Cisco Meeting Server 3 0 Installation Guide For Virtualized Deployments
Cisco Meeting Server 3 0 Installation Guide For Virtualized Deployments
Cisco Meeting Server 3 0 Installation Guide For Virtualized Deployments
1 Introduction 6
1.1 Overview of virtualized platforms 7
1.2 How to use this Guide 7
1.3 Differences in specific MMP commands 10
1.4 Differences in components enabled on the different platforms 10
2 Installation 12
2.1 Before You Start 12
2.1.1 About the Cisco Meeting Server software 12
2.1.2 Host requirements for the Cisco Meeting Server as a VM deployment 12
2.2 Installing via VMware on a specification-based server 15
2.3 Deploying Meeting Server from the OVA file with ESXi 6.5 Web Client 15
2.4 Installing and initial configuration of Cisco Meeting Server 1000 19
2.4.1 Before You Start 19
2.4.2 Task 1 — Unpacking and initial startup 19
2.4.3 Task 2 — Configuring VMware Network Management 21
2.4.4 Task 3 — Configuring the VMware Instance using vSphere client 23
2.4.5 Task 4 — Retrieving and activating VMware Licenses 24
2.4.6 Task 5 — Accessing the Cisco Meeting Server 1000 Console 25
3 Configuration 26
3.1 Creating your own Cisco Meeting Server Administrator Account 26
3.2 Setting up the Network Interface for IPv4 26
3.3 Adding Additional Network Interface(s) 28
3.4 Configuring the Call Bridge 28
3.5 Configuring the Web Admin Interface 29
3.5.1 Creating the certificate for the Web Admin Interface 29
3.5.2 Configuring the Web Admin Interface for HTTPS Access 31
Appendix C Branding 48
Appendix D Sizing a VM 49
D.1 Call Bridge VM 50
D.2 Edge VM 51
D.3 Database VM 52
D.4 Recorder and Streamer VM 52
D.4.1 VM sizing for the new internal SIP recorder component 52
D.4.2 VM sizing for the new internal SIP streamer component 53
Change History
Date Change Summary
September 02, 2020 Minor edit to clarify VM minimum requirement to 4 vCPU cores for Record-
er/Streamer.
November 13, 2019 Updated for version 2.8, ESXi support changes.
April 02, 2019 Information added for deploying Meeting Server from the OVA file with ESXi
6.5 Web Client.
Miscellaneous corrections.
January 28, 2019 Cisco Meeting Server 1000 using Cisco UCS C220 M5 Rack Server
supersedes the M4 variant. (From November 2018).
December 20, 2017 Added support for ESXi 6.5 and ESXi 6.0 Update 3 from Cisco Meeting Server
version 2.3.
November 27, 2017 Added Cisco Meeting Server 1000 additional installation detail. Removed
AWS references.
1 Introduction
The Cisco Meeting Server is a scalable software platform for voice, video and web content,
which integrates with a wide variety of third-party kit from Microsoft, Avaya and other vendors.
With the Cisco Meeting Server, people connect regardless of location, device, or technology.
The Cisco Meeting Server software runs as a virtualized deployment using VMware ESXi 6.x
with virtual hardware vmx-1x loaded onto the following platforms:
l Cisco Meeting Server 1000 (a preconfigured Cisco UCS C220 rack server. From early
2019, the M5 variant superseded the M4 variant.)
l specification-based VM platforms.
The table below indicates the ESXi versions supported by the current versions of Cisco Meeting
Server software.
Note: From version 2.4, Cisco Meeting Server software no longer supports Microsoft Hyper-V
virtualized deployments.
Customers often use virtualized deployments of the Cisco Meeting Server as the edge server in
a split deployment and in scalable deployments.
The functionality, and user experience for participants, is identical across all platforms running
the same software version. However, deployments are not interchangeable between the
virtualized deployments and physical deployments (Cisco Meeting Server 2000). For example,
it is not possible to create a backup from a virtualized deployment and roll it back on a Cisco
Meeting Server 2000 or vice versa.
Note: Meeting Server 3.0 introduces a mandatory requirement to have Cisco Meeting
Management 3.0 (or later). Meeting Management handles the product registration and
interaction with your Smart Account (if set up) for Smart Licensing support.
CAUTION: Irrespective of which virtualized platform is running the Cisco Meeting Server
software, ensure the platform is up to date with the latest patches. Failure to maintain the
platform may compromise the security of your Cisco Meeting Server.
Cisco Meeting Server 1000: ships with VMWare ESXi version 6.x and Cisco Meeting Server pre-
installed. However, this may not be the latest version of Cisco Meeting Server software
available. Follow the instructions in this guide to configure the Cisco Meeting Server 1000 and
apply the license. Once the Cisco Meeting Server is operational, check the version of software
installed using the MMP command version. The latest software is available here. To upgrade
the software installed on the Cisco Meeting Server 1000, follow the instructions in the release
notes for that software version.
Note: If your Meeting Server ships with ESXi 6.x — the default Cisco UCS ESXi 6.x credentials for
the Cisco Meeting Server 1000 are: login as root with a password of password. If your Meeting
Server ships with ESXi 7.x — the default Cisco UCS ESXi 7.x credentials for the Cisco Meeting
Server 1000 are: login as root with a password of c!SCo123.
You are advised to change this login admin account. Be aware that when you change the
password, Cisco UCS ESXi will require a complex password.
specification-based VM platforms: if you are upgrading the server from a previous virtualized
Cisco Meeting Server installation, then follow the instructions in the Cisco Meeting Server
release notes. If this is a new installation, then follow this guide to create a VM and install the
Cisco Meeting Server software.
