Mobile Remote Access Via Expressway Deployment Guide X8 6
Mobile Remote Access Via Expressway Deployment Guide X8 6
August 2015
Contents
Mobile and Remote Access Overview 5
Jabber Client Connectivity Without VPN 6
Related documentation 6
Deployment scenarios 8
Single network elements 8
Single clustered network elements 8
Multiple clustered network elements 9
Hybrid deployment 9
Unsupported deployments 10
Configuration overview 11
Prerequisites 11
Supported clients when using Mobile and Remote Access 11
Configuration summary 12
EX/MX/SX Series endpoints (running TC software) 12
Jabber clients 12
DNS records 12
Firewall 13
Unified CM 14
IM and Presence Service 15
Expressway 15
Unified Communications prerequisites 17
Configuring a Secure Traversal Zone Connection for Unified Communications 17
Installing Expressway Security Certificates 17
Configuring Encrypted Expressway Traversal Zones 18
Server Certificate Requirements for Unified Communications 19
Cisco Unified Communications Manager Certificates 19
Expressway Certificates 19
Configuring Mobile and Remote Access on Expressway 22
Installing Expressway Security Certificates and Setting Up a Secure Traversal Zone 22
Setting Up the Expressway-C 22
Configuring DNS and NTP Settings 22
Enabling the Expressway-C for Mobile and Remote Access 22
Discovering Unified Communications Servers and Services 24
Trusting the Certificates Presented to the Expressway-C 24
Discovering IM and Presence Service Nodes 24
Discovering Unified CM Servers 25
Discovering Cisco Unity Connection Servers 26
Automatically Generated Zones and Search Rules 27
Why Should I Refresh the Discovered Nodes? 27
Configuring the HTTP Server Allow List on Expressway-C 27
Setting Up the Expressway-E 28
Configuring DNS and NTP Settings 28
Enabling the Expressway-E for Mobile and Remote Access 28
Ensuring That TURN Services Are Disabled on Expressway-E 29
Using Deployments to Partition Unified Communications Services 30
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 2 of 55
Single Sign-On (SSO) over the Collaboration Edge 32
Single Sign-On Prerequisites 33
High Level Task List 34
Importing the SAML Metadata from the IdP 35
Associating Domains with an IdP 35
Exporting the SAML Metadata from the Expressway-C 35
Configuring IDPs 36
Active Directory Federation Services 2.0 36
Enabling Single Sign-On at the Edge 37
Checking the Status of Unified Communications Services 38
Mobile and Remote Access Port Reference 39
Additional information 41
Unified CM dial plan 41
Expressway call types and licensing 41
Deploying Unified CM and Expressway in different domains 41
SIP trunks between Unified CM and Expressway-C 42
Configuring secure communications 42
Media encryption 43
Limitations 43
Unsupported Jabber features when using mobile and remote access 43
Unsupported features and limitations when using mobile and remote access 44
Protocol summary 44
Clustered Expressway systems and failover considerations 44
Authorization rate control 45
Credential caching 45
Unified CM denial of service threshold 45
Expressway automated intrusion protection 45
Appendix 1: Troubleshooting 47
General troubleshooting techniques 47
Checking alarms and status 47
Checking and taking diagnostic logs 48
Checking DNS records 48
Checking reachability of the Expressway-E 49
Checking call status 49
Checking devices registered to Unified CM via Expressway 49
Ensuring that Expressway-C is synchronized to Unified CM 50
Checking SSO status and tokens 50
Expressway certificate / TLS connectivity issues 50
Cisco Jabber sign in issues 50
Jabber cannot sign in due to XMPP bind failure 50
Jabber cannot sign in due to SSH tunnels failure 51
Jabber cannot sign in when connecting to different peers in a cluster of Expressway-Es 51
Expressway returns "401 unauthorized" failure messages 51
Call failures due to "407 proxy authentication required" or "500 Internal Server Error" errors 51
Call bit rate is restricted to 384 kbps / video issues when using BFCP (presentation sharing) 51
Endpoints cannot register to Unified CM 52
IM and Presence Service realm changes 52
No voicemail service ("403 Forbidden" response) 52
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 3 of 55
"403 Forbidden" responses for any service requests 52
Client HTTPS requests are dropped by Expressway 52
Unable to configure IM&P servers for remote access 53
'Failed: <address> is not a IM and Presence Server' 53
Invalid SAML assertions 53
Document revision history 54
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 4 of 55
Mobile and Remote Access Overview
Note that third-party SIP or H.323 devices can register to a Cisco VCS connected via a neighbor zone to a
Cisco Expressway and, if necessary, interoperate with Unified CM-registered devices over a SIP trunk.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 5 of 55
Mobile and Remote Access Overview
n Unified CM provides call control for both mobile and on-premises endpoints.
n Signaling traverses the Expressway solution between the mobile endpoint and Unified CM.
n Media traverses the Expressway solution and is relayed between endpoints directly; all media is encrypted
between the Expressway-C and the mobile endpoint.
Note that Jabber Web and Cisco Jabber Video for TelePresence (Jabber Video) are not supported.
