

Cisco Unified Communications Manager and the IM and Presence Service support OpenJDK for application development. This release uses OpenJDK version 1.7.0.181.

Secure Connections

TLS 1.2 Support

Cisco Unified Communications Manager and the IM and Presence Service support the use of TLS 1.2. For detailed information on TLS1.2 support, refer to the TLS 1.2 Compatibility Matrix for Cisco Collaboration Products at:

https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/uc_system/unified/communications/system/Compatibility/TLS/TLS1-2-Compatibility-Matrix.html

SSL Connections

For Secure Sockets Layer (SSL) connections, this release supports either OpenSSL or Cisco SSL. You can use either of the following versions:

  • OpenSSL 1.0.1e 48.el6_8.4

  • CiscoSSL 1_0_2o_6_1_410

SSH Clients

This release supports OpenSSH client version 5.3p1 123.el6_9 for SSH connections.

Supported Ciphers for Cisco Unified Communications Manager

The following ciphers are supported by Cisco Unified Communications Manager:

Table 9. Cisco Unified Communications Manager Cipher Support for TLS Ciphers

Application / Process

Protocol

Port

Supported Ciphers

Cisco CallManager

TCP / TLS

2443

ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-RSA-AES256-SHA384:
ECDHE-RSA-AES256-SHA:
AES256-GCM-SHA384:
AES256-SHA256:
AES256-SHA:CAMELLIA256-SHA:
ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-RSA-AES128-SHA256:
ECDHE-RSA-AES128-SHA:
AES128-GCM-SHA256:
AES128-SHA256:AES128-SHA:
CAMELLIA128-SHA

DRS

TCP / TLS

4040

ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-RSA-AES256-SHA384:
ECDHE-RSA-AES256-SHA:
DHE-RSA-CAMELLIA256-SHA:
AES256-GCM-SHA384:AES256-SHA256:
AES256-SHA:CAMELLIA256-SHA:
ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-RSA-AES128-SHA256:
ECDHE-RSA-AES128-SHA:
DHE-RSA-CAMELLIA128-SHA:
AES128-GCM-SHA256:AES128-SHA256:
AES128-SHA:CAMELLIA128-SHA

Cisco Tomcat

TCP / TLS

8443 / 443

ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-RSA-AES256-SHA384:
ECDHE-RSA-AES256-SHA:
DHE-RSA-AES256-GCM-SHA384:
DHE-RSA-AES256-SHA256:
DHE-RSA-AES256-SHA:
DHE-RSA-CAMELLIA256-SHA:
AES256-GCM-SHA384:AES256-SHA256:
AES256-SHA:CAMELLIA256-SHA:
ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-RSA-AES128-SHA256:
ECDHE-RSA-AES128-SHA:
DHE-RSA-AES128-GCM-SHA256:
DHE-RSA-AES128-SHA256:
DHE-RSA-AES128-SHA:
DHE-RSA-CAMELLIA128-SHA:
AES128-GCM-SHA256:AES128-SHA256:
AES128-SHA:CAMELLIA128-SHA:
ECDHE-RSA-DES-CBC3-SHA:
EDH-RSA-DES-CBC3-SHA:
DES-CBC3-SHA 
ECDHE-ECDSA-AES256-GCM-SHA384:
ECDHE-ECDSA-AES256-SHA384:
ECDHE-ECDSA-AES256-SHA:
ECDHE-ECDSA-AES128-GCM-SHA256:
ECDHE-ECDSA-AES128-SHA256:
ECDHE-ECDSA-AES128-SHA:
ECDHE-ECDSA-DES-CBC3-SHA

Cisco CallManager

TCP / TLS

5061

ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-ECDSA-AES256-GCM-SHA384 
ECDHE-RSA-AES256-SHA384:
ECDHE-ECDSA-AES256-SHA384:
ECDHE-RSA-AES256-SHA 
ECDHE-ECDSA-AES256-SHA:
AES256-GCM-SHA384:AES256-SHA256:
AES256-SHA:CAMELLIA256-SHA 
ECDHE-ECDSA-AES128-GCM-SHA256 
ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-RSA-AES128-SHA256 
ECDHE-ECDSA-AES128-SHA256:
ECDHE-RSA-AES128-SHA 
ECDHE-ECDSA-AES128-SHA:
AES128-GCM-SHA256:AES128-SHA256:
AES128-SHA:CAMELLIA128-SHA:
ECDHE-ECDSA-DES-CBC3-SHA