Note: The Cisco Meeting Server 1000 has different settings to the specification-based VM
server, the settings are pre-configured, do not change the settings.
Note: The address ranges we use in Cisco user documentation are those defined in RFC 5737
which are explicitly reserved for documentation purposes. IP addresses in Meeting Server user
documentation should be replaced with correct IP addresses routable in your network, unless
otherwise stated.
shutdown Not available through MMP. Use Do not use the vSphere power but-
Cisco UCS Manager to power ton. Use the shutdown com-
down blade servers before remov- mand instead.
ing power.
2 Installation
This chapter applies to deployments on specification-based VM platforms and Cisco Meeting
Server 1000. Follow Section 2.2 to deploy a VMware host. Follow Section 2.4 to deploy a
Cisco Meeting Server 1000.
Table 2: Host requirements for the Cisco Meeting Server running on third party servers
Minimum Recommended
Hypervisor Latest update of Latest update of VMware ESXi 6.7 with virtual hardware vmx-
VMware ESXi 6.0 14
with virtual hardware
vmx-11 Note: Refer to the VMware documentation for further
information.
* additional memory should be available on the system for use by the hypervisor and any other VMs on the host.
Note: Meeting Server supports single and dual socket servers only.
Note: Both ESXi 6.5 and ESX 6.0 Update 3 provide a tool to enable you to disable TLS1.0 and
TLS 1.1 from communicating with ESXi.
HP DL380p Gen8
HP DL380p Gen8
In addition:
n All memory channels should be populated to maximize available memory bandwidth. There
are no special requirements for NUMA systems.
n Out-of-band management systems should not be configured to share a network port with
the VM. Internal testing has shown that they can cause bursts of packet loss and degraded
voice and video quality. Out-of-band management should either be configured to use a
dedicated network port or disabled.
n Where available, hyperthreading should be enabled on the host, without this there is capacity
reduction of up to 30%.
n When comparing AMD and Intel processors, the number of AMD “Modules” (a pair of “cores”
sharing resources) should be compared to Intel “cores” (which execute a pair of
“hyperthreads”). In internal testing we have found that AMD processors provide 60-70%
capacity of an equivalent Intel processor. For this reason Intel processors are recommended
for production deployments.
n The CPUs used by the Cisco Meeting Server must be dedicated for its use. This is achieved
by:
o only running a single VM on the host, or
o pinning of all VMs on the host to specific cores and giving the Cisco Meeting Server sole
use of the assigned cores, and in addition, leaving a physical core with no VMs pinned to it
for the Hypervisor.
o following the co-residency requirements for Unified Communication in a Virtualized
Environment. Click on Cisco Meeting Server below the Meeting heading.
n If a VMWare Hypervisor with EVC mode enabled is used, the EVC must be set to one of the
following modes or higher:
“B1”/AMD Opteron™ Generation 4
“L2”/Intel® Nehalem generation (formerly Intel® Xeon Core™ i7)
EVC modes which enforce compatibility with older CPUs than those listed above, are not
supported as they will disable SSE 4.2; SSE4.2 is required.
n An activation key for the Call Bridge is required for media calls. To obtain the activation key,
you need the MAC address of your virtual server. See Chapter 4 and Appendix B for
information on licensing.
Note: For every release of the Cisco Meeting Server for virtualized deployments, there will be an
.ova file for a new deployment, and an upgrade image (.img) for upgrading to the latest release.
For a new installation follow this section; for an upgrade follow the release notes.
l If a VMWare Hypervisor with EVC mode enabled is used, the EVC must be set to one of the
following modes or higher:
“B1”/AMD Opteron™ Generation 4
“L2”/Intel® Nehalem generation (formerly Intel® Xeon Core™ i7)
EVC modes which enforce compatibility with older CPUs than those listed above, are not
supported as they will disable SSE 4.2; SSE4.2 is required.
l An activation key for the Call Bridge is required for media calls. To obtain the activation
key, you need the MAC address of your virtual server. See Chapter 4 and Appendix B for
information on licensing.
2.3 Deploying Meeting Server from the OVA file with ESXi 6.5 Web Client
Note: For every release of the Cisco Meeting Server for virtualized deployments, there will be an
.ova file for a new deployment, and an upgrade image (.img) for upgrading to the latest release.
For a new installation follow this section; for an upgrade follow the release notes.
4. Enter the desired name for the virtual machine and browse or drop the .ova file (downloaded
in step 1) to select it.
5. Follow the wizard instructions. The settings that must be selected are:
a. Select the datastore to store the VM configuration and disk files.
b. Select the network mapping you would like the VM to be connected to.
c. Set Disk provisioning to Thick.
d. Ensure Power On After Deployment is not selected.
e. Click Finish.
Note: Depending on how your virtual host is set up, some of the wizard settings may not
be displayed or may not be selectable.
6. Once completed, the new Cisco Meeting Server VM should now be listed in your Virtual
Machines.
7. Select the Cisco Meeting Server VM from your list of VMs.
8. From the Actions button, select Edit Settings….
a. Edit VM settings and choose CPUs. Set Number of CPUs to the desired number (where 4
is the minimum). See the deployment guide for scaling details. For more information on
VM configuration requirements, see
https://www.cisco.com/c/dam/en/us/td/docs/voice_ip_comm/uc_
system/virtualization/virtualization-cisco-meeting-server.html and Appendix D.
b. Set Number of Cores per Socket to one of the following:
l On a dual processor host with hyperthreading, set Number of Cores per Socket to the
number of logical cores minus 2.
l On a dual processor host without hyperthreading, set Number of Cores per Socket to
the number of logical cores minus 1.
l On a single processor host, set Number of Cores per Socket to the number of logical
cores.
