Set Up Shared Architecture
Prerequisites
Review Cisco HCS Solution Reference Networking Design guide for Shared Architecture design, VMs and Clusters OVA specifications for the required apps, security options for Shared Architecture Data Center Deployments, and other prerequisites.
Review Cisco HCS End to End Planning guide for the Shared Architecture deployment planning consideration.
Review Cisco HCS License Management guide for the Shared Architecture deployment license consideration.
Install Data Center
Review Cisco Hosted Collaboration Solution Installation Guide for the HCS data center installation details.
Install Management Application
Review Cisco Hosted Collaboration Solution Installation Guide for the management applications installation details.
Install UC Application
Review Cisco Hosted Collaboration Solution Installation Guide for the UC apps installation details.
![]() Note |
In Shared Architecture deployment, install UC Apps either at provider or reseller level. |
Install Third-Party Apps for Directory Separation
For the detailed steps, refer to the third-party website.
Install Cisco Expressway
Review Cisco Hosted Collaboration Solution Installation Guide for the Cisco Expressway installation details.
Configure Management Application
Configure Unified CDM
Create the HCM-F Device
After you create the HCM-F device, data synchronization begins if there is a network connection and the NBI REST service is running on the HCM-F server.
Before you begin
- Install and configure HCM-F. For more information, see the Cisco Hosted Collaboration Mediation Fulfillment Install and Configure Guide.
- Verify that the NBI REST
SDR Web Service is running:
-
Sign in to the HCM-F CLI as the user administrator.
-
Run the utils service list command. Verify that the Cisco HCS NBI REST SDR Web Service is running.
-
If not running, start it with the utils service start Cisco HCS NBI REST SDR Web Service command.
-
Procedure
Step 1 |
Sign in to Cisco Unified Communications Domain Manager (Unified CDM) as hcsadmin@sys.hcs. |
Step 2 |
Create a new HCM-F instance: |
Step 3 |
If the previous step fails:
|
Step 4 |
After a couple of minutes, verify that the initial synchronization between Unified CDM and HCM-F is successful:
|
What to do next
If the initial sync is not working after following the previous steps, verify that the HCM-F REST API is working by browsing to the following: http://<hcmf_app_node_host>/sdr/rest/<hcmf_version>/entity/ServiceProvider. This command returns the JSON representation of the predefined service provider instance in the HCM-F Shared Data Repository (SDR). If you get an error, log in as the administrator on the HCM-F app node CLI and verify that the REST service is running:
To display the services, run the command: utils service list.
In the output,
you see
Cisco HCS
NBI REST SDR Web Service[STARTED]
.
If this service is not started, start it with the command: utils service start Cisco HCS NBI REST SDR Web Service
-
Select
and click the HCM-F device. -
Update the Hostname and click Save.
-
Import the new HCM-F:
-
Select
. -
In the Action field, select Import.
-
In the Device field, select the HCM-F server.
-
Click Save and wait a few minutes.
-
-
Check the provider under
.
Configure LDAP
LDAP Integration
Procedure
Step 1 |
Top-Down LDAP Management |
Step 2 |
Sync and Authentication Options for LDAP See Sync and Authentication Options for LDAP and SSO in Dedicated Cisco Unified Communications Manager |
Step 3 |
Set up LDAP Servers |
Step 4 |
Set up LDAP for User Sync |
Step 5 |
Sync Users |
Step 6 |
Set up LDAP for Authentication Only |
Step 7 |
View LDAP Authentication Users |
Step 8 |
Enable LDAP Authentication for Cisco Unified CM Users Synced from LDAP to Cisco Unified CDM See Enable LDAP Authentication in Unified CM for Users Synced from LDAP to Cisco Unified CDM |
Configure CUCM LDAP Directory Name in the LDAP Server on Unified CDM
Procedure
Step 1 |
In Unified CDM, navigate to . |
Step 2 |
Select the appropriate server. |
Step 3 |
Update the AD Sync Mode field with the LDAP Directory name from Unified CM (found in the Unified CM System), and click Save. |
Step 4 |
Add/update users in Unified CM. |
Step 5 |
In Unified CDM, select the site hierarchy, and navigate to . |
Step 6 |
Select Add or update users to CUCM from the Action. |
Step 7 |
Select the Network Device List and select all users, and the Click Save. |
Step 8 |
Repeat this procedure for other sites. |
Configure HCM-F
Configure Prime Collaboration Assurance
Review Service Assurance Configuration chapter in the Cisco Hosted Collaboration Solution Onboarding Guide for the Prime Collaboration Assurance configuration details.
![]() Note |
In Shared Architecture deployment, only devices are pushed to PCA. Access to PCA is limited to provider and reseller level. |
Configure UC Application
Configure Unified CM
Set Up Cisco Unified Communications Manager Servers
Use this procedure to configure Cisco Unified Communications Manager servers within a Unified CM cluster.
Procedure
Step 1 |
Log in as the appropriate hierarchy administrator. Only a provider or reseller administrator can create a shared architecture deployment. A customer, provider, or reseller administrator can create a dedicated instance. |
||||||||||||||||||||||||
Step 2 |
Set the hierarchy path to the correct level. Create a shared architecture at the provider or reseller level. Create a dedicated instance at the customer level. |
||||||||||||||||||||||||
Step 3 |
Click . |
||||||||||||||||||||||||
Step 4 |
Click Add. |
||||||||||||||||||||||||
Step 5 |
Enter the Unified CM server name in the CUCM Server Name field.
|
||||||||||||||||||||||||
Step 6 |
Select Voice/Video in the Server Type field. |
||||||||||||||||||||||||
Step 7 |
To configure a publisher node, check Publisher. On the Publisher tab, you can specify the following information:
|
||||||||||||||||||||||||
Step 8 |
For a Unified CM Publisher node, fill in the Cluster Name field with the name you want for this cluster. A new cluster is created with this name. This field is required. |
||||||||||||||||||||||||
Step 9 |
Expand Network Addresses. If NAT is used, also configure an APPLICATION_SPACE network address. |
||||||||||||||||||||||||
Step 10 |
Expand Credentials.
|
||||||||||||||||||||||||
Step 11 |
On the Field Mappings tab, complete field mappings as desired. Hard-coded mappings appear in gray and cannot be modified. |
||||||||||||||||||||||||
Step 12 |
Click Save. |
||||||||||||||||||||||||
Step 13 |
Test the connection between Unified CM and Unified CDM.
