Contents
- Feature setup
- Enable active call transfer between Cisco Jabber and desk phone
- Add Mobile Connect and Mobile Identity
- Transfer active VoIP call to the mobile network
- Enable active call handoff from VoIP to mobile network
- Set up handoff number
- Match Caller ID with Mobile Identity
- Set up additional user and device settings for handoff
- Enable active call transfer from VoIP to mobile network
- Set up Voice Dialing
- Set up visual voicemail on Unified CM
- Specify directory search settings
- Set up automatic VPN access
- Set up SRST failover
- Set up Extension Mobility to allow users to sign in and out
- Set a timer to automatically sign users out of Cisco Jabber
- Set up corporate directory photos on Cisco Jabber
- Integrate corporate directory photos using a side URL
- Integrate corporate directory photos from an LDAP server
- Set up SIP Digest Authentication options
- Disable SIP digest authentication
- Enable SIP digest authentication with automatic password authentication
- Enable SIP digest authentication with manual password authentication
Feature setup
Enable active call transfer between Cisco Jabber and desk phone
Before You BeginProcedure
- Make sure the desk phone (Primary DN) for the user is fully set up and can make and receive internal and external calls.
- Set up Call Park for the system. See the Call Park chapter in the Cisco Unified Communications Manager Features and Services Guide at http://www.cisco.com/en/US/products/sw/voicesw/ps556/prod_maintenance_guides_list.html.
What to Do Next
- Enter your credentials using one of the following methods:
- Test your settings to verify that you can move active calls between the desk phone and Cisco Jabber.
Important:See instructions in the user FAQs at http://www.cisco.com/en/US/products/ps11596/products_user_guide_list.html.
Add Mobile Connect and Mobile Identity
ProcedureMobile Connect, formerly known as Single Number Reach (SNR), allows the native mobile phone number to ring when someone calls the office number while Cisco Jabber is not available.
When Cisco Jabber is running and connected to the corporate network, and thus available to receive VoIP calls, Mobile Connect is automatically inactivated.
A Mobile Identity is required to transfer calls from VoIP in Cisco Jabber to the mobile network.
What to Do Next
Test your settings:The native mobile network phone number should ring and the call should connect when you answer it.
- Exit Cisco Jabber on the mobile device. For instructions, see the FAQs for users at http://www.cisco.com/en/US/products/ps11596/products_user_guide_list.html.
- Call the Cisco Jabber extension from another phone.
Transfer active VoIP call to the mobile network
Users can transfer an active VoIP call from Cisco Jabber to their mobile phone number on the mobile network. This is useful when a user on a call leaves the Wi-Fi network (for example, leaving the building to walk out to the car), or if there are voice quality issues over the Wi-Fi network. This Cisco Jabber feature is called Use Mobile Network.
There are several ways to implement this feature. You can also disable it.
Implementation Method
Implications
Instructions
Handoff DN
The iPhone calls Unified CM using the mobile network.
This method requires a Direct Inward Dial (DID) number.
The service provider must deliver the DID digits exactly as configured. Alternately, for Cisco IOS gateways with H.323 or SIP communication to Unified CM, you can use Cisco IOS to manipulate the inbound called-party number at the gateway, presenting the digits to Unified CM exactly as configured on the handoff number.
If you select this implementation method and it fails, the system automatically tries the Mobility Softkey and Call Park methods, in order.
This method will not work for iPod Touch or iPad devices.
Mobility Softkey
Unified CM calls the phone number of the iPhone PSTN mobile service provider.
If you select this implementation method and it fails, the system automatically tries the Call Park method.
See Enable active call transfer from VoIP to mobile network.
Call Park
Cisco Jabber attempts this method only if attempts to use other methods fail .
In the Call Park method, the iPhone makes a mobile-network call to a Call Park number to retrieve the call.
This method requires a DID number.
This method does not work for iPod Touch or iPad devices.