We recommend that you configure the number of sockets to mirror underlying
hardware.
Note: The number of logical cores can be found on the vSphere Web Client, by clicking
Manage > Settings > Processors. For more information, see:
https://docs.vmware.com/en/VMware-
vSphere/6.5/com.vmware.vsphere.resmgmt.doc/GUID-E09F36DF-E31F-417D-
9865-06E351D8AF15.html
c. Ensure the RAM is set to a minimum of 4GB and the disk space is set to 100GB.
10. Click the Console tab and open the browser console (or remote console if VMware Remote
Console is installed).
11. Log in with the user name “admin” and the password “admin”. You will be asked to change
the admin password. You are now logged into the MMP. Go on to Chapter 3.
5. Press the power button on the front of the Meeting Server. It will automatically stop and
restart itself more than once after initial power on.
6. Connect a console to the Meeting Server to continue. You can use either a monitor and
keyboard, or use a virtual console over a network connection. Select from the following
options:
The Meeting Server will automatically boot to the VMware console screen when startup is
complete and should be visible on the monitor.
9. Enter the command show network detail to show the current configuration of the
management Ethernet interface, including the current IP address the server has aquired via
DHCP (if available on the network). Make a note of the IPv4 address shown (if DHCP is
available).
10. If DHCP is not available and you need to set a static IP, use the following commands,
changing the sample values to ones appropriate for your network. (These commands
assume you are already in the CIMC scope.)
scope network
set dns-use-dhcp no
set dhcp-enabled no
set v4-addr 10.1.2.3
set v4-netmask 255.255.255.0
set v4-gateway 10.1.2.1
commit
11. Enter show network detail to confirm your changes. Once complete, enter the
command exit twice to log out of the CIMC.
12. Switch to your PC's browser, and browse to the IP address you configured or obtained
from the CIMC serial interface. Dismiss the certificate security warnings and a Cisco
landing page with username and password fields will display.
13. Login with the username of admin and the password you set when first connecting to the
CIMC.
14. When the Server Summary page loads, click the Launch KVM Console link under Actions.
The JAVA virtual console application loads. Depending on your Operating System and
browser you may get security warnings and dialogs to acknowledge and accept. Continue
until the application loads—it will show the monitor image as if you were directly connected
to the server. If the server is powered off, it will show a larger green window saying No
Signal.
15. If the server is powered off, from the Power menu, select Power On to start the server.
After a few minutes it should boot to the VMware console screen.
You can now use the virtual console the same as if you were connected using a local monitor
and keyboard.
1. Press F2 to configure the server. The default username is root and the default password
is dependent up the version of ESXi installed, i.e. if your Meeting Server 1000 ships with
ESXi 6.x the default password is password, if it ships with ESXi 7.x the default password
is c!SCo123.
2. We recommend you change the default password:
a. From the menu options, use the arrow and Enter keys to select Configure Password.
b. Follow the prompts and set a password to use for the VMware root account.
Note: VMware has high password complexity requirements— use a strong password
including special characters, mixed case, and alpha and numeric characters.
3. From the menu options, use the arrow and Enter keys and select Configure Management
Network and then IPv4 Configuration.
4. Select the option for the network configuration you will use (DHCP or Static IP
assignment) and configure the IPv4 Address, Mask, and Gateway as appropriate for your
network.
REMINDER: This IP address is for the VMware Hypervisior, not the Meeting Server
application. The address used must be unique from the Meeting Server application.
5. (Optional) If you will access the Hypervisor management via a different VLAN from the
Meeting Server application, configure the VLAN that the Management Interface should
associate with.
6. Press Escape to return to the main menu, and Escape again to log out.
The VMware management IP address displays in the bottom left of the screen.
automatic shutdown (this takes several minutes). After it powers off, power it back
on using the power button. Because you disconnected the network that the virtual
console was using, you will not be able to see the IP address the server obtained. To
find the IP address, contact your DHCP administrator to find which IP address the
server was assigned. The MAC address of the Ethernet1 interface can be found on
the pull-out tab located on the front of the Cisco Meeting Server 1000.
You should now have Ethernet connected to the Ethernet1 port on the rear of the server and
know the IP address in use by the VMware management network.
4. In the Properties window, check the NTP Client Enabled checkbox and click the Options
button.
5. Click NTP Settings from the list and click the Add button to add the NTP source(s) you
wish to use.
6. Select General from the list.
7. Change the Service to Start and Stop with the host.
8. Click Start to start the service.
9. Click OK twice to close the time configuration pages.
8. In the resulting window, select Assign a new key to this host and click the Enter button to
enter your license key.
9. Click OK close the dialog window.
3 Configuration
After creating your new admin accounts delete the default “admin” account.
Note: Any MMP user account at the admin level can also be used to log into the Web Admin
Interface of the Call Bridge. You cannot create users through the Web Admin Interface.
Note: Although these steps are for IPv4, there are equivalent commands for IPv6. See the MMP
Command Reference for a full description.
In the Cisco Meeting Server virtualized deployment, there is only one network interface initially,
interface “a”, but up to 4 are supported (see the next section). The MMP runs on interface a in
the virtual deployment.
