Cisco Expressway Series Guide

Add to my manuals
130 Pages

advertisement

Cisco Expressway Series Guide | Manualzz

Mobile and Remote Access Through Cisco Expressway Deployment

Guide (X14.0.1)

First Published: 2021-06-04

Americas Headquarters

Cisco Systems, Inc.

170 West Tasman Drive

San Jose, CA 95134-1706

USA http://www.cisco.com

Tel: 408 526-4000

800 553-NETS (6387)

Fax: 408 527-0883

© 2021 Cisco Systems, Inc. All rights reserved.

C O N T E N T S

C H A P T E R 1

C H A P T E R 2

MRA Overview 1

About Mobile and Remote Access 1

Core Components 2

Protocol Summary 3

Jabber Client Connectivity Without VPN 3

Deployment Scenarios 4

MRA with Standalone Network Elements 5

MRA with Clustered Network 5

MRA with Multiple Clustered Networks 6

Unsupported Deployments 7

Unsupported Expressway Combinations 10

Capacity Information 10

MRA Requirements and Prerequisites 11

Mobile and Remote Access Ports 11

Network Infrastructure Requirements 11

IP Addresses 11

Network Domain 11

DNS 12

SRV Records 13

Public DNS (External Domains) 13

Local DNS (Internal Domains) 13

Firewall Configuration 14

Bandwidth Restrictions 15

Unified Communications Requirements 15

Product Versions 15

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1) iii

Contents

C H A P T E R 3

Unified CM Requirements 16

IM and Presence Service Requirements 17

Certificate Requirements 17

Endpoint Requirements 20

MRA-Compatible Clients 20

MRA-Compatible Endpoints 21

EX, MX, and SX Series Endpoints (Running TC Software) 23

Considerations for Android-based DX650, DX80, and DX70 Devices and Supported IP Phone

7800 and 8800 models 23

Which MRA Features are Supported 23

Limitations and Feature Support 24

UC Feature Support and Limitations 24

Unsupported Expressway Features and Limitations 26

Partial Support for Cisco Jabber SDK 27

MRA Configuration 29

MRA Configuration Overview 29

MRA Configuration Task Flow 29

Set Expressway Server Address 30

Enable SIP 31

Configure Automated Intrusion Protection 31

Enable Mobile and Remote Access 32

Add Domains 32

Add Unified CM Cluster 33

Automatically Generated Zones and Search Rules 34

Add IM and Presence Service Clusters 35

Add Cisco Unity Connection Clusters 35

Configure MRA Access Control 36

Expressway (Expressway-C) Settings for Access Control 37

SAML SSO Authentication Over the Edge 40

About Simple OAuth Token Authorization 41

About Self-Describing OAuth Token Authorization with Refresh 41

OAuth Token Prerequisites 42

Configure OAuth on UC Applications 44

iv

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Contents

C H A P T E R 4

C H A P T E R 5

Configure SIP OAuth Mode 44

SAML SSO Configuration 45

Export the SAML Metadata from the Expressway-C 46

Import the SAML Metadata from the IdP 47

Associate Domains with an IdP 48

Configure ADFS for SAML SSO 48

Configure Secure Traversal Zone 49

Secure Communications Configuration 51

Media Encryption 51

ICE Media Path Optimization 53

ICE Media Path Optimization 53

Signaling Path Encryption Between Expressway-C and Unified CM 55

Supported Components 56

Prerequisites for ICE Media Path Optimization 57

ICE Media Path Optimization Task Flow 58

Configure ICE Settings 59

Install Server Certificates 60

Change CEtcp Neighbor Zones to CEtls Neighbor Zones 60

Set Up the UC Traversal Zone for ICE Passthrough Support 61

Set Up the UC Neighbor Zone for ICE Passthrough Support 61

Use CLI to Configure ICE Passthrough on Cisco Expressway Zones 62

Set Up Cisco Expressway-E as TURN Server 62

ICE Passthrough Metrics Use 63

View ICE Passthrough Metrics in Expressway-C 63

Metric Collection with the collectd Daemon 65

View Call Types in the Call History 65

Bandwidth Manipulation 66

Features and Additional Configurations 67

Deployment Partitions 67

Assign Deployment Partitions for UC Services 68

Push Notifications over MRA 69

Configure Push Notifications for MRA 70

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1) v

Contents

C H A P T E R 6

C H A P T E R 7

Fast Path Registration 71

Configure Fast Path Registration 72

Enable SIP Path Headers 72

SIP Trunks Between Unified CM and Expressway-C 73

Configure SIP Ports for Trunk Connections 73

BiB Recording over MRA 74

HTTP Allow List 75

Edit the HTTP Allow List 77

Upload Rules to the HTTP Allow List 78

Dial via Office Reverse over MRA 79

Configure Dial via Office-Reverse over MRA 81

Multi-cluster Best Practices 81

Multidomain Best Practices 83

Multidomain Configuration Summary 86

Session Persistency 88

Onboarding MRA Devices 89

MRA Device Onboarding via Activation Codes 89

MRA Onboarding Process Flow 90

Device Onboarding Prerequisites 91

MRA Device Onboarding Configuration Flow 92

Activate Phones 95

Additional Options for Secure Onboarding 95

MRA Maintenance 97

Maintenance Mode on the Expressway 97

MRA Registration Counts 98

Authorization Rate Control 98

Credential Caching 99

SIP Registration Failover for Cisco Jabber 99

Clustered Expressway Systems and Failover Considerations 101

Expressway Automated Intrusion Protection 102

Configure Exemptions 102

Check the Unified Communications Services Status 103

vi

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Contents

C H A P T E R 8

Why You Need to Refresh the Discovered Nodes?

103

Refresh Servers on the Expressway-C 104

MRA Troubleshooting 105

General Techniques 105

Alarms and Status Messages 105

Use the Collaboration Solutions Analyzer 105

Diagnostic Logs 106

Jabber for Windows Diagnostic Logs 106

Configure Cisco Expressway Diagnostic Log Levels 106

Create a Diagnostic Log Capture 106

After You Create Logs 107

Check DNS Records 107

Check that the Cisco Expressway-E is Reachable 107

Check Call Status 108

Mobile and Remote Access Call Identification 108

Rich Media Sessions (Cisco Expressway Only) 109

Devices Registered to Unified CM via Cisco Expressway 109

Identify Devices in Unified CM 109

Identify Provisioning Sessions in Cisco Expressway-C 109

Ensure that Cisco Expressway-C is Synchronized to Unified CM 109

Check MRA Authentication Status and Tokens 110

Registration Issues 110

Endpoints Can't Register to Unified CM 110

Cisco Expressway Certificate and TLS Connectivity Issues 111

CiscoSSL 5.4.3 Rejects Diffie-Hellman Keys with Fewer than 1024 Bits 111

Cisco Jabber Sign In Issues 111

Jabber Triggers Automated Intrusion Protection 111

Jabber Popup Warns About Invalid Certificate When Connecting from Outside the Network 112

Jabber Doesn't Register for Phone Services 113

Jabber Cannot Sign in Due to XMPP Bind Failure 113

Jabber Cannot Sign in Due to SSH Tunnels Failure 113

Jabber Cannot Sign in When Connecting to Different Peers in a Cluster of Cisco Expressway-Es

113

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1) vii

Contents

P A R T I

C H A P T E R 9

Specific Issues 114

Cisco Expressway Returns “401 Unauthorized” Failure Messages 114

Call Failures due to “407 Proxy Authentication Required” or “500 Internal Server Error” Errors

114

Call Bit Rate is Restricted to 384 kbps or Video Issues when Using BFCP (Presentation Sharing)

114

IM and Presence Service Realm Changes 114

No Voicemail Service (“403 Forbidden” Response) 114

“403 Forbidden” Responses for Any Service Requests 115

Client HTTPS Requests are Dropped by Cisco Expressway 115

Failed: Address is not a IM and Presence Server 115

Invalid SAML Assertions 115

“502 Next Hop Connection Failed” Messages 115

MRA calls fail if the called endpoint is more than 15 hops away from the Expressway-E 116

Appendix 117

HTTP Allow List Formats 119

Allow List Rules File Reference 119

Example List Rules CSV File 120

Allow List Tests File Reference 120

Example List Tests CSV File 121

viii

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

C H A P T E R

1

MRA Overview

About Mobile and Remote Access, on page 1

Deployment Scenarios, on page 4

Unsupported Deployments, on page 7

Capacity Information, on page 10

About Mobile and Remote Access

Cisco Unified Communications Mobile and Remote Access (MRA) is part of the Cisco Collaboration Edge

Architecture. MRA allows endpoints such as Cisco Jabber to have their registration, call control, provisioning, messaging, and presence services provided by Cisco Unified Communications Manager (Unified CM) when the endpoint is outside the enterprise network. The Expressway provides secure firewall traversal and line-side support for Unified CM registrations.

The MRA solution provides the following functions:

• Off-premises access : a consistent experience outside the network for Jabber and EX/MX/SX Series clients

• Security : secure business-to-business communications

• Cloud services : enterprise grade flexibility and scalable solutions providing rich Cisco Webex integration and service provider offerings

• Gateway and interoperability services : media and signaling normalization, and support for nonstandard endpoints

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

1

Core Components

Figure 1: Unified Communications: Mobile and Remote Access

MRA Overview

Note Third-party SIP or H.323 devices can register to the Expressway-C and, if necessary, interoperate with Unified

CM-registered devices over a SIP trunk.

Figure 2: Typical Call Flow - Signaling and Media Paths

Unified CM provides call control for both mobile and on-premise endpoints. Signaling traverses, the Expressway solution between the mobile endpoint and Unified CM. Media traverses the Expressway solution, which relays the media between the endpoints directly. All media is encrypted between the Expressway-C and the mobile endpoint.

Core Components

Any MRA solution requires Expressway and Unified CM, with MRA-compatible soft clients and/or fixed endpoints. The solution can optionally include the IM and Presence Service and Unity Connection. This guide assumes that you have already set up the following:

2

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Overview

Protocol Summary

• A basic Expressway-C and Expressway-E configuration, as specified in the Expressway Basic

Configuration Deployment Guide (The document describes the networking options for deploying

Expressway-E in the DMZ.)

• Unified CM and IM and Presence Service are configured as specified in the configuration and management guides for your version, at Cisco Unified Communications Manager Configuration Guides .

• If used, IM and Presence Service and/or Unity Connection are similarly configured as specified in the relevant Cisco Unified Communications Manager Configuration Guides .

Protocol Summary

The following table lists the protocols and associated services used in the Unified Communications solution.

Table 1: Protocols and Associated Services

Protocol

SIP

HTTPS

Media

XMPP

Security

TLS

TLS

SRTP

TLS

Figure 3: Protocol Workload Summary

Services

Session establishment – Register, Invite etc.

Logon, provisioning, configuration, directory, Visual Voicemail

Media - audio, video, content sharing

Instant Messaging, Presence, Federation

Jabber Client Connectivity Without VPN

The MRA solution supports a hybrid on-premises and cloud-based service model, providing a consistent experience inside and outside the enterprise. MRA provides a secure connection for Jabber application traffic and other devices with the required capabilities to communicate without having to connect to the corporate network over a VPN. It is a device and operating system agnostic solution for Cisco Jabber clients on Windows,

Mac, iOS and Android platforms.

MRA allows Jabber clients that are outside the enterprise to do the following:

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

3

MRA Overview

Deployment Scenarios

• Use Instant Messaging and Presence services

• Make voice and video calls

• Search the corporate directory

• Share content

• Launch a web conference

• Access visual voicemail

Note Cisco Jabber Video for TelePresence (Jabber Video) does not work with MRA.

Deployment Scenarios

This section describes the supported deployment environments:

• Single network elements

• Single clustered network elements

• Multiple clustered network elements

• Hybrid deployment

Note The only supported Mobile and Remote Access deployments are based on one-to-one Unified Communications zones between Expressway-C clusters and Expressway-E clusters.

4

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Overview

Figure 4: Supported MRA Traversal Connections

MRA with Standalone Network Elements

MRA with Standalone Network Elements

This scenario includes standalone (non-clustered) Unified CM, IM and Presence Service, Expressway-C, and

Expressway-E servers.

Figure 5: Standalone Network Elements

MRA with Clustered Network

In this scenario, each network element is clustered.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

5

MRA with Multiple Clustered Networks

Figure 6: Single Clustered Network Elements

MRA with Multiple Clustered Networks

In this scenario, there are multiple clusters of each network element.

Figure 7: Multiple Clustered Network Elements

MRA Overview

• Jabber clients can access their own cluster through any route.

• Expressway-C uses round robin to select a node (publisher or subscriber) when routing home cluster discovery requests.

• Each combination of Unified CM and IM and Presence Service clusters must use the same domain.

• Intercluster peering must be set up between the IM and Presence Service clusters, and the Intercluster

Sync Agent (ICSA) must be active.

Multiple Unified CM Clusters

If your MRA deployment includes multiple Unified CM clusters, configure Home Cluster Discovery for

Unified CM. Expressway-C requires this configuration to direct MRA users to the correct home Unified CM cluster. Use either of the following configuration methods:

6

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Overview

Unsupported Deployments

• Configure an Intercluster Lookup Service (ILS) network between your remote Unified CM clusters. ILS cluster discovery finds and connects your remote Unified CM clusters into an intercluster network, populating the Cluster View on each cluster. ILS is the preferred option for larger intercluster networks, and also if you also want to replicate your enterprise dial plan across all Unified CM clusters. However, note that MRA doesn’t require dial plan replication to work.

• Configure each Unified CM cluster with a list of all the remote clusters under the Unified CM Advanced

Features > Cluster View menu. This option does not allow for dial plan replication.

Unsupported Deployments

This topic highlights some deployments that are not supported over MRA.

VPN Links

MRA doesn't support VPN links between the Expressway-C and the Unified CM services / clusters.

Figure 8: VPN Links Unsupported

Traversal Zones Between VCS Series and Expressway Series

MRA doesn't support “Mixed” traversal connections. Even though it's possible to configure traversal zones between Cisco VCS and Cisco Expressway, MRA doesn't support them.

Explicitly, we don't support VCS Control traversal to Expressway-E, nor do we support Expressway-C traversal to VCS Expressway.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

7

Unsupported Deployments

Figure 9: Mixed Traversal Zones

MRA Overview

Unclustered or Many-to-One Traversal Connections

We don't support Unified Communications zones from one Expressway-C cluster to multiple unclustered

Expressway-Es.

We also don't support multiple Unified Communications zones from one Expressway-C cluster to multiple

Expressway-Es or Expressway-E clusters.

8

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Overview

Figure 10: Unclustered or Many-to-One Traversal Connections

Unsupported Deployments

Nested Perimeter Networks

MRA doesn't support chained traversal connections (using multiple Expressway-Es to cross multiple firewalls).

You can't use Expressway-E to give Mobile and Remote Access to endpoints that must traverse a nested perimeter network to call internal endpoints.

Figure 11: Nested Perimeter Networks

Expressway-C in DMZ with Static NAT

We don't support Expressway-C in a DMZ that uses static NAT. Static NAT firewall traversal requires SDP rewriting, which Expressway-C doesn't support—use the Expressway-E instead.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

9

MRA Overview

Unsupported Expressway Combinations

Figure 12: Expressway-C in DMZ with Static NAT

Unsupported Expressway Combinations

The following major Expressway-based deployments don't work together. You can't implement them together on the same Expressway (or traversal pair):

• Mobile and Remote Access

• Microsoft interoperability, using the Expressway-C-based B2BUA

• Jabber Guest services

Capacity Information

For details on MRA registration limits and other capacity information, refer to “Cluster License

Usage and Capacity Guidelines” in Cisco Expressway Administrator Guide . You can find this guide on the Expressway configuration guides page.

10

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

C H A P T E R

2

MRA Requirements and Prerequisites

This chapter contains information on the requirements and prerequisites that your deployment must meet in order to configure and deploy Mobile and Remote Access.

Mobile and Remote Access Ports, on page 11

Network Infrastructure Requirements, on page 11

Unified Communications Requirements, on page 15

Certificate Requirements, on page 17

Endpoint Requirements, on page 20

Limitations and Feature Support, on page 24

Mobile and Remote Access Ports

For MRA port information, go to the Cisco Expressway IP Port Usage Configuration Guide at Cisco

Expressway Series Configuration Guides . The guide describes the ports that you can use between Expressway-C in the internal network, Expressway-E in the DMZ, and the public internet.

Network Infrastructure Requirements

IP Addresses

Assign separate IP addresses to the Expressway-C and the Expressway-E. Do not use a shared address for both elements, as the firewall cannot distinguish between them.

Network Domain

The ideal scenario for MRA is to have a single domain with a split DNS configuration, and this is the recommended approach. This is not always possible, so there are some other approaches to deal with various alternative scenarios.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

11

MRA Requirements and Prerequisites

DNS

DNS

Note The domain to which the calls are routed must match with the MRA domain to which the endpoints were registered. For example, if endpoints are registered with the domain exp.example.com

, the calls must be routed to this domain, and it must not be routed to the domain cluster1.exp.example.com

.

Single Domain with Split DNS - Recommended

A single domain means that you have a common domain ( example.com

) with separate internal and external

DNS servers. This allows DNS names to be resolved differently by clients on different networks depending on DNS configuration, and aligns with basic Jabber service discovery requirements.

Dual Domain without Split DNS

From X12.5, the Cisco Expressway Series supports the case where MRA clients use an external domain to lookup the _collab-edge SRV record, and the _cisco-uds SRV record for that same external domain cannot be resolved by the Expressway-C. This is typically the case when split DNS is not available for the external domain. And prior to X12.5 this required a pinpoint subdomain or some other DNS workaround on the

Expressway-C, to satisfy the client requirements for resolving the _cisco-uds record.

Limitation : This case is not supported for Unified CM nodes identified by IP addresses, only for FQDNs.

This feature also supports a secondary case, for MRA deployments that only allow Jabber access over MRA even if users are working on-premises. In this case only one domain is required and typically the DNS records are publicly resolvable (although this is not required if MRA access is disallowed for users when off premises).

The change in X12.5 means that there is no need to have a _cisco-uds._tcp.<external-domain> DNS SRV record available to Cisco Expressway-C or to the Jabber clients.

Single Domain without Split DNS

Deployments that require Jabber clients to always connect over MRA also benefit from the X12.5 update that no longer requires the Expressway-C to resolve the _cisco-uds DNS SRV record. So administrators only need to configure the _collab-edge DNS SRV record, and Jabber clients using service discovery will only have the option of connecting over MRA.

URL for Cisco Meeting Server Web Proxy and MRA domain cannot be the same

If you use both the CMS Web Proxy service and MRA on the same Expressway, the following configuration items must be assigned different values per service. If you try to use the same value, the service that was configured first will work, but the other one will fail:

• MRA domain(s). The domain(s) configured on Expressway and enabled for Unified CM registration

• CMS Web Proxy URL link. Defined in the Expressway “Guest account client URI” setting on the

Expressway > Configuration > Unified Communications > Cisco Meeting Server page.

12

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Requirements and Prerequisites

SRV Records

Multiple External Domains for Mobile and Remote Access

Cisco Expressway supports Mobile and Remote Access with multiple external domains. With this deployment, you will have more than one external domain where your MRA clients may reside. Expressway-E must be able to connect to all of them. To configure this deployment, do the following:

For Expressway-E:

• On Expressway-E, configure _collab-edge._tls.<domain> and _sips_tcp.<domain> DNS

SRV records for each Edge domain.

• Configure A records that point the Expressway-E hostname to the public IP address of Expressway-E.

For Expressway-C:

• For internal DNS, add A and PTR records that point to Expressway-E FQDN. Add these records to all

Expressway-C nodes.

• Configure the _cisco_uds SRV record for every domain to point to your Unified Communications

Manager clusters.

• On the Domains page of Expressway-C, add each of the internal domains that point to the Unified

Communications Manager cluster.

For more detail, including a configuration checklist that summarizes the domain-specific configuration tasks for multiple domains, see

Multidomain Configuration Summary

.

SRV Records

This section summarizes the public (external) and local (internal) DNS requirements for MRA. For more information, see the Cisco Jabber Planning Guide for your version on the Jabber Install and Upgrade Guides page .

Public DNS (External Domains)

The public, external DNS must be configured with _collab-edge._tls.<domain> SRV records so that endpoints can discover the Expressway-Es to use for Mobile and Remote Access. You also need SIP service records for general deployment (not specifically for MRA).

Table 2: Example: Cluster of 2 Expressway-E Systems

Domain example.com

example.com

example.com

example.com

Service collab-edge collab-edge sips sips

Protocol tls tls tcp tcp

Priority

10

10

10

10

Weight

10

10

10

10

Port

8443

8443

5061

5061

Target host expe1.example.com

expe2.example.com

expe1.example.com

expe2.example.com

Local DNS (Internal Domains)

Although we recommend that the local, internal DNS is configured with _cisco-uds._tcp.<domain> SRV records, from X12.5 this is no longer a requirement .

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

13

MRA Requirements and Prerequisites

Firewall Configuration

Important From version X8.8, if you use the IM and Presence Service over MRA (or any XMPP federation that uses

XCP TLS connections between Expressway-C and Expressway-E), you must create forward and reverse

DNS entries for each Expressway-E system . This is so that Expressway-C systems making TLS connections to them can resolve the Expressway-E FQDNs and validate the Expressway-E certificates. This requirement affects only the internal, LAN-side interface and does not apply to the external IP-side.

Table 3: Example: Local DNS

Domain example.com

example.com

Service Protocol cisco-uds tcp cisco-uds tcp

Priority

10

10

Weight

10

10

Port

8443

8443

Target host cucmserver1.example.com

cucmserver2.example.com

Create internal DNS records, for both forward and reverse lookups, for all Unified Communications nodes used with MRA. This allows Expressway-C to find the nodes when IP addresses or hostnames are used instead of FQDNs.

Ensure that the cisco-uds SRV records are NOT resolvable outside of the internal network, otherwise the

Jabber client will not start MRA negotiation via the Expressway-E.

Firewall Configuration

• Ensure that the relevant ports are configured on your firewalls between your internal network (where the

Expressway-C is located) and the DMZ (where the Expressway-E is located) and between the DMZ and the public internet.

No inbound ports are required to be opened on the internal firewall. The internal firewall must allow the following outbound connections from Expressway-C to Expressway-E: SIP: TCP 7001; Traversal Media:

UDP 2776 to 2777 (or 36000 to 36011 for large VM/appliance); XMPP: TCP 7400; HTTPS (tunneled over SSH between C and E): TCP 2222.

The external firewall must allow the following inbound connections to Expressway: SIP: TCP 5061;

HTTPS: TCP 8443; XMPP: TCP 5222; Media: UDP 36002 to 59999.

For more information, see Cisco Expressway IP Port Usage Configuration Guide , for your version, on the Cisco Expressway Series configuration guides page .

• Do not use a shared address for the Expressway-E and the Expressway-C, as the firewall cannot distinguish between them. If you use static NAT for IP addressing on the Expressway-E, make sure that any NAT operation on the Expressway-C does not resolve to the same traffic IP address. We do not support shared

NAT addresses between Expressway-E and Expressway-C.

• The traversal zone on the Expressway-C points to the Expressway-E through the Peer address field on the traversal zone, which specifies the address of the Expressway-E server.

• For dual NIC deployments, you can specify the Expressway-E address using a FQDN that resolves to the IP address of the internal interface. With split DNS you can optionally use the same FQDN as is available on the public DNS. If you don't use split DNS you must use a different FQDN.

• For single NIC with static NAT (this deployment is NOT recommended), you must specify the

Expressway-E address using a FQDN that resolves to the public IP address. This also means that

14

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Requirements and Prerequisites

Bandwidth Restrictions the external firewall must allow traffic from the Expressway-C to the external FQDN of the

Expressway-E. This is known as NAT reflection, and may not be supported by all types of firewalls.

For more information, see the “Advanced networking deployments” appendix in the Expressway Basic

Configuration (Expressway-C with Expressway-E) Deployment Guide

Bandwidth Restrictions

The Maximum Session Bit Rate for Video Calls on the default region on Cisco Unified Communications

Manager is 384 kbps by default. The Default call bandwidth on Expressway-C is also 384 kbps by default.

These settings may be too low to deliver the expected video quality for MRA-connected devices.

Unified Communications Requirements

Product Versions

The following table provides minimum releases of Cisco UC products in order for MRA to be supported with various features.