- Set up Call Park for the system. See the Call Park chapter in the Unified CM Features and Services Guide at http://www.cisco.com/en/US/products/sw/voicesw/ps556/prod_maintenance_guides_list.html.
- Set the Call Park number in to be an E.164 (DID) number.
- Cisco recommends changing the value in the Park Monitoring Forward No Retrieve Timer to 60 seconds if more immediate ring-back to the parker phone is required.
Note Cisco Jabber for iPhone uses the Park Monitoring Forward No Retrieve Timer and not the Call Park Reversion Timer.
The parked call is forwarded to a forwarding number, if one exists. If no forwarding number is set up, the call returns to the parker.
None of the above
Disable this feature if you do not want to make it available to users.
Select Disabled for the Transfer to Mobile Network option in the "Product Specific Configuration Layout" section of the Cisco Dual Mode for iPhone device page.
- Enable active call handoff from VoIP to mobile network
- Enable active call transfer from VoIP to mobile network
Enable active call handoff from VoIP to mobile network
Set up handoff number
Before You BeginDetermine the required values. The values you choose depend on the phone number that the gateway passes (for example, seven digits or ten digits).Procedure
Match Caller ID with Mobile Identity
To ensure that only authorized phones can initiate outbound calls, calls must be initiated from a phone that is set up in the system. To do this, the system attempts to match the caller ID of the requesting phone number with an existing Mobile Identity. By default, when a device initiates the Handoff feature, the caller ID that is passed from the gateway to Unified CM must exactly match the Mobile Identity number that you entered for that device.
However, your system may be set up such that these numbers will not match exactly. For example, Mobile Identity numbers may include a country code while caller ID does not. If so, you must set up the system to recognize a partial match.
Be sure to account for situations in which, for example, the same phone number may exist in different area codes or in different countries. Also, be aware that service providers may identify calls with a variable number of digits, which may affect partial matching. For example, local calls may be identified using seven digits (such as 555 1234) while out-of-area calls may be identified using ten digits (such as 408 555 6789).
Before You BeginProcedure
- Set up the Mobile Identity. See Add Mobile Connect and Mobile Identity.
- Determine whether you need to complete this procedure:
Use the device to dial in to the system and compare the caller ID value with the Destination Number in the Mobile Identity. If the numbers do not match, you must perform this procedure. Repeat this procedure for devices that are issued in all expected locales and area codes.
Step 1 Sign in to the Unified CM Administration portal. Step 2 Select . Step 3 Select the active server. Step 4 Select the Cisco CallManager (Active) service. Step 5 Scroll down to the Clusterwide Parameters (System - Mobility) section. Step 6 Select Matching Caller ID with Remote Destination and read essential information about this value. Step 7 Select Partial Match for Matching Caller ID with Remote Destination. Step 8 Select Number of Digits for Caller ID Partial Match and read the essential requirements for this value. Step 9 Enter the required number of digits to ensure partial matches. Step 10 Select Save.
Set up additional user and device settings for handoff
Procedure
Step 1 In the Unified CM, select “Use Handoff DN Feature” for the Transfer to Mobile Network option on the Cisco Dual Mode for iPhone Device page. Do not assign this method for iPad and iPod Touch devices. Use the Mobility softkey method instead. Step 2 On the iOS device, tap to verify that Caller ID is on. Step 3 Test this feature.
Enable active call transfer from VoIP to mobile network
Procedure
Step 1 For system-level settings, check that the Mobility softkey appears when the phone is in the connected and on-hook call states.
- In , select the softkey template that you selected when you configured the device for Mobile Connect.
- In the Related Links list box at the upper-right, choose Configure Softkey Layout and select Go.
- Select Connected state and verify that the Mobility key is in the list of selected softkeys, and then do the same for the On Hook state.
Step 2 For the per-user and per-device settings in Unified CM, check that you have set up a device Mobile Identity and Mobile Connect for the mobile device. After the transfer feature is working, users can enable and disable Mobile Connect at their convenience without affecting the feature.