1. To set network interface speed, duplex and auto-negotiation parameters use the iface
MMP command e.g. to display the current configuration on the "a" interface, in the MMP
type:
iface a
a. Set the network interface speed (Mbps), duplex and auto negotiation parameters
using the command iface (a|b|c|d) <speed> (full|on|off). For example,
set the interface to 1GE, full duplex:
iface a 1000 full
b. Switch auto negotiation on or off using the command iface a autoneg
<on|off>. For example:
iface a autoneg on
Note: We recommend that the network interface is set to auto negotiation "on" unless
you have a specific reason not to.
2. The “a” interface is initially configured to use DHCP. To view the existing configuration, type:
ipv4 a
a. If you are using DHCP IP assignment, no further IP configuration is needed, go to step 3.
b. If you are using Static IP assignment:
Use the ipv4 add command to add a static IP address to the interface with a specified
subnet mask and default gateway.
For example, to add address 10.1.2.4 with prefix length 16 (netmask 255.255.0.0) with
gateway 10.1.1.1 to the interface, type:
ipv4 a add 10.1.2.4/16 10.1.1.1
To remove the IPv4 address, type:
ipv4 a del <address>
3. Set DNS Configuration
Meeting Server requires DNS lookups for many of its activities including looking up SRV
records and is required for a simplified deployment. We recommend you point Meeting
Server to the default DNS resolver for your network using a period "." for the forwardzone
value.
a. To output the dns configuration, type:
dns
b. To set the application DNS server use the command:
dns add forwardzone <domain name> <server IP>
Note: A forward zone is a pair consisting of a domain name and a server address: if a
name is below the given domain name in the DNS hierarchy, then the DNS resolver can
query the given server. Multiple servers can be given for any particular domain name to
provide load balancing and fail over. A common usage will be to specify "." as the
domain name i.e. the root of the DNS hierarchy which matches every domain name.
for example:
dns add forwardzone . 10.1.1.33
c. If you need to delete a DNS entry use the command:
dns del forwardzone <domain name> <server IP>
for example:
dns del forwardzone . 10.1.1.33
Note: If you select an Ethernet Adaptor which is not VMXNET3, then you may experience
network connection problems, and may invalidate your license.
Note: For more information on adding or modifying Ethernet Adapters, refer to the VMware
web page Adding and Modifying Virtual Network Adapters.
4. After adding the new adapter, enable the interface for use on the MMP with the command
ipv4 b enable, for example.
5. Reboot the VM so the addresses and gateway can be added manually or automatically
picked up by DHCP (if enabled for that interface).
Note: the Call Bridge must be listening on a network interface that is not NAT’d to another IP
address. This is because the Call Bridge is required to convey the same IP that is configured
on the interface in SIP messages when talking to a remote site.
3. Configure the Call Bridge to use the certificates by using the following command so that a
TLS connection can be established between the Lync FE server and the Call Bridge, for
example:
callbridge certs callbridge.key callbridge.crt
The full command and using a certificate bundle as provided by your CA, is described in the
Certificate Guidelines.
4. Restart the Call Bridge interface to apply the changes.
callbridge restart
Note: You need a certificate uploaded for the Web Admin Interface even if you configure the Call
Bridge through the API rather than the Web Admin Interface.
The information below assumes that you trust Cisco to meet requirements for the generation of
private key material. If you prefer, you can generate the private key and the certificate externally
using a public Certificate Authority (CA), and then load the externally generated key/certificate
pair onto the MMP of the Cisco Meeting Server using SFTP. After obtaining the signed
certificate, go to Section 3.5.2.
Note: If testing your Cisco Meeting Server in a lab environment, you can generate a key and a
self-signed certificate on the server. To create a self-signed certificate and private key, log in to
the MMP and use the command:
pki selfsigned <key/cert basename>
where <key/cert basename> identifies the key and certificate which will be generated e.g. "pki
The steps below explain how to generate a private key and the associated Certificate Signing
Request using the MMP command pki csr , and export them for signing by a CA.
1. Log in to the MMP and generate the private key and certificate signing request (CSR):
pki csr <key/cert basename> [<attribute>:<value>]
where:
<key/cert basename> is a string identifying the new key and CSR (e.g. "webadmin" results
in "webadmin.key" and "webadmin.csr" files)
and the allowed, but optional attributes are as follows and must be separated by a colon:
l CN: the commonName which should be on the certificate. Use the FQDN defined in DNS
A record as the Common Name. Failure to do this will result in browser certificate errors.
l OU: Organizational Unit
l O: Organization
l L: Locality
l ST: State
l C: Country
l emailAddress
Use quotes for values that are more than one word long, for example:
pki csr example CN:example.com "OU:Accounts UK" "O:My Company"
2. Send the CSR to one of the following:
l To a Certificate Authority (CA), such as Verisign who will verify the identity of the
requestor and issue a signed certificate.
l To a local or organizational Certificate Authority, such as an Active Directory server with
the Active Directory Certificate Services Role installed, see Appendix F.
Note: Before transferring the signed certificate and the private key to the Cisco Meeting Server,
check the certificate file. If the CA has issued you a chain of certificates, you will need to extract
the certificate from the chain. Open the certificate file and copy the specific certificate text
including the BEGIN CERTIFICATE and END CERTIFICATE lines and paste into a text file. Save the
file as your certificate with a .crt, .cer or .pem extension. Copy and paste the remaining
certificate chain into a separate file, naming it clearly so you recognize it as an intermediate
certificate chain and using the same extension ( .crt, .cer or .pem). The intermediate certificate
chain needs to be in sequence, with the certificate of the CA that issued the chain first, and the
certificate of the root CA as the last in the chain.
