• Then, click the Add New User icon. Enter all credentials required
of the new user.
• Next, create a password. As this is a service account, the
password should be complex, but set to never expire.
• If necessary, a Group Policy Object (GPO) can be created to
deny this account interactive logon. Note that an Exchange
Mailbox is not required for this account.
• The option exists to set Active Directory users and computers to
show advanced features. To set this option, choose View >
Advanced Features from the drop-down menu.
• First, you will need to navigate to the Cisco Unified CallManager Administration
page
• go to the User Management tab, and select Application User from the drop-down
menu
• From this screen you will be able to either add a set of new users by choosing
Add New or edit existing users by selecting individual user names.
• On the End User Configuration screen, you are able to create device association
for a maximum of 250 devices. From this screen, you can assign the user to
proper groups and assign the right roles.
Corporate Directory Configuration
Wednesday, April 08, 2009
3:12 PM
• The Corporate Directory Server acts as both the repository for corporate contact
information and the authenticating authority for user sessions. This part handles
the preparation for the integration into Microsoft Active Directory.
• Within the Corporate Directory Configuration screen, select and enter the
Corporate Directory Server information. Corporate Directory Type is the type of
corporate directory that is used by your organization; such as Active Directory.
Adapter Name is the name you want to assign to the corporate directory
adapter. This name is for the internal handling only. The third entry, Description,
is the description of the corporate directory adapter. After entering all necessary
information, click Next to proceed with the configuration.
BASIC PARAMETERS:
• First, enter the IP Host Name or IP Address from the Microsoft AD server. Click
Next.
• Then, the distinguished name of the root node needs to be entered in your
Corporate Directory Server. The Cisco Unified Mobility Advantage server makes
an auto discovery for Base Distinguished Name (Base DN). Select one from the
list, or click Edit if yours does not appear. Note that there is only one Base DN
possible, so be sure you will get all objects needed with the Base DN you
selected. Click Next to proceed with the configuration.
• After the Base DN has been entered, the Cisco Unified Mobility Advantage server
shows a default entry in Filter Criteria. The Filter Criteria data will be used to
distinguish corporate users from other corporate resources within the Corporate
Directory Server. In most cases, it is recommended that the default value is
used.
• Follow Referral gives the option of having the Cisco Unified Mobility Enterprise
Server follow referrals from the Corporate Directory Server or not. The default is
True. Polling Period defines how frequently the Cisco Unified Mobility Advantage
Enterprise Server polls the Corporate Directory Server for updates. After
completing all necessary sections, click Next to continue.
• For access to the Microsoft AD, an account needs to be entered. Enter the User
DN of the account that the Cisco Unified Mobility Advantage server uses to read
data from your Corporate Directory Server. This account needs to have read-only
permissions in your Corporate Directory Server. Select the Append Base DN
check box to allow the Cisco Unified Mobility Advantage Enterprise Server to
append the base DN to the user's DN, rather than giving the complete DN of the
user above. The default is checked, which is recommended. Enter the password,
and click Next to proceed with the configuration.
MAPPING:
• The Mapping configuration screen surrounds the default mapping of the
attribute to the Microsoft AD. In most cases, the defaults should be used.
However, if different attributes are defined in your AD, then these fields need to
be adjusted accordingly. Click Edit to make any necessary changes. After doing
so, click Next to continue.
EXCHANGE LOOKUP:
o Provisioning port
• Port used for over-the-air downloads of Cisco unified mobile communicator
• Default is 8080
o Naming port
• Internal communication port used by CUMA managed server
• Default is 1199
o RMI port
• Internal communication port used by the CUMA managed server
• Default is 1198
o RMI object port
• Internal communication port used by the CUMA managed server
• Default is 4444
• Eg: https://abcd.com:7080/adminportal
o Naming port
• Internal communication port used by the CUMA admin server.
• Default is 7099
o RMI port
• Internal communication port used by the CUMA Admin server
• Default is 7098
o Naming port
• Internal communication port used by the CUMA Node manager server
• Default is 3099
o RMI port
• Internal communication port used by the CUMA Node manager server
• Default is 3098
o Naming port
• Internal communication port used by the CUMA proxy server
• Default is 5099
o RMI port
• Internal communication port used by the CUMA Proxy server
• Default is 5098
Firewall Ports
Wednesday, April 08, 2009
4:09 PM
• The Proxy Server Client Port, with the default value of 5443, and the Proxy
Server Provisioning Port, with the default value of 8080, must be opened in
the external firewall. The Managed Server SSL Client Port, with a default
value of 5443, the Managed Server Provisioning Port, with the default value
of 8080, and the Admin Portal port, with a default value of 7080, must be
opened in the internal firewall.