Related documentation
Information contained in the following documents and sites may be required to assist in setting up your
Unified Communications environment:
n Expressway Basic Configuration (Expressway-C with Expressway-E) Deployment Guide
n Expressway Cluster Creation and Maintenance Deployment Guide
n Certificate Creation and Use With Expressway Deployment Guide
n Expressway Administrator Guide
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 6 of 55
Mobile and Remote Access Overview
n Configuration and Administration of IM and Presence Service on Cisco Unified Communications Manager
(for your version), at Cisco Unified Communications Manager Configuration Guides
n Directory Integration and Identity Management in the Cisco Collaboration System 10.x Solution Reference
Network Designs (SRND) document
n SAML SSO Deployment Guide for Cisco Unified Communications Applications (for your version), at Cisco
Unified Communications Manager Maintain and Operate Guides
n Jabber client configuration details:
l Cisco Jabber for Windows
l Cisco Jabber for iPad
l Cisco Jabber for Android
l Cisco Jabber for Mac
l Cisco Jabber DNS Configuration Guide
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 7 of 55
Deployment scenarios
Deployment scenarios
This section describes the supported deployment environments:
n single network elements
n single clustered network elements
n multiple clustered network elements
n hybrid deployment
n unsupported deployments
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 8 of 55
Deployment scenarios
n Jabber clients can access their own cluster via any route
n Expressway-C uses round robin to select a node (publisher or subscriber) when routing home cluster
discovery requests
n Each combination of Unified CM and IM and Presence Service clusters must use the same domain
n Intercluster Lookup Service (ILS) must be active on the Unified CM clusters
n Intercluster peer links must be configured between the IM and Presence Service clusters, and the
Intercluster Sync Agent (ICSA) must be active
Hybrid deployment
In this scenario, IM and Presence services for Jabber clients are provided via the WebEx cloud.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 9 of 55
Deployment scenarios
Unsupported deployments
VPN links, between the Expressway-C and the Unified CM services / clusters, are not supported.
"Mixed" traversal connections are not supported. That is, we do not support traversal zones, or Unified
Communications traversal zones, between Cisco VCS and Cisco Expressway even though it is possible to
configure these zones.
Explicitly, we do not support VCS Control traversal to Expressway-E, nor do we support Expressway-
C traversal to VCS Expressway.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 10 of 55
Configuration overview
Configuration overview
This section summarizes the steps involved in configuring your Unified Communications system for mobile
and remote access. It assumes that you already have set up:
n a basic Expressway-C and Expressway-E configuration as specified in Expressway Basic Configuration
Deployment Guide (this document contains information about the different networking options for deploying
the Expressway-E in the DMZ)
n Unified CM and IM and Presence Service have been configured as specified in Configuration and
Administration of IM and Presence Service on Cisco Unified Communications Manager (for your version),
at Cisco Unified Communications Manager Configuration Guides
Prerequisites
Ensure that you are running the following software versions:
n Expressway X8.1.1 or later
n Unified CM 9.1(2)SU1 or later and IM and Presence Service 9.1(1) or later
When deploying DX Series or IP Phone 78/8800 Series endpoints to register with Cisco Unified
Communications Manager via Mobile and Remote Access, you need to be aware of the following:
n Phone security profile: If the phone security profile for any of these endpoints has TFTP Encrypted
Config checked, you will not be able to use the endpoint via Mobile and Remote Access. This is because
the MRA solution does not support devices interacting with CAPF (Certificate Authority Proxy Function).
n Trust list: You cannot modify the root CA trust list on these endpoints. Make sure that the Expressway-
E's server certificate is signed by one of the CAs that the endpoints trust, and that the CA is trusted by the
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 11 of 55
Configuration overview
Configuration summary
EX/MX/SX Series endpoints (running TC software)
Ensure that the provisioning mode is set to Cisco UCM via Expressway.
On Unified CM, you need to ensure that the IP Addressing Mode for these endpoints is set to IPV4_ONLY.
These endpoints must verify the identity of the Expressway-E they are connecting to by validating its server
certificate. To do this, they must have the certificate authority that was used to sign the Expressway-E's
server certificate in their list of trusted CAs.
These endpoints ship with a list of default CAs which cover the most common providers (Verisign, Thawte,
etc). If the relevant CA is not included, it must be added. See 'Managing the list of trusted certificate
authorities' in the endpoint's administrator guide.
Mutual authentication is optional; these endpoints are not required to provide client certificates. If you do
want to configure mutual TLS, you cannot use CAPF enrolment to provision the client certificates; you must
manually apply the certificates to the endpoints. The client certificates must be signed by an authority that is
trusted by the Expressway-E.
Jabber clients
Jabber clients must verify the identity of the Expressway-E they are connecting to by validating its server
certificate. To do this, they must have the certificate authority that was used to sign the Expressway-E's
server certificate in their list of trusted CAs.