Note: The deployment automatically sets up the Web Admin Interface to use port 443 on
interface A. However, the Web Bridge also uses TCP port 443. If both the Web Admin Interface
and the Web Bridge use the same interface, then you need to change the port for the Web
Admin Interface to a non-standard port such as 445, use the MMP command webadmin
listen <interface> <port>.
For example:
webadmin certs webadmin.key webadmin.crt
webadmin listen b 443
webadmin restart
webadmin enable
Test that you can access the Web Admin Interface, i.e. enter your equivalent of https://cms-
server.mycompany.com (or the IP address) in your browser and login using the MMP user
account you created earlier.
Note: From version 3.0 you can use Trial Mode for a 90 day full featured period without licenses.
In this instance, the Web Admin interface will display "This CMS is currently unlicensed" during
this period. For information on Smart licensing and how licensing works in 3.0 see Appendix B.
All virtualized deployments of the Cisco Meeting Server require a license file; the license file is for
the MAC address of your virtual server.
B.6 describes the Cisco Licensing available to purchase for the Cisco Meeting Server. After
purchasing the licensing, follow this chapter to apply the license to the Cisco Meeting Server
only if you are using the traditional licensing method.
Note: This is the MAC address of your VM, not the MAC address of the server platform that
the VM is installed on.
2. Open the Cisco License Registration Portal and register the PAK code(s) and the MAC
address of your Meeting Server(s).
3. If your PAK does not have an R-CMS-K9 activation license, you will need this PAK in addition
to your feature licenses.
4. The license portal will email a zipped copy of the license file. Extract the zip file and rename
the resulting xxxxx.lic file to cms.lic.
5. Using your SFTP client, log into Meeting Server and copy the cms.lic file to the Meeting
Server file system.
6. Restart the Call Bridge(s) using the MMP command callbridge restart
7. After restarting the Call Bridge(s), check the license status by entering the MMP command
license
The activated features and expirations will be displayed.
Note: From version 3.0 you can use Trial Mode for a 90 day full featured period without licenses.
In this instance, the Web Admin interface will display "This CMS is currently unlicensed" during
this period. For information on Smart licensing and how licensing works in 3.0 see Appendix B.
Note: If you are deploying multiple servers (single combined or split Core or Edge servers) that
you will cluster, see the Scalability & Resilience Deployment Guide Appendix entitled Sharing
Call Bridge licenses within a cluster for more information if you are using the traditional licensing
method. Otherwise, refer to the Smart Licensing section as you can now license multiple
clusters with one set of Meeting Server licenses in your Smart Account and you no longer need
to load the license file onto each individual Meeting Server instance as was the case prior to 3.0.
You are now ready to configure the Cisco Meeting Server. See the appropriate guide for your
deployment found here:
n Single Combined Server Deployment Guide if you are deploying on a single host server
n Single Split Server Deployment Guide if you are deploying on a split Core/Edge deployment
n Scalability & Resilience Guide if you are deploying multiple servers (single combined or split
Core or Edge servers) that you will cluster.
Remember to use the shutdown command rather than using the vSphere power button when
you want to shut down the Cisco Meeting Server.
HD calls 96 96 700
720p30 video
720p5 content
Note: The term "overage" is used to describe a situation where license usage is higher than the
entitlement.
l You can upgrade to 3.0 without a Smart Account, and Meeting Management will
read the existing license file(s) as per the traditional licensing method.
l You can move to a Smart Account using the Cisco Smart Software Manager
(CSSM) portal and choose the option to convert your existing licenses to Smart.
l SMP and PMP license usage is combined to decide if a day is counted as overage (if either
license is over, the whole day is regarded as usage higher than the entitlement). For other
feature licenses (for example, recording or custom layout), they are assessed separately
and enabled with entitlement via Meeting Management (assuming the license exists in
your Smart account).
Note: As Meeting Management is required for all 3.0 deployments, for larger customer
deployments, Meeting Management can be deployed in new licensing-only mode without
active meeting management.
For information on purchasing and assigning licenses using the traditional licensing method, see
Section B.8 and Section B.9.
l ACU licensing is not available with the Meeting Management licensing dashboard —
ACUs are not supported in 3.0 and later.
Note: For full details on using Cisco Meeting Management to administer Smart Licensing, see
the Meeting Management 3.0 Administrator Guide.
Meeting Management is mandatory for licensing to work on Meeting Server 3.0 and later.
Version 3.0 introduces a new trust and interaction between Meeting Server and Meeting
Management to support the new licensing using Smart or for existing customers use of installed
licensing files — it's this trusted link that enables Meeting Management to license Meeting Server.
A high level work flow for implementing Smart Licensing is as follows:
1. Register your Meeting Management to Smart Licensing Virtual Account.
2. When a Meeting Server first starts up it will have no license status values defined.
Note: You can use Trial Mode for a 90 day full featured period without licenses.
Note: The expiry date for any feature license will only ever be up to a maximum of 90 days
in the future.
4. Meeting Management collates Meeting Server licensing usage for the cluster and reports
to your Smart Account on a daily basis to check that it has the licenses required to ensure
the Meeting Server is in compliance. The Smart Account responds to Meeting
Management to indicate if the Meeting Server is compliant or not. Meeting Management
then sets the expiry dates as appropriate as follows:
a. If the Meeting Management identifies that a license exists and is below entitlement
for a particular feature, the expiry date will be extended to 90 days in the future.
Note: If Meeting Server doesn't connect to Meeting Management and send usage
data for a period of 90 days then the Meeting Server's license won't get refreshed
and will therefore expire. For information on the enforcement actions when a license
expires, see Section B.4.
