Contents
- Using the Configuration Wizard in Cisco Unified Mobility Advantage
- Logging in to the Admin Portal for the First Time
- How to Use the Configuration Wizard
- Accepting the Usage Tracking Agreement
- Configuring Security Context Management
- Configuring the Connection to Active Directory
- Configuring the Connection to Microsoft Exchange
- Configuring the Connection to the Voicemail Server
- Configuring the Connection to Cisco Unified Communications Manager
- Configuring the Connection to Cisco Unified Presence
- Configuring the Connection to Cisco Unified MeetingPlace
- Viewing Configuration Summaries for Connections to Enterprise Servers
- Completing the System Configuration Screen
- Configuring Server Setup Network Configuration
- Preparing Client Software
- Managing Provisioning Options
- Finishing the Configuration Wizard
- Download a Self-Signed Certificate from Cisco Unified Mobility Advantage for the Cisco Adaptive Security Appliance
- Importing a Self-Signed Certificate from Cisco Unified Mobility Advantage into the Cisco Adaptive Security Appliance
- Importing a Self-Signed Certificate into Cisco Unified Mobility Advantage from the Cisco Adaptive Security Appliance
- Performing Additional Required Procedures
- Switching From a Lab to Production Deployment
Using the Configuration Wizard in Cisco Unified Mobility Advantage
After a new install, configure Cisco Unified Mobility Advantage using the configuration wizard.
You will not use the configuration wizard for upgrades.
- Logging in to the Admin Portal for the First Time
- How to Use the Configuration Wizard
- Performing Additional Required Procedures
- Switching From a Lab to Production Deployment
- Accepting the Usage Tracking Agreement
- Configuring Security Context Management
- Configuring the Connection to Active Directory
- Configuring the Connection to Microsoft Exchange
- Configuring the Connection to the Voicemail Server
- Configuring the Connection to Cisco Unified Communications Manager
- Configuring the Connection to Cisco Unified Presence
- Configuring the Connection to Cisco Unified MeetingPlace
- Viewing Configuration Summaries for Connections to Enterprise Servers
- Completing the System Configuration Screen
- Configuring Server Setup Network Configuration
- Preparing Client Software
- Managing Provisioning Options
- Finishing the Configuration Wizard
- Download a Self-Signed Certificate from Cisco Unified Mobility Advantage for the Cisco Adaptive Security Appliance
- Importing a Self-Signed Certificate from Cisco Unified Mobility Advantage into the Cisco Adaptive Security Appliance
- Importing a Self-Signed Certificate into Cisco Unified Mobility Advantage from the Cisco Adaptive Security Appliance
Logging in to the Admin Portal for the First Time
Before You BeginProcedure
You will need the Cisco Unified Mobility Advantage Administrator password that you specified during installation.
You can access the Cisco Unified Mobility Advantage Admin Portal using commonly-used web browsers.
The portal is designed for viewing at 96 DPI.
How to Use the Configuration Wizard
The Configuration Wizard prompts you through the steps required to configure Cisco Unified Mobility Advantage for your system.
Caution
Do not select the Back button in your browser window or you will lose any unsaved information you have entered.
Tip
You can stop running the wizard at any time and your changes will be saved. When you next sign in, the wizard will resume where you stopped.
- Accepting the Usage Tracking Agreement
- Configuring Security Context Management
- Configuring the Connection to Active Directory
- Configuring the Connection to Microsoft Exchange
- Configuring the Connection to the Voicemail Server
- Configuring the Connection to Cisco Unified Communications Manager
- Configuring the Connection to Cisco Unified Presence
- Configuring the Connection to Cisco Unified MeetingPlace
- Viewing Configuration Summaries for Connections to Enterprise Servers
- Completing the System Configuration Screen
- Configuring Server Setup Network Configuration
- Preparing Client Software
- Managing Provisioning Options
- Finishing the Configuration Wizard
Accepting the Usage Tracking Agreement
ProcedureIn order to improve our products, Cisco uses a third-party tool, Google Analytics, to collect general information about activity and errors in the Admin and User Portals and in iPhone clients.
By default, Cisco does not collect personal information such as contact names, phone numbers dialed, caller identities, or any voicemail content. All information collected is stored by Google and is confidential.
Only Cisco has access to this information. This functionality is not currently available as a reporting tool for Administrators.
You can increase, decrease, or disable data collection after you complete the Configuration Wizard.
For more information, see the Usage Reporting documentation module for this release at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html.
Step 1 Read the agreement. Step 2 Select an option to continue with the Configuration Wizard. Step 3 Select Next.
Configuring Security Context Management
Security Contexts manage security policies and server identity-verification certificates for connections between Cisco Unified Mobility Advantage and other enterprise servers.
Configuring server security can be quite complicated, and exact requirements depend on the security requirements at your company. A simple configuration that should work in most environments is documented here.