Table 4: Product Versions

Product MRA Support Legacy

Authentication

(LDAP)

Legacy

Authentication with SSO

OAuth with

Refresh

X8.1.1

X8.1.1

X8.5.1

X8.10.1

Expressway

Unified CM 10.0

-

IM and

Presence

Service

(optional)

Cisco Unity

Connection

(optional)

10.0

10.0

-

-

Clusterwide

SAML SSO:

11.5(1)

Per node

SSO:

OpenAM:

8.6(2) SAML

SSO: 10.0(1)

-

OAuth

Refresh with

SSO

X8.10.1

SAML SSO:

10.5(1)

11.5(1) SU3 10.5(2)

SAML SSO:

10.5(1)

11.5(1) SU3 10.5(2)

Push

Notifications

X8.10.1

11.5(1) SU3

11.5(1) SU3

NA

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

15

MRA Requirements and Prerequisites

Unified CM Requirements

Unified CM Requirements

The following Cisco Unified Communications Manager configuration requirements exist for deploying Mobile and Remote Access:

Basic MRA Requirements for Unified CM

• IP addressing —Unified CM must be using IPv4 addressing as Expressway does not support IPv6.

• Cisco AXL Web Service —This service must be running on the publisher node.

• Multiple Unified CM clusters —If you have multiple Unified CM clusters, configure Home Cluster

Discovery . End users must have the Home Cluster field assigned in End User Configuration so that

Expressway-C can direct MRA users to the correct Unified CM cluster. Use either of the following configuration methods:

• Option 1: ILS Network—Configure an Intercluster Lookup Service (ILS) network between your remote Unified CM clusters. ILS completes cluster discovery automatically, populating the Cluster

View for each cluster, connecting your clusters into an intercluster network. ILS can also replicate your enterprise dial plan across all Unified CM clusters, although this functionality is not required by MRA. ILS is the recommended approach, particularly for large intercluster networks.

• Option 2: Manual Connections—Configure each Unified CM cluster manually with connections to the other remote clusters. From Cisco Unified CM Administration, choose Advanced Features >

Cluster View and add the remote clusters. Note that this option does not allow for dial plan replication.

• MRA Access Policy —If you have Cisco Jabber clients using OAuth authentication over MRA, make sure that your Jabber users' User Profiles allow Mobile and Remote Access. Check that the following settings exist within the User Profile Configuration of Unified CM:

• The Enable Mobile and Remote Access check box must be checked (the default setting is checked).

• The Jabber Desktop Client Policy and Jabber Mobile Client Policy fields must be set to allow the appropriate Jabber services for your deployment (the default setting is IM & Presence, Voice and Video calls ).

• Push Notifications —If you are deploying Cisco Jabber or Webex on iOS or Android clients over MRA, you must configure Push Notifications and Cisco Cloud Onboarding in Unified Communications Manager.

For configuration details, see the Push Notifications Deployment Guide .

• OAuth —If you are using OAuth on Expressway, you must also enable OAuth Refresh Logins on Cisco

Unified Communications Manager as well. This can be turned on in Cisco Unified CM Administration by setting the OAuth with Refresh Login Flow enterprise parameter to Enabled .

• If you want to deploy SAML SSO for MRA users and clients, you must configure it on Cisco Unified

Communications Manager before you configure it on Expressway.

• For video calling over MRA, it’s recommended that you reconfigure the Maximum Session Bit Rate for Video Calls setting within the Region Configuration as the default value of 384 kbps is not enough for video.

• If Unified Communications Manager and Expressway are in different domains, you must use either IP addresses or FQDNs for the Cisco Unified Communications Manager server address.

16

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Requirements and Prerequisites

IM and Presence Service Requirements

• Denial of Service Thresholds—High volumes of Mobile and Remote Access calls may trigger denial of service thresholds on Unified CM when all calls arrive at Unified CM from the same Expressway-C

(cluster). If necessary, we recommend that you increase the level of the SIP Station TCP Port Throttle

Threshold service parameter to 750 KB/second . You can access the parameter from System > Service

Parameters menu, selecting the Cisco CallManager service.

• For information on certificate requirements, see

Certificate Requirements, on page 17

.

Additional Requirements for ICE Media Path Optimization

Additional requirements exist if you are deploying ICE Media Path Optimization. For details, see

Prerequisites for ICE Media Path Optimization, on page 57 .

IM and Presence Service Requirements

To deploy IM clients over MRA, the following configuration requirements exist for the IM and Presence

Service:

• The Cisco AXL Web Service must be running on the IM and Presence Service database publisher node.

• If you have multiple IM and Presence Service clusters within the same domain, you must configure intercluster peering between the clusters.

• IPv4 addressing must be used as Expressway does not support IPv6 addressing.

• For information on certificate requirements, see

Certificate Requirements, on page 17

.

Certificate Requirements

This topic covers the following certificate requirements for Mobile and Remote Access (MRA):

• Certificate exchange requirements for your UC servers

• Certificate signing request (CSR) requirements for Expressway servers that deploy MRA

Certificate Exchange Requirements

We recommend that you use CA-signed certificates for Mobile and Remote Access.

The following table shows the certificates that each application uses for Mobile and Remote Access along with the certificate upload requirements for those applications. This table assumes that you're using CA-signed certificates for all certificates that MRA uses.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

17

MRA Requirements and Prerequisites

Certificate Requirements

Table 5: Certificate Exchange Requirements (CA-Signed Certificates)

UC application Presents these certificates for

MRA

Exchange Requirements

Unified CM CallManager,

Tomcat

Each Unified CM cluster must trust the Expressway-C certificate. For each cluster, make sure of the following:

• If Mixed mode is enabled —The Expressway-C certificate must be installed to the CallManager-trust store on Unified CM.

• If Mixed mode is disabled —The root CA certificate that signs the

Expressway-C certificate must be installed to the

CallManager-trust store on Unified CM.

IM and Presence

Service cup-xmpp

Tomcat

Each IM and Presence Service cluster must trust the Expressway-C certificate. For each cluster, make sure of the following:

• The root CA certificate that signs the Expressway-C certificate is installed to the cup-xmpp-trust store of the IM and Presence

Service. (CONFIRM THIS)

Expressway-C Expressway-C certificate

(CA-signed)

Expressway-C must trust the certificates presented by each Unified CM and IM and Presence Service cluster. In addition, Expressway-C must trust the Expressway-E certificates. Make sure of the following:

• Expressway-C's trusted CA list must include the root CA certificate that signs the Unified CM and IM and Presence Service certificates for all UC clusters.

• Expressway-C's trusted CA list must include the CA certificate chain (root and intermediate certificates) that signs the

Expressway-E certificate.

• If appropriate, Expressway-C's trusted CA list must include any endpoint certificates.

Expressway-E Expressway-E certificate

(CA-signed)

Expressway-E must trust the Expressway-C certificate. Make sure of the following:

• Expressway-E's trusted CA list must include the CA certificate chain (root and intermediate certificates) that signs the

Expressway-C certificate.

• If appropriate, Expressway-E's trusted CA list must include any endpoint certificates.

Certificate management is simplified if you use the same CA to sign certificates for all applications as it is already installed on each application. However, you may want to limit certificate costs by using a public CA for Expressway-E and an enterprise CA for internal applications.

18

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Requirements and Prerequisites

Certificate Requirements

Note You can also use self-signed certificates for Cisco Unified Communications Manager and the IM and Presence

Service. Then, the certificate requirements will be same as in the above table with one exception. On

Expressway-C, rather than installing the root CA certificate(s) that signs the Unified CM and IM and Presence

Service certificates, install the actual certificates that Unified CM (CallManager, Tomcat) and IM and Presence

Service (cup-xmpp, Tomcat) use for Mobile and Remote Access.

Note For the UC traversal zone between Expressway-C and Expressway-E, it's not sufficient to install the root CA certificate that the other Expressway application uses. You must install the CA certificate chain (root plus intermediate certificates) that the other Expressway application uses.

CSR Requirements for Expressway Servers

The Expressway certificate signing request (CSR) tool prompts for and incorporates the relevant Subject

Alternative Name (SAN) entries as appropriate for the Unified Communications features that are supported on that Expressway.

The following table highlights CSR requirements when generating the Expressway-C and Expressway-E certificates for Mobile and Remote Access.

Table 6: CSR Requirements for Expressway Servers with Mobile and Remote Access

CSR Extension

Subject

Alternative

Names

Expressway-C Requirement Expressway-E Requirement

The Expressway-C list of Subject Alternative

Names must include:

The Expressway-E list of Subject Alternative

Names must include:

• Phone Security Profiles used by MRA endpoints

• Unified CM Registration Domains

• XMPP Federation Domains

• Expressway cluster name (for clustered

Expressways only)

• IM and Presence chat node aliases (for

Federated group chat)

• IM and Presence chat node aliases (for

Federated group chat)

Client

Authentication

The certificate must include the Client

Authentication extension. The system won't let you upload a certificate without this extension.

The certificate must include the Client

Authentication extension. The system won't let you upload a certificate without this extension.

Note Make sure that the CA that signs the request doesn't strip out the client authentication extension.

Note Make sure that the CA that signs the request doesn't strip out the client authentication extension.

Note We recommend that you use DNS format for the chat node aliases when generating the CSRs for both

Expressways.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

19

MRA Requirements and Prerequisites

Endpoint Requirements

Note Expressway-C automatically includes the chat node aliases in the certificate signing request (CSR), providing it has discovered a set of IM and Presence Service servers.

Generating CSRs and Uploading Certificates on Expressway

The following steps describe how to generate CSRs and to upload certificates onto Expressway.

1.

Go to Maintenance > Security > Server to generate a CSR and upload a server certificate to Expressway.

2.

Go to Maintenance > Security > Trusted CA and upload trusted Certificate Authority (CA) certificates to Expressway.

3.

Restart the Expressway for the new trusted CA certificate to take effect.

Note For detailed procedures and information on how to use the Certificate Signing Request tool to generate CSRs for Cisco Expressway certificates, and how to upload and download certificates on Expressway refer to the

Cisco Expressway Certificate Creation and Use Deployment Guide on the Expressway Configuration Guides page.

Endpoint Requirements

MRA-Compatible Clients

Table 7: MRA-Compatible Client Versions

Jabber MRA Support Legacy

Authentication

(LDAP)

Legacy

Authentication with SSO

OAuth with

Refresh

9.7

10.6

11.9

Cisco Jabber for

Windows

Cisco Jabber for iPhone and iPad

Cisco Jabber for

Android

(includes

Chromebook)

9.6.1

9.6

Cisco Jabber for Mac 9.6

-

-

10.6

10.6

10.6

11.9

11.9

11.9

OAuth Refresh with SSO

APNS

11.9

11.9

11.9

NA

11.9

NA

11.9

NA

Jabber clients verify the identity of the Expressway-E they are connecting to by validating its server certificate.

To do this, they must have the certificate authority that was used to sign the Expressway-E's server certificate in their list of trusted CAs.

20

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Requirements and Prerequisites

MRA-Compatible Endpoints

Jabber uses the underlying operating system's certificate mechanism:

• Windows: Certificate Manager

• MAC OS X: Key chain access

• IOS: Trust store

• Android: Location & Security settings

Jabber client configuration details for MRA are provided in the installation and configuration guide for the relevant client:

• Cisco Jabber for Windows

• Cisco Jabber for iPhone and iPad

• Cisco Jabber for Android

• Cisco Jabber for Mac (requires X8.2 or later)

Cisco Webex Clients

Expressway supports calling for MRA-connected Webex clients that are running a compatible software version:

• Cisco Webex for Windows

• Cisco Webex for Mac

• Cisco Webex for iPhone and iPad

• Cisco Webex for Android

MRA-Compatible Endpoints

Table 8: MRA-Compatible Endpoints

Endpoints

Cisco IP Phone 7800 Series

Cisco IP Phone 8800 Series except Cisco Wireless IP Phone 8821 and

8821-EX and Cisco Unified IP Conference Phone 8831

Cisco IP Conference Phone 7832

Cisco IP Conference Phone 8832

Android-based Cisco DX650, DX70, and DX80 devices

Cisco Webex Desk Series endpoints, such as:

• Cisco Webex DX80

• Cisco Webex Desk Pro

MRA Support

11.0(1)

11.0(1)

12.1(1)

12.1(1)

10.2.4(99)

All CE releases supported by the hardware

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

21

MRA Requirements and Prerequisites

MRA-Compatible Endpoints

Endpoints

Cisco Webex Board Series endpoints, such as:

• Cisco Webex Board 55

• Cisco Webex Board 70

• Cisco Webex Board 85s

Cisco Webex Room Series endpoints, such as:

• Cisco Webex Room 55

• Cisco Webex Room 70 G2

• Cisco Webex Room 55 Dual

• Cisco Webex Room 70 Dual G2

• Cisco Webex Room Panorama

• Cisco Webex Room 70 Panorama

• Cisco Webex Room 70D Panorama Upgrade

• Cisco Webex Room Kit

• Cisco Webex Room Kit Pro

• Cisco Webex Room Kit Plus

• Cisco Webex Room Kit Mini

• Cisco WebEx Codec Plus

MRA Support

All CE releases supported by the hardware

All CE releases supported by the hardware

Cisco TelePresence endpoints: SX Series, EX Series, MX Series, Profile

Series, C Series

TC7.1

Cisco TelePresence and Webex endpoints:

• DX70

• DX80

• MX700

• MX800

• MX800 Dual

• SX10

• SX20

• SX80

• MX200 G2

• MX300 G2

CE 8.2

22

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Requirements and Prerequisites

EX, MX, and SX Series Endpoints (Running TC Software)

EX, MX, and SX Series Endpoints (Running TC Software)

Ensure that the provisioning mode is set to Cisco UCM via Expressway .

These devices must verify the identity of the Expressway-E they are connecting to by validating its server certificate. To do this, they must have the certificate authority that was used to sign the Expressway-E's server certificate in their list of trusted CAs.

The devices ship with a list of default CAs which cover the most common providers (including Verisign and

Thawte). If the relevant CA is not included, it must be added (for instructions, see the endpoint administrator guide).

Mutual authentication is optional, and these devices are not required to provide client certificates. If you do want to configure mutual TLS, you cannot use CAPF enrolment to provision the client certificates. Instead, manually apply the certificates to the devices. The client certificates must be signed by an authority that is trusted by the Expressway-E.

Considerations for Android-based DX650, DX80, and DX70 Devices and Supported IP Phone 7800 and 8800 models

If you deploy these devices to register with Cisco Unified Communications Manager through MRA, be aware of the following points. For DX endpoints, these considerations only apply to Android-based devices and do not apply to DX70 or DX80 devices running CE software:

• Trust list : You cannot modify the root CA trust list on Cisco IP Phone 7800 Series and Cisco IP Phone

8800 Series devices. Make sure that the Expressway-E's server certificate is signed by one of the CAs that the devices trust, and that the CA is trusted by the Expressway-C and the Expressway-E.

• Off-hook dialing : The way KPML dialing works between these devices and Unified CM means that you need Cisco Unified Communications Manager 10.5(2)SU2 or later to be able to do off-hook dialing via MRA. You can work around this dependency by using on-hook dialing.

Which MRA Features are Supported

For information about which features are supported over MRA for specific clients and endpoints, refer to the relevant product documentation:

Endpoint Refer to...

Cisco Jabber

Cisco IP Phone 7800

Series

Cisco IP Conference

Phone 7832

Cisco IP Phone 8800

Series

See "Supported Services” in the “Remote Access” chapter of the Planning Guide for Cisco Jabber (for your version).

See “Phone Features Available for Mobile and Remote Access Through

Expressway” in the “Phone Features and Setup” chapter, Cisco IP Phone 7800

Series Administration Guide for Cisco Unified Communications Manager .

See “Phone Features Available for Mobile and Remote Access Through

Expressway” in the “Phone Features and Setup” chapter, Cisco IP Conference

Phone 7832 Administration Guide for Cisco Unified Communications Manager .

See “Phone Features Available for Mobile and Remote Access Through

Expressway” in the “Phone Features and Setup” chapter, Cisco IP Phone 8800

Series Administration Guide for Cisco Unified Communications Manager .

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

23

MRA Requirements and Prerequisites

Limitations and Feature Support

Endpoint

Cisco IP Conference

Phone 8832

Refer to...

See “Phone Features Available for Mobile and Remote Access Through

Expressway” in the “Phone Features and Setup” chapter, Cisco IP Conference

Phone 8832 Administration Guide for Cisco Unified Communications Manager .

Limitations and Feature Support

MRA supports different features in different deployment scenarios, and when different clients and endpoints are used. This section provides information about:

• Key unsupported features for clients and endpoints

• Unsupported Expressway features that don't work in certain MRA situations

UC Feature Support and Limitations

This section lists some key client and endpoint features that we know don't work with MRA-connected devices.

Note Refer to your endpoint or client documentation for more information. The following list isn't exhaustive.

• Multiple IM and Presence clusters with different releases —If you have multiple IM and Presence

Service clusters configured on Cisco Expressway-C, and some of them run pre-11.5 software, MRA endpoints may not be able to use features that require 11.5. The reason is that, using a round robin approach, Cisco Expressway-C may select a cluster on an older software version.

• Expressway-E with dual network interface —In Expressway-E systems that use dual network interfaces,

XCP connections (for IM and Presence Service XMPP traffic) always use the internal interface. XCP connections may fail if the Expressway-E internal interface is on a separate network segment and is used for system management only, and where the Expressway-C traversal zone connects to the Expressway-E external interface.

• Cisco Jabber with E911 —If you deploy Cisco Jabber clients over MRA with the E911NotificationURL feature, configure a static HTML page for the notification. MRA does not support scripts and link tags for the web page.

• Cisco Jabber Directory access —MRA supports Cisco Jabber directory access using the Cisco User

Data Services (UDS). MRA doesn't support other directory access methods for Jabber.

• Unified Contact Center Express feature support —MRA doesn't support some Cisco Unified Contact

Center Express features. For details, refer to the Unified Contact Center Express documentation.

• Endpoint failover behavior :

• 78XX / 88XX series phones registered over MRA and using OAuth token may get de-registered when a CUCM node goes down but, will continue to communicate with another active node. And the phones will re-register after some time.

24

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Requirements and Prerequisites

UC Feature Support and Limitations

Jabber registered over MRA and using OAuth token may get de-registered when a CUCM node goes down and displays a message “Your session is expired. Sign in again to keep using Cisco

Jabber”. You can sign in to your Jabber to continue using the service.

• Cisco Jabber clients support IM and Presence Service and SIP Registration Failover over MRA.

For more information, see

SIP Registration Failover for Cisco Jabber . However, they don't support

any other type of MRA - related redundancy or failover - including Voicemail and User Data Services

(UDS). Clients use a single UDS server only.

If an Expressway-C or Expressway-E node fails, active MRA calls through the failed Expressway node also fail. This behavior applies to all device types, including Jabber clients.

For Unified CM failover over MRA, Cisco IP Phones need clustered Expressway-C and

Expressway-E servers. IP Phones need at least the same number of Expressway-C and Expressway-E servers in the cluster as the number of Unified CMs in the Call Manager group configured on the

IP phone. Note that devices running TC or CE software don't need clustered Expressway servers for Unified CM failover.

• Chat over MRA with OAuth Refresh Logins —Cisco Jabber 12.5 or later is needed if you want chat/messaging services over MRA with OAuth Refresh Authentication (self-describing tokens) and with IM and Presence Service presence redundancy groups. With pre-12.5 Jabber, user login fails in this scenario.

• Call Recording over MRA —Includes the following limitations:

• MRA supports recording tones for Cisco Jabber clients and Webex Unified CM registered applications. Also note that CTI monitoring of Jabber mobile devices requires Unified CM

12.5(1)SU1 or later.

• Silent Monitoring over MRA —The following monitoring features are supported for compatible

MRA-connected endpoints, provided that the deployed UC products are running compatible versions, the Silent Monitoring feature is configured on Cisco Unified Communications Manager, and SIP Path

Headers are enabled on Expressway (as described in

Enable SIP Path Headers, on page 72

):

• Silent Monitoring is supported from X12.6.1.

• Whisper Coaching and Whisper Announcements are supported from X12.6.2.

• Encrypted iX Channel —The Expressway doesn't encrypt the iX protocol on behalf of other entities.

As a result, iX must be encrypted end to end, or unencrypted end to end. When iX is encrypted, the endpoints and conferencing server must handle encryption.

Note For iX to work over MRA, configure the conferencing server with an encrypted trunk to Unified CM and make sure that the endpoints/Jabber are running a suitable, iX-capable software version.

• Certificate Authority Proxy Function (CAPF) over MRA —MRA doesn't support certificate provisioning for remote endpoints. This limitation includes the Certificate Authority Proxy Function

(CAPF). To use CAPF, complete the first-time configuration, including CAPF enrollment, on premises

(inside the firewall). To complete subsequent certificate operations, you must bring the endpoints back on-premises.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

25

MRA Requirements and Prerequisites

Unsupported Expressway Features and Limitations

• Encrypted TFTP —MRA supports encrypted TFTP configuration files over MRA when the CAPF enrollment has already been completed on-premises.

• Session Refresh features —The following session refresh features that rely on the SIP UPDATE method

(RFC 3311) fail over MRA:

• Request to display the security icon on MRA endpoints for end-to-end secure calls

• Request to change the caller ID to display name or number on MRA endpoints

• P2P File Transfer —MRA doesn't support peer-to-peer file transfer when using IM and Presence Service and Jabber.

• Managed File Transfer over MRA —MRA supports Managed File Transfer (MFT) over MRA when using IM and Presence Service 10.5.2 and later (restricted version) and Jabber 10.6 and later clients.

MRA doesn't support MFT with an unrestricted version of IM and Presence Service.

• File Transfer for Jabber —MRA supports file transfer with Cisco Jabber.

• Mobility Feature Support —MRA doesn't support additional Mobility features, including Session

Handoff.

• Hunt Group Support —MRA supports hunt groups (including hunt pilots and hunt lists) when using

Unified CM version 11.5(1)SU5, or any later version that has the relevant change.

• Self-Care Portal Access —MRA doesn't support the Cisco Unified Communications Self Care Portal.

• Key Expansion Module (KEM) Support for Compatible Phones —We have not officially tested and verified support over MRA for the KEM accessory for Cisco IP Phone 8800 Series devices. However, we have observed under lab conditions that KEMs with multiple DNs work satisfactorily over MRA.

This feature is available as a preview feature but is not officially supported. To deploy the feature over

MRA, SIP Path Headers must be enabled on Expressway (as described in

Enable SIP Path Headers, on page 72

). In addition, you need a Unified CM software version that supports path headers (Release

11.5(1)SU4 or later is recommended).

Unsupported Expressway Features and Limitations

• Currently, if one Expressway node in a clustered deployment fails or loses network connectivity for any reason (including if the Unified CM restarts or fails), all active calls going through the affected node will fail. The calls are not handed over to another cluster peer. Bug ID CSCtr39974 refers. This is not an

MRA-specific issue and applies to all call types.

• We don’t support third-party network load balancers between MRA clients and Expressway-E.

• The Expressway cannot be used for Jabber Guest when it's used for Mobile and Remote Access (MRA).

• The Expressway-C used for MRA cannot also be used for Microsoft gateway service. Microsoft gateway service requires a dedicated Expressway-C.

• Maintenance mode is not supported over MRA for endpoints running CE software. The Expressway drops MRA calls from these endpoints when you enable maintenance mode.

• As Expressway only supports IPv4 mode for MRA connections, the IP configuration settings "IPv6 only" or "Both" are not supported. In the case of "Both", as Expressway does not proxy IPv6 MRA traffic from clients, intermittent issues may arise if clients send IPv6 instead of IPv4.

26

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Requirements and Prerequisites

Partial Support for Cisco Jabber SDK

• Endpoint management capability (SNMP, SSH/HTTP access) is not supported.

• Multitple Presence Domains over MRA —This feature is supported from Expressway X12.6.3 with

IM and Presence Service 10.0(x) or later. Compatible clients can be deployed into an infrastructure that has users in more than one domain or in domains with subdomains. We recommend no more than 75 domains in a Unified Communications default deployment.

For XMPP/chat & presence federation through Expressway, the existing requirement that XMPP federation is supported on a single Expressway cluster only still applies.