If a license usage is higher than the entitlement, or a license is not found, then enforcement
occurs as follows.
b. If Meeting Management identifies that less than 15 out of the last 90 days are non-
compliant, it will allow this and reset the Meeting Server expiry date to 90 days in the
future from that point. The admin will get a visual warning to notify "Insufficient
licenses".
c. If Meeting Management identifies that more than 15 of the last 90 days are non-
compliant, the first level of enforcement (Alarm 1) will occur, i.e. out of compliance
notifications on the Meeting Management interface.
d. If overage continues, Meeting Management does not reset the 90 day clock, it gives
you a countdown in xx days in which to add new licenses otherwise Alarm levels 2
and 3 will be enabled for all participants joining a meeting as shown in Appendix B.
Appendix B shows the enforcement flow from initial start up in trial mode on the left-hand side
through to overage enforcement as shown on the right-hand side.
Figure 2: Cisco Meeting Server and Cisco Meeting Management Smart Licensing enforcement flow
Note: You can use the Smart Licensing portal to enable email notifications for "insufficient
licenses".
When a license feature has expired the actions described in Table 5 will occur.
Feature Action
callBridge When expired: a visual text message displays on screen lasting 30 seconds and an
audio prompt plays on joining a meeting for all participants/all meetings. (Alarm level
2)
callBridgeNoEncryption When expired more than 90 days ago or no license present: the same as before but
the visual message is permanent. The audio prompt plays "Your deployment is out of
licensing compliance, please contact your administrator". (Alarm level 3)
PMP/SMP
Note: you only need callBridge or callBridgeNoEncryption to prevent the above
action.
customizations When expired or not present, customization features will not be active during a meet-
ing.
recording When expired or not present you will not be able to start a new recording (regardless
of whether it is a 3rd party recorder or not).
This license represents recording and streaming so the same restrictions also apply to
streaming.
To turn off Alarms 2 and 3, simply add more licenses to your Smart Account.
n Call Bridge
n Call Bridge No Encryption
n Customizations (for custom layouts)
n Recording or Streaming
In addition to feature licenses, user licenses also need to be purchased, there are 2 different
types of user licenses:
n PMP Plus,
n SMP Plus,
Note: You can use Trial Mode for a 90 day full featured period without licenses.
Note: You have the choice of purchasing an activation key with SIP media encryption enabled or
SIP media encryption disabled (unencrypted SIP media) for the Cisco Meeting Server 1000,
Cisco Meeting Server and the VM software image. For more information on the unencrypted
SIP media mode and activation key see your Deployment Guide.
Note: This note only applies if you are using the traditional licensing method. You need a license
file for each individual Call Bridge, however, you can share licenses amongst servers in the same
cluster. Each license file should have all of the required features that you purchased for that
cluster; such as PMP Plus, SMP Plus, Recording/Streaming, and activation LIC-CMS-K9.
If a license is only installed on one Call Bridge in the cluster then the feature(s) will only work for
calls on that Call Bridge. The feature will fail for calls on other Call Bridges in the cluster, unless
you share the license with the other Call Bridges. Note that each Call Bridge in the cluster
requires its own license file.
You can determine the number of distinct calls across a cluster of Call Bridges using the
parameter weightedCallsActive on API object /system/multipartyLicensing. The sum of
weighted calls across a cluster matches the number of distinct calls on the cluster. For example,
if CMS1 shows 3 callsActive and 2 weightedCallsActive, and CMS2 shows 2
callsActive and 1 weightedCallsActive, then there are 3 conferences in total on the cluster
and 3 PMP Plus/SMP Plus licenses are required.
For more information, see the Appendix “Sharing Call Bridge licenses within a cluster”.
Note: Using Unified Communications Manager, the initiator of an Ad Hoc conference can be
identified and if they have been assigned a PMP Plus license then that is used for the conference.
Note: To determine the number of active calls using the PMP Plus licence of an individual, use
the parameter callsActive on API object
/system/multipartyLicensing/activePersonalLicenses. We generally allow 2 calls to be
active allowing for one starting and other finishing. If the call is on a cluster of Call Bridges then
use the parameter weightedCallsActive on API object
/system/multipartyLicensing/activePersonalLicenses for each Call Bridge in the cluster.
The sum of weightedCallsActive across the cluster matches the number of distinct calls on
the cluster using the individual’s PMP Plus license. If a PMP Plus licence is exceeded, then SMP
Plus licences are assigned, see Section B.10.
Note: To determine the number of SMP Plus licences required, use the parameter
callsWithoutPersonalLicense on API object /system/multipartyLicensing. If the calls are
on a cluster of Call Bridges then use the parameter weightedCallsWithoutPersonalLicense
on API object /system/multipartyLicensing for each Call Bridge in the cluster. The sum of
weightedCallsWithoutPersonalLicense across the cluster matches the number of distinct
calls on the cluster which require an SMP Plus license.
1. Sign in to Cisco Smart Software Manager (CSSM) portal and choose Virtual Account with
Meeting Server Licenses.
2. Generate a registration token.
3. Copy the token to your clipboard.
4. Open the instance of Meeting Management that you want to use for license reporting.
5. Go to the Settings page, Licensing tab.
6. Click Change.
7. Choose Smart Licensing and Save.
8. Click Register.
9. Paste the registration token (this allows Meeting Management to connect to the Smart
Licensing portal).
