The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
You can access the Serviceability application several ways:
The system uses the Cisco Tomcat service to authenticate users before allowing access to the web application.
If you get a security alert that the site is not trusted, this indicates that the server certificate has not yet downloaded.
To access Cisco Unified Serviceability, perform the following procedure:
After you sign into Cisco Unified IM and Presence Serviceability, you can access all applications that display in the Navigation list box without having to sign in to each application. Select the application you require from the list box, and select Go.
If you have already signed in to one of the applications that display in the Navigation list box (not Cisco Unified IM and Presence OS Administration or IM and Presence Disaster Recovery System), you can access Cisco Unified IM and Presence Serviceability without signing in. From the Navigation list box, select Cisco Unified IM and Presence Serviceability; then, select Go.
Step 1 | Enter https://<server name or IP address>, where the server name or IP address equals the server where the Cisco Unified IM and Presence Serviceability service runs. |
Step 2 | Sign in to Unified Communications Manager IM and Presence Administration. |
Step 3 | If the system prompts you about certificates, you must enable HTTPS to secure communications between the browser client and the web server. |
Step 4 | Enter the application user and application user password that you specified during installation when the system prompts you for a username and password. |
Step 5 | After Unified Communications Manager IM and Presence Administration displays, select from the menu in the upper right corner of the main window. |
Note |
For additional information about using HTTPS with Cisco Unified Communications Manager, refer to Cisco Unified Communications Manager Security Guide. |
Hypertext Transfer Protocol over Secure Sockets Layer (SSL), which secures communication between the browser client and the Tomcat web server, uses a certificate and a public key to encrypt the data that is transferred over the Internet. HTTPS, which ensures the identity of the server, supports applications, such as Cisco Unified Serviceability. HTTPS also ensures that the user login password transports securely over the web.
Note |
Ensure that the browser certificate and the server certificate are an exact match. |
Note |
Because of the way Internet Explorer 7 handles certificates, this browser displays an error status after you import the server certificate. This status persists if you reenter the URL or refresh or relaunch the browser and does not indicate an error. Refer to the Install Internet Explorer 7 certificate for more information. |
When you first attempt to access Cisco Unified Serviceability, a Security Alert dialog box, which indicates that the server is not trusted because the server certificate does not exist in the Trusted folder, displays. When the dialog box displays, perform one of the following tasks:
Note |
The system issues the certificate by using the hostname. If you attempt to access a web application by using the IP address, the Security Alert dialog box displays, even though you installed the certificate. |
Internet Explorer 7 adds security features that change the way that the browser handles Cisco certificates for website access. Because Cisco provides a self-signed certificate for the Cisco Unified Communications Manager or Cisco Unity Connection server, Internet Explorer 7 flags the Cisco Unified Communications Manager Administration or Cisco Unity Connection website as untrusted and provides a certificate error, even when the trust store contains the server certificate.
Note |
Internet Explorer 7, which is a Windows Vista feature, also runs on Windows XP Service Pack 2 (SP2), Windows XP Professional x64 Edition, and Windows Server 2003 Service Pack 1 (SP1). Java Runtime Environment (JRE) must be present to provide Java-related browser support for IE. |
Be sure to import the Cisco Unified Communications Manager or Cisco Unity Connection certificate to Internet Explorer 7 to secure access without having to reload the certificate every time that you restart the browser. If you continue to a website that has a certificate warning and the certificate is not in the trust store, Internet Explorer 7 remembers the certificate for the current session only.
After you download the server certificate, Internet Explorer 7 continues to display certificate errors for the website. You can ignore the security warnings when the Trusted Root Certificate Authority trust store for the browser contains the imported certificate.
The following procedure describes how to import the Cisco Unified Communications Manager or Cisco Unity Connection certificate to the root certificate trust store for Internet Explorer 7.
Step 1 |
Browse to application on the Tomcat server by entering the hostname (server name) or IP address in the browser. The browser displays a Certificate Error: Navigation Blocked message to indicate that this website is untrusted. |
Step 2 |
To access the server, click Continue to this website (not recommended) The administration window displays, and the browser displays the address bar and Certificate Error status in red. |
Step 3 | To import the server certificate, click the Certificate Error status box to display the status report. Click the View Certificates link in the report. |
Step 4 |
Verify the certificate details. The Certification Path tab displays "This CA Root certificate is not trusted because it is not in the Trusted Root Certification Authorities store." |
Step 5 |
Select the General tab in the Certificate window and click Install Certificate. The Certificate Import wizard launches. |
Step 6 |
To start the wizard, click Next. The Certificate Store window displays. |
Step 7 | Verify that the Automatic option, which allows the wizard to select the certificate store for this certificate type, is selected and click Next. |
Step 8 |
Verify the setting and click Finish. A security warning displays for the import operation. |
Step 9 |
To install the certificate, click Yes. The Import wizard displays "The import was successful." |
Step 10 | Click OK. The next time that you click the View certificates link, the Certification Path tab in the Certificate window displays "This certificate is OK." |
Step 11 |
To verify that the trust store contains the imported certificate, click Certificates and select the Trusted Root Certifications Authorities tab. Scroll to find the imported certificate in the list. in the Internet Explorer toolbar and select the Content tab. Click After importing the certificate, the browser continues to display the address bar and a Certificate Error status in red. The status persists even if you reenter the hostname or IP address or refresh or relaunch the browser. |
In addition to performing troubleshooting and service-related tasks in Cisco Unified Serviceability, you can perform the following tasks:
Note |
You cannot access the Cisco Unified Communications Manager CDR Analysis and Reporting tool unless you are a member of the Cisco CAR Administrators user group. Refer to the "Configuring the CDR Analysis and Reporting Tool" chapter in the CDR Analysis and Reporting Administration Guide for information on how to become a member of the Cisco CAR Administrators user group. |
Note |
In some scenarios, you cannot access the Cisco Unified Serviceability from Cisco Unified OS Administration. A "Loading, please wait" message displays indefinitely. If the redirect fails, log out from Cisco Unified OS Administration, select Cisco Unified Serviceability from the Navigation drop-down list box, and log in to Cisco Unified Serviceability. |
Tip |
Cisco Unified Serviceability does not support the buttons in your browser. Do not use the browser buttons, for example, the Back button, when you perform configuration tasks. |
Tip |
When a session has been idle for more than 30 minutes, the Cisco Unified Serviceability user interface allows you to make changes before indicating that the session has timed out and redirecting you to the login window. After you log in again, you may have to repeat those changes. This behavior occurs in the Alarm, Trace, Service Activation, Control Center, and SNMP windows. If you know that the session has been idle for more than 30 minutes, log out by using the Logout button before making any changes in the user interface. |