Tuesday, May 12, 2009


CUMA Pre-Installation
Wednesday, April 08, 2009
1:22 PM
Hardware and Software Requirement
Required hardware:
· A proxy server on MCS 7825 H2 or I2
· An Enterprise server on MCS 7845 H2 or I2.
Firewall ports:
should include
· A Proxy Server with both a client and provisioning port
· A Managed server with client, provisioning, and user portal ports
· An Admin server with an admin portal port.
Active Directory Requirements:
· The AD hostname/IP Address
· Lightweight Directory Access Protocol (LDAP) port
· Admin DN
· Admin password
· Searchbase
Exchange Requirements:
· The Exchange hostname, if it is clustered, and an OWA Bridgehead.
· A WebDAV port
· Exchange Domain
Voicemail:
· Voice-mail system email
CCM Requirements:
· The hostname of the Cisco Unified Communications Manager running the CTI service. If we have more than one CUCM, specify all the hostnames as a comma-separated list with no spaces. CTI services should be running on all the nodes.
· Username and Password - Up to 4 sets of usernames and passwords for CUCM users.
· Version of the call manager.
Adding a User for AD access
Wednesday, April 08, 2009
2:44 PM
Adding a User for AD access:
· Cisco Unified Mobility Advantage requires an Active Directory user account to read out user objects. This account needs read-only access to all LDAP objects and attributes required by Cisco Unified Mobility Advantage. Default users have read-write privileges in Active Directory. Read-only configuration can be done on a per-domain basis in Active Directory. The account needs read-only access to all user accounts that are part of the Cisco Unified Communications solution. The account is used to authenticate against a Domain Controller for LDAP access to Active Directory.
· In order to add a new user within Cisco Unified Mobility Advantage Active Directory, first open Active Directory Users and Computers.
· Then, click the Add New User icon. Enter all credentials required of the new user.


· Next, create a password. As this is a service account, the password should be complex, but set to never expire.
· If necessary, a Group Policy Object (GPO) can be created to deny this account interactive logon. Note that an Exchange Mailbox is not required for this account.
· The option exists to set Active Directory users and computers to show advanced features. To set this option, choose View > Advanced Features from the drop-down menu.
· To open the Domain Security Settings within the Active Directory, right-click the domain in the left menu and choose Properties. Then choose the Security tab in the Properties window. This tab is visible only with Advanced Features enabled. The dialog allows you the Access Control List (ACL) of the different Users and Security Groups to the selected part or parts below the Active Directory Tree. In this case, the selected part is the domain. When a user account is created, it will receive default settings and inherit additional settings for Security Groups to which it belongs. The Cisco Unified Mobility Advantage user will now be added to the ACL by clicking Add.
· The Cisco Unified Mobility Advantage user will now be added to the ACL by clicking Add. Then, enter the name of the user to add it to the list.
· Still within the Security tab, locate and select the user. Set the Deny Write permission. Setting the Deny Write permission at the domain level will propagate this setting to all objects below in the domain tree.
CUMA Architecture
Wednesday, April 08, 2009
2:47 PM
CUCM 6.x/7.x settings
Wednesday, April 08, 2009
2:50 PM
· First, you will need to navigate to the Cisco Unified CallManager Administration page
· go to the User Management tab, and select Application User from the drop-down menu
· From this screen you will be able to either add a set of new users by choosing Add New or edit existing users by selecting individual user names.
· On the End User Configuration screen, you are able to create device association for a maximum of 250 devices. From this screen, you can assign the user to proper groups and assign the right roles.
Corporate Directory Configuration
Wednesday, April 08, 2009
3:12 PM
· The Corporate Directory Server acts as both the repository for corporate contact information and the authenticating authority for user sessions. This part handles the preparation for the integration into Microsoft Active Directory.
· Within the Corporate Directory Configuration screen, select and enter the Corporate Directory Server information. Corporate Directory Type is the type of corporate directory that is used by your organization; such as Active Directory. Adapter Name is the name you want to assign to the corporate directory adapter. This name is for the internal handling only. The third entry, Description, is the description of the corporate directory adapter. After entering all necessary information, click Next to proceed with the configuration.
BASIC PARAMETERS:
· First, enter the IP Host Name or IP Address from the Microsoft AD server. Click Next.