Jabber uses the underlying operating system's certificate mechanism:
n Windows: Certificate Manager
n MAC OS X: Key chain access
n IOS: Trust store
n Android: Location & Security settings
Jabber client configuration details for mobile and remote access is contained within the relevant installation
and configuration for that Jabber client:
n Cisco Jabber for Windows
n Cisco Jabber for iPad
n Cisco Jabber for Android
n Cisco Jabber for Mac (requires X8.2 or later)
DNS records
This section summarizes the public (external) and local (internal) DNS requirements. For more information,
see Cisco Jabber DNS Configuration Guide.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 12 of 55
Configuration overview
Public DNS
The public (external) DNS must be configured with _collab-edge._tls.<domain> SRV records so that
endpoints can discover the Expressway-Es to use for mobile and remote access. SIP service records are
also required (for general deployment, not specifically for mobile and remote access). For example, for a
cluster of 2 Expressway-E systems:
Local DNS
The local (internal) DNS requires _cisco-uds._tcp.<domain> and _cuplogin._tcp.<domain>
SRV records. For example:
Ensure that the cisco-uds and _cuplogin SRV records are NOT resolvable outside of the internal
network, otherwise the Jabber client will not start mobile and remote access negotiation via the Expressway-
E.
Note: We strongly recommend that you create internal DNS records, for both forward and reverse lookups,
for all Unified Communications nodes used with Mobile and Remote Access. This should allow Expressway-
C to find the nodes when IP addresses are used instead of FQDNs.
Firewall
n Ensure that the relevant ports have been configured on your firewalls between your internal network (where
the Expressway-C is located) and the DMZ (where the Expressway-E is located) and between the DMZ
and the public internet. See Mobile and Remote Access Port Reference [p.39] for more information.
n If your Expressway-E has one NIC enabled and is using static NAT mode, note that:
You must enter the FQDN of the Expressway-E, as it is seen from outside the network, as the peer
address on the Expressway-C's secure traversal zone. The reason for this is that in static NAT mode, the
Expressway-E requests that incoming signaling and media traffic should be sent to its external FQDN,
rather than its private name.
This also means that the external firewall must allow traffic from the Expressway-C to the
Expressway-E's external FQDN. This is known as NAT reflection, and may not be supported by
all types of firewalls.
See the Advanced network deployments appendix, in the Expressway Basic Configuration (Expressway-
C with Expressway-E) Deployment Guide, for more information.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 13 of 55
Configuration overview
Unified CM
1. If you have multiple Unified CM clusters, you must confgure ILS (Intercluster Lookup Service) on all of
the clusters.
This is because the Expressway needs to communicate with each user's home Unified CM cluster, and
to discover the home cluster it sends a UDS (User Data Service) query to any one of the Unified CM
nodes.
Search for "Intercluster Lookup Service" in the Unified CM documentation for your version.
2. Ensure that the Maximum Session Bit Rate for Video Calls between and within regions (System
> Region Information > Region) is set to a suitable upper limit for your system, for example 6000 kbps.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 14 of 55
Configuration overview
4. If Unified CM servers (System > Server) are configured by Host Name (rather than IP address), then
ensure that those host names are resolvable by the Expressway-C.
5. If you are using secure profiles, ensure that the root CA of the authority that signed the Expressway-C
certificate is installed as a CallManager-trust certificate (Security > Certificate Management in the
Cisco Unified OS Administration application).
6. Ensure that the Cisco AXL Web Service is active on the Unified CM publishers you will be using to
discover the Unified CM servers that are to be used for remote access. To check this, select the Cisco
Unified Serviceability application and go to Tools > Service Activation.
7. We recommend that remote and mobile devices are configured (either directly or by Device Mobility) to
use publicly accessible NTP servers.
a. Configure a public NTP server System > Phone NTP Reference.
b. Add the Phone NTP Reference to a Date/Time Group (System > Date/Time Group).
c. Assign the Date/Time Group to the Device Pool of the endpoint (System > Device Pool).
Expressway
The following steps summarize the configuration required on the Expressway-E and the Expressway-C. Full
details are described in section Configuring Mobile and Remote Access on Expressway [p.22]
1. Ensure that System host name and Domain name are specified for every Expressway, and that all
Expressway systems are synchronized to a reliable NTP service.
2. Set Unified Communications mode to Mobile and remote access.
3. Configure the Unified CM, IM and Presence Service, and Cisco Unity Connection servers on the
Expressway-C.
4. Configure the domains on the Expressway-C for which services are to be routed to Unified CM.
5. [Optional] Create additional deployments and associate domains and UC services with them.
6. Install appropriate server certificates and trusted CA certificates.
7. Configure a Unified Communications traversal zone connection between the Expressway-E and the
Expressway-C.
8. If required, configure the HTTP server allow list for any web services inside the enterprise that need to be
accessed from remote Jabber clients.
9. [Optional] Configure SSO over collaboration edge, to allow for common identity between external Jabber
clients and the users' Unified CM profiles
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 15 of 55
Configuration overview
Note that configuration changes on the Expressway generally take immediate effect. If a system restart or
other action is required you will be notified of this either through a banner message or via an alarm.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 16 of 55
Unified Communications prerequisites
Note: You should configure only one Unified Communications traversal zone per Expressway.
names for the Unified Communications features that have been enabled (see Server Certificate
Requirements for Unified Communications [p.19] if appropriate).
l To generate a CSR and /or to upload a server certificate to the Expressway, go to Maintenance >
Security certificates > Server certificate. You must restart the Expressway for the new server
certificate to take effect.
2. Install on both Expressways the trusted Certificate Authority (CA) certificates of the authority that signed
the Expressway's server certificates.
There are additional trust requirements, depending on the Unified Communications features being
deployed.