Note that for Expressway releases prior to X12.6.3, support for multiple presence domains was a preview feature with the following limitations:

• Before X8.5, each Expressway deployment supported only one Presence domain. (Even though IM and Presence Service 10.0 and later supports Multiple Presence Domains.)

• As of X8.5, you can create multiple deployments on the Expressway-C, but this feature is still limited to one domain per deployment.

• As of X8.5.1, a deployment can have Multiple Presence Domains. However, this feature is in preview status only, and we recommend that you do not exceed 50 domains.

• Deployments on Large VM servers are limited to 2500 proxied registrations to Unified CM.

• The Expressway does not support some Cisco Unified Contact Center Express features for contact center agents or other users who connect over MRA. Jabber for Mac and Jabber for Windows cannot provide deskphone control over MRA, because the Expressway pair does not traverse the CTI-QBE protocol.

However, if these Jabber applications, or other CTI applications, can connect to Unified CM CTIManager

(directly or through the VPN) they can provide deskphone control of MRA-connected clients.

• For ICE passthrough calls, if Host and Server-reflexive addresses cannot negotiate successfully, endpoints can utilize relay address of the TURN server to establish optimized media path. However, when

Expressway is used as a TURN server and if static NAT is configured on the Expressway-E, the media cannot be passed using the relay address (CDETS CSCvf85709 refers). In this case, default traversal path is used to traverse the media. That is, the media passes through Expressway-C and Expressway-E.

• The Expressway-E does not support TURN relay over TCP for ICE passthrough calls.

Partial Support for Cisco Jabber SDK

You can use the following supported Cisco Jabber SDK features over MRA:

• Sign in, sign out

• Register phone services

• Make or receive audio/video calls

• Hold and resume, mute/unmute, and call transfer

For more information, see the Getting Started Guide for Cisco Jabber SDK .

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

27

Partial Support for Cisco Jabber SDK

MRA Requirements and Prerequisites

28

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

C H A P T E R

3

MRA Configuration

MRA Configuration Overview, on page 29

MRA Configuration Task Flow, on page 29

Secure Communications Configuration, on page 51

MRA Configuration Overview

This chapter contains configuration tasks that describe how to complete the base configuration that provides

Mobile and Remote Access for compatible endpoints. These procedures can be used for single cluster, multi-cluster, single domain and multi-domain scenarios.

MRA Configuration Task Flow

Complete the following tasks to complete the basic configuration for Mobile and Remote Access.

Before you begin

• Review the MRA Requirements chapter before you configure MRA.

• Make sure that your system has the required certificates to deploy MRA. For details, refer to

Certificate

Requirements, on page 17

Procedure

Step 1

Step 2

Step 3

Command or Action

Set Expressway Server Address, on page 30

Purpose

Set the System host name, domain name, and

NTP source for each Expressway-C and E server.

Enable SIP, on page 31

Make sure that SIP is enabled on both

Expressway-E and Expressway-C.

Configure Automated Intrusion Protection, on page 31

Recommended. Disable Automated Intrusion

Prevention on Expressway-C and enable it on

Expressway-E.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

29

MRA Configuration

Set Expressway Server Address

Step 4

Step 5

Step 6

Step 7

Step 8

Step 9

Step 10

Command or Action

Enable Mobile and Remote Access, on page

32

Purpose

Set the Unified Communications mode to

Mobile and Remote Access.

Add Domains, on page 32

Add Internal UC Clusters:

Add Unified CM Cluster

Add IM and Presence Service Clusters

Add Cisco Unity Connection Clusters

On Expressway-C, add internal UC domains and any other relevant domains, such as edge domains, and Presence domains.

From each Expressway-C cluster, create connections to your internal UC clusters.

Configure MRA Access Control, on page 36

Configure settings for MRA Access Control, including OAuth authentication and SAML

SSO settings.

Configure OAuth on UC Applications, on page

44

Recommended. If your system supports it, configure OAuth authentication.

SAML SSO Configuration, on page 45

Optional. Configure SAML SSO, allowing for common identity between external Jabber clients and users' Unified CM profiles.

Configure Secure Traversal Zone, on page 49

Configure an encrypted UC traversal zone between Expressway-C and Expressway-E.

What to do next

After you complete your basic MRA setup, refer to the following chapters:

ICE Media Path Optimization, on page 53

—ICE is an optional feature that optimizes the media path for

MRA calls. ICE lets MRA-registered endpoints send media to each other directly, such that the media bypasses the WAN and Expressway servers.

Features and Additional Configurations, on page 67

—Refer to this chapter for information on MRA features and optional configurations.

Onboarding MRA Devices, on page 89 —After you have configured your system, device activation

codes provide a secure method to onboard remote MRA devices.

Set Expressway Server Address

Use this procedure to set FQDNs and NTP servers for each of your Cisco Expressway-C and Expressway-E servers.

Note A single Expressway server can have a single host name and domain name, even if you have multiple Edge domains.

30

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Configuration

Enable SIP

Procedure

Step 1

Step 2

Step 3

Step 4

On Cisco Expressway-C, configure server address information: a) Go to System > DNS .

b) Assign the System host name and Domain name for this server.

c) Enter the IP addresses of up to five DNS servers that the Expressway will query when attempting to locate a domain. These fields must use an IP address, not a FQDN.

Note If you are deploying split DNS, Expressway-C points to an internal DNS server while

Expressway-E points to a public DNS server.

Configure NTP settings: a) Go to the System > Time menu and point to a reliable NTP server.

b) Enter the NTP authentication method:

• Disabled—No authentication is used

• Symmetric key—When using this method, you must specify a Key ID, Hash method and Pass phrase.

• Private key—Uses an automatically generated private key.

Repeat this procedure on each server in the Expressway-C cluster.

After configuring Expressway-C, repeat this procedure for each server in the Expressway-E cluster.

Enable SIP

Enable SIP on the Expressway-C and Expressway-E clusters.

Note SIP and H.323 protocols are disabled by default on new installs of X8.9.2 and later versions.

Procedure

Step 1

Step 2

Step 3

Step 4

On the Expressway-C primary peer, go to Configuration > Protocols > SIP .

Set SIP mode to On .

Click Save .

Repeat the procedure on Expressway-E primary peer.

Configure Automated Intrusion Protection

We recommend that you disable Automated Intrusion Protection on Expressway-C and enable the service on

Expressway-E.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

31

MRA Configuration

Enable Mobile and Remote Access

Note If your Expressway-C is newly installed from X8.9 onwards, the automated intrusion protection service is running by default on both Expressway-C and Expressway-E (check this).

Procedure

Step 1

Step 2

On Expressway-C, disable Automated Intrusion Protection: a) Go to System > Administration b) Set Automated protection service to Off .

c) Click Save .

On Expressway-E, enable Automated Intrusion Protection (the service is On by default): a) Go to System > Administration .

b) Set Automated protection service to On .

c) Click Save .

Note If you have multiple MRA users using the same IP address (for example, if you have multiple MRA users behind a NAT with the same public IP address), automated intrusion protection may trigger due to all of the traffic from the same IP address. In this case, configure an exemption on the IP address. For details, see

Configure Exemptions, on page 102 .

Enable Mobile and Remote Access

You must enable Mobile and Remote Access mode on Expressway before you can configure domains and traversal zones.

Procedure

Step 1

Step 2

Step 3

Step 4

On the Expressway-C, go to Configuration > Unified Communications > Configuration .

Set Unified Communications mode to Mobile and Remote Access .

Click Save .

Repeat this procedure on Expressway-E.

Add Domains

On Expressway-C add the domains that your MRA deployment uses. Depending on the complexity of your system, this may be a single enterprise-wide domain or multiple domains, including:

• Enterprise domain

• Internal UC domains (if they are different from the enterprise domain)

32

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Configuration

Add Unified CM Cluster

• Edge domains (if they are different from the other domains)

• Presence domains (if they are different from the other domains)

Procedure

Step 1

Step 2

Step 3

Step 4

Step 5

Step 6

On Expressway-C, go to Configuration > Domains .

Enter the Domain name .

For each of the following services, set the corresponding drop-down to On or Off depending on whether you want to apply that service to this domain.

• SIP registrations and provisioning on Expressway —Expressway acts as a SIP registrar and accepts registration requests for any SIP domain.

• SIP registrations and provisioning on Unified CM —End registration and call control is handled by

Unified CM. Expressway acts as a gateway for UC services.

• IM and Presence Service —The client obtains services from the IM and Presence Service.

• XMPP federation —Enables XMPP federation between this domain and a partner domain.

If you have multiple Deployments configured, assign the deployment to which this domain applies. Note that this field appears only if you have configured multiple Deployments.

Click Save .

Repeat this procedure if you need to add additional domains.

Figure 13: Domains

Add Unified CM Cluster

Use this procedure to create connections from Expressway-C to each Cisco Unified Communications Manager cluster. Each Expressway-C cluster must be able to reach each Unified CM cluster node.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

33

MRA Configuration

Automatically Generated Zones and Search Rules

Procedure

Step 1

Step 2

On the Expressway-C primary peer, go to Configuration > Unified Communications > Unified CM servers .

Click New and add the following details for the publisher node:

• Unified CM publisher address —The server address of the publisher node

• Username —User ID of an account that can access the server.

• Password —Password of the account that can access the server.

• TLS verify mode

• AEM GCM media encryption —Set to On to enable AEM GCM support.

• Deployment —If you have configured multiple Deployments, select the appropriate deployment. This field doesn't appear unless you have configured deployments.

Step 3

Step 4

Step 5

Step 6

Click Add Address to test the connection.

If you have multiple Unified CM clusters, repeat steps 2 and 3 to add publisher nodes for additional Unified

CM clusters to this Expressway-C cluster.

After you added all Unified CM publisher nodes, click Refresh Servers .

Expressway-C discovers and adds the subscriber nodes for each cluster.

If you have multiple Expressway-C clusters, repeat this procedure on other Expressway-C clusters until all

Expressway-C clusters have connections to all Unified CM clusters and nodes.

Automatically Generated Zones and Search Rules

Expressway-C automatically generates non-configurable neighbor zones between itself and each discovered

Unified CM node. A TCP zone is always created, and a TLS zone is created also if the Unified CM node is configured with a Cluster Security Mode ( System > Enterprise Parameters > Security Parameters ) of 1

( Mixed ) (so that it can support devices provisioned with secure profiles). The TLS zone is configured with its TLS verify mode set to On if the Unified CM discovery had TLS verify mode enabled. This means that the Expressway-C will verify the CallManager certificate for subsequent SIP communications. Each zone is created with a name in the format 'CEtcp-<node name>' or 'CEtls-<node name>'.

34

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Configuration

Add IM and Presence Service Clusters

From version X12.5, Expressway automatically generates a neighbor zone named "CEOAuth <Unified CM name>" between itself and each discovered Unified CM node when SIP OAuth Mode is enabled on Unified

CM. For details, see

Configure SIP OAuth Mode, on page 44 .

A non-configurable search rule, following the same naming convention, is also created automatically for each zone. The rules are created with a priority of 45. If the Unified CM node that is targeted by the search rule has a long name, the search rule will use a regex for its address pattern match.

Note that load balancing is managed by Unified CM when it passes routing information back to the registering endpoints.

Add IM and Presence Service Clusters

Use this procedure to create connections from Expressway-C to each IM and Presence Service cluster. Each

Expressway-C cluster must be able to reach each IM and Presence Service cluster node.

Procedure

Step 1

Step 2

On Expressway-C, go to Configuration > Unified Communications > IM and Presence Service nodes .

Click New and add the following details for database publisher node:

• IM and Presence database publisher name —Server address of the database publisher node

• Username —User ID of an account that can access the server.

• Password —Password for the account that can access the server.

• TLS verify mode

• Deployment —If you configured multiple Deployments, select the appropriate deployment.

Note This field doesn't appear unless you have configured deployments.

Step 3

Step 4

Step 5

Step 6

Click Add Address to test the connection.

If you have multiple IM and Presence clusters, repeat steps 2 and 3 to add database publisher nodes for those additional clusters to this Expressway-C cluster.

After you have added all IM and Presence database publisher nodes, click Refresh Servers .

Expressway-C discovers and adds subscriber nodes for each IM and Presence cluster.

If you have multiple Expressway-C clusters, repeat this procedure on other Expressway-C clusters until each

Expressway-C cluster has a connection to each IM and Presence cluster node.

Add Cisco Unity Connection Clusters

Use this procedure to create connections from Expressway-C to each Cisco Unity Connection cluster. Each

Expressway-C cluster must be able to reach each Cisco Unity Connection cluster node.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

35

MRA Configuration

Configure MRA Access Control

Procedure

Step 1

Step 2

On Expressway-C, go to Configuration > Unified Communications > Unity Connection servers .

Click New and add the following details for publisher node:

• Unity Connection publisher name —Server address of the publisher node

• Username —User ID of an account that can access the server.

• Password —Password for the account that can access the server.

• TLS verify mode

• Deployment —If you configured multiple Deployments, select the appropriate deployment.

Note This field doesn't appear unless you have configured deployments.

Step 3

Step 4

Step 5

Step 6

Click Add Address to test the connection.

If you have multiple Unity Connection clusters, repeat steps 2 and 3 to add publisher nodes for those additional clusters to this Expressway-C cluster.

After you have added all Unity Connection clusters to this Expressway-C, click Refresh Servers .

Expressway-C discovers and adds the subscriber nodes for each cluster.

If you have multiple Expressway-C clusters, repeat this procedure on other Expressway-C clusters until each

Expressway-C cluster has a connection to each Unity Connection cluster node.

Configure MRA Access Control

Define how clients must authenticate for Mobile and Remote Access (MRA) requests.

Caution If you are upgrading from X8.9 or earlier, the settings applied after the upgrade are not the same as listed here. R refer instead to the upgrade instructions in the Expressway Release Notes.

Procedure

Step 1

Step 2

On the Expressway-C, go to Configuration > Unified Communications > Configuration > MRA Access

Control .

Configure authentication settings:

• From the Authentication Path field, select if you want to use SAML SSO, LDAP or Local Database authentication to authenticate user credentials.

• Select Authorize by OAuth token to enable OAuth authentication on Expressway. This option is supported with SAML SSO only.

36

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Configuration

Expressway (Expressway-C) Settings for Access Control

Step 3 Configure the additional fields. For additional information about the field settings, see

Expressway

(Expressway-C) Settings for Access Control, on page 37

Expressway (Expressway-C) Settings for Access Control

The following table provides descriptions that appear under MRA Access Control ( Configuration > Unified

Communications > Configuration > MRA Access Control ). You can use this configuration page to configure

OAuth authentication settings and SAML SSO settings for Mobile and Remote Access.

Table 9: Settings for MRA Access Control

Field

Authentication path

Description

Hidden field until MRA is enabled. Defines how MRA authentication is controlled.

• SAML SSO authentication —Clients are authenticated by an external IdP.

• UCM/LDAP basic authentication —Clients are authenticated locally by the Unified

CM against their LDAP credentials.

• SAML SSO and UCM/LDAP —Allows either method.

• None —No authentication is applied. The default until MRA is first enabled. The

“None” option is required (rather than just leaving MRA turned off) because some deployments must turn on MRA to allow functions which are not actually MRA.

(Such as the Web Proxy for Meeting Server, or XMPP Federation.) Only these customers should use “None”.

It is not recommended in other cases.

Authorize by

OAuth token with refresh

Default Setting: None before MRA is turned on. After MRA is turned on, the default is

UCM/LDAP .

This option requires self-describing tokens for authorization. It's our recommended authorization option for all deployments that have the infrastructure to support them.

OAuth is supported by Cisco Jabber and Cisco Webex clients as well as by Cisco IP Phones that onboard using device activation codes in MRA mode.

Important: From X8.10.1, the Expressway fully supports the benefits of self-describing tokens (including token refresh, fast authorization, and access policy support). However, not all of the benefits are actually available throughout the wider solution. Depending on what other products you use (Unified CM, IM and Presence Service, Cisco Unity

Connection) and what versions they are on, not all products fully support all benefits of self-describing tokens.

If you use this option on Expressway, you must also enable OAuth with refresh on the

Unified CMs, and on Cisco Unity Connection if used . The process is summarized below.

Default Setting: On

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

37

MRA Configuration

Expressway (Expressway-C) Settings for Access Control

Field Description

Authorize by

OAuth token

Available if Authentication path is SAML SSO or SAML SSO and UCM/LDAP.

(previously SSO

Mode)

This option requires authentication through the IdP. Currently, only Cisco Jabber and

Cisco Webex clients can use this authorization method, which is not supported by other

MRA endpoints.

Default Setting: Off

Authorize by user credential

Available if Authentication path is UCM/LDAP or SAML SSO and UCM/LDAP.

Clients attempting to perform authentication by user credentials are allowed through MRA.

This includes Jabber, and supported IP phone and TelePresence devices.

Default Setting: Off

Identity providers:

Create or modify

IdPs

Available if Authentication path is SAML SSO or SAML SSO and UCM/LDAP.

For more information, see

Identity Provider Selection, on page 43 .

SAML Metadata Available if Authentication path is SAML SSO or SAML SSO and UCM/LDAP.

Determines how to generate the metadata file for the SAML agreement. The possible modes are:

• Cluster : Generates a single clusterwide SAML metadata file. You must import only this file to IdP for the SAML agreement.

• Peer : Generates the metadata files for each peer in a cluster. You must import each metadata file into IdP for the SAML agreement.

Identity providers:

Export SAML data

Available if Authentication path is SAML SSO or SAML SSO and UCM/LDAP.

For details about working with SAML data, see

SAML SSO Authentication Over the

Edge, on page 40 .

38

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Configuration

Expressway (Expressway-C) Settings for Access Control

Field

Allow Jabber iOS clients to use embedded

Safari

Check for internal authentication availability

Description

The IdP or Unified CM authentication page is displayed in an embedded web browser

(not the Safari browser) on iOS devices by default. That default browser is unable to access the iOS trust store, and so cannot use any certificates deployed to the devices.

This setting optionally allows Jabber on iOS devices to use the native Safari browser.

Because the Safari browser is able to access the device trust store, you can now enable password-less authentication or two-factor authentication in your OAuth deployment.

A potential security issue exists for this option. The mechanism to return browser control from Safari to Jabber after the authentication completes, uses a custom URL scheme that invokes a custom protocol handler. It's possible that another application other than Jabber could intercept the scheme and gain control from iOS. In that case, the application would have access to the OAuth token in the URL.

If you are confident that your iOS devices will not have other applications that register the Jabber custom URL scheme, for example because all mobile devices are managed, then it's safe to enable the option. If you are concerned about the possibility of another app intercepting the custom Jabber URL, then do not enable the embedded Safari browser.

Default Setting: No

Available if Authorize by OAuth token with refresh or Authorize by OAuth token is enabled.

The default is No, for optimal security and to reduce network traffic.

Controls how the Expressway-E reacts to remote client authentication requests by selecting whether the Expressway-C should check the home nodes.

The request asks whether the client may try to authenticate the user by OAuth token, and includes a user identity with which the Expressway-C can find the user's home cluster:

• Yes : The get_edge_sso request will ask the user’s home Unified CM if OAuth tokens are supported. The home Unified CM is determined from the identity sent by the

Jabber client's get_edge_sso request.

• No : If the Expressway is configured not to look internally, the same response will be sent to all clients, depending on the Edge authentication settings.

The option to choose depends on your implementation and security policy. If all Unified

CM nodes support OAuth tokens, you can reduce response time and overall network traffic by selecting No . Or select Yes if you want clients to use either mode of getting the edge configuration—during rollout or because you can't guarantee OAuth on all nodes.

Caution : Setting this to Yes has the potential to allow rogue inbound requests from unauthenticated remote clients.

If you specify No for this setting, the Expressway prevents rogue requests.

Default Setting: No

Allow activation code onboarding

Only available if Authorize by OAuth token with refresh or Authorize by OAuth token is enabled. This setting enables onboarding by activation code in the Expressway. The default value is No . Set the value to Yes to enable this option.

Default Setting: No

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

39

MRA Configuration

SAML SSO Authentication Over the Edge

Field Description

SIP token extra time to live

Available if Authorize by OAuth token is On .

Optionally extends the time-to-live for simple OAuth tokens (in seconds). Gives users a short window to accept calls after their credentials expire. However, it increases the potential security exposure.

Default Setting: 0 seconds

WebEx Client

Embedded

Browser Support

Applies to Jabber and WebEx clients that send a SSO redirect URI.

Default value: No . Set the value to Yes to enable this option.

This feature enhances the security of Jabber and Webex Client Embedded Browser support.

It allows the client to use the Embedded browser for Unified Communications Manager

(and MRA) OAuth flow and improves the user experience.

Note On Expressway, you can check what authorization methods your Unified CM servers support. This displays the version numbers in use.

On Expressway, go to Configuration > Unified Communications > Unified CM servers .

SAML SSO Authentication Over the Edge

SAML-based SSO is an option for authenticating Unified Communications service requests. The requests can originate inside the enterprise network, or as described here, from clients requesting Unified

Communications services from outside through MRA.

SAML SSO authentication over the edge requires an external identity provider (IdP). It relies on the secure traversal capabilities of the Expressway pair at the edge, and on trust relationships between the internal service providers and an externally resolvable IdP.

The endpoints do not need to connect via VPN. They use one identity and one authentication mechanism to access multiple Unified Communications services. Authentication is owned by the IdP, and there is no authentication at the Expressway, nor at the internal Unified CM services.

The Expressway supports two types of OAuth token authorization with SAML SSO:

• Simple (standard) tokens. These always require SAML SSO authentication.

• Self-describing tokens with refresh. These can also work with Unified CM-based authentication

Note • When the Jabber endpoint uses SSO with no refresh and originally authenticates remotely to Unified

CM through Expressway/MRA and then moves back to the local network, no reauthentication is required for the endpoint (edge to on premises).

• When the Jabber endpoint originally authenticates in the local network directly to Unified CM and then uses Expressway/MRA to access Unified CM remotely, reauthentication is required for the endpoint (On premises to edge).

40

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Configuration

About Simple OAuth Token Authorization

About Simple OAuth Token Authorization

Prerequisites

• Cisco Jabber 10.6 or later. Jabber clients are the only endpoints supported for OAuth token authorization through Mobile and Remote Access (MRA).

• Cisco Unified Communications Manager 10.5(2) or later

• Cisco Unity Connection 10.5(2) or later

• Cisco Unified Communications Manager IM and Presence Service 10.5(2) or later

How it works

Cisco Jabber determines whether it is inside the organization's network before requesting a Unified

Communications service. If Jabber is outside the network, it requests the service from the Expressway-E on the edge of the network. If SAML SSO authentication is enabled at the edge, the Expressway-E redirects

Jabber to the IdP with a signed request to authenticate the user.

The IdP challenges the client to identify itself. When this identity is authenticated, the IdP redirects Jabber's service request back to the Expressway-E with a signed assertion that the identity is authentic.

The Unified Communications service trusts the IdP and the Expressway-E, so it provides the service to the

Jabber client.

Figure 14: Simple OAuth token-based authorization for on-premises UC services

About Self-Describing OAuth Token Authorization with Refresh

Expressway supports using self-describing tokens as an MRA authorization option from X8.10.1. (Set

Authorize by OAuth token with refresh to Yes .) Self-describing tokens offer significant benefits:

• Token refresh capability, so users do not have to repeatedly re-authenticate.

• Fast authorization.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

41

MRA Configuration

OAuth Token Prerequisites

• Access policy support. The Expressway can enforce MRA access policy settings applied to users on the

Unified CM.

• Roaming support. Tokens are valid on-premises and remotely, so roaming users do not need to re-authenticate if they move between on-premises and off-premises.

Expressway uses self-describing tokens in particular to facilitate Cisco Jabber users. Jabber users who are mobile or work remotely, can authenticate while away from the local network (off-premises). If they originally authenticate on the premises, they do not have to re-authenticate if they later move off-premises. Similarly, users do not have to re-authenticate if they move on-premises after authenticating off-premises. Either case is subject to any configured access token or refresh token limits, which may force re-authentication.

For users with Jabber iOS devices, the high speeds supported by self-describing tokens optimize Expressway support for Apple Push Notifications (APNs).

We recommend self-describing token authorization for all deployments, assuming the necessary infrastructure exists to support it. Subject to proper Expressway configuration, if the Jabber client presents a self-describing token then the Expressway simply checks the token. No password or certificate-based authentication is needed.