· Then, the distinguished name of the root node needs to be entered in your Corporate Directory Server. The Cisco Unified Mobility Advantage server makes an auto discovery for Base Distinguished Name (Base DN). Select one from the list, or click Edit if yours does not appear. Note that there is only one Base DN possible, so be sure you will get all objects needed with the Base DN you selected. Click Next to proceed with the configuration.
· After the Base DN has been entered, the Cisco Unified Mobility Advantage server shows a default entry in Filter Criteria. The Filter Criteria data will be used to distinguish corporate users from other corporate resources within the Corporate Directory Server. In most cases, it is recommended that the default value is used.
· Follow Referral gives the option of having the Cisco Unified Mobility Enterprise Server follow referrals from the Corporate Directory Server or not. The default is True. Polling Period defines how frequently the Cisco Unified Mobility Advantage Enterprise Server polls the Corporate Directory Server for updates. After completing all necessary sections, click Next to continue.
· For access to the Microsoft AD, an account needs to be entered. Enter the User DN of the account that the Cisco Unified Mobility Advantage server uses to read data from your Corporate Directory Server. This account needs to have read-only permissions in your Corporate Directory Server. Select the Append Base DN check box to allow the Cisco Unified Mobility Advantage Enterprise Server to append the base DN to the user's DN, rather than giving the complete DN of the user above. The default is checked, which is recommended. Enter the password, and click Next to proceed with the configuration.
MAPPING:
· The Mapping configuration screen surrounds the default mapping of the attribute to the Microsoft AD. In most cases, the defaults should be used. However, if different attributes are defined in your AD, then these fields need to be adjusted accordingly. Click Edit to make any necessary changes. After doing so, click Next to continue.
EXCHANGE LOOKUP:
· The Exchange Lookup information is used by the Cisco Unified Mobility Advantage Enterprise Server to auto discover a user's Microsoft Exchange server. In most cases, the default values should be used. However, if necessary, click Edit to make any changes. Click Next to finish the configuration for the AD connection.
Communication Ports
Wednesday, April 08, 2009
3:36 PM
Managed Server Ports:
o User Portal Port
· Port used by the end user to access CUCM user portal
· Default is 8443
o Provisioning port
· Port used for over-the-air downloads of Cisco unified mobile communicator
· Default is 8080
o Naming port
· Internal communication port used by CUMA managed server
· Default is 1199
o RMI port
· Internal communication port used by the CUMA managed server
· Default is 1198
o RMI object port
· Internal communication port used by the CUMA managed server
· Default is 4444
o Server bind port
· Internal communication port used by the CUMA managed server
· Default is 4445
o Non SSL client port
· Internal communication port used by the CUMA managed server
· Default is 5555
o SSL client port
· Port that client connect to for secure communication
· Default is 5443
o Inter-server SSL client port
· Port used by the CUMA managed server to server-to-server communication
· Default is 6443
o Managed server SSL client port
· Port that the proxy server connects to for secure client communications.
· Default is 5443
o Managed server provisioning port
· Port that is used for over-the-air downloads of Cisco unified mobile communicator.
· Default is 8080
Admin Server Ports:
o Admin portal port
· Port used by a system administrator to access the CUMA Admin portal.
· Port is used by the server to obtain configuration information from the Admin server.
· Default is 7080
· Only http and not https
o Naming port
· Internal communication port used by the CUMA admin server.
· Default is 7099
o RMI port
· Internal communication port used by the CUMA Admin server
· Default is 7098
o RMI object port
· Internal communication port used by the CUMA Admin server.
· Default is 7444
o Server bind port
· Internal communication port used by the CUMA Admin server.
· Default is 7445
Node Manager Server Ports:
o HTTP port
· Internal communication port used by the Node manager server
· Default is 3080
o Naming port
· Internal communication port used by the CUMA Node manager server
· Default is 3099
o RMI port
· Internal communication port used by the CUMA Node manager server
· Default is 3098
o Server bind port
· Internal communication port used by the CUMA Node manager server
· Default is 3445
Proxy Server Ports:
o Admin server HTTP port
· Port used by a system administrator to access the CUMA Admin portal
· This must be the same as Admin portal port setting.