|
Configure Unified CM for Call Routing
Procedure
Step 1 |
Log in to the Shared Architecture Unified CM. |
Step 2 |
Navigate to . |
Step 3 |
Search (CTRL+F) for fully which bring you to the setting Cluster Fully Qualified Domain Name. |
Step 4 |
Enter the public domain name created for MRA followed by the FQDN of the Shared architecture Unified CM, and Click Save. [Example: collabedge-161.dc-01.com cucm-shared@dcloud.cisco.com] |
Step 5 |
Create a SIP Profile. |
Step 6 |
Toward the bottom of the page, for the Early Offer support for voice and video calls setting in the Trunk Specific Configuration section choose the option Best Effort (no MTP inserted). |
Step 7 |
Create a Non Secure SIP Trunk Profile. |
Step 8 |
Add a new SIP trunk. Set the following parameters:
|
Step 9 |
Choose the newly created SIP Trunk Security Profile and SIP Profile. |
Step 10 |
Add New SIP route pattern that matches the cloud URI IPv4 pattern to be sent out through the new SIP trunk to the Expressway-C. |
Configure Directory Search
There are two options for directory search in Cisco HCS:
- Use the CUCM native contact search, with the configuration described in Configure Directory Search for Shared Architecture.
- Continue to use a third party vendor for directory search. Configure according to the following sections:
Configure Directory Search for Shared Architecture
You can enhance Directory Search for Shared Architecture deployments by configuring the following parameters. All of them are required fields that are configured through the AXL interface.
Parameter Name | Default Setting | Description | ||
---|---|---|---|---|
Directory Search Scope | All Users in the System | Allows you to determine whether user data service (UDS) user searches are limited to users mapped to the same customer, or to all users in the system. When the scope is set to “Only Users within the Same Customer,” the UDS search requires authentication and UDS will limit search results to users with the same customer. | ||
Search Behavior for Users with No Customer Mapping | Only Search within Users with No Customer Mapping | Allows you to determine the behavior for UDS user searches by an end user that is not mapped to any customer. | ||
User Customer Map Audit Time | 0000-00-00 00:00 |
Allows you to schedule a user customer mapping audit. When this parameter is set, the audit for the user customer mapping between CUCM and the configured LDAP directory will be performed at the configured time. After the audit is completed, you can generate a report with the Real-Time Monitoring Tool (RTMT) under the "Cisco DirSync" to view the results.
|
![]() Note |
There is no need to change the Corporate directory and other service URL. CE platform phones may require that you modify the alternate phone book server address in CUCM's Device page. Use the |
Configure Directory Search in Jabber
Procedure
Step 1 |
Create XML File. Change the UdsServer to the appropriate customer domain from the following template and save it as jabber-config-<customer-name>.
Line related to photos is optional. It provides you the possibility to serve a .png image of each user from the third-party app (used for directory seperation), located in the folder C:\inetpub\wwwroot\JabberPhotos\. |
Step 2 |
Upload XML File to Unified CM TFTP.
|
Step 3 |
Restart the TFTP Service.
|
Step 4 |
Add Customer Entry into Exp-C Allow List. |
Step 5 |
Fill in the Cisco Support Field with XML Config file name. |
Configure Directory Search in Desk Phones
Before you begin
<preference key="Speedy.AuthLevel.ShowLocalContacts" value="2" />
<preference key="Speedy.directories.ShowLocalDirs" value="false" />
<preference key="Speedy.directories.ShowDirectoryType" value="false" />
Procedure
Step 1 |
Log in to Unified CM, and navigate to Go to . |
||
Step 2 |
Search for Corporate Directory and select the directory. |
||
Step 3 |
In the Service URL field, enter http://1.1.1.1/fw/Apps/Speedy/xml/directories/default.aspx?name=#DEVICENAME# with the IP of the <third-party app> server replacing 1.1.1.1. Use any DNS name which resolves to the third-party app server IP. |
||
Step 4 |
Click Save. |
||
Step 5 |
Reboot any phones already registered.
|
Configure IM and P
Add LDAP Server and Authentication in Unified CM
-
You plan to sync users from LDAP to Cisco Unified CDM.
-
You do not plan to sync those users from LDAP to Cisco Unified CM.
-
You plan to push those users from Cisco Unified CDM to Cisco Unified CM.
-
You want to use LDAP to authenticate those users' access to Cisco Unified CM.
Procedure
Step 1 |
On Unified CM, disable dirsync.
|
||
Step 2 |
On Cisco Unified CM, enable LDAP. |
||
Step 3 |
On Cisco Unified CM, configure LDAP Directory. |
||
Step 4 |
On Cisco Unified CM, configure LDAP Authentication. |
||
Step 5 |
On Cisco Unified CDM, sync Cisco Unified CM data to Cisco Unified CDM.
|
||
Step 6 |
On Cisco Unified CDM, configure the LDAP Server.
|
||
Step 7 |
On Cisco Unified CDM, set up LDAP for user synchronization. |
||
Step 8 |
On Cisco Unified CDM, sync users from LDAP to Cisco Unified CDM. |
||
Step 9 |
On Cisco Unified CDM, push users to Cisco Unified CM, either by Manage Users or by Subscriber Management. When users are pushed to Cisco Unified CM, the ldapDirectoryName field in the device/cucm/User is populated with the CUCM LDAP Directory Name. Cisco Unified CM treats the users as LDAP integrated, instead of local. The users appear as LDAP Active Users and use LDAP bind for authentication. From now on, the users are authenticated in Cisco Unified CM against the LDAP directory. |
Add LDAP Server in Unified CDM and Define the CUCM LDAP Directory Name
Procedure
Step 1 |
In Unified CDM, navigate to , and select the appropriate LDAP server. |
Step 2 |
Fill in the AD Sync Mode with the LDAP Directory name from Unified CM ( ), and click Save. |
Step 3 |
Add/update users in Unified CM. |
Step 4 |
In Unified CDM, select the site in hierarchy and navigate to . |
Step 5 |
Select Add or update users to CUCM from the Action drop-down list. |
Step 6 |
Select a Network Device List that contains the target Unified CM server. |
Step 7 |
Click Select All. |
Step 8 |
Click Save to move the selected users to Unified CM. |
Step 9 |
Repeat for other sites. |
Configure Managed File Transfer in Cisco Unified CM IM and Presence
Managed File Transfer (MFT) is a server-side file transfer solution. It allows an IM and Presence service client, such as Cisco Jabber to transfer files to other users, ad hoc group chats and persistent chats. It allows file sharing between users in one-to-one, ad hoc group, and persistent chat. The file repository is on a customer-provided external file server. Audit logging of all uploads and downloads are in external database.
This topic covers the procedure for configuring Managed File Transfer in Cisco Unified CM IM and Presence.