You will create two Security Contexts in this procedure. Use the first one for the relationship with the Cisco Adaptive Security Appliance and use the second one for relationships with all other enterprise servers. You will configure these relationships later in the Configuration Wizard when you configure the adapters for each enterprise server.
Before You BeginProcedure
For the first certificate, where noted, values must match the values you determined in Required Values for Your Certificate Signing Request, when you configured your Cisco Adaptive Security Appliance.
Ensure that the other enterprise servers that you will deploy with this solution, such as your Active Directory server, do not require you to import a certificate from Cisco Unified Mobility Advantage.
If your other enterprise servers do require a certificate, create and use only the first security context described in this topic.
Configuring the Connection to Active Directory
ProcedureConfigure Cisco Unified Mobility Advantage to communicate with Active Directory.
Cisco Unified Mobility Advantage uses Active Directory for:
Access authentication to the User Portal and Cisco Unified Mobile Communicator.
All Cisco Unified Mobile Communicator users must be in Active Directory to enable Single Sign On.
Directory search for contacts from Cisco Unified Mobile Communicator
Number-to-name resolution for caller identification in the call logs in Cisco Unified Mobile Communicator.
Locating user information in Microsoft Exchange, if your deployment includes Exchange.
Restriction:
At least one Active Directory server is required.
Cisco Unified Mobility Advantage can connect to multiple Active Directory servers and to multiple OUs on the same Active Directory server, for example if you need to include users in different OUs. Create an adapter for each server or OU. Each user ID can appear in only one Active Directory.
If you deploy Cisco Unified Presence to provide availability status, Cisco Unified Mobility Advantage and Cisco Unified Personal Communicator must point to the same Active Directory server.
User IDs in Active Directory must match User IDs in Cisco Unified Communications Manager.
User IDs must be unique within the Search Base.
All users sign in to Cisco Unified Mobile Communicator with their Active Directory credentials. Usernames cannot include any of the following: / \ [ ] : ; | = , + * ? < > @ \ " or spaces. Passwords cannot be blank. Passwords for iPhone clients are limited to 1024 characters. Passwords for other clients are limited to 14 characters. For iPhone users, credentials must include only characters that can be entered using the iPhone keypad.
Cisco Unified Mobility Advantage supports integration with multiple domains under the same directory tree structure. However, the domain of each user is not specified when you add users or in search results; if you have two users with the same name, you may need to add both and check the details for each user in Search/ Maintenance to see the OU. Note that for Exchange authentication, you must configure an Exchange adapter for each domain.
Note
Accept the default values where they appear unless you have specific reasons to change them.
Step 1 Select and enter your corporate directory server information: Step 2 Select Next. Step 3 Enter the host name or IP address of the corporate directory server: Step 4 Select Next. Step 5 Enter the port if the system cannot automatically detect it:
Option Description Your Value Port
LDAP port of the corporate directory server. Cisco Unified Mobility Advantage uses this port to connect to the corporate directory for adding users to Cisco Unified Mobility Advantage and for user directory listing and searches.
The default value for this field is 389.
The wizard attempts to detect this port; if successful, do not change the detected value.
Step 6 Select Next if you changed the default port. Step 7 Select a Base DN from the list or select Edit if to add or modify the Base DN:
Option Description Your Value Base DN
Distinguished name of the root node in your corporate directory server.
This is the level in the corporate directory hierarchy at which Cisco Unified Mobility Advantage starts searches.
If you are deploying Cisco Unified Mobility Advantage for the entire company, set this value to the base level for the company. For example:
DC=example,DC=com
If you are deploying Cisco Unified Mobility Advantage for a single organizational unit, you may choose the base level for this organizational unit. For example:
OU=Sales,DC=example,DC=com
Microsoft recommends that Organizational Units be limited to fewer than 1000 entries.
Step 8 Select Next. Step 9 Change the additional information that appears, if necessary.
Option Description Your Value Filter criteria
Criteria that distinguish employees from other resources in Active Directory, such as conference rooms that can be "invited" to meetings.
Do not change the default value unless you have a specific reason to do so.
Follow Referral
Determines if Cisco Unified Mobility Advantage follows referrals from the authoritative Active Directory server to cascaded Active Directory servers, for example for subdomains, when searching.
The default value is True.
If you select True, make sure the DNS names of all cascaded Active Directory servers are resolvable.
Polling Period (days)
Frequency (in days) with which Cisco Unified Mobility Advantage checks the corporate directory server for updates.
The default is 1 day.
Phone Number Format
In order to identify voice messages and dialed and received calls by name, Cisco Unified Mobility Advantage compares the dialed or received phone number with phone numbers in the various directories that are associated with Cisco Unified Mobility Advantage. When searching Active Directory, it looks at the numbers in the attributes that represent home phone, work phone and mobile phone. When a match is found, the name associated with the number is displayed in the call history or voicemail entry.
Use this field to specify the formatting required for matches with phone numbers in Active Directory to occur successfully.