o Naming port
· Internal communication port used by the CUMA proxy server
· Default is 5099
o RMI port
· Internal communication port used by the CUMA Proxy server
· Default is 5098
o RMI Object port
· Internal communication port used by the CUMA Proxy server
· Default is 5444
o Server bind port
· Internal communication port used by the CUMA Proxy server
· Default is 5445
o Proxy server client port
· Port that is used to secure client-server communication
· Default is 5443
o Proxy server provisioning port
· Port that is used for over-the-air downloads of Cisco unified Mobile Communicator
· Default is 8080
Firewall Ports
Wednesday, April 08, 2009
4:09 PM
· The Proxy Server Client Port, with the default value of 5443, and the Proxy Server Provisioning Port, with the default value of 8080, must be opened in the external firewall. The Managed Server SSL Client Port, with a default value of 5443, the Managed Server Provisioning Port, with the default value of 8080, and the Admin Portal port, with a default value of 7080, must be opened in the internal firewall.
CUMA Enterprise Server Installation
Wednesday, April 08, 2009
4:15 PM
· Boot from the OS DVD.
· During the installation, the system might reboot up to 3 times( each for Hard drive, Raid and BIOS..if required).
· You will need to enter the following information in the course of installation:
o DNS ( if available)
o HOSTNAME
o IP ADDRESS
o GATEWAY
o AUTO NEGOTIATION-use default value
o SPEED-use default value
· When the system displays the Cisco Application DVD page, you will need to insert the Cisco Unified Mobility Advantage application DVD. Click install and wait for the Installation Wizard to start. This process may take several minutes.
· When the Installation Wizard begins, review the information on the Important screen. Click Next and the license agreement screen appears. You will then review the license information and click I accept the Terms of the License Agreement. Click Next and the Choose Install Set screen appears. You will choose Cisco Unified Mobility Advantage as the type of installation, and click Next.
· the Choose Install Folder screen appears. You will enter or select the location where the Cisco Unified Mobility Advantage Enterprise Server will reside. The default installation path is /opt/Cuma. Now you will click Next.
· The Managed Server Instance Name screen appears. You will enter the name that you want to assign to this instance of the Managed Server, and then click Next.
· The Managed Server Configuration screen appears now. You will enter the values for the Managed Server ports. The default values are shown in parentheses. Use these values or the values you determined during preinstallation tasks. When you have entered all the information, click Next, and the Admin Portal Configuration screen appears. You will enter values for the Admin Server ports and then click Next
· Now the Admin Portal Password screen appears. You will need to enter a password for logging into the Cisco Unified Mobility Advantage Admin Portal. By default, the username is admin and cannot be changed. When you click Next, the Node Manager Server Configuration screen appears. You will enter the values for the Node Manager Server ports, and then click Next.
· When you are complete, the Preinstallation Summary screen appears. You will need to review all of the information on the summary screen and make sure all of it is correct
· The Cisco Unified Mobility Advantage Enterprise Server will install now. When this process is finished, the Install Complete screen appears. You will click Done and then Reboot to restart the server. After rebooting, the Admin Server and Node Manager Server start automatically.
· After installing the Cisco Unified Mobility Advantage Enterprise Server, verify that the Admin server and the Node Manager Server are started, as described here.
o Admin Server:
· Step 1: log into the system that is hosting the Admin server.
· Step 2: open a new terminal.
· Step 3: enter this command in the terminal window:
§ /sbin/service cuma_admin status
The staus message should rea : "Cuma_admin is running". If there service is not running you will have to issue the following command to start the service:
§ /sbin/service Cuma_admin start
The admin server starts when the "OK" message appears.
o Node Manager Server:
· Step 1: log into the system that is hosting the Admin server.
· Step 2: open a new terminal.
· Step 3: enter this command in the terminal window:
§ /sbin/service cuma_nm status
The staus message should rea : "Cuma_nm is running". If there service is not running you will have to issue the following command to start the service:
§ /sbin/service Cuma_nm start
The admin server starts when the "OK" message appears.
CUMA Proxy Server Installation
Wednesday, April 08, 2009
6:31 PM
· Basic installation is all the same. Like all bios, raid check etc, network time, root password etc…
· Before installing the Proxy Server Application, the administrator must first complete initial configuration of the Cisco Unified Mobility Advantage Enterprise server and get the necessary certificates.