Prerequisites for Managed File Transfer in IM and P
-
Jabber 10.6
-
Unified CM IM & Presence 10.5.2 or above
-
PostgreSQL 8.3.x or above
While transferring files between Jabber clients has been a supported feature for quite a while, this was limited to peer-peer transaction until now, which eliminated the possibility to transfer files in a group chats, chat rooms.
Starting with Jabber 10.6 and Unified CM IM & Presence 10.5.2, a new method to transfer files between clients has been introduced with the following features:
-
Group chat support of File transfer
-
Chat room support of File transfer
-
Admin can define a file size for Jabber users when transferring files
-
File transfer compliance and screen captures are transferred for audit and policy control
-
File transfer inline status message
This refers to "Managed File transfer". While the peer-peer option does not involve any central instance, the Managed File transfer does rely on central database instance.
External Database Setup Requirements
General Requirements
Cisco recommends having a certified PostgreSQL and Oracle or Microsoft SQL Server administrator to maintain and retrieve information from the external database.
Hardware Requirements
A remote server on which you install the PostgreSQL or Oracle database.
Software Requirements
-
IM and Presence Service, current release
-
External Database:
Database
Supported Versions
PostgreSQL
Versions 8.3.x through 9.4.x are supported, and in IM and Presence Service Release, 11.0(1) versions: 9.1.9, 9.2.6, 9.3.6, 9.4.1 have been tested.
Note You can also use version 8.1.x of the PostgreSQL database, but the configuration of these versions may be different to the PostgreSQL database configuration described in this section. See the PostgreSQL documentation for details on how to configure these PostgreSQL database versions. If you use Version 8.1.x of the PostgreSQL database, the database configuration on IM and Presence Service is the same as described in this section.
Oracle
Versions 9g, 10g, 11g, and 12c are supported, and in IM and Presence Service Release, 11.0(1) versions: 11.2.0.1.0 and 12.1.0.1.0 have been tested.
External Database Requirements for IM and Presence Service
The external database requirements depend on the features you need to deploy on IM and Presence Service.
Features |
Requirements |
||
---|---|---|---|
Persistent Group Chat feature |
A minimum of one unique logical external database instance (tablespace) is required for the entire IM and Presence Service intercluster. A unique logical external database instance for each IM and Presence Service node or redundancy group in an IM and Presence Service cluster provides optimum performance and scalability, but is not mandatory. |
||
High Availability for Persistent Chat feature |
You must enable High Availability and Persistent Chat. Make sure that both presence redundancy group nodes are assigned to the same unique logical external database instance. Oracle and PostgreSQL can be used with High Availability for Persistent Chat. However, PostgreSQL has some significant challenges it trying to make it a High Availability database with automatic redundancy. |
||
Message Archiver (compliance) feature |
We recommend that you configure at least one external database for each IM and Presence Service cluster; however, you may require more than one external database for a cluster depending on your database server capacity. |
||
Managed File Transfer feature |
You require one unique logical external database instance for each IM and Presence Service node in an IM and Presence Service cluster.
|
Cisco Unified Presence Server PostgreSQL External Database and Compliance Configuration Example
For configuration example to set up the PostgreSQL Server and database, see Cisco Unified Presence Server PostgreSQL External Database and Compliance Configuration Example guide available at https://www.cisco.com/c/en/us/support/unified-communications/unified-presence/products-configuration-examples-list.html.
Set Up External Database Connection
IM and Presence Service does not establish a connection to the external database when you configure an external database entry. The external database has not created the database schema at this point. It is only when you assign an external database entry to a node that IM and Presence Service establishes an ODBC (Open Database Connectivity) connection with the external database. Once IM and Presence Service establishes a connection, the external database creates the database tables for the IM and Presence Service features.
Once you assign an external database entry to a node, you can validate the connection using the System Troubleshooter in the Cisco Unified CM IM and Presence Service Administration user interface.
![]() Note |
If your IM and Presence Service node connects to an external database server using IPv6, ensure that the enterprise parameter is configured for IPv6 and that Eth0 is set for IPv6 on each node in the deployment; otherwise, the connection to the external database server fails. The Message Archiver and Cisco XCP Text Conference Manager are unable to connect to the external database and fail. For information about configuring IPv6 on IM and Presence Service, see Configuration and Administration of IM and Presence Service on Cisco Unified Communications Manager guide available at https://www.cisco.com/c/en/us/support/unified-communications/unified-communications-manager-im-presence-service-version-11-5/model.html. |
Before you begin
-
Install and configure the external database.
-
Obtain the hostname or IP address of the external database.
Procedure
Step 1 |
Log in to the Cisco Unified CM IM and Presence Administration user interface. |
||
Step 2 |
Navigate to . |
||
Step 3 |
Click Add New. |
||
Step 4 |
Enter the name of the database that you defined at external database installation, for example, tcmadb. |
||
Step 5 |
Choose the database type from the drop-down list, Postgres or Oracle. If you chose Oracle as the database type, enter the tablespace value. |
||
Step 6 |
Enter the username for the database user (owner) that you defined at external database installation, for example, tcuser. |
||
Step 7 |
Enter and confirm the password for the database user, for example, mypassword. |
||
Step 8 |
Enter the hostname or IP address for the external database. |
||
Step 9 |
Enter a port number for the external database. The default port numbers for Postgres (5432), Oracle (1521), and Oracle with SSL enabled (2484) are prepopulated in the Port Number field. You can choose to enter a different port number, if required. |
||
Step 10 |
If you chose Oracle as the Database Type, the Enable SSL checkbox becomes active. Check the checkbox to enable SSL. The Certificate Name drop-down list becomes active. Choose a certificate from the drop-down list.
|
||
Step 11 |
Click Save. |
||
Step 12 |
If you make a configuration change in the install_dir/data/pg_hba.conf file or the install_dir/data/postgresql.conf file after you assign the external database, perform these steps:
|
Accessing IM and Presence Service Status Information on an external database
-
Database reachability — Verifies that the IM and Presence Service can ping an external database.
-
Database connectivity — Verifies that the IM and Presence Service has successfully established an Open Database Connectivity (ODBC) connection with the external database.
-
Database schema verification — Verifies that the external database schema is valid.