The token is issued by Unified CM (regardless of whether the configured authentication path is by external

IdP or by the Unified CM). Self-describing token authorization is used automatically if all devices in the call flow are configured for it.

The Expressway-C performs token authorization. This avoids authentication and authorization settings being exposed on Expressway-E.

Prerequisites

• Expressway is already providing Mobile and Remote Access for Cisco Jabber.

• All other devices in the call flow are similarly enabled.

• You have the following minimum product versions installed, or later:

• Expressway X8.10.1

• Cisco Jabber iOS 11.9

If you have a mix of Jabber devices, with some on an older software version, the older ones will use simple OAuth token authorization (assuming SSO and an IdP are in place).

• Cisco Unified Communications Manager 11.5(SU3)

• Cisco Unified Communications Manager IM and Presence Service 11.5(SU3)

• Cisco Unity Connection 11.5(SU3)

• Make sure that self-describing authentication is enabled on the Cisco Expressway-C ( Authorize by

OAuth token with refresh setting) and on Unified CM and/or IM and Presence Service ( OAuth with

Refresh Login Flow enterprise parameter).

• You must refresh the Unified CM nodes defined on the Expressway. This fetches keys from the Unified

CM that the Expressway needs to decrypt the tokens.

OAuth Token Prerequisites

This topic provides information on the prerequisites that your deployment must meet for OAuth tokens.

42

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Configuration

OAuth Token Prerequisites

On the Expressway Pair

• An Expressway-E and an Expressway-C are configured to work together at your network edge.

• A Unified Communications traversal zone is configured between the Expressway-C and the Expressway-E.

• The SIP domain that will be accessed via OAuth is configured on the Expressway-C.

• The Expressway-C has MRA enabled and has discovered the required Unified CM resources.

• The required Unified CM resources are in the HTTP allow list on the Expressway-C.

• If you are using multiple deployments, the Unified CM resources to be accessed by OAuth are in the same deployment as the domain to be called from Jabber clients.

On Cisco Jabber Clients

• Clients are configured to request the internal services using the correct domain names / SIP URIs / Chat aliases.

• The default browser can resolve the Expressway-E and the IdP.

On Unified CM

Users who are associated with non-OAuth MRA clients or endpoints, have their credentials stored in Unified

CM. Or Unified CM is configured for LDAP authentication.

On the Identity Provider

The domain that is on the IdP certificate must be published in the DNS so that clients can resolve the IdP.

Identity Provider Selection

Cisco Collaboration solutions use SAML 2.0 (Security Assertion Markup Language) to enable SSO (single sign-on) for clients consuming Unified Communications services.

If you choose SAML-based SSO for your environment, note the following:

• SAML 2.0 is not compatible with SAML 1.1 and you must select an IdP that uses the SAML 2.0 standard.

• SAML-based identity management is implemented in different ways by vendors in the computing and networking industry, and there are no widely accepted regulations for compliance to the SAML standards.

• The configuration of and policies governing your selected IdP are outside the scope of Cisco TAC

(Technical Assistance Center) support. Use your relationship and support contract with your IdP Vendor to assist in configuring the IdP properly. Cisco cannot accept responsibility for any errors, limitations, or specific configuration of the IdP.

Although Cisco Collaboration infrastructure may prove to be compatible with other IdPs claiming SAML 2.0

compliance, only the following IdPs have been tested with Cisco Collaboration solutions:

• OpenAM 10.0.1

• Active Directory Federation Services 2.0 (AD FS 2.0)

• PingFederate ® 6.10.0.4

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

43

MRA Configuration

Configure OAuth on UC Applications

Configure OAuth on UC Applications

To use OAuth authentication on Expressway with MRA, you must also have it enabled on your internal UC applications, such as Cisco Unified Communications Manager and Cisco Unity Connection (if it is deployed).

Procedure

Step 1

Step 2

Step 3

On Expressway-C, verify that your MRA Access Control settings have OAuth token refresh enabled.

a) On Expressway-C, go to Configuration > Unified Communications > Configuration > MRA Access

Control .

b) Check the Authorize by OAuth token with refresh check box.

c) Click Save .

On the Cisco Unified Communications Manager publisher node, enable the OAuth Refresh Login Flow enterprise parameter: a) From Cisco Unified CM Administration, choose System > Enterprise Parameters .

b) Set the OAuth with Refresh Login Flow parameter to Enabled .

c) Click Save .

On Cisco Unity Connection, enable OAuth Refresh Logins and then configure the Authz Server.

a) From Cisco Unity Connection Administration, choose System Settings > Enterprise Parameters .

b) Configure the settings under SSO and OAuth Configuration .

c) Set the OAuth with Refresh Login enterprise parameter to Enabled .

d) Click Save .

e) Choose System Setting > Authz Server .

f) Edit the existing configuration or add a new Authz server.

g) Add CUCM Publisher to the Authz server settings.

h) Click Save .

What to do next

If your system meets the necessary requirements, enable SIP OAuth Mode on Cisco Unified Communications

Manager.

Configure SIP OAuth Mode

Use this procedure to enable SIP OAuth Mode on Cisco Unified Communications Manager. SIP OAuth Mode is recommended if you want secure SIP line signaling and your system supports it.

Note From X14.0 release, SIP OAuth Mode is supported for 7800 and 8800 series Cisco IP Phones. For more detailed information on SIP OAuth Mode, refer to the “Configure SIP OAuth Mode” chapter of Feature

Configuration Guide for Cisco Unified Communications Manager .

44

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Configuration

SAML SSO Configuration

Before you begin

OAuth Refresh Logins must be enabled on Cisco Unified Communications Manager. This is set with the

OAuth with Refresh Login Flow enterprise parameter to Enabled .

Procedure

Step 1

Step 2

Step 3

Step 4

Step 5

For each server that uses SIP OAuth, set the SIP OAuth ports.

a) From Cisco Unified CM Administration, choose System > Cisco Unified CM .

b) Set the TCP Port Settings .

c) Click Save .

Configure an OAuth Connection to Expressway-C: a) From Cisco Unified CM Administration, choose Device > Expressway-C .

b) Click Add New .

c) Add the Expressway-C address d) Click Save .

Enable SIP OAuth Mode: a) On the Unified CM publisher node, log in to the Command Line Interface.

b) Run the utils sipOAuth-mode enable

CLI command.

Restart the Cisco CallManager service: a) From Cisco Unified Serviceability, choose Tools > Control Center - Feature Services b) From the Server drop-down list, select the server.

c) Check the Cisco CallManager service and click Restart .

d) Restart each node where endpoints register with SIP OAuth Mode.

Enable OAuth Authentication within the Phone Security Profile.

a) From Cisco Unified CM Administration, choose System > Security Profile > Phone Security Profile .

b) Click Find and select the profile that is associated to your MRA endpoints.

c) Check the Enable OAuth Authentication check box.

d) If you are using ICE Media Path Optimization, set the Device Security Mode to Encrypted and Transport

Type to TLS .

e) Click Save .

SAML SSO Configuration

Complete the following tasks if you want to configure SAML SSO in Cisco Expressway for Mobile and

Remote Access.

Before you begin

• Configure SAML SSO for your internal UC applications. For details, see SAML SSO Deployment Guide for Cisco Unified Communications Solutions .

• Within the MRA Access Control settings on Expressway-C, the Authentication path field must be set to either SAML SSO authentication or SAML SSO and UCM/LDAP .

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

45

MRA Configuration

Export the SAML Metadata from the Expressway-C

Caution The following changes require the SAML metadata to be updated:

• Expressway change: Expressway-C certificate, FQDN, adding a cluster (send the metadata to be imported again)

• IDP change: FQDN, certificates, or anything that affect the trust relationship with the clients (reimport the latest metadata)

Procedure

Step 1

Step 2

Step 3

Step 4

Step 5

Command or Action

Export the SAML Metadata from the

Expressway-C, on page 46

Configure the Identity Provider

Purpose

Export a metadata file from Expressway-C.

Import the Expressway metadata to the Identity

Provider (IdP), configure the IdP and then export a metadata file from the IdP.

Import the SAML Metadata from the IdP, on page 47

Associate Domains with an IdP, on page 48

Import the Idp metadata to Expressway-C and complete the configuration.

In Expressway-C, associate the domain to the

Identity Provider.

Configure ADFS for SAML SSO, on page 48

ADFS only. If you're using is Active Directory

Federation Services, complete these additional tasks on the IdP to complete the configuration.

Export the SAML Metadata from the Expressway-C

From X12.5, Cisco Expressway supports using a single, cluster-wide metadata file for SAML agreement with an IdP. Previously, you had to generate metadata files per peer in an Expressway-C cluster (for example, six metadata files for a cluster with six peers). For the cluster-wide option, run this procedure on the Expressway-C primary peer.

Note If you change any of the following Expressway settings in a SAML SSO deployment, you must re-export metadata from the primary peer and reimport metadata to the IdP:

• The primary peer

• The server certificates

• Any SSO-enabled domains

• The IP address or hostname of the Expressway-E peers

46

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Configuration

Import the SAML Metadata from the IdP

Note The Expressway-C must have a valid connection to the Expressway-E before you can export the Expressway-C's

SAML metadata.

Procedure

Step 1

Step 2

Step 3

Step 4

Step 5

Step 6

Go to Configuration > Unified Communications > Configuration .

In MRA Access Control section, choose a mode from the SAML Metadata list:

• Cluster : Generates a single cluster-wide SAML metadata file. You must import only this file to an IdP for the SAML agreement.

• Peer : Generates the metadata files for each peer in a cluster. You must import each metadata file to IdP for the SAML agreement. The Peer option is selected by default when Expressway is upgraded from an earlier SAML SSO enabled release to 12.5.

For new deployments, the SAML Metadata mode always defaults to Cluster .

For existing deployments, the mode defaults to Cluster if SAML SSO was disabled in your previous

Expressway release, or to Peer if SAML SSO was previously enabled.

Click Export SAML data .

This page lists the connected Expressway-E, or all the Expressway-E peers if it's a cluster. These are listed because data about them is included in the SAML metadata for the Expressway-C.

If you choose Cluster for SAML Metadata, click Generate Certificate .

Do the following:

• On cluster-wide mode, to download the single cluster-wide metadata file, click Download .

• On per-peer mode, to download the metadata file for an individual peer, click Download next to the peer. To export all in a .zip file, click Download All .

Copy the resulting file(s) to a secure location that you can access when you need to import SAML metadata to the IdP.

Import the SAML Metadata from the IdP

Procedure

Step 1

Step 2

Step 3

Step 4

On the Expressway-C, go to Configuration > Unified Communications > Identity providers (IdP) .

You only need to do this on the primary peer of the cluster.

Click Import new IdP from SAML .

Use the Import SAML file control to locate the SAML metadata file from the IdP.

Set the Digest to the required SHA hash algorithm.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

47

MRA Configuration

Associate Domains with an IdP

Step 5

The Expressway uses this digest for signing SAML authentication requests for clients to present to the IdP.

The signing algorithm must match the one expected by the IdP for verifying SAML authentication request signatures.

Click Upload .

The Expressway-C can now authenticate the IdP's communications and encrypt SAML communications to the IdP.

Note You can change the signing algorithm after you have imported the metadata, by going to

Configuration > Unified Communications > Identity providers (IdP) , locating your IdP row then, in the Actions column, clicking Configure Digest ).

Associate Domains with an IdP

You need to associate a domain with an IdP if you want the MRA users of that domain to authenticate through the IdP. The IdP adds no value until you associate at least one domain with it.

There is a many-to-one relationship between domains and IdPs. A single IdP can be used for multiple domains, but you may associate just one IdP with each domain.

Procedure

Step 1

Step 2

Step 3

Step 4

On the Expressway-C, open the IdP list ( Configuration > Unified Communications > Identity providers

(IdP) ) and verify that your IdP is in the list.

The IdPs are listed by their entity IDs. The associated domains for each are shown next to the ID.

Click Associate domains in the row for your IdP.

This shows a list of all the domains on this Expressway-C. There are checkmarks next to domains that are already associated with this IdP. It also shows the IdP entity IDs if there are different IdPs associated with other domains in the list.

Check the boxes next to the domains you want to associate with this IdP.

If you see (Transfer) next to the check box, checking it breaks the domain's existing association and associates the domain with this IdP.

Click Save .

The selected domains are associated with this IdP.

Configure ADFS for SAML SSO

If you are using Active Directory Federation Services (ADFS) for the Identity Provider, complete these additional configurations on ADFS.

After creating Relying Party Trusts for the Expressway-Es, you must set some properties of each entity, to ensure that Active Directory Federation Services (ADFS) formulates the SAML responses as Expressway-E expects them. In addition, you also need to add a claim rule, for each relying party trust,

48

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Configuration

Configure Secure Traversal Zone

Procedure

Step 1

Step 2

Configure ADFS to sign the whole response. In Windows PowerShell ® , run the following command for each

Expressway-E's <EntityName> once per Relying Party Trust created on ADFS:

Set-ADFSRelyingPartyTrust -TargetName "<EntityName>"

-SAMLResponseSignatureMessageAndAssertion where <EntityName> must be a display name for the Relying Party Trust of Expressway-E as set in ADFS.

Add a Claim Rule for each relying party trust: a) Open the Edit Claims Rule dialog and create a new claim rule that sends AD attributes as claims.

b) Select the AD attribute to match the one that identify the OAuth users to the internal systems, typically email or SAMAccountName c) Enter uid as the Outgoing Claim Type .

Configure Secure Traversal Zone

Configure an encrypted zone of type "Unified Communications traversal" on both Expressway-C and

Expressway-E. Complete the procedure on both Expressway-C and Expressway-E.

Note This configuration automatically sets up an appropriate traversal zone (a traversal client zone when selected on Expressway-C or a traversal server zone when selected on Expressway-E) that uses SIP TLS with TLS verify mode set to On, and Media encryption mode set to Force encrypted.

Before you begin

• Make sure that Expressway-C and Expressway-E trust each other's certificates. As each Expressway acts both as a client and as a server you must ensure that each Expressway’s certificate is valid both as a client and as a server. For detailed information on certificate exchange requirements, see

Certificate

Requirements, on page 17

.

• Be aware that Expressway uses the SAN attribute to validate received certificates, not the CN.

• If an H.323 or a non-encrypted connection is also required, a separate pair of traversal zones must be configured.

Procedure

Step 1

Step 2

Step 3

On the Expressway-C primary peer, go to Configuration > Zones > Zones .

Click New .

Configure the fields in the below table. Apply the settings for the appropriate Expressway server (C or E).

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

49

MRA Configuration

Configure Secure Traversal Zone

Table 10: UC Traversal Zone Settings

Field

Password

Expressway-C Settings

Name

Type

“Traversal zone” for example

Unified Communications traversal

Connection credentials section

Username “exampleauth” for example

“ex4mpl3.c0m” for example

Expressway-E Settings

“Traversal zone” for example

Unified Communications traversal

“exampleauth” for example

Click Add/Edit local authentication database . In the popup dialog click New and enter the Name (“exampleauth”) and

Password (“ex4mpl3.c0m”) and click

Create credential .

SIP section

Port Must match the Expressway-E setting.

7001 (default. See the Cisco Expressway

IP Port Usage Configuration Guide , for your version, on the Cisco Expressway

Series configuration guides page .)

TLS verify subject name

Not applicable Enter the name to look for in the traversal client's certificate (must be in the Subject

Alternative Name attribute). If there is a cluster of traversal clients, specify the cluster name here and ensure that it is included in each client's certificate.

Authentication section

Authentication policy

Do not check credentials

Location section

Peer 1 address

Do not check credentials

Enter the FQDN of the Expressway-E.

Note that if you use an IP address (not recommended), that address must be present in the Expressway-E server certificate.

If you have configured Expressway-E with a dual NIC interface for MRA, enter the

FQDN of Expressway-E's internal interface

(not the IP address). Expressway-C requires a local DNS record that points to the FQDN of the Expressway-E's internal

LAN.

Not applicable

50

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Configuration

Secure Communications Configuration

Step 4

Step 5

Field

Peer 2...6 address

Expressway-C Settings Expressway-E Settings

Enter the FQDNs of additional peers if it is a cluster of Expressway-Es.

Not applicable

Click Create zone .

Repeat these steps on the Expressway-E primary peer, applying the settings in the Expressway-E column.

Secure Communications Configuration

This deployment requires secure communications between the Expressway-C and the Expressway-E, and between the Expressway-E and endpoints located outside the enterprise. This involves the mandating of encrypted TLS communications for HTTP, SIP and XMPP, and, where applicable, the exchange and checking of certificates. Jabber endpoints must supply a valid username and password combination, which will be validated against credentials held in Unified CM. All media is secured over SRTP.

Expressway-C automatically generates non-configurable neighbor zones between itself and each discovered

Unified CM node. A TCP zone is always created, and a TLS zone is created also if the Unified CM node is configured with a Cluster Security Mode ( System > Enterprise Parameters > Security Parameters ) of

1 (Mixed) (so that it can support devices provisioned with secure profiles). The TLS zone is configured with its TLS verify mode set to On if the Unified CM discovery had TLS verify mode enabled. This means that the Expressway-C will verify the CallManager certificate for subsequent SIP communications.

Note Secure profiles are downgraded to use TCP if Unified CM is not in mixed mode.

The Expressway neighbor zones to Unified CM use the names of the Unified CM nodes that were returned by Unified CM when the Unified CM publishers were added (or refreshed) to the Expressway. The Expressway uses those returned names to connect to the Unified CM node. If that name is just the hostname then:

• It needs to be routable using that name.

• This is the name that the Expressway expects to see in the Unified CM's server certificate.

If you are using secure profiles, ensure that the root CA of the authority that signed the Expressway-C certificate is installed as a CallManager-trust certificate ( Security > Certificate Management in the Cisco Unified OS

Administration application).

Media Encryption

Media encryption is enforced on the call legs between the Expressway-C and the Expressway-E, and between the Expressway-E and endpoints located outside the enterprise.

The encryption is physically applied to the media as it passes through the B2BUA on the Expressway-C.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

51

Media Encryption

MRA Configuration

52

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

C H A P T E R

4

ICE Media Path Optimization

ICE Media Path Optimization, on page 53

Prerequisites for ICE Media Path Optimization, on page 57

ICE Media Path Optimization Task Flow, on page 58

ICE Passthrough Metrics Use, on page 63

ICE Media Path Optimization

From X12.5, we support Interactive Connectivity Establishment (ICE) Media Path Optimization. This feature optimizes the media path for MRA endpoints, letting MRA-registered endpoints pass media directly between the endpoints, thereby bypassing the WAN and the Expressway servers.

This feature uses the ICE protocol ( RFC 5245 ). Background information about ICE is provided in the About

ICE and TURN Services section of the Cisco Expressway Administrator Guide at https://www.cisco.com/c/en/us/support/unified-communications/expressway-series/products-maintenance-guides-list.html

.

How ICE Works

Before Cisco Expressway X12.5, ICE is supported only with the Cisco Expressway-C B2BUA as one of the

ICE endpoints. When B2BUA acts as an endpoint, ICE candidates are negotiated between the endpoints and

B2BUA. Therefore, the media always traverses through Cisco Expressway-E and Cisco Expressway-C.

The following figure shows an MRA call that does not use ICE to optimize the media path. The media traverses through both the Cisco Expressway-E and the Cisco Expressway-C.

Figure 15: MRA Call Flow without ICE Media Path Optimization

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

53

ICE Media Path Optimization

ICE Media Path Optimization

With ICE Media Path Optimization, introduced in Cisco Expressway X12.5, each endpoint can pass the ICE candidates to the other endpoint through zones that traverse the SIP signaling. As a result, endpoints use the

ICE protocol to negotiate the most optimal path for media. The most optimal path may be one of the following:

• Host address —Represents the host IP address of the endpoint which is behind the NAT device.

• Server-reflexive address —Represents the publicly accessible address of the endpoint on the NAT device.

• Relay address —Represents the relay address of the endpoint configured on the TURN server.

In all ICE calls, initially media traverses through the Cisco Expressway-E and Cisco Expressway-C and then switches the media path depending on the negotiated ICE candidate type. This ensures that if endpoints are not ICE-capable, Cisco Expressway can use the legacy traversal path to pass media without disruption.

The following sections illustrate the MRA media path for each of the three ICE candidates.

MRA Call Flow with ICE using Host Address

The following figure shows an MRA call with ICE where the Host address is used to establish the media path.

The media directly passes between the endpoints using the Host address, because the endpoints reside in the same network with no firewall between them.

Figure 16: MRA Call Flow with ICE using Host Address

MRA Call Flow with ICE using Server Reflexive Addressing

The following figure shows an MRA call with ICE where both endpoints are behind different firewalls, thereby preventing the Host address from being used. Instead, the media passes between the endpoints using

Server-reflexive addressing because the endpoints are behind different firewalls.

54

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

ICE Media Path Optimization

Signaling Path Encryption Between Expressway-C and Unified CM

Figure 17: MRA Call Flow with ICE using Server Reflexive Addressing

MRA Call Flow with ICE using Relay Address

In cases where the Host and Server-reflexive addresses cannot negotiate successfully, like deployments with a symmetric NAT, endpoints can utilize TURN Relay as the ICE optimized media path. The following figure shows an MRA call with ICE where endpoints use the Relay address of the Cisco Expressway TURN server to send media between endpoints.

Figure 18: MRA Call Flow with ICE using Relay Address

Signaling Path Encryption Between Expressway-C and Unified CM

Security and encryption are important factors when considering direct endpoint-to-endpoint messaging.

Because MRA endpoints are sending signaling and media over the internet, they are forced to operate in encrypted mode. In normal MRA mode (without ICE), encryption is always required between the endpoint and the Expressway-C but optional between the Expressway-C and Unified CM. This is possible because the

Expressway-C can terminate the media stream and decrypt the packets if the internal leg is unencrypted.

The following figure shows the encryption without ICE Passthrough where encryption is forced between

MRA endpoints and Expressway-C, and optional in the internal network. On an MRA call, a different encryption

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

55

ICE Media Path Optimization

Supported Components key is exchanged on each leg (Key 1 and Key 2), and the Expressway-C decrypts and re-encrypts the media between the 2 legs. The invite to Unified CM does not need a key if the internal leg is not encrypted.

Figure 19: Encryption without ICE Passthrough

However, with ICE passthrough mode, the endpoints must be able to exchange their crypto keys end-to-end because the media packets are sent to each other directly and not through the Expressway-C. Whenever crypto keys are included in a SIP message, the message must be sent over TLS to protect the key. Because the SIP signaling path must be encrypted end-to-end to send the crypto keys end-to-end, the internal leg between the

Expressway-C and Unified CM must be encrypted. If the signaling path is unencrypted, the crypto keys are dropped during call setup.

The following figure shows the encryption required with ICE Passthrough where the signaling leg between the Expressway-C and Unified CM is also encrypted.

Figure 20: Encryption with ICS Passthrough

Supported Components

Cisco Expressway-based Deployments

Currently, ICE Media Path Optimization support exists only on MRA deployments. It is not tested and supported on the following service deployments:

• Cisco Webex Hybrid Services

• Jabber Guest

• Collaboration Meeting Room (CMR) Cloud

56

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

ICE Media Path Optimization

Prerequisites for ICE Media Path Optimization

• Business to Business Calling

HCS Deployments

ICE passthrough can be used to optimize the media path of the MRA calls in the following HCS deployment types:

• HCS Shared Architecture

• HCS Dedicated Server and HCS Dedicated Instance

• Customer-owned Collaboration Architecture

Note HCS Contact Center does not support ICE passthrough.

