The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
The Cisco Virtualization Experience Media Engine for SUSE Linux Deployment and Installation Guide includes the following task-based information required to deploy and install Cisco Virtualization Experience Media Engine for SUSE Linux (VXME for SUSE Linux).
Installation and configuration workflows and procedures that outline the processes to install and configure Cisco VXME for SUSE Linux
Installation and configuration information for Cisco AnyConnect Secure Mobility Client in a Cisco VXME for SUSE Linux deployment
Upgrade information for Cisco VXME for SUSE Linux
Cisco Virtualization Experience Media Engine (VXME) extends the Cisco collaboration experience to virtual deployments. With a supported version of Cisco Jabber for Windows, users can send and receive phone calls on their hosted virtual desktops (HVD). The VXME software detects the virtual environment and routes all audio and video streams directly from one endpoint to another, without going through the HVD.
The applications in the Cisco VXME family of products are:
Cisco Virtualization Experience Media Engine for SUSE Linux
Cisco Virtualization Experience Media Engine for Windows
For more information about Cisco VXME, visit http://www.cisco.com/c/en/us/products/collaboration-endpoints/virtualization-experience-media-engine/index.html.
With Cisco Virtualization Experience Media Engine (VXME), thin client users can place and receive calls with their Cisco Unified Communications application (Cisco Jabber). Cisco Virtualization Experience Media Engine consists of the Cisco VXME Agent and the Cisco VXME Client. To reduce latency and to enhance media quality, VXME streams media between the endpoints without going through the hosted virtual desktops.
Cisco Virtualization Experience Media Engine also supports some accessories. For a complete listing of supported audio and video accessories, see Unified Communications Endpoint and Client Accessories, at http://www.cisco.com/c/en/us/products/unified-communications/uc_endpoints_accessories.html.
A Cisco VXME virtual deployment consists of the following components:
Supported SUSE Linux thin clients
For more information about supported thin clients, see Release Notes for Cisco Virtualization Experience Media Engine for SUSE Linux.
Cisco VXME Client installed on the thin client
Windows hosted virtual desktops (HVD), in a data center
Cisco Jabber installed on the HVD
Cisco VXME Agent installed on the HVD
Cisco Unified Communications Manager
The user experience with Cisco Virtualization Experience Media Engine and a supported Cisco Unified Communications client is similar to the experience provided by a standard Cisco Unified Communications client installation. However, in a virtual environment there are some differences:
The Cisco Unified Communications client detects the virtual environment at run time and starts in virtualization mode.
Users can choose to control their Cisco IP Phones or to use their computers to make and receive calls. The default phone selection is Use my computer for calls. After device selection, the Cisco Virtualization Experience Media Engine application starts the transfer of the phone configuration data for that user. For more information, see Configuration Files.
Users can manage their camera and audio devices by using the Device Selector, which is located in the Windows notification area. Users can also use the following tabs to manage their camera and audio devices from within their Cisco Unified Communications client:
By default, all calls send and receive video if both parties have video capability. Users can select their preference from the following options:
Always start calls with video: Starts all calls as video calls, which send local video
Never start calls with video: Starts all calls as audio-only calls
This setting applies to all calls that the user places and receives. The default setting is Always start calls with video. Users can change this setting in .
Note | You can disable video globally or on a per-device basis on the Cisco Unified Communications Manager. Navigate to Disabled. and set Video Calling to |
Some menus and options for the supported Cisco Unified Communications clients are different. For example, users cannot start Video Desktop Share (Binary Floor Control Protocol) from the call window. Video Desktop Share is supported only from the IM-chat window (Remote Desktop Protocol).