![]() Caution |
If your IM and Presence Service node connects to an external database server using IPv6, ensure that the enterprise parameter is configured for IPv6 and that Eth0 is set for IPv6 on each node in the deployment; otherwise, the connection to the external database server fails. The message archiver (compliance) and Cisco XCP Text Conference Manager is unable to connect to the external database and fails. For information about configuring IPv6 on IM and Presence Service, see Configuration and Administration of IM and Presence Service on Cisco Unified Communications Manager guide available at https://www.cisco.com/c/en/us/support/unified-communications/unified-communications-manager-im-presence-service-version-11-5/model.html. |
Procedure
Step 1 |
Log in to the Cisco Unified CM IM and Presence Administration user interface. |
Step 2 |
Navigate to . |
Step 3 |
Click Find. |
Step 4 |
Choose the external database entry that you want to view. |
Step 5 |
Verify that there are check marks beside each of the result entries for the external database in the External Database Status section. |
Step 6 |
In the Cisco Unified CM IM and Presence Administration user interface, navigate to . |
Step 7 |
Verify that there are check marks beside the status of each of the external database connection entries in the External Database Troubleshooter section. |
Set Up an External File Server
-
If you deploy any combination of the persistent group chat, message archiver, or managed file transfer features on an IM and Presence Service node, you can assign the same physical external database installation and external file server to all these features. However, you should consider the potential IM traffic, the number of file transfers, and the file size when you determine the server capacity.
-
Ensure that all clients can resolve the full FQDN of the IM and Presence Service node to which they are assigned. For the managed file transfer feature to work, it is not enough for the clients to resolve the hostname; they must be able to resolve the FQDN.
-
The node public key is invalidated if the node's assignment is removed. If the node is reassigned, a new node public key is automatically generated and the key must be reconfigured on the external file server.
-
The Cisco XCP File Transfer Manager service must be active on each node where managed file transfer is enabled.
-
Disabled: file transfer is disabled for the cluster.
-
Peer-to-Peer: one-to-one file transfers are allowed, but files are not archived or stored on a server. Group chat file transfer is not supported.
-
Managed File Transfer: one-to-one and group file transfers are allowed. File transfers are logged to a database and the transferred files are stored on a server. The client must also support managed file transfer, otherwise no file transfers are allowed.
-
Managed and Peer-to-Peer File Transfer: one-to-one and group file transfers are allowed. File transfers are logged to a database and the transferred files are stored on a server only if the client supports managed file transfer. If the client does not support managed file transfer, this option is equivalent to the Peer-to-Peer option.
![]() Note |
If managed file transfer is configured on a node and you change the File Transfer Type to Disabled or Peer-to-Peer, be aware that the mapped settings to the external database and to the external file server for that node are deleted. The database and file server remain configured but you must reassign them if you re-enable managed file transfer for the node. |
Depending on your pre-upgrade setting, after an upgrade to IM and Presence Service Release 10.5(2) or later, either Disabled or Peer-to-Peer is selected.
Prerequisites for External File Server
Before you begin
-
Install and configure an external database, see Database Setup for IM and Presence Service on Cisco Unified Communications Manager guide at http://www.cisco.com/c/en/us/support/unified-communications/unified-communications-manager-callmanager/products-installation-and-configuration-guides-list.html.
-
Configure an External Database Instance on IM and Presence Service.
Before setting up the users, directories, ownership, permissions, and other tasks on the file server, complete these steps.
Procedure
Step 1 |
Install a supported version of Linux. |
||
Step 2 |
Verify the file server supports SSHv2 and OpenSSH 4.9 or later by entering one of the following commands as root:
|
||
Step 3 |
To allow private/public key authentication, make sure that you have the following fields in the /etc/ssh/sshd_config file, set to yes.
If these are commented out in the file, the setting can be left alone.
|
||
Step 4 |
We recommend creating one or more separate partitions that are dedicated to file transfer storage so that other applications that run on the server do not write to it. All file storage directories must be created on these partitions. |
Set Up a User
Procedure
Step 1 |
On the file server as root, create a user who owns the file storage directory structure (our example uses mftuser) and force creation of the home directory (-m).
|
||
Step 2 |
Switch to the mftuser.
|
||
Step 3 |
Create a .ssh directory under the ~mftuser home directory that is used as a key store.
|
||
Step 4 |
Create an authorized_keys file under the .ssh directory that is used to hold the public key text for each managed file transfer enabled node.
|
||
Step 5 |
Set the correct permissions for passwordless SSH to function.
|
Set Up Directories
Procedure
Step 1 |
Switch back to the root user.
|
||
Step 2 |
Create a top-level directory structure (for example, /opt/mftFileStore/) to hold directories for all the IM and Presence Service nodes that have managed file transfer enabled.
|
||
Step 3 |
Provide the mftuser sole ownership of the /opt/mftFileStore/ directory.
|
||
Step 4 |
Provide the mftuser sole permissions to the mftFileStore directory.
|
||
Step 5 |
Switch to the mftuser.
|
||
Step 6 |
Create a subdirectory under /opt/mftFileStore/ for each managed file transfer enabled node (Later, when you enable managed file transfer, you assign each directory to a node).
|
Obtain the Public Key
Procedure
Step 1 |
To retrieve the file server's public key, enter:
Where host is the hostname, FQDN, or IP address of the file server.
|
||
Step 2 |
Copy the result of the ssh-keyscan -t rsa host command, not what is in the ssh_host_rsa_key.pub file. Ensure to copy the entire key value, from the server hostname, FQDN, or IP address to the end.
|
||
Step 3 |
Save the result of the ssh-keyscan -t rsa host command to a .text file. It is needed when you configure the file server during the Deploy an External File Server on IM and Presence Service procedure. |
||
Step 4 |
Open the authorized_keys file you created and leave it open. It is used in the Enable Managed File Transfer on IM and Presence Service procedure. |
Configure an External File Server Instance on IM and Presence Service
Before you begin
-
Install and configure an external database, see Database Setup for IM and Presence Service on Cisco Unified Communications Manager available at http://www.cisco.com/c/en/us/support/unified-communications/unified-communications-manager-callmanager/products-installation-and-configuration-guides-list.html.