Supported Components

ICE Media Path Optimization is supported with the following components:

• HCS 11.5 or later (for HCS deployments)

• Cisco Unified Communications Manager (Unified CM) 11.5 or later

• Cisco Expressway-C and Cisco Expressway-E X12.5 or later

Supported Endpoints

The following ICE-capable endpoints can send media directly to each other when they are MRA-registered and ICE Media Path Optimization is enabled:

• Cisco Jabber clients, version 12.5 or later subject to using Unified Communications Manager 12.5 or later

• Cisco IP Conference Phone 7832, version 12.5(1) or later

• Cisco IP Phone 7800 Series (MRA-compatible models only), version 12.5(1) or later

• Cisco IP Phone 8800 Series (MRA-compatible models only), version 12.5(1) or later

• Cisco TelePresence DX, MX, SX Series, CE version 9.6.1 or later

Prerequisites for ICE Media Path Optimization

The following Cisco Unified Communications Manager prerequisites exist when deploying MRA endpoints with ICE Media Path Optimization:

Secure Mode Must be Running on Unified CM

It’s mandatory that one of the following secure modes be running on Cisco Unified Communications Manager:

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

57

ICE Media Path Optimization

ICE Media Path Optimization Task Flow

• SIP OAuth Mode is recommended for those endpoints that support it. SIP OAuth Mode is supported for:

• Cisco Jabber or Webex clients on Unified CM Release 12.5(x) or later

• Cisco IP Phone 7800 or 8800 series on Unified CM Release 14 or later

• Mixed mode must be enabled if you are deploying SIP OAuth Mode over MRA with ICE and your endpoints do not support SIP OAuth Mode. This includes non-supported Cisco IP Phone or TelePresence devices. Mixed mode is also required for Cisco Jabber clients if you are not enabling SIP OAuth Mode, or if you are running a Unified CM release that is prior to 12.5(x).

Mixed mode can be enabled by running the utils ctl set-cluster mixed-mode

CLI command on the publisher node.

Phone Security Profile Must Include TLS Encryption

It’s mandatory that all MRA endpoints that use ICE Media Path Optimization be associated to a TLS-encrypted

Phone Security Profile. Within the Phone Security Profile, the following settings must exist:

• Device Security Mode is set to Encrypted

• Transport Type is set to TLS

• Enable OAuth Authentication is checked (if you are using SIP OAuth Mode) - CONFIRM

In addition, if mixed mode is enabled on Unified CM, the phone security profile name must be in the form of an FQDN.

Configuration

For details on how to configure SIP OAuth Mode, refer to the “SIP OAuth Mode” chapter of the Feature

Configuration Guide for Cisco Unified Communications Manager .

For details on how to configure mixed mode and a TLS-encrypted phone security profile, see the Security

Guide for Cisco Unified Communications Manager .

ICE Media Path Optimization Task Flow

Complete the following tasks to configure ICE Media Path Optimization for your MRA deployment.

Procedure

Step 1

Step 2

Step 3

Command or Action

Configure ICE Settings, on page 59

Install Server Certificates, on page 60

Change CEtcp Neighbor Zones to CEtls

Neighbor Zones, on page 60

Purpose

On Unified CM, configure ICE settings that you can apply to MRA endpoints.

On Expressway-C, install appropriate server certificates and trusted CA certificates.

On Expressway-C, change the existing CEtcp neighbor zone to a CEtls neighbor zone.

58

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

ICE Media Path Optimization

Configure ICE Settings

Step 4

Step 5

Step 6

Step 7

Command or Action

Set Up the UC Traversal Zone for ICE

Passthrough Support, on page 61

Set Up the UC Neighbor Zone for ICE

Passthrough Support, on page 61

Use CLI to Configure ICE Passthrough on

Cisco Expressway Zones, on page 62

Purpose

On Expressway-C, set up the UC traversal zone for MRA.

On Expressway-C, set up the UC neighbor zone for MRA.

On Expressway-C, configure ICE Media Path

Optimization for the UC and CEtls neighbor zones.

Set Up Cisco Expressway-E as TURN Server, on page 62

On Expressway-E, configure TURN relay services.

Configure ICE Settings

On Cisco Unified Communications Manager, configure ICE settings within a Common Phone Profile, which you can apply to a group of MRA phones that use the profile.

Note As an alternative to using a Common Phone Profile, ICE settings can be applied in any of the below Unified

CM configuration windows as a part of the Product-Specific Configuration Layout. If conflicting configurations exist, the prioritized order below determines which configuration gets applied to the phone:

1.

Phone Configuration—Configure ICE settings on a phone-by-phone basis

2.

Common Phone Profile Configuration—Configure ICE settings to be applied to a group of phones that use the profile.

3.

Enterprise Phone Configuration—Configure ICE settings that are applied cluster-wide to phones that use those settings.

Regardless of which configuration window you use, by default ICE is Enabled with Host as the default candidate, and Server Reflexive addressing also being Enabled . However, to use Expressway-E relayed

TURN services you must specify the Expressway-E server in the ICE settings of one of these windows.

Procedure

Step 1

Step 2

Step 3

From Cisco Unified CM Administration, choose Device > Device Settings > Common Phone Profile .

Do either of the following:

• Click Add New to create a new profile.

• Click Find and select an existing profile. For example, the default Standard Common Phone Profile, which is assigned to new phones by default.

Under Interactive Connectivity Establishment (ICE) , configure the following ICE settings:

• ICE —Make sure this is set to Enabled.

• Default Candidate Type — Host is recommended.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

59

ICE Media Path Optimization

Install Server Certificates

Step 4

Step 5

• Server Reflexive Address —Make sure this is set to Enabled

• Primary TURN Server Host Name or IP Address —Enter the FQDN of an Expressway-E node to act as the primary TURN server.

• Secondary TURN Server Host Name or IP Address —Enter the FQDN of an Expressway-E node to act as the secondary TURN server.

• TURN Server Transport Type — Auto is recommended.

• TURN Server Username —Enter a username that can access the Expressway-E server.

• TURN Server Password —Enter the password for the user whom can access Expressway-E.

Click Save .

To apply the profile to a phone, do the following: a) Choose Device > Phone .

b) Click Find and select the phone to which you want to apply the profile.

c) Select the Common Phone Profile that you created.

d) Click Save .

Install Server Certificates

This procedure describes how to install server certificates.

Procedure

Step 1

Step 2

Step 3

Generate a new CSR for the server certificate ( Maintenance > Security > Server Certificate ).

For more information, see the Cisco Expressway Certificate Creation and Use Deployment Guide on the

Expressway configuration guides page .

While generating the CSR, include the name of the phone security profile that you have associated with the endpoints in the Subject Alternate Names (SAN).

For more information, see

CSR Requirements for Expressway Servers, on page 19

.

Install the server certificate that is signed from the trusted certificate authority on Cisco Expressway-C.

This certificate allows the endpoints using the phone security profile to register over the TLS connection between Cisco Expressway-C and Unified CM.

Change CEtcp Neighbor Zones to CEtls Neighbor Zones

On Cisco Expressway-C, change the existing CEtcp neighbor zones that are already configured for MRA to

CEtls neighbor zones.

Before you begin

Make sure that Unified CM is in a secure mode with one of the following modes being enabled:

• Mixed Mode

60

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

ICE Media Path Optimization

Set Up the UC Traversal Zone for ICE Passthrough Support

• SIP OAuth Mode

Procedure

Step 1

Step 2

Step 3

Go to Configuration > Unified Communications > Unified CM servers .

Select the Unified CM Servers that you already discovered and click Refresh Servers to update the configuration.

Verify that the Unified CM status shows TLS: Active .

If there is not already a CEtcp neighbor zone created, you may need to add your Unified CM servers and then refresh servers. Go to

Add Unified CM Cluster, on page 33 .

Cisco Expressway-C automatically generates non-configurable CEtls neighbor zones between itself and each discovered Unified CM node if Unified CM cluster is in Secure mode. For more information, see

Automatically

Generated Zones and Search Rules, on page 34

.

Set Up the UC Traversal Zone for ICE Passthrough Support

This procedure describes how to set up the UC Traversal Zone for ICE passthrough support.

Procedure

Step 1

Step 2

Step 3

In Cisco Expressway-C, go to Configuration > Zones > Zones .

Choose the Unified Communications traversal zone to Cisco Expressway-E.

In the SIP pane, set ICE Passthrough support to On and ICE Support to Off .

Note ICE Passthrough support takes precedence over ICE Support. Best practice is to turn on ICE

Passthrough support and turn off ICE support.

Set Up the UC Neighbor Zone for ICE Passthrough Support

This procedure describes how to set up the UC Neighbor Zone for ICE passthrough support.

Procedure

Step 1

Step 2

Step 3

In Cisco Expressway-C, go to Configuration > Unified Communications > Unified CM Servers .

Choose a server.

In the Unified CM server lookup pane, set ICE Passthrough support to On .

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

61

ICE Media Path Optimization

Use CLI to Configure ICE Passthrough on Cisco Expressway Zones

Use CLI to Configure ICE Passthrough on Cisco Expressway Zones

The ICE Passthrough option in Cisco Expressway is a per-zone setup. You must enable ICE Passthrough on each Unified CM traversal client zone and CEtls neighbor zone.

You can use the CLI, instead of the web interface, to configure zones for ICE Passthrough.

Procedure

Step 1

Step 2

Step 3

Step 4

Step 5

Step 6

Go to Configuration > Zones and click the Unified CM Traversal zone to Cisco Expressway-E.

In the URL, note the ID of the zone. For example, in the following URL, 4 is the zone ID.

https://expressway.example.com/editzone?id=4

Repeat steps 1 and 2 for the CEtls neighbor zone.

Log in to the CLI of the Cisco Expressway-C as administrator.

Run the following command to enable ICE Passthrough on Unified CM traversal client zone: xConfiguration Zones Zone <Unified Communication Traversal client zone ID> TraversalClient

SIP Media ICEPassThrough Support: On

Run the following command to enable ICE Passthrough on the CEtls neighbor zone: xConfiguration Zones Zone <CEtls Neighbor zone ID> Neighbor SIP Media ICEPassThrough Support:

On

Set Up Cisco Expressway-E as TURN Server

You can use the Cisco Expressway-E server where the TURN server is running to allocate relay address and to retrieve the server reflexive address. This is typically a Cisco Expressway-E in the cluster used for MRA, but it is not required to be a Cisco Expressway-E server. You can use any compliant TURN server.

The following steps summarize the configuration required on the Cisco Expressway-E TURN server:

Procedure

Step 1 Configure the TURN server ( Configuration > Traversal > TURN ) with the following settings:

• TURN services : Set to On .

• TCP 443 TURN service : Set to Off .

• TURN port multiplexing : Set to Off . This option is available only on Large system.

• TURN requests port : Retain the default values. On Small and Medium systems, the default port is 3478.

On Large systems, the default port range is 3478 to 3483.

Note On a Large system, the TURN request port field is available only if TURN port multiplexing is set to On .

• TURN requests port range start : Retain the default values.

62

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

ICE Media Path Optimization

ICE Passthrough Metrics Use

Step 2

Step 3

Step 4

• TURN requests port range end : Retain the default values.

Note The TURN requests port range start and TURN requests port range end options are available only on Large systems and if TURN port multiplexing is set to Off .

• Delegated credential checking : Retain the default values.

• Authentication realm : Retain the default value. The default value is TANDBERG.

• Media port range start : Retain the default value. The default value is 24000.

• Media port range end : Retain the default value. The default value is 29999.

Configure the credentials ( Configuration > Authentication > Devices > Local database ) for TURN clients to authenticate with the TURN server.

Click Save .

Verify if the TURN server status is changed to Active under TURN server status .

For more information on the steps to configure TURN services on Cisco Expressway-E, see Configuring

TURN Services section in the Cisco Expressway Administrator Guide at https://www.cisco.com/c/en/us/ support/unified-communications/unified-communications-manager-callmanager/ products-maintenance-guides-list.html

.

ICE Passthrough Metrics Use

This section describes how to work with metrics for ICE passthrough in Cisco Expressway:

• View ICE Passthrough Metrics in Cisco Expressway-C

• Use the collectd Daemon to Gather Metrics

• View Call Types in the Call History

• Bandwidth Manipulation

View ICE Passthrough Metrics in Expressway-C

In Expressway-C, you can view metrics data for completed ICE passthrough calls. Various metrics are available for each server that is configured to route ICE passthrough calls. Values are updated once every 24 hours.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

63

View ICE Passthrough Metrics in Expressway-C

Figure 21: Metrics Example

ICE Media Path Optimization

• The Peer field shows the IP address or hostname of each node.

• The most recent 24-hour interval of data is shown.

• Each peer address is a link that takes you to the history for that node.

• The interval start time reflects the time of day of the most recent server restart.

• Each column shows information for a separate cluster.

Procedure

Step 1

Step 2

In Expressway-C, go to Status > ICE Passthrough metrics .

The page is organized into these sections:

• Metrics : For each peer, the time interval for which metrics are shown. For this interval, the number of

B2BUA connected calls, the number of ICE calls, and the percentage of ICE vs total B2BUA calls. N/A values result when no ICE calls were processed during this 24-hour interval.

• Call types : For each call type, the percentage of placed ICE calls with each call type.

• Advanced : Other metrics that can help with troubleshooting.

For a detailed description of any field, click the i icon next to the field name.

64

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

ICE Media Path Optimization

Metric Collection with the collectd Daemon

Step 3

Step 4

Step 5

To sort, click a column name and then the Up or Down arrow, to sort the data by that column.

Click Export to CSV to create a spreadsheet of the values on the page you are displaying.

Click the IP address or hostname for a cluster to display the ICE Call Metrics History page, which shows a history of values for that cluster.

• Each column shows a separate parameter.

• Each row shows the values for a different interval, with the most recent shown first.

• Each value is a raw value, not a percentage.

• The page can display up to 60 records (that is, the 60 most recent 24-hour intervals).

Metric Collection with the collectd Daemon

As an alternative to viewing metrics for ICE passthrough calls, you can use the collectd daemon to gather the metrics. Details about setting up the server for collection are in the Cisco Expressway Serviceability Guide on the Expressway Maintain and Operate Guides page, in the “Introducing System Metrics Collection” section.

View Call Types in the Call History

For ICE passthrough calls, the call type is shown in the call history.

Procedure

Step 1

Step 2

Step 3

In Cisco Expressway-C, navigate to Status > Calls > History .

Choose one of the following actions.

• Click the value in the Start time column to view the call detail record (CDR).

• Choose View in the Actions column.

Examine the value in the ICE Passthrough call type field.

Possible values are:

• none : Indicates optimized media path was not used for the call. The call is processed and connected using

Cisco Expressway B2BUA.

• host_to_host : Indicates optimized media path for the call was established using the host addresses of the endpoints.

• host_to_srvrflx : Indicates optimized media path for the call was established between the host address of one of the endpoints and the server-reflexive address of the other endpoint.

• host_to_relay : Indicates optimized media path for the call was established between the host address of one of the endpoints and the TURN relay address of the other endpoint.

• srvrflx_to_srvrflx : Indicates optimized media path for the call was established using the server-reflexive addresses of the endpoints.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

65

ICE Media Path Optimization

Bandwidth Manipulation

Step 4

• srvrflx_to_relay : Indicates optimized media path for the call was established between the server-reflexive address of one of the endpoints and the TURN relay address of the other endpoint.

• relay_to_relay : Indicates optimized media path for the call was established using the relay addresses of the endpoints.

(Optional) To view the details of the B2BUA call leg, choose the call leg that shows the B2BUA type in the

Call components section.

Bandwidth Manipulation

When ICE is negotiated, media moves off the Cisco Expressway, which results in a reduction in media bandwidth. When the Status > Bandwidth > Links page displays current bandwidth, the total current usage reflects less utilization when ICE is in use.

Note Bandwidth usage does not include the bandwidth that the TURN server uses.

66

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

C H A P T E R

5

Features and Additional Configurations

After you have completed the basic setup for Mobile and Remote Access, use this chapter to configure features and optional configurations for MRA.

Deployment Partitions, on page 67

Push Notifications over MRA, on page 69

Fast Path Registration, on page 71

Enable SIP Path Headers, on page 72

SIP Trunks Between Unified CM and Expressway-C, on page 73

BiB Recording over MRA, on page 74

HTTP Allow List, on page 75

Dial via Office Reverse over MRA, on page 79

Multi-cluster Best Practices, on page 81

Multidomain Best Practices, on page 83

Session Persistency, on page 88

Deployment Partitions

A deployment is an abstract boundary that is used to enclose a domain and one or more Unified Communications service providers (such as Unified CM, Cisco Unity Connection, and IM and Presence Service nodes). The purpose of multiple deployments is to partition the Unified Communications services available to Mobile and

Remote Access (MRA) users. So different subsets of MRA users can access different sets of services over the same Expressway pair.

We recommend that you do not exceed ten deployments.

Deployments and their associated domains and services are configured on the Expressway-C.

One primary deployment (called "Default deployment" unless you rename it) automatically encloses all domains and services until you create and populate additional deployments. This primary deployment cannot be deleted, even if it is renamed or has no members.

To partition the services that you provide through Mobile and Remote Access, create as many deployments as you need. Associate a different domain with each one, and then associate the required Unified

Communications resources with each deployment.

You cannot associate one domain with more than one deployment. Similarly, each Unified Communications node may only be associated with one deployment.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

67

Features and Additional Configurations

Assign Deployment Partitions for UC Services

Example

Consider an implementation of two sets of Unified Communications infrastructure to provide a live MRA environment and a staging environment, respectively. This implementation might also require an isolated environment for sensitive communications, as a third set.

Figure 22: Multiple Deployments to Partition Unified Communications Services Accessed from Outside the Network

Assign Deployment Partitions for UC Services

Use this optional procedure if you have multiple internal UC clusters and you want to partition internal UC services by creating a boundary. One example where this might be useful is if you have a cluster for enterprise

UC services and a second staging cluster.

Note If you don't create any new deployments, then all internal UC applications belong to a single enterprise-wide

Default Deployment.

Procedure

Step 1

Step 2

On Expressway-C, create your deployments: a) Go to Configuration > Unified Communications > Deployments and click New .

b) Create the new deployment.

c) Repeat for each deployment that want to add.

Assign UC domains to your deployments: a) Go to Configuration > Domains .

b) Select the domain that you want to assign.

c) Select the Deployment that you want to assign to this domain.

68

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Features and Additional Configurations

Push Notifications over MRA

Step 3 d) Click Save.

e) Repeat this step to assign deployments to additional domains.

Assign UC Services to your Deployments: a) Go to Configuration > Unified Communications and select the relevant UC application.

b) Select the server that you want to assign.

c) In the Deployment field, select the deployment you want to assign.

d) Click Save .

e) Repeat for each node on each UC cluster.

Push Notifications over MRA

If your MRA deployment includes Cisco Jabber or Webex clients that run on iOS or Android devices, you must deploy Push Notifications. Without Push Notifications, your system may not be able to send calls or messages to clients that have entered into background mode.

How Push Notifications Work

When your cluster is enabled for Push Notifications, Cisco Unified Communications Manager and the IM and Presence Service use either the Apple or Google cloud’s Push Notification service to send push notifications for calls and messages to Cisco Jabber or Webex clients that run on iOS or Android devices. Push Notifications let your system communicate with the client, even after it has entered into background mode (also known as suspended mode). Without Push Notifications, the system may not be able to send calls or messages to clients that have entered into background mode.

At startup, mobile and remote Cisco Jabber or Cisco Webex clients that are installed on Android and iOS platform devices register to Cisco Unified Communications Manager and the IM and Presence Service via

Expressway-E. So long as the client remains in foreground mode, new calls or messages can be sent to the client via Expressway-E. However, once the client moves to background mode, standard communication channels are unavailable. Push Notifications provides an alternative channel to reach the client via the appropriate partner cloud (Apple or Google).

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

69

Configure Push Notifications for MRA

Features and Additional Configurations

Push Notifications Requirements

No specific configuration is needed on the Expressway for Push Notifications, assuming Expressway-E is already providing Mobile and Remote Access (MRA) for Jabber iOS devices. However, these prerequisites and recommendations apply:

• Push Notifications in the Expressway require a network connection between Cisco Jabber and the Push

Notification servers in the Apple cloud.

They cannot work in a private network, with no internet connection.

• Expressway is already providing Mobile and Remote Access for Jabber for iPhone and iPad. MRA must be fully configured (domain, zone, server settings).

• Depending on your Unified CM configuration, you may need a forward proxy to send Push Notifications to the Cisco Collaboration Cloud.

• We recommend using self-describing token authorization.

• Expressway-E restart required for Push Notifications with instant messages. After you enable Push

Notifications on the IM and Presence Service you need to restart the Expressway-E. Until the restart,

Expressway-E cannot recognize the push capability on IM and Presence Service and does not send PUSH messages to the Jabber clients.

Configure Push Notifications for MRA

The following requirements exist when deploying Push Notifications over MRA:

• OAuth token validation must be configured on Expressway.

• Unified CM must be configured to use a forward proxy server for HTTPS connections to Cisco cloud services.

70

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Features and Additional Configurations

Fast Path Registration

Note The former built-in forward proxy in Expressway is removed from the product in X12.6.2 and later versions. For earlier Expressway versions, the built-in forward proxy is not supported and should not be used.

For detailed procedures, see Push Notifications Deployment Guide .

Fast Path Registration

Fast Path Registration is available as a Preview feature in X12.7. This feature optimizes routing processes, reducing the server workload, thereby leading to increased capacities. With this feature, Expressway caches the initial routing calculation and then uses a Pre-Routed Route Header to forward subsequent packets to the destination using the cached routing result. This leads to the following benefits:

• Reduces the routing workload

• Increases registration capacity

• Ensures that each media packet follows the same route path

This feature is supported for the following SIP methods: REGISTER

Test Results with Fast Path Registration

The following table displays observed test results for a standalone Expressway pair (Expressway-C +

Expressway-E) when this feature is configured. This example assumes the Expressway pair is being used solely for MRA.

Table 11: Test Results with Fast Path Registration

Platform

CE1200

Large OVA

Medium OVA

Small OVA

Small OVA - Business

Edition 6000

MRA Registrations

7000

3500

3000

2500

2500

MRA Video Calls

500

500

150

100

100

MRA Audio Calls

1000

1000

300

200

200

Test Results of a cluster with Fast Path Registration

The following table displays observed test results of a cluster with 6 Expressways to provide 4+2 redundancy when this feature is configured. This example assumes the Expressway pair is being used solely for MRA.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

71

Features and Additional Configurations

Configure Fast Path Registration

Table 12: Test Results of a cluster with Fast Path Registration

Platform

CE1200

Large OVA

Medium OVA

Small OVA

Small OVA - Business

Edition 6000

MRA Registrations

28000

14000

12000

10000

10000

MRA Video Calls

2000

2000

600

400

400

MRA Audio Calls

4000

4000

1200

800

800

Configure Fast Path Registration

When Fast Path Registration is enabled, Expressway caches the initial routing calculation and then uses a

Pre-Routed Route Header to route subsequent packets using the cached routing result. This feature reduces the server workload, leading to increased capacities.

Procedure

Step 1

Step 2

On Expressway-E, enable Fast Path Registration by running the Pre-Routed Route Header command, along with a colon-separated list of SIP headers. For example: xConfiguration SIP PreRoutedRouteHeader: REGISTER

On Expressway-E, set both the Digest Cache Interval and Digest Cache Lifetime to 7200 with the following commands:

• xConfiguration Authentication Remote Digest Cache ExpireCheckInterval “7200”

• xConfiguration Authentication Remote Digest Cache Lifetime “7200”

Enable SIP Path Headers

The default setting for Expressway-C is to rewrite the Contact header in SIP REGISTER messages. When you enable SIP Path Headers, Expressway-C adds its address into the Path header but does not rewrite the

Contact header. This setting is required for some features to work over MRA, including:

• Shared Lines and Multiple Lines

• BiB Call Recording

• Silent Monitoring

• Key Expansion Modules

72

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Features and Additional Configurations

SIP Trunks Between Unified CM and Expressway-C

Note It's recommended that you deploy a minimum Unified CM release of 11.5(1)SU4. For details, see CSCvd84831.

Procedure

Step 1

Step 2

On Expressway-C turn on SIP Path headers: a) On Expressway-C go to Configuration > Unified Communications > Configuration .

b) Set SIP Path headers to On .

c) Click Save .

After saving your settings, refresh Unified CM Servers: a) Go to Configuration > Unified Communications > Unified CM Servers .

b) Click Refresh Servers .

SIP Trunks Between Unified CM and Expressway-C

Expressway deployments for Mobile and Remote Access do not require SIP trunk connections between Unified

CM and Expressway-C. Note that the automatically generated neighbor zones between Expressway-C and each discovered Unified CM node are not SIP trunks.

However, you may still configure a SIP trunk if required. (For example, to enable B2B callers or endpoints registered to Expressway to call endpoints registered to Unified CM.)

If a SIP trunk is configured, you must ensure that it uses a different listening port on Unified CM from that used for SIP line registrations to Unified CM. An alarm is raised on Expressway-C if a conflict is detected.

