Cucm B Administration-Guide-1251
Cucm B Administration-Guide-1251
Cucm B Administration-Guide-1251
Release 12.5(1)
First Published: 2019-01-22
Last Modified: 2021-10-19
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2021 Cisco Systems, Inc. All rights reserved.
CONTENTS
Configuration Menus
The configuration windows for Cisco Unified CM Administration are organized under the following menus:
• System—Use the configuration windows under this menu to configure general system settings such as
server information, NTP settings, Date and Time groups, Regions, DHCP, LDAP integration, and
enterprise parameters.
• Call Routing-—Use the configuration windows under this tab to configure items related to how Cisco
Unified Communications Manager routes calls, including route patterns, route groups, hunt pilots, dial
rules, partitions, calling search spaces, directory numbers, and transformation patterns.
• Media Resources—Use the configuration windows under this tab to configure items such as media
resource groups, conference bridges, annunciators, and transcoders.
• Advanced Features—Use the configuration windows under this tab to configure features such as voice-mail
pilots, message waiting, and call control agent profiles.
• Device—Use the configuration windows under this tab to set up devices such as phones, IP phone
services, trunks, gateways, softkey templates, and SIP profiles.
• Application—Use the configuration windows under this tab to download and install plug-ins such as
Cisco Unified JTAPI, Cisco Unified TAPI, and the Cisco Unified Real-Time Monitoring Tool.
• User Management—Use the configuration windows under the User Management tab to configure end
users and application users for your system.
• Bulk Administration-—Use the Bulk Administration Tool to import and configure large numbers of end
users or devices at a time.
• Help—Click this menu to access the online help system. The online help system contains documentation
that will assist you in configuring settings for the various configuration windows on your system.
• IPsec Management—Displays or updates existing IPsec policies; sets up new IPsec policies and
associations.
Software Upgrades
You can upgrade the software version that is running on the operating system or to install specific software
options, including Cisco Unified Communications Operating System locale installers, dial plans, and TFTP
server files.
From the Install/Upgrade menu option, you can upgrade system software from either a local disc or a remote
server. The upgraded software is installed on the inactive partition, and you can then restart the system and
switch partitions, so the system starts running on the newer software version. For more information, see the
Upgrade Guide for the Cisco Unified Communications Manager at http://www.cisco.com/c/en/us/support/
unified-communications/unified-communications-manager-callmanager/products-installation-guides-list.html.
Note You must perform all software installations and upgrades through the software upgrade features that are
included in the Cisco Unified Communications Operating System interface and the CLI. The system can
upload and process only software that is Cisco Systems approved. You cannot install or use third-party or
Windows-based software applications.
Services
The application provides the following operating system utilities:
• Ping—Checks connectivity with other network devices.
• Remote Support—Sets up an account that Cisco support personnel can use to access the system. This
account automatically expires after the number of days that you specify.
CLI
You can access the CLI from the Operating System or through a secure shell connection to the server. For
more information, see the Command Line Interface Reference Guide for Cisco Unifed Communications
Solutions at http://www.cisco.com/c/en/us/support/unified-communications/
unified-communications-manager-callmanager/products-maintenance-guides-list.html.
You can check the authentication status of the NTP servers through administration CLI or NTP Server List
page of the Cisco Unified OS Administration application.
Warning NTP authentication using Autokey is currently enabled and must be disabled before the symmetric key is
enabled. Use the command 'utils ntp auth auto-key disable' to disable NTP authentication, then retry this
command.
If you try to enable the Autokey on the symmetric key enabled server, the following warning message is
displayed:
Warning NTP authentication using symmetric key is currently enabled and must be disabled before Autokey is enabled.
Use the command 'utils ntp auth symmetric-key disable' to disable NTP authentication, then retry this command.
Note NTP servers require ntp version 4 and the rpm version ntp-4.2.6p5-1.el6.x86_64.rpm and above.
You can check the authentication status of the NTP servers through administration CLI or NTP Server List
page of the Cisco Unified OS Administration application.
• SNMP—SNMP facilitates the exchange of management information among network devices, such as
nodes, routers, and so on. As part of the TCP/IP protocol suite, SNMP enables administrators to remotely
manage network performance, find and solve network problems, and plan for network growth.
• Alarms—Alarms provide information on the runtime status and state of your system, so that you can
troubleshoot problems that are associated with your system.
• Traces—Trace tools help you to troubleshooting issues with voice applications.
• Cisco Serviceability Reporter—The Cisco Serviceability Reporter generates daily reports in Cisco Unified
Serviceability.
• SNMP—SNMP facilitates the exchange of management information among network devices, such as
nodes, routers, and so on. As part of the TCP/IP protocol suite, SNMP enables administrators to remotely
manage network performance, find and solve network problems, and plan for network growth.
• CallHome—Configure the Cisco Unified Communications Manager Call Home feature, allowing Cisco
Unified Communications Manager to communicate and send the diagnostic alerts, inventory, and other
messages to the Smart Call Home back-end server
For details about how to use Cisco Unified Serviceability, see the Cisco Unified Serviceability Administration
Guide at http://www.cisco.com/c/en/us/support/unified-communications/
unified-communications-manager-callmanager/products-maintenance-guides-list.html.
• Phone Feature List—View this report if you are configuring features. This report provides a list of which
phones support which Cisco Unified Communications Manager features.
• Unified CM Phones Without Lines—View this report to see which phones in your cluster do not have a
phone line.
For a full list of reports offered through Cisco Unified Reporting, as well as instructions on how to use the
application, see the Cisco Unified Reporting Administration Guide at http://www.cisco.com/c/en/us/support/
unified-communications/unified-communications-manager-callmanager/products-maintenance-guides-list.html.
For details on how to use the Bulk Administration Tool, refer to the Bulk Administration Guide for Cisco
Unified Communications Manager.
Procedure
Step 1 Open the Unified Communications Manager interface in your web browser.
Step 2 Choose the administration interface from the Navigation drop-down list.
Step 3 Click Go.
Step 4 Enter your username and password.
Step 5 Click Login.
Note For password changes on IM and Presence nodes, stop the Cisco Presence Engine service in all IM and
Presence nodes before resetting the administrator password. After the password reset, restart the Cisco Presence
Engine service in all the nodes. Make sure that you perform this task during maintenance because you may
face presence issues when the PE is stopped.
• At any point, when you are requested to insert CD or DVD media, you must mount the ISO file through
the vSphere client for the VMWare server. See “Adding DVD or CD Drives to a Virtual Machine”
https://www.vmware.com/support/ws5/doc/ws_disk_add_cd_dvd.html for guidance.
• The security password on all nodes in a cluster must match. Change the security password on all machines,
or the cluster nodes will not communicate.
Procedure
Step 1 Sign in to the CLI on the publisher node with the following username and password:
a) Username: pwrecovery
b) Password: pwreset
Step 2 Press any key to continue.
Step 3 If you have a valid CD/DVD in the disk drive or you mounted an ISO file, remove it from the VMWare client.
Step 4 Press any key to continue.
Step 5 Insert a valid CD or DVD into the drive or mount the ISO file.
Note For this test, you must use a disk or ISO file that is data only.
Step 6 After the system verifies the last step, you are prompted to enter one of the following options to continue:
• Enter a to reset the administrator password.
• Enter s to reset the security password.
Note You must reset each node in a cluster after you change its security password. Failure to reboot
the nodes causes system service problems and problems with the administration windows on
the subscriber nodes.
Step 8 After the system verifies the strength of the new password, the password is reset, and you are prompted to
press any key to exit the password reset utility.
If you want to set up a different administrator password, use the CLI command set password. For more
information, see the Command Line Interface Reference Guide for CiscoUnified Solutions at
http://www.cisco.com/c/en/us/support/unified-communications/unified-communications-manager-callmanager/
products-maintenance-guides-list.html.
Note You are recommended to shutdown or restart through a virtual machine by a utils system shutdown CLI
command. The system-history.log displays the command entry and is considered as a graceful shutdown. If
the shutdown or restart is done from the vSphere client, then it is considered as an ungraceful shutdown and
the entry is not available in the system-history.log. Shutdown/reboot from vSphere client is not supported
from version 10.x onwards.
Note If you force shutdown or restart the virtual machine from VMware administration tools (vCenter or Embedded
Host Client):
Procedure
The User Rank framework provides a set of controls over the access control groups to which a user can be
assigned. To be assigned to an access control group, a user must meet the minimum rank requirement for that
group. For example, end users whom have a User Rank of 4 can be assigned only to access control groups
with minimum rank requirements between 4 and 10. They cannot be assigned to groups with a minimum rank
of 1.
Roles Overview
Users obtain system access privileges via the roles that are associated to the access control group of which
the user is a member. Each role contains a set of permissions that is attached to a specific resource or application,
such as Cisco Unified CM Administration or CDR Analysis and Reporting. For an application such as Cisco
Unified CM Administration, the role may contain permissions that let you view or edit specific GUI pages in
the application. There are three levels of permissions that you can assign to a resource or application:
• Read—Allows a user to view settings for a resource.
• Update—Allows a user to edit settings for a resource.
• No Access—If a user has neither Read or Update access, the user has no access to view or edit settings
for a given resource.
Role Types
When provisioning users, you must decide what roles you want to apply and then assign users to an access
control group that contains the role. There are two main types of roles in Cisco Unified Communications
Manager:
• Standard roles—These are preinstalled default roles that are designed to meet the needs of common
deployments. You cannot edit permissions for standard roles.
• Custom roles—Create custom roles when no standard roles have the privileges you need. In addition, if
you need a more granular level of access control, you can apply advanced settings to control an
administrator's ability to edit key user settings. See the below section for details.
The following table details more controls that you can apply with this configuration:
Note When both the values are not selected, the Permission Information
section is not available.
Note If you choose View, the User can update Permissions Information
for own user field is set to No and is disabled. If you want to be able
to edit this field, you must set the Permission Information field to
Update.
Note The User can update Permissions Information for own user field
is set to No and is disabled if the Permission Information Update
check box is not selected.
Note When both the values are not selected, the User Rank section is not
available.
Note If you choose View, the User can update User Rank for own user
field is set to No and is disabled. If you want to be able to edit this
field, you must set the User Rank field to Update.
User can update User Controls a user's ability to edit their own user rank:
Rank for own user
• Yes—User can update their own User Rank.
• No—User cannot update their own User Rank. However, the user can view
or modify the rank of same or lower ranked users.
Note The User can update User Rank for own user field is set to No and
is disabled, if the User Rank Update check box is not selected.
When provisioning end users or application users, administrators can assign a user rank for the user.
Administrators can also assign a user rank requirement for each access control group. When adding users to
access conttrol groups, administrators can assign users only to the groups where the user's User Rank meets
the group's rank requirement. For example, an administrator can assign a user whom has a User Rank of 3 to
access control groups that have a User Rank requirement between 3 and 10. However, an administrator cannot
assign that user to an access control group that has a User Rank requirement of 1 or 2.
Administrators can create their own user rank hierarchy within the User Rank Configuration window and
can use that hierarchy when provisioning users and access control groups. Note that if you don't configure a
user rank hierarchy, or if you simply don't specify the User Rank setting when provisioning users or access
conrol groups, all users and access control groups are assigned the default User Rank of 1 (the highest rank
possible).
Procedure
Step 2 Create a Custom Role, on page 20 Create custom roles if the default roles don't
have the access permissions you need.
Step 3 Configure Advanced Role for Administrators, Optional. Advanced permissions in a custom
on page 21 role let you control an administrator’s ability to
edit key user settings.
Step 4 Create Access Control Group, on page 22 Create custom access control groups if the
default groups don't have the role assignments
you need.
Step 6 Configure Overlapping Privilege Policy for Optional. This setting is used if users are
Access Control Groups, on page 23 assigned to multiple access control groups with
conflicting permissions.
Note If you don't configure a user rank hierarchy, all users and access control groups get assigned a user rank of 1
(the highest possible rank) by default.
Procedure
Step 1 From Cisco Unified CM Administration, chooseUser Management > User Settings > User Rank.
Step 2 Click Add New.
Step 3 From the User Rank drop-down menu, select a rank setting between 1–10. The highest rank is 1.
Step 4 Enter a Rank Name and Description.
Step 5 Click Save.
Step 6 Repeat this procedure to add additional user ranks.
You can assign the user rank to users and access control groups to control which groups a user can be assigned
to.
Procedure
Step 1 In Cisco Unified CM Administration, click User Management > User Settings > Role.
Step 2 Do either of the following:
• To create a new role, click Add New. Choose the Application with which this role associates, and click
Next.
• To copy settings from an existing role, click Find and open the existing role. Click Copy and enter a
name for the new role. Click OK.
Step 5 Click Grant access to all or Deny access to all button to grant or remove privileges to all resources that
display on a page for this role.
Note If the list of resources displays on more than one page, this button applies only to the resources that
display on the current page. You must display other pages and use the button on those pages to
change the access to the resources that are listed on those pages.
Procedure
Step 1 From Cisco Unified CM Administration, choose User Management > User Settings > Role.
Step 2 Click Find and select a custom role.
Step 3 From Related Links, select Advanced Role Configuration and click Go.
Step 4 From the Resource Web Page, select Application User Web Pages or User Web Pages.
Step 5 Edit the settings. Refer to the online help for help with the fields and their settings.
Step 6 Click Save.
Procedure
Step 1 In Cisco Unified CM Administration, choose User Management > User Settings > Access Control Groups.
Step 2 Do either of the following:
• To create a new group from scratch, click Add New.
• To copy settings from an existing group, click Find and open the existing access control group. Click
Copy and enter a name for the new group. Click OK.
What to do next
Assign Users to Access Control Group, on page 22
Note You can add only those users whose user rank is the same or higher than the minimum user rank for the access
control group.
Note If you are syncing new users from a company LDAP Directory, and your rank hierarchy and access control
groups are created with the appropriate permissions, you can assign the group to synced users as a part of the
LDAP sync. For details on how to set up an LDAP directory sync, see the System Configuration Guide for
Cisco Unified Communications Manager.
Procedure
Step 1 Choose User Management > User Settings > Access Control Group.
The Find and List Access Control Group window appears.
Step 2 Click Find and select the access control group for which you want to update the list of users.
Step 3 From the Available for Users with User Rank as drop-down, select the rank requirement that users must
meet to be assigned to this group.
Step 4 In the User section, click Find to display the list of users.
Step 5 If you want to add end users or application users to the access control group, do the following:
a) Click Add End Users to Access Control Group or Add App Users to Access Control Group.
b) Select the users whom you want to add.
c) Click Add Selected.
Step 6 If you want to delete users from the access control group:
a) Select the users whom you want to delete.
b) Click Delete Selected.
Step 7 Click Save.
Procedure
Procedure
Step 2 Click Find and select the user for whom you want to view access privileges
Step 3 From the Related Links drop-down list, choose the User Privilege Report and click Go.
The User Privilege window appears.
Procedure
Step 2 Create Custom Help Desk Access Control Create a new access control group for the Help
Group, on page 25 Desk role.
Step 3 Assign Help Desk Role to Access Control Assign the Help Desk role to the Help Desk
Group, on page 25 access control group. Any users assigned to this
access control group will be assigned the
privileges of the Help Desk role.
Step 4 Assign Help Desk Members to Access Control Assign help desk team members with the
Group, on page 26 privileges of the custom help desk role.
Procedure
Step 1 In Cisco Unified Communications Manager Administration, choose User Management > User Settings >
Role.
Step 2 Click Add New.
Step 3 From the Application drop-down list, choose the application that you want to assign to this role. For example,
Cisco CallManager Administration.
Step 4 Click Next.
Step 5 Enter the Name of the new role. For example, Help Desk.
Step 6 Under Read and Update Privileges select the privileges that you want to assign for help desk users. For
example, if you want help desk members to be able to add users and phones, check the Read and Update
check boxes for User web pages and Phone web pages.
Step 7 Click Save.
What to do next
Create Custom Help Desk Access Control Group, on page 25
Procedure
Step 1 In Cisco Unified CM Administration, choose User Management > User Settings > Access Control Group.
Step 2 Click Add New.
Step 3 Enter a name for the access control group. For example, Help_Desk.
Step 4 Click Save.
What to do next
Assign Help Desk Role to Access Control Group, on page 25
Procedure
Step 1 In Cisco Unified CM Administration, choose User Management > User Settings > Access Control Group.
Step 2 Click Find and select the access control group that you created for Help Desk.
The Access Control Group Configuration window displays.
Step 3 In the Related Links drop-down list box, choose the Assign Role to Access Control Group option and click
Go.
The Find and List Roles popup displays.
Step 4 Click the Assign Role to Group button.
Step 5 Click Find and select the Help Desk role.
Step 6 Click Add Selected.
Step 7 Click Save.
What to do next
Assign Help Desk Members to Access Control Group, on page 26
Procedure
Step 1 In Cisco Unified CM Administration, choose User Management > User Settings > Access Control Group.
Step 2 Click Find and select the custom Help Desk access control group that you created.
Step 3 Perform either of the following steps:
• If your help desk team members are configured as end users, click Add End Users to Group.
• If your help desk team members are configured as application users, click Add App Users to Group.
Procedure
Step 1 Choose User Management > User Settings > Access Control Group.
The Find and List Access Control Groups window appears.
Step 2 Find the access control group that you want to delete.
Step 3 Click the name of the access control group that you want to delete.
The access control group that you chose appears. The list shows the users in this access control group in
alphabetical order.
Step 4 If you want to delete the access control group entirely, click Delete.