Enter any number of any of the following: # ( ) - , and space, and, for Cisco Unified Communications Manager releases earlier than 7.1(3), . Be careful not to include any extra spaces, including at the beginning or end of your number format.
Cisco Unified Mobility Advantage transforms phone numbers for matching according to the pattern you enter, by inserting the phone number into the format digit by digit from right to left. It also searches for the unformatted number.
Thus, if your Phone Number Format is ## (###) ###-#### and a dialed number has 5 digits (for example, 12345), Cisco Unified Mobility Advantage searches for the number in the formats 1-2345 and 12345.
If Cisco Unified Communications Manager passes numbers with a leading +, for example if you use Directory Lookup rules to transform numbers for global dialing, substitute a #for the +. For example, instead of +# (###) ###-####, enter ## (###) ###-####.
If no single phone number format can represent all of the formats in your Active Directory, choose the single format that will result in the most matches. This release is limited to matching only one format string.
If you need to change this value after Cisco Unified Mobility Advantage is running, restart Cisco Unified Mobility Advantage after you make this change.
Connection Type
Type of connection to use between Cisco Unified Mobility Advantage and the corporate directory server.
Use SSL for secure connections.
Use Plain for nonsecure connections.
Make sure Active Directory supports the connection type you choose.
Security Context
This setting appears only if you choose SSL for Connection Type.
Select a Security Context for connections between Cisco Unified Mobility Advantage and Active Directory.
If you choose a security context that has the Trust Policy set to Trusted Certificates, you must validate the identity of the Active Directory server, for example by importing a self-signed certificate from Active Directory into the security context.
Step 10 Select Next. Step 11 Enter information for the account that Cisco Unified Mobility Advantage Server uses to read data from your corporate directory server:
Option Description Your Value Admin DN
The distinguished name of the account that Cisco Unified Mobility Advantage uses to read data from your corporate directory server.
For example:
CN=CUMA Read Only User,OU=Users,DC=department,DC=example,DC=com
This account must have at least read-only permissions in your corporate directory server.
Password
The password for the Admin DN account.
Append Base DN
If you entered the short form of the Admin DN (Domain name/User ID) instead of the long form including the container name, check the box to append the Base DN to the Admin DN.
Step 12 Select Next. If you see the fields in Active Directory that hold directory information for each user, accept the defaults unless you have reason to change them. Otherwise, skip to the end of this procedure.
Option Description Your Value Distinguished Name
Attribute name in Active Directory that represents the distinguished name of a user. For example:
distinguishedName
First Name
Attribute name in Active Directory that represents the first name of a user. For example:
givenName
Last Name
Attribute name in Active Directory that represents the family name of a user. For example:
sn
User ID
Attribute name in Active Directory that represents the corporate name of a user. For example:
sAMAccountName
This must match the User ID for each user in Cisco Unified Communications Manager.
Attribute name in Active Directory that represents the email address of a user. For example:
Step 13 Select Edit only if you have a specific reason to change the default values. Step 14 Check your configuration:
Step 15 Select Next. Step 16 Review the information on the Corporate Directory Configuration Summary screen. To change any setting, select Reset to clear this entire section and configure it again. Otherwise, select Next.
Configuring the Connection to Microsoft Exchange
ProcedureConfigure Cisco Unified Mobility Advantage to communicate with Microsoft Exchange, if your deployment includes Microsoft Exchange.
Cisco Unified Mobility Advantage uses Exchange for:
Directory Lookup for personal contacts of users
Caller identification of people who are in the personal contact list of users
Triggering meeting notifications or adding meetings to the Meeting List, depending on the client release
Deriving availability status from the Exchange calendar of each user (Release 7.0 clients only)
Voicemail retrieval (For Cisco Unity in Unified Messaging Mode)
Step 1 Answer the question Do you want to configure Personal Contact adapter? If your deployment will include Microsoft Exchange, select Yes. Otherwise, select No.
Step 2 Select or enter personal contact server information. Step 3 Select Next Step 4 Enter information:
Option Description Your Value Hostname/IP Address
The hostname or IP address of the Exchange server.
If Microsoft Exchange is clustered, use the hostname associated with the Outlook Web Access (OWA) bridgehead.
Transport Type
TLS is the secure transport type. Select TLS if Exchange is running SSL.
TCP is the nonsecure transport type. Select TCP if Exchange is not running SSL.
Step 5 Select Next Step 6 Enter information:
Option Description Your Value Port
The port used to connect the Cisco Unified Mobility Advantage Server to the Exchange server. This is the Outlook Web Access (OWA) port of the Exchange server.
The default port for SSL connections is 443.
The default port for non-SSL connections is 80.
Exchange Domain
The domain for this instance of the Exchange server. For example, CORP.
This is the domain that users use when logging into their Windows desktops.
User Name Suffix
The suffix that is appended to usernames to complete their corporate email address.
Leave this setting blank unless you have a specific reason to change it, for example if you have email addresses with subdomains such as "sales.yourcompany.com" that resolve to a single domain such as "yourcompany.com".