The ports used for SIP trunks are configured on both Unified CM and Expressway.

See Cisco Expressway SIP Trunk to Unified CM Deployment Guide for more information about configuring a SIP trunk.

See

Configure OAuth on UC Applications, on page 44

for information on how to configure OAuth-based authorization for SIP trunks.

Configure SIP Ports for Trunk Connections

If you have configured a SIP trunk between Expressway and Cisco Unified Communications Manager, use this procedure to configure the port settings that the trunk uses.

Procedure

Step 1 Configure SIP line registration listening ports on Unified CM: a) From Cisco Unified CM Administration, choose System > Cisco Unified CM .

b) Set the SIP Phone Port to 5060 .

c) Set the SIP Phone Secure Port to 5061 .

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

73

Features and Additional Configurations

BiB Recording over MRA

Step 2

Step 3 d) Click Save .

Configure SIP trunk listening ports on Unified CM: a) From Cisco Unified CM Administration, choose System > Security > SIP trunk Security Profile .

b) Click Find and select the profile that you are using for the SIP trunk.

c) Configure the Incoming Port to be different from the Line ports.

d) Click Save and then click Apply Config .

Configure SIP trunk listening ports on Expressway: a) On Expressway-C, go to Configuration > Zones > Zones b) Select the Unified CM neighbor zone that is used for the SIP trunk.

c) Set the SIP Port to the same value as the Incoming Port that was configured in the SIP Trunk Security

Profile.

d) Click Save .

BiB Recording over MRA

The Expressway supports Built-in-Bridge (BiB) recording over MRA. This feature can help organizations to comply with the phone recording requirements of the European Union's Markets in Financial Instruments

Directive (MiFID II).

How it Works

• BiB can be used to record the audio portion of calls that are made or received by users working off-premises.

• BiB is always enabled on the Expressway.

• BiB is configurable on Cisco Unified Communications Manager. When BiB is enabled, Unified CM forks the call to and from the endpoint to a media recording server.

Bandwidth and Capacity Requirements

If you plan to use this feature, be aware that it has significant impact on bandwidth and call capacity:

• It requires additional network bandwidth to be provisioned. Details are provided in the “Capacity Planning for Monitoring and Recording” section of the Cisco Collaboration System 12.x Solution Reference

Network Designs (SRND) . Enabling BiB for MRA endpoints typically needs double bandwidth as, assuming both sides of the call are recorded, each BiB-enabled call consumes double the usual bandwidth.

• Enabling BiB on MRA endpoints reduces the overall call capacity of Expressway nodes down to approximately one-third of their original capacity. This is because each call that is being recorded has two additional SIP dialogs associated with it (so essentially equivalent to three calls).

Configuration Requirements

To deploy BiB Recording over MRA, configure the following:

74

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Features and Additional Configurations

HTTP Allow List

• BiB Recording must be configured on Cisco Unified Communications Manager. For detailed procedures, see the "Call Recording" chapter of the Feature Configuration Guide for Cisco Unified Communications

Manager .

• SIP Path Headers must be enabled on Expressway. For details, see

Enable SIP Path Headers, on page

72 .

In addition, the following requirements must be met:

• Compatible clients are required:

• Cisco Jabber for Windows 11.9

• Cisco Jabber for Mac 11.9

• Cisco Jabber for iPhone and iPad 11.9

• Cisco Jabber for Android 11.9

• Cisco IP Phone 7800 Series, Cisco IP Conference Phone 7832, or Cisco IP Phone 8800 Series devices which support MRA (not all these phones are MRA-compatible)

• The phones which currently support MRA are listed in the MRA Infrastructure Requirements section of this guide or ask your Cisco representative for details.

• Registrar/call control agent: Cisco Unified Communications Manager 11.5(1)SU3 BiB is not supported on Expressway-registered endpoints.

• Edge traversal: Expressway X8.11.1 or later

• Recording server: Out of scope for this document. (Information about configuring recording for Cisco

Unified Communications Manager is available in the Feature Configuration Guide for Cisco Unified

Communications Manager .)

HTTP Allow List

The HTTP Allow list is a type of access list for HTTP services. Expressway-C adds both inbound and outbound rules automatically. For example, Expressway adds inbound rules automatically that allow external clients to access the Unified Communications nodes that were discovered during MRA configuration. These include

Unified CM nodes (running CallManager and TFTP service), IM and Presence Service nodes, and Cisco Unity

Connection nodes.

However, in some cases, you may need to edit the inbound rules to allow certain types of access. You cannot edit outbound rules.

• To view Inbound rules, go to Configuration > Unified Communications > HTTP allow list > Automatic inbound rules .

• To view Outbound rules, go to Configuration > Unified Communications > HTTP allow list >

Automatic outbound rules .

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

75

Features and Additional Configurations

HTTP Allow List

Editing the HTTP Allow List

You can add your own inbound rules to the HTTP Allow List if remote clients need to access other web services inside the enterprise. For example, these services may require you to configure the allow list:

• Jabber Update Server

• Cisco Extension Mobility

• Directory Photo Host

• Managed File Transfer

• Problem Report Tool server

• Visual Voicemail

<link to Appendix and other places for more info>

You can't add outbound rules to the HTTP Allow List. In addition, you can't edit or delete auto-added rules in the list.

Note For the Managed File Transfer feature to work across Expressway, make sure that all Unified CM IM and

Presence Service nodes appear on the allow list, whether manually or automatically added.

Automatic Inbound Rules

Expressway automatically edits the HTTP allow list when you discover or refresh Unified Communications nodes. This page shows the discovered nodes, and the rules that apply to those nodes.

The first list is Discovered nodes, and contains all the nodes currently known to this Expressway-C. For each node, the list contains the node's address, its type, and the address of its publisher.

The second list is the rules that have been added for you, to control client access to the different types of

Unified Communications nodes. For each type of node in your MRA configuration, you'll see one or more rules in this list. They are shown in the same format as the editable rules, but you cannot modify these rules.

Table 13: Properties of Automatically Added Allow List Rules

Column

Type

Description

This rule affects all nodes of the listed type:

• Unified CM servers: Cisco Unified Communications Manager nodes

• IM and Presence Service nodes: Cisco Unified Communications Manager IM and

Presence Service nodes

• Unity Connection servers: Cisco Unity Connection nodes

• TFTP: TFTP nodes

Protocol

Ports

The protocol on which the rule allows clients to communicate with these types of nodes.

The ports on which the rule allows clients to communicate with these types of nodes.

76

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Features and Additional Configurations

Edit the HTTP Allow List

Column

Match type

Path

Methods

Description

Exact or Prefix . Depends on the nature of the service the clients access with the help of this rule.

The path to the resource that clients access with the help of this rule. This may not be present or may only be a partial match of the actual resource, if the rule allows Prefix match.

The HTTP methods that will be allowed through by this rule (such as GET ).

Edit the HTTP Allow List

Procedure

Step 1

Step 2

Step 3

Step 4

Step 5

Go to Configuration > Unified Communications > HTTP allow list > Editable inbound rules to view, create, modify, or delete HTTP allow list rules.

The page has two areas: one for controlling the default HTTP methods, and the other showing the editable rules.

(Optional) Use the check boxes to modify the set of default HTTP methods, then click Save .

You can override the defaults while you're editing individual rules. If you want to be as secure as possible, clear all methods from the default set and specify methods on a per rule basis.

When you change the default methods, all rules that you previously created with the default methods will use the new defaults.

[Recommended] Delete any rules you don't need by checking the boxes in the left column, then clicking

Delete .

Click New to create a rule.

Configure the rule to your requirements.

Here is some advice for each of the fields.

Table 14: Properties of Manually Added Allow List Rules

Column

Description

Description

Enter a meaningful description for this rule, to help you recognize its purpose.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

77

Features and Additional Configurations

Upload Rules to the HTTP Allow List

Step 6

Step 7

Column

Url

Allowed methods

Match type

Deployment

Description

Specify a URL that MRA clients can access. For example, to allow access to http://www.example.com:8080/resource/path , just type it in exactly like that.

• The protocol the clients are using to access the host must be http:// or https://

• Specify a port when using a non-default port, for example, :8080

(Default ports are 80 (http) and 443 (https))

• Specify the path to limit the rule scope (more secure), for example, /resource/path

If you select Prefix match for this rule, you can use a partial path or omit the path.

Be aware that this could be a security risk if the target resources are not resilient to malformed URLs.

Select Use defaults or Choose methods .

If you choose specific HTTP methods for this rule, they will override the defaults you chose for all rules.

Select Exact match or Prefix match .

Your decision here depends on your environment. It is more secure to use exact matches, but you may need more rules. It is more convenient to use prefix matches, but there is some risk of unintentionally exposing server resources.

If you are using multiple deployments for your MRA environment, you also need to choose which deployment uses the new rule. You won't see this field unless you have more than one deployment.

Click Create Entry to save the rule and return to the editable allow list.

(Optional) Click View/Edit to change the rule.

Upload Rules to the HTTP Allow List

Note You cannot upload outbound rules.

Procedure

Step 1

Step 2

Step 3

Go to Configuration > Unified Communications > HTTP allow list > Upload rules .

Browse to and select the CSV file containing your rule definitions.

See

Allow List Rules File Reference, on page 119

.

Click Upload .

78

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Features and Additional Configurations

Dial via Office Reverse over MRA

The Expressway responds with a success message and displays the Editable inbound rules page.

Dial via Office Reverse over MRA

Mobile workers need the same high quality, security, and reliability as when they place calls in the office.

You can assure them of that when you enable the Dial via Office-Reverse (DVO-R) feature and they are using

Cisco Jabber on a dual-mode mobile device. DVO-R routes Cisco Jabber calls through the enterprise automatically.

DVO-R handles call signaling and voice media separately. Call signaling, including the signaling for Mobile and Remote Access on Expressway, traverses the IP connection between the client and Cisco Unified

Communications Manager. Voice media traverses the cellular interface and hairpins at the enterprise Public

Switched Telephone Network (PSTN) gateway. Moving audio to the cellular interface ensures high-quality calls and securely maintained audio even when the IP connection is lost.

You can configure DVO-R so that, when a user makes a call, the return call from Cisco Unified Communications

Manager goes to either:

• The user’s Mobile Identity (mobile number).

• An Alternate Number for the user (such as a hotel room).

Call Flow Examples for DVO-R over MRA

The following call flow describes a Dial via Office Reverse over MRA call when you are sending the return call to either a mobile identity or an alternate number. Refer to the subsequent images for illustrations of the call flow.

1.

When you dial a number, a signal is sent to Cisco Unified Communications Manager over the IP path

(WLAN or mobile network).

2.

Cisco Unified Communications Manager calls your mobile number or the Alternate Number that you set.

3.

When you answer, Cisco Unified Communications Manager extends the call to the number you dialed, and you hear ring back.

4.

When the person answers, the ongoing call is hairpinned at the enterprise PSTN gateway and the following occurs:

• With a mobile Identity, your call is anchored at the enterprise gateway. The call is active on your mobile and desk phone, so you can switch between the two.

• With an alternate number, your ongoing call is not anchored, and you cannot pick up on your desk phone.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

79

Dial via Office Reverse over MRA

Figure 23: DVO-R over MRA with Mobile Identity

Features and Additional Configurations

Figure 24: DVO-R over MRA with Alternate Number

DVO Requirements

This feature requires the following versions of related systems:

• Cisco Unified Communications Manager 11.0(1) or later

• Cisco Jabber 11.1 or later

Additional Notes

• You can use Dual Tone Multi Frequency-based (DTMF) mid-call features (for example *81 for hold) on anchored calls if there is out-of-band DTMF relay between the PSTN gateway and Cisco Unified

Communications Manager. You cannot utilize mid-call features when using an Alternate Number.

• To prevent the callback leg from Cisco Unified Communications Manager routing to your voicemail—thus stopping the voicemail call going through to the person you are dialing—Cisco recommends that you

80

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Features and Additional Configurations

Configure Dial via Office-Reverse over MRA set your DVO-R voicemail policy to ‘user controlled’. This ensures you must generate a DTMF tone by pressing any key on the keypad before your call can proceed.

Configure Dial via Office-Reverse over MRA

There is no Expressway configuration requirement to make DVO-R work over MRA. However, there is configuration that is required on the Unified CM nodes and Cisco Jabber clients. The high-level configuration is as follows:

Procedure

Step 1

Step 2

Step 3

Step 4

Step 5

Set up Cisco Unified Communications Manager to support DVO-R.

Set up DVO-R for each device.

Set up user-controlled voicemail avoidance.

Add Remote Destination (optional).

Configure Cisco Jabber client settings.

Note For a detailed configuration example that describes how to configure your UC applications and clients to make Dial via Office-Reverse to work over Mobile and Remote Access, see Configuring Dial via Office-Reverse to Work with Mobile and Remote Access at https://www.cisco.com/c/en/us/support/docs/ unified-communications/expressway/200198-Configuring-Dial-via-Office-Reverse-to-W.html

.

Multi-cluster Best Practices

This section outlines tips and best practices for configuring multi-cluster MRA Deployments. Following are some Best Practices to keep in mind when configuring multi-cluster MRA deployments:

• Every Expressway-C cluster must be able to connect to every UC cluster. Otherwise, Expressway-C can’t proxy requests to all the UC clusters. On the primary peer of each Expressway-C cluster, add the publisher node for each UC cluster that Expressway-C must reach and then refresh servers. This will populate Expressway-C with the remaining subscriber nodes from the various UC clusters.

• If some clusters are sharing SIP domains: you must enable the Home Cluster setting for each user so that each user is assigned to a specific cluster. This setting appears in the End User Configuration window of Cisco Unified Communications Manager.

• If you have multiple Unified CM clusters within the same domain, the Intercluster Lookup Service (ILS) is recommended, particularly for large intercluster networks. After an initial setup, ILS provides automatic

Cluster Discovery and dial plan replication across the ILS network. However, note that ILS is not mandatory as you can configure cluster discovery manually. For details on how to configure an ILS network, see the System Configuration Guide for Cisco Unified Communications Manager .

• If you have multiple IM and Presence Service clusters within the same domain, you must configure intercluster peering with the Intercluster Sync Agent (ICSA) for the IM and Presence clusters that are in

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

81

Features and Additional Configurations

Multi-cluster Best Practices the same domain. For details on how to configure intercluster peering, see the Configuration and

Administration Guide for the IM and Presence Service .

• If you have multiple edge clusters, configure load balancing between them:

• If those edges are in same datacenter, you can use DNS SRVs for load balancing

• If the edges are split across geographical boundaries (different cities or even continent), you can use GeoDNS, See below for an example of how to use GeoDNS SRV records to route requests to the appropriate Edge server:

GeoDNS Examples for Multi-cluster

GeoDNS over MRA is supported for the specific purpose of providing the nearest Expressway when the client is relatively distant from the Expressway that is used for MRA. This helps to minimize latency and network delays.

The following example illustrates a multi-cluster deployment with two Expressway-C clusters that connect to multiple Unified CM clusters. This example uses a single domain, but with two geographically displaced

Expressway clusters, thereby providing two enterprise edges. Depending on the DNS provider, you can apply

GeoDNS to SRV or CNAME record (SRV is preferred if available). Following are two examples of how to use GeoDNS where there are two Edge domains (one Edge in Europe and another in the US).

The preferred SRV approach, if the DNS provider supports it, is to create SRV records with priority settings that are based on the user's location (for example, the US or Europe). The SRV uses the user’s location and the priority setting that is assigned to each Edge server to determine the server to which the request is sent. If that request fails, the other server provides a backup option.

82

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Features and Additional Configurations

Multidomain Best Practices

Table 15: GeoDNS in SRV Records (Preferred approach)

SRV Records

_collab-edge.tls.example.com

_sips_tcp.example.com

User Location

US

Route to... (priority)

• us-expc.example.com (10)

• eur-expc.example.com (20)

Europe • eur-expc.example.com (10)

• us-expc.example.com (20)

Following is an example of a GeoDNS SRV configuration record that routes to two CNAME aliases (a main alias and a backup CNAME with a lower priority). Each CNAME record routes the call to different servers based on the user location. If the main CNAME fails, the backup CNAME sends the call to a server in a different region (a NA user is routed to a European-based Expressway).

Table 16: GeoDNS routing via CNAME

SRV Records Route to CNAME (priority) User

Location

_collab-edge.tls.example.com

_sips_tcp.example.com

alias1.example.com

(10) US

Europe backup-alias1.example.com

(20)

US

Europe

Route to...

us-expc.example.com

eur-expc.example.com

eur-expc.example.com

us-expc.example.com

Note For SRV approach, leave the weight setting in the SRV the same for all records.

Note You may also need to configure geographically based Calling Search Spaces and partitions on Unified CMso that you can route calls based on the caller’s location. For example, you can create geographically based calling search spaces (a CSS for a specific city) and place all the phones that are in that city within that CSS

(one CSS may be called “New_York_CSS” and a different CSS may be called “Chicago_CSS”)

For a more detailed discussion, see “Scaling the Collaboration Edge Solution” in the Preferred Architecture for Cisco Collaboration 12.x Enterprise On-Premises Deployments, CVD at https://www.cisco.com/c/en/us/ td/docs/solutions/CVD/Collaboration/enterprise/12x/120/collbcvd/edge.html#pgfId-1081382 .

Multidomain Best Practices

This section outlines domain-related information and configuration processes for customers whom want to deploy MRA with multiple domains. The ideal scenario for Mobile and Remote Access is a single domain for all Collaboration applications and endpoints, but this may not be possible in all cases. Depending on your

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

83

Features and Additional Configurations

Multidomain Best Practices network, a multi-domain setup can have varying levels of complexity, so it’s important to understand the different contexts within which the domain settings can be used.

Multiple Edge Domains

The following image illustrates a basic multi-domain scenario where the internal UC domain is different from the external domain.

Figure 25: Multiple Edge Domains

Note MRA endpoints must have connectivity to the external public DNS server so that they can reach Expressway-E.

Multiple Domains with Separate Deployments

The following example illustrates a more complex multi-domain scenario where the internal UC environment is split into two Deployments: the Default UC Deployment, which encompasses the main UC applications, including both Expressways and a second Staging deployment. The two deployments are located in different domains. The Default Deployment has multiple UC clusters with ILS and ICSA being used to sync data between the internal clusters. This example also uses a cloud-based Identity Provider that is located in a separate external IdP domain.

84

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Features and Additional Configurations

Figure 26: Multiple Domains with Separate Deployments

Multidomain Best Practices

Domain Glossary

The following table outlines the different contexts in which the domain term may be used within an MRA

Deployment and how to set them on Expressway. Depending on your deployment, the same domain may be applied for all these contexts.

Table 17: Domain Glossary

Term Description

Edge domain This term refers to the remote domain in which remote MRA endpoints connect to the on-premises UC network. This is configured on Expressway-C under the

Configuration > Domain menu, and communicated to Expressway-E over the UC

Traversal zone

Expressway Server

Domain

For both Expressway-C and Expressway-E, the domain is a part of each server’s FQDN address and is provisioned in the System > DNS window on each respective server.

Each server supports a single domain only.

Internal UC Domain This is the domain for internal UC applications such as Cisco Unified Communications

Manager and the IM and Presence Service. These applications may be located in the same domain as Expressway or they may be in a different domain.

Note If the internal UC applications are in a different domain than Expressway, then you must use FQDNs or IP addresses as server addresses for the UC server addresses. FQDNs are preferred.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

85

Features and Additional Configurations

Multidomain Configuration Summary

Term

Presence Domains

MRA Activation

Domain

MRA Service

Domain

Description

Presence domains are configured on the IM and Presence Service and may be used in the client’s IM address (for example, user@domain).

Note For MRA clients, if the Presence Domain is not the same as the Edge domain, add the Presence Domain to the Domain list on Expressway-C.

Note Multiple Presence Domains over MRA is supported from Expressway

X12.6.3 with IM and Presence Service, Release 10.0(1) or later. However, it's recommended that you do not exceed 75 domains within a single deployment.

If you are using activation code onboarding of MRA endpoints, the MRA Activation

Domain is configured on Unified CM during the cloud onboarding process, representing the domain where MRA endpoints for that cluster must connect for the initial device activation. Each cluster can have a single MRA Activation Domain only.

If you are using activation code onboarding of MRA endpoints, the MRA Service

Domain is configured on Unified CM, representing the remote Edge domain where the endpoint connects for normal MRA use. If you have multiple Expressway clusters, the MRA Service Domain lets you specify which Expressway cluster is used for normal

MRA operation.

After an MRA device activates within the MRA Activation Domain, the device downloads its configuration file, which contains a redirect to the assigned MRA Service

Domain. The device then looks up the _collab_edge SRV for that domain and attempts to register via the Expressway cluster that is assigned to the domain.

MRA Service Domains can be applied to endpoints at the cluster, device pool, or individual device level.

Note The MRA Activation domain gets added automatically to the list of available

MRA Service Domains for a Unified CM cluster.

Multidomain Configuration Summary

The following table provides a configuration summary of domain-specific tasks for multidomain MRA scenarios.

Note This summary does not replace the main configuration flow for setting up a basic MRA deployment—you can configure your system to support MRA over multiple domains by following the main configuration flow.

However, for complex multidomain scenarios, this summary provides a helpful checklist of domain-specific tasks that you can use to verify that your domain setup is correct.

Table 18: MRA Multidomain Configuration Summary

Steps

Step 1

Task

Configure the Host Name and Domain Name for Expressway servers.

See

Set Expressway Server Address, on page 30 .

86

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Features and Additional Configurations

Multidomain Configuration Summary

Steps

Step 2

Step 3

Step 4

Step 5

Step 6

Task

On Expressway-C, add the domains for which MRA registration, call control, provisioning, messaging, and presence services are to be routed to Unified CM. This may include:

• Internal UC domains

• Edge domains (if they are different from the internal domains)

• Presence domains (if they are different from the other domains).

See

Add Domains, on page 32 .

(Optional). Assign Deployments to internal UC Applications. This optional configuration lets you partition internal UC services. For example, you could use this configuration to partition your main Production cluster off from a separate Staging cluster.

See

Assign Deployment Partitions for UC Services, on page 68

.

Configure Internal DNS entries:

1.

Configure

_cisco-uds._tcp.<domain>

SRV records for each Unified CM domain.

2.

Create forward and reverse lookups for each Unified CM and IM and Presence node.

3.

Configure A and PTR records that point Expressway-C to Expressway-E.

Note As of X12.6, the

_cisco_uds.tcp.example.com

internal SRV record is no longer mandatory for MRA endpoints to be able to reach the correct UC cluster. However, note that this SRV record is still required if you are deploying on-premises Cisco

Jabber and Webex clients.

See

Local DNS (Internal Domains), on page 13

.

Configure Public DNS:

1.

On Expressway-E, configure

_collab-edge._tls.<domain> and

_sips_tcp.<domain>

DNS SRV records for each Edge domain.

2.

Configure A records that point the Expressway-E hostname to the public IP address of

Expressway-E.

Note MRA endpoints must have connectivity to the Public DNS server so that they can reach Expressway-E.

See

Public DNS (External Domains), on page 13 .

Warning Expressway-E Fully Qualified Domain Name (FQDN) must match with the SRV

A record to establish connectivity between MRA endpoints and the Public DNS server so that they can reach Expressway-E.

Configure Expressway-E certificates. Make sure that the Expressway-E certificate includes each Unified CM registration domain.

For details, see

Certificate Requirements, on page 17 .

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

87

Features and Additional Configurations

Session Persistency

Steps

Step 7

Step 8

Task

If you are deploying SAML SSO, associate the appropriate domain to your Identity Provider:

See

Associate Domains with an IdP, on page 48 .

If you are using Device Activation Codes to provision MRA clients, provision a clusterwide

MRA Activation Domain on Unified CM for MRA onboarding.

In addition, provision any MRA Service Domains with the edge domains that you want users to use after their device activates.

See

MRA Device Onboarding Configuration Flow, on page 92 .

(Optional) Using SRVs to create Alias FQDNs for Expressway-E

An optional approach if you have multiple Edge domains is to use SRV records to create an alias domain for

Expressway-E, which would simulate multiple Expressway-E FQDNs. For example, if you have an

Expressway-E server in example.com and you have two edge domains (example.com and staging.com):

• For each Edge domain, configure the _collab_edge SRV to point to the Expressway-E FQDN address as if it were a part of that Edge domain (for example, an SRV that points to expe.example.com and another that points to expe.staging.com).