A dialog box appears to warn you that you cannot undo the deletion of access control groups.
Step 5 To delete the access control group, click OK or to cancel the action, click Cancel. If you click OK, Cisco
Unified Communications Manager removes the access control group from the database.
where:
• admin:password is the login ID and password for the Cisco Unified Communications Manager
administrator account.
• UCMaddress is the FQDN or IP address of the Cisco Unified Communications Manger publisher node.
• end_user is the user ID for the user for whom you want to revoke refresh tokens.
Cisco Database Layer Monitor changes the user account status to inactive during scheduled maintenance tasks
if you have not logged in to Cisco Unified Communications Manager within a specified number of days.
Disabled users are audited automatically in the subsequent audit logs.
Procedure
Procedure
Step 1 From Cisco Unified Operating System Administration, choose Services > Remote Support.
Step 2 In the Account Name field, enter a name for the remote account.
Step 3 In the Account Duration field, enter the account duration in days.
Step 4 Click Save.
The system generates an encrypted pass phrase.
Step 5 Contact Cisco support to provide them with the remote support account name and pass phrase.
Standard Role Privileges/Resources for the Role Associated Standard Access Control
Group(s)
Standard AXL API Access Allows access to the AXL database API Standard CCM Super Users
Standard AXL API Users Grants login rights to execute AXL APIs.
Standard AXL Read Only API Access Allows you to execute AXL read only APIs
(list APIs, get APIs, executeSQLQuery
API) by default.
Standard Admin Rep Tool Admin Allows you to view and configure Cisco Standard CAR Admin Users, Standard
Unified Communications Manager CDR CCM Super Users
Analysis and Reporting (CAR).
Standard Audit Log Administration Allows you to perform the following tasks Standard Audit Users
for the audit logging feature :
• View and configure audit logging in
the Audit Log Configuration window
in Cisco Unified Serviceability
• View and configure trace in Cisco
Unified Serviceability and collect
traces for the audit log feature in the
Real-Time Monitoring Tool
• View and start/stop the Cisco Audit
Event service in Cisco Unified
Serviceability
• View and update the associated alert
in the RTMT
Standard CCM Admin Users Grants log-in rights to Cisco Unified Standard CCM Admin Users, Standard
Communications Manager Administration. CCM Gateway Administration, Standard
CCM Phone Administration, Standard
CCM Read Only, Standard CCM Server
Monitoring, Standard CCM Super Users,
Standard CCM Server Maintenance,
Standard Packet Sniffer Users
Standard Role Privileges/Resources for the Role Associated Standard Access Control
Group(s)
Standard CCM End Users Grant an end user log-in rights to the Cisco Standard CCM End Users
Unified Communications Self Care Portal
Standard CCM Feature Management Allows you to perform the following tasks Standard CCM Server Maintenance
in Cisco Unified Communications Manager
Administration:
• View, delete, and insert the following
items by using the Bulk
Administration Tool:
• Client matter codes and forced
authorization codes
• Call pickup groups
Standard CCM Gateway Management Allows you to perform the following tasks Standard CCM Gateway Administration
in Cisco Unified Communications Manager
Administration:
• View and configure gateway templates
in the Bulk Administration Tool
• View and configure gatekeepers,
gateways, and trunks
Standard Role Privileges/Resources for the Role Associated Standard Access Control
Group(s)
Standard CCM Phone Management Allows you to perform the following tasks Standard CCM Phone Administration
in Cisco Unified Communications Manager
Administration:
• View and export phones in the Bulk
Administration Tool
• View and insert user device profiles
in the Bulk Administration Tool
• View and configure the following
items in Cisco Unified
Communications Manager
Administration:
• BLF speed dials
• CTI route points
• Default device profiles or default
profiles
• Directory numbers and line
appearances
• Firmware load information
• Phone button templates or
softkey templates
• Phones
• Reorder phone button
information for a particular
phone by clicking the Modify
Button Items button in the Phone
Configuration window
Standard Role Privileges/Resources for the Role Associated Standard Access Control
Group(s)
Standard CCM Route Plan Management Allows you to perform the following tasks
in Cisco Unified Communications Manager
Administration:
• View and configure application dial
rules
• View and configure calling search
spaces and partitions
• View and configure dial rules,
including dial rule patterns
• View and configure hunt lists, hunt
pilots, and line groups
• View and configure route filters, route
groups, route hunt list, route lists,
route patterns, and route plan report
• View and configure time period and
time schedule
• View and configure translation
patterns
Standard CCM Service Management Allows you to perform the following tasks Standard CCM Server Maintenance
in Cisco Unified Communications Manager
Administration:
• View and configure the following
items:
• Annunciators, conference
bridges, and transcoders
• audio sources and MOH servers
• Media resource groups and media
resource group lists
• Media termination point
• Cisco Unified Communications
Manager Assistant wizard
Standard Role Privileges/Resources for the Role Associated Standard Access Control
Group(s)
Standard CCM System Management Allows you to perform the following tasks Standard CCM Server Maintenance
in Cisco Unified Communications Manager
Administration:
• View and configure the following
items:
• Automate Alternate Routing
(AAR) groups
• Cisco Unified Communications
Managers (Cisco Unified CMs)
and Cisco Unified
Communications Manager
groups
• Date and time groups
• Device defaults
• Device pools
• Enterprise parameters
• Enterprise phone configuration
• Locations
• Network Time Protocol (NTP)
servers
• Plug-ins
• Security profiles for phones that
run Skinny Call Control Protocol
(SCCP) or Session Initiation
Protocol (SIP); security profiles
for SIP trunks
• Survivable Remote Site
Telephony (SRST) references
• Servers
Standard CCM User Privilege Management Allows you to view and configure
application users in Cisco Unified
Communications Manager Administration.
Standard Role Privileges/Resources for the Role Associated Standard Access Control
Group(s)
Standard CCMADMIN Administration Allows you to view and configure all items Standard CCM Super Users
in Cisco Unified Communications Manager
Administration and the Bulk Administration
Tool.
Standard CCMADMIN Read Only Allows you to view configurations in Cisco Standard CCM Gateway Administration,
Unified Communications Manager Standard CCM Phone Administration,
Administration and the Bulk Administration Standard CCM Read Only, Standard CCM
Tool. Server Maintenance, Standard CCM Server
Monitoring
Standard CCMUSER Administration Allows access to the Cisco Unified Standard CCM End Users
Communications Self Care Portal.
Standard CTI Allow Call Monitoring Allows CTI applications/devices to monitor Standard CTI Allow Call Monitoring
calls
Standard CTI Allow Call Park Monitoring Allows CTI applications/devices to use call Standard CTI Allow Call Park Monitoring
park.
Important The maximum number of
opened lines and park lines must
not exceed 65,000.
If the total exceeds 65,000,
remove the Standard CTI Allow
Call Park Monitoring role from
the application user or reduce
the number of park lines that are
configured.
Standard CTI Allow Call Recording Allows CTI applications/devices to record Standard CTI Allow Call Recording
calls
Standard CTI Allow Calling Number Allows CTI applications to transform Standard CTI Allow Calling Number
Modification calling party numbers during a call Modification
Standard Role Privileges/Resources for the Role Associated Standard Access Control
Group(s)
Standard CTI Allow Control of All Devices Allows control of all CTI-controllable Standard CTI Allow Control of All Devices
devices
Standard CTI Allow Control of Phones Allows control of all CTI devices that Standard CTI Allow Control of Phones
Supporting Connected Xfer and conf supported connected transfer and supporting Connected Xfer and conf
conferencing
Standard CTI Allow Control of Phones Allows control of all CTI devices that Standard CTI Allow Control of Phones
Supporting Rollover Mode supported Rollover mode supporting Rollover Mode
Standard CTI Allow Reception of SRTP Allows CTI applications to access and Standard CTI Allow Reception of SRTP
Key Material distribute SRTP key material Key Material
Standard CTI Enabled Enables CTI application control Standard CTI Enabled
Standard CTI Secure Connection Enables a secure CTI connection to Cisco Standard CTI Secure Connection
Unified Communications Manager
Standard CUReporting Allows you to view, download, generate, Standard CCM Administration Users,
and upload reports in Cisco Unified Standard CCM Super Users
Reporting
Standard EM Authentication Proxy Rights Manages Cisco Extension Mobility (EM) Standard CCM Super Users, Standard EM
authentication rights for applications; Authentication Proxy Rights
required for all application users that
interact with Cisco Extension Mobility (for
example, Cisco Unified Communications
Manager Assistant and Cisco Web Dialer)
Standard Packet Sniffing Allows you to access Cisco Unified Standard Packet Sniffer Users
Communications Manager Administration
to enable packet sniffing (capturing).
Standard Role Privileges/Resources for the Role Associated Standard Access Control
Group(s)
Standard Role Privileges/Resources for the Role Associated Standard Access Control
Group(s)
Standard SERVICEABILITY Allows you to view and configure the Standard CCM Server Monitoring, Standard
following windows in Cisco Unified CCM Super Users
Serviceability or the Real-Time Monitoring
Tool:
• Alarm Configuration and Alarm
Definitions (Cisco Unified
Serviceability)
• Audit Trace (marked as read/view
only)
• SNMP-related windows (Cisco
Unified Serviceability)
• Trace Configuration and
Troubleshooting of Trace
Configuration (Cisco Unified
Serviceability
)
• Log Partition Monitoring
• Alert Configuration (RTMT), Profile
Configuration (RTMT), and Trace
Collection (RTMT)
Standard Role Privileges/Resources for the Role Associated Standard Access Control
Group(s)
Standard SERVICEABILITY Read Only Allows you to view all Standard CCM Read Only
serviceability-related data for components
in the Dialed Number Analyzer.
Standard System Service Management Allows you to view, activate, start, and stop
services in Cisco Unified Serviceability.
Standard Confidential Access Level Users Allows you to access all the Confidential Standard Cisco Call Manager
Access Level Pages Administration
Standard CCMADMIN Administration Allows you to administer all aspects of Standard Cisco Unified CM IM and
CCMAdmin system Presence Administration
Standard CCMADMIN Read Only Allows read access to all CCMAdmin Standard Cisco Unified CM IM and
resources Presence Administration
Standard CUReporting Allows application users to generate reports Standard Cisco Unified CM IM and
from various sources Presence Reporting
The End User Configuration window in Cisco Unified CM Administration allows you to add, search, display,
and maintain information about Unified CM end users. You can also use the Quick User/Phone Add window
to quickly configure a new end user and configure a new phone for that end user.
Step 2 Add a new end user using one of the following If you have configured and if your system is
methods synchronized with a company LDAP directory,
Step 3 Assign a phone to a new or existing end user You can use the 'Add New Phone' procedure to
by performing either of the following tasks: configure a new phone for the end user using
settings from a universal device template.
• Add New Phone for End User , on page
46 You can also use the 'Move' procedure to assign
• Move an Existing Phone to a End User, an existing phone that has already been
on page 47 configured.
Step 4 Change the End User PIN, on page 47 (Optional) To change the pin for an end user in
Cisco Unified Communications Manager
Administration.
Step 5 Change the End User Password, on page 47 (Optional) To change the password for an end
user in Cisco Unified Communications Manager
Administration.
Step 6 Create a Cisco Unity Connection Voice (Optional) To create individual Cisco Unity
Mailbox, on page 48 Connection voice mailboxes in Cisco Unified
Communications Manager Administration.
Procedure
Step 2 Configure Universal Device Template, on page Configure universal device templates with
41 common settings that are typically applied to a
phone.
Step 3 Configure User Profiles, on page 42 Assign universal line and universal device
templates to a user profile. If you have the
self-provisioning feature configured, you can
enable self-provisioning for the users who use
this profile.
Step 4 Configure Feature Group Template, on page Assign the user profile to a feature group
43 template. For LDAP Synchronized Users, the
Procedure
Step 1 In Cisco Unified CM Administration, choose User Management > User/Phone Add > Universal Line
Template.
Step 2 Click Add New.
Step 3 Configure the fields in the Universal Line Template Configuration window. See the online help for more
information about the fields and their configuration options.
Step 4 If you are deploying Global Dial Plan Replication with alternate numbers expand the Enterprise Alternate
Number and +E.164 Alternate Number sections and do the following:
a) Click the Add Enterprise Alternate Number button and/or Add +E.164 Alternate Number button.
b) Add the Number Mask that you want to use to assign to your alternate numbers. For example, a 4-digit
extension might use 5XXXX as an enterprise number mask and 1972555XXXX as an +E.164 alternate
number mask.
c) Assign the partition where you want to assign alternate numbers.
d) If you want to advertise this number via ILS, check the Advertise Globally via ILS check box. Note that
if you are using advertised patterns to summarize a range of alternate numbers, you may not need to
advertise individual alternate numbers.
e) Expand the PSTN Failover section and choose the Enterprise Number or +E.164 Alternate Number
as the PSTN failover to use if normal call routing fails.
Step 5 Click Save.
What to do next
Configure Universal Device Template, on page 41
Procedure
Step 1 In Cisco Unified CM Administration, choose User Management > User/Phone Add > Universal Device
Template.
Step 2 Click Add New.
Step 3 Enter the following mandatory fields:
a) Enter a Device Description for the template.
b) Select a Device Pool type from the drop-down list.
c) Select a Device Security Profile from the drop-down list.
d) Select a SIP Profile from the drop-down list.
e) Select a Phone Button Template from the drop-down list.
Step 4 Complete the remaining fields in the Universal Device Template Configuration window. For field
descriptions, see the online help.
Step 5 Under Phone Settings, complete the following optional fields:
a) If you configured a Common Phone Profile, assign the profile.
b) If you configured a Common Device Configuration, assign the configuration.
c) If you configured a Feature Control Policy, assign the policy.
Step 6 Click Save.
What to do next
Configure User Profiles, on page 42
Procedure
Step 1 From Cisco Unified CM Administration, choose User Management > User Settings > User Profile.
Step 2 Click Add New.
Step 3 Enter a Name and Description for the user profile.
Step 4 Assign a Universal Device Template to apply to users' Desk Phones, Mobile and Desktop Devices, and
Remote Destination/Device Profiles.
Step 5 Assign a Universal Line Template to apply to the phone lines for users in this user profile.
Step 6 If you want the users in this user profile to be able to use the self-provisioning feature to provision their own
phones, do the following:
a) Check the Allow End User to Provision their own phones check box.
b) In the Limit Provisioning once End User has this many phones field, enter a maximum number of
phones the user is allowed to provision. The maximum is 20.
Step 7 If you want Cisco Jabber users associated with this user profile, to be able to use the Mobile and Remote
Access feature, check the Enable Mobile and Remote Access check box.
Note • By default, this check box is selected. When you uncheck this check box, the Jabber Policies
section is disabled and No Service client policy option is selected by default.
• This setting is mandatory only for Cisco Jabber users whom are using OAuth Refresh Logins.
Non-Jabber users do not need this setting to be able to use Mobile and Remote Access. Mobile
and Remote Access feature is applicable only for the Jabber Mobile and Remote Access users
and not to any other endpoints or clients.
Step 8 Assign the Jabber policies for this user profile. From the Jabber Desktop Client Policy, and Jabber Mobile
Client Policy drop-down list, choose one of the following options:
• No Service—This policy disables access to all Cisco Jabber services.
• IM & Presence only—This policy enables only instant messaging and presence capabilities.
• IM & Presence, Voice and Video calls—This policy enables instant messaging, presence, voicemail, and
conferencing capabilities for all users with audio or video devices. This is the default option.
Note Jabber desktop client includes Cisco Jabber for Windows users and Cisco Jabber for Mac users.
Jabber mobile client includes Cisco Jabber for iPad and iPhone users and Cisco Jabber for Android
users.
Step 9 If you want the users in this user profile to set the maximum login time for Extension Mobility or Extension
Mobility Cross Cluster through Cisco Unified Communications Self Care Portal, check the Allow End User
to set their Extension Mobility maximum login time check box.
Note By default Allow End User to set their Extension Mobility maximum login time check box is
unchecked.
What to do next
Configure Feature Group Template, on page 43
Procedure
Step 1 In Cisco Unified CM Administration, choose User Management > User/Phone Add > Feature Group
Template.
What to do next
Add a new end user. If your system is integrated with a company LDAP directory, you can import the user
directly from an LDAP directory. Otherwise, create the end user manually.
• Import an End User from LDAP, on page 44
• Add an End User Manually, on page 45
Note You cannot add new configurations (for example, adding a feature group template) into an LDAP directory
sync after the initial sync has occurred. If you want to edit an existing LDAP sync, you must either use Bulk
Administration, or configure a new LDAP sync.
Procedure
Step 1 In Cisco Unified CM Administration, choose System > LDAP > LDAP Directory.
Step 2 Click Find and select the LDAP directory to which the user is added.
Step 3 Click Perform Full Sync.
Cisco Unified Communications Manager synchronizes with the external LDAP directory. Any new end users
in the LDAP directory are imported into the Cisco Unified Communications Manager database.
What to do next
If the user is enabled for self-provisioning, the end user can use the Self-Provisioning Interactive Voice
Response (IVR) to provision a new phone. Otherwise, perform one of the following tasks to assign a phone
to the end user:
• Add New Phone for End User , on page 46
• Move an Existing Phone to a End User, on page 47
Note Make sure that you have already set up an access control groups that has the role permissions to which you
want to assign your user. For details, see the "Manage User Access" chapter.
Procedure
Step 1 In Cisco Unified CM Administration, choose User Management > User/Phone Add > Quick User/Phone
Add.
Step 2 Enter the User ID and Last Name.