-
Configure an External Database Instance on IM and Presence Service
-
Set Up an External File Server
- Obtain the following external file server information:
-
Hostname, FQDN, or IP address
-
Public key
-
Path to the file storage directory
-
User name
-
Procedure
Step 1 |
Log in to the Cisco Unified CM IM and Presence Administration user interface. Navigate to . |
||||||||||||||||
Step 2 |
Click Add New. The External File Servers window appears. |
||||||||||||||||
Step 3 |
Enter the server details.
|
||||||||||||||||
Step 4 |
Repeat these steps to create an external file server instance for each node in the cluster that has managed file transfer enabled. |
||||||||||||||||
Step 5 |
Click Save. |
Enable Managed File Transfer on IM and Presence Service
Before you begin
-
Set up an external database
-
Configure an External Database Instance on IM and Presence Service
-
Set Up an External File Server
-
Configure an External File Server Instance on IM and Presence Service
Procedure
Step 1 |
Log in to Cisco Unified CM IM and Presence Administration. |
||
Step 2 |
Navigate to . |
||
Step 3 |
In the File Transfer Configuration area of the The File Transfer window, choose either Managed File Transfer or Managed and Peer-to-Peer File Transfer, depending on your deployment. |
||
Step 4 |
Enter the Maximum File Size. If you enter 0, the maximum size (4GB) applies.
|
||
Step 5 |
In the Managed File Transfer Assignment area, assign the external database and the external file server for each node in the cluster.
|
||
Step 6 |
Click Save. After clicking Save a Node Public Key link, for each assignment, appears. |
||
Step 7 |
For each node in the cluster that has managed file transfer enabled, you must copy the node's entire public key to the external file server's authorized_keys file. |
||
Step 8 |
Ensure that the Cisco XCP File Transfer Manager service is active on all nodes where managed file transfer is enabled. This service only starts if an external database and an external file server have been assigned, and if the service can connect to the database and mount the file server. Complete the following steps to check that the Cisco XCP File Transfer Manager service is active on all managed file transfer enabled nodes: |
||
Step 9 |
If you are configuring the managed file transfer feature on a node for the first time, you must manually start the Cisco XCP File Transfer Manager service, as follows:
|
||
Step 10 |
Restart the Cisco XCP Router service.
|
||
Step 11 |
Verify that there are no problems with the external database setup and with the external file server setup.
|
Configure Unity Connection
Configure Voice Mail in Unified CDM
For a detailed procedure on configuring voice mail, see Cisco Unified Communications Domain Manager Maintain and Operate Guide.
Manual Set Up: Cisco Unity Connection
Procedure
Step 1 |
In Expressway-C, navigate to , and add the entries for unity connection server:
|
Step 2 |
If the Unified CM Cluster has two or more servers, complete the following manual configuration in Unity Connection:
|
Step 3 |
If the Unity Connection Cluster has Active-Active publishers, complete the following configuration: in Unity Connection: When Unified CDM provision the Voicemail service, the ports are created only for Publisher1 of Unity Cluster. You need to manually add the ports for Publisher2.
|
Step 4 |
Complete the following configuration for Cisco Jabber client to retrieve the voicemail server information: Cisco Jabber does not read Voicemail UC Service Profile when it is deployed only in the Phone mode. |
Step 5 |
Complete the following configuration for Cisco Jabber client in IM and Presence server: Jabber client's IM Address is in <UserID>@<DefaultDomain> format which will not be same as the user's e-mail address. Update the IM Address Scheme configuration to display the proper e-mail address of user. |
Step 6 |
Complete the following configuration for Exchange Integration in Unity Connection:
|
Step 7 |
In Unity Connection, navigate to Class of Service from the Default Class of Service to Customer Specific Class of Service (for example, Voice Mail User COS to Cu7-C0003vmService_COS_1). , and change the |
Step 8 |
In Unity Connection, navigate to .
|
Step 9 |
In Microsoft Exchange Server, enable Impersonation Account for the User. |
Step 10 |
In Unity Connection, navigate to . |
Configure Call Screening
Procedure
Step 1 |
Complete the following steps in Unified CM:
|
Step 2 |
Complete the following steps in Unity Connection:
|
Configure Cisco Expressway
Clustering Expressway-E and an Expressway-C
For detail on Expressway-C and Expressway-E clustering configuration, see Cisco VCS Cluster Creation and Maintenance Deployment Guide.
Configure Expressway-C for Unified Communications
Discover Unified CM Servers
Procedure
Step 1 |
On Expressway-C, navigate to .The page lists any Unified CM nodes that have already been discovered. |
Step 2 |
Add the details of a Unified CM publisher node: |
Step 3 |
Repeat the discovery procedure for other Unified CM nodes/clusters, if required. |
Step 4 |
Click Refresh servers to refresh all the node details after configuring multiple publisher addresses. |
Edit the HTTP Allow List on Expressway-C
Procedure
Step 1 |
On Expressway-C, navigate to .The page has two areas; one for controlling the default HTTP methods, and the other showing the editable rules. |
||||||||||||
Step 2 |
[Optional] Use the checkboxes to modify the set of default HTTP methods, then click Save. You can override the defaults while you're editing individual rules. If you want to be as secure as possible, clear all methods from the default set and specify methods on a per rule basis.
|
||||||||||||
Step 3 |
[Recommended] Delete any rules you don't need by checking the boxes in the left column, then clicking Delete. |
||||||||||||
Step 4 |
Click New to create a rule. |
||||||||||||
Step 5 |
Complete the fields to create the rule to your requirements:
|
||||||||||||
Step 6 |
Click Create Entry to save the rule and return to the editable allow list. |
||||||||||||
Step 7 |
[Optional] Click View/Edit to change the rule. |
What to do next
Configure Domains to Route to Unified CM
Procedure
Step 1 |
On Expressway-C, navigate to . |
Step 2 |
Select the domains (or create a new domain, if not already configured) for which services are to be routed to Unified CM. |
Step 3 |
For each domain, turn On the services (for example, Unified CM registration, IM and Presence Service, XMPP Federation) that Expressway is to support. |
Enabling Shared Line / Multiple Lines for MRA Endpoints
If you want MRA endpoints to be able to register multiple lines, or to share lines with other endpoints, then you must enable SIP Path headers on the Expressway-C.
The default behavior is for the Expressway-C to rewrite the Contact header in REGISTER messages. When you turn SIP Path headers on, the Expressway-C does not rewrite the Contact header, but adds its address into the Path header instead.
Before you begin
Procedure
Step 1 |
On Expressway-C, navigate to . |
||
Step 2 |
Change SIP Path headers to On. |
||
Step 3 |
Click Save. The Expressway-C puts its address in the Path headers of registrations from now on, and preserves the Contact header. |
||
Step 4 |
Refresh your Unified CM servers (Refresh servers). , click
|
Configure SIP
Procedure
Step 1 |
On Expressway-C, navigate to . |
||||||||||||||||||||||||||
Step 2 |
Complete the SIP configuration:
|
Configure SIP Domains
-
Registration restriction (Allow or Deny) rules can be configured to limit acceptable registrations. See Configure Registration Restriction Policy (Optional).
If authentication is enabled, only devices that can properly authenticate themselves will be allowed to register.