CUMA Enterprise Server Installation
Wednesday, April 08, 2009
4:15 PM
• The Managed Server Configuration screen appears now. You will enter the values
for the Managed Server ports. The default values are shown in parentheses. Use
these values or the values you determined during preinstallation tasks. When
you have entered all the information, click Next, and the Admin Portal
Configuration screen appears. You will enter values for the Admin Server ports
and then click Next
• Now the Admin Portal Password screen appears. You will need to enter a
password for logging into the Cisco Unified Mobility Advantage Admin Portal. By
default, the username is admin and cannot be changed. When you click Next,
the Node Manager Server Configuration screen appears. You will enter the
values for the Node Manager Server ports, and then click Next.
• When you are complete, the Preinstallation Summary screen appears. You will
need to review all of the information on the summary screen and make sure all
of it is correct
• The Cisco Unified Mobility Advantage Enterprise Server will install now. When
this process is finished, the Install Complete screen appears. You will click Done
and then Reboot to restart the server. After rebooting, the Admin Server and
Node Manager Server start automatically.
• After installing the Cisco Unified Mobility Advantage Enterprise Server, verify
that the Admin server and the Node Manager Server are started, as described
here.
o Admin Server:
• Step 1: log into the system that is hosting the Admin server.
• Step 2: open a new terminal.
• Step 3: enter this command in the terminal window:
/sbin/service cuma_admin status
The staus message should rea : "Cuma_admin is running". If there
service is not running you will have to issue the following
command to start the service:
/sbin/service Cuma_admin start
The admin server starts when the "OK" message appears.
o Node Manager Server:
• Step 1: log into the system that is hosting the Admin server.
• Step 2: open a new terminal.
• Step 3: enter this command in the terminal window:
/sbin/service cuma_nm status
The staus message should rea : "Cuma_nm is running". If there
service is not running you will have to issue the following
command to start the service:
/sbin/service Cuma_nm start
The admin server starts when the "OK" message appears.
• Basic installation is all the same. Like all bios, raid check etc, network time, root
password etc…
• Before installing the Proxy Server Application, the administrator must first
complete initial configuration of the Cisco Unified Mobility Advantage Enterprise
server and get the necessary certificates.
The procedure for installing the Cisco Unified Mobility Advantage Operating
system on the server that is going to host the Cisco Unified Mobility Advantage
Proxy Server can begin when the system displays the Cisco Application DVD
page. You will need to copy the proxy certificate file to the root directory on the
system using SSH file transfer protocol (SFTP). To copy the certificate file using
SFTP, you will use root as the User and the password you assigned to the
SSL Certificate file.
After copying the certificate file, insert the Cisco Unified Mobility Advantage
application DVD as prompted by the Cisco Application DVD page and click
Install. The Installation Wizard will start.
• When the Installation Wizard begins, review the information on the Important
screen. Click Next and the License Agreement screen appears. Review the
license information and click I accept the Terms of the License Agreement, and
click Next.
• The Choose Install Set screen appears. Choose Cisco Unified Mobility Advantage
Proxy as the type of installation, and click Next.
• The Choose Install Folder screen appears. Enter or select the location where the
Proxy server software will reside, and click Next. The SSL Certificate and
Password screen appears. Click Choose and locate the Proxy Server SSL
Certificate file you copied to the Proxy Server previously. Enter the password
associated with the certificate file, and click Next.
• The Admin Server Information screen appears.
• You will enter the information required for the Proxy server to communicate with
the Admin server. For the Admin Server Host, you will enter the Admin Server
host name or IP address and for the Admin Server Portal Port, you will enter the
Admin Server http port that was specified during the Admin Server installation.
Now click Next. The Proxy Server Configuration screen appears. You will enter
the values for the Proxy Server ports, or click Next to accept the default values.
• The Pre-Installation Summary screen appears.
• Review the information in the summary screen and make sure all of the
information is correct. If all of the information is correct, click Install. If any
changes are required, click Previous and make the changes.
• The Proxy Server installs and when it is complete, the Important Information
screen appears. Click Next and the Proxy server is installed.
• In order to verify that the Proxy Server is started, you will need to follow these
steps.
Step 1: log into the system that is hosting the Admin server.
Step 2: open a new terminal.