Step 3 From the Feature Group Template drop-down list, select a feature group template.
Step 4 Click Save.
Step 5 From the User Profile drop-down list, verify that the selected user profile includes a universal line template.
Step 6 From the Access Control Group Membership section, click the + icon.
Step 7 From the User is a member of drop-down list, select an access control group.
Step 8 Under Primary Extension, click the + icon.
Step 9 From the Extension drop-down list, select a DN that displays as (available).
Step 10 If all line extensions display as (used), perform the following steps:
a) Click the New... button.
The Add New Extension popup displays.
b) In the Directory Number field, enter a new line extension.
c) From the Line Template drop-down list, select a universal line template.
d) Click OK.
Cisco Unified Communications Manager configures the directory number with the settings from the
universal line template.
Step 11 (Optional) Complete any additional fields in the Quick User/Phone Add Configuration window.
Step 12 Click Save.
What to do next
Perform one of the following procedures to assign a phone to this end user:
• Add New Phone for End User , on page 46
• Move an Existing Phone to a End User, on page 47
Procedure
Step 1 In Cisco Unified CM Administration, choose User Management > User/Phone Add > Quick/User Phone
Add.
Step 2 Click Find and select the end user for whom you want to add a new phone.
Step 3 Click the Manage Devices.
The Manage Devices window appears.
Step 4 Click Add New Phone.
The Add Phone to User popup displays.
Step 5 From the Product Type drop-down list, select the phone model.
Step 6 From the Device Protocol drop-down list select SIP or SCCP as the protocol.
Step 7 In the Device Name text box, enter the device MAC address.
Step 8 From the Universal Device Template drop-down list, select a universal device template.
Step 9 If the phone supports expansion modules, enter the number of expansion modules that you want to deploy.
Step 10 If you want to use Extension Mobility to access the phone, check the In Extension Mobility check box.
Step 11 Click Add Phone.
The Add New Phone popup closes. Cisco Unified Communications Manager adds the phone to the user and
uses the universal device template to configure the phone.
Step 12 If you want to make additional edits to the phone configuration, click the corresponding Pencil icon to open
the phone in the Phone Configuration window.
Procedure
Step 1 In Cisco Unified CM Administration, choose User Management > User/Phone Add > Quick/User Phone
Add.
Step 2 Click Find and select the user to whom you want to move an existing phone.
Step 3 Click the Manage Devices button.
Step 4 Click the Find a Phone to Move To This User button.
Step 5 Select the phone that you want to move to this user.
Step 6 Click Move Selected.
Step 1 In Cisco Unified Communications Manager Administration, choose User Management > End User.
The Find and List Users window appears.
Step 2 To select an existing user, specify the appropriate filters in the Find User Where field, click Find to retrieve
a list of users, and then select the user from the list.
The End User Configuration window is displayed.
Step 3 In the PIN field, double-click the existing PIN, which is encrypted, and enter the new PIN. You must enter
at least the minimum number of characters that are specified in the assigned credential policy (1-127 characters).
Step 4 In the Confirm PIN field, double-click the existing, encrypted PIN and enter the new PIN again.
Step 5 Click Save.
Note You can login to Extension Mobility, Conference Now, Mobile Connect, and Cisco Unity Connection
voicemail with the same end user PIN, if End User Pin synchronization checkbox is enabled in
the Application Server Configuration window for Cisco Unity Connection. End users can use
the same PIN to log in to Extension Mobility and to access their voicemail.
Procedure
Step 1 In Cisco Unified Communications Manager Administration, choose User Management > End User.
The Find and List Users window appears.
Step 2 To select an existing user, specify the appropriate filters in the Find User Where field, click Find to retrieve
a list of users, and then select the user from the list.
The End User Configuration window is displayed.
Step 3 In the Password field, double-click the existing password, which is encrypted, and enter the new password.
You must enter at least the minimum number of characters that are specified in the assigned credential policy
(1-127 characters).
Step 4 In the Confirm Password field, double-click the existing, encrypted password and enter the new password
again.
Step 5 Click Save.
Procedure
Step 1 In Cisco Unified Communications Manager Administration, choose User Management > End User.
The Find and List Users window appears.
Step 2 To select an existing user, specify the appropriate filters in the Find User Where field, click Find to retrieve
a list of users, and then select the user from the list.
The End User Configuration window is displayed.
Step 3 Verify that a primary extension number is associated with this user.
Note You must define a primary extension; otherwise, the Create Cisco Unity User link does not appear
in the Related Links drop-down list.
Step 4 From the Related Links drop-down list, choose the Create Cisco Unity User link, and then click Go.
The Add Cisco Unity User dialog box appears.
Step 5 From the Application Server drop-down list, choose the Cisco Unity Connection server on which you want
to create a Cisco Unity Connection user, and then click Next.
Step 6 From the Subscriber Template drop-down list, choose the subscriber template that you want to use.
Step 7 Click Save.
The mailbox is created. The link in the Related Links drop-down list changes to Edit Cisco Unity User in
the End User Configuration window. In Cisco Unity Connection Administration, you can now view the user
that you created.
Note After you integrate the Cisco Unity Connection user with the Cisco Unified Communications
Manager end user, you cannot edit fields in Cisco Unity Connection Administration such as Alias
(User ID in Cisco Unified CM Administration), First Name, Last Name, and Extension (Primary
Extension in Cisco Unified CM Administration). You can only update these fields in Cisco Unified
CM Administration.
Note Administrator users in the Standard CCM Super Users group can access Cisco Unified Communications
Manager Administration, Cisco Unified Serviceability, and Cisco Unified Reporting with a single sign-on to
one of the applications.
Step 2 Associate Devices with Application Users, on Assign devices to associate with an application
page 53 user.
Step 3 Add Administrator User to Cisco Unity or Cisco Add a user as an administrator user to Cisco
Unity Connection, on page 53 Unity or Cisco Unity Connection. You
configure the application user in Cisco Unified
CM Administration; then, configure any
additional settings for the user in Cisco Unity
or Cisco Unity Connection Administration.
Step 4 Change Application User Password, on page Change an application user password.
54
Step 5 Manage Application User Password Credential Change or view credential information, such as
Information, on page 54 the associated authentication rules, the
associated credential policy, or the time of last
password change for an application user.
Step 1 In Cisco Unified CM Administration, choose User Management > Application User .
Step 2 Click Add New.
Step 3 Configure the fields in the Application User Configuration window. See the online help for information
about the fields and their configuration options.
Step 4 Click Save.
What to do next
Associate Devices with Application Users, on page 53
Step 1 From Cisco Unified CM Administration, choose User Management > Application User.
The Find and List Users window appears.
Step 2 To select an existing user, specify the appropriate filters in the Find User Where field, select Find to retrieve
a list of users, and then select the user from the list.
Step 3 In the Available Devices list, choose a device that you want to associate with the application user and click
the Down arrow below the list. The selected device moves to the Controlled Devices list.
Note To limit the list of available devices, click the Find more Phones or Find more Route Points
button.
Step 4 If you click the Find more Phones button, the Find and List Phones window displays. Perform a search to
find the phones to associate with this application user.
Repeat the preceding steps for each device that you want to assign to the application user.
Step 5 If you click the Find more Route Points button, the Find and List CTI Route Points window displays.
Perform a search to find the CTI route points to associate with this application user.
Repeat the preceding steps for each device that you want to assign to the application user.
Guide for Cisco Unity or the applicable Cisco Unified Communications Manager SCCP Integration Guide
for Cisco Unity Connection at
http://www.cisco.com/c/en/us/support/unified-communications/unity-connection/
products-installation-and-configuration-guides-list.html.
Procedure
Step 1 From Cisco Unified CM Administration, choose User Management > Application User.
Step 2 To select an existing user, specify the appropriate filters in the Find User Where field, select Find to retrieve
a list of users, and then select the user from the list.
Step 3 From the Related Links drop-down list, choose the Create Cisco Unity Application User link and click
Go.
The Add Cisco Unity User dialog displays.
Step 4 From the Application Server drop-down list, choose the Cisco Unity or Cisco Unity Connection server on
which you want to create a Cisco Unity or Cisco Unity Connection user and click Next.
Step 5 From the Application User Template drop-down list, choose the template that you want to use.
Step 6 Click Save.
The administrator account gets created in Cisco Unity or Cisco Unity Connection. The link in Related Links
changes to Edit Cisco Unity User in the Application User Configuration window. You can now view the
user that you created in Cisco Unity Administration or Cisco Unity Connection Administration.
Step 1 From Cisco Unified CM Administration, choose User Management > Application User.
The Find and List Users window appears.
Step 2 To select an existing user, specify the appropriate filters in the Find User Where field, select Find to retrieve
a list of users, and then select the user from the list.
The Application User Configuration window displays information about the chosen application user.
Step 3 In the Password field, double click the existing, encrypted password and enter the new password.
Step 4 In the Confirm Password field, double click the existing, encrypted password and enter the new password
again.
Step 5 Click Save.
Procedure
Step 1 From Cisco Unified CM Administration, choose User Management > Application User.
The Find and List Users window appears.
Step 2 To select an existing user, specify the appropriate filters in the Find User Where field, select Find to retrieve
a list of users, and then select the user from the list.
The Application User Configuration window displays information about the chosen application user.
Step 3 To change or view password information, click the Edit Credential button next to the Password field.
The user Credential Configuration is displayed.
Step 4 Configure the fields on the Credential Configuration window. See the online help for more information
about the fields and their configuration options.
Step 5 If you have changed any settings, click Save.
Use Template From Device True The values for Device Pool, Phone
Defaults Template, Calling Search Space,
Phone Button Template is taken
from Device defaults.
Create an Individual Template True The values for Device Pool, Phone
Template, Calling Search Space,
Phone Button Template is taken
from Device defaults.
Individual templates are not
created.
Auto Registration Legacy Mode
has the priority.
Step 2 Add Phone Manually, on page 61 Add a new phone for an end user without
device template.
Step 3 Add a New Phone from Template with an End Add a new phone for an end user and assign a
User, on page 62 universal device template.
Step 4 Move an Existing Phone, on page 69 Move a configured phone to a different end
user.
Step 5 Find an Actively Logged-In Device , on page Search for a specific device or list all devices
69 for which users are actively logged in.
Step 6 Find a Remotely Logged-In Device , on page Search for a specific device or list all devices
70 for which users are logged in remotely.
Step 7 Remotely Lock a Phone, on page 71 Some phones can be locked remotely. When
you remotely lock a phone, the phone cannot
be used until you unlock it.
Step 8 Reset a Phone to Factory Defaults , on page Reset a phone to its factory settings.
72
Step 10 View LSC Status and Generate a CAPF Report Search for LSC expiry status on phones, and
for a Phone, on page 73 also generate a CAPF report.
Procedure
Step 1 From the Cisco Unified CM Administration, choose Device > Phone > Find and List Phones.
Step 2 From Find and List Phones page, click Add New to manually add a phone.
Add a New Phone page is displayed.
From Add a New Phone page, if you click “click here to add a new phone using a Universal Device Template”
hyper link, the page is redirected to the Add a New Phone page to add a phone from the template with or
without adding a user. See Add New Phone from Template with or Without an End User, on page 61 for
more information.
Step 3 From the Phone Type drop-down list, select the phone model.
Step 4 Click Next.
The Phone Configuration page is displayed.
Step 5 On Phone Configuration page, enter the values in the required fields. See online help for more information
on fields.
For additional information about the fields in the Product Specific Configuration area, see the Cisco IP Phone
Administration Guide for your phone model.
What to do next
Move an Existing Phone to a End User, on page 47
Procedure
Step 1 From the Cisco Unified CM Administration, choose Device > Phone > Find and List Phones.
Step 2 From Find and List Phones page, click Add New From Template to add a phone from device template
with or without adding an end user.
Add a New Phone page is displayed.
From Add a New Phone page, if you click “click here to enter all phone settings manually” hyper link, the
page is redirected to the existing Add a New Phone page to manually add a phone. See Add Phone Manually,
on page 61for more information.
Step 3 From the Phone Type (and Protocol) drop-down list, select the phone model.
The protocol drop-down displays only when the phone supports multiple protocols.
Step 4 In the Name or MAC Address text box, enter the name or MAC address.
Step 5 From the Device Template drop-down list, select a universal device template.
Step 6 From the Directory Number (Line 1) drop-down list, select a directory number.
If the directory numbers in the drop-down list exceeds the maximum drop-down limit, the Find tab is displayed.
Click Find, a pop-up dialog box opens with Find Directory Number criteria.
Step 7 (Optional) Click New, enter Directory Number, and select a Universal Line template, if you want to create a
new directory number and assign it to the device.
You can alternately create a phone using a user associated Directory Number, go to User Management >
User/Phone Add > Quick/User Phone Add.
Step 8 (Optional) From the User drop-down list, select the end user for whom you want to add a new phone.
Note It is mandatory to select the user for Cisco Dual Mode (mobile) devices.
If the number of end users in the drop-down list exceeds the maximum drop-down limit, the Find tab is
displayed. Click Find, a pop-up dialog box opens with Find end user criteria.
Step 9 Click Add.
Note For Non-Size safe phones, the phone templates are created based on the selection of Phone Template
Selection for Non-Size Safe Phone and Auto Registration Legacy Mode parameters on Enterprise
Parameters Configuration page.
Add Successful message is displayed. Cisco Unified Communications Manager adds the phone and Phone
Configuration page is displayed. See the online help for more information about the fields on Phone
Configuration page.
What to do next
Move an Existing Phone to a End User, on page 47
Procedure
Step 1 In Cisco Unified CM Administration, choose User Management > User/Phone Add > Quick/User Phone
Add.
Step 2 Click Find and select the end user for whom you want to add a new phone.
Step 3 Click the Manage Devices.
The Manage Devices window appears.
Step 4 Click Add New Phone.
The Add Phone to User popup displays.
Step 5 From the Product Type drop-down list, select the phone model.
Step 6 From the Device Protocol drop-down list select SIP or SCCP as the protocol.
Step 7 In the Device Name text box, enter the device MAC address.
Step 8 From the Universal Device Template drop-down list, select a universal device template.
Step 9 If the phone supports expansion modules, enter the number of expansion modules that you want to deploy.
Step 10 If you want to use Extension Mobility to access the phone, check the In Extension Mobility check box.
Step 11 Click Add Phone.
The Add New Phone popup closes. Cisco Unified Communications Manager adds the phone to the user and
uses the universal device template to configure the phone.
Step 12 If you want to make additional edits to the phone configuration, click the corresponding Pencil icon to open
the phone in the Phone Configuration window.
• License - Count as a separate device for license usage perspective. Any multi-device license bundle
should support CMC-RD.
Procedure
Step 11 To update the existing Remote Destination, enter the New Name and Click Save.
Step 12 To delete existing Remote Destination, Click the Delete button in the menu.
A message from webpage appears confirming the permanent deletion. Click Ok
Step 13 To delete CMC device from the Device Page, Select the Device Check box and Click Delete Selected from
the menu.
Feature Interaction
Shared Line handling • In a set up where you have a shared desk phone with a CMC RD and
Spark RD associated , when a user calls from an enterprise phone to
a CMC Device DN, all the three - CMC RD, Spark RD and the Shared
desk phone rings.
• Answering from any of the remote destinations displays the message
“Remote in Use” on the shared desk phone.
• Answering from any of the shared desk phone disconnects both remote
destination phones (CMC RD and Spark RD phones).
CMC Device to work in Call • When a CMC device is associated with a Call Manager group, it
Manager Group (CMG) Setup always runs on primary server and runs on the next active secondary
server of the Call Manager Group only if the primary server is down.
• If the primary server goes down mid call, then the ongoing call is still
preserved and after the call ends, the CMC device registers to
secondary server.
Note When the call is in preserved mode, media between the
phones still remains active, but no other actions can be
performed except disconnecting the call.
• If the Primary server was down initially and call was initiated while
the CMC device was registered to Secondary server and then the
Primary server comes up during ongoing call, the call will go into
preservation mode and after the call ends the CMC device registers
to Primary server.
Feature Interaction
Call Anchoring All the basic incoming calls from the CMC device and Number to Remote
Destination calls are anchored in the enterprise network.
When the CMC Remote Device is configured, users can place and receive
calls from their mobile device with all calls being anchored to the enterprise:
• A user can dial directly to a CMC Remote destination from an
Enterprise number.The call is anchored in the enterprise network. In
this scenario, the desk phone(shared line of CMC device) does not
ring, but remains in Remote in Use state.
• A user can dial from CMC Remote destination to any Enterprise
number. The call is anchored. In this scenario, the desk phone (shared
line of CMC device) remains in Remote in Use state.
Single Number Reach • In the Remote Destination configuration page, if the Enable Single
Number Reach checkbox is unchecked, the call do not get extended
to the CMC RD and the call gets rejected.
• The incoming calls from Remote Destination and the outbound
Number to Remote Destination calls do not get affected irrespective
of the Enable Single Number Reach checkbox selection.
• If there is shared desk phone with the CMC device and if the Enable
Single Number Reach checkbox is unchecked, then the call gets
extended to the shared desk phone but not to the CMC RD.
Feature Interaction
Call Routing based on Time of • You can use the Time of Day configurations for the Remote
Day (ToD) Destination to set up a ring schedule (for example, you can configure
specific times such as Monday - Friday between 9 am and 5 pm).
Calls will only be redirected to your Remote Destination at those
times.
Call from the Enterprise phone to CMC number gets routed based on
the Ring Schedule fixed in the Remote Destination configuration
page. Ring Schedule can be specified as below:
• All the Time – Call gets routed at any time. There is no
restrictions.