Procedure
Step 1 |
On Expressway-C and Expressway-E, navigate to . |
Step 2 |
Click New. |
Step 3 |
Enter the domain name into the Name field (on both Expressway-C and Expressway-E): |
Step 4 |
Click Create domain. The Domains page displays all configured SIP domain names. |
Configure Registration Restriction Policy (Optional)
Procedure
Step 1 |
On Expressway-C, navigate to . |
||||||||
Step 2 |
Click New. |
||||||||
Step 3 |
Create an allow pattern by configuring the following fields. This example limits registrations to endpoints which register with an identity that contains “@example.com”.
|
||||||||
Step 4 |
Click Add Allow List pattern. Fill in the Description, Pattern type, Pattern string fields. |
What to do next
Configure Unified CM Servers on Expressway-C
Procedure
Step 1 |
On Expressway-C, navigate to . The page displays any existing servers that have been configured. |
Step 2 |
Add the details of a Unified CM publisher.
|
Configure Unified Communications Traversal Zone to Expressway-C
Procedure
Step 1 |
Log in to Cisco Expressway-E. |
||||||||||||||||
Step 2 |
Navigate to . |
||||||||||||||||
Step 3 |
Complete the fields to create a Unified Communications traversal zone to the Expressway-C. |
||||||||||||||||
Step 4 |
Configure the SIP Settings.
|
||||||||||||||||
Step 5 |
Configure the Authentication Settings.
|
||||||||||||||||
Step 6 |
Navigate to New. and click |
||||||||||||||||
Step 7 |
Create Search rules to route traffic from Expressway-E to Unified CM and from Unified CM to Expressway-E. For more information on creating Secure Traversal Zones, refer to the Cisco Expressway Administrator guide. |
Configure Expressway-E for MRA
Ensure that Expressway-E is publicly accessible and can be reached via a browser by using the domain address [example: vcse.collabedge-XXX.dc-YY.com]. For additional troubleshooting requirement, see DNS Records.
Configure DNS, NTP, and IP Settings
Procedure
Step 1 |
Log in to Expressway-C. |
Step 2 |
Navigate to .
|
Step 3 |
Navigate to . |
Step 4 |
Navigate to , and ensure the following settings:
|
Enable Mobile and Remote Access
Procedure
Step 1 |
On Expressway-C, navigate to . |
Step 2 |
Set Mobile and remote access to ON. |
Step 3 |
Click Save. |
Configure SIP
Procedure
Step 1 |
On Expressway-E, navigate to . |
||||||||||||||||||||||||||
Step 2 |
Complete the SIP configuration:
|
Configure DNS Zone
Procedure
Step 1 |
On the Expressway-E, navigate to . |
||||||||||||||||
Step 2 |
Click New. |
||||||||||||||||
Step 3 |
Configure the fields as follows:
|
||||||||||||||||
Step 4 |
Click Create Zone. |
DNS Records
This section summarizes the public (external) and local (internal) DNS requirements. For more information, see the Cisco Jabber Planning Guide on the Jabber Install and Upgrade Guides page.
DNS Configuration on Host Server
-
External endpoints registration messages to be routed to the Expressway-E.
-
Calls from non-registered endpoints (or other infrastructure devices) to be routed to the Expressway-E.
Host DNS A Record
Host |
Host IP address |
---|---|
expe.example.com |
192.0.2.2 |
DNS SRV Records
Name |
Service |
Protocol |
Priority |
Weight |
Port |
Target host |
---|---|---|---|---|---|---|
example.com. |
h323cs |
tcp |
10 |
10 |
1720 |
expe.example.com. |
example.com. |
h323ls |
udp |
10 |
10 |
1719 |
expe.example.com. |
example.com. |
sip |
tcp |
10 |
10 |
5060 |
expe.example.com. |
example.com. |
sip |
udp* |
10 |
10 |
5060 |
expe.example.com. |
example.com. |
sips |
tcp |
10 |
10 |
5061 |
expe.example.com. |
example.com. |
turn |
udp |
10 |
10 |
3478** |
expe.example.com. |
example.com. |
collab-edge |
tls |
10 |
10 |
8443 |
expe1.example.com |
example.com. |
collab-edge |
tls |
10 |
10 |
8443 |
expe2.example.com |
example.com. |
sips |
tcp |
10 |
10 |
5061 |
expe1.example.com |
example.com. |
sips |
tcp |
10 |
10 |
5061 |
expe2.example.com |
* SIP UDP is disabled on Expressway by default.
** On Large Expressway deployments you should configure multiple records for the range 3478 – 3483.
![]() Note |
The public (external) DNS must be configured with _collab-edge._tls. SRV records so that endpoints can discover the Expressway-Es to use for Mobile and Remote Access. SIP service records are also required (for general deployment, not specifically for Mobile and Remote Access). For example, for a cluster of 2 Expressway-E systems. |
_h323cs._tcp.example.com. 86400 IN SRV 10 10 1720 expe.example.com.
_h323ls._udp.example.com. 86400 IN SRV 10 10 1719 expe.example.com.
_sip._tcp.example.com. 86400 IN SRV 10 10 5060 expe.example.com.
_sip._udp.example.com. 86400 IN SRV 10 10 5060 expe.example.com.
_sips._tcp.example.com. 86400 IN SRV 10 10 5061 expe.example.com.
_turn._udp.example.com. 86400 IN SRV 10 10 3478 expe.example.com.
expe.example.com. 86400 IN A 192.0.2.2
If you have a cluster of Expressway-Es, you must set up DNS A and SRV records for each peer/host in the cluster. See Expressway Cluster Creation and Maintenance Deployment Guide for more information.
DNS Configuration (internal DNS server)
The following records are required in the local DNS which hosts the internally routable domain: internal-domain.net to allow internal messages to be routed to the Expressway-C.
Local DNS A Record
Host |
Host IP address |
---|---|
expc.internal-domain.net |
10.0.0.2 |
Local DNS SRV Records
Name |
Service |
Protocol |
Priority |
Weight |
Port |
Target host |
---|---|---|---|---|---|---|
internal-domain.net. |
h323cs |
tcp |
10 |
10 |
1720 |
expc.internal-domain.net. |
internal-domain.net. |
h323ls |
udp |
10 |
10 |
1719 |
expc.internal-domain.net. |
internal-domain.net. |
h323rs |
udp |
10 |
10 |
1719 |
expc.internal-domain.net. |
internal-domain.net. |
sip |
tcp |
10 |
10 |
5060 |
expc.internal-domain.net. |
internal-domain.net. |
sip |
upd* |
10 |
10 |
5060 |
expc.internal-domain.net. |
internal-domain.net. |
sips |
tcp |
10 |
10 |
5061 |
expc.internal-domain.net. |
example.com |
cisco-uds |
tcp |
10 |
10 |
8443 |
cucmserver1.example.com |
example.com |
cisco-uds |
tcp |
10 |
10 |
8443 |
cucmserver2.example.com |
* SIP UDP is disabled on Expressway by default.