The procedure for installing the Cisco Unified Mobility Advantage Operating system on the server that is going to host the Cisco Unified Mobility Advantage Proxy Server can begin when the system displays the Cisco Application DVD page. You will need to copy the proxy certificate file to the root directory on the system using SSH file transfer protocol (SFTP). To copy the certificate file using SFTP, you will use root as the User and the password you assigned to the SSL Certificate file.
After copying the certificate file, insert the Cisco Unified Mobility Advantage application DVD as prompted by the Cisco Application DVD page and click Install. The Installation Wizard will start.
· When the Installation Wizard begins, review the information on the Important screen. Click Next and the License Agreement screen appears. Review the license information and click I accept the Terms of the License Agreement, and click Next.
· The Choose Install Set screen appears. Choose Cisco Unified Mobility Advantage Proxy as the type of installation, and click Next.
· The Choose Install Folder screen appears. Enter or select the location where the Proxy server software will reside, and click Next. The SSL Certificate and Password screen appears. Click Choose and locate the Proxy Server SSL Certificate file you copied to the Proxy Server previously. Enter the password associated with the certificate file, and click Next.
· The Admin Server Information screen appears.
· You will enter the information required for the Proxy server to communicate with the Admin server. For the Admin Server Host, you will enter the Admin Server host name or IP address and for the Admin Server Portal Port, you will enter the Admin Server http port that was specified during the Admin Server installation. Now click Next. The Proxy Server Configuration screen appears. You will enter the values for the Proxy Server ports, or click Next to accept the default values.
· The Pre-Installation Summary screen appears.
· Review the information in the summary screen and make sure all of the information is correct. If all of the information is correct, click Install. If any changes are required, click Previous and make the changes.
· The Proxy Server installs and when it is complete, the Important Information screen appears. Click Next and the Proxy server is installed.
· In order to verify that the Proxy Server is started, you will need to follow these steps.
§ Step 1: log into the system that is hosting the Admin server.
§ Step 2: open a new terminal.
§ Step 3: enter this command in the terminal window:
· /sbin/service cuma_proxy status
The staus message should rea : "Cuma_proxy is running". If there service is not running you will have to issue the following command to start the service:
· /sbin/service Cuma_proxy start
The admin server starts when the "OK" message appears.
Deploying CUMA
Wednesday, April 08, 2009
11:56 PM
CUMA Initial Configurations
Thursday, April 09, 2009
8:26 AM
· Log in to the CUMA admin portal by using the following URL:
· The Configuration Wizard prompts you through the steps required to configure Cisco Unified Mobility Advantage for your system. To run the Configuration Wizard, click Next on the Welcome screen.
SSL Certificate Management
Thursday, April 09, 2009
12:35 AM
· The SSL Certificate Management screen appears.
· The SSL Certificate Management screens prompt you through the steps required to create an SSL certificate and is completed in two parts.
· Part One, Create a New Certificate, is completed during the Configuration Wizard. You must complete Part One for the Proxy Server and again for the Enterprise Server.
· Part Two, Request the Signed SSL Certificate, is completed after the Configuration Wizard. You must complete Part Two for the Proxy server.
· If you choose to generate a signed certificate for the Enterprise server, you must complete Part Two for the Enterprise server as well.
· In order to generate a Certificate Signing Request (CSR) and create a self-signed certificate, you have two options. If this is a new installation, you can click Yes and follow the steps for creating a new certificate. You must complete these steps for the Proxy Server first and again for the Enterprise Server. If you have already completed the steps for the Proxy Server and again for the Enterprise Server, click No and follow the steps for uploading the certificate.
· If you clicked Yes on the SSL Certificate Management screen, then the Generate Certificate Signing Request screen will appear. You will need to enter the following information for the Proxy server first:
· server name,
· department name,
· company name,
· city,
· state,
· country code, and
· password.
Click Next
· when the following screen appears, click the link to download the self-signed certificate.
You will name the certificate proxy.example.selfsigned.keystore for the Proxy server and example.selfsigned.keystore for the Enterprise server.
· The self-signed certificate downloads to your desktop, so make sure you record the location of this file because it is required later in the process, when you import the SSL certificate.
· Now copy the CSR text that is displayed below the download link and paste it into a text file. Save the file and name it proxy.example.csr for the Proxy server or example.csr for the Enterprise server, then click Reset at the top of the page.
· The Configuration Wizard returns to the SSL Certificate Management screen. Click Yes when prompted to create a new certificate and repeat the same steps for the Enterprise server. When you complete the steps, the wizard returns to the SSL Certificate Management screen, prompting you to create a new certificate. Click No.