• Day(s) of the week – Calls get routed only on the selected
specific day.
• Specific time - Calls get routed only in the selected office hours.
Make sure to select the Time Zone.
• When receiving a call during the Ring schedule, call from the
Enterprise phone to CMC number gets routed based on the call number
or pattern added in the Allowed access list or Blocked access list in
the Remote Destination configuration page.
• Allowed access list- Destination rings only if the caller number
or pattern is in the Allowed access list.
• Blocked access list- Destination do not ring if the caller number
or pattern is in the Blocked access list.
User Locale settings The CMC Virtual Device uses the locale settings that are configured in
the Phone Configuration window to determine locale for the phone display
and phone announcements. This policy works for regular calls, and for
calls to a Conference Now number.
For the announcement part, when calling (any enterprise phone) and called
(CMC device) phone with same language selected in User locale settings,
the announcement on both calling and Remote Destination is based on the
User Locale settings selected in the Phone configuration page.
Note For example, when calling from a Remote Destination which
is associated with a CMC device, to a Conference Now
number, the announcement is based on the User Locale settings
selected in the Phone configuration page of the CMC device.
Feature Interaction
New Access code for HLogin This functionality helps the administrator to set the Hunt Group Login and
and HLogout Logout number for the CMC device using the added service parameters:
• Enterprise Feature Access number for Hunt group Login.
• Enterprise Feature Access number for Hunt group Logout.
When a user enters the Hlogin number from the RD associated to a CMC
device, only then the calls will get redirected to the RD on dialing the hunt
pilot number associated with the CMC device.
When a user enters the Hlogout number from the RD associated to a CMC
device, then the calls will not get redirected to the RD on dialing the hunt
pilot number associated with the CMC device.
By default the CMC device is Hloggedin. In either case, a direct call to
the CMC device is not affected.
CMC Remote Destination call If delay before ringing timer in DB is configured as 5000
extention based on delay before
• When called from an Enterprise phone to CMC number, the
ringer timer configured in
shared line rings and the call reaches the Remote Destination
Database
after five seconds.
• When called from an Enterprise phone to CMC number, if the
shared line answers the call before five seconds, the call do not
get extended to Remote Destination.
• When called from Enterprise phone to CMC number, the shared
line rings and if the calling party disconnects the call before five
seconds, the call do not get extended to Remote Destination.
Bulk Administration Tool (BAT) BAT support is provided for CMC device
Support
Feature Restriction
Procedure
Step 1 In Cisco Unified CM Administration, choose User Management > User/Phone Add > Quick/User Phone
Add.
Step 2 Click Find and select the user to whom you want to move an existing phone.
Step 3 Click the Manage Devices button.
Step 4 Click the Find a Phone to Move To This User button.
Step 5 Select the phone that you want to move to this user.
Step 6 Click Move Selected.
Cross Cluster feature, the actively logged-in device report tracks the local phones that are actively logged in
by remote users.
Unified Communications Manager provides a specific search window for searching for devices to which users
are logged in. Follow these steps to search for a specific device or to list all devices for which users are actively
logged in.
Procedure
Step 5 From the list of records that display, click the link for the record that you want to view.
Note To reverse the sort order, click the up or down arrow, if available, in the list header.
Procedure
Step 5 From the list of records that display, click the link for the record that you want to view.
Note To reverse the sort order, click the up or down arrow, if available, in the list header.
Procedure
Step 3 Choose the phone for which you want to perform a remote lock.
Step 4 On the Phone Configuration window, click Lock.
If the phone is not registered, a popup window displays to inform you that the phone will be locked the next
time it is registered. Click Lock.
A Device Lock/Wipe Status section appears, with information about the most recent request, whether it is
pending, and the most recent acknowledgement.
Caution This operation cannot be undone. You should only perform this operation when you are sure you want to reset
the phone to its factory settings.
Procedure
Step 3 Choose the phone for which you want to perform a remote wipe.
Step 4 In the Phone Configuration window, click Wipe.
If the phone is not registered, a popup window displays to inform you that the phone will be wiped the next
time it is registered. Click Wipe.
A Device Lock/Wipe Status section appears, with information about the most recent request, whether it is
pending, and the most recent acknowledgment.
Procedure
Step 2 Select the Phone Lock/Wipe Report from the Related Links drop-down list in the upper right corner of the
window and click Go.
Step 3 To find all remotely locked or remotely wiped device records in the database, ensure that the text box is empty;
go to Step 4.
To filter or search records for a specific device:
a) From the first drop-down list, select the device operation type(s) to search.
b) From the second drop-down list, select a search parameter.
c) From the third drop-down list, select a search pattern.
d) Specify the appropriate search text, if applicable.
Note To add additional search criteria, click the + button. When you add criteria, the system searches
for a record that matches all criteria that you specify. To remove criteria, click the – button to
remove the last added criterion or click the Clear Filter button to remove all added search criteria.
Step 5 From the list of records that display, click the link for the record that you want to view.
Note To reverse the sort order, click the up or down arrow, if available, in the list header.
Note The status of LSC Expires and LSC Issuer Expires by fields are set to “NA” when there is no LSC issued
on a new device.
The status of LSC Expires and LSC Issuer Expires by fields are set to “ Unknown” when the LSC is issued
to a device before the upgrade to Cisco Unified Communications Manager 11.5(1).
Procedure
• LSC Issued By
• LSC Issuer Expires By
From the second Find Phone where drop-down list, choose one of the following criteria:
• is before
• is exactly
• is after
• begins with
• contains
• ends with
• is exactly
• is empty
• is not empty
Tip You can apply a new load to a single device before configuring it as a systemwide default. This method is
useful for testing purposes. Remember, however, that all other devices of that type use the old load until you
update the systemwide defaults with the new load.
Note Refer to the README file for installation instructions that are specific to the COP or Firmware files package.
Procedure
Step 1 From Cisco Unified OS Administration, choose Software Upgrades > Install/Upgrade.
Step 2 Fill in the applicable values in the Software Location section and click Next.
Step 3 In the Available Software drop-down list, select the device package file and click Next.
Step 4 Verify that the MD5 value is correct, and then click Next.
Step 5 In the warning box, verify that you selected the correct firmware, and then click Install.
Step 6 Check that you received a success message.
Note Skip to Step 8 if you are rebooting the cluster.
Step 7 Restart the Cisco TFTP service on all nodes where the service is running.
Step 8 Reset the affected devices to upgrade the devices to the new load.
Step 9 From Cisco Unified CM Administration, choose Device > Device Settings > Device Defaults and manually
change the name of the load file (for specific devices) to the new load.
Step 10 Click Save, and then reset the devices.
Step 11 Restart the Cisco Tomcat service on all cluster nodes.
Step 12 Do one of the following:
• If you are running 11.5(1)SU4 or lower, 12.0(1) or 12.0(1)SU1, reboot the cluster.
• If you are running an 11.5(x) release at 11.5(1)SU5 or higher, or any release higher at 12.0(1)SU2 or
higher, reboot the Cisco CallManager service on the publisher node. However, if you are running the
Cisco CallManager service on subscriber nodes only, you can skip this task.
Issue Cause/Resolution
New devices won't This could occur due from a device type mismatch. This can be caused by:
register
• The device was added in the Phone Configuration window using the wrong
device type. For example, Cisco DX80 was selected as the phone type instead
of Cisco TelePresence DX80. Reconfigure the device with the correct device
type.
• The Cisco CallManager service doesn't know about the new device type.
In this case, restart the Cisco CallManager service on the publisher node.
Phone Configuration Restart the Cisco Tomcat service on all nodes from the CLI.
window in Cisco Unified
CM Administration shows
broken links where the
icon image should be for
a new device type
Note You must delete unused firmware separately for each server in the cluster.
Caution Before you delete unused firmware, ensure that you are deleting the right loads. The deleted loads cannot be
restored without performing a DRS restore of the entire cluster. We recommend that you take a backup before
deleting the firmware.
Ensure that you do not delete files for devices that use multiple loads of files. For example, certain CE endpoints
use multiple loads. However, only one load is referenced as In Use in the Device Load Management window.
Procedure
Step 1 From Cisco Unified OS Administration, choose Software Upgrades > Device Load Management.
Step 2 Specify the search criteria and click Find.
Step 3 Select the device load that you want to delete. You can select multiple loads if required.
Step 4 Click Delete Selected Loads.
Step 5 Click OK.
Note For an individual phone, the setting of the Phone Load Name field in the Phone Configuration window
overrides the default firmware load for that particular phone.
Procedure
Step 1 In Cisco Unified CM Administration, choose Device > Device Settings > Device Defaults.
The Device Defaults Configuration window appears displaying the default firmware loads for the various
phone models that Cisco Unified Communications Manager supports. The firmware appears in the Load
Information column.
Step 2 Under Device Type, locate the phone models for which you want to assign the default firmware.
Step 3 In the accompanying Load Information field, enter the firmware load.
Step 4 (Optional) Enter the default Device Pool and default Phone Template for that phone model.
Step 5 Click Save.
Note If you wish to assign a version for many phones you can use the Bulk Administration Tool to configure the
Phone Load Name field using a CSV file or query. For details, see the Bulk Administration Guide for Cisco
Unified Communications Manager.
Procedure
Note If you wish to assign a load server for many phones you can use the Bulk Administration Tool to configure
the Load Server field using a CSV file or query. For details, see the Bulk Administration Guide for Cisco
Unified Communications Manager.
Procedure
Note Each device can have an individually assigned firmware load that overrides the default.
Use the following procedure to locate devices that are not using the default firmware load.
Procedure
Step 1 Choose Device > Device Settings > Firmware Load Information.
The page updates to display a list of device types that require firmware loads. For each device type, the Devices
Not Using Default Load column links to configuration settings for any devices that use a non-default load.
Step 2 To view a list of devices of a particular device type that are using a non-default device load, click the entry
for that device type in the Devices Not Using Default Load column.
The window that opens lists the devices of a particular device type that are not running the default firmware
load.
Procedure
Step 2 Deactivate Tracking for Infrastructure Device, If you have a switch or access point that is not
on page 82 being used, mark the device inactive. The
system will stop updating the status or the list
of associated endpoints for the infrastructure
device.
Step 3 Activate Tracking for Deactivated Infrastructure Initiate tracking for an inactive infrastructure
Devices, on page 83 device. Cisco Unified Communications
Manager begins updating the database with the
status and the list of associated endpoints for
the infrastructure device.
Procedure
Step 1 In Cisco Unified CM Administration, choose Advanced Features > Device Location Tracking Services >
Switches and Access Points.
Step 2 Click Find.
Step 3 Click on the switch or access point for which you want the status.
The Switches and Access Point Configuration window displays the current status including the list of
endpoints that currently associate to that access point or switch.
Note If you remove tracking for an infrastructure device, the device remains in the database, but becomes inactive.
Cisco Unified Communications Manager no longer updates the status for the device, including the list of
endpoints that associate to the infrastructure device. You can view your inactive switches and access points
from the Related Links drop-down in the Switches and Access Points window.
Procedure
Step 1 In Cisco Unified CM Administration, choose Advanced Features > Device Location Tracking Services >
Switches and Access Points.
Step 2 Click Find and select the switch or access point that you want to stop tracking.
Step 3 Click Deactivate Selected.
Procedure
Step 1 In Cisco Unified CM Administration, choose Advanced Features > Device Location Tracking Services >
Switches and Access Points.
Step 2 From Related Links, choose Inactive Switches and Access Points and click Go.
The Find and List Inactive Switches and Access Points window displays infrastructure devices that are not
being tracked.
Step 3 Select the switch or access point for which you want to initiate tracking.
Step 4 Click Reactivate Selected.
Procedure
Step 1 From Cisco Unified Operating System Administration, choose Show > Cluster.
Step 2 Review the fields in the Cluster window. See the online help for more information about the fields.
Procedure
Step 1 From the Cisco Unified Operating System Administration, select Show > Hardware.
Step 2 Review the fields in the Hardware Status window. See the online help for more information about the fields.
Procedure
Step 1 From Cisco Unified Operating System Administration, choose Show > Network.
Step 2 Review the fields in the Network Configuration window. See the online help for more information about
the fields.
Procedure
Step 1 From Cisco Unified Operating System Administration, choose Show > Software.
Step 2 Review the fields in the Software Packages window. See the online help for more information about the
fields.
Procedure
Step 1 From Cisco Unified Operating System Administration, choose Show > System.
Step 2 Review the fields in the System Status window. See the online help for more information about the fields.
View IP Preferences
Use this procedure to show a list of registered ports are available to the system.
Procedure
Step 1 From Cisco Unified Operating System Administration, choose Show > IP Preferences.
Step 2 (Optional) To filter or search records, perform one of the following tasks:
• From the first list, select a search parameter.
• From the second list, select a search pattern.
• Specify the appropriate search text, if applicable.
Only administrators can login and view the last login details for the following web applications in Cisco
Unified Communications Manager:
• Disaster Recovery System
• Cisco Unified OS Administration
Ping a Node
Use the Ping Utility to ping another node in the network. These results can help you verify or troubleshoot
device connectivity.
Procedure
Step 1 From Cisco Unified Operating System Administration, choose Services > Ping.
Step 2 Configure the fields on the Ping Configuration window. See the online help for more information about the
fields and their configuration options.
Step 3 Choose Ping.
The ping results are displayed.
Procedure
Step 4 In the Service Parameter Configuration window that displays, choose Parameters for All Servers in The
Related Links Drop-down List Box; then, click Go.
The Parameters for All Servers window displays. For the current service, the list shows all parameters in
alphabetical order. For each parameter, the suggested value displays next to the parameter name. Under each
parameter name, a list of servers that contain this parameter displays. Next to each server name, the current
value for this parameter on this server displays.
For a given parameter, click on the server name or on the current parameter value to link to the corresponding
service parameter window to change the value. Click Previous and Next to navigate between Parameters for
All Servers windows.
Step 5 If you need to display out-of-sync service parameters, choose Out of Sync Parameters for All Servers in the
Related Links drop-down list box, then click Go.
The Out of Sync Parameters for All Servers window displays. For the current service, service parameters that
have different values on different servers display in alphabetical order. For each parameter, the suggested
value displays next to the parameter name. Under each parameter name, a list of servers that contain this
parameter displays. Next to each server name, the current value for this parameter on this server displays.
For a given parameter, click the server name or the current parameter value to link to the corresponding service
parameter window to change the value. Click Previous and Next to navigate between Out of Sync Parameters
for All Servers windows.
Step 6 If you need to display service parameters that have been modified from the suggested value, choose Modified
Parameters for All Servers in the Related Links drop-down list box; then, click Go.
The Modified Parameters for All Servers window displays. For the current service, service parameters that
have values that differ from the suggested values display in alphabetical order. For each parameter, the
suggested value displays next to the parameter name. Under each parameter name, a list of servers that have
different values from the suggested values displays. Next to each server name, the current value for this
parameter on this server displays.
For a given parameter, click the server name or the current parameter value to link to the corresponding service
parameter window to change the value. Click Previous and Next to navigate between Modified Parameters
for All Servers windows.
Note You can also assign a DNS primary and secondary server via the DHCP Configuration window in Cisco
Unified CM Administration.
Procedure
Step 3 To assign additional DNS option run the set network dns options [timeout| seconds] [attempts| number]
[rotate].
• Timeout Sets the DNS timeout
• Seconds is the number of seconds for the timeout
• Attempts Sets the number of times to attempt a DNS request
• Number specifies the number of attempts
• Rotate causes the system to rotate among the configured DNS servers and distribute the load
Dependency Records
Use dependency records for the following purposes:
• Find information about system-level settings, such as servers, device pools, and date and time groups.
• Determine the records in the database that use other records. For example, you can determine which
devices, such as CTI route points or phones, use a particular calling search space.
• Show dependencies between records before you delete any records. For example, before you delete a
partition, use dependency records to see which calling search spaces (CSSs) and devices are associated
with it. You can then reconfigure the settings to remove the dependency.
Step 2 To use dependency records, see the following Use these procedures to find information about
procedures: system-level settings and show dependencies
between records in the database.
• View Dependency Records, on page 97
Step 2 Save Route Plan Reports, on page 95. View route plan reports in a.csv file format.
Step 3 Delete Unassigned Directory Numbers, on page Delete an unassigned directory number from
95. the route plan report.
Step 4 Update Unassigned Directory Numbers, on page Update the settings of an unassigned directory
96. number from the route plan report.
Procedure
Step 2 To find all records in the database, ensure the dialog box is empty and proceed to step 3.
To filter or search records
a) From the first drop-down list box, select a search parameter.
b) From the second drop-down list box, select a search pattern.
c) Specify the appropriate search text, if applicable.
Step 3 Click Find.
All or matching records display. You can change the number of items that display on each page by choosing
a different value from the Rows per Page drop-down list box.
Step 4 From the list of records that display, click the link for the record that you want to view.
The window displays the item that you choose.
Procedure
Step 4 Choose the location in which to save the file and click Save. This action should save the file to the location
that you designated.
Step 5 Locate the.CSV file that you just saved and double-click its icon to view it.
Procedure
Step 4 To delete the directory number, click OK. To cancel the delete request, click Cancel.
Procedure
Step 4 Make the required updates such as calling search space or forwarding options.
Step 5 Click Save.
The Directory Number Configuration window redisplays, and the directory number field is blank.
Step 2 View Dependency Records, on page 97. After you enable dependency records, you can
access them from the configuration windows
on the interface.