Cisco CTL Provider

TCP / TLS

2444

AES256-GCM-SHA384:AES256-SHA256:
AES256-SHA:CAMELLIA256-SHA:
AES128-GCM-SHA256:AES128-SHA256:
AES128-SHA:CAMELLIA128-SHA: 
 

Cisco Certificate Authority Proxy Function

TCP / TLS

3804

AES256-GCM-SHA384:AES256-SHA256:
AES256-SHA:CAMELLIA256-SHA:
AES128-GCM-SHA256:AES128-SHA256:
AES128-SHA:CAMELLIA128-SHA:

CTIManager

TCP / TLS

2749

ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-RSA-AES256-SHA384:
ECDHE-RSA-AES256-SHA:
AES256-GCM-SHA384:AES256-SHA256:
AES256-SHA:CAMELLIA256-SHA:
ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-RSA-AES128-SHA256:
ECDHE-RSA-AES128-SHA:
AES128-GCM-SHA256:AES128-SHA256:
AES128-SHA:CAMELLIA128-SHA

Cisco Trust Verification Service

TCP / TLS

2445

AES256-GCM-SHA384:AES256-SHA256:
AES256-SHA:CAMELLIA256-SHA:
AES128-GCM-SHA256:AES128-SHA256:
AES128-SHA:CAMELLIA128-SHA

Cisco Intercluster Lookup Service

TCP / TLS

7501

ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-RSA-AES256-SHA384:
ECDHE-RSA-AES256-SHA:AES256-GCM-SHA384:
AES256-SHA256:AES256-SHA:
CAMELLIA256-SHA:
ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-RSA-AES128-SHA256:
ECDHE-RSA-AES128-SHA:
AES128-GCM-SHA256:AES128-SHA256:
AES128-SHA:CAMELLIA128-SHA:

Secure Configuration download (HAPROXY)

TCP / TLS

6971, 6972

ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-RSA-AES256-SHA384:
ECDHE-RSA-AES256-SHA:
DHE-RSA-CAMELLIA256-SHA:
AES256-GCM-SHA384:AES256-SHA256:
AES256-SHA:CAMELLIA256-SHA:
ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-RSA-AES128-SHA256:
ECDHE-RSA-AES128-SHA:
DHE-RSA-CAMELLIA128-SHA:
AES128-GCM-SHA256:AES128-SHA256:
AES128-SHA:CAMELLIA128-SHA:

Authenticated Contact Search

TCP / TLS

9443

ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-RSA-AES256-SHA384:
ECDHE-RSA-AES256-SHA:
DHE-RSA-CAMELLIA256-SHA:
AES256-GCM-SHA384:AES256-SHA256:
AES256-SHA:CAMELLIA256-SHA:
ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-RSA-AES128-SHA256:
ECDHE-RSA-AES128-SHA:
DHE-RSA-CAMELLIA128-SHA:
AES128-GCM-SHA256:AES128-SHA256:
AES128-SHA:CAMELLIA128-SHA:

Supported Ciphers for SSH

The following ciphers are supported by SSH:

Table 10. Cipher Support for SSH Ciphers

Service

Ciphers/Algorithms

SSH Server

  • Ciphers: aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm@openssh.com

    aes128-ctr
    aes192-ctr
    aes256-ctr
    aes128-gcm@openssh.com
    aes256-gcm@openssh.com
  • MAC algorithms:

    hmac-sha2-512
    hmac-sha2-256
    hmac-sha1
  • Kex algorithms:

    ecdh-sha2-nistp521
    ecdh-sha2-nistp384
    ecdh-sha2-nistp256
    diffie-hellman-group14-sha1
    diffie-hellman-group1-sha1
    diffie-hellman-group-exchange-sha256
    diffie-hellman-group-exchange-sha1

SSH Client

  • Ciphers:

    aes128-ctr
    aes192-ctr
    aes256-ctr
    aes128-gcm@openssh.com
    aes256-gcm@openssh.com
  • MAC algorithms:

    hmac-sha2-512
    hmac-sha2-256
    hmac-sha1
  • Kex algorithms:

    ecdh-sha2-nistp521
    ecdh-sha2-nistp384
    ecdh-sha2-nistp256
    diffie-hellman-group14-sha1
    diffie-hellman-group1-sha1
    diffie-hellman-group-exchange-sha256
    diffie-hellman-group-exchange-sha1