10. Click Register.
11. When you have registered, check how many licenses you have in your Virtual Account.
12. In Meeting Management, go to the Licenses page.
13. Enter the license information for the licenses you have in your Virtual Account.
If any licenses are not shown in your Virtual Account, use the Convert Licenses tab, search
by PAK to find them, then choose Convert Licenses as shown in Figure 4. (If you can't find
a license(s), open a case by sending an email to [email protected].)
B.8 Obtaining Cisco user licenses using the traditional licensing method
This section assumes that you have already purchased the licenses that will be required for your
Meeting Server from your Cisco Partner and you have received your PAK code(s).
Follow these steps to register the PAK code with the MAC address of your Meeting Server using
the Cisco License Registration Portal.
1. Obtain the MAC address of your Meeting Server by logging in to the MMP of your server,
and enter the MMP command: iface a
Note: This is the MAC address of your VM, not the MAC address of the server platform that
the VM is installed on.
2. Open the Cisco License Registration Portal and register the PAK code(s) and the MAC
address of your Meeting Server(s).
3. If your PAK does not have an R-CMS-K9 activation license, you will need this PAK in addition
to your feature licenses.
4. The license portal will email a zipped copy of the license file. Extract the zip file and rename
the resulting xxxxx.lic file to cms.lic.
5. Using your SFTP client, log into Meeting Server and copy the cms.lic file to the Meeting
Server file system.
6. Restart the Call Bridge(s) using the MMP command callbridge restart
7. After restarting the Call Bridge(s), check the license status by entering the MMP command
license
The activated features and expirations will be displayed.
Note: If the userProfile is deleted, then the userProfile is unset for the ldapSource and
the imported users.
For more information on these additional object and fields to support Cisco Multiparty licensing,
refer to the Cisco Meeting Server API Reference Guide.
A full SMP Plus license is consumed for any audio-video conference instantiated from a space
with the owner property undefined, owned by an imported LDAP user without a PMP Plus
license, or owned by an imported LDAP user whose PMP Plus license has already been
consumed, this is irrespective of the number of participants.
Note: Note: personal and shared licenses are normalized over the number of Call Bridges that
the call spans.
Appendix C Branding
Some aspects of the participant experience of meetings hosted on Meeting Servers can be
branded, they include :
n the web app sign-in background image, sign-in logo, text below sign-in logo, icon, and the
text on the browser tab,
n IVR messages,
n SIP and Lync participant's splash screen images and all audio prompts/messages,
n text on the meeting invitation.
If you apply a single brand with only a single set of resources specified (one web app sign-in
page, one set of voice prompts, one invitation text), then these resources are used for all
spaces, IVRs and Web Bridges in the deployment. Multiple brandings allow different resources
to be used for different spaces, IVRs and Web Bridges. Resources can be assigned at the
system, tenant, space or IVR level using the API.
See the Customization Guidelines for more information on branding.
Appendix D Sizing a VM
The Cisco Meeting Server is designed for maximum flexibility, it is highly scalable and allows the
“mix and matching” of Cisco Meeting Server 2000, Cisco Meeting Server 1000 and VM
deployments. For example, using VMs as edge servers and Cisco Meeting Server 2000 and
Cisco Meeting Server 1000 at the core for a highly scalable distributed architecture, or placing
all components within a VM deployment on a single standardized server.
Maximum flexibility is also carried through into the wide range of standard servers and
specifications the Cisco Meeting Server software can run on. Appendix E provides details for
one of the most popular virtualization technologies: VMware. The Cisco Meeting Server
software also runs effectively on an array of more specialized servers, for example for
applications requiring portable and rugged form factors.
The whole Cisco Meeting Server or individual components of the Cisco Meeting Server can be
run in a virtual machine (VM) deployment. For instance:
l for the purposes of testing the deployment, all of the components can run on a single VM
see Figure 5.
Note: In production networks, the Recorder and Streamer components should be enabled
on a different Meeting Server to the server hosting the conferences.
l a single VM can run the Web Bridge as an edge component with the TURN server,
connected to a Cisco Meeting Server 2000 or Cisco Meeting Server 1000 sitting in the
core network running the Call Bridge, and another VM running the other core components.
Note: If the Cisco Expressway is used at the edge of the network, then the TURN server
component on the VM does not require enabling, and the Web Bridge should reside on the
Meeting Server with the Call Bridge hosting the conferences.
l one VM running edge components, connecting to a second VM running the Call Bridge
and database, and a third VM running other core components.
Figure 5 illustrates the Cisco Meeting Server software components enabled on one server.
Figure 6 illustrates the Cisco Meeting Server software components deployed across an edge
server and core servers.
Figure 6: Cisco Meeting Server software components with the TURN server and Web Bridge 3 at the
edge
When a VM is configured to run one or more Cisco Meeting Server components, Cisco
recommends that the entire host is dedicated to the VM. This provides best performance for
real time media applications and ensures high quality end user experience. The sizing of VMs
depends on the components being used.
Each physical core of an Intel Xeon 2600 series (or later) CPU, running at 2.5GHz, is capable of
approximately 2.5 720p30 H.264 call legs when hyperthreading is enabled. Capacity scales
linearly with number of CPU cores and frequency, so a two socket E5-2680v2 system, which
has 20 physical cores, can handle 50 concurrent 720p30 H.264 call legs.
The VM should be configured to use all but one of the host physical cores. When hyperthreading
is enabled the number of available logical cores is double the number of physical cores, so in the
dual E5-2680v2 system above, there are 40 virtual CPUs, of which 38 should be allocated to
the VM. We recommend that you configure the number of sockets to mirror underlying
hardware.