If the device is an iPad or an iPod Touch, you can configure a Mobile Identity using an alternate phone number such as the mobile phone of the user.
What to Do Next
Test your settings: transfer an active call from VoIP to the mobile network.
Set up Voice Dialing
Voice Dialing allows users to dial a number by speaking a name in the corporate directory.
If Voice Dialing is available on your network, Cisco Jabber users can always dial the Voice Dialing pilot number to access that feature as they would from any phone.
Before You BeginProcedureVoice dialing must be set up and working on your network.
To set up voice dialing for general use, see information about directory handlers in the System Administration Guide and the Reference Guide for Cisco Unity Connection at http://www.cisco.com/en/US/products/ps6509/prod_maintenance_guides_list.html.
Step 1 Sign in to the Unified CM Administration portal. Step 2 Navigate to the device page for the user. Step 3 Enter voice dialing settings.
Setting Description Enable Voice Dialing Motion The Voice Dialing Motion feature activates the motion and proximity sensors that automatically dial the Voice Dialing pilot number when Cisco Jabber is running and users move the device to their ear with the gesture described in the user documentation for Cisco Jabber at http://www.cisco.com/en/US/products/ps11596/products_user_guide_list.html.
This setting specifies whether the voice dialing motion is initially on or off for the user.
Voice Dialing Phone Number The pilot phone number for the voice dialing feature. This number is not unique to Cisco Jabber.
This number is described in the Cisco Unity Connection Release 7.x documentation in the section “Routing Calls to a Voice Directory Handler.”
Add Voice Dialing to Favorites Specify whether or not to automatically add the Voice Dialing phone number to the Cisco Jabber favorites list of the user.
Step 4 Select Save. Step 5 Relaunch Cisco Jabber.
Set up visual voicemail on Unified CM
Before You BeginProcedure
Note
For users that also have the Cisco Mobile application (Cisco Unified Mobile Communicator 7.1) that runs in conjunction with Cisco Unified Mobility Advantage, do not set up Cisco Jabber for voicemail. For the best user experience, users of the other Cisco Mobile application should access voicemail using Cisco Mobile application, not Cisco Jabber.
- Verify that IMAP is enabled: See "Configuring IMAP Settings" in the System Administration Guide for Cisco Unity Connection at http://www.cisco.com/en/US/products/ps6509/prod_maintenance_guides_list.html.
- Collect the values in the table in this procedure.
- Consult your voicemail administrator if you have questions about any of the settings in this section.
Step 1 Sign in to Unified CM Administration. Step 2 Navigate to the device page for the user. Step 3 In the Product Specific Configuration Layout section, enter voicemail settings.
Setting Description Voicemail Username Unique username for voicemail access for this user. Voicemail Server (include the port) For the voicemail server, enter the hostname or IP address. Use the format Servername.YourCompany.com:portnumber
Voicemail Message Store Username Enter the username for the voicemail message store. Voicemail Message Store For the voicemail message store, enter the hostname or IP address. This may be the same as the voicemail server. Use the format YourVoiceMessageStoreServer.yourcompany.com:portnumber
Step 4 Click Save. Step 5 Relaunch Cisco Jabber. If you have allowed end-user configuration editing, delete the voicemail account on the client and then set up the account again.
Step 6 Step through the wizard until you see an option to enable or confirm your voice messaging account. Step 7 Tap Yes. Step 8 Enter your voice messaging password. Step 9 Tap Save. Step 10 Complete the wizard.
What to Do Next
Specify directory search settings
Before You BeginProcedure
- Make sure the telephoneNumber attribute in Active Directory (or its equivalent, if you are using a different attribute) is indexed.
- Identify attributes in your corporate directory schema that are different from, or additional to, the defaults in the following table. You must map changed attributes later in this procedure.
