Tasks Common to Virtual Machines
About Creatings VMs
This chapter explains the sequence of tasks for creating virtual machines on each host server.
The sequence is:
-
Download the OVA files. See Open Virtualization Files.
-
Create VMs .
-
After you create all the VMs, perform initial configuration. See the Post Installation Configuration section in the Cisco Packaged Contact Center Enterprise Administration and Configuration Guide at https://www.cisco.com/c/en/us/support/customer-collaboration/packaged-contact-center-enterprise/products-maintenance-guides-list.html.
Open Virtualization Files
Open Virtualization Format files define the basic structure of the VMs that are created—including the CPU, RAM, disk space, reservation for CPU, and reservation for memory.
-
Go to Download Software page on Cisco.com.
-
Select the required product release version.
-
Download and extract the file and save the OVAs to your local drive.
Mount ISO Files
Upload ISO image to data store:
-
Select the host in the vSphere client and click Configuration. Then click Storage in the left panel.
-
Select the datastore that will hold the ISO file.
-
Right click and select Browse datastore.
-
Click the Upload icon and select Upload file.
-
Browse to the location on your local drive where you saved the ISO file, and upload the ISO to the datastore.
Mount the ISO image:
-
Right-click the VM in the vSphere client and select Edit virtual machine settings.
-
Click Hardware and select CD|DVD Drive 1.
-
Check Connect at power on (Device status panel upper right).
-
Click the Datastore ISO File radio button and then click Browse.
-
Navigate to the data store where you uploaded the file.
-
Select the ISO file and click OK.
Unmount ISO File
Procedure
Step 1 |
Right-click the virtual machine in the vSphere client and select Edit virtual machine settings. |
Step 2 |
Click Hardware and select CD/DVD Drive 1. |
Step 3 |
Select Client Device and click OK. |
Create a Virtual Machine from the OVA
Before you begin
For information on VMs, see the following sections:
Procedure
Step 1 |
Select the host in the vSphere client. |
||||||||||||||||||||||||||||||||||||||
Step 2 |
Right-click the host and select Deploy OVF Template. |
||||||||||||||||||||||||||||||||||||||
Step 3 |
On the Select an OVF template page, browse to the location on your local drive where you stored the OVA. Click Open to select the file. Click Next.
|
||||||||||||||||||||||||||||||||||||||
Step 4 |
On the Select a name and folder page, enter a name for the virtual machine and then choose the location for the virtual machine. The name can contain up to 128 characters. Valid characters are period (.), hyphen (-), underscore (_), and alphanumeric. The first character must be alphanumeric. |
||||||||||||||||||||||||||||||||||||||
Step 5 |
Click Next. |
||||||||||||||||||||||||||||||||||||||
Step 6 |
On the Select a compute resource page, select the destination compute resource. Click Next. |
||||||||||||||||||||||||||||||||||||||
Step 7 |
On the Review details page, verify the OVF template details. |
||||||||||||||||||||||||||||||||||||||
Step 8 |
On the Configuration page, select the applicable configuration from the available list. Click Next.
|
||||||||||||||||||||||||||||||||||||||
Step 9 |
On the Select storage page, ensure that the virtual disk format is Thick provision Lazy Zeroed and then choose a datastore on which you want to deploy the new virtual machine. Click Next. For each datastore, the following tables describe the RAID group, the ESXi Host, and the virtual machines for the Cisco UCS C240 M4SX, Cisco UCS C240 M5SX, and Cisco UCS C240 M6SX servers.
RAID configuration for the Cisco UCS C240 M4SX, Cisco UCS C240 M5SX, and Cisco UCS C240 M6SX
|
||||||||||||||||||||||||||||||||||||||
Step 10 |
On the Select networks page, confirm that the network mapping is correct for the Unfied CCE Rogger and PG: |
||||||||||||||||||||||||||||||||||||||
Step 11 |
On the Ready to complete page, click Finish to create the VM. |
Configure DNS Server
This procedure is for Windows DNS server.
Note |
If the deployment uses host files in addition to DNS, use FQDNs in the host file. Live Data requires FQDNs in order to work properly. |
Note |
If the deployment uses host files in addition to DNS, use FQDNs in the host file. Live Data and single sign-on (SSO) require FQDNs in order to work properly. |
Procedure
Step 1 |
Log in to the DNS server. |
Step 2 |
In Windows, navigate to . This opens the DNS Manager. |
Step 3 |
In the Forward lookup zone, navigate to your deployment's domain name. |
Step 4 |
Right-click the domain name and select New Host (A or AAAA). |
Step 5 |
In the New Host dialog box, enter the computer name and IP address (IPv4) of VOS components. |
Configure Database Drive
Note |
Complete this procedure to create a virtual drive, if the virtual drive was not automatically created in the VM. |
Procedure
Step 1 |
Add a virtual drive as follows: Using Web client: |
Step 2 |
In Windows, navigate to Disk Management. |
Step 3 |
Right-click on the Disk 1 box and select Online. |
Step 4 |
Initialize Disk 1 as follows:
|
Step 5 |
Create a new disk partition as follows: |
Step 6 |
Format the disk. |
Install Antivirus Software
Install one of the supported antivirus software products.
See the Contact Center Enterprise Compatibility Matrix at https://www.cisco.com/c/en/us/support/customer-collaboration/packaged-contact-center-enterprise/products-device-support-tables-list.html for the list of supported products.
Important |
Disable automatic updates. Update antivirus software manually. |
Important |
The firewall component of Symantec Endpoint Protection 12.1, the Network Threat Protection feature, must be disabled. If the feature remains enabled, which is the default, both sides of a duplexed router come up in simplex mode, thus blocking communication between each side of a router. This blocking impacts all deployment types. |
For more information on security guidelines, refer the General Antivirus Guidelines section in the Security Guide for Cisco Unified ICM/Contact Center Enterprise Guide at https://www.cisco.com/c/en/us/support/customer-collaboration/unified-contact-center-enterprise/products-installation-and-configuration-guides-list.html.
To allow required access to installation program files or folders, perform file-blocking exclusions in the antivirus product file-and-folder protection rules. To do this in McAfee VirusScan:
Procedure
Command or Action | Purpose | |
---|---|---|
Step 1 |
Launch the VirusScan console. |
|
Step 2 |
Right-click Access Protection and select Properties. |
|
Step 3 |
In the Anti-virus Standard Protection category, make sure that the rule Prevent IRC communication is unchecked in the Block column. |
For more information about changing settings, see the documentation for your antivirus software. |
Verification of the Downloaded ISO
Perform the following procedure to validate the downloaded ISO signed by Cisco, to ensure that it is authorized.
Procedure
Step 1 |
Install OpenSSL on Microsoft Windows. |
||
Step 2 |
Add the OpenSSL installation path to System variables in the Environment Variables of the system. |
||
Step 3 |
Add the downloaded ISO Image , ISO Image signature file and the Public key.der file in the same folder for the specific product component. |
||
Step 4 |
Launch Command Prompt on the system. |
||
Step 5 |
Run the following CLI (Command Line Interface) command to verify the files: openssl dgst -sha512 -keyform der -verify <PUBLIC key.der> -signature <ISO Image.iso.signature <ISO Image
|