If email addresses cannot be determined from Active Directory, obtain this value from your Exchange administrator.
This suffix must be a fully qualified DNS domain name. It is often, but not always, yourcompany.com. Do not include the @ character.
Step 7 Check your configuration:
Step 8 Select Next Step 9 Specify information about integrating Cisco Unified Mobility Advantage with Cisco Unified MeetingPlace:
Option Description Your Value Enable Meeting Service
Select Yes to enable the following meeting features:
Polling Period (sec)
These options are available only if you have configured an Exchange adapter.
Do not change the default values unless you have specific reason to do so.
Max Threads
Polling Offset (min)
Step 10 Select Next Step 11 Review the information on the summary screen. To change any setting, select Reset to clear this entire section and configure it again. Step 12 Select Next
Configuring the Connection to the Voicemail Server
Before You BeginProcedureMake sure you have met all requirements in Requirements for Voicemail
If you have multiple voicemail servers, you can create one adapter to connect to one server now and add the others later, or add all adapters later.
Step 1 Select Yes to configure a voicemail adapter if Cisco Unified Mobility Advantage will connect to Cisco Unity or Cisco Unity Connection. Step 2 Select Next.
Step 3 Select or enter the voicemail server information: Step 4 Select Next. Step 5 Enter information:
Option Description Your Value IMAP Information
Unity Exchange Hostname/IP Address
For Cisco Unity:
Hostname of the Exchange server.
If you have users on more than one Exchange server, create a separate Cisco Unity adapter for each Exchange server.
For Cisco Unity Connection:
IP address of the Cisco Unity Connection server.
If you have users on more than one Cisco Unity Connection server, create a separate adapter for each Cisco Unity Connection server.
Transport Type
The connection type for connections to the Exchange server (for Cisco Unity) or to the Cisco Unity Connection server.
For Cisco Unity Connection, this setting must match the setting on the Cisco Unity Connection server. For Cisco Unity deployments, this setting must match the security setting for IMAP connections on the Exchange server.
Select TLS for secure connections (SSL on Exchange or TLS on Cisco Unity Connection).
Select TCP for nonsecure connections.
Port
If Transport Type is TCP:
If Transport Type is TLS:
Polling Period (sec)
The frequency with which Cisco Unified Mobility Advantage checks for new voice messages.
The default is every 600 seconds.
Very frequent polling may decrease performance.
Are the Voicemail credentials for the user the same as the corporate credentials?
Select Yes if the user ID and password for user account on the voicemail system is the same as in Active Directory.
Select No otherwise.
If you select No, you must tell users to enter their voicemail credentials into the User Portal.
Unity Version
If you are using Cisco Unity Release 7.x, enter the following SOAP information.
SOAP Information
Information in this section applies only to Cisco Unity Release 7.x.
Unity Host Name/ IP Address
The host name or IP address of the Cisco Unity server.
This may or may not be the same as the Unity Exchange Host Name/IP Address which hosts the voice messages that are retrieved by IMAP, which you entered above.
Transport Type
Select TLS for SSL connections.
Select TCP for nonsecure connections.
This must match the connection type you specify in Cisco Unity.
Port
The SOAP port. The default port for TLS is 443, and the default for TCP is 80.
Unity Backup Host Name/ IP Address
The host name or IP address of a back up Cisco Unity server if you have one.
Application User Name
The Cisco Unity Application user ID. This is the same user ID that you use to sign in to the Cisco Unity Administration page.
Application Password
The Password for the Unity Application User.
Domain
The Microsoft Exchange or NT domain of the Cisco Unity inbox.
Note This is not the Fully Qualified Domain Name domain. Additional Information
Security Context
You see this option only if you are connecting to Cisco Unity Connection and you chose TLS as the Transport Type.
Choose cuma_trust_all.
Step 6 Check your configuration:
Step 7 Select Next. Step 8 Accept the default values for the following fields unless you have specific reason to change them.
Option Description Your Value Phone number search field name
Field to search the phone number of a caller.
Default is Subject.
We recommend that you do not change the default value.
Phone number search pattern
Regular expression for the search pattern that should be used in the Phone Number Search Field Name field.
This information is used to identify callers by matching information from Cisco Unity and Cisco Unified Communications Manager with existing contact information in Exchange and Active Directory.
Default is the regular expression [0-9]{4,}
We recommend that you do not change the default value.
Step 9 Select Next. Step 10 Select options for voicemail integration.
Option Description Your Value Enable Corporate Voicemail Integration
Select whether or not Cisco Unified Mobility Advantage connects to your corporate voicemail system and provides voicemail viewing and downloading capabilities on Cisco Unified Mobile Communicator.
Maximum Expiry of Voicemails (days)
Enter the maximum number of days that voice messages will be listed in Cisco Unified Mobile Communicator.
Step 11 Select Next. Step 12 Review the information on the summary screen. To change any setting, select Reset to clear this entire section and configure it again. Step 13 Select Next.