For mobile and remote access deployments:
l The Expressway-C must trust the Unified CM and IM&P tomcat certificate.
l If appropriate, both the Expressway-C and the Expressway-E must trust the authority that signed the
endpoints' certificates.
For Jabber Guest deployments:
l When the Jabber Guest server is installed, it uses a self-signed certificate by default. However, you
can install a certificate that is signed by a trusted certificate authority. You must install on the
Expressway-C either the self-signed certificate of the Jabber Guest server, or the trusted CA
certificates of the authority that signed the Jabber Guest server's certificate.
To upload trusted Certificate Authority (CA) certificates to the Expressway, go to Maintenance >
Security certificates > Trusted CA certificate. You must restart the Expressway for the new trusted
CA certificate to take effect.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 17 of 55
Unified Communications prerequisites
See Certificate Creation and Use With Expressway Deployment Guide for full information about how to
create and upload the Expressway’s server certificate and how to upload a list of trusted certificate
authorities.
To set up a secure traversal zone, configure your Expressway-C and Expressway-E as follows:
1. Go to Configuration > Zones > Zones.
2. Click New.
3. Configure the fields as follows (leave all other fields with default values):
Expressway-C Expressway-E
TLS verify subject name Not applicable Enter the name to look for in the traversal client's
certificate (must be in either the Subject
Common Name or the Subject Alternative Name
attributes). If there is a cluster of traversal clients,
specify the cluster name here and ensure that it
is included in each client's certificate.
Location section
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 18 of 55
Unified Communications prerequisites
Expressway-C Expressway-E
Expressway Certificates
The Expressway certificate signing request (CSR) tool prompts for and incorporates the relevant subject
alternate name (SAN) entries as appropriate for the Unified Communications features that are supported on
that Expressway.
The following table shows which CSR alternative name elements apply to which Unified Communications
features:
CSR SAN element Mobile and remote access Jabber Guest XMPP federation
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 19 of 55
Unified Communications prerequisites
CSR SAN element Mobile and remote access Jabber Guest XMPP federation
Note:
n A new Expressway-C certificate may need to be produced for the Expressway-C if chat node aliases are
added or renamed, such as when an IM and Presence node is added or renamed, or if new TLS phone
security profiles are added.
n A new Expressway-E certificate must be produced if new chat node aliases are added to the system, or if
the Unified CM or XMPP federation domains are modified.
n You must restart the Expressway for any new uploaded server certificate to take effect.
More details about the individual feature requirements per Expressway-C / Expressway-E are described
below.
Expressway-C server certificate requirements
The Expressway-C server certificate needs to include the following elements in its list of subject alternate
names:
n Unified CM phone security profile names: the names of the Phone Security Profiles in Unified CM
that are configured for encrypted TLS and are used for devices requiring remote access. Use the
FQDN format and separate multiple entries with commas.
Having the secure phone profiles as alternative names means that Unified CM can communicate via TLS
with the Expressway-C when it is forwarding messages from devices that use those profiles.
n IM and Presence chat node aliases (federated group chat): the Chat Node Aliases (e.g.
chatroom1.example.com) that are configured on the IM and Presence servers. These are required only for
Unified Communications XMPP federation deployments that intend to support group chat over TLS with
federated contacts.
The Expressway-C automatically includes the chat node aliases in the CSR, providing it has discovered a
set of IM&P servers.
We recommend that you use DNS format for the chat node aliases when generating the CSR. You must
include the same chat node aliases in the Expressway-E server certificate's alternative names.
Figure 3: Entering subject alternative names for security profiles and chat node aliases on the Expressway-
C's CSR generator
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 20 of 55
Unified Communications prerequisites
Figure 4: Entering subject alternative names for Unified CM registration domains, XMPP federation domains,
and chat node aliases, on the Expressway-E's CSR generator
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 21 of 55
Configuring Mobile and Remote Access on Expressway
Note that if XMPP federation is to be used, the IM&P servers need to be discovered on the Expressway-C for
all the relevant information to be available when generating certificate signing requests.
If you have a cluster of Expressways you must do this for every peer.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 22 of 55
Configuring Mobile and Remote Access on Expressway
Note that you must select Mobile and remote access before you can configure the relevant domains and
traversal zones.
Configuring the domains to route to Unified CM
You must configure the domains for which registration, call control, provisioning, messaging and presence
services are to be routed to Unified CM.
1. On Expressway-C, go to Configuration > Domains.
2. Select the domains (or create a new domain, if not already configured) for which services are to be routed
to Unified CM.
3. For each domain, turn On the services for that domain that Expressway is to support. The available
services are:
l SIP registrations and provisioning on Unified CM: Endpoint registration, call control and
provisioning for this SIP domain is serviced by Unified CM. The Expressway acts as a Unified
Communications gateway to provide secure firewall traversal and line-side support for Unified CM
registrations.
l IM and Presence Service: Instant messaging and presence services for this SIP domain are provided
by the Unified CM IM and Presence service.
l XMPP federation: Enables XMPP federation between this domain and partner domains.
l Deployment: Associates the domain with the selected deployment, if there are multiple deployments.
This setting is absent if there is only one deployment (there is always at least one).
Turn On all of the applicable services for each domain.