• For each FQDN, configure A records that point to the public IP address of Expressway-E.

Session Persistency

Session Persistency enhances the user experience while roaming and allows Webex apps to do the following:

• Roam between different Access points in a network.

• Roam between different networks (For example, Wi-Fi, VPN over 3G/4G) without having to re-register.

• Maintain the SIP-based subscription status while roaming between different networks.

• Maintain registration in the case of network connectivity loss.

• Seamlessly transit both active and held calls from one network to another without call drops.

To facilitate connectivity during roaming between networks, Session Persistency allows dynamic IP address/port change via keep-alive registration. In addition, the feature includes a configurable TCP reconnect timer, which must be enabled at the product level, to allow Webex apps clients to remain connected in case of a temporary network connectivity loss or roaming. The timer is in effect only when the clients tear down the original TCP connection explicitly. To leverage the Session Persistency feature, you must comply with Cisco-defined SIP interfaces.

For example, if you are in an active Webex apps client call inside the office and walk outside the building losing Wi-Fi connectivity, the call would now continue as the client switches to Mobile and Remote Access through Expressway. Likewise, you will not see call drops if the client switches from Mobile and Remote

Access through Expressway to the office Wi-Fi network.

88

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Onboarding MRA Devices

C H A P T E R

6

MRA Device Onboarding via Activation Codes, on page 89

Device Onboarding Prerequisites, on page 91

MRA Device Onboarding Configuration Flow, on page 92

Activate Phones, on page 95

Additional Options for Secure Onboarding, on page 95

MRA Device Onboarding via Activation Codes

Activation Codes provide a simple and secure way to onboard remote endpoints for Mobile and Remote

Access (MRA). This feature eliminates the need for an MRA user to be on-premises the first time they use their phones. Remote users can plug in the phone, enter the activation code, and then start placing calls.

This feature leverages the Cisco cloud to handle onboarding. An administrator onboards Cisco Unified

Communications Manager to the cloud, specifying the clusterwide MRA Activation Domain with the

Expressway cluster to which all remote MRA users connect during device activation.

If you have multiple Expressway clusters, MRA Service Domains let you specify which Expressway your phones register. After the phone activates, the phone downloads its configuration file, which contains a redirect to the MRA Service Domain with the Expressway cluster that is assigned to that phone.

What is an Activation Code?

An activation code is a single-use, 16-digit value that a user must enter on a phone before registering the phone. The user must enter the correct code, or the phone does not register. Activation codes provide a secure method to onboard phones without requiring an administrator to collect and input the MAC Address for each phone manually.

Custom Certificates (Optional)

If you want to use your own certificates, you can use the cloud to distribute certificates to MRA phones so that they can establish trust with Expressway. With this option, you must upload your certificates first to

Expressway, and then to the PhoneEdge-trust store on Cisco Unified Communications Manager. The certificates are uploaded to the Cisco cloud so that the phone can download them during the device activation process.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

89

Onboarding MRA Devices

MRA Onboarding Process Flow

MRA Onboarding Process Flow

The below table contains the process flow for onboarding new MRA phones via Device Activation Code

Onboarding in MRA mode. Match each numbered step to the subsequent graphic for an illustration of the process.

Note When you start Device Activation Service on UCM publisher to on-board clients over Mobile and Remote

Access, you need to start the UDS and CCM services as well. Moreover, delete and rediscover the UCM cluster in Unified Communications configuration in Expressway-C, as doing a refresh of servers will not work.

Process

Step

0

Process Flow

1

2

3

4

5

6

7

8

Administrator configures Cloud Onboarding and specifies the MRA Activation Domain and any MRA Service Domains.

Administrator provisions full device configuration without specifying the MAC address. The device name will be a random BAT MAC address.

Administrator requests activation code for this device. Device Activation Service requests the code from the cloud-based device activation service.

Activation Code is sent to the user (either via email or via the Self-Care Portal).

User enters the activation code. Phone gets the MRA target from the cloud.

Phone learns the location of Expressway and authenticates using the MIC + activation code in an SRP handshake.

Device activation service updates the device configuration in the database with the phone MAC and sends success to the phone

The phone can register and gets its phone specific configuration file from TFTP and then register with Unified CM. If the phone is assigned to a different MRA Service Domain, a redirect is provided in the configuration file. The phone can then register using the MRA

Service Domain.

Device Activation Service releases the activation code from the cloud. The code can be reused in the future.

90

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Onboarding MRA Devices

Figure 27: MRA Device Onboarding Process Flow with Activation Codes

Device Onboarding Prerequisites

Device Onboarding Prerequisites

The following table has support information for Activation Code Onboarding for MRA endpoints:

Table 19: MRA Activation Code Onboarding Support Information

Support

Minimum Releases

Supported Endpoints

Details

Expressway X12.5.1

Cisco Unified Communications Manager 12.5(1)SU1

Cisco IP Phone firmware 12.5(1)SR3

Cisco IP Phones 7811, 7821, 7832, 7841, 7861, 8811, 8832, 8832NR, 8841,

8845, 8851, 8851NR, 8861, 8865, 8865NR

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

91

Onboarding MRA Devices

MRA Device Onboarding Configuration Flow

Note As of release X14.0, if you are onboarding supported Cisco IP Phone 78xx Series and 88xx Series phones for

Mobile and Remote Access, the phones switch to MRA mode only if the Allow Activation Code via MRA checkbox is checked within the Phone Configuration window of Cisco Unified Communications Manager .

Using this approach, you must configure Activation Code onboarding for MRA phones. In addition, the MRA phone user must enter the correct activation code to activate and use the phone.

For details on configuring Activation Code Onboarding, see the “Device Onboarding via Activation Codes” chapter of Feature Configuration Guide for Cisco Unified Communications Manager .

In addition, the following prerequisites exist:

• If you’ve upgraded Expressway from a release prior to X12.5, refresh your Unified CM servers on

Expressway-C before you configure this feature. On Expressway-C go to Configuration > Unified

Communications > Unified CM servers and click Refresh servers .

• Cisco Device Activation Service —This service must be running on Cisco Unified Communications

Manager (the service is running by default). Check the list of services in Cisco Unified Serviceability to verify the service is running.

• OAuth Refresh Logins —This feature must be enabled in Cisco Unified Communications Manager by setting the OAuth Refresh Login Flow enterprise parameter to Enabled .

• Self-Care Portal —If you want users to be able to use the Self-Care Portal to activate their phones:

• The Show Phones Ready to Activate enterprise parameter must be set to True in Cisco Unified

Communications Manager.

• End users require login access to the portal. See the “Self-Care Portal” chapter of the Feature

Configuration Guide for Cisco Unified Communications Manager for Self-Care configuration details.

• The Self-Care Portal is not supported over MRA so remote users may need a VPN to access the portal.

• DNS SRV records —For the MRA Activation Domain and any MRA Service Domains, you must configure _collab_edge SRVs that point to the appropriate Expressway clusters.

MRA Device Onboarding Configuration Flow

Follow these procedures to configure MRA Device Onboarding using activation codes in MRA mode.

92

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Onboarding MRA Devices

MRA Device Onboarding Configuration Flow

Steps

Step 1

Step 2

Step 3

Procedures

Enable OAuth Authentication in Cisco Unified Communications Manager and Expressway:

1.

Enable OAuth on Cisco Unified Communications Manager: a.

From Cisco Unified CM Administration, go to System > Enterprise Parameters .

b.

Set the OAuth Refresh Login Flow parameter to Enabled .

c.

Click Save .

2.

Enable OAuth Refresh authentication on Expressway: a.

Go to Configuration > Unified Communications > Configuration > MRA Access

Control .

b.

Set Authorize by OAuth token with refresh to On .

c.

Click Save .

Onboard Cisco Unified Communications Manager to the cloud for MRA activation code onboarding.

1.

From Cisco Unified CM Administration, choose Advanced Features > Cisco Cloud

Onboarding .

2.

Click the Generate Voucher button.

3.

Check the Enable Activation Code Onboarding with Cisco Cloud check box.

4.

Specify the MRA Activation Domain .

5.

Click Save .

Note • Collab-edge DNS records must exist for the MRA Activation domain.

• There is a limit of one MRA Activation Domain per cluster. The MRA

Activation is added automatically to the list of MRA Service Domains.

Configure MRA Service Domains.

1.

From Cisco Unified CM Administration, choose Advanced Features > MRA Service

Domains .

2.

If you have multiple Expressway clusters, add each domain where your MRA endpoints will operate.

3.

Check the IsDefault check box, if you want a domain to be applied as a clusterwide default

MRA Service domain.

4.

Click Save .

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

93

Onboarding MRA Devices

MRA Device Onboarding Configuration Flow

Steps

Step 4

Step 5

Step 6

Step 7

Step 8

Step 9

Procedures

Optional. Assign an MRA Service Domain to an existing device pool. This lets you assign a specific Expressway cluster to all MRA devices that use the device pool.

1.

From Cisco Unified CM Administration, choose System > Device Pool .

2.

Click Find and select the appropriate device pool.

3.

From the MRA Service Domain drop-down, select the domain that you want to assign to devices that use this device pool.

4.

Click Save .

Configure MRA Access Control to allow activation code onboarding:

1.

From Expressway-C, choose Configuration > Unified Communications > Configuration .

2.

Set Authorize by OAuth token with refresh to On .

3.

Set Allow activation code onboarding to Yes .

Check Trusted Cisco manufacturing certificates (MICs) installed. They are required to access the activation code onboarding functionality:

1.

On Expressway-E, choose Maintenance > Security certificates > Trusted CA certificates .

2.

Click Activate code onboarding trusted CA certificates .

Optional. If you want to use your own custom certificates (:

1.

Upload the certificates to Expressway.

2.

Upload certificates to PhoneEdge-trust on Unified Communications Manager.

Unified Communications Manager uploads the certificates to the cloud. During the activation process, the phone downloads the certificates from the cloud, thereby ensuring that the phone can communicate with Expressway.

Provision the phone in the Cisco Unified Communications Manager database using any accepted provisioning method. No matter which option you choose, make sure that both of the following check boxes are checked:

• Requires Activation Code Onboarding

• Allow Activation Code via MRA

Note You can provision the phone with a dummy MAC address. The onboarding process updates the Device Name using the phone's actual MAC address.

For sample provisioning procedures using either the GUI or Bulk Administration, see the “Device Onboarding via Activation Codes” chapter of the System

Configuration Guide for Cisco Unified Communications Manager, Release

12.5(1)SU1 or later.

Ship the phone to the MRA users.

94

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Onboarding MRA Devices

Activate Phones

Activate Phones

Administrators have two options for sending activation codes to phone users:

• Self-Care Portal—Phone users can log in to the portal to view their phone's activation code and an accompanying barcode. They can either key the activation code onto the phone or use the phone's video camera to scan the barcode—both methods work. Review Device Onboarding Prerequisites for information about Self-Care requirements.

• CSV File Export—In Cisco Unified Communications Manager, administrators can export a csv file of outstanding activation codes and associated users. They can use the contents of this file to notify MRA users with their activation codes. To export a csv file:

1.

From Cisco Unified CM Administration, choose Device > Phone .

2.

From Related Links , select Export Activation Codes and click Go .

Note Activation Codes have a default lifetime of 168 hours (7 days). You can reconfigure this value via the

Activation Time to Live (Hours) service parameter in Cisco Unified Communications Manager. If the activation code expires, the administrator can click Release Activation Code and then Generate New

Activation Code from the Phone Configuration window in order to reset the activation code.

Entering the Activation Codes

When an MRA user plugs in their phone, they are prompted to enter the activation code. Once they enter the activation code, or scan the barcode that displays in Self-Care, the phone onboards, downloads its configuration file, and registers.

The phone is now ready to use.

Additional Options for Secure Onboarding

The following options slightly modify the configuration process for added security:

Option 1: Administrator provisions phone with actual MAC address

Rather than using a dummy MAC address, the administrator adds the phone to Cisco Unified Communications

Manager with the actual MAC address. This method ties the activation code to the actual phone MAC address, enhancing security as the activation code works on that phone only. However, this method requires that the administrator collect and enter each phone MAC address individually.

Option 2: Administrator activates phone on-Premises before sending to Remote User for reonboarding in

MRA mode

With this method, the administrator activates the phone in on-premises mode before resetting the activation code requirement and shipping to the MRA user, who will activate the phone in MRA mode.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

95

Onboarding MRA Devices

Additional Options for Secure Onboarding

• Administrator configures Activation Code Onboarding (On-Premises mode) and provisions the phone with a dummy MAC address.

• Administrator onboards and registers the phone in the on-premises environment. This process updates the Device Name in Cisco Unified Communications Manager with the actual phone MAC address and lets the phone updates its firmware load.

• The administrator configures Activation Code Onboarding for MRA mode, resets the activation code requirement thereby locking the phone until the new code is entered.

Note In the Phone Configuration window, both of the following check boxes must be checked as they reset the activation code and lock the phone:

• Requires Activation Code Onboarding

• Allow Activation Code via MRA

• The administrator ships the phone to the MRA user and provides the user with the new activation code.

• The remote MRA user must enter the new activation code in order to use the phone.

This option provides the following benefits:

• Improves security as the activation code is tied to the MAC address and works for that phone only.

• Ensures that phone firmware is already up to date when the user receives the phone.

• Does not require the administrator to collect and input individual MAC addresses.

For information on how to configure activation code onboarding in On-Premises mode, see the On-Premises tasks in the “Device Onboarding via Activation Codes” chapter of the System Configuration Guide for Cisco

Unified Communications Manager.

96

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

C H A P T E R

7

MRA Maintenance

Maintenance Mode on the Expressway, on page 97

MRA Registration Counts, on page 98

Authorization Rate Control, on page 98

Credential Caching, on page 99

SIP Registration Failover for Cisco Jabber, on page 99

Clustered Expressway Systems and Failover Considerations, on page 101

Expressway Automated Intrusion Protection, on page 102

Check the Unified Communications Services Status, on page 103

Why You Need to Refresh the Discovered Nodes?, on page 103

Refresh Servers on the Expressway-C, on page 104

Maintenance Mode on the Expressway

Maintenance mode on the Expressway has been enhanced so that you can bring an MRA system down in a managed way.

When you engage maintenance mode, the Expressway stops accepting new calls or proxy (MRA) traffic.

Existing calls and chat sessions are not affected.

As users end their sessions normally, the system comes to a point when it is not processing any traffic of a certain type, and then it shuts that service down.

If users try to make new calls or start new chat sessions while the Expressway is in maintenance mode, the clients will receive a service unavailable response, and they might then choose to use another peer (if they are capable). This fail-over behavior depends on the client, but restarting the client should resolve any connection issues if there are active peers in the cluster.

The Unified Communications status pages also show (Maintenance Mode) in any places where MRA services are affected.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

97

MRA Registration Counts

Figure 28: Maintenance Mode on Expressway-C

MRA Maintenance

Limitation for CE endpoints

Maintenance mode is not supported over MRA for endpoints running CE software. The Expressway drops

MRA calls from these endpoints when you enable maintenance mode.

MRA Registration Counts

From X12.6.1 onward, the Status > Overview page on Cisco Expressway-E lets you monitor up-to-date usage information for SIP devices that are registered over MRA. The Overview page contains the following fields:

MRA Registration:

• Current —The total number of devices that are currently registered over MRA.

• Peak —The peak count for MRA registrations since the last Expressway restart.

Authorization Rate Control

The Expressway can limit the number of times that any user's credentials can be used, in a given configurable period, to authorize the user for collaboration services. This feature is designed to thwart inadvertent or real denial of service attacks, which can originate from multiple client devices authorizing the same user, or from clients that reauthorize more often than necessary.

Each time a client supplies credentials to authorize the user, the Expressway checks whether this attempt would exceed the Maximum authorizations per period within the previous number of seconds specified by the Rate control period .

If the attempt would exceed the chosen maximum, then the Expressway rejects the attempt and issues the

HTTP error 429 “Too Many Requests”.

The authorization rate control settings are configurable in the Advanced section of the Configuration >

Unified Communications > Configuration page.

98

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Maintenance

Credential Caching

Credential Caching

Note These settings do not apply to clients that are using SSO (common identity) for authenticating via MRA.

The Expressway caches endpoint credentials which have been authenticated by Unified CM. This caching improves overall performance because the Expressway does not always have to submit endpoint credentials to Unified CM for authentication.

The caching settings are configurable in the Advanced section of the Configuration > Unified

Communications > Configuration page.

Figure 29: Advanced Settings

Credentials refresh interval specifies the lifetime of the authentication token issued by the Expressway to a successfully authenticated client. A client that successfully authenticates should request a refresh before this token expires, or it will need to re-authenticate. The default is 480 minutes (8 hours).

Credentials cleanup interval specifies how long the Expressway waits between cache clearing operations.

Only expired tokens are removed when the cache is cleared, so this setting is the longest possible time that an expired token can remain in the cache. The default is 720 minutes (12 hours).

SIP Registration Failover for Cisco Jabber

The SIP registration failover for Cisco Jabber applies if you deploy Expressway with Mobile and Remote

Access (MRA).

Expressway X12.7 and later versions build on existing failover capabilities for clustered Expressways with a few MRA failover updates that improve substantially the failover time for Cisco Jabber clients that connect over MRA. Among the updates include adaptive routing, STUN keepalive support, and improved error reporting.

These new capabilities will allow Jabber clients to support MRA High Availability (failover) for voice and video.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

99

MRA Maintenance

SIP Registration Failover for Cisco Jabber

Adaptive routing

Adaptive routing updates in Expressway X12.7 and later versions allows Expressway to alter the routing path dynamically. If a node failure is detected, packets are rerouted to a peer node that is up and running. For example, assume that a remote Jabber client sends a SIP REGISTER that is intended to be routed through a specific Expressway-E (EXWY-E1), Expressway-C (EXWY-C1) and Unified CM (CUCM1) combination, but the designated Expressway-C node is either down or is in maintenance mode. In this case, the message is rerouted to a peer Expressway-C node (EXWY-C2) and then on to the intended Unified CM destination. After the registration, Cisco Jabber also updates its routing table so that future SIP messages use the registration path.

Note • Failover does not include call preservation. The Jabber registration fails over to the new registration path, but active calls at the time of the failure are dropped.

• Ensure that STUN keepalive is enabled for Adaptive Routing feature.

STUN keepalive support

In addition to adaptive routing, Expressway X12.7 and later versions support the use of STUN keepalives by

MRA connected Jabber clients. Remote Jabber clients send STUN keepalives into the enterprise network via

Expressway-E to learn of connection issues ahead of time. As a result, if a node in the registration path fails,

Jabber will learn of the failure after receiving the STUN response and can select a different route path for future SIP messages.

Settings

The STUN keepalive setting is configurable in the Advanced section of the Configuration > Unified

Communications > Configuration page. See

Figure 29: Advanced Settings

.

Field Description

STUN keepalive Enable STUN keepalive for Unified CM High Availability.

Default: On

Requirements

No specific configuration is required (subject of course to the necessary clustering/backup nodes existing).

However, you must be running the following minimum releases:

Routing Feature

Adaptive routing

Minimum Releases Required

1.

Expressway X12.7

2.

Cisco Jabber 12.9 MR

3.

Cisco Webex App

100

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Maintenance

Clustered Expressway Systems and Failover Considerations

Routing Feature

STUN keepalives

Minimum Releases Required

1.

Expressway X12.7

2.

Cisco Unified Communications Manager 14

3.

Cisco Jabber 12.9 MR

4.

Cisco Webex App

Note Failover is supported only when STUN keep alive is switched ON. Select On from the STUN keepalive drop-down to enable Failover. Failover does not occur if STUN keepalive is switched OFF. This feature is available through User Interface and CLI command.

Benefits with all software requirements

When all three components - clients, Expressway, Unified CM - are running updated software with MRA registration failover capabilities, the following benefits apply:

• No user action required for failover

• Faster failover times - down to 30-60 seconds from the previous standard of 120 seconds

• Route path updates dynamically to handle server failures

• More routes are available to reach the intended destination

• Remote Jabber clients can learn of server failures via STUN keepalives and adjust routing ahead of time

Adaptive routing benefit without Unified CM upgrade

Even without new Unified CM software (but with new Expressway and Jabber software), this feature has the benefit of allowing Jabber clients to detect path failures.

Note This action will take over 2 minutes, and Expressway may flag Unified CM servers as inactive in some scenarios where actually the server is just idle or has low use at the time.

Clustered Expressway Systems and Failover Considerations

You can configure a cluster of Expressway-Cs and a cluster of Expressway-Es to provide failover (redundancy) support as well as improved scalability.

Details about how to set up Expressway clusters are contained in Expressway Cluster Creation and Maintenance

Deployment Guide and information about how to configure Jabber endpoints and DNS are contained in

“Configure DNS for Cisco Jabber”.

Note that when discovering Unified CM and IM and Presence Service servers on Expressway-C, you must do this on the primary peer.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

101

MRA Maintenance

Expressway Automated Intrusion Protection

Expressway Automated Intrusion Protection

From X8.9 onwards, automated intrusion protection is enabled, by default, for the following categories:

• http-ce-auth

• http-ce-intrusion

• sshpfwd-auth

• sshpfwd-intrusion

• xmpp-intrusion

This change affects new systems. Upgraded systems keep their existing protection configuration.

On Expressway-C

The Expressway-C receives a lot of inbound traffic from Unified CM and from the Expressway-E when it is used for Mobile and Remote Access.

If you want to use automated protection on the Expressway-C, you should add exemptions for all hosts that use the automatically created neighbor zones and the Unified Communications secure traversal zone. The

Expressway does not automatically create exemptions for discovered Unified CM or related nodes.

On Expressway-E

You should enable the Automated protection service ( System > System administration ) if it is not yet running.

To protect against malicious attempts to access the HTTP proxy, you can configure automated intrusion protection on the Expressway-E ( System > Protection > Automated detection > Configuration ).

We recommend that you enable the following categories on the Expressway-E:

• HTTP proxy authorization failure and HTTP proxy protocol violation. Do not enable the HTTP proxy resource access failure category.

• XMPP protocol violation

Note The Automated protection service uses Fail2ban software. It protects against brute force attacks that originate from a single source IP address.

Configure Exemptions

If you have Automated Intrusion Protection configured, use this procedure to configure exemptions for IP address ranges from one or more protection categories.

One example where you may need an exemption is if you have multiple MRA users connected behind a NAT using the same public IP address. This may trigger protection due to the incoming traffic from the single IP address.

102

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Maintenance

Check the Unified Communications Services Status

Note This procedure assumes you have the Automated Intrusion Protection enabled on Expressway-E and disabled on Expressway-C, which is the recommended deployment.

Procedure

Step 1

Step 2

Step 3

Step 4

Step 5

On Expressway-E, go to System > Protection > Automated detection > Exemptions .

Click on the Address that you want to configure or click New to configure a new address.

Enter the Address and Prefix Length to define the IP address range that you want to exempt.

Select from the categories to which you want to apply the exemption. For the example situation where you have multiple users behind a NAT, the following categories would apply:

• HTTP Proxy Authentication Failure

• HTTP Proxy Resource Access Failure

• SIP Authentication Failure

Click Add Address .

Check the Unified Communications Services Status

You can check the status of the Unified Communications services on both Expressway-C and Expressway-E.

Procedure

Step 1

Step 2

Go to Status > Unified Communications .

Review the list and status of domains, zones and (Expressway-C only) Unified CM and IM and Presence

Service servers.

The page displays any configuration errors along with links to the relevant configuration page that you access to address the issue.

Why You Need to Refresh the Discovered Nodes?

When the Expressway-C discovers a Unified Communications node, it establishes a connection to read the information required to create zones and search rules to proxy requests originating from outside of the network in towards that node.

This configuration information is static.

Expressway only reads it when you manually initiate discovery of a new node, or when you refresh the configuration of previously discovered nodes. If any related configuration has changed on a node after you discover it, the mismatch between the new configuration and what the Expressway-C knows of that node is likely to cause some kind of failure.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

103

MRA Maintenance

Refresh Servers on the Expressway-C

The information that the Expressway-C reads from the Unified Communications node is different for each node type/role. These are examples of UC configuration that you can expect to require a refresh from the

Expressway. The list is not exhaustive. If you suspect that a configuration change on a node is affecting MRA services, you should refresh those nodes to eliminate one known source of potential problems.

