Saturday, 20 August 2016

Non-SSO Mobile and Remote Access through Cisco Expressway

Non-SSO Mobile and Remote Access through Cisco Expressway





Cisco UC mobile and remote access is a core part of the Cisco Collaboration Edge Architecture. It allows endpoints such as Cisco Jabber to have their registration, call control, provisioning, messaging and presence services provided by Cisco Unified CM when the endpoint is not within Enterprise network. The Expressway Provides secure firewall traversal and line-side support for Unified CM registrations.
This is a lab to show you step by step how it is configured. Some prerequisites you can find Cisco Expressway Deployment Guide.
Lab Devices
CUCM  - 10.5.2 – 142.100.64.11
IMP – 10.5.2 – 142.100.64.15
Internal DNS – 142.100.64.20
Expressway C– 8.8 – 142.100.64.17
Expressway E– 8.8 – 142.100.64.18 (Internal IP)
Expressway E– 8.8 – 207.xx.xx.18 (External IP)

Unified CM with IMP

Server Configuration   
SIP Trunk Security Profile Configuration   
Trunk Configuration   
Service Parameter Configuration   

Domain and Internal DNS

DNS










Internal Records

The following table lists the SRV records you can provision on internal name servers so the client can discover services:
Service Record Description
_cisco-uds Provides the location of Cisco Unified Communications Manager version 9 and higher.



Remember: In an environment with multiple Cisco Unified Communications Manager clusters, you must configure the Intercluster Lookup Service (ILS). ILS enables the client to find the user's home cluster and discover services.
_cuplogin Provides the location of Cisco Unified Presence.


UCM LDAP and Service Profile

LDAP Directory   
UC Service Configuration   


Enhanced Directory Integration (EDI)

EDI uses native Microsoft Windows APIs to retrieve contact data from the directory service.
the following are the default settings for on-premises deployments with EDI:
  - Cisco Jabber integrates with Active Directory as the contact source.
  - Cisco Jabber automatically discovers and connects to a Global Catalog.

the client does the following by default: 
1. Gets the DNS domian from the works tation and looks up the SRV record for the Global Catalog.
2. Retrieves the address of the Global Catalog from the SRV record 

Global Catalog:  _gc._msdcs._tcp.domain.com
DC:                       _ldap._msdcs._tcp.domain.com

for more, read doc here (page 2) : https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/jabber/10_6/CJAB_BK_C56DE1AB_00_cisco-jabber-106-deployment-and-installation-guide/CJAB_BK_C56DE1AB_00_cisco-jabber-106-deployment-and-installation-guide_chapter_01111.pdf
Service Profile Configuration   

Imported Users



Cisco Unified Client Services Framework SIP

Presence Gateway Configuration   

SSL Certificate Management: Cisco Unified CM and Cisco Unified IM and Presence

Our deployment provisioning is complete. Clients should now be able to launch and use Cisco Jabber. However, one final deployment task remains and that is SSL Certificate Management.
Currently both the Cisco Unified Communications Manager (cucm.ad.crs) and the Cisco Unified IM and Presence Server (cups.ad.crs) are using self-signed SSL certificates generated during the installation process. Cisco Jabber relies on SSL certificate validation to establish secure connections with applications and services hosted on servers. In so doing, Cisco Jabber is authenticating the identity of the hosts to which it connects. Cisco Jabber will NOT automatically accept any certificate issued by an untrusted Certificate Authority (CA), and this includes self-signed certificates.
In order to establish an environment for secure connectivity we MUST deploy CA signed certificates across all Cisco Collaboration applications in the environment. This is also a requirement for implementation of Mobile and Remote Access with Cisco Expressway, and SAML Single Sign-On; both addressed later in the lab.

Establish Root CA Trust

Download CA Root Certificate from CA server

Upload the CA Root Certificate to Unified CM


Tomcat Trust


Tomcat
Request and Install a CA Signed Tomcat Certificate
Set the following values in the Certificate Signing Request dialog:
• Certificate Purpose: tomcat
• Distribution: Multi-Server(San)
• Key Length: 2048
• Hash Algorithm: SHA256
Click Download CSR from the menu.
Choose Notepad from the list. Click OK.
From the Notepad main menu choose Format > Word Wrap.
Request a Certificate

Upload the CA Root Certificate to Unified IM and Presence

Request and Install a CA Signed XMPP-Trust Certificate

Service Maintenance to Finalize Certificate Installation

Restart Cisco Tomcat for the Unified CM Cluster
utils service restart Cisco Tomcat 


Restart Cisco Tomcat for the Unified IMP
utils service restart Cisco Tomcat

utils service restart Cisco XCP Router 



Deactivate and Activate the Cisco Tftp Service on UCM

Enable AD CS to Issue “Client and Server” Certificate

The default ‘web server’ certificate template in AD CS creates a certificate for Server Authentication. The server certificate for the Expressway also needs Client Authentication if you want to configure a neighbor or traversal zone with mutual authentication (where TLS verify mode is enabled)

Configure Expressway-E for Unified Communications

Certificate Management for Expressway

CA
Server certificate
Expe
Expc
Download CSR
 

 
Restart both

Configure Expressway-C for Unified Communications

Configure Unified Communications Domains
You must identify the domains for which registration, call control, provisioning, messaging, and presence services are to be routed to Unified CM.
Discovering IM and Presence Services
Discovering Unified CM Services

Create a Secure Traversal between Expressway-E and Expressway-C



Zone Status

Upload Jabber Configuration file


<config version="1.0">

<Policies>
<EnableSIPURIDialling>true</EnableSIPURIDialling>
<VoiceServicesDomain>YOURDOMAIN</VoiceServicesDomain>
</Policies>

<Directory>
<SipUri>mail</SipUri>
<UseSIPURIToResolveContacts>true</UseSIPURIToResolveContacts>
<BDISipUri>mail</BDISipUri>
<BDIUseSIPURIToResolveContacts>true</BDIUseSIPURIToResolveContacts>
<BusinessPhone>ipphone</BusinessPhone>

<UDSPhotoURIWithToken>http://server/%%uid%%.jpg</UDSPhotoURIWithToken>
</Directory>

</config>


Restart CUCM TFTP service

Validate Unified Communications Status on Expressway


No comments:

Post a Comment