File Type |
Filename |
---|---|
Cisco Virtualization Experience Media Engine Client for SUSE Linux SP2 (downloadable .zip file) |
Cisco_VXME_Client-11.0.0_SP2.zip |
SP2 VXME.rpm file (extracted from zip file) |
cisco_vxme_client-11.0.0-309.sletc11sp2.rpm |
SP2 VXME Prerequisites.rpm file (extracted from zip file) |
vxme-pre-reqs-11.0.0-30.sletc11sp2.rpm |
Cisco Virtualization Experience Media Engine Client for SUSE Linux SP3 (downloadable .zip file) |
Cisco_VXME_Client-11.0.0_SP3.zip |
SP3 VXME Client.rpm file (extracted from zip file) |
cisco_vxme_client-11.0.0-309.sletc11sp3.rpm |
SP3 VXME Prerequisites.rpm file (extracted from zip file) |
vxme-pre-reqs-11.0.0-30.sletc11sp3.rpm |
Cisco Virtualization Experience Media Engine Agent for SUSE Linux Release 11.0 (downloadable zip file) |
Cisco_VXME_Agent-11.0.0.zip |
Cisco VXME Agent installer file (extracted from zip file) |
CiscoVXMEAgentSetup.msi |
Cisco AnyConnect for SUSE Linux SP2 (downloadable zip file) |
Anyconnect_bundle-3.1.08009-71_SP2.zip |
SP2 Cisco AnyConnect.rpm file (extracted from zip file) |
anyconnect_bundle-3.1.08009-71.sletc11sp2.rpm |
Cisco AnyConnect for SUSE Linux SP3 (downloadable zip file) |
Anyconnect_bundle-3.1.08009-71_SP3.zip |
SP3 Cisco AnyConnect.rpm file (extracted from zip file) |
anyconnect_bundle-3.1.08009-71.sletc11sp3.rpm |
Cisco Virtualization Experience Media Engine supports Cisco AnyConnect Secure Mobility Client, Release 3.1. The Cisco AnyConnect Secure Mobility client provides remote users with secure VPN connections to the Cisco 5500 Series Adaptive Security Appliance (ASA). Cisco AnyConnect Secure Mobility client supports Cisco ASA version 8.0(4) or later and the Adaptive Security Device Manager (ASDM) 6.4(1) or later.
Cisco AnyConnect is available as a separate add-on that you can push to your devices using the standard add-on procedure.
Note | Application upgrades of Cisco AnyConnect 3.1 from the ASA are not supported. |
The following table shows the AnyConnect features supported on the thin clients.
Feature |
Supported on SUSE Linux-based Thin Clients |
---|---|
Datagram Transport Layer Security (DTLS) with SSL access to VPN | Yes |
IPSec/IKEv2 support | No |
Compression -Increases the communications performance between the security appliance and the client | Yes |
Fallback from DTLS to TLS if DTLS fails | Yes |
Certificate-only authentication | No |
Machine certificate authentication for standalone mode | No |
RSA SecurID integration | No |
Smartcard support | No |
Download certificate from ASA with Get Certificate | No |
Simple Certificate Enrollment Protocol (SCEP) to set up and renew a certificate used for client authentication | No |
GUI interface | Yes, Legacy |
Minimize on connect | Yes |
IPv6 VPN access-Allows access to IPv6 resources over a public IPv4 connection | No |
Local LAN access | No |
Local printer access through client firewall rules | No |
Trusted network detection (TND) | No |
Captive portal (hotspot) detection | No |
Start Before Logon (SBL) | No |
Autoconnect on start | Yes |
Resume session after loss of connectivity | Yes |
Auto update AnyConnect | N/A (update using Dell Wyse Device Manager) |
Auto update AnyConnect profile | Yes |
Diagnostic AnyConnect Reporting Tool (DART) | N/A |
Federal Information Processing Standard (FIPS) security | Yes |
Browser-based (clientless) VPN access | No |
Endpoint assessment (Posture) | No |
Endpoint remediation | No |
Web security-Enforces acceptable use policies to protect endpoints from websites found to be unsafe | No |
Network Access Manager (NAM) - L2 | No |