Step 3: enter this command in the terminal window:
• /sbin/service cuma_proxy status
The staus message should rea : "Cuma_proxy is running". If there service is
not running you will have to issue the following command to start the
service:
• /sbin/service Cuma_proxy start
The admin server starts when the "OK" message appears.
Deploying CUMA
Wednesday, April 08, 2009
11:56 PM
• If you clicked Yes on the SSL Certificate Management screen, then the Generate
Certificate Signing Request screen will appear. You will need to enter the
following information for the Proxy server first:
• server name,
• department name,
• company name,
• city,
• state,
• country code, and
• password.
Click Next
• when the following screen appears, click the link to download the self-signed
certificate.
You will name the certificate proxy.example.selfsigned.keystore for the
Proxy server and example.selfsigned.keystore for the Enterprise server.
• The self-signed certificate downloads to your desktop, so make sure you record
the location of this file because it is required later in the process, when you
import the SSL certificate.
• Now copy the CSR text that is displayed below the download link and paste it
into a text file. Save the file and name it proxy.example.csr for the Proxy
server or example.csr for the Enterprise server, then click Reset at the top
of the page.
• The Configuration Wizard returns to the SSL Certificate Management screen.
Click Yes when prompted to create a new certificate and repeat the same steps
for the Enterprise server. When you complete the steps, the wizard returns to
the SSL Certificate Management screen, prompting you to create a new
certificate. Click No.
• In the Upload Certificate screen, browse and locate the example.self-
signed.keystore file for the Enterprise server,
• enter the password you assigned to the file when it was generated, and then
select the type of certificate file. The default is JavaKeyStore (JKS). You will need
to click Next when you are finished entering all the information.
• The SSL Certificate Management Summary screen will appear stating that you
have successfully uploaded the SSL Certificate. You will need to click Next again.
• First, enter the IP Host Name or IP Address from the Microsoft AD server. Click
Next.
• Then, the distinguished name of the root node needs to be entered in your
Corporate Directory Server. The Cisco Unified Mobility Advantage server makes
an auto discovery for Base Distinguished Name (Base DN). Select one from the
list, or click Edit if yours does not appear. Note that there is only one Base DN
possible, so be sure you will get all objects needed with the Base DN you
selected. Click Next to proceed with the configuration.
• After the Base DN has been entered, the Cisco Unified Mobility Advantage server
shows a default entry in Filter Criteria. The Filter Criteria data will be used to
distinguish corporate users from other corporate resources within the Corporate
Directory Server. In most cases, it is recommended that the default value is
used.
• Follow Referral gives the option of having the Cisco Unified Mobility Enterprise
Server follow referrals from the Corporate Directory Server or not. The default is
True. Polling Period defines how frequently the Cisco Unified Mobility Advantage
Enterprise Server polls the Corporate Directory Server for updates. After
completing all necessary sections, click Next to continue.
• For access to the Microsoft AD, an account needs to be entered. Enter the User
DN of the account that the Cisco Unified Mobility Advantage server uses to read
data from your Corporate Directory Server. This account needs to have read-only
permissions in your Corporate Directory Server. Select the Append Base DN
check box to allow the Cisco Unified Mobility Advantage Enterprise Server to
append the base DN to the user's DN, rather than giving the complete DN of the
user above. The default is checked, which is recommended. Enter the password,
and click Next to proceed with the configuration.
MAPPING:
• You will review the mapping attribute information, such as distinguished name,
first name, last name, and e-mail. It is recommended that you use the default
settings. Click Edit to make any changes, or click Next to proceed with the
default settings
EXCHANGE LOOKUP:
• Review the lookup information, including contact adapter, DNS host name,
contact adapter DN mask, and contact adapter search base.
• Now you need to enter the voice-mail configuration information. These values
apply to systems that want to integrate Cisco Unified Mobility Advantage with
their voice-mail system.
• Now, you will need to select whether or not you want to enable the voice-mail
server and click Next
• You will choose whether or not you want to integrate Cisco Unified Mobility
Advantage with your corporate conferencing system to provide conference
notifications and viewing capabilities on Cisco Unified Mobile Communicator.
• Now, the Personal Contact Server Configuration Summary screen appears.
• Within the Call Control Configuration screen of the Cisco Unified Mobility
Advantage Admin Portal, there is the option of configuring a Call Control Adapter.
If you so desire, choose Yes, and then click Next.
• The next section of the Call Control Configuration page asks for the Call Control
Server Type, the Adapter Name, and the Description. After accurately completing
those sections, click Next.