Note that these settings are not entirely independent. You cannot disable SIP registration and
provisioning while using IM and Presence. You can disable IM and Presence while SIP registrations
and provisioning on Unified CM is On, but the reverse is not true. So, if you switch IM and Presence
Service On, then your setting for SIP registrations and provisioning is ignored and the Expressway-C
behaves as though it was On.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 23 of 55
Configuring Mobile and Remote Access on Expressway
Note: The connections configured in this procedure are static. You must refresh the configuration on the
Expressway-C after you reconfigure or upgrade any of the discovered Unified Communications nodes. For
more details, see Why Should I Refresh the Discovered Nodes? [p.27]
Go to Configuration > Unified Communications > <UC server type> and click Refresh servers.
Note: These credentials are stored permanently in the Expressway database. The corresponding
IM and Presence Service user must have the Standard AXL API Access role.
d. [Recommended] Leave TLS verify mode switched On to ensure Expressway verifies the node's
tomcat certificate (for XMPP-related communications).
e. [Optional] Select which deployment this node/cluster will belong to.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 24 of 55
Configuring Mobile and Remote Access on Expressway
The Deployment field does not show if you have not created multiple deployments. All nodes belong
to the default deployment if you choose not to use multiple deployments.
f. Click Add address.
If you enabled TLS verify mode, then the Expressway tests whether a secure connection can be
established. It does this so you can find any TLS configuration errors before it continues the discovery
process.
If the secure connection test was successful, or if you did not enable TLS verify mode, then the
system attempts to contact the publisher and retrieve details of its associated nodes.
Note: The status of the discovered node will be Inactive unless a valid traversal zone connection
exists between the Expressway-C and the Expressway-E (may not yet be configured).
3. Repeat the discovery procedure for other IM and Presence Service nodes/clusters, if required.
4. Click Refresh servers to refresh all the node details after configuring multiple publisher addresses.
Note: These credentials are stored permanently in the Expressway database. The corresponding
Unified CM user must have the Standard AXL API Access role.
d. [Recommended] Leave TLS verify mode switched On to ensure Expressway verifies the node's
certificates.
The Unified CM node presents its tomcat certificate for AXL and UDS queries, and its CallManager
certificate for subsequent SIP traffic. If the Unified CM server is using self-signed certificates, the
Expressway-C's trusted CA list must include a copy of the tomcat certificate and the CallManager
certificate from every Unified CM server.
e. [Optional] Select which deployment this node/cluster will belong to.
The Deployment field does not show if you have not created multiple deployments. All nodes belong
to the default deployment if you choose not to use multiple deployments.
f. Click Add address.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 25 of 55
Configuring Mobile and Remote Access on Expressway
If you enabled TLS verify mode, then the Expressway tests whether a secure connection can be
established. It does this so you can find any TLS configuration errors before it continues the discovery
process.
If the secure connection test was successful, or if you did not enable TLS verify mode, then the
system attempts to contact the publisher and retrieve details of its associated nodes.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 26 of 55
Configuring Mobile and Remote Access on Expressway
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 27 of 55
Configuring Mobile and Remote Access on Expressway
Note: In order for the AFT feature to work across Expressway you must ensure that all Unified CM IM and
Presence Service nodes, across all Unified CM IM and Presence Service clusters, have been added to the
allowlist either manually or automatically.
Expressway-C automatically allowlists the IP addresses of all discovered Unified CM nodes (that are
running the CallManager and TFTP service), IM and Presence Service nodes, and Cisco Unity Connection
nodes. These entries cannot be deleted. They are displayed in the Auto-configured allow list section of the
HTTP server allow list page.
If you have a cluster of Expressways you must do this for every peer.
Note: The combination of <System host name>.<Domain name> is the FQDN of this Expressway-E.
Ensure that this FQDN is resolvable in public DNS.
If you have a cluster of Expressway-Es, you must ensure that the Domain name is identical on each peer,
and it is case-sensitive.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 28 of 55
Configuring Mobile and Remote Access on Expressway
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 29 of 55
Using Deployments to Partition Unified Communications Services
Figure 5: Multiple deployments to partition Unified Communications services accessed from outside the
network
Deployments and their associated domains and services are configured on the Expressway-C.
There is one primary deployment, called "Default deployment" unless you rename it, that automatically
encloses all domains and services until you create and populate additional deployments. This primary
deployment cannot be deleted, even if it is renamed or has no members.
To partition the services that you provide via mobile and remote access, create as many deployments as you
need, associate a different domain with each, and then associate the required Unified Communications
resources with each deployment.
You cannot associate one domain with more than one deployment. Similarly, each Unified Communications
node may only be associated with one deployment.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 30 of 55
Using Deployments to Partition Unified Communications Services
Note: When you save this change, the Expressway-C refreshes the connection to the node, which may
temporarily disrupt the service to the connected users.
5. Repeat for any other Unified Communications services that will belong to the deployment.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 31 of 55
Single Sign-On (SSO) over the Collaboration Edge
How it works
Cisco Jabber determines whether it is inside the organization's network before it requests a Unified
Communications service. If it is outside the network, then it requests the service from the Expressway-E on
the edge of the network. If single sign-on is enabled at the edge, the Expressway-E redirects Jabber to the
IdP with a signed request to authenticate the user.
