Access the Expressway User Interface

This section describes how to access the Expressway Web User Interfaces and CLI. The interfaces are enabled through the Install Wizard.

This chapter explains the following:

Using the Web User Interface

To log into the Web User Interface:

  1. Open a browser window and in the address line type one of the following:

    • IP address of the Cisco Expressway (for example, https://10.0.0.1). Enter the address as HTTPS.

    • FQDN of the Cisco Expressway (for example, https://mydomain.example.com).

  2. In the Login page, select Administrator login.

  3. Login with username admin and your system password.

  4. The Expressway Overview page is displayed.

More information

Detailed information about configuring and managing Expressway, including each page in the interface, is provided in the Expressway online help and in the Cisco Expressway Administrator Guide.

Using the CLI

The command line interface is available over SSH and through the serial port by default:

  1. Start an SSH session.

  2. Enter the IP address or FQDN of the Cisco Expressway.

  3. Log in with username admin and your system password.

  4. A welcome message is displayed.

More information

The CLI commands for Expressway are detailed in the Cisco Expressway Administrator Guide.

Next Steps

From the Expressway user interface, follow the steps described in the Cisco Expressway Basic Configuration Deployment Guide to set up the Expressway. The process is briefly summarized here, but please refer to the other guide for details before you continue:

Procedure


Step 1

The first time you log in, the Service Setup Wizard launches. The wizard is used to select specific licensing requirements for a deployment, and if necessary to change the default Expressway-C configuration to an Expressway-E.

Step 2

After the Service Setup Wizard, you go on to configure Expressway:

  1. System configuration, including the System Name, DNS settings, server certificate, NTP servers, SIP domains).

  2. Routing configuration, including transforms, search rules, and zones.

  3. Endpoint registration.

  4. System verification checks.

  5. Maintenance and optional configuration tasks.