Configuring the Connection to Cisco Unified Communications Manager
ProcedureConfigure Cisco Unified Mobility Advantage to integrate with Cisco Unified Communications Manager to provide call-related features such as unified call logs, MobileConnect, and Dial via Office. Available features and exact configuration depend on your version of Cisco Unified Communications Manager.
Step 1 Select Yes at the prompt to configure a call control adapter. Step 2 Select Next. Step 3 Enter information: Step 4 Select Next. Step 5 Enter information for Cisco Unified Communications Manager. The exact fields you see depend on the Cisco Unified Communications Manager version. Be sure to scroll down in the wizard to see all fields.
Option Description Your Value Address Information
Primary Host Name
The hostname or IP address of the primary Cisco Unified Communications Manager server that is running the CTI -enabled account or accounts that you created.
Primary Server Port
The port used to communicate with the primary Cisco Unified Communications Manager server.
The default is 5060.
Backup Host Name
The backup server host name or IP address.
If you enter a backup server, Cisco Unifed Communications Manager version, ports, security requirements, and CTI and AXL API user credentials must be identical on the primary and backup servers.
Backup Server Port
The port used to communicate with the backup Cisco Unified Communications Manager server.
CTI User Credentials
User Name
Enter the username of the CTI-enabled account you created in Cisco Unified Communications Manager.
If you created more than one of these CTI-enabled accounts, select Add More to add each.
Password
Enter the password or passwords associated with the user name or names above.
SIP Information
Transport Type
Select TLS for secure connections.
Select TCP for normal connections.
The default transport type is TCP.
This must match the setting in the "CUMA Server Security Profile" on the Cisco Unified Communications Manager server.
Communications Manager Version
Choose the version.
Web Services Information.
Information in this section appears only if you choose a Cisco Unified Communications Manager version 7.0 or greater.
Https Port
The SIP port number of the Cisco Unified Communications Manager server. This is often the same secure port that runs the Cisco Unified Communications Manager Administration page.
Cisco Unified Communications Manager runs the AXL interface on this port.
The default is 8443.
User Name
The Cisco Unified Communications Manager Application User Name to which you assigned standard AXL API access.
Password
The Password for the user in the row above.
Additional Information
Security Context
This field appears only if you are using Cisco Unified Communications Manager Release 7.0 or greater. It may not appear unless you selected TLS for Transport Type.
Select cuma_trust_all.
Step 6 Check your configuration:
Click Test Config.
Look for the test result near the top of the page.
Correct any errors indicated.
Tip
Try removing the backup server hostname and port and test again; if the test is successful, the problem is a configuration issue on your backup server. Your backup server should be configured identically to your primary server.
Verify that you can successfully sign in to Cisco Unified Communications Manager with each set of credentials that you entered on this page.
Step 7 Select Next. Step 8 Select Next on the Dial Rule Instructions page if you are using any version of Cisco Unified Communications Manager other than Release 4.x. Step 9 For Cisco Unified Communications Manager Release 4.x only) Enter the directory lookup rules you planned earlier. Step 10 Select Next. Step 11 Select options for Cisco Unified Communications Manager integration.
Option Description Enable Corporate PBX Integration
Select Yes to:
Allow users to view in Cisco Unified Mobile Communicator lists of calls they make and receive on all of their office phones AND
Enable the Dial via Office feature.
Select No to:
Enable Dial via Office
Select Yes or No.
Dial Via Office Policy
Select an option:
Force Dial Via Office to require all users to make all mobile phone calls via their office numbers.
If calls cannot be dialed via office for any reason, they can be dialed directly from the mobile device.
User Option to allow users to choose which calls they dial direct and which they dial via office.
Dial via Office Emergency Numbers
Specify numbers that will always be dialed direct from the mobile phone and never via the corporate PBX system.
Separate the list with a comma between each number.
Enter the numbers as they would be dialed directly from the mobile phone, for example 112,911,999.
These should include emergency numbers and can include numbers such as directory information.
Include emergency numbers from all countries to which your users will travel.
Maximum Expiry of Call Logs (days)
Enter the maximum number of days that users can keep call log data on their mobile phones before automatic cleanup. For example, 30.
Step 12 Select Next. Step 13 Review the information on the summary screen. To change any setting, select Reset to clear this entire section and configure it again. The "Dial Rule Configuration" section is referring to the Directory Lookup configuration.
Step 14 Select Next.
Configuring the Connection to Cisco Unified Presence
ProcedureThis server allows users of Cisco Unified Mobile Communicator Release 7.0 clients to see the availability status of other users.
Configure Cisco Unified Mobility Advantage to communicate with Cisco Unified Presence to provide this service.