Caution Dependency records cause high CPU usage. This procedure runs at below-normal priority and may take time
to complete due to dial plan size and complexity, CPU speed, and CPU requirements of other applications.
If you have dependency records enabled and your system is experiencing CPU usage issues, you can disable
dependency records.
Procedure
Step 1 From Cisco Unified CM Administration, choose System > Enterprise Parameters.
Step 2 Scroll to the CCMAdmin Parameters section and from the Enable Dependency Records drop-down list,
choose one of the following options:
• True—Enable dependency records.
• False—Disable dependency records.
Based on the option you choose, a dialog box appears with a message about the consequences of enabling or
disabling the dependency records. Read the message before you click OK in this dialog box.
Step 3 Click OK.
Step 4 Click Save.
The Update Successful message appears confirming the change.
Procedure
Step 1 From Cisco Unified CM Administration, navigate to the configuration window for the records that you want
to view.
Example:
To view dependency records for a device pool, select System > Device Pool.
Note You cannot view dependency records from the Device Defaults and Enterprise Parameters
Configuration windows.
The Dependency Records Summary window appears showing the records that are used by other records in
the database.
Step 5 Select one of the following dependency record buttons in this window:
• Refresh—Update the window with current information.
• Close—Close the window without returning to the configuration window in which you clicked the
Dependency Records link.
• Close and Go Back—Close the window and returns to the configuration window in which you clicked
the Dependency Records link.
Caution Many of the enterprise parameters do not require changes. Do not change an enterprise parameter unless you
fully understand the feature that you are changing or unless the Cisco Technical Assistance Center (TAC)
advises you on the change.
Procedure
Step 1 From Cisco Unified CM Administration, choose System > Enterprise Parameters.
Step 2 Perform one of the following tasks:
• To view the description of a particular enterprise parameter, click the parameter name.
• To view the descriptions of all the enterprise parameters, click ?.
Caution Many of the enterprise parameters do not require changes. Do not change an enterprise parameter unless you
fully understand the feature that you are changing or unless the Cisco Technical Assistance Center (TAC)
advises you on the change.
Procedure
Step 1 From Cisco Unified CM Administration, choose System > Enterprise Parameters.
Step 2 Choose the desired values for the enterprise parameters that you want to change.
Step 3 Click Save.
What to do next
Apply Configuration to Devices, on page 100
Procedure
Step 1 From Cisco Unified CM Administration, choose System > Enterprise Parameters.
Step 2 Verify your changes, and then click Save.
Step 3 Choose one of the following options:
• Click Apply Config if you want your system to determine which devices to reboot. In some cases, a
device may not need a reboot. Calls in progress may be dropped but connected calls will be preserved
unless the device pool includes SIP trunks.
• Click Reset if you want to reboot all devices in your cluster. We recommend that you perform this step
during off-peak hours.
Procedure
Step 1 From Cisco Unified CM Administration, choose System > Enterprise Parameters.
Step 2 Click Set to Default.
Step 3 After you read the confirmation prompt, click OK.
Server Deletion
This section describes how to delete a server from the Cisco Unified Communications Manager database and
how to add a deleted server back to the Cisco Unified Communications Manager cluster.
In Cisco Unified Communications Manager Administration, you cannot delete the first node of the cluster,
but you can delete subsequent nodes. Before you delete a subsequent node in the Find and List Servers window,
Cisco UnifiedCM Administration displays the following message: “You are about to permanently delete one
or more servers. This action cannot be undone. Continue?”. If you click OK, the server gets deleted from the
Cisco UnifiedCM database and is not available for use.
Tip When you attempt to delete a server from the Server Configuration window, a message that is similar to the
one in the preceding paragraph displays. If you click OK, the server gets deleted from the Cisco UnifiedCM
database and is not available for use.
• Cisco recommends that you do not delete any node that has Cisco Unified Communications Manager
running on it, especially if the node has devices, such as phones, registered with it.
• Although dependency records exist for the subsequent nodes, the records do not prevent you from deleting
the node.
• If any call park numbers are configured for Cisco Unified Communications Manager on the node that is
being deleted, the deletion fails. Before you can delete the node, you must delete the call park numbers
in Cisco Unified Communications Manager Administration.
• If a configuration field in Cisco Unified Communications Manager Administration contains the IP address
or host name for a server that you plan to delete, update the configuration before you delete the server.
If you do not perform this task, features that rely on the configuration may not work after you delete the
server; for example, if you enter the IP address or host name for a service parameter, enterprise parameter,
service URL, directory URL, IP phone service, and so on, update this configuration before you delete
the server.
• If an application GUI, for example, Cisco Unity, Cisco Unity Connection, and so on, contains the IP
address or host name for the server that you plan to delete, update the configuration in the corresponding
GUIs before you delete the server. If you do not perform this task, features that rely on the configuration
may not work after you delete the server.
• The system may automatically delete some devices, such as MOH servers, when you delete a server.
• Before you delete a node, Cisco recommends that you deactivate the services that are active on the
subsequent node. Performing this task ensures that the services work after you delete the node.
• Changes to the server configuration do not take effect until you restart Cisco Unified Communications
Manager. For information on restarting the Cisco CallManager service, see the Cisco Unified Serviceability
Administration Guide.
• To ensure that database files get updated correctly, you must reboot the cluster after you delete a server,
Presence, or application server.
• After you delete the node, access Cisco Unified Reporting to verify that Cisco Unified Communications
Manager removed the node from the cluster. In addition, access Cisco Unified Reporting, RTMT, or the
CLI to verify that database replication is occurring between existing nodes; if necessary, repair database
replication between the nodes by using the CLI.
Note When a subscriber node is removed from a cluster, its certificates still exist in
publisher and other nodes. Admin has to manually remove:
• the certificate of the subscriber node removed from the trust-store of the
individual cluster members.
• the certificates of each of the other cluster members from the trust-store of
the removed subscriber node.
Procedure
Caution Removing a node will cause a service interruption to users on the remaining node(s) in the presence redundancy
group. This procedure should only be performed during a maintenance window.
Procedure
Step 1 On the Cisco Unified CM Administration > System > Presence Redundancy Groups page, disable High
Availability if it is enabled.
Step 2 On the Cisco Unified CM Administration > User Management > Assign Presence Users page, unassign
or move all the users off the node that you want to remove.
Step 3 To remove the node from its presence redundancy group, choose Not-Selected from the Presence Server drop
down list on the presence redundancy group's Presence Redundancy Group Configuration page. Select
OK when a warning dialog box indicates that services in the presence redundancy group will be restarted as
a result of unassigning the node.
Note You cannot delete the publisher node directly from a presence redundancy group. To delete a
publisher node, first unassign users from the publisher node and delete the presence redundancy
group completely.
However, you can add the deleted IM and Presence node back into the cluster. For more information
on how to add the deleted nodes, see Add Deleted Server Back in to Cluster, on page 106. In this
scenario, the DefaultCUPSubcluster is created automatically when the deleted publisher node is
added back to the server in the System > Server screen in the Cisco Unified CM Administration
console.
Step 4 In Cisco Unified CM Administration, delete the unassigned node from the System > Server. Click OK when
a warning dialog box indicates that this action cannot be undone.
Step 5 Shut down the host VM or server for the node you have unassigned.
Step 6 Restart the Cisco XCP Router on all nodes.
Procedure
Step 1 In Cisco Unified Communications Manager Administration, add the server by choosing System > Server.
Step 2 After you add the subsequent node to Cisco Unified Communications Manager Administration, perform an
installation on the server by using the disk that Cisco provided in the software kit for your version.
Tip Make sure that the version that you install matches the version that runs on the publisher node. If
the version that is running on the publisher does not match your installation file, choose the Upgrade
During Install option during the installation process. For details, see the Installation Guide for Cisco
Unified Communications Manager and the IM and Presence Service.
Step 3 After you install Cisco UnifiedCM, configure the subsequent node, as described in the installation
documentation that supports your version of Cisco UnifiedCM.
Step 4 Access the Cisco Unified Reporting, RTMT, or the CLI to verify that database replication is occurring between
existing nodes; if necessary, repair database replication between the nodes.
Note You cannot use Cisco Unified Communications Manager Administration to change the server type after the
server has been added. You must delete the existing server instance, and then add the new server again and
choose the correct server type setting.
Procedure
Step 3 From the Server Type drop-down list box, choose the server type that you want to add, and then click Next.
• CUCM Video/Voice
• CUCM IM and Presence
Step 4 In the Server Configuration window, enter the appropriate server settings.
For server configuration field descriptions, see Server Settings.
Procedure
Step 2 Select the server search parameters, and then click Find.
Matching records appear.
Step 3 Select the IM and Presence server that is listed in the Find and List Servers window.
The Server Configuration window appears.
Step 4 Click on the Presence Server Status link in the IM and Presence Server Information section of the Server
Configuration window.
The Node Details window for the server appears.
Configure Ports
Use this procedure to change the port settings used for connections such as SCCP device registration, SIP
device registration, and MGCP gateway connections.
Note Normally, you need not change the default port settings. Use this procedure only if you really want to change
the defaults.
Procedure
Step 1 From Cisco Unified Communications Manager Administration, select System > Cisco Unified CM.
The Find and List Cisco Unified CMs window appears.
Step 2 Enter the appropriate search criteria and click Find.
All matching Cisco Unified Communications Managers are displayed.
Step 3 Select the Cisco Unified CM that you want to view.
The Cisco Unified CM Configuration window appears.
Step 4 Navigate to the Cisco Unified Communications Manager TCP Port Settings for this Server section.
Step 5 Click Save.
Step 6 Click Apply Config.
Step 7 Click OK.
Port Settings
Field Description
Ethernet Phone Port The system uses this TCP port to communicate with the Cisco Unified IP Phones
(SCCP only) on the network.
• Accept the default port value of 2000 unless this port is already in use on
your system. Choosing 2000 identifies this port as non-secure.
• Ensure all port entries are unique.
• Valid port numbers range from 1024 to 49151.
MGCP Listen Port The system uses this TCP port to detect messages from its associated MGCP
gateway.
• Accept the default port of 2427 unless this port is already in use on your
system.
• Ensure all port entries are unique.
• Valid port numbers range from 1024 to 49151.
Field Description
MGCP Keep-alive Port The system uses this TCP port to exchange keepalive messages with its associated
MGCP gateway.
• Accept the default port of 2428 unless this port is already in use on your
system.
• Ensure all port entries are unique.
• Valid port numbers range from 1024 to 49151.
SIP Phone Port This field specifies the port number that Unified Communications Manager uses
to listen for SIP line registrations over TCP and UDP.
SIP Phone Secure Port This field specifies the port number that the system uses to listen for SIP line
registrations over TLS.
SIP Phone OAuth Port This field specifies the port number that Cisco Unified Communications Manager
uses to listen for SIP line registrations from Jabber On-Premise devices over TLS
(Transport Layer Security). The default value is 5090. Range is 1024 to 49151.
SIP Mobile and Remote This field specifies the port number that Cisco Unified Communications Manager
Access OAuth Port uses to listen for SIP line registrations from Jabber over Expressway through
MTLS (Mutual Transport Layer Security). The default value is 5091. Range is
1024 to 49151.
Hostname Configuration
The following table lists the locations where you can configure a host name for the Unified Communications
Manager server, the allowed number of characters for the host name, and the recommended first and last
characters for the host name. Be aware that, if you do not configure the host name correctly, some components
in Unified Communications Manager, such as the operating system, database, installation, and so on, may
not work as expected.
Host Name/ IP Address field You can add or change the host 2-63 alphabetic alphanumeric
name for a server in the cluster.
System > Server in Cisco
Unified Communications
Manager Administration
Hostname field You can add the host name for a 1-63 alphabetic alphanumeric
server in the cluster.
Cisco Unified Communications
Manager installation wizard
Hostname field You can change, not add, the host 1-63 alphabetic alphanumeric
name for a server in the cluster.
Settings > IP > Ethernet in
Cisco Unified Communications
Operating System
set network hostname You can change, not add, the host 1-63 alphabetic alphanumeric
name for a server in the cluster.
hostname
Command Line Interface
Tip The host name must follow the rules for ARPANET host names. Between the first and last character of the
host name, you can enter alphanumeric characters and hyphens.
Before you configure the host name in any location, review the following information:
• The Host Name/IP Address field in the Server Configuration window, which supports device-to-server,
application-to-server, and server-to-server communication, allows you to enter an IPv4 address in dotted
decimal format or a host name.
After you install the Unified Communications Manager publisher node, the host name for the publisher
automatically displays in this field. Before you install a Unified Communications Manager subscriber
node, enter either the IP address or the host name for the subscriber node in this field on the Unified
Communications Manager publisher node.
In this field, configure a host name only if Unified Communications Manager can access the DNS server
to resolve host names to IP addresses; make sure that you configure the Cisco Unified Communications
Manager name and address information on the DNS server.
Tip In addition to configuring Unified Communications Manager information on the DNS server, you enter DNS
information during the Cisco Unified Communications Manager installation.
• During the installation of the Unified Communications Manager publisher node, you enter the host name,
which is mandatory, and IP address of the publisher node to configure network information; that is, if
you want to use static networking.
During the installation of a Unified Communications Manager subscriber node, you enter the hostname
and IP address of the Unified Communications Manager publisher node, so that Unified Communications
Manager can verify network connectivity and publisher-subscriber validation. Additionally, you must
enter the host name and the IP address for the subscriber node. When the Unified Communications
Manager installation prompts you for the host name of the subscriber server, enter the value that displays
in the Server Configuration window in Cisco Unified Communications Manager Administration; that is,
if you configured a host name for the subscriber server in the Host Name/IP Address field.
kerneldump Utility
The kerneldump utility allows you to collect crash dump logs locally on the affected machine without requiring
a secondary server.
In a Unified Communications Manager cluster, you only need to ensure the kerneldump utility is enabled on
the server before you can collect the crash dump information.
Note Cisco recommends that you verify the kerneldump utility is enabled after you install Unified Communications
Manager to allow for more efficient troubleshooting. If you have not already done so, enable the kerneldump
utility before you upgrade the Unified Communications Manager from supported appliance releases.
Important Enabling or disabling the kerneldump utility will require a reboot of the node. Do not execute the enable
command unless you are within a window where a reboot would be acceptable.
The command line interface (CLI) for the Cisco Unified Communications Operating System can be used to
enable, disable, or check the status of the kerneldump utility.
Use the following procedure to enable the kernel dump utility:
Procedure
• To dump kernel crashes to an external server, run the utils os kerneldump ssh enable <ip_address>
CLI command with the IP address of the external server.
Example
Note If you need to disable the kerneldump utility, you can run the utils os kernelcrash disable CLI
command to disable the local server for core dumps and the utils os kerneldump ssh disable
<ip_address> CLI command to disable the utility on the external server.
What to do next
Configure an email alert in the Real-Time Monitoring Tool to be advised of core dumps. For details, see
Enable Email Alert for Core Dump, on page 112
Refer to the Troubleshooting Guide for Cisco Unified Communications Manager for more information on
the kerneldump utility and troubleshooting.
Procedure
Step 1 Select System > Tools > Alert > Alert Central.
Step 2 Right-click CoreDumpFileFound alert and select Set Alert Properties.
Step 3 Follow the wizard prompts to set your preferred criteria:
a) In the Alert Properties: Email Notification popup, make sure that Enable Email is checked and click
Configure to set the default alert action, which will be to email an administrator.
b) Follow the prompts and Add a Receipient email address. When this alert is triggered, the default action
will be to email this address.
c) Click Save.
Step 4 Set the default Email server:
a) Select System > Tools > Alert > Config Email Server.
b) Enter the e-mail server settings.
c) Click OK.
Note Before you change the default value of this parameter, see the Cisco Jabber feature support and documentation
at http://www.cisco.com/c/en/us/support/unified-communications/jabber-windows/
tsd-products-support-series-home.html to ensure Cisco Jabber on iOS support for SSO login behavior and
certificate-based authentication.
To enable this feature, see the Configure SSO Login Behavior for Cisco Jabber on iOS, on page 117 procedure.
The following IdPs using SAML 2.0 are tested for the SAML SSO feature:
• OpenAM 10.0.1
® ®
• Microsoft Active Directory Federation Services 2.0 (AD FS 2.0)
®
• PingFederate 6.10.0.4
• F5 BIP-IP 11.6.0
Note You cannot enable SAML SSO until the verify sync agent test succeeds.
http://www.cisco.com/c/en/us/support/unified-communications/
unified-communications-manager-callmanager/products-installation-and-configuration-guides-list.html.
• Verify that the Cisco Unified CM IM and Presence Service Cisco Sync Agent service successfully
completed data synchronization. Check the status of this test by choosing Cisco Unified CM IM and
Presence Administration > Diagnostics > System Troubleshooter. The “Verify Sync Agent has sync'ed
over relevant data (e.g. devices, users, licensing information)” test indicates a test passed outcome if data
synchronization successfully completed.
• Ensure that at least one LDAP synchronized user is added to the Standard CCM Super Users group to
enable access to Cisco Unified CM Administration. For more information, see the System Configuration
Guide for Cisco Unified Communications Manager at http://www.cisco.com/c/en/us/support/
unified-communications/unified-communications-manager-callmanager/
products-installation-and-configuration-guides-list.html.
• To configure the trust relationship between the IdP and your servers, you must obtain the trust metadata
file from your IdP and import it to all your servers.
Procedure
Step 1 From Cisco Unified CM Administration, choose System > SAML Single Sign-On.