· In the Upload Certificate screen, browse and locate the example.self-signed.keystore file for the Enterprise server,
· enter the password you assigned to the file when it was generated, and then select the type of certificate file. The default is JavaKeyStore (JKS). You will need to click Next when you are finished entering all the information.
· The SSL Certificate Management Summary screen will appear stating that you have successfully uploaded the SSL Certificate. You will need to click Next again.
Enterprise Configuration: Corporate Directory
Thursday, April 09, 2009
12:36 AM
· The Corporate Directory Server acts as both the repository for corporate contact information and the authenticating authority for user sessions. This part handles the preparation for the integration into Microsoft Active Directory.
· Within the Corporate Directory Configuration screen, select and enter the Corporate Directory Server information. Corporate Directory Type is the type of corporate directory that is used by your organization; such as Active Directory. Adapter Name is the name you want to assign to the corporate directory adapter. This name is for the internal handling only. The third entry, Description, is the description of the corporate directory adapter. After entering all necessary information, click Next to proceed with the configuration.
BASIC PARAMETERS:
· First, enter the IP Host Name or IP Address from the Microsoft AD server. Click Next.
· Then, the distinguished name of the root node needs to be entered in your Corporate Directory Server. The Cisco Unified Mobility Advantage server makes an auto discovery for Base Distinguished Name (Base DN). Select one from the list, or click Edit if yours does not appear. Note that there is only one Base DN possible, so be sure you will get all objects needed with the Base DN you selected. Click Next to proceed with the configuration.
· After the Base DN has been entered, the Cisco Unified Mobility Advantage server shows a default entry in Filter Criteria. The Filter Criteria data will be used to distinguish corporate users from other corporate resources within the Corporate Directory Server. In most cases, it is recommended that the default value is used.
· Follow Referral gives the option of having the Cisco Unified Mobility Enterprise Server follow referrals from the Corporate Directory Server or not. The default is True. Polling Period defines how frequently the Cisco Unified Mobility Advantage Enterprise Server polls the Corporate Directory Server for updates. After completing all necessary sections, click Next to continue.
· For access to the Microsoft AD, an account needs to be entered. Enter the User DN of the account that the Cisco Unified Mobility Advantage server uses to read data from your Corporate Directory Server. This account needs to have read-only permissions in your Corporate Directory Server. Select the Append Base DN check box to allow the Cisco Unified Mobility Advantage Enterprise Server to append the base DN to the user's DN, rather than giving the complete DN of the user above. The default is checked, which is recommended. Enter the password, and click Next to proceed with the configuration.
MAPPING:
· You will review the mapping attribute information, such as distinguished name, first name, last name, and e-mail. It is recommended that you use the default settings. Click Edit to make any changes, or click Next to proceed with the default settings
EXCHANGE LOOKUP:
· Review the lookup information, including contact adapter, DNS host name, contact adapter DN mask, and contact adapter search base.
· Now the Corporate Directory Configuration Summary screen appears. Review the information and click Reset to change any setting. If there are no changes, then click Next.
Enterprise Configuration: Personal Contact Server
Thursday, April 09, 2009
12:48 AM
· You will need to complete several steps in order to configure the personal contact server. First, you will enter the personal contact server information, which includes
o the personal contact server type,
o adapter name, and
o Description
· click Next and you will be prompted to enter the exchange server information. Next you will enter the port, exchange domain, and user name suffix information and click Next
· Now you need to enter the voice-mail configuration information. These values apply to systems that want to integrate Cisco Unified Mobility Advantage with their voice-mail system.
· Now, you will need to select whether or not you want to enable the voice-mail server and click Next
· You will choose whether or not you want to integrate Cisco Unified Mobility Advantage with your corporate conferencing system to provide conference notifications and viewing capabilities on Cisco Unified Mobile Communicator.
· Now, the Personal Contact Server Configuration Summary screen appears.
· Within the Call Control Configuration screen of the Cisco Unified Mobility Advantage Admin Portal, there is the option of configuring a Call Control Adapter. If you so desire, choose Yes, and then click Next.
· The next section of the Call Control Configuration page asks for the Call Control Server Type, the Adapter Name, and the Description. After accurately completing those sections, click Next.