Step 1 Choose Yes if you want to integrate Cisco Unified Mobility Advantage with a Cisco Unified Presence server. Step 2 Select Next. Step 3 Enter the Cisco Unified Presence Server adapter information: Step 4 Select Next. Step 5 Enter information:
Option Description Your Value Host Name/IP Address
Hostname or IP address of the Cisco Unified Presence server to which all Cisco Unified Mobility Advantage users are assigned.
Port
Port on which Cisco Unified Mobility Advantage will communicate with Cisco Unified Presence.
(The port of the SOAP Web Service interface that Cisco Unified Presence listens on to accept user sign-in requests.)
The default is 8443.
Backup Host Name/ IP Address
(Optional) Hostname or IP address of the backup Cisco Unified Presence Server, if you have one.
Application User Name
The user ID of the Application User you created in Cisco Unified Presence.
Application Password
Password for this Application User.
Security Context
Select cuma_trust_all.
Step 6 Check your configuration:
Step 7 Select Next. Step 8 Accept the default SIP settings for the Cisco Unified Presence Server, unless you have specific reasons to change them.
Option Description Your Value SIP Settings
Default Subscription Interval
Default is 3600.
Transport Type
Default is TCP.
If you configured Cisco Unified Presence to require a TLS connection, you must select TLS here.
Listen Port
Default is 5060.
Min Connections
Default is 5.
Max Connections
Default is 20.
Max Load Per Connection
Default is 200.
Step 9 Check your configuration:
Step 10 Select Next. Step 11 Select Yes for Enable Presence Service to enable users to share availability status information. Step 12 Select Next. Step 13 Review the information on the summary screen. To change any setting, select Reset to clear this entire section and configure it again. Step 14 Select Next.
Configuring the Connection to Cisco Unified MeetingPlace
ProcedureConfigure Cisco Unified Mobility Advantage to communicate with Cisco Unified MeetingPlace to provide the Call Me feature that allows users to select a link to join meetings. (The Meeting List feature does not require this adapter.)
Step 1 Choose Yes if you want to integrate Cisco Unified Mobility Advantage with Cisco Unified MeetingPlace. Step 2 Select Next. Step 3 Enter the Cisco Unified MeetingPlace Server adapter information: Step 4 Select Next. Step 5 Enter information:
Option Description Your Value Enter http or https, depending on whether you enabled SSL for your Cisco Unified MeetingPlace application or web server.
Version of Cisco Unified MeetingPlace
For Cisco Unified MeetingPlace Release 7.x:
IP address or host name of the Cisco Unified MeetingPlace application server to which Cisco Unified Mobility Advantage will connect.
For Cisco Unified MeetingPlace Release 6.0:
IP address or host name of the Cisco Unified MeetingPlace web server to which Cisco Unified Mobility Advantage will connect.
Port on the Cisco Unified MeetingPlace server for communications with Cisco Unified Mobility Advantage.
Enter 80 if you entered Http for Connection Type above.
Enter 443 if you entered Https for Connection Type.
Default is 80.
These options are available only if you select Cisco Unified MeetingPlace Release 7.x above.
Credentials of the Attendant or Administrator account you created in Cisco Unified MeetingPlace.
Step 6 Check your configuration: Step 7 Select Next. Step 8 Review the information on the summary screen. To change any setting, select Reset to clear this entire section and configure it again. Step 9 Select Next.
Completing the System Configuration Screen
Specify a domain and a session timeout length.
Enable the Cisco Unified Mobility Advantage to send email messages to iPhones and BlackBerry devices, including provisioning messages that allow users to quickly and easily set up the client application for use.
Before You BeginProcedureYour SMTP Server must allow relaying from Cisco Unified Mobility Advantage. For information, contact your SMTP server administrator or see the documentation for your SMTP server.
Step 1 Enter information:
Option Description Your Value General
Domain Enter the domain that completes the email address of the Cisco Unified Mobile Communicator user. For example:
cisco.com
This domain will be used to send provisioning email messages to iPhone and BlackBerry users.
If you deploy Cisco Unified Presence, this domain must match the Proxy domain of the Cisco Unified Presence server as specified on the Cisco UP SIP Proxy Service Parameters page.
Session Timeout (days)
Enter the number of days after which users must sign in again to Cisco Unified Mobile Communicator.
SMTP Server Configuration
Host Name
Hostname of your SMTP gateway. This must be the same as your Exchange hostname if you use the Exchange server as your SMTP gateway.
Port
Port number for the SMTP gateway. Usually, this is 25.
Authentication Required
Identifies whether or not your organization requires authentication on the mail server. If the value for this field is True, you must enter a password for the Admin Email account (see the next two options below).
Admin Email
Email address for the administrator responsible for management of Cisco Unified Mobility Advantage.
Cisco Unified Mobility Advantage uses this email address to send provisioning emails and alerts to BlackBerry users and to send provisioning messages to iPhone users.
SMTP Authentication Password
Password associated with the Admin Email address.
Required only if the SMTP server requires authentication.
Step 2 Select Next.