Note
Directory lookup information is not available through Unified CM.
Restriction:
Element
Element Name
Default Directory Attribute
Your Value, if Different
Unique identifier
identifier
distinguishedName
Display name
displayName
displayName
Email address
emailAddress
First name
firstName
givenName
Last name
lastName
sn
User ID
userid
userPrincipalName
Main phone number
mainPhoneNumber
telephoneNumber
Home phone number
homePhoneNumber
—
Second home phone number
homePhoneNumber2
—
Mobile phone number
mobilePhoneNumber
mobile
Second mobile phone number
mobilePhoneNumber2
—
Direct to voicemail phone number
voicemailPhoneNumber
voicemail
Fax number
faxPhoneNumber
facsimileTelephoneNumber
Other phone number
otherPhoneNumber
—
Step 1 Sign in to Unified CM Administration portal. Step 2 Navigate to the Cisco Dual Mode device page for the user. Step 3 In the “Product Specific Configuration Layout” section, enter the iPhone country code. This information helps determine Caller ID. Step 4 Enter LDAP User Authentication settings: Step 5 Enter LDAP username and password: By default, the LDAP Username is the userPrincipalName (UPN) and may be in the form of an email address (userid@example.com).
- Enter credentials for a single read-only account that all users will use to access Active Directory. These credentials will be sent in clear text in the TFTP file. Users will not need to enter credentials into Cisco Jabber.
- Enter a username with access to the directory and leave the password blank. You must give the password to each user and tell users to enter the password into the settings in Cisco Jabber.
- If authentication is not required, leave these settings blank.
Step 6 Enter LDAP server address. Use the format YourDirectoryServer.YourCompany.com:portnumber. By default, if you enter no port or SSL settings, Cisco Jabber attempts an SSL connection to port 3269.
- Enter the hostname or IP address and port number for your Active Directory server.
- Use port 3269 for secure SSL connections or 3268 for nonsecure connections.
Step 7 Enter the LDAP Search Base using the format: CN=users,DC=corp,DC=yourcompany,DC=com. By default, this application uses the search base that is found in a RootDSE search on the defaultNamingContext attribute. If you need to specify a different search base, enter the Distinguished Name of the root node in your corporate directory that contains user information. Use the lowest node that includes the necessary names. Using a higher node will create a larger search base and thus reduce performance if the directory is very large.
Note To help determine the optimal search base, you can use a utility such as Active Directory Explorer (available from Microsoft) to view your data structure. Step 8 Enter the LDAP field mappings. LDAP field mappings identify the attributes in your directory that hold the information to be searched and displayed for directory searches.
Step 9 Enter LDAP photo location. For more information, see Integrate Corporate Directory Photos from LDAP server. Step 10 Select Save. Step 11 Restart Cisco Jabber. If you have allowed end-user configuration editing, delete the Directory account on the client and then set up the account again.
Step 12 Step through the wizard until you see the option to enable or confirm the corporate directory account settings. Step 13 At the option to enable or confirm the corporate directory account settings, tap Yes. Step 14 Enter the password, if not already entered. Step 15 Tap Save, even if you make no changes. Step 16 Complete the wizard.
What to Do Next
Test this feature.
Set up automatic VPN access
Cisco Jabber can automatically launch VPN if the following requirements are met:
- The corporate network is not directly available when users launch Cisco Jabber
- The device can connect using VPN
- You satisfy the requirements and complete the procedure in this topic
See also information at Apple.com such as:
- Information throughout the iPhone OS Enterprise Deployment Guide at http://support.apple.com/manuals/#iphone
- The iPhone Configuration Utility, available from http://www.apple.com/downloads/macosx/apple/application_updates/iphoneconfigurationutility21forwindows.html
- A list of protocols and authentication methods that are supported on the iPhone at http://support.apple.com/kb/HT1288
- Information about setting up an iPhone to connect to VPN in the iPhone User Guide at http://www.apple.com/support/country/?dest=manuals
- General information at http://www.apple.com/support/iphone/enterprise/
Before You BeginProcedure
- The iPhone must be set up for on-demand access to VPN with certificate-based authentication. For assistance with setting up VPN access, contact the providers of your VPN client and head end.