· After choosing Next, you are required to enter the CallManager host name or IP address, as well as a user name and password and CallManager Version. The host name should be the Cisco Unified Communications Manager running the CTI service. You can enter up to four user name and password combinations, each with up to 250 associated devices. After filling in the required information, click Next to continue.
· The next section of the Call Control Configuration screen asks for several fields regarding the dial plan settings of the Cisco Unified Communications Manager. After completing each section, click Next to continue.
· This section within the Call Control Configuration screen gives the option of enabling corporate PBX integration. You must also enter the Maximum Expiry of Call Logs (days). Click Next to continue.
· The final page within the Call Control Configuration section gives an overall summary of the elements that have just been entered. This includes the Call Manager Server Configuration section, the Dial Plan Configuration section, as well as the Call Control Service section. To reconfigure any settings, click Reset. To move on throughout the Cisco Unified Mobility Advantage Admin Portal, click Next.
· Within the Enterprise Configuration Summary page, view the configuration summaries for each server, by clicking its respective host name or IP address. Click Next to continue with the configuration.
· The System Configuration screen allows you to determine the Cisco Unified Mobility Advantage Enterprise server domain information and SMTP server information. The SMTP Server must allow relaying from the Cisco Unified Mobility Advantage server. The Cisco Unified Mobility Advantage Enterprise server uses the SMTP server to send out device provisioning and melt€™ messages, which come as an e-mail for BlackBerry devices, and come as an SMS message for Symbian devices. In order to determine system configuration information, you will need to enter some general and SMTP Server configuration data.
· The Server Setup screen allows you to choose to configure the Cisco Unified Mobility Advantage Proxy Server and enter information about the Managed Server. To configure the Proxy Server and then the Managed Server, you need to choose Yes when prompted to configure a Proxy server and click Next.
· On the Proxy Server Configuration screen, you will enter the necessary information for the Proxy server and click Next.
· Enter the information for the Managed server, including the hostname, non-SSL client port, SSL client port, and inter-server SSL port, then click Next.
· Review the information on the Server Setup Summary screen and then click Reset if you need to make changes. If not, then click Next to continue the installation.
· To upload the Cisco Unified Mobile Communicator onto the Cisco Unified Mobility Advantage Enterprise server, first browse or enter the location of the Cisco Unified Mobile Communicator software file and then click Next.
· When the upload is successful, the Handset Platform Management Summary screen appears, displaying the handset platforms and versions of the Cisco Unified Mobile Communicator now installed on your system. If you want to change the settings, click Reset. Click Next if changes are not necessary.
· The Summary screen displays your Cisco Unified Mobility Advantage Enterprise Server setting. You are able to review the configuration summary and have the option of clicking Reset under any area to make changes to that specific area. To complete the configuration, click Finish.
· When you are prompted to start the Managed server, click Yes.
· After the server is started, the Admin Portal main window appears. After completing the configuration and starting the Managed server, you will request a signed SSL certificate from Verisign Corporation. A signed SSL certificate is required for the Proxy server and recommended, but not required, for the Enterprise server.
· To request a certificate, you will need to go to the Verisign web site, www.verisign.com.
· When you request a certificate, you are asked to provide your information.
· Once you have entered that information, you will need to provide a CSR. Use the text contained in the proxy.example.csr file, or the example.csr file you created earlier.
· You will need to wait for an e-mail to arrive from Verisign, which may take anywhere from a few minutes to a few days. This e-mail contains your final certificate and a link to an intermediate certificate.
· When you receive the e-mail from Verisign, click on the link that downloads the intermediate certificate. You will see text that says, Begin Certificate, and ends with, End Certificate. Copy this text, including the begin certificate and end certificate text, and paste it in a text file. You will name the file proxy_intermediate_cert.text for the Proxy server or intermediate_cert.txt for the Enterprise server. At the bottom of the e-mail, locate your Server Subscriber Certificate, copy the text, and paste it in a text file. Name the file, proxy_example.final_cert.txt for the Proxy server or example.final_cert.txt for the Enterprise server.
· To import the signed server subscriber certificate, you will need to log in to the Admin portal. Choose SSL Certificate Management, then Import Certificate. You will need to provide the certificate file, password, intermediate certificate, and certificate information. You will provide the information for either the Proxy server or Enterprise server, based on which signed certificate you are importing. Now, download the signed SSL certificate that is generated on your desktop, and save it in a separate file. You will name the file proxy.example.ca_signed.keystore for the Proxy server or example.ca_signed.keystore for the Enterprise server. This is your final certificate.