Configuring Server Setup Network Configuration
ProcedureConfigure Cisco Unified Mobility Advantage to communicate with the Cisco Adaptive Security Appliance and Cisco Unified Mobile Communicator clients.
Step 1 Enter information:
Setting Description Your Value Host name that clients will use to connect through the Cisco Adaptive Security Appliance to Cisco Unified Mobility Advantage.
The hostname must be routable from the Internet.
The Proxy Host Name must resolve to the external IP address that you received from your IT administrator.
The port that is used for secure communications between the Cisco Unified Mobile Communicator client and the Cisco Adaptive Security Appliance.
The port through which clients connect to the Cisco Adaptive Security Appliance for wireless downloads of Cisco Unified Mobile Communicator.
If users will use only BlackBerry and iPhone devices, enter a dummy value.
The port that Cisco Adaptive Security Appliance uses to connect to Cisco Unified Mobility Advantage.
The Cisco Adaptive Security Appliance translates this port to the Proxy Client Connection Port for Cisco Unified Mobile Communicator client connections to the Cisco Adaptive Security Appliance.
The port users will use to access the Cisco Unified Mobile Communicator User Portal.
For security, this port should be available only behind your corporate firewall.
The port on which users will download the client software.
This port is translated to the Proxy Client Download Port for client connections to the Cisco Adaptive Security Appliance.
If users will use only BlackBerry and iPhone devices, enter a dummy value.
Select the Security Context that governs connections with the Cisco Adaptive Security Appliance.
If you are running the Configuration Wizard: Select the cuma Security Context that you created at the beginning of the wizard.
This Security Context must have the Trust Policy set to Trusted Certificates.
Step 2 Select Next. The Server Setup Summary screen appears.
Step 3 Review the information. To change information, select Reset. Step 4 Select Next.
Preparing Client Software
This procedure is required in order to determine the devices you will support and to make client software available for download (for devices other than iPhone.)
Client software for all devices except iPhones is distributed in a single file with a .oar filename extension. This .oar file also provides the list of devices, service providers, and languages from which you will choose the devices, providers, and languages you want to support.
You must upload the .oar file software onto the Cisco Unified Mobility Advantage server, even if all of your users will use iPhones.
Before You BeginProcedureObtain the .oar file for this release. See Obtaining Client Software and The List of Supported Devices.
The .oar file is provided on a separate CD from Cisco Unified Mobility Advantage, or you can download it from Cisco.com.
You should be looking at the Handset Platform Management window in the Configuration Wizard.
Step 1 Browse to or enter the location of the Cisco Unified Mobile Communicator software. Step 2 Select Next. Wait for the file to upload. This may take some time.
When the upload is successful, you see a list of the handset platforms and versions of Cisco Unified Mobile Communicator now installed in Cisco Unified Mobility Advantage.
Step 3 Select Next.
Managing Provisioning Options
ProcedureChoose the devices and client versions your deployment will support.
Devices that Cisco Unified Mobility Advantage supports for Release 3.x clients vary by country and service provider. Release 7.x client support is not tied to country and service provider. Use this procedure to view and select from available device options.
You can restrict the countries, service providers, and devices that you will support. More supported variations adds flexibility for your users, while fewer supported variations simplifies control and management of your client base.
Note
Select iPhone to enable it as a supported device where applicable, even though users will obtain the client software from the Apple App Store.
Step 1 Select the arrow beside a country to view the supported mobile service providers in that location. If you do not see your country, select Other.
Step 2 Select the arrow beside a provider to view the devices that provider supports. Step 3 Select the country, mobile phone service providers, and supported devices for your deployment. If you do not see the device you are looking for, select Other for country and service provider.
Checking a box selects each box in the list under that entity, whether or not you see the list. Uncheck boxes as needed, or start by checking each device to support.
Windows Mobile and iPhone clients are currently available in English only.
On Nokia Symbian phones, Release 7.0 is available in English, while French, German, Spanish, and Italian are supported in Release 3.x.
BlackBerry clients have separate installers for each supported language:
Step 4 Select Next
How to Finalize Certificate Exchange with the Cisco Adaptive Security Appliance
Download a Self-Signed Certificate from Cisco Unified Mobility Advantage for the Cisco Adaptive Security Appliance
Procedure
Step 1 Select the [+] beside Security Context Management. Step 2 Select Security Contexts. Step 3 Select Manage Context beside the cuma security context. This is the security context you created above with Trust Policy set to Trusted Certificates.
Step 4 Select Download Certificate. Step 5 Save the file.
Importing a Self-Signed Certificate from Cisco Unified Mobility Advantage into the Cisco Adaptive Security Appliance
ProcedureThe Cisco Adaptive Security Appliance requires a certificate in order to trust Cisco Unified Mobility Advantage.
The Cisco Adaptive Security Appliance does not automatically trust certificates signed by a recognized certificate signing authority, so perform this procedure even if you deploy a signed certificate on Cisco Unified Mobility Advantage.