Step 2 Click Enable SAML SSO.
Step 3 After you see warning message to notify you that all server connections will be restarted, click Continue.
Step 4 Click Browse to locate and upload the IdP metadata file.
Step 5 Click Import IdP Metadata.
Step 6 Click Next.
Step 7 Click Download Trust Metadata Fileset to download server metadata to your system.
Step 8 Upload the server metadata on the IdP server.
Step 9 Click Next to continue.
Step 10 Choose an LDAP synchronized user with administrator rights from the list of valid administrator IDs.
Step 11 Click Run Test.
Step 12 Enter a valid username and password.
Step 13 Close the browser window after you see the success message.
Step 14 Click Finish and allow 1 to 2 minutes for the web applications to restart.
Step 1 From Cisco Unified CM Administration, choose System > Enterprise Parameters.
Step 2 To configure the opt-in control, in the SSO Configuration section, choose the Use Native Browser option
for the SSO Login Behavior for iOS parameter:
Note The SSO Login Behavior for iOS parameter includes the following options:
• Use Embedded Browser—If you enable this option, Cisco Jabber uses the embedded browser
for SSO authentication. Use this option to allow iOS devices prior to version 9 to use SSO
without cross-launching into the native Apple Safari browser. This option is enabled by default.
• Use Native Browser—If you enable this option, Cisco Jabber uses the Apple Safari framework
on an iOS device to perform certificate-based authentication with an Identity Provider (IdP)
in the MDM deployment.
Note We don't recommend to configure this option, except in a controlled MDM
deployment, because using a native browser is not as secure as the using the embedded
browser.
Procedure
Step 2 Disable SAML Single Sign-On, on page 119 Disable SAML Single Sign-On if it is already
enabled.
Procedure
Step 1 From Cisco Unified Serviceability, choose Tools > Service Activation.
Step 2 From the Servers drop-down list, choose the Cisco Unified Communications Manager server that is listed.
Step 3 From CTI Services, uncheck the Cisco WebDialer Web Service check box.
Step 4 Click Save.
What to do next
Disable SAML Single Sign-On, on page 119
Procedure
What to do next
Activate the Cisco WebDialer Service, on page 119
Procedure
Step 1 From Cisco Unified Serviceability, choose Tools > Service Activation.
Step 2 From the Servers drop-down list, choose the Unified Communications Manager server that is listed.
Step 3 From CTI Services, check the Cisco WebDialer Web Service check box.
Step 4 Click Save.
Step 5 From Cisco Unified Serviceability, choose Tools > Control Center - Feature Services to confirm that the
CTI Manager service is active and is in start mode.
For WebDialer to function properly, the CTI Manager service must be active and in start mode.
What to do next
Enable SAML Single Sign-On, on page 116
example, enable the recovery URL before you change the domain or hostname of a server. Logging in to the
recovery URL facilitates an update of the server metadata.
Procedure
Note If you are unable to log in to the SAML Single Sign-On window even after performing this procedure, clear
the browser cache and try logging in again.
Procedure
Step 1 In the address bar of your web browser, enter the following URL:
https://<Unified CM-server-name>
where <Unified CM-server-name> is the hostname or IP address of the server.
Procedure
To provision the server metadata manually, use the Assertion Customer Service (ACS) URL.
Example:
Sample ACS URL: <md:AssertionConsumerService
Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
Location="https://cucm.ucsso.cisco.com:8443/ssosp/saml/SSO/alias/cucm.ucsso.cisco.com"
index="0"/>
Certificates Overview
Your system uses self-signed- and third-party-signed certificates. Certificates are used between devices in
your system to securely authenticate devices, encrypt data, and hash the data to ensure its integrity from source
to destination. Certificates allow for secure transfer of bandwidth, communication, and operations.
The most important part of certificates is that you know and define how your data is encrypted and shared
with entities such as the intended website, phone, or FTP server.
When your system trusts a certificate, this means that there is a preinstalled certificate on your system which
states it is fully confident that it shares information with the correct destination. Otherwise, it terminates the
communication between these points.
In order to trust a certificate, trust must already be established with a third-party certificate authority (CA).
Your devices must know that they can trust both the CA and intermediate certificates first, before they can
trust the server certificate presented by the exchange of messages called the secure sockets layer (SSL)
handshake.
Note EC-based certificates for Tomcat are supported. This new certificate is called tomcat-ECDSA. For further
information, see the Enhanced TLS Encryption on IM and Presence Service section of the Configuration and
Administration of IM and Presence Service on Cisco Unified Communications Manager.
EC Ciphers on the Tomcat interface are disabled by default. You can enable them using the HTTPS Ciphers
enterprise parameter on Cisco Unified Communications Manager or on IM and Presence Service. If you
change this parameter the Cisco Tomcat service must be restarted on all nodes.
For further information on EC-based certificates see, ECDSA Support for Common Criteria for Certified
Solutions in the Release Notes for Cisco Unified Communications Manager and IM and Presence Service.
Note Successful upload of third-party certificate authority signed certificate deletes a recently generated CSR that
was used to obtain a signed certificate and overwrites the existing certificate, including a third-party signed
certificate if one was uploaded.
Note The system automatically replicates tomcat-trust, CallManager-trust and Phone-SAST-trust certificates to
each node in the cluster.
Note You can upload a directory trust certificate to tomcat-trust, which is required for the DirSync service to work
in secure mode.
• The CSRs for Tomcat and Tomcat-ECDSA, use the following extensions:
Note Tomcat or Tomcat-ECDSA does not require the key agreement or IPsec end
system key usage.
• The CSRs for Unified Communications Manager use the following extensions:
• The CSRs for the IM and Presence Service cup and cup-xmpp certificates use the following extensions:
Note You can generate a CSR for your certificates and have them signed by a third party certificate authority with
a SHA256 signature. You can then upload this signed certificate back to Unified Communications Manager,
allowing Tomcat and other certificates to support SHA256.
Server Client IP security end Digital Key Data Key Cert Sign Key Agreement
Authentication Authentication system Signature Encipherment Encipherment
CallManager Y Y Y Y Y Y
CallManager-ECDSA
ipsec N Y Y Y Y Y Y
tomcat Y Y Y Y Y Y
tomcat-ECDSA
TVS Y Y Y Y Y Y
Server Client IP security end Digital Key Data Key Cert Sign Key Agreement
Authentication Authentication system Signature Encipherment Encipherment
cup N Y Y Y Y Y Y Y
cup-ECDSA
cup-xmpp Y Y Y Y Y Y Y Y
cup-xmpp-ECDSA
cup-xmpp-s2s Y Y Y Y Y Y Y Y
cup-xmpp-s2s-ECDSA
ipsec N Y Y Y Y Y Y
Server Client IP security end Digital Key Data Key Cert Sign Key Agreement
Authentication Authentication system Signature Encipherment Encipherment
tomcat Y Y Y Y Y Y
tomcat-ECDSA
Show Certificates
Use the filter option on the Certificate List page, to sort and view the list of certificates, based on their common
name, expiry date, key type, and usage. The filter option thus allows you to sort, view, and manage your data
effectively.
From Unified Communications Manager Release 14, you can choose the usage option to sort and view the
list of identity or trust certificates.
Procedure
Step 1 From Cisco Unified OS Administration, choose Security > Certificate Management.
The Certificate List page appears.
Step 2 From the Find Certificate List where drop-down list, choose the required filter option, enter the search item
in the Find field, and click the Find button.
For example, to view only identity certificates, choose Usage from the Find Certificate List where drop-down
list, enter Identity in the Find field, and click the Find button.
Download Certificates
Use the download certificates task to have a copy of your certificate or upload the certificate when you submit
a CSR request.
Procedure
Step 1 From Cisco Unified OS Administration, choose Security > Certificate Management.
Step 2 Specify search criteria and then click Find.
Step 3 Choose the required file name and Click Download.
Procedure
Step 1 From Cisco Unified OS Administration, click Security > Certificate Management.
Step 2 Click Upload Certificate / Certificate Chain.
Step 3 Choose the appropriate trust store from the Certificate Purpose drop-down list to install the root certificate.
Step 4 Enter the description for the certificate purpose selected.
Step 5 Choose the file to upload by performing one of the following steps:
• In the Upload File text box, enter the path to the file.
• Click Browse and navigate to the file; then click Open.
Caution Deleting a certificate can affect your system operations. It can also break a certificate chain if the certificate
is part of an existing chain. Verify this relationship from the username and subject name of the relevant
certificates in the Certificate List window. You cannot undo this action.
Procedure
Step 1 From Cisco Unified OS Administration, choose Security > Certificate Management.
Step 2 Use the Find controls to filter the certificate list.
Step 3 Choose the filename of the certificate.
Step 4 Click Delete.
Regenerate a Certificate
We recommend you to regenerate certificates before they expire. You will receive warnings in RTMT (Syslog
Viewer) and an email notification when the certificates are about to expire.
However, you can also regenerate an expired certificate. Perform this task after business hours, because you
must restart phones and reboot services. You can regenerate only a certificate that is listed as type “cert” in
Cisco Unified OS Administration
Caution Regenerating a certificate can affect your system operations. Regenerating a certificate overwrites the existing
certificate, including a third-party signed certificate if one was uploaded.
Procedure
Step 1 From Cisco Unified OS Administration, choose Security > Certificate Management.
Enter search parameters to find a certificate and view its configuration details. The system displays the records
that match all the criteria in the Certificate List window.
Click Regenerate button in certificate details page, a self-signed certificate with the same key length is
regenerated.
Click Generate Self-Signed Certificate to regenerate a self-signed certificate with a new key length of 3072
or 4096.
Step 2 Configure the fields on the Generate New Self-Signed Certificate window. See online help for more
information about the fields and their configuration options.
Step 3 Click Generate.
Step 4 Restart all services that are affected by the regenerated certificate.
Step 5 Update the CTL file (if configured) after you regenerate the CAPF, ITLRecovery Certificates or CallManager
Certificates.
Note After you regenerate certificates, you must perform a system backup so that the latest backup contains
the regenerated certificates. If your backup does not contain the regenerated certificates and you
perform a system restoration task, you must manually unlock each phone in your system so that the
phone can register.
Note A new enterprise parameter Phone Interaction on Certificate Update under section Security Parameter is
introduced to reset phones either manually or automatically as applicable when one of the TVS, CAPF, or
TFTP certificates are updated. This parameter is by default set to reset the phones automatically.
The encryption key can be regenerated only via the CLI below, but you can also use the Cisco Unified OS
Administration GUI of the publisher to regenerate the signing key. Choose Security > Certificate
Management, select the AUTHZ certificate, and click Regenerate.
Procedure
Step 1 From the Unified Communications Manager publisher node, log in to the Command Line Interface .
Step 2 If you want to regenerate the encryption key:
a) Run the set key regen authz encryption command.
b) Enter yes.
Step 3 If you want to regenerate the signing key:
a) Run the set key regen authz signing command.
b) Enter yes.
The Unified Communications Manager publisher node regenerates keys and replicates the new keys to
all Unified Communications Manager cluster nodes, including any local IM and Presence Service nodes.
You must regenerate and sync your new keys on all of your UC clusters:
• IM and Presence central cluster—If you have an IM and Presence centralized deployment, your IM and
Presence nodes are running on a separate cluster from your telephony. In this case, repeat this procedure
on the Unified Communications Manager publisher node of the IM and Presence Service central cluster.
• Cisco Expressway or Cisco Unity Connection—Regenerate the keys on those clusters as well. See your
Cisco Expressway and Cisco Unity Connection documentation for details.
Note Restart the Cisco CallManager Service on all nodes in the cluster after the keys are reassigned.
Procedure
Step 1 From Cisco Unified OS Administration, choose Security > Certificate Management.
Step 2 Click Upload Certificate/Certificate Chain.
Step 3 Choose the certificate name from the Certificate Purpose drop-down list.
Step 4 Choose the file to upload by performing one of the following steps:
• In the Upload File text box, enter the path to the file.
• Click Browse, navigate to the file, and then click Open.
Note Restart the affected service after uploading the certificate. When the server comes back up you can
access the CCMAdmin or CCMUser GUI to verify your newly added certificates in use.
Procedure
Step 2 Download a Certificate Signing Request, on Download the CSR after you generate it and
page 133 have it ready to submit to your certificate
authority.
Step 3 See your certificate authority documentation. Obtain application certificates from your
certificate authority.
Step 4 See your certificate authority documentation. Obtain a root certificate from your certificate
authority.
Step 5 Add Certificate Authority-Signed CAPF Root Add the root certificate to the trust store.
Certificate to the Trust Store , on page 133 Perform this step when using a certificate
authority-signed CAPF certificate.
Step 6 Upload Certificate or Certificate Chain, on page Upload the certificate authority root certificate
131 to the node.
Step 7 If you updated the certificate for CAPF or Cisco See the Cisco Unified Communications
Unified Communications Manager, generate a Manager Security Guide at
new CTL file. http://www.cisco.com/c/en/us/support/
unified-communications/
unified-communications-manager-callmanager/
products-maintenance-guides-list.html.
Rerun the CTL client (if configured) after you
upload the third-party signed CAPF or
CallManager certificate.
Step 8 Restart a Service, on page 134 Restart the services that are affected by the new
certificate. For all certificate types, restart the
Note If you generate a new CSR, you overwrite any existing CSRs.
Procedure
Step 1 From Cisco Unified OS Administration, choose Security > Certificate Management.
Step 2 Click Generate CSR.
Step 3 Configure fields on the Generate Certificate Signing Request window. See the online help for more
information about the fields and their configuration options.
Step 4 Click Generate.
Procedure
Step 1 From Cisco Unified OS Administration, choose Security > Certificate Management.
Step 2 Click Download CSR.
Step 3 Choose the certificate name from the Certificate Purpose drop-down list.
Step 4 Click Download CSR.
Step 5 (Optional) If prompted, click Save.
Procedure
Step 1 From Cisco Unified OS Administration, choose Security > Certificate Management.
Step 2 Click Upload Certificate/Certificate Chain.
Step 3 In the Upload Certificate/Certificate Chain popup window, choose CallManager-trust from the Certificate
Purpose drop-down list and browse to the certificate authority-signed CAPF root certificate.
Step 4 Click Upload after the certificate appears in the Upload File field.
Restart a Service
Use this procedure if your system requires that you restart any feature or network services on a particular
node in your cluster.
Procedure
Step 1 Depending on the service type that you want to restart, perform one of the following tasks:
• Choose Tools > Control Center - Feature Services.
• Choose Tools > Control Center - Network Services.
Step 2 Choose your system node from the Server drop-down list, and then click Go.
Step 3 Click the radio button next to the service that you want to restart, and then click Restart.
Step 4 After you see the message that indicates that the restart will take some time, click OK.
CertificateRevocationthroughOnlineCertificateStatusProtocol
Unified Communications Manager provisions the OCSP for monitoring certificate revocation. System checks
for the certificate status to confirm validity at scheduled intervals and every time there is, a certificate uploaded.
The Online Certificate Status Protocol (OCSP) helps administrators manage their system's certificate
requirements. When OCSP is configured, it provides a simple, secure, and automated method to check certificate
validity and revoke expired certificates in real-time.
For FIPS deployments with Common Criteria mode enabled, OCSP also helps your system comply with
Common Criteria requirements.
Validation Checks
Unified Communications Manager checks the certificate status and confirms validity.
The certificates are validated as follows:
• Unified Communications Manager uses the Delegated Trust Model (DTM) and checks the Root CA or
Intermediate CA for the OCSP signing attribute. The Root CA or the Intermediate CA must sign the
OCSP Certificate to check the status. If the delegated trust model fails, Unified Communications Manager
falls back to the Trust Responder Model (TRP) and uses a designated OCSP response signing certificate
from an OCSP server to validate certificates.
Note OCSP Responder must be running to check the revocation status of the certificates.
• Enable OCSP option in the Certificate Revocation window to provide the most secure means of checking
certificate revocation in real-time. Choose from options to use the OCSP URI from a certificate or from
the configured OCSP URI. For more information on manual OCSP configuration, see Configure Certificate
Revocation via OCSP.
Note In case of leaf certificates, TLS clients like syslog, FileBeat, SIP, ILS, LBM, and
so on send OCSP requests to the OCSP responder and receives the certificate
revocation response in real-time from the OCSP responder.
One of the following status is returned for the certificate once the validations are performed and the Common
Criteria mode is ON.
• Good --The good state indicates a positive response to the status inquiry. At a minimum, this positive
response indicates that the certificate is not revoked, but does not necessarily mean that the certificate
was ever issued or that the time at which the response was produced is within the certificate's validity
interval. Response extensions may be used to convey additional information on assertions made by the
responder regarding the status of the certificate such as positive statement about issuance, validity, etc.
• Revoked --The revoked state indicates that the certificate has been revoked (either permanantly or
temporarily (on hold)).
• Unknown -- The unknown state indicates that the OCSP responder doesn't know about the certificate
being requested.
Note In Common Criteria mode, the connection fails in both Revoked as well as
Unknown case whereas the connection would succeed in Unknown response
case when Common Criteria is not enabled.
Procedure
Step 2 Configure Certificate Revocation via OCSP, on Configure the OCSP so that the system revokes
page 137 expired certificates automatically.
Note The Cisco Certificate Expiry Monitor network service must be running. This service is enabled by default,
but you can confirm the service is running in Cisco Unified Serviceability by choosing Tools > Control
Center - Network Services and verifying that the Cisco Certificate Expiry Monitor Service status is
Running.