DRS Client

  • Ciphers:

    aes128-ctr
    aes192-ctr
    aes256-ctr
    aes128-gcm@openssh.com
    aes256-gcm@openssh.com
  • MAC algorithms:

    hmac-sha2-512
    hmac-sha2-256
    hmac-sha1
  • Kex algorithms:
    ecdh-sha2-nistp521
    ecdh-sha2-nistp384
    ecdh-sha2-nistp256
    diffie-hellman-group14-sha1
    diffie-hellman-group1-sha1
    diffie-hellman-group-exchange-sha256
    diffie-hellman-group-exchange-sha1

SFTP client

  • Ciphers:

    aes128-ctr
    aes192-ctr 
    aes256-ctr 
    aes128-gcm@openssh.com 
    aes256-gcm@openssh.com
  • MAC algorithms:

    hmac-sha2-512 
    hmac-sha2-256 
    hmac-sha1
  • Kex algorithms:

    ecdh-sha2-nistp521 
    ecdh-sha2-nistp384 
    ecdh-sha2-nistp256 
    diffie-hellman-group14-sha1 
    diffie-hellman-group1-sha1 
    diffie-hellman-group-exchange-sha256 
    diffie-hellman-group-exchange-sha1

IM and Presence Service Compatibility Information

Platform Compatibility

The IM and Presence Service shares a platform with Cisco Unified Communications Manager. Many of the compatibility topics for Cisco Unified Communications Manager double as support topics for the IM and Presence Service. You can refer to the Cisco Unified Communications Manager compatibility chapter for information on the following items:

  • Secure Connections

  • Operating System Support

  • Virtualization Requirements

  • Supported Web Browsers

  • Supported LDAP Directories

LDAP Directory Servers Supported

IM and Presence Service integrates with these LDAP directory servers:

  • Microsoft Active Directory 2000, 2003, 2008, 2012, and 2016.

  • Netscape Directory Server

  • Sun ONE Directory Server 5.2

  • OpenLDAP

Federation Support

SIP Federation Support

The following table lists supported SIP Federation integrations

Table 11. Supported SIP Federations

Third-Party System

Single Enterprise Network*

(Intradomain or Interdomain Federation)

Business to Business

(Interdomain Federation)

Direct Federation

via Expressway

via ASA

via Expressway

Lync 2010

Y

Y (SIP Broker)

Y

Not suported

Lync 2013

Y

Y (SIP Broker)

Y

Y (Traffic Classification)

Skype for Business 2015

Y

Not supported

Y

Y (Traffic Classification)

Office 365

Not applicable

Not applicable

Not supported

Y (Traffic Classification)

* The Single Enterprise Network can be partitioned intradomain federation or interdomain federation as the support values are the same for each. Business to Business integrations are always interdomain federation.

Supported XMPP Federations

This release of IM and Presence Service supports XMPP Federation with the following systems:

  • IBM Sametime

  • WebEx Messenger

  • IM and Presence Service Release 9.x and up

  • any other XMPP-compliant system

Intercluster Peering Support

This release of the IM and Presence Service supports intercluster peering with the following IM and Presence Service releases:

  • Release 9.x

  • Release 10.x

  • Release 11.x

  • Release 12.x

Calendar Integration with Microsoft Outlook

The IM and Presence Service supports Microsoft Outlook Calendar Integration with either an on-premise Exchange server or a hosted Office 365 server. Refer to the table below for support informaiton:

Table 12. Compatibility Matrix

Component

Install Compatible Version

Windows Server

  • Service Packs for Windows Server 2003 (SP2)
  • Service Packs for Windows Server 2008 (SP2)
  • Service Packs for Windows Server 2012 (Standard)

Cisco Unified Communications Manager

For Standard Deployments, the Cisco Unified Communications Manager and IM and Presence Service release versions must match.

IM and Presence Service

For Standard Deployments, the Cisco Unified Communications Manager and IM and Presence Service release versions must match.

Microsoft Exchange Server 2007

Service Packs for Microsoft Exchange 2007 (SP1).

Microsoft Exchange Server 2010

Service Packs for Microsoft Exchange 2010 (SP1).