- Cisco recommends using Cisco AnyConnect Secure Mobility Client for Apple iOS for iPhones running iOS 4. For the Cisco AnyConnect VPN solution, the following are required:
- Cisco Adaptive Security Appliance minimum release is 8.2.3.6, 8.3.2.7, and 8.4
- Cisco AnyConnect VPN Client, Release 2.4.4009 or later For information about setting up AnyConnect, see http://www.cisco.com/en/US/products/ps8411/prod_maintenance_guides_list.html.
Note
Not all releases of the VPN client are supported with Cisco Jabber. Check the System Requirements in the Release Notes for Cisco Jabber at http://www.cisco.com/en/US/products/ps11596/prod_release_notes_list.html.
- Identify a URL that is set up to launch VPN on demand. Enter the URL in the AnyConnect client. The trigger for VPN on demand is a failed DNS query on this domain.
Use one of the following methods:
- Configure Unified CM to be accessed through a domain name (not an IP address) and ensure that this domain name is not resolvable outside the firewall. Include this domain in the “Connect If Needed” list in the Connect On Demand Domain List of the AnyConnect client connection.
- If you cannot use a domain name to access Unified CM or cannot make the DNS lookup of that domain name fail from outside the firewall, set the parameter in the procedure below to a nonexistent domain (a domain that will fail a DNS query inside and outside the firewall), and then add that domain to the “Always Connect” list in the Connect On Demand Domain List of the AnyConnect client connection. The URL must include only the domain name. Do not include a protocol or a path. See the following example for more information:
Step 1 Sign in to the Unified CM Administration portal. Step 2 Navigate to the Cisco Dual Mode for iPhone device page for the user. Step 3 Scroll to the Product Specific Configuration Layout section. Step 4 In the On-Demand VPN URL field, enter the URL you identified and used in AnyConnect in the prerequisites for this procedure.
Note The URL must be domain name only, without protocol or path.
Step 5 Select Save.
What to Do Next
- If you have allowed end-user configuration editing, delete the Internet Calling account on the client and then set up the account again. Otherwise, relaunch the client.
- Test this feature.
- Enter this URL into Safari on the iPhone and verify that VPN launches automatically. You should see a VPN icon in the status bar.
- Verify that the iPhone can connect to the corporate network using VPN. For example, access a web page on your corporate intranet. If the phone cannot connect, contact the provider of your VPN technology.
- Verify with your IT department that your VPN does not restrict access to certain types of traffic (for example, only email and calendaring traffic may be allowed).
- Cisco Jabber must already be set up and able to connect directly to the corporate network.
Set up SRST failover
Survivable Remote Site Telephony (SRST) allows you to transfer services from the Unified CM to another Unified CM, a Unified CME, or a router running SRST.
Note
- Call Park and Ad-hoc conferencing are not supported in SRST mode.
- CME 8.6 is required for SIP SRST transfer functionality on Unified CM Express.
- Set up the required SRST information on the Unified CM. For more information , see http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/admin/8_6_1/ccmcfg/b02srst.html.
- Set up the failover device:
- SRST failover to a Unified CM Express (CME). On CME, you must configure the following parameters: See http://www.cisco.com/en/US/docs/voice_ip_comm/cucme/admin/configuration/guide/cmead.pdf for more information.
Note
You cannot have SIP IP phone (“no mode cme”) and SIP SRST provisioned at the same time. By default, SIP SRST is enabled as opposed to SCCP SRST, set up using “srst mode auto-provision.”
- SRST failover to a router set up for SRST only. For more information, see http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/security/8_6_1/secugd/secusrst.html.