Procedure
Step 1 Log in to Cisco Unified OS Administration (for Unified Communications Manager certificate monitoring) or
Cisco Unified IM and Presence Administration (for IM and Presence Service certificate monitoring).
Step 2 Choose Security > Certificate Monitor.
Step 3 In the Notification Start Time field, enter a numeric value. This value represents the number of days before
certificate expiration where the system starts to notify you of the upcoming expiration.
Step 4 In the Notification Frequency fields, enter the frequency of notifications.
Step 5 Optional. Check the Enable E-mail notification check box to have the system send email alerts of upcoming
certificate expirations..
Step 6 Check the Enable LSC Monitoring check box to include LSC certificates in the certificate status checks.
Step 7 In the E-mail IDs field, enter the email addresses where you want the system to send notifications. You can
enter multiple email addresses separated by a semicolon.
Step 8 Click Save.
Note The certificate monitor service runs once every 24 hours by default. When you restart the certificate
monitor service, it starts the service and then calculates the next schedule to run only after 24 hours.
The interval does not change even when the certificate is close to the expiry date of seven days. It
runs every 1 hour when the certificate either has expired or is going to expire in one day.
What to do next
Configure the Online Certificate Status Protocol (OCSP) so that the system revokes expired certificates
automatically. For details, seeConfigure Certificate Revocation via OCSP, on page 137
Procedure
Step 1 Log in to Cisco Unified OS Administration (for Unified Communications Manager certificate revocation) or
Cisco Unified IM and Presence Administration (for IM and Presence Service certificate revocation).
Step 2 Choose Security > Certificate Revocation.
Step 3 Check the Enable OCSP check box, and perform one of the following tasks:
• If you want to specify an OCSP responder for OCSP checks, select the Use configured OCSP URI
button and enter the URI of the responder in the OCSP Configured URI field.
• If the certificate is configured with an OCSP responder URI, select the Use OCSP URI from Certificate
button.
Use this procedure to help you resolve the certificate error. Start with the first step and proceed, if necessary.
Sometime, you may only have to complete the first step to resolve the error; in other cases, you have to
complete all the steps.
Procedure
Step 1 From Cisco Unified OS Administration, verify that the required tomcat-trust certificates are present: Security >
Certificate Management.
If the required certificates are not present, wait 30 minutes before checking again.
Step 2 Choose a certificate to view its information. Verify that the content matches with the corresponding certificate
on the remote node.
Step 3 From the CLI, restart the Cisco Intercluster Sync Agent service: utils service restart Cisco Intercluster Sync
Agent.
Step 4 After the Cisco Intercluster Sync Agent service restarts, restart the Cisco Tomcat service: utils service restart
Cisco Tomcat.
Step 5 Wait 30 minutes. If the previous steps do not address the certificate error and a tomcat-trust certificate is
present, delete the certificate. After you delete the certificate, you must manually exchange it by downloading
the Tomcat and Tomcat-ECDSA certificate for each node and uploading it to its peers as a tomcat-trust
certificate.
Step 6 After the certificate exchange is complete, restart Cisco Tomcat on each affected server: utils service restart
Cisco Tomcat.
Procedure
Step 2 Import Certificates, on page 140 Import the certificates back into the home and
remote (visiting) clusters.
Export Certificates
This procedure creates a PKCS12 file that contains certificates for all nodes in the cluster.
Procedure
Step 1 From Cisco Unified OS Administration, choose Security > Bulk Certificate Management.
Step 2 Configure the settings for a TFTP server that both the home and remote clusters can reach. See the online
help for information about the fields and their configuration options.
Step 3 Click Save.
Step 4 Click Export.
Step 5 In the Bulk Certificate Export window, choose All for the Certificate Type field.
Step 6 Click Export.
Step 7 Click Close.
Note When the bulk certificate export is performed, the certificates are then uploaded to the remote cluster
as follows:
• CAPF certificate gets uploaded as a CallManager-trust
• Tomcat certificate gets uploaded as a Tomcat-trust
• CallManager certificate gets uploaded as a CallManager-trust
• CallManager certificate gets uploaded as a Phone-SAST-trust
• ITLRecovery certificate gets uploaded as a PhoneSast-trust and CallManager-trust
The above steps are performed when certificates are self-signed and there is no common trust in
another cluster. If there is a common trust or the same signer then the export of ALL certificates is
not needed.
Import Certificates
Import the certificates back into the home and remote (visiting) clusters.
Note Import of certificate using bulk certificate management causes phones to reset.
Procedure
Step 1 From From Cisco Unified OS Administration, choose Security > Bulk Certificate Management > Import >
Bulk Certificate Import.
Step 2 From the Certificate Type drop-down list, choose All.
Step 3 Choose Import.
Note When the bulk certificate import is performed, the certificates are then uploaded to the remote cluster
as follows:
• CAPF certificate gets uploaded as a CallManager-trust
• Tomcat certificate gets uploaded as a Tomcat-trust
• CallManager certificate gets uploaded as a CallManager-trust
• CallManager certificate gets uploaded as a Phone-SAST-trust
• ITLRecovery certificate gets uploaded as a PhoneSast-trust and CallManager-trust
Note The following types of certificates determines phones that are restarted:
• Callmanager - ALL phones only IF TFTP service is activated on the node the certificate belongs.
• TVS - SOME phones based on Callmanager group membership.
• CAPF - ALL phones only IF CAPF is activated.
Note • Because any changes that you make to an IPsec policy during a system upgrade will be lost, do not
modify or create IPsec policies during an upgrade.
• IPsec requires bidirectional provisioning, or one peer for each host (or gateway).
• When you provision the IPSec policy on two Unified Communications Manager nodes with one IPsec
policy protocol set to “ANY” and the other IPsec policy protocol set to “UDP” or “TCP”, the validation
can result in a false negative if run from the node that uses the “ANY” protocol.
• IPsec, especially with encryption, affects the performance of your system.
Procedure
Step 1 From Cisco Unified OS Administration, choose Security > IPSec Configuration.
Step 2 Click Add New.
Step 3 Configure the fields on the IPSEC Policy Configuration window. See the online help for more information
about the fields and their configuration options.
Caution Any changes that you make to the existing IPsec certificate because of hostname, domain, or IP address
changes require you to delete the IPsec policies and recreate them, if certificate names are changed. If certificate
names are unchanged, then after importing the remote node's regenerated certificate, the IPsec policies must
be disabled and enabled.
Procedure
Step 1 From Cisco Unified OS Administration, choose Security > IPSEC Configuration.
Step 2 To display, enable, or disable a policy, follow these steps:
a) Click the policy name.
b) To enable or disable the policy, check or uncheck the Enable Policy check box.
c) Click Save.
Step 3 To delete one or more policies, follow these steps:
a) Check the check box next to each policy that you want to delete.
You can click Select All to select all policies or Clear All to clear all the check boxes.
b) Click Delete Selected.
Credential policies do not apply to operating system users or CLI users. These administrators use standard
password verification procedures that the operating system supports.
After users are configured in the database, the system stores a history of user credentials in the database to
prevent users from entering previous information when users are prompted to change their credentials.
assigned to application users, developers must create applications that respond to the password expiration,
PIN expiration, and lockout return codes for credential policy enforcement.
Applications use an API to authenticate with the database or corporate directory, regardless of the authentication
model that an application uses.
For more information about JTAPI and TAPI for developers, see the developer guides at http://www.cisco.com/
c/en/us/support/unified-communications/unified-communications-manager-callmanager/
products-programming-reference-guides-list.html.
Procedure
Step 1 From Cisco Unified CM Administration, choose User Management > User Settings > Credential Policy.
Step 2 Perform one of the following steps:
• Click Find and select an existing credential policy.
• Click Add New to create a new credential policy.
Step 3 Complete the fields in the Credential Policy Configuration window. See the online help for more information
about the fields and their configuration settings.
Step 4 Click Save.
Procedure
Step 1 In Cisco Unified CM Administration, choose User Management > User Settings > Credential Policy
Default.
Step 2 From the Credential Policy drop-down list box, choose the credential policy for this group.
Step 3 Enter the password in both the Change Credential and Confirm Credential configuration windows.
Step 4 Check the User Cannot Change check box if you do not want your users to be able to change this credential.
Step 5 Check the User Must Change at Next Login check box if you want to use this credential as a temporary
credential that an end user must change the next time that they login.
Note Please note that, if you check this box, your users are unable to change PIN using Personal Directory
service.
Step 6 If you do not want the credential to expire, check the Does Not Expire check box.
Step 7 Click Save.
Note If you use LDAP authentication for end user passwords, LDAP tracks only authentication successes and
failures.
All event messages contain the string “ims-auth” and the user ID that is attempting authentication.
Procedure
Step 1 From Cisco Unified CM Administration, choose User Management > End Users.
Step 2 Enter search criteria, click Find, and then choose a user from the resulting list.
Step 3 Click Edit Credential to view the user's authentication activity.
What to do next
You can view log files with the Cisco Unified Real-Time Monitoring Tool (Unified RTMT). You can also
collect captured events into reports. For detailed steps about how to use Unified RTMT, see the Cisco Unified
Real-Time Monitoring Tool Administration Guide at http://www.cisco.com/c/en/us/support/
unified-communications/unified-communications-manager-callmanager/products-maintenance-guides-list.html.
Procedure
Step 1 From Cisco Unified CM Administration, choose System > Enterprise Parameters.
Step 2 Perform the following tasks as needed:
• Set the Enable Caching enterprise parameter to True. With this parameter enabled, Cisco Unified
Communications Manager uses cached credentials for up to 2 minutes.
• Set the Enable Caching enterprise parameter to False to disable caching, so that the system does not
use cached credentials for authentication. The system ignores this setting for LDAP authentication.
Credential caching requires a minimal amount of additional memory per user.
Note • An administrator with privilege level 4 only can terminate the sessions.
• Session Management terminates the active sign-in sessions on a particular node. If the administrator
wants to terminate all the user sessions across different nodes, then the administrator has to sign-in to
each node and terminate the sessions.
Procedure
Step 1 From Cisco Unified OS Administration or Cisco Unified IM and Presence OS Administration, choose
Security > Session Management.
The Session Management window is displayed.
Step 2 Enter the user ID of the active signed-in user in the User ID field.
Step 3 Click Terminate Session.
Step 4 Click OK.
If the terminated user refreshes the signed-in interface page, then the user is signed out. An entry is made in
the audit log and it displays the terminated userID.
Backup Overview
Cisco recommends performing regular backups. You can use the Disaster Recovery System (DRS) to do a
full data backup for all servers in a cluster. You can set up automatic backups or invoke a backup at any time.
The Disaster Recovery System performs a cluster-level backup, which means that it collects backups for all
servers in a Cisco Unified Communications Manager cluster to a central location and archives the backup
data to physical storage device. Backup files are encrypted and can be opened only by the system software.
DRS restores its own settings (backup device settings and schedule settings) as part of the platform
backup/restore. DRS backs up and restores the drfDevice.xml and drfSchedule.xml files. When the server is
restored with these files, you do not need to reconfigure DRS backup device and schedule.
When you perform a system data restoration, you can choose which nodes in the cluster you want to restore.
The Disaster Recovery System includes the following capabilities:
• A user interface for performing backup and restore tasks.
• A distributed system architecture for performing backup functions.
• Scheduled backups or manual (user-invoked) backups.
• It archives backups to a remote sftp server.
Backup Prerequisites
• Make sure that you meet the version requirements:
• All Cisco Unified Communications Manager cluster nodes must be running the same version of the
Cisco Unified Communications Manager application.
• All IM and Presence Service cluster nodes must be running the same version of the IM and Presence
Service application.
• The software version saved in the backup file must match the version that is running on the cluster
nodes.
The entire version string must match. For example, if the IM and Presence database publisher node is at
version 11.5.1.10000-1, then all IM and Presence subscriber nodes must be 11.5.1.10000-1, and the
backup file must also be must be 11.5.1.10000-1. If you try to restore the system from a backup file that
does not match the current version, the restore will fail. Ensure that you backup the system whenever
you upgrade the software version so that the version saved in the backup file matches the version that is
running on the cluster nodes.
• Be aware the DRS encryption depends on the cluster security password. When running the backup, DRS
generates a random password for encryption and then encrypts the random password with the cluster
security password. If the cluster security password ever gets changed between the backup and this restore,
you will need to know what the password was at the time of the backup in order to use that backup file
to restore your system or take a backup immediately after the security password change/reset.
• If you want to back up to a remote device, make sure that you have an SFTP server set up. For more
information on the available SFTP servers, see SFTP Servers for Remote Backups , on page 160
Procedure
Step 4 View Current Backup Status, on page 158 Optional. Check the Status of the Backup.
While a backup is running, you can check the
status of the current backup job.
Step 5 View Backup History, on page 159 Optional. View Backup History
Note Schedule backups during periods when you expect less network traffic.
Procedure
Step 1 From Disaster Recovery System, select Backup > Backup Device.
Step 2 In the Backup Device List window, do either of the following:
• To configure a new device, click Add New.
• To edit an existing backup device, enter the search criteria, click Find, and Edit Selected.
• To delete a backup device, select it in the Backup Device list and click Delete Selected.
You cannot delete a backup device that is configured as the backup device in a backup schedule.
Step 4 In the Select Destination area, under Network Directory perform the following:
• In the Host name/IP Address field, enter the hostname or IP address for the network server.
• In the Path name field, enter the directory path where you want to store the backup file.
• In the User name field, enter a valid username.
• In the Password field, enter a valid password.
• From the Number of backups to store on Network Directory drop-down list, choose the required
number of backups.
What to do next
Estimate Size of Backup File, on page 156
Procedure
Step 1 From the Disaster Recovery System, select Backup > Manual Backup.
Step 2 In the Select Features area, select the features to back up.
Step 3 Click Estimate Size to view the estimated size of backup for the selected features.
What to do next
Perform one of the following procedures to backup your system:
• Configure a Scheduled Backup, on page 156
• Start a Manual Backup, on page 157
Caution Schedule backups during off-peak hours to avoid call processing interruptions and impact to service.
Procedure
Step 3 In the scheduler window, enter a schedule name in the Schedule Name field.
Note You cannot change the name of the default schedule.
Step 4 Select the backup device in the Select Backup Device area.
Step 5 Select the features to back up in the Select Features area. You must choose at least one feature.
Step 6 Choose the date and time when you want the backup to begin in the Start Backup at area.
Step 7 Choose the frequency at which you want the backup to occur in the Frequency area. The frequency can be
set to Once Daily, Weekly, and Monthly. If you choose Weekly, you can also choose the days of the week
when the backup will occur.
Tip To set the backup frequency to Weekly, occurring Tuesday through Saturday, click Set Default.
What to do next
Perform the following procedures:
• Estimate Size of Backup File, on page 156
• (Optional) View Current Backup Status, on page 158
• The backup process can fail due to non availability of space on a remote server or due to interruptions
in the network connectivity. You need to start a fresh backup after addressing the issues that caused the
backup to fail.
• Ensure that there are no network interruptions.
• Configure Backup Devices, on page 155
• Estimate Size of Backup File, on page 156
• Make sure that you have a record of the cluster security password. If the cluster security password changes
after you complete this backup, you will need to know the password or you will not be able to use the
backup file to restore your system.
Note While a backup is running, you cannot perform any tasks in Cisco Unified OS Administration or Cisco Unified
IM and Presence OS Administration because Disaster Recovery System locks the platform API to block all
requests. However, Disaster Recovery System does not block most CLI commands because only the CLI-based
upgrade commands use the Platform API locking package.
Procedure
Step 1 From the Disaster Recovery System, select Backup > Manual Backup.
Step 2 In the Manual Backup window, select a backup device from the Backup Device Name area.
Step 3 Choose a feature from the Select Features area.
Step 4 Click Start Backup.
What to do next
(Optional) View Current Backup Status, on page 158
Caution Be aware that if the backup to the remote server is not completed within 20 hours, the backup session times
out and you must begin a fresh backup.
Procedure
Step 1 From the Disaster Recovery System, select Backup > Current Status.
Step 2 To view the backup log file, click the log filename link.
Step 3 To cancel the current backup, click Cancel Backup.
Note The backup cancels after the current component completes its backup operation.
What to do next
View Backup History, on page 159
Procedure
Step 1 From the Disaster Recovery System, select Backup > History.
Step 2 From the Backup History window, you can view the backups that you have performed, including filename,
backup device, completion date, result, version, features that are backed up, and failed features.
Note The Backup History window displays only the last 20 backup jobs.
Restriction Description
Cluster Security Password We recommend that you run a backup whenever you change the cluster
security password.
Backup encryption uses the cluster security password to encrypt data
on the backup file. If you edit the cluster security password after a backup
file is created, you will not be able to use that backup file to restore data
unless you remember the old password.
Restriction Description
Certificate Management The Disaster Recovery System (DRS) uses an SSL-based communication
between the Master Agent and the Local Agent for authentication and
encryption of data between the Cisco Unified Communications Manager
cluster nodes. DRS makes use of the IPsec certificates for its
Public/Private Key encryption. Be aware that if you delete the IPSEC
truststore(hostname.pem) file from the Certificate Management pages,
then DRS will not work as expected. If you delete the IPSEC-trust file
manually, you must ensure that you upload the IPSEC certificate to the
IPSEC-trust. For more details, see the “Certificate management” section
in the Security Guide for Cisco Unified Communications Manager at
http://www.cisco.com/c/en/us/support/unified-communications/
unified-communications-manager-callmanager/
products-maintenance-guides-list.html.