• After choosing Next, you are required to enter the CallManager host name or IP
address, as well as a user name and password and CallManager Version. The
host name should be the Cisco Unified Communications Manager running the
CTI service. You can enter up to four user name and password combinations,
each with up to 250 associated devices. After filling in the required information,
click Next to continue.
• The next section of the Call Control Configuration screen asks for several fields
regarding the dial plan settings of the Cisco Unified Communications Manager.
After completing each section, click Next to continue.
• This section within the Call Control Configuration screen gives the option of
enabling corporate PBX integration. You must also enter the Maximum Expiry of
Call Logs (days). Click Next to continue.
• The final page within the Call Control Configuration section gives an overall
summary of the elements that have just been entered. This includes the Call
Manager Server Configuration section, the Dial Plan Configuration section, as
well as the Call Control Service section. To reconfigure any settings, click Reset.
To move on throughout the Cisco Unified Mobility Advantage Admin Portal, click
Next.
• Within the Enterprise Configuration Summary page, view the configuration
summaries for each server, by clicking its respective host name or IP address.
Click Next to continue with the configuration.
• The System Configuration screen allows you to determine the Cisco Unified
Mobility Advantage Enterprise server domain information and SMTP server
information. The SMTP Server must allow relaying from the Cisco Unified Mobility
Advantage server. The Cisco Unified Mobility Advantage Enterprise server uses
the SMTP server to send out device provisioning and melt€™ messages, which
come as an e-mail for BlackBerry devices, and come as an SMS message for
Symbian devices. In order to determine system configuration information, you
will need to enter some general and SMTP Server configuration data.
• The Server Setup screen allows you to choose to configure the Cisco Unified
Mobility Advantage Proxy Server and enter information about the Managed
Server. To configure the Proxy Server and then the Managed Server, you need to
choose Yes when prompted to configure a Proxy server and click Next.
• On the Proxy Server Configuration screen, you will enter the necessary
information for the Proxy server and click Next.
• Enter the information for the Managed server, including the hostname, non-SSL
client port, SSL client port, and inter-server SSL port, then click Next.
• Review the information on the Server Setup Summary screen and then click
Reset if you need to make changes. If not, then click Next to continue the
installation.
• To upload the Cisco Unified Mobile Communicator onto the Cisco Unified Mobility
Advantage Enterprise server, first browse or enter the location of the Cisco
Unified Mobile Communicator software file and then click Next.
• The Summary screen displays your Cisco Unified Mobility Advantage Enterprise
Server setting. You are able to review the configuration summary and have the
option of clicking Reset under any area to make changes to that specific area.
To complete the configuration, click Finish.
• When you are prompted to start the Managed server, click Yes.
• After the server is started, the Admin Portal main window appears. After
completing the configuration and starting the Managed server, you will request
a signed SSL certificate from Verisign Corporation. A signed SSL certificate is
required for the Proxy server and recommended, but not required, for the
Enterprise server.
• To request a certificate, you will need to go to the Verisign web site,
www.verisign.com.
• When you request a certificate, you are asked to provide your information.
• Once you have entered that information, you will need to provide a CSR. Use the
text contained in the proxy.example.csr file, or the example.csr file you
created earlier.
• You will need to wait for an e-mail to arrive from Verisign, which may take
anywhere from a few minutes to a few days. This e-mail contains your final
certificate and a link to an intermediate certificate.
• When you receive the e-mail from Verisign, click on the link that downloads the
intermediate certificate. You will see text that says, Begin Certificate, and ends
with, End Certificate. Copy this text, including the begin certificate and end
certificate text, and paste it in a text file. You will name the file
proxy_intermediate_cert.text for the Proxy server or intermediate_cert.txt
for the Enterprise server. At the bottom of the e-mail, locate your Server
Subscriber Certificate, copy the text, and paste it in a text file. Name the file,
proxy_example.final_cert.txt for the Proxy server or example.final_cert.txt
for the Enterprise server.
• To import the signed server subscriber certificate, you will need to log in to the
Admin portal. Choose SSL Certificate Management, then Import Certificate. You
will need to provide the certificate file, password, intermediate certificate, and
certificate information. You will provide the information for either the Proxy
server or Enterprise server, based on which signed certificate you are importing.
Now, download the signed SSL certificate that is generated on your desktop, and
save it in a separate file. You will name the file
proxy.example.ca_signed.keystore for the Proxy server or
example.ca_signed.keystore for the Enterprise server. This is your final
certificate.