· In short, Follow the steps listed here for importing a signed certificate for the Proxy server and Enterprise server.
Deploying CUMC
Thursday, April 09, 2009
8:27 AM
Admin Control Pane - Menu definitions
Thursday, April 09, 2009
8:28 AM
Install CUMC on a phone
Thursday, April 09, 2009
8:56 AM
· Before a system administrator or an end user can install and provision Cisco Unified Mobile Communicator on a phone, the system administrator must do several things.
o First, the end user on the Admin Portal needs to be activated.
o Then, the Cisco Unified Mobile Communicator software needs to be downloaded.
o For BlackBerry end users, a system administrator must take an additional step and add the end users to the Enterprise Server.
· End users must be activated on the CUMA Managed Server before they can install and provision CUMC on their phone.
· Before activating an end user, verify that the end user has an activated e-mail account on the network.
· Also, ensure that BlackBerry end users have been added to the BlackBerry Enterprise Server.
Activate/Deactivate End User
Thursday, April 09, 2009
9:10 AM
Capacity
Thursday, April 09, 2009
9:09 AM
· There are 1,000 Cisco Unified Mobile Communicator users per deployment.
· Deployment includes both Cisco Unified Mobility Advantage Proxy and Cisco Unified Mobility Advantage Enterprise servers.
· For JTAPI call log integration, up to 4 application users are configured within Cisco Unified Communications Manager, each with 250 associated user desk phones per deployment.
Adding a Phone
Thursday, April 09, 2009
9:13 AM
· First, within the user portal of the Cisco Unified Mobile Communicator, click the My Phones icon in the menu on the left. If no phones currently exist, then you will be prompted to click the Add Phone button to add your phone.
· After successfully adding a new phone to the Cisco Unified Mobile Communicator, you should now be able to view its properties under My Phones, with the option to edit, delete, or add an additional phone
Download and Install CUMC
Thursday, April 09, 2009
9:34 AM
Over-the-Air provisioning for symbain
Thursday, April 09, 2009
10:09 AM
Over-the-Air provisioning for Blackberry
Thursday, April 09, 2009
10:38 AM
User Over-the-Air Provisioning for Blackberry
Thursday, April 09, 2009
10:43 AM
Adding Users to the BES
Thursday, April 09, 2009
10:48 AM
Before activating a BlackBerry device user on the Cisco Unified Mobility Advantage Managed Server, the user must be added on the BES first. In order to add end users to the BES, it is necessary to follow five steps.
· First, start the BlackBerry Handheld Manager and click Users.
· Then, locate the end user and click on his or her user name.
· Click the Assign Software Configuration task under Device Management.
· From the Select a Software Configuration dialog box, select the configuration to be associated, and then
· click OK.
Configuring Microsoft Outlook for use with CUMA and BES initial Details
Thursday, April 09, 2009
10:51 AM
There is a specific procedure that describes how to configure Microsoft Outlook to ensure that Cisco Unified Mobility Advantage alerts are sent to a user's BlackBerry device, instead of the user's Junk folder in Outlook.
· Users should continue to check their Junk mailboxes and, if necessary, disable junk-mail blocking during provisioning.
· End users must be provided with the Admin e-mail address in order to indicate within Outlook that e-mails from this address are trusted, and are not junk.
· The admin e-mail address can be viewed under System Management > SMTP Server Configuration.
NOTE:
In order to configure Microsoft Outlook to ensure that Cisco Unified Mobility Advantage alerts are sent to BlackBerry devices instead of Outlook's junk mail folder,
· first open the Tools menu in Outlook and select Options.
· Under Options, choose Preferences.
· This will then allow you to click the Junk e-mail button.
· Choose the Safe Senders tab and click Add.
· Enter the Admin e-mail address, which is found in the Admin Portal under System Management > SMTP Server Configuration, and click OK.
· Finally, click OK again in order to complete the configuration.
Manual provisioning
Thursday, April 09, 2009
10:56 AM
· The first step in manual provisioning of Cisco Unified Mobile Communicator client for Nokia requires logging into the Cisco Unified Mobility Advantage web portal to pre-provision the phone.