SFTP Server on Cisco This server is the only SFTP server that is provided and tested by Cisco, and fully
Prime Collaboration supported by Cisco TAC.
Deployment
Version compatibility depends on your version of Unified Communications
Manager and Cisco Prime Collaboration Deployment. See the Cisco Prime
Collaboration Deployment Administration Guide before you upgrade its version
(SFTP) or Unified Communications Manager to ensure that the versions are
compatible.
SFTP Server from a These servers are third party provided and third party tested. Version compatibility
Technology Partner depends on the third party test. See the Technology Partner page if you upgrade
their SFTP product and/or upgrade Unified Communications Manager for which
versions are compatible:
https://marketplace.cisco.com
SFTP Server from another These servers are third party provided and are not officially supported by Cisco
Third Party TAC.
Version compatibility is on a best effort basis to establish compatible SFTP
versions and Unified Communications Manager versions.
Note These products have not been tested by Cisco and we cannot guarantee
functionality. Cisco TAC does not support these products. For a fully
tested and supported SFTP solution, use Cisco Prime Collaboration
Deployment or a Technology Partner.
Cipher Support
For Unified Communications Manager 11.5, Unified Communications Manager advertises the following CBC
and CTR ciphers for SFTP connections:
• aes128-cbc
• 3des-cbc
• aes128-ctr
• aes192-ctr
• aes256-ctr
Note Make sure that the backup SFTP Server supports one of these ciphers to communicate with Unified
Communications Manager.
From Unified Communications Manager 12.0 release onwards, CBC ciphers are not supported. Unified
Communications Manager supports and advertises only the following CTR ciphers:
• aes256-ctr
• aes128-ctr
• aes192-ctr
Note Make sure that the backup SFTP Server supports one of these CTR ciphers to communicate with Unified
Communications Manager.
Restore Overview
The Disaster Recovery System (DRS) provides a wizard to walk you through the process of restoring your
system.
The backup files are encrypted and only the DRS system can open them to restore the data. The Disaster
Recovery System includes the following capabilities:
• A user interface for performing restore tasks.
• A distributed system architecture for performing restore functions.
Master Agent
The system automatically starts the Master Agent service on each node of the cluster, but the Master Agent
is functional only on the publisher node. The Master Agents on the subscriber nodes do not perform any
functions.
Local Agents
The server has a Local Agent to perform backup and restore functions.
Each node in a Cisco Unified Communications Manager cluster, including the node that contains the Master
Agent, must have its own Local Agent to perform backup and restore functions.
Note By default, a Local Agent automatically gets started on each node of the cluster, including IM and Presence
nodes.
Restore Prerequisites
• Make sure that you meet the version requirements:
• All Cisco Unified Communications Manager cluster nodes must be running the same version of the
Cisco Unified Communications Manager application.
• All IM and Presence Service cluster nodes must be running the same version of the IM and Presence
Service application.
• The version saved in the backup file must match the version that is running on the cluster nodes.
The entire version string must match. For example, if the IM and Presence database publisher node is at
version 11.5.1.10000-1, then all IM and Presence subscriber nodes must be 11.5.1.10000-1, and the
backup file must also be must be 11.5.1.10000-1. If you try to restore the system from a backup file that
does not match the current version, the restore will fail.
• Make sure that the IP address, hostname, DNS configuration and deployment type for the server matches
the IP address, hostname, DNS configuration and deployment type that are stored on the backup file.
• If you have changed the cluster security password since the backup was run, make sure that you have a
record of the old password, or the restore will fail.
Procedure
Step 4 Restore Entire Cluster, on page 169 (Optional) Use this procedure to restore all
nodes in the cluster, including the publisher
node. If a major hard drive failure or upgrade
Step 5 Restore Node Or Cluster to Last Known Good (Optional) Use this procedure only if you are
Configuration, on page 171 restoring a node to a last known good
configuration. Do not use this after a hard drive
failure or other hardware failure.
Step 6 Restart a Node, on page 171 Use this procedure to restart a node.
Step 7 Check Restore Job Status, on page 172 (Optional) Use this procedure to check the
restore job status.
Step 8 View Restore History, on page 172 (Optional) Use this procedure to view the
restore history.
Procedure
Step 1 From the Disaster Recovery System, choose Restore > Restore Wizard.
Step 2 In the Restore Wizard Step 1 window, Select Backup Device area, select the appropriate backup device to
restore.
Step 3 Click Next.
Step 4 In the Restore Wizard Step 2 window, select the backup file you want to restore.
Note The backup filename indicates the date and time that the system created the backup file.
Note The file integrity check is optional and is only needed in the case of SFTP backups.
Be aware that the file integrity check process consumes a significant amount of CPU and network
bandwidth, which slows down the restore process.
We can use SHA-1 for message digest verification in FIPS mode as well. SHA-1 is allowed for all
non-digital signature uses in the hash functions applications like HMAC and Random Bit Generation
that are not used for digital signatures. For instance, SHA-1 can still be used to compute a checksum.
Only for signature generation and verification, we can't use SHA-1.
Step 14 (Optional) From the Select Server Name drop-down list, select the subscriber node from which you want to
restore the publisher database. Ensure that the subscriber node that you chose is in-service and connected to
the cluster.
The Disaster Recovery System restores all non database information from the backup file and pulls the latest
database from the chosen subscriber node.
Note This option appears only if the backup file that you selected includes the CCMDB database
component. Initially, only the publisher node is fully restored, but when you perform Step 14 and
restart the subsequent cluster nodes, the Disaster Recovery System performs database replication
and fully synchronizes all cluster node databases. This ensures that all cluster nodes are using current
data.
Step 17 When the Percentage Complete field on the Restore Status window, shows 100%, restart the server. Restart
of all the nodes in the cluster is required in case of restoring only to the first node. Ensure that you restart the
first node before you restart the subsequent nodes. For information about how to restart the server, see the
What to Do Next section.
Note If you are restoring a Cisco Unified Communications Manager node only, the Cisco Unified
Communications Manager and IM and Presence Service cluster must be restarted.
If you are restoring an IM and Presence Service Publisher node only, the IM and Presence Service
cluster must be restarted.
What to do next
• (Optional) To view the status of the restore, see Check Restore Job Status, on page 172
• To restart a node, see Restart a Node, on page 171
Procedure
Step 1 From the Disaster Recovery System, select Restore > Restore Wizard.
Step 2 In the Restore Wizard Step 1 window, Select Backup Device area, choose the backup device from which
to restore.
Step 3 Click Next.
Step 4 In the Restore Wizard Step 2 window, select the backup file that you want to restore.
Step 5 Click Next.
Step 6 In the Restore Wizard Step 3 window, select the features that you want to restore.
Note Only the features that were backed up to the file that you chose display.
Step 11 When the Percentage Complete field on the Restore Status window shows 100%, restart the secondary
servers you just restored. Restart of all the nodes in the cluster is required in case of restoring only to the first
node. Ensure that you restart the first node before you restart the subsequent nodes. For information about
how to restart the server, see the What to Do Next section.
Note If the IM and Presence Service first node is restored. Ensure to restart the IM and Presence Service
first node before you restart the IM and Presence Service subsequent nodes.
What to do next
• (Optional) To view the status of the restore, see Check Restore Job Status, on page 172
• To restart a node, see Restart a Node, on page 171
Procedure
Step 1 From the Disaster Recovery System, select Restore > Restore Wizard.
Step 2 In the Restore Wizard Step 1 window Select Backup Device area, choose the backup device from which to
restore.
Step 3 Click Next.
Step 4 In the Restore Wizard Step 2 window, select the backup file that you want to restore.
The backup filename indicates the date and time that the system created the backup file.
Choose only the backup file of the cluster from which you want to restore the entire cluster.
Step 5 Click Next.
Step 6 In the Restore Wizard Step 3 window, select the features that you want to restore.
The screen displays only those features that were saved to the backup file.
Note If a status message indicates that Publisher has failed to become cluster aware. Cannot start one-step
restore, you need to restore the publisher node and then the subscriber node. See the Related topics
for more information.
This option allows the publisher to become cluster aware and will take five minutes to do so. Once
you click on this option, a status message displays as “Please wait for 5 minutes until Publisher
becomes cluster aware and do not start any backup or restore activity in this time period”.
After the delay, if the publisher becomes cluster aware, a status message displays as “Publisher has
become cluster aware. Please select the servers and click on Restore to start the restore of entire
cluster”.
After the delay, if the publisher has not become cluster aware, a status message displays as "Publisher
has failed to become cluster aware. Cannot start one-step restore. Please go ahead and do a normal
two-step restore." To restore the whole cluster in two-step (publisher and then subscriber), perform
the steps mentioned in Restore the First Node Only, on page 165 and Restore Subsequent Cluster
Node, on page 167.
Step 9 When you are prompted to choose the nodes to restore, choose all the nodes in the cluster.
The Disaster Recovery System restores the Cisco Unified Communications Manager database (CCMDB) on
subsequent nodes automatically when you restore a first node. This may take up to several hours based on
number of nodes and size of that database that is being restored.
What to do next
• (Optional) To view the status of the restore, see Check Restore Job Status, on page 172
• To restart a node, see Restart a Node, on page 171
Related Topics
Restore the First Node Only, on page 165
Restore Subsequent Cluster Node, on page 167
Procedure
Step 1 From Disaster Recovery System, select Restore > Restore Wizard.
Step 2 In the Select Backup Device area, select the appropriate backup device to restore.
Step 3 Click Next.
Step 4 In the Restore Wizard Step 2 window, select the backup file you want to restore.
Note The backup filename indicates the date and time that the system created the backup file.
Step 9 Restart the server once the restoration process is completed. See the What to Do Next section for more
information about how to restart the server.
Note Make sure that you restart the first node before you restart the subsequent nodes.
After the first node has restarted and is running the restored version of Cisco Unified Communications
Manager, restart the subsequent nodes.
Step 10 Replication will be setup automatically after cluster reboot. Check the Replication Status value on all nodes
by using the “utils dbreplication runtimestate” CLI command as described in the Command Line Interface
Reference Guide for Cisco Unified Communications Solutions. The value on each node should equal 2.
Note Database replication on the subsequent nodes may take enough time to complete after the subsequent
node restarts, depending on the size of the cluster.
Tip If replication does not set up properly, use the "utils dbreplication rebuild" CLI command as described
in the Command Line Interface Reference Guide for Cisco Unified Communications Solutions.
What to do next
• (Optional) To view the status of the restore, see Check Restore Job Status, on page 172
• To restart a node, see Restart a Node, on page 171
Procedure
Step 1 From the Disaster Recovery System, choose Restore > Restore Wizard.
Step 2 In the Select Backup Device area, select the appropriate backup device to restore.
Step 3 Click Next.
Step 4 In the Restore Wizard Step 2 window, select the backup file you want to restore.
Note The backup filename indicates the date and time that the system created the backup file.
Restart a Node
You must restart a node after you restore data.
If you are restoring a publisher node (first node), you must restart the publisher node first. Restart subscriber
nodes only after the publisher node has restarted and is successfully running the restored version of the
software.
Note Do not restart IM and Presence subscriber nodes if the CUCM publisher node is offline. In such cases, the
node services will fail to start because the subscriber node is unable to connect to the CUCM publisher.
Caution This procedure causes the system to restart and become temporarily out of service.
Perform this procedure on every node in the cluster that you need to restart.
Procedure
What to do next
(Optional) To view the status of the restore, see Check Restore Job Status, on page 172.
Related Topics
Cisco Unified Communications Manager (CallManager) Command References
Procedure
Step 1 From the Disaster Recovery System, select Restore > Current Status.
Step 2 In the Restore Status window, click the log filename link to view the restore status.
Procedure
Data Authentication
Trace Files
The following trace file locations are used during troubleshooting or while collecting the logs.
Trace files for the Master Agent, the GUI, each Local Agent, and the JSch library get written to the following
locations:
• For the Master Agent, find the trace file at platform/drf/trace/drfMA0*
• For each Local Agent, find the trace file at platform/drf/trace/drfLA0*
• For the GUI, find the trace file at platform/drf/trace/drfConfLib0*
• For the JSch, find the trace file at platform/drf/trace/drfJSch*
For more information, see the Command Line Interface Reference Guide for Cisco Unified Communications
Solutions at http://www.cisco.com/c/en/us/support/unified-communications/
unified-communications-manager-callmanager/products-command-reference-list.html.
Command Description
utils disaster_recovery backup Starts a manual backup by using the features that are
configured in the Disaster Recovery System interface
Command Description
utils disaster_recovery restore Starts a restore and requires parameters for backup
location, filename, features, and nodes to restore
utils disaster_recovery status Displays the status of ongoing backup or restore job
utils disaster_recovery backup Starts a manual backup by using the features that are
configured in the Disaster Recovery System interface.
utils disaster_recovery restore Starts a restore and requires parameters for backup
location, filename, features, and nodes to restore.
utils disaster_recovery status Displays the status of ongoing backup or restore job.
DRFBackupDeviceError DRF backup process has problems DRS backup process encountered
accessing device. errors while it was accessing
device.
DRFBackupFailure Cisco DRF Backup process failed. DRS backup process encountered
errors.
DRFBackupInProgress New backup cannot start while DRS cannot start new backup while
another backup is still running another backup is still running.
DRFLA2MAFailure DRF Local Agent cannot connect DRS Local Agent cannot connect
to Master Agent. to Master Agent.
DRFLocalAgentStartFailure DRF Local Agent does not start. DRS Local Agent might be down.
DRFMA2LAFailure DRF Master Agent does not DRS Master Agent cannot connect
connect to Local Agent. to Local Agent.
DRFMABackupNodeDisconnect The node that is being backed up While the DRS Master Agent was
disconnected from the Master running a backup operation on a
Agent prior to being fully backed Cisco Unified Communications
up. Manager node, the node
disconnected before the backup
operation completed.
DRFMARestoreNodeDisconnect The node that is being restored While the DRS Master Agent was
disconnected from the Master running a restore operation on a
Agent prior to being fully restored. Cisco Unified Communications
Manager node, the node
disconnected before the restore
operation completed.
DRFMasterAgentStartFailure DRF Master Agent did not start. DRS Master Agent might be down.
DRFNoRegisteredFeature No feature got selected for backup. No feature got selected for backup.
DRFRestoreDeviceError DRF restore process has problems DRS restore process cannot read
accessing device. from device.
DRFSftpFailure DRF SFTP operation has errors. Errors exist in DRS SFTP
operation.
DRFUnknownClient DRF Master Agent on the Pub The DRF Master Agent on the Pub
received a Client connection received a Client connection
request from an unknown server request from an unknown server
outside the cluster. The request has outside the cluster. The request has
been rejected. been rejected.
DRFNoBackupTaken DRF did not find a valid backup of DRF did not find a valid backup of
the current system. the current system after an
Upgrade/Migration or Fresh Install.
DRFLogDirAccessFailure DRF could not access the log DRF could not access the log
directory. directory.
License Reservation
License Reservation
Follow the below steps, after performing the restore operation on the Specific License Reservation enabled
Unified Communications Manager.
No Nothing required
Procedure-2:
1. Contact Cisco to remove the
product from CSSM.
Restriction Description
Export Restricted You can restore the DRS backup from a restricted version only to a restricted
version and the backup from an unrestricted version can be restored only to an
unrestricted version. Note that if you upgrade to the U.S. export unrestricted
version of Cisco Unified Communications Manager, you will not be able to later
upgrade to or be able to perform a fresh install of the U.S. export restricted version
of this software
Platform Migrations You cannot use the Disaster Recovery System to migrate data between platforms
(for example, from Windows to Linux or from Linux to Windows). A restore
must run on the same product version as the backup. For information on data
migration from a Windows-based platform to a Linux-based platform, see the
Data Migration Assistant User Guide.
HW Replacement and When you perform a DRS restore to migrate data to a new server, you must assign
Migrations the new server the identical IP address and hostname that the old server used.
Additionally, if DNS was configured when the backup was taken, then the same
DNS configuration must be present prior to performing a restore.
For more information about replacing a server, refer to the Replacing a Single
Server or Cluster for Cisco Unified Communications Manager guide.
In addition, you must run the Certificate Trust List (CTL) client after a hardware
replacement. You must run the CTL client if you do not restore the subsequent
node (subscriber) servers. In other cases, DRS backs up the certificates that you
need. For more information, see the “Installing the CTL Client” and “Configuring
the CTL Client ” procedures in the Cisco Unified Communications Manager
Security Guide.
Extension Mobility Cross Extension Mobility Cross Cluster users who are logged in to a remote cluster at
Cluster backup shall remain logged in after restore.
Note DRS backup/restore is a high CPU-oriented process. Smart Licence Manager is one of the components that
are backed-up and restored. During this process Smart License Manger service is restarted. You can expect
high resource utilization so recommended to schedule the process during maintenance period.
After successfully restoring the Cisco Unified Communications server components, register the Cisco Unified
Communications Manager with Cisco Smart Software Manager or Cisco Smart Software Manager satellite.
If the product is already registered before taking the backup, then reregister the product for updating the license
information.
For more information on how to register the product with Cisco Smart Software Manager or Cisco Smart
Software Manager satellite, see the System Configuration Guide for Cisco Unified Communications Manager
for your release.
Troubleshooting
DRS Restore to Smaller Virtual Machine Fails
Problem
A database restore may fail if you restore an IM and Presence Service node to a VM with smaller disks.
Cause
This failure occurs when you migrate from a larger disk size to a smaller disk size.
Solution
Deploy a VM for the restore from an OVA template that has 2 virtual disks.