Note
With this configuration, the router is set up for failover only, with no local SCCP or SIP IP phones provisioned.
Set up Extension Mobility to allow users to sign in and out
Set up and activate the Cisco Extension Mobility Service to allow users to sign in and out of Cisco Jabber on devices.
Before You Begin
- The Sign In feature using Extension Mobility is disabled by default in Cisco Jabber. To enable it, select Enabled in the “Sign In Feature” drop-down list. For more information about setting up Extension Mobility, see http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/admin/8_6_1/ccmfeat/fsem.html.
Note
External number masks are not displayed while Extension Mobility is enabled if the mask is not also configured for the Extension Mobility device profile.
- Extension Mobility is functional only if a single profile is listed in the Controlled Profiles field.
- If you set up Extension Mobility as an Enterprise Subscription service, all Cisco Jabber users are required to sign in and out of Cisco Jabber while Extension Mobility is enabled.
- When using Extension Mobility, choose Disabled for Allow End User Configuration Editing. For more information, see Add user device.
- After Extension Mobility is set up, Cisco Jabber is functional only if the user is signed in.
Set a timer to automatically sign users out of Cisco Jabber
ProcedureUse this procedure to set up a timer for all Extension Mobility users in the Unified CM cluster. For more information about timers, see http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/admin/8_6_1/ccmfeat/fsem.html#wp1178338.
Note
If the user has an active call at the automatic sign-out time, the call is not interrupted.
Step 1 Sign in to the Unified CM. Step 2 In the Navigation field, choose Unified CM Administration. Step 3 Choose . Step 4 In the Server drop-down list, select the active United CM. Step 5 In the Service drop-down list, select the “Cisco Extenstion Mobility (Active)” service. Step 6 In the Enforce Intra-cluster Maximum Login Time field, choose True. Step 7 In the Intra-cluster Maximum Login Time field, enter the number of hours after which the user is signed out of Cisco Jabber. Step 8 Click Save.
Set up corporate directory photos on Cisco Jabber
Use one of the following procedures to integrate corporate directory photos into Cisco Jabber. The administrator can edit photos that are acquired from either method in the COP file.
- Integrate corporate directory photos using a side URL
- Integrate corporate directory photos from an LDAP server
Integrate corporate directory photos using a side URL
You can configure a parameterized URL string in the Photo field in the LDAP attribute map so that Cisco Jabber can retrieve pictures from a web server instead of from the LDAP server. The URL string must contain an LDAP attribute with a query value containing a piece of data that uniquely identifies the photo of the user. We recommend that you use the User ID attribute. However, you can use any LDAP attribute whose query value contains a piece of data that uniquely identifies the photo of the user.
Before You BeginProcedureThis substitution technique works only if Cisco Jabber can use the results of the query and can insert query results into the template you specify to construct a working URL that retrieves a JPG photo. If the web server that hosts the photos in a company requires a POST (for example, the name of the user is not in the URL) or uses some other cookie name for the photo instead of the username, this technique does not work.
Step 1 Sign in to Cisco Jabber Administration. Step 2 Go to to search for the device ID. Step 3 Go to the Product Specific Configuration Layout field in the COP file fields. Step 4 Go to the LDAP Photo Location field and enter the URL that stores the photo. We recommend that you use %%userID%% as the substitution string.
Example:
- http://mycompany.cisco.com/photo/std/%%uid%%.jpg
- http://mycompany.cisco.com/photo/std/%%sAMAccountName%%.jpg
Note You must include the double percent symbols in this string, and they must enclose the name of the LDAP attribute to substitute.
Cisco Jabber removes the percent symbols and replaces the parameter inside with the results of an LDAP query for the user whose photo it resolves.
Example:If a query result contains the attribute “uid” with a value of “johndoe”, and then a template such as http://mycompany.com/photos/%%uid%%.jpg creates the URL http://mycompany.com/photos/johndoe.jpg. Cisco Jabber attempts to fetch the photo.