Microsoft Exchange Server 2013

Service Packs for Microsoft Exchange 2013 (SP1).

Microsoft Exchange Server 2016

Microsoft Exchange 2016

Microsoft Office 365

Refer to your Microsoft documentation for details on deploying a hosted Office 365 server.

Active Directory

  • Active Directory 2003 with Windows Server 2003 (SP2)
  • Active Directory 2008 with Windows Server 2008 (SP2)
  • Active Directory 2012 with Windows Server 2012
Note 

User names configured in Active Directory must be identical to those names defined in Cisco Unified Communications Manager.

A Third-Party Certificate OR Certificate Server

One or the other of these is required to generate the certificates.

Note 

Microsoft Exchange integration with IM and Presence Service supports certificates using RSA 1024 or 2048 bit keys and SHA1 and SHA256 signature algorithms.

Supported Interfaces

The following interfaces are supported with this release of IM and Presence Service:

  • SIP/SIMPLE
  • REST
  • SOAP
  • XMPP
  • Cisco AJAX XMPP Library (CAXL)

Supported Ciphers for the IM and Presence Service

The following ciphers are supported by the IM and Presence Service.

Table 13. Cisco Unified Communications Manager IM & Presence Cipher Support for TLS Ciphers

Application / Process

Protocol

Port

Supported Ciphers

Cisco SIP Proxy

TCP / TLS

8083

ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-ECDSA-AES256-GCM-SHA384:
ECDHE-RSA-AES256-SHA384:
ECDHE-ECDSA-AES256-SHA384:
ECDHE-RSA-AES256-SHA:
ECDHE-ECDSA-AES256-SHA:
AES256-GCM-SHA384:AES256-SHA256:
AES256-SHA:CAMELLIA256-SHA:
ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-ECDSA-AES128-GCM-SHA256:
ECDHE-RSA-AES128-SHA256:
ECDHE-ECDSA-AES128-SHA256:
ECDHE-RSA-AES128-SHA:
ECDHE-ECDSA-AES128-SHA:
AES128-GCM-SHA256:AES128-SHA256:
AES128-SHA:CAMELLIA128-SHA:
ECDHE-RSA-DES-CBC3-SHA:
ECDHE-ECDSA-DES-CBC3-SHA:
DES-CBC3-SHA

Cisco SIP Proxy

TCP / TLS

5061

ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-ECDSA-AES256-GCM-SHA384:
ECDHE-RSA-AES256-SHA384:
ECDHE-ECDSA-AES256-SHA384:
ECDHE-RSA-AES256-SHA:
ECDHE-ECDSA-AES256-SHA:
AES256-GCM-SHA384:AES256-SHA256:
AES256-SHA:CAMELLIA256-SHA:
ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-ECDSA-AES128-GCM-SHA256:
ECDHE-RSA-AES128-SHA256:
ECDHE-ECDSA-AES128-SHA256:
ECDHE-RSA-AES128-SHA:
ECDHE-ECDSA-AES128-SHA:
AES128-GCM-SHA256:AES128-SHA256:
AES128-SHA:CAMELLIA128-SHA:
ECDHE-RSA-DES-CBC3-SHA:
ECDHE-ECDSA-DES-CBC3-SHA:
DES-CBC3-SHA

Cisco XCP XMPP Federation Connection Manager

TCP /TLS

5269

ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-ECDSA-AES256-GCM-SHA384:
ECDHE-RSA-AES256-SHA384:
ECDHE-ECDSA-AES256-SHA384:
ECDHE-RSA-AES256-SHA:
ECDHE-ECDSA-AES256-SHA:
AES256-GCM-SHA384:AES256-SHA256:
AES256-SHA:CAMELLIA256-SHA:
ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-ECDSA-AES128-GCM-SHA256:
ECDHE-RSA-AES128-SHA256:
ECDHE-ECDSA-AES128-SHA256:
ECDHE-RSA-AES128-SHA:
ECDHE-ECDSA-AES128-SHA:
AES128-GCM-SHA256:AES128-SHA256:
AES128-SHA:CAMELLIA128-SHA:
ECDHE-RSA-DES-CBC3-SHA:
ECDHE-ECDSA-DES-CBC3-SHA:
DES-CBC3-SHA