The IdP challenges the client to identify itself. When this identity is authenticated, the IdP redirects Jabber's
service request back to the Expressway-E with a signed assertion that the identity is authentic.
The Expressway-E trusts the IdP, so it passes the request to the appropriate service inside the network. The
Unified Communications service trusts the IdP and the Expressway-E, so it provides the service to the
Jabber client.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 32 of 55
Single Sign-On (SSO) over the Collaboration Edge
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 33 of 55
Single Sign-On (SSO) over the Collaboration Edge
SAML-based SSO is an option for authenticating UC service requests originating from inside the enterprise
network, and it is now extended to clients requesting UC services from outside via Mobile and Remote
Access (MRA).
If you choose SAML-based SSO for your environment, note the following:
n SAML 2.0 is not compatible with SAML 1.1 and you must select an IdP that uses the SAML 2.0 standard.
n SAML-based identity management is implemented in different ways by vendors in the computing and
networking industry, and there are no widely accepted regulations for compliance to the SAML standards.
n The configuration of and policies governing your selected IdP are outside the scope of Cisco TAC
(Technical Assistance Center) support. Please use your relationship and support contract with your IdP
Vendor to assist in configuring the IDP properly. Cisco cannot accept responsibility for any errors,
limitations, or specific configuration of the IdP.
Although Cisco Collaboration infrastructure may prove to be compatible with other IdPs claiming SAML 2.0
compliance, only the following IdPs have been tested with Cisco Collaboration solutions:
n OpenAM 10.0.1
n Active Directory Federation Services 2.0 (AD FS 2.0)
n PingFederate® 6.10.0.4
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 34 of 55
Single Sign-On (SSO) over the Collaboration Edge
Note: You can change the signing algorithm after you have imported the metadata, by going to
Configuration > Unified Communications > Identity Providers (IdP), locating your IdP row then, in
the Actions column, clicking Configure Digest).
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 35 of 55
Single Sign-On (SSO) over the Collaboration Edge
Configuring IDPs
This topic covers any known additional configurations that are required when using a particular IDP for
SSO over MRA.
These configuration procedures are required in addition to the prerequisites and high level tasks already
mentioned, some of which are outside of the document's scope.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 36 of 55
Single Sign-On (SSO) over the Collaboration Edge
[Optional] Extend the time-to-live of SIP authorization tokens, by entering a number of seconds for SIP token
extra time-to-live (in seconds). This setting gives users a short window in which they can still accept calls
after their credentials expire, but you should balance this convenience against the increased security
exposure.
On the Expressway-E:
1. Go to Configuration > Unified Communications > Configuration
2. Locate Single Sign-on support and select On
3. Click Save
[Optional] Choose how the Expressway-E reacts to /get_edge_sso requests by selecting whether or not
the Expressway-C should check the home nodes.
The /get_edge_sso request from the client asks whether the client may try to authenticate the user by
SSO. In this request, the client provides an identity of the user that the Expressway-C can use to find the
user's home cluster:
n The default option is Yes to Check for internal SSO availability:
The Expressway-E passes the request to the Expressway-C. The Expressway-C uses a round-robin
algorithm to select a Unified CM node, and makes a UDS query for the supplied identity against that node.
The Unified CM determines which node is the user's home node, and whether it is capable of doing
SSO for the user, and then tells the Expressway-C the outcome. The Expressway-C then tells the
Expressway-E which responds true or false to the client.
n If you select No to Check for internal SSO availability:
The Expressway-E always responds true to /get_edge_sso requests. It does not make the inwards
request to the user's home Unified CM, and thus cannot know whether SSO is really available there.
When the client receives a true response from Expressway-E, it will try to /get_edge_config via SSO.
If it gets false, it will try /get_edge_config using whatever credentials it has - credentials which are
independent from the identity managed by UDS inside the enterprise. If it gets true and SSO is not actually
enabled on the user's home node, then /get_edge_config will fail and the client will not try the other
authentication option.
The option you should choose depends entirely on your implementation. If you have a homogenous
environment, in which all Unified CM nodes are capable of SSO, you can reduce response time and overall
network traffic by selecting No. By contrast, if you want clients to use either mode of getting the edge
configuration - during rollout or because you cannot guarantee that SSO is available on all nodes - you should
select Yes.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 37 of 55
Checking the Status of Unified Communications Services
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 38 of 55
Mobile and Remote Access Port Reference
Traversal zone SIP media UDP 36000 to 59999* 36000 to 36011 (6 pairs of
(for large systems) RTP and RTCP ports for
multiplexed media
traversal)
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 39 of 55
Mobile and Remote Access Port Reference
XMPP (IM and Presence) TCP Ephemeral port 7400 (IM and Presence)
HTTP proxy (UDS) TCP Ephemeral port 8443 (Unified CM)
HTTP proxy (SOAP) TCP Ephemeral port 8443 (IM and Presence
Service)
HTTP (configuration file retrieval) TCP Ephemeral port 6970 (Unified CM)
CUC (voicemail) TCP Ephemeral port 443 (Unity Connection)
Message Waiting Indicator (MWI) from TCP Ephemeral port 7080 (Unity Connection)
Unity Connection
Media UDP 36000 to 59999* >= 1024 (Media recipient
eg. endpoint)
SIP signaling TCP 25000 to 29999 5060 (Unified CM)
Secure SIP signaling TLS 25000 to 29999 5061 (Unified CM)
* The default media traversal port range is 36000 to 59999, and is set on the Expressway-C at Configuration
> Traversal Subzone. In Large Expressway systems the first 12 ports in the range – 36000 to 36011 by
default – are always reserved for multiplexed traffic. The Expressway-E listens on these ports. You cannot
configure a distinct range of demultiplex listening ports on Large systems: they always use the first 6 pairs in
the media port range. On Small/Medium systems you can explicitly specify which 2 ports listen for
multiplexed RTP/RTCP traffic, on the Expressway-E (Configuration > Traversal > Ports). If you choose
not to configure a particular pair of ports (Use configured demultiplexing ports = No), then the
Expressway-E will listen on the first pair of ports in the media traversal port range (36000 and 36001 by
default).