• Changing cluster (such as adding or removing a node)

• Changing security parameters (such as enabling Mixed Mode)

• Changing connection sockets (such as SIP port configuration)

• Changing TFTP server configuration

• Upgrading node software

Devices cannot connect during the refresh

It takes some time to restore services after a server refresh and while the refresh is in progress, Jabber clients and other endpoints are unable to connect over MRA. It is not possible to provide accurate timings as they vary depending on the deployment. For straightforward deployments the refresh typically takes 5 to 10 seconds, but very complex configurations may take upwards of 45 seconds.

Refresh Servers on the Expressway-C

You must refresh the Cisco Unified Communications Manager and Cisco Unity Connection nodes defined on the Expressway-C. This fetches keys that the Expressway needs to decrypt the tokens.

Procedure

Step 1

Step 2

For Unified CM, go to Configuration > Unified Communications > Unified CM servers and click Refresh servers .

For Unity Connection, go to Configuration > Unified Communications > Unity Connection servers and click Refresh servers .

104

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

C H A P T E R

8

MRA Troubleshooting

General Techniques, on page 105

Registration Issues, on page 110

Cisco Expressway Certificate and TLS Connectivity Issues, on page 111

Cisco Jabber Sign In Issues, on page 111

Specific Issues, on page 114

General Techniques

Alarms and Status Messages

When troubleshooting, first check if any alarms have been raised ( Status > Alarms ). If alarms exist, follow the instructions in the Action column. Check the alarms on both Cisco Expressway-C and Cisco Expressway-E.

Next, review the status summary and configuration information ( Status > Unified Communications ). Check the status page on both Cisco Expressway-C and Cisco Expressway-E. If any required configuration is missing or invalid, an error message and a link to the relevant configuration page is shown.

You may see invalid services or errors if you change the following items on Cisco Expressway, for which a system restart is required to be sure the configuration changes take effect:

• Server or CA certificates

• DNS configuration

• Domain configuration

Use the Collaboration Solutions Analyzer

The Collaboration Solutions Analyzer (CSA) tool set provided by TAC, can be used to help with deploying and troubleshooting MRA. (See the Cisco Expressway release notes for instructions about how to access the

CSA.)

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

105

MRA Troubleshooting

Diagnostic Logs

Procedure

Step 1

Step 2

Use the CollabEdge validator tool to validate your MRA deployment.

It simulates a Jabber client sign in process and provides feedback on the result.

If the CollabEdge validator cannot identify the issue, we suggest that you collect logs from the Cisco

Expressway while attempting to sign in. Then use the log analysis component in the CSA to analyze the logs.

Diagnostic Logs

Jabber for Windows Diagnostic Logs

The Jabber for Windows log file is saved as csf-unified.log

under

C:\Users\<UserID>\AppData\Local\Cisco\Unified

Communications\Jabber\CSF\Logs .

Configure Cisco Expressway Diagnostic Log Levels

The diagnostic logging tool in Cisco Expressway can be used to assist in troubleshooting system issues. It allows you to generate a diagnostic log of system activity over a period and then to download the log.

Before you begin

Before taking a diagnostic log, you must configure the log level of the relevant logging modules.

Procedure

Step 1

Step 2

Step 3

Go to Maintenance > Diagnostics > Advanced > Support Log configuration .

Select the recommended logs for the problem you are experiencing. You can find these using the Log Advisor

Tool: https://logadvisor.cisco.com/logadvisor/collaboration/unifiedcommunications/mra .

Click Set to debug .

Create a Diagnostic Log Capture

After you configure the Cisco Expressway diagnostic log levels, you can start the diagnostic log capture.

Procedure

Step 1

Step 2

Step 3

Step 4

Go to Maintenance > Diagnostics > Diagnostic logging .

(Optional) Select Take tcpdump while logging .

Click Start new log .

(Optional) Enter some Marker text and click Add marker .

106

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Troubleshooting

After You Create Logs

Step 5

Step 6

Step 7

Step 8

• The marker facility can be used to add comment text to the log file before certain activities are performed.

This helps to subsequently identify the relevant sections in the downloaded diagnostic log file.

• You can add as many markers as required, at any time while the diagnostic logging is in progress.

• Marker text is added to the log with a " DEBUG_MARKER " tag.

Reproduce the system issue you want to trace in the diagnostic log.

Click Stop logging .

Click Collect log .

When the log collection completes, click Download log to save the diagnostic log archive to your local file system.

You are prompted to save the archive (the exact wording depends on your browser).

After You Create Logs

If you want to download the logs again, you can re-collect them by using the Collect log button. If the button is grayed out, first refresh the page in your browser.

After you have completed your diagnostic logging, return to the Support Log configuration page and reset the modified logging modules back to INFO level.

Check DNS Records

You can use the Cisco Expressway's DNS lookup tool to assist in troubleshooting system issues.

Procedure

Go to Maintenance > Tools > Network utilities > DNS lookup .

The SRV record lookup includes those specific to H.323, SIP, Unified Communications and TURN services.

Note Performing the DNS lookup from the Cisco Expressway-C returns the view from within the enterprise, and that performing it on the Cisco Expressway-E returns what is visible from within the DMZ which is not necessarily the same set of records available to endpoints in the public internet.

The DNS lookup includes the following SRV services that are used for Unified Communications:

• _collab-edge._tls

• _cisco-uds._tcp

Check that the Cisco Expressway-E is Reachable

This procedure describes how to check that the Cisco Expressway-E is reachable.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

107

MRA Troubleshooting

Check Call Status

Procedure

Ensure that the FQDN of the Cisco Expressway-E is resolvable in the public DNS.

The FQDN is configured at System > DNS and is built as <System host name>.<Domain name> .

Check Call Status

Call status information can be displayed for both current and completed calls.

The same set of call status information is also shown on the Calls by registration page (accessed via the

Registration details page).

If the Cisco Expressway is part of a cluster, all calls that apply to any peer in the cluster are shown, although the list is limited to the most recent 500 calls per peer.

Procedure

Step 1

Step 2

If you wish to get information about the current calls, go to the Call status page ( Status > Calls > Calls ).

The Call status page lists all the calls currently taking place to or from devices registered with the Cisco

Expressway, or that are passing through the Cisco Expressway.

If you wish to get information about the completed calls, go to the Call history page ( Status > Calls >

History ).

The Call history page lists all the calls that are no longer active. The list is limited to the most recent 500 calls, and only includes calls that have taken place since the Cisco Expressway was last restarted.

Mobile and Remote Access Call Identification

The call status and call history pages show all call types—Unified CM remote sessions (if Mobile and Remote

Access is enabled) as well as Cisco Expressway RMS sessions.

To distinguish between the call types, you must drill down into the call components. Mobile and Remote

Access calls have different component characteristics depending on whether the call is being viewed on the

Cisco Expressway-C or Cisco Expressway-E:

• On the Cisco Expressway-C, a Unified CM remote session has three components (as it uses the B2BUA to enforce media encryption). One of the Cisco Expressway components routes the call through one of the automatically generated neighbor zones (with a name prefixed by either CEtcp or CEtls ) between

Cisco Expressway and Unified CM.

• On the Cisco Expressway-E, there is one component and that routes the call through the

CollaborationEdgeZone .

If both endpoints are outside of the enterprise (that is, off premises), you will see this treated as two separate calls.

108

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Troubleshooting

Rich Media Sessions (Cisco Expressway Only)

Rich Media Sessions (Cisco Expressway Only)

If your system has a rich media session key installed and thus supports business-to-business calls, and interworked or gatewayed calls to third-party solutions and so on, those calls are also listed on the call status and call history pages.

Devices Registered to Unified CM via Cisco Expressway

Identify Devices in Unified CM

This procedure describes how to identify devices registered to Unified CM via Cisco Expressway.

Procedure

Step 1

Step 2

In Unified CM, go to Device > Phone and click Find .

Check the IP Address column.

Devices that are registered via Cisco Expressway will display the IP Address of the Cisco Expressway-C it is registered through.

Identify Provisioning Sessions in Cisco Expressway-C

This procedure describes how to identify sessions that have been provisioned via Cisco Expressway-C.

Procedure

Step 1

Step 2

In Cisco Expressway-C, go to Status > Unified Communications .

In the Advanced status information section, click View provisioning sessions .

This shows a list of all current and recent (shown in red) provisioning sessions.

Ensure that Cisco Expressway-C is Synchronized to Unified CM

Changes to Unified CM cluster or node configuration can lead to communication problems between Unified

CM and Cisco Expressway-C. This includes changes to the following items:

• Number of nodes within a Unified CM cluster

• Host name or IP address of an existing node

• Listening port numbers

• Security parameters

• Phone security profiles

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

109

MRA Troubleshooting

Check MRA Authentication Status and Tokens

You must ensure that any such changes are reflected in the Cisco Expressway-C. To do this:

Procedure

Step 1

Step 2

On Cisco Expressway, go to Configuration > Unified Communications .

Rediscover all Unified CM and IM and Presence Service nodes.

Check MRA Authentication Status and Tokens

This procedure describes how to check MRA authentication status and tokens.

Procedure

Step 1

Step 2

(Optional) To check and clear standard (non-refresh) OAuth user tokens, go to Users > View and manage

OAuth without refresh token holders .

This could help identify problems with a particular user's OAuth access.

(Optional) To check statistics for MRA authentication, go to Status > Unified Communications > View detailed MRA authentication statistics .

Any unexpected requests or responses on this page could help identify configuration or authorization issues.

Registration Issues

Endpoints Can't Register to Unified CM

Endpoints may fail to register for various reasons:

• Endpoints may not be able to register to Unified CM if there is also a SIP trunk configured between

Unified CM and Cisco Expressway-C. If a SIP trunk is configured, you must ensure that it uses a different listening port on Unified CM from that used for SIP line registrations to Unified CM. See

SIP Trunks

Between Unified CM and Expressway-C, on page 73

for more information.

• Secure registrations may fail (' Failed to establish SSL connection ' messages) if the server certificate on the Cisco Expressway-C does not contain in its Subject Alternate Name list, the names of all of the Phone Security Profiles in Unified CM that are configured for encrypted TLS and are used for devices requiring remote access. Note that these names — in both Unified CM and in the Cisco

Expressway's certificate — must be in FQDN format.

It is essential to generate Certificate Signing Request (CSR) for the new node while adding a new

Expressway-C node to an existing cluster of Expressway-C. It is mandated to put secure profile names as they are on CUCM, if secure registration of Mobile and Remote Access (MRA) client is needed over

MRA. CSR creation on the new node will fail if “Unified CM phone security profile names” are just

110

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Troubleshooting

Cisco Expressway Certificate and TLS Connectivity Issues names or hostnames on CUCM device security profiles. This will force Administrators to change the value of “Unified CM phone security profile names” on CUCM under the Secure Phone Profile page.

From X12.6, it is mandated that the Unified CM phone security profile name must be a Fully Qualified

Domain Name (FQDN). It cannot be just any name or hostname or a value.

For example, jabbersecureprofile.domain.com

,

DX80SecureProfile.domain.com

Note The FQDN can comprise multiple levels. Each level's name can only contain letters, digits, and hyphens, with each level separated by a period (dot). A level name cannot start or end with a hyphen, and the final level name must start with a letter.

Cisco Expressway Certificate and TLS Connectivity Issues

Modifications to the Cisco Expressway's server certificate or trusted CA certificates need a Cisco Expressway restart for the changes to take effect.

If you are using secure profiles, ensure that the root CA of the authority that signed the Cisco Expressway-C certificate is installed as a CallManager-trust certificate ( Security > Certificate Management in the Cisco

Unified OS Administration application).

CiscoSSL 5.4.3 Rejects Diffie-Hellman Keys with Fewer than 1024 Bits

If you are running version 9.x, or earlier, of Unified CM or Unified CM IM and Presence Service, with Cisco

Expressway version X8.7.2 or later, then the SSL handshake between the two systems will fail by default.

The symptom is that all MRA endpoints fail to register or make calls after you upgrade to Cisco Expressway

X8.7.2 or later.

The cause of this issue is an upgrade of the CiscoSSL component to 5.4.3 or later. This version rejects the default (768 bit) key provided by Unified CM when using D-H key exchange.

You must either upgrade your infrastructure or consult the Cisco Technical Assistance Center to check whether it is possible to modify the default configurations for Unified CM and/or Unified CM IM and Presence Service to support TLS (refer CSCuy59366 ).

Cisco Jabber Sign In Issues

Jabber Triggers Automated Intrusion Protection

Conditions

• Your MRA solution is configured for authorization by OAuth token (with or without refresh)

• The Jabber user's access token has expired

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

111

MRA Troubleshooting

Jabber Popup Warns About Invalid Certificate When Connecting from Outside the Network

• Jabber does one of these:

• Resumes from desktop hibernate

• Recovers network connection

• Attempts fast login after it has been signed out for several hours

Behavior

• Some Jabber modules attempt to authorize at Cisco Expressway-E using the expired access token.

• The Cisco Expressway-E (correctly) denies these requests.

• If there are more than 5 such requests from a particular Jabber client, the Cisco Expressway-E blocks that IP address for ten minutes (by default).

Symptoms

The affected Jabber clients' IP addresses are added to the Cisco Expressway-E's Blocked addresses list, in the HTTP proxy authorization failure category. You can see these on System > Protection > Automated detection > Blocked addresses .

Workaround

There are two ways you can work around this issue; you can increase the detection threshold for that particular category, or you can create exemptions for the affected clients. We describe the threshold option here because the exemptions may well be impractical in your environment.

1.

Go to System > Protection > Automated detection > Configuration .

2.

Click HTTP proxy authorization failure .

3.

Change the Trigger level from 5 to 10 . 10 should be enough to tolerate the Jabber modules that present expired tokens.

4.

Save the configuration, which takes effect immediately.

5.

Unblock any affected clients.

Jabber Popup Warns About Invalid Certificate When Connecting from Outside the Network

This is a symptom of an incorrectly configured server certificate on the Cisco Expressway-E. The certificate could be self-signed, or it may not have the external DNS domain of your organization listed as a subject alternative name (SAN).

This is expected behavior from Jabber. We recommend that you install a certificate issued by a CA that Jabber trusts, and that the certificate has the domains Jabber is using included in its list of SANs. See

Certificate

Requirements, on page 17 .

112

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Troubleshooting

Jabber Doesn't Register for Phone Services

Jabber Doesn't Register for Phone Services

There is a case handling mismatch between the Cisco Expressway and the User Data Service (UDS) that prevents Jabber from registering for phone services if the supplied user ID does not match the case of the stored ID. Jabber still signs in but cannot use phone services.

Users can avoid this issue by signing in with the user ID exactly as it is stored in UDS.

Users can recover from this issue by signing out and resetting Jabber. See CSCux16696 .

Jabber Cannot Sign in Due to XMPP Bind Failure

The Jabber client may be unable to sign in ("Cannot communicate with the server” error messages) due to

XMPP bind failures.

This will be indicated by resource bind errors in the Jabber client logs, for example:

XmppSDK.dll #0, 201, Recv:<iq id='uid:527a7fe7:00000cfe:00000000' type='error'><bind xmlns='urn:ietf:params:xml:ns:xmpp-bind'/><error code='409' type='cancel'><conflict xmlns='urn:ietf:params:xml:ns:xmpp-stanzas'/></error></iq>

XmppSDK.dll #0, CXmppClient::onResourceBindError

XmppSDK.dll #0, 39, CTriClient::HandleDisconnect, reason:16

This typically occurs if the IM and Presence Intercluster Sync Agent is not working correctly. See IM and

Presence information in the Cisco Unified Communications Manager Configuration Guides at https://www.cisco.com/c/en/us/support/unified-communications/unified-communications-manager-callmanager/ products-installation-and-configuration-guides-list.html

.

Jabber Cannot Sign in Due to SSH Tunnels Failure

Jabber can fail to sign in due to the SSH tunnels failing to be established. The traversal zone between the

Cisco Expressway-C and Cisco Expressway-E will work normally in all other respects. Cisco Expressway will report ' Application failed - An unexpected software error was detected in portforwarding.pyc

'.

This can occur if the Cisco Expressway-E DNS hostname contains underscore characters. Go to System >

DNS and ensure that the System host name only contains letters, digits, and hyphens.

Jabber Cannot Sign in When Connecting to Different Peers in a Cluster of

Cisco Expressway-Es

Jabber sign in failures have been seen when there is inconsistency of the DNS domain name between Cisco

Expressway-E peers. The domain names must be identical, even with respect to case, on all peers in the cluster.

Go to System > DNS on each peer to make sure that Domain name is identical on all peers.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

113

MRA Troubleshooting

Specific Issues

Specific Issues

Cisco Expressway Returns “401 Unauthorized” Failure Messages

A “401 Unauthorized” failure message can occur when the Cisco Expressway attempts to authenticate the credentials presented by the endpoint client. The reasons for this include:

• The client is supplying an unknown username or the wrong password.

• Intercluster Lookup Service (ILS) has not been set up on all the Unified CM clusters. This may result in intermittent failures, depending upon which Unified CM node is being used by Cisco Expressway for its UDS query to discover the client's home cluster.

Call Failures due to “407 Proxy Authentication Required” or “500 Internal

Server Error” Errors

Call failures can occur if the traversal zones on Cisco Expressway are configured with an Authentication policy of Check credentials . Ensure that the Authentication policy on the traversal zones used for Mobile and Remote Access is set to Do not check credentials .

Call Bit Rate is Restricted to 384 kbps or Video Issues when Using BFCP

(Presentation Sharing)

This can be caused by video bit rate restrictions within the regions configured on Unified CM.

Ensure that the Maximum Session Bit Rate for Video Calls between and within regions ( System > Region

Information > Region ) is set to a suitable upper limit for your system, for example 6000 kbps.

IM and Presence Service Realm Changes

Provisioning failures can occur when the IM and Presence Service realm has changed and the realm data on the Cisco Expressway-C has not been updated.

For example, this could happen if the address of an IM and Presence Service node has changed, or if a new peer has been added to an IM and Presence Service cluster.

The diagnostic log may contain an INFO message like " Failed to query auth component for

SASL mechanisms" because the Cisco Expressway-C cannot find the realm.

Go to Configuration > Unified Communications > IM and Presence Service nodes and click Refresh servers and then save the updated configuration. If the provisioning failures persist, verify the IM and Presence

Service nodes configuration and refresh again.

No Voicemail Service (“403 Forbidden” Response)

Ensure that the Cisco Unity Connection (CUC) hostname is included on the HTTP server allow list on the

Cisco Expressway-C.

114

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

MRA Troubleshooting

“403 Forbidden” Responses for Any Service Requests

“403 Forbidden” Responses for Any Service Requests

Services may fail (“403 Forbidden” responses) if the Cisco Expressway-C and Cisco Expressway-E are not synchronized to a reliable NTP server. Ensure that all Cisco Expressway systems are synchronized to a reliable

NTP service.

Client HTTPS Requests are Dropped by Cisco Expressway

This can be caused by the automated intrusion protection feature on the Cisco Expressway-E if it detects repeated invalid attempts (404 errors) from a client IP address to access resources through the HTTP proxy.

To prevent the client address from being blocked, ensure that the HTTP proxy resource access failure category ( System > Protection > Automated detection > Configuration ) is disabled.

Failed: Address is not a IM and Presence Server

This error can occur when trying to configure the IM and Presence Service servers used for remote access

(via Configuration > Unified Communications > IM and Presence servers ). It is due to missing CA certificates on the IM and Presence Service servers and applies to systems running 9.1.1. More information and the recommended solution is described in CSCul05131 .

Invalid SAML Assertions

If clients fail to authenticate via SSO, one potential reason is that invalid assertions from the IDP are being rejected by the Cisco Expressway-C.

Check the logs for Invalid SAML Response .

One example is when ADFS does not have a claim rule to send the users' IDs to the Cisco Expressway-C. In this case you will see No uid Attribute in Assertion from IdP in the log.

The Cisco Expressway is expecting the user ID to be asserted by a claim from ADFS that has the identity in an attribute called uid . You need to go into ADFS and set up a claim rule, on each relying party trust, to send the users' AD email addresses (or sAMAccountNames, depending on your deployment) as “uid” to each relying party.

“502 Next Hop Connection Failed” Messages

A 502 message on the Cisco Expressway-E indicates that the next hop failed (typically to the Cisco

Expressway-C). Try the following steps:

1.

Go to the Status > Unified Communications page on the Cisco Expressway-E. Did the Cisco

Expressway-E report any issues?

2.

If the status looks normal, click the SSH tunnel status link at the foot of the status page. If one or more tunnels to the Cisco Expressway-C node is down, that is probably causing the 502 error.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

115

MRA Troubleshooting

MRA calls fail if the called endpoint is more than 15 hops away from the Expressway-E

MRA calls fail if the called endpoint is more than 15 hops away from the

Expressway-E

The Unified Communications traversal zone has a default hop count of 15. If you suspect this is a contributing factor, sign in to all your MRA Expressways, raise the hop count to a significantly larger number, for example,

70 and test.

116

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

P A R T

I

Appendix

HTTP Allow List Formats, on page 119

C H A P T E R

9

HTTP Allow List Formats

This appendix contains information that can be used to generate and test HTTP Allow Lists.

Allow List Rules File Reference, on page 119

Allow List Tests File Reference, on page 120

Allow List Rules File Reference

You can define rules using a CSV file. This topic provides a reference to acceptable data for each rule argument and demonstrates the format of the CSV rules.

Table 20: Allow List Rule Arguments

Sample value Argument index

Parameter name

Required/

Optional

0 Url Required protocol://host[:port][/path]

Where:

• protocol is http or https

• host may be a DNS name or IP address

• :port is optional, and may only be : followed by one number in the range 0-65535, for example: 8443

• /path is optional and must conform to HTTP specification

1

2

3

4

Deployment Optional

Optional

Optional

Optional

Name of the deployment that uses this rule. Required when you have more than one deployment, otherwise supply an empty argument.

Comma-delimited list of HTTP methods, optionally in double-quotes, for example: "GET,PUT" exact or prefix . Default is prefix .

Text description of the rule. Enclose with double quotes if there are spaces.

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

119

Appendix

Example List Rules CSV File

Example List Rules CSV File

Url,Deployment,HttpMethods,MatchType,Description https://myServer1:8443/myPath1,myDomain1,GET,,"First Rule" http://myServer2:8000/myPath2,myDomain200,"GET,PUT",exact, https://myServer3:8080/myPath3,myDomain1,,prefix,"Third Rule" https://myServer4/myPath4,myDomain1,,prefix,"Fourth Rule" http://myServer5/myPath5,myDomain1,,prefix,"Fifth Rule"

• List the parameter names (as shown) in the first line of the file

• One rule per line, one line per rule

• Separate arguments with commas

• Correctly order the rule values as shown in the table above

• Enclose values that have spaces in them with double quotes

Allow List Tests File Reference

You can define tests using a CSV file. This topic provides a reference to acceptable data for each test argument and demonstrates the format of the CSV tests.

Table 21: Allow List Test Arguments

Argument index

Parameter name

0 Url

Required/

Optional

Required

Sample value protocol://host[:port][/path]

Where:

• protocol is http or https

• host may be a DNS name or IP address

• :port is optional, and may only be : followed by one number in the range 0-65535

• /path is optional and must conform to HTTP specification

1

2

3

4

ExpectedResult Required

Deployment Optional

Description Optional

HttpMethod Optional allow or block . Specifies whether the test expects that the rules should allow or block the specified URL.

Name of the deployment to test with this URL. If you omit this argument, the test will use the default deployment.

Text description of the rule. Enclose with double quotes if there are spaces.

Specify one HTTP method to test for example, PUT . Defaults to

GET if not supplied.

120

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

Appendix

Example List Tests CSV File

Example List Tests CSV File

Url,ExpectedResult,Deployment,Description,HttpMethod https://myServer1:8443/myPath1,block,"my deployment","a block test",GET http://myServer2:8000/myPath2,allow,"my deployment","an allow test",PUT https://myServer4/myPath4,allow,,,GET http://myServer4/myPath4,block,,,POST

• List the parameter names (as shown) in the first line

• One test per line, one line per test

• Separate arguments with commas

• Correctly order the test values as shown in the table above

• Enclose values that have spaces in them with double quotes

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

121

Example List Tests CSV File

Appendix

122

Mobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0.1)

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

Download PDF

advertisement

Table of contents