Cisco SIP Proxy

TCP /TLS

5061

ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-ECDSA-AES256-GCM-SHA384:
ECDHE-RSA-AES256-SHA384:
ECDHE-ECDSA-AES256-SHA384:
ECDHE-RSA-AES256-SHA:
ECDHE-ECDSA-AES256-SHA:
AES256-GCM-SHA384:AES256-SHA256:
AES256-SHA:CAMELLIA256-SHA:
ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-ECDSA-AES128-GCM-SHA256:
ECDHE-RSA-AES128-SHA256:
ECDHE-ECDSA-AES128-SHA256:
ECDHE-RSA-AES128-SHA:
ECDHE-ECDSA-AES128-SHA:
AES128-GCM-SHA256:
AES128-SHA256:AES128-SHA:
CAMELLIA128-SHA:
ECDHE-RSA-DES-CBC3-SHA:
ECDHE-ECDSA-DES-CBC3-SHA:
DES-CBC3-SHA

Cisco SIP Proxy

TCP / TLS

5062

ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-ECDSA-AES256-GCM-SHA384:
ECDHE-RSA-AES256-SHA384:
ECDHE-ECDSA-AES256-SHA384:
ECDHE-RSA-AES256-SHA:
ECDHE-ECDSA-AES256-SHA:
AES256-GCM-SHA384:
AES256-SHA256:AES256-SHA:
CAMELLIA256-SHA:
ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-ECDSA-AES128-GCM-SHA256:
ECDHE-RSA-AES128-SHA256:
ECDHE-ECDSA-AES128-SHA256:
ECDHE-RSA-AES128-SHA:
ECDHE-ECDSA-AES128-SHA:
AES128-GCM-SHA256:AES128-SHA256:
AES128-SHA:CAMELLIA128-SHA:
ECDHE-RSA-DES-CBC3-SHA:
ECDHE-ECDSA-DES-CBC3-SHA:
DES-CBC3-SHA

Cisco XCP Client Connection Manager

TCP / TLS

5222

ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-ECDSA-AES256-GCM-SHA384:
ECDHE-RSA-AES256-SHA384:
ECDHE-ECDSA-AES256-SHA384:
ECDHE-RSA-AES256-SHA:
ECDHE-ECDSA-AES256-SHA:
AES256-GCM-SHA384:AES256-SHA256:
AES256-SHA:CAMELLIA256-SHA:
ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-ECDSA-AES128-GCM-SHA256:
ECDHE-RSA-AES128-SHA256:
ECDHE-ECDSA-AES128-SHA256:
ECDHE-RSA-AES128-SHA:
ECDHE-ECDSA-AES128-SHA:
AES128-GCM-SHA256:AES128-SHA256:
AES128-SHA:CAMELLIA128-SHA:
ECDHE-RSA-DES-CBC3-SHA:
ECDHE-ECDSA-DES-CBC3-SHA:
DES-CBC3-SHA

Cisco Tomcat

TCP / TLS

8443, 443

ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-RSA-AES256-SHA384:
ECDHE-RSA-AES256-SHA:
DHE-RSA-AES256-GCM-SHA384:
DHE-RSA-AES256-SHA256:
DHE-RSA-AES256-SHA:
DHE-RSA-CAMELLIA256-SHA:
AES256-GCM-SHA384:AES256-SHA256:
AES256-SHA:CAMELLIA256-SHA:
ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-RSA-AES128-SHA256:
ECDHE-RSA-AES128-SHA:
DHE-RSA-AES128-GCM-SHA256:
DHE-RSA-AES128-SHA256:
DHE-RSA-AES128-SHA:
DHE-RSA-CAMELLIA128-SHA:
AES128-GCM-SHA256:
AES128-SHA256:AES128-SHA:
CAMELLIA128-SHA:
ECDHE-RSA-DES-CBC3-SHA:
EDH-RSA-DES-CBC3-SHA:
DES-CBC3-SHA 
ECDHE-ECDSA-AES256-GCM-SHA384:
ECDHE-ECDSA-AES256-SHA384:
ECDHE-ECDSA-AES256-SHA:
ECDHE-ECDSA-AES128-GCM-SHA256:
ECDHE-ECDSA-AES128-SHA256:
ECDHE-ECDSA-AES128-SHA:
ECDHE-ECDSA-DES-CBC3-SHA