Note that:
n Ports 8191/8192 TCP and 8883/8884 TCP are used internally within the Expressway-C and the
Expressway-E applications. Therefore these ports must not be allocated for any other purpose. The
Expressway-E listens externally on port 8883; therefore we recommend that you create custom firewall
rules on the external LAN interface to drop TCP traffic on that port.
n The Expressway-E listens on port 2222 for SSH tunnel traffic. The only legitimate sender of such traffic is
the Expressway-C (cluster). Therefore we recommend that you create the following firewall rules for the
SSH tunnels service:
l one or more rules to allow all of the Expressway-C peer addresses (via the internal LAN interface, if
appropriate)
l followed by a lower priority (higher number) rule that drops all traffic for the SSH tunnels service (on the
internal LAN interface if appropriate, and if so, another rule to drop all traffic on the external interface)
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 40 of 55
Additional information
Additional information
Unified CM dial plan
The Unified CM dial plan is not impacted by devices registering via Expressway. Remote and mobile devices
still register directly to Unified CM and their dial plan will be the same as when it is registered locally.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 41 of 55
Additional information
On Expressway:
1. Go to Configuration > Zones > Zones and select the Unified CM neighbor zone used for the SIP trunk.
(Note that the automatically generated neighbor zones between Expressway-C and each discovered
Unified CM node for line side communications are non-configurable.)
2. Configure the SIP Port to the same value as the Incoming Port configured on Unified CM.
3. Click Save.
See Cisco TelePresence Cisco Unified Communications Manager with Expressway (SIP Trunk)
Deployment Guide for more information about configuring a SIP trunk.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 42 of 55
Additional information
TLS verify mode set to On if the Unified CM discovery had TLS verify mode enabled. This means that the
Expressway-C will verify the CallManager certificate for subsequent SIP communications. Note that secure
profiles are downgraded to use TCP if Unified CM is not in mixed mode.
The Expressway neighbor zones to Unified CM use the names of the Unified CM nodes that were returned
by Unified CM when the Unified CM publishers were added (or refreshed) to the Expressway. The
Expressway uses those returned names to connect to the Unified CM node. If that name is just the host
name then:
n it needs to be routable using that name
n this is the name that the Expressway expects to see in the Unified CM's server certificate
If you are using secure profiles, ensure that the root CA of the authority that signed the Expressway-C
certificate is installed as a CallManager-trust certificate (Security > Certificate Management in the Cisco
Unified OS Administration application).
Media encryption
Media encryption is enforced on the call legs between the Expressway-C and the Expressway-E, and
between the Expressway-E and endpoints located outside the enterprise.
The encryption is physically applied to the media as it passes through the B2BUA on the Expressway-C.
Limitations
n The IPV4 protocol only is supported for mobile and remote access users
n In Expressway-E systems that use dual network interfaces, XCP connections (for IM&P XMPP traffic)
always use the non-external (i.e. internal) interface. This means that XCP connections may fail in
deployments where the Expressway-E internal interface is on a separate network segment and is used for
system management purposes only, and where the traversal zone on the Expressway-C connects to the
Expressway-E's external interface.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 43 of 55
Additional information
Protocol summary
The table below lists the protocols and associated services used in the Unified Communications solution.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 44 of 55
Additional information
Note that when discovering Unified CM and IM&P servers on Expressway-C, you must do this on the
primary peer.
Credential caching
Note: These settings do not apply to clients that are using SSO (common identity) for authenticating via
MRA.
The Expressway caches endpoint credentials which have been authenticated by Unified CM. This caching
improves overall performance because the Expressway does not always have to submit endpoint credentials
to Unified CM for authentication.
The caching settings are configurable in the Advanced section of the Configuration > Unified
Communications > Configuration page.
Credentials refresh interval specifies the lifetime of the authentication token issued by the Expressway to
a successfully authenticated client. A client that successfully authenticates should request a refresh before
this token expires, or it will need to re-authenticate. The default is 480 minutes (8 hours).
Credentials cleanup interval specifies how long the Expressway waits between cache clearing operations.
Only expired tokens are removed when the cache is cleared, so this setting is the longest possible time that
an expired token can remain in the cache. The default is 720 minutes (12 hours).