_h323cs._tcp.internal-domain.net. 86400 IN SRV 10 10 1720 expc.internal-domain.net.
_h323ls._udp.internal-domain.net. 86400 IN SRV 10 10 1719 expc.internal-domain.net.
_h323rs._udp.internal-domain.net. 86400 IN SRV 10 10 1719 expc.internal-domain.net.
_sip._tcp.internal-domain.net. 86400 IN SRV 10 10 5060 expc.internal-domain.net.
_sip._udp.internal-domain.net. 86400 IN SRV 10 10 5060 expc.internal-domain.net.
_sips._tcp.internal-domain.net. 86400 IN SRV 10 10 5061 expc.internal-domain.net.
expc.internal-domain.net. 86400 IN A 10.0.0.2
If you have a cluster of Expressway-Cs, you must set up DNS A and SRV records for each peer/host in the cluster. See Expressway Cluster Creation and Maintenance Deployment Guide for more information.
![]() Note |
|
Routing Configuration
Pre-search Transforms
Pre-search transform configuration allows the destination alias (called address) in an incoming search request to be modified. The Expressway applies the transformation before any searches are sent to external zones.
The pre-search transform configuration described in this document is used to standardize destination aliases originating from both H.323 and SIP devices. This means that the same call searches work for calls from both H.323 and SIP endpoints.
For example, if the called address is an H.323 E.164 alias “01234”, the Expressway automatically appends the configured domain name (in this case example.com) to the called address (that is, 01234@example.com making it into a URI), before attempting to set up the call.
-
Use pre-search transforms with care, because they apply to all signaling messages. If they match, they will affect the routing of Unified Communications messages, provisioning and presence requests as well as call requests.
-
Transformations can also be carried out in search rules. Consider whether it's best to use a pre-search transform or a search rule to modify the called address to be looked up.
Search Rules
Search rules define how the Expressway routes calls (to destination zones, such as to Unified CM, or another Expressway, or Meeting Server) in specific call scenarios. When a search rule is matched, the destination alias can be modified according to the conditions defined in the search rule.
The search rules described in this document are used to ensure that endpoints can dial H.323 devices that have registered E.164 numbers or H.323 IDs without a domain portion. The search rules first search for received destination aliases without the domain portion of the URI, and then search with the full URI.
The search rules described here are used to enable the following routing combinations:
Calling party |
Called party |
---|---|
Registered devices (Expressway-C) |
Registered devices (Expressway-C) |
Registered devices (Expressway-C) |
External domains and un-registered devices (via Expressway-E using DNS zone) |
Registered devices (Expressway-C) |
Public external IP addresses (via Expressway-E) |
External domains and un-registered devices |
Registered devices (Expressway-C) |
The routing configuration in this document searches for destination aliases that have valid SIP URIs. That is, using a valid SIP domain, such as id@domain.
You can configure routing which enables calls to unregistered devices on an internal network (routing to the addresses of IP of the devices) by configuring a search rule with a mode of Any IP address with target Local Zone. However, this is not recommended (and not described in this document). The best practice is to register all devices and route using destination aliases.
Configure Transforms
The following transform modifies the destination alias of all call attempts made to destination aliases which do not contain an ‘@’. The old destination alias has @example.com appended to it, thus standardizing all called destination aliases into a SIP URI format.
Procedure
Step 1 |
On Expressway-C and Expressway-E, navigate to . |
||||||||||||||||||||||||
Step 2 |
Click New. |
||||||||||||||||||||||||
Step 3 |
Configure the transform fields as follows:
|
||||||||||||||||||||||||
Step 4 |
Click Create transform. |
Configure Local Zone Search Rules
Procedure
Step 1 |
On Expressway-C and Expressway-E, navigate to . |
||||||||||||||||||||||||||||||||||||||||||
Step 2 |
First disable the supplied default search rule (LocalZoneMatch), as follows: |
||||||||||||||||||||||||||||||||||||||||||
Step 3 |
Click New. |
||||||||||||||||||||||||||||||||||||||||||
Step 4 |
Configure the search rule fields as follows:
|
||||||||||||||||||||||||||||||||||||||||||
Step 5 |
Click Create search rule. |
Configure Traversal Zone
Procedure
Step 1 |
In Expressway-C and Expressway-E, navigate to |
|||||||||||||||||||||||||||||||||||||||||||||
Step 2 |
Click New. |
|||||||||||||||||||||||||||||||||||||||||||||
Step 3 |
Configure the fields as follows:
|
|||||||||||||||||||||||||||||||||||||||||||||
Step 4 |
Click Create zone. |
What to do next
Configure Authentication Credentials in Expressway-E
Configure the authentication credentials in the Local authentication database (configured in the Expressway-E only).
Procedure
Step 1 |
In Expressway-E, navigate to . |
|||||||||
Step 2 |
Click New. |
|||||||||
Step 3 |
Configure the fields as follows:
|
|||||||||
Step 4 |
Click Create credential. |
Neighboring Between Expressway Clusters
-
locally registered endpoints (if the endpoint is registered to that peer)
-
peers (if the endpoint is registered to another peer in that cluster)
-
external zones (if the endpoint has been located elsewhere)
For Expressway: Lowest resource usage is determined by comparing the number of available media sessions (maximum - current use) on the peers, and choosing the peer with the highest number. Peers that are in maintenance mode are not considered.
For VCS: Lowest resource usage is determined by comparing the number of available traversal calls (maximum - current use) on the peers, and choosing the peer with the highest number. Peers that are in maintenance mode are not considered.
When configuring a connection to a remote cluster, you create a single zone and configure it with details of all the peers in the cluster. Adding this information to the zone ensures that the call is passed to that cluster regardless of the status of the individual peers.
You also need to enter the IP address of all peers in the remote cluster when the connection is via a neighbor or traversal client zone. You do not do this for traversal server zones, as these connections are not configured by specifying the remote system's IP address.