· Once pre-provisioned, click the information icon to get the phone registration information that will be needed later on in the provisioning process.
· Next, click the download icon to download the client to the PC.
· You should then install the client application on the phone using the Nokia PC Suite, bluetooth, or infrared port.
· At application launch, select Yes when prompted to manually provision.
· Enter registration information that was obtained earlier.
· Just as in the SMS message within the over-the-air method of provisioning, registration should include the Cisco Unified Mobility Advantage proxy hostname, the user ID, as well as the device ID.
· Finally, once the client connects to the Cisco Unified Mobility Advantage proxy server using the manually entered information, client provisioning is complete.
· Note that at first connection to the proxy server, the user will be prompted for a password in order to access the Cisco Unified Mobility Advantage server. This will be the user's AD password.
Downloading CUMC for symbain OS
Thursday, April 09, 2009
11:00 AM
If the End user manual provisioning process is not working, or if the Administrator would prefer to manually provision End user phones, then Administrative manual provisioning would be preferable.
After end users are activated on the Admin Portal, download the Cisco Unified Mobile Communicator software onto your computer for provisioning purposes. There are three steps to downloading Cisco Unified Mobile Communicator for distribution to Symbian OS phones.
· First, select Handset Platform Management > Version Management.
· Then, click the Download icon next to Symbian to download the Cisco Unified Mobile Communicator .sisx file to your system.
· Finally, transfer the .sisx file to end user's Symbian phones via infrared or Bluetooth.
Mobility Connect Steps
Thursday, April 09, 2009
11:03 AM
· To configure the softkey template, choose Device > Device Settings > Softkey Template. Add the Mobility softkey to the On Hook and Connected Call states.
· Configure the end user by choosing User Management > End User. Enable Mobile Connect for the end user by checking the check box, and also set the maximum number of RDs for that end user.
· This step of Mobile Connect configuration is optional.
o If you wish to implement access lists, you must first configure them by choosing Device > Device Settings > Access List.
o Enter a name and description, and select the owner of the access list. Then specify the type of ACL, whether Allowed or Blocked.
o Click Add Member to perform the initial configuration of an access list member. You can also select an entry from the Access List Members list to change the configuration of an existing member.
o If you decided to configure access lists, you must also apply them to the appropriate RDs. By choosing Device > Remote Destination, you can specify either an Allowed Access List or a Blocked Access List for that destination. Note that if a Blocked Access List is set, all numbers not contained in the access list are allowed, and vice versa.
· Next, configure the IP Phone. Choose Device > Phone. Noting that one line will be shared with the RDP, assign a softkey template and set the Owner User ID.
· To configure the RDP, choose Device > Device Settings > Remote Destination Profile.
o Add the line of the office phone, noting that the screen updates after this addition. Also note that this line is shared with the office phone. The configured Line CSS and partition therefore apply to both the office phone and RDP. The Line CSS and Device CSS are combined, with partitions of the Line CSS considered first.
o The CSS is used for outgoing calls placed with MVA, while the Rerouting Calling Search Space allows for ringing of an RD or RDs when a call is received at the office phone.
· The next step in configuring Mobile Connect is adding an RD or RDs to the RDP.
o Choose Device > Remote Destination.
o Set the number of the destination, and check the Mobile Phone check box to allow active calls to be transferred from the office phone to the RD using the Mobility softkey.
o Checking the Enable Mobile Connect box allows calls placed to office phones to also ring the RD.
o The line or lines of the RDP are shown only after you have set the RDP and clicked Save in the previous step.
o Note that, once saved, the RDP cannot be changed.
o Check the check box to associate an RD with the line or lines of the RDP.
· To configure service parameters, choose System > Service Parameters.
o There are instances when a configured RD number may not match the caller ID of the remote phone. This can occur, for example, because of a PSTN access code or steering digit and long distance code prefix, for example '9 1', in the RD.
o To address this situation, you can change the Matching Caller ID parameter from Complete Match to Partial Match, and then set the number of digits required to match. The Partial match setting will ensure that calls to internal devices are shown with the caller ID of the associated office phone.
Licensing and upgrading
Thursday, April 09, 2009
4:46 PM
Capacity
Thursday, April 09, 2009
4:50 PM
Integration of Voice mail and conferencing
Thursday, April 09, 2009
4:51 PM
· Basic settings

No comments:

Post a Comment