Step 1 Open the self-signed certificate from Cisco Unified Mobility Advantage in WordPad (not Notepad): Right-click the certificate file and select Open with > Wordpad. Step 2 Sign in to the Cisco Adaptive Security Appliance and enter configuration mode. Step 3 Import the certificate into the Cisco Adaptive Security Appliance trust store: crypto ca trustpoint <trustpoint-cuma-selfsigned> enrollment terminal crypto ca authenticate <trustpoint-cuma-selfsigned>Select All and copy the contents of the certificate from WordPad.
Include the following lines. Make sure that there are no extra spaces or blank lines at the end.
----BEGIN CERTIFICATE---- ----END CERTIFICATE----Paste into the Cisco Adaptive Security Appliance command-line interface window.
Importing a Self-Signed Certificate into Cisco Unified Mobility Advantage from the Cisco Adaptive Security Appliance
Import the required self-signed certificate from the Cisco Adaptive Security Appliance into Cisco Unified Mobility Advantage.
Before You BeginProcedureLocate the self-signed certificate you generated from the Cisco Adaptive Security Appliance in Generating a Certificate for Cisco Unified Mobility Advantage from the Cisco Adaptive Security Appliance.
You will import this certificate into the cuma security context that you created above in Configuring Security Context Management.
Step 1 Open the certificate file in WordPad (not Notepad): Right-click the file and select Open with > Wordpad. Step 2 Sign in to the Cisco Unified Mobility Advantage Admin Portal. Step 3 Select the [+] beside Security Context Management. Step 4 Select Security Contexts. Step 5 In the right pane, select Manage Context for the Security Context into which you want to import the certificate. Step 6 Select Import on the Trusted Certificate(s) line. Step 7 Enter a certificate name (no spaces). For example, enter ASA_selfsigned for the self-signed certificate from the Cisco Adaptive Security Appliance.
Step 8 Copy and paste the text from the certificate into the Certificate field. Include the following lines. Make sure that there are no extra spaces or blank lines at the end.
----BEGIN CERTIFICATE----
----END CERTIFICATE----
Step 9 Select Import.
Performing Additional Required Procedures
Perform the following procedures in order.
To More Information (Optional) Increase data collection via Google Analytics.
See the Usage Reporting documentation module at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html
If any of your other enterprise servers require the exchange of certificates, exchange the required certificates. The procedures documented in this chapter assumed your servers do not require these certificates.
See the Security documentation module for this release at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html By default, Enforce Device ID Check is enabled for the system.
Consider setting this to to False until you have verified that everything works and you are ready to add device identity information for your users.
Sign in to the Cisco Unified Mobility Advantage Admin Portal.
Select the [+] beside System Management.
Select System Properties.
Select False for Enforce Device ID Checking.
Select Submit.
To enable device ID checking later, see the Security documentation module for this release.
Allow iPhone users to receive notifications of missed calls and new voice messages even when the client is not running.
Disable this feature if your users do not have iPhones or your Cisco Unified Mobility Advantage server cannot telnet to gateway.push.apple.com on port 2195.
See the Deploying Clients documentation module for this release.
If you will use this feature, make sure your system meets the requirements in the Before You Begin section.
If you skipped any of the configurations described earlier in this book, complete those configurations now.
See chapters in this book for configuring the Cisco Adaptive Security Appliance, Cisco Unified Communications Manager, and other servers that provide functionality to Cisco Unified Mobility Advantage.
Start Cisco Unified Mobility Advantage
Add and set up a single user and device, then test all features you have configured.
See the Adding Users and Devices documentation module at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html.
Configure settings on the client as needed.
If necessary, revisit configurations described in this book and see the Troubleshooting documentation module.
Configure and enable any features that you skipped during intial configuration
See the feature configuration modules at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html
Configure settings on the client as needed.
Test additional features you have configured.
If necessary, revisit configurations described in the feature configuration modules and see the Troubleshooting documentation module at http://www.cisco.com/en/US/products/ps7270/prod_troubleshooting_guides_list.html.
Users may see an "untrusted certificate" warning when they access the User Portal. This warning is benign but may confuse users. Consider obtaining a signed certificate for your Cisco Unified Mobility Advantage server so that users do not see this warning.
If your enterprise servers do not currently require a certificate from Cisco Unified Mobility Advantage: After your deployment is running successfully, consider deploying certificates to increase your server security.
See the Security documentation module at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html
Activate users
See the Adding Users and Devices documentation module at http://www.cisco.com/en/US/products/ps7270/products_installation_and_configuration_guides_list.html.
Set up devices
Give users the information they need in order to use Cisco Unified Mobile Communicator
Switching From a Lab to Production Deployment
Before you switch from a lab deployment to a production deployment that uses the same Cisco Unified Communications Manager server, be sure all users on the lab system are logged out of the client, then remove all phones from the lab Cisco Unified Mobility Advantage server. Multiple Cisco Unified Mobility Advantage servers cannot be associated with a single Cisco Unified Communications Manager cluster.