![]() Note |
Systems that are configured as peers must not also be configured as neighbors to each other, and vice versa. |
Neighboring your clusters
To neighbor your local Expressway (or Expressway cluster) to a remote Expressway cluster, you create a single zone to represent the cluster and configure it with the details of all the peers in that cluster:
Procedure
Step 1 |
On your local Expressway (or, if the local Expressway is a cluster, on the primary peer), create a zone of the appropriate type. This zone will represent the connection to the cluster. |
||
Step 2 |
In the Location section, enter the IP address or FQDN of each peer in the remote cluster in the Peer 1 to Peer 6 address fields.
|
Configure Traversal Zone Search Rules
Procedure
Step 1 |
On Expressway-C and Expressway-E, navigate to . |
|||||||||||||||||||||||||||||||||
Step 2 |
Click New. |
|||||||||||||||||||||||||||||||||
Step 3 |
Configure the fields as follows:
|
|||||||||||||||||||||||||||||||||
Step 4 |
Click Create search rule. |
Configure DNS Zone Search Rules
The DNS search rule defines when the DNS zone should be searched.
A specific regular expression is configured which prevent searches being made using the DNS zone (that is, on the public internet) for destination addresses (URIs) using any SIP domains which are configured on the local network (local domains).
To create the search rules to route via DNS:
Procedure
Step 1 |
In Expressway-E, navigate to |
||||||||||||||||||||||||||||
Step 2 |
Click New. |
||||||||||||||||||||||||||||
Step 3 |
Configure the fields as follows:
|
||||||||||||||||||||||||||||
Step 4 |
Click Create search rule.
|
Configure External (Unknown) IP Address Routing
The following configuration defines how an Expressway routes calls (and other requests) to external (unknown) IP addresses. An external IP address is an IP address which is not known to the Expressway and therefore assumed to be a publicly routable address.
Known IP addresses are addresses defined in a subzone (using a subzone membership subnet rule).
-
All requests destined for external IP addresses, originating at the Expressway-C are routed to the Expressway-E using a search rule.
-
The Expressway-E then attempts to open a connection directly to the IP address.
Procedure
Step 1 |
In Expressway-C and Expressway-E, navigate to . |
||||
Step 2 |
Complete the following fields:
|
||||
Step 3 |
Click Save. |
What to do next
Create Search Rules to Route Calls to IP addresses to the Expressway-E
Before you begin
Procedure
Step 1 |
In Expressway-E, navigate to |
|||||||||||||||||||||||||||||||||
Step 2 |
Click New. |
|||||||||||||||||||||||||||||||||
Step 3 |
Configure the fields as follows:
|
|||||||||||||||||||||||||||||||||
Step 4 |
Click Create search rule. |
Create Static Routes Towards the Internal Network
-
If the internal firewall (B) is doing NAT for traffic from the internal network (subnet 10.0.30.0 in diagram) to LAN1 of the Expressway-E (for example traversal client traffic from Expressway-C), that traffic is recognized as being from the same subnet (10.0.20.0 in diagram) as it reaches LAN1 of the Expressway-E. The Expressway-E will therefore be able to reply to this traffic through its LAN1 interface.
-
If the internal firewall (B) is not doing NAT for traffic from the internal network (subnet 10.0.30.0 in diagram) to LAN1 of the Expressway-E (for example traversal client traffic from Expressway-C), that traffic still has the originating IP address (for example, 10.0.30.2 for traffic from Expressway-C in the diagram). You must create a static route towards that source from LAN1 on the Expressway-E, or the return traffic goes to the default gateway (10.0.10.1). You can do this on the web UI (xCommand RouteAdd at the CLI.
) or usingIf the Expressway-E needs to communicate with other devices behind the internal firewall (e.g., for reaching network services such as NTP, DNS, LDAP/AD and syslog servers), you also need to add static routes from Expressway-E LAN1 to those devices/subnets.
xCommand RouteAdd Address: 10.0.30.0 PrefixLength: 24 Gateway: 10.0.20.1 Interface: LAN1
![]() Note |
The xCommand RouteAdd command and the equivalent web UI, are detailed in the Expressway help and the Expressway Administrator Guide. |
Procedure
Step 1 |
In Expressway-E, navigate to . |
||||||||||||
Step 2 |
Complete the following fields to create a static route:
|
Logging in to MRA
Prerequisite
-
Ensure that the Expressway-E is reachable from your desk phone after the network configuration is done. See the Cisco Expressway Basic Configuration Deployment Guide for detailed information.
-
Sync the users with the Top Down approach.
-
Create Jabber Config file for each customer for user separation and voice mail.
For more information, see Manage User Separation and Manual Set Up: Cisco Unity Connection.
-
Configure the following services for the end-users:
-
Configure home cluster.
-
Add mobility services.
-
Add jabber/Iphone/Ipad/Android devices as required.
-
Associate the user with the corresponding devices.
-
Add owner user id.
-
Device |
Login |
Features |
---|---|---|
Using Jabber |
Log in to Windows Jabber as a customer user with username (for example, C1L1AutNcUser001@c1sa.com) and password (Hcs@1234). |
|
Using Iphone |
Log in to Iphone as a customer user with username (for example, C1L1AutNcUser002@c1sa.com) and password (Hcs@1234). |
|
Using Ipad |
Log in to Ipad as a customer user with username (for example, C1L1AutNcUser003@c5sa.com) and password (Hcs@1234). |
|
Using Andriod |
Log in to Andriod phone a customer user with username (for example, C1L1AutNcUser002@c5sa.com) and password (for example, Hcs@1234). |
Manage User Separation
Before you begin
Procedure
Step 1 |
Log in to Unified CDM. In the Service Provider Active Directory, add users with Telephone Number, Email Address, and Department. |
||
Step 2 |
Log in to third-party app and complete the steps to configure user/contact seperation. |
||
Step 3 |
Log in to Cisco Jabber, and create Jabber Config file for each customer.
|
||
Step 4 |
Log in to Unified CDM. In the Service Provider DNS, add DNS entries for each customer and point to third-party app server used for user seperation. |
||
Step 5 |
Log in to Expressway-C, and complete the following steps to configure HTTP Allow List for each customer: |
||
Step 6 |
Log in to Unified CM, and complete the following steps:
|
Hide Service Domain for Jabber
The service domain can be hidden in the Jabber configuration files to present a better end-user experience.
For Windows applications modify the Jabber installer with the following:
-
msiexec /i CiscoJabberSetup.msi VOICE_SERVICES_DOMAIN=<service-domain> SERVICES_DOMAIN=<service-domain> CLEAR=1
For Mobile applications, provide the following link to launch Cisco Jabber on the first launch:
-
ciscojabber://provision?ServicesDomain=<service-domain>
![]() Note |
For more information, see Deployment and Installation Guide for Cisco Jabber available at https://www.cisco.com/c/en/us/support/unified-communications/jabber-windows/products-installation-guides-list.html. |