• In short, Follow the steps listed here for importing a signed certificate for the
Proxy server and Enterprise server.
Deploying CUMC
Thursday, April 09, 2009
8:27 AM
• Before a system administrator or an end user can install and provision Cisco
Unified Mobile Communicator on a phone, the system administrator must do
several things.
o First, the end user on the Admin Portal needs to be activated.
o Then, the Cisco Unified Mobile Communicator software needs to be
downloaded.
o For BlackBerry end users, a system administrator must take an additional
step and add the end users to the Enterprise Server.
• End users must be activated on the CUMA Managed Server before they can
install and provision CUMC on their phone.
• Before activating an end user, verify that the end user has an activated e-mail
account on the network.
• Also, ensure that BlackBerry end users have been added to the BlackBerry
Enterprise Server.
Activate/Deactivate End User
Thursday, April 09, 2009
9:10 AM
Capacity
Thursday, April 09, 2009
9:09 AM
• There are 1,000 Cisco Unified Mobile Communicator users per deployment.
• Deployment includes both Cisco Unified Mobility Advantage Proxy and Cisco
Unified Mobility Advantage Enterprise servers.
• For JTAPI call log integration, up to 4 application users are configured within
Cisco Unified Communications Manager, each with 250 associated user desk
phones per deployment.
Adding a Phone
Thursday, April 09, 2009
9:13 AM
• First, within the user portal of the Cisco Unified Mobile Communicator, click the
My Phones icon in the menu on the left. If no phones currently exist, then you
will be prompted to click the Add Phone button to add your phone.
• After successfully adding a new phone to the Cisco Unified Mobile
Communicator, you should now be able to view its properties under My Phones,
with the option to edit, delete, or add an additional phone
• Users should continue to check their Junk mailboxes and, if necessary, disable
junk-mail blocking during provisioning.
• End users must be provided with the Admin e-mail address in order to indicate
within Outlook that e-mails from this address are trusted, and are not junk.
• The admin e-mail address can be viewed under System Management > SMTP
Server Configuration.
NOTE:
Manual provisioning
Thursday, April 09, 2009
10:56 AM
After end users are activated on the Admin Portal, download the Cisco Unified
Mobile Communicator software onto your computer for provisioning purposes.
There are three steps to downloading Cisco Unified Mobile Communicator for
distribution to Symbian OS phones.
• To configure the softkey template, choose Device > Device Settings > Softkey
Template. Add the Mobility softkey to the On Hook and Connected Call states.
• Configure the end user by choosing User Management > End User. Enable
Mobile Connect for the end user by checking the check box, and also set the
maximum number of RDs for that end user.
• This step of Mobile Connect configuration is optional.
o If you wish to implement access lists, you must first configure them by
choosing Device > Device Settings > Access List.
o Enter a name and description, and select the owner of the access list. Then
specify the type of ACL, whether Allowed or Blocked.
o Click Add Member to perform the initial configuration of an access list
member. You can also select an entry from the Access List Members list to
change the configuration of an existing member.
o If you decided to configure access lists, you must also apply them to the
appropriate RDs. By choosing Device > Remote Destination, you can
specify either an Allowed Access List or a Blocked Access List for that
destination. Note that if a Blocked Access List is set, all numbers not
contained in the access list are allowed, and vice versa.
• Next, configure the IP Phone. Choose Device > Phone. Noting that one line will
be shared with the RDP, assign a softkey template and set the Owner User ID.
• To configure the RDP, choose Device > Device Settings > Remote Destination
Profile.
o Add the line of the office phone, noting that the screen updates after this
addition. Also note that this line is shared with the office phone. The
configured Line CSS and partition therefore apply to both the office phone
and RDP. The Line CSS and Device CSS are combined, with partitions of the
Line CSS considered first.
o The CSS is used for outgoing calls placed with MVA, while the Rerouting
Calling Search Space allows for ringing of an RD or RDs when a call is
received at the office phone.
• The next step in configuring Mobile Connect is adding an RD or RDs to the RDP.
o Choose Device > Remote Destination.
o Set the number of the destination, and check the Mobile Phone check box
to allow active calls to be transferred from the office phone to the RD using
the Mobility softkey.
o Checking the Enable Mobile Connect box allows calls placed to office
phones to also ring the RD.
o The line or lines of the RDP are shown only after you have set the RDP and
clicked Save in the previous step.
o Note that, once saved, the RDP cannot be changed.
o Check the check box to associate an RD with the line or lines of the RDP.