Over subscription of the host, either by incorrectly setting the number of Cisco Meeting Server
VM virtual CPUs or by contention for CPU resources amongst VMs, causes scheduling delays
and results in degraded media quality. The recommendation to assign the number of vCPUs in
excess of the number of physical cores is an overcommitment of the CPU resource. This CPU
over commitment does lead to a distortion in the VM CPU utilization statistics and a higher CPU
Ready time. CPU commitment is a workload specific consideration and therefore may conflict
with more generic advice. This vCPU commitment is intentional for Cisco Meeting Server and is
a result of empirical testing to extract peek performance from a host. A Cisco Meeting Server
VM, correctly configured according to the recommendations above, will degrade gracefully by
dropping frame rate and/or resolution if pushed over capacity.
1GB RAM for each underlying physical CPU core should be allocated to the VM with a minimum
allocation of 4GB of RAM. For the system above, the VM should be configured with 19GB
corresponding to the 19 physical CPU cores in use.
D.2 Edge VM
The requirements for other components are lower, and a VM can be used in a split core-edge
deployment to provide edge functionality, for example TURN server on an edge VM. This edge
D.3 Database VM
Note: This section is applicable only if you choose to use one or more external databases.
The host server for a database has modest CPU requirements, but requires large storage and
memory. We do not mandate a qualified VM host but recommend:
n Four vCPUs, 8GB RAM and 100GB data store
(The OVF will be set to these parameters so that they are the defaults post-deployment)
n Sandy Bridge (or later) class Intel processors (e.g. E5-2670 or E5-2680 v2)
n The data store should reside on either a high IO per second SAN or local SSD storage
n The data must reside on the same vdisk as the OS
The Cisco UCS C220 which is currently used as the host for the Cisco Meeting Server 1000
could be used, but the VM database would only use a small percentage of the server’s
resources. Using this server, other VMs could be also hosted on the same server as the VM
database, if desired.
Note: The new internal SIP recorder and streamer service cannot be used as an External
recording or streaming service as the services rely on specific SIP header parameters passed by
the Meeting Server Call Bridge. When calls from any other source that is not Meeting Server Call
Bridge connect, the recorder/streamer will reject the call as it won't locate the specific SIP
headers expected.
Recording Set- Recordings per RAM required per Disk budget per Maximum concurrent
ting vCPU recording hour recording
4 4GB 50 37 100
E.1 VMWare
Core VMs should be configured to use the entire host. This ensures that a CPU core is available
for the ESXi kernel to perform management and network operations.
As part of internal testing we regular benchmark a variety of CPU and server configurations.
During these tests synthetic calls are added over time, gradually increasing the demands on the
VM and pushing it over capacity. Several internal statistics are monitored to ensure quality of
user experience. In addition, ESXi statistics are monitored and diagnostic logs are collected.
Although not recommended, it is possible to run other VMs alongside the Cisco Meeting Server
VM as long as CPU isolation domains are created to prevent contention. This technique is
known as “anti-pinning”, and involves explicitly pinning every VM to a subset of the cores. The
Cisco Meeting Server VM must be the only VM pinned to its cores, and all other VMs need to be
explicitly pinned to other cores.
For example, if a 20 core dual E5-2680v2 host is available, but only 25 concurrent 720p30 call
legs are required, then anti-pinning can be used. Using the 2.5 calls/core ratio, 10 physical
cores are required to provide this capacity. 10 cores can be used for other tasks.
With hyperthreading enabled, 40 logical cores are available and ESXi labels these logical cores
by index 0-39. The Cisco Meeting Server VM should be allocated 20 virtual CPUs and
configured with scheduling affinity 0-19. All other VMs running on the host must be explicitly
configured with affinity 20-39 to create the pair of isolation domains. It may also be necessary
to leave a physical core with no VMs pinned to it for the ESXi Hypervisor.
VMXNet3 virtual network adapters are preferred as they require lower overhead than other
adaptor types. All virtual network adapters should be the same type.
VMware vMotion and High Availability (HA) technologies are fully supported. VMware Fault
Tolerance (FT) is not supported as it is limited to single virtual core VMs. High level tools such as
VMware vCenter Operations Manager are fully supported.
Note: If a VMWare hypervisor with EVC mode enabled is used, the EVC must be set to one of the
following modes or higher:
“B1”/AMD Opteron™ Generation 4
“L2”/Intel® Nehalem generation (formerly Intel® Xeon Core™ i7)
EVC modes which enforce compatibility with older CPUs than those listed above, are not
supported as they will disable SSE 4.2; SSE4.2 is required.
5. Using the Server Manager page on the CA, locate the Pending Requests folder under the CA
Role.
6. Right-click on the pending request that matches the Request ID given in CMD window and
select All Tasks > Issue.
7. The resulting signed certificate is in the Issued Certificates folder. Double-click on the
certificate to open it and open the Details tab (see right).
Now transfer the certificate (e.g. webadmin.crt) and private key to the MMP of the Cisco
Meeting Server using SFTP, see Section 3.5.2.
CAUTION: If you are using a CA with the Web Enrolment feature installed, you may copy the CSR
text including the BEGIN CERTIFICATE REQUEST and END CERTIFICATE REQUEST lines to
submit. After the certificate has been issued, copy only the certificate and not the Certificate
Chain. Be sure to include all text including the BEGIN CERTIFICATE and END CERTIFICATE lines
and paste into a text file. Then save the file as your certificate with a .pem, .cer or .crt extension.
Cisco Trademark
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates
in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their
respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (1721R)