What to Do Next
Important:After integrating corporate photos, you must reprovision or reset your device, depending on the setting for “Allow End User Configuration Editing.” For more information, see Add user device.
Integrate corporate directory photos from an LDAP server
Use the following procedure to integrate corporate directory photos into Cisco Jabber from an LDAP server.Procedure
Step 1 Sign in to the Unified CM Administration portal. Step 2 Go to to search for the device ID. Step 3 Go to the Product Specific Configuration Layout field in the COP file fields. Step 4 Go to LDAP Field Mappings. The default mapping is photo=jpegPhoto. No additional action is necessary if you do not require a custom mapping.
If you require a custom mapping, you can modify the LDAP Field Mappings. The field mappings have the following format: property=ldapAttribute separated by a semi-colon, that is “userid=uid;photo=thumbnailPhoto”.
What to Do Next
Important:After integrating corporate photos, you must reprovision or reset your device, depending on the setting for “Allow End User Configuration Editing.” For more information, see Add user device.
Set up SIP Digest Authentication options
SIP Digest Authentication is a Unified CM security feature that authenticates user devices. For information, see the Cisco Unified Communications Manager Security Guide and the Cisco Unified Communications Manager Administration Guide at http://www.cisco.com/en/US/products/sw/voicesw/ps556/prod_maintenance_guides_list.html.
For Cisco Jabber, you have three options:
- Disable SIP Digest Authentication—Disable SIP Digest Authentication if your deployment does not use this feature. See Disable SIP digest authentication.
- Enable SIP Digest Authentication with automatic password authentication
See Enable SIP digest authentication with automatic password authentication.
- The password is stored and sent in clear text.
- Users do not have to manually enter this password.
- There is less chance of entry error that prevents Cisco Jabber from registering with Unified CM.
- Enable SIP Digest Authentication with manual password authentication
See Enable SIP digest authentication with manual password authentication.
- The password is not stored and sent from the TFTP server in clear text.
- Users must manually enter this password.
- Disable SIP digest authentication
- Enable SIP digest authentication with automatic password authentication
- Enable SIP digest authentication with manual password authentication
Disable SIP digest authentication
Procedure
Step 1 Sign in to the Unified CM Administration portal. Step 2 Navigate to the device page. Step 3 In the Device Security Profile drop-down list, select “Cisco Dual Mode for iPhone - Standard SIP Non-secure profile.” Step 4 Complete the authentication details in the Product Specific Configuration Layout section. Step 5 If end-user configuration editing is enabled, reset the Internet calling account. Step 6 Relaunch Cisco Jabber.
Enable SIP digest authentication with automatic password authentication
Procedure
Step 1 Create a new phone security profile for Cisco Dual Mode for iPhone under . Step 2 On each End User page, in the User Information section, complete the following tasks. Step 3 On each Cisco Dual Mode for iPhone device page, complete the profile information in the Protocol Specific Information section. Step 4 On the same device page, complete the authentication details in the Product Specific Configuration Layout section. Step 5 If end-user configuration editing is enabled, reset the Internet calling account. Step 6 Relaunch Cisco Jabber.
Enable SIP digest authentication with manual password authentication
Procedure
Step 1 Create a new profile for Cisco Dual Mode for iPhone under . Step 2 On each End User page, in the User Information section, complete the following tasks. Make a note of this password. You will provide this password to the user later. Step 3 On each Cisco Dual Mode for iPhone device page, enter the new profile information in the Protocol Specific Information section. Step 4 On the same device page, complete the authentication details in the Product Specific Configuration Layout section. Step 5 Relaunch Cisco Jabber and step through the wizard again. Step 6 At the option to confirm the Internet Calling settings, tap the SIP Digest Authentication password setting and enter the password you noted earlier. This password is case sensitive. Step 7 If end-user configuration editing is enabled, reset the Internet calling account.