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 45 of 55
Additional information
To protect against malicious attempts to access the HTTP proxy, you can configure automated intrusion
protection on the Expressway-E (System > Protection > Automated detection > Configuration).
We recommend that you enable the following categories on the Expressway-E:
n HTTP proxy authorization failure and HTTP proxy protocol violation. Note: Do not enable the HTTP
proxy resource access failure category.
n XMPP protocol violation
Note: The Automated protection service uses Fail2ban software. It protects against brute force attacks
that originate from a single source IP address.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 46 of 55
Appendix 1: Troubleshooting
Appendix 1: Troubleshooting
General troubleshooting techniques 47
Checking alarms and status 47
Checking and taking diagnostic logs 48
Checking DNS records 48
Checking reachability of the Expressway-E 49
Checking call status 49
Checking devices registered to Unified CM via Expressway 49
Ensuring that Expressway-C is synchronized to Unified CM 50
Checking SSO status and tokens 50
Expressway certificate / TLS connectivity issues 50
Cisco Jabber sign in issues 50
Jabber cannot sign in due to XMPP bind failure 50
Jabber cannot sign in due to SSH tunnels failure 51
Jabber cannot sign in when connecting to different peers in a cluster of Expressway-Es 51
Expressway returns "401 unauthorized" failure messages 51
Call failures due to "407 proxy authentication required" or "500 Internal Server Error" errors 51
Call bit rate is restricted to 384 kbps / video issues when using BFCP (presentation sharing) 51
Endpoints cannot register to Unified CM 52
IM and Presence Service realm changes 52
No voicemail service ("403 Forbidden" response) 52
"403 Forbidden" responses for any service requests 52
Client HTTPS requests are dropped by Expressway 52
Unable to configure IM&P servers for remote access 53
'Failed: <address> is not a IM and Presence Server' 53
Invalid SAML assertions 53
In these cases, a system restart is required to ensure that those configuration changes take effect.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 47 of 55
Appendix 1: Troubleshooting
After you have completed your diagnostic logging, return to the Support Log configuration page and reset
the modified logging modules back to INFO level.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 48 of 55
Appendix 1: Troubleshooting
The DNS lookup includes the following SRV services that are used for Unified Communications:
n _collab-edge._tls
n _cuplogin._tcp
n _cisco-uds._tcp
Note: the following SRV records may be queried by the lookup tool or the client, but they are not required.
You can ignore name errors related to these:
n _cisco-phone-tftp._tcp
n _cisco-phone-http._tcp
If the Expressway is part of a cluster, all calls that apply to any peer in the cluster are shown, although the list
is limited to the most recent 500 calls per peer.
Mobile and remote access calls have different component characteristics depending on whether the call is
being viewed on the Expressway-C or Expressway-E:
n On an Expressway-C, a Unified CM remote session will have 3 components (as it uses the B2BUA to
enforce media encryption). One of the Expressway components will route the call through one of the
automatically generated neighbor zones (with a name prefixed by either CEtcp or CEtls) between
Expressway and Unified CM.
n On an Expressway-E, there will be one component and that will route the call through the
CollaborationEdgeZone.
Note that if both endpoints are outside of the enterprise (i.e. off premises), you will see this treated as 2
separate calls.
Rich media sessions
If your system has a rich media session key installed and thus has been extended to support business-to-
business calls, and interworked or gatewayed calls to third-party solutions and so on, those calls are also
listed on the call status and call history pages.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 49 of 55
Appendix 1: Troubleshooting
You must ensure that any such changes are reflected in the Expressway-C. To do this you must rediscover
all Unified CM and IM and Presence Service nodes (on Expressway go to Configuration > Unified
Communications).
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 50 of 55
Appendix 1: Troubleshooting
This typically occurs if the IM and Presence Intercluster Sync Agent is not working correctly. See IM and
Presence intercluster deployment configuration for more information.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 51 of 55
Appendix 1: Troubleshooting
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 52 of 55
Appendix 1: Troubleshooting
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 53 of 55
Document revision history
Date Description
August Republished post DX Series 10.2.4(99) release; those endpoints now officially support MRA
2015
July 2015 Updated for X8.6.
June 2015 Updated for X8.5.3, with note about internal DNS lookups for UC nodes.
April 2015 Updated for X8.5.2, with information about authorization rate control and document defects
addressed.
February Updated for X8.5.1 with SSO feature changes: SHA-256 signing of SAML requests by default,
2015 changed wording of IdP prerequisites.
December Updated with new features for X8.5 and corrections from X8.2 version.
2014
August Re-issued X8.1.1 version of this document with shared line limitation, as per X8.2 version.
2014
July 2014 Re-issued with updated client support details and a media encryption limitation removed.
July 2014 Re-issued with updated firewall advice and unsupported deployment.
July 2014 Re-issued with updated domains screenshot.
June 2014 Republished for X8.2.
April 2014 Initial release.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 54 of 55
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE
SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND
RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED
WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL
RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE
SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE
INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE
SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR
A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the
University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating
system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE
OF THESE SUPPLIERS ARE PROVIDED "AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-
NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING,
WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE
AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE
PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL,
CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST
PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS
MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other
countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party
trademarks mentioned are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual
addresses and phone numbers. Any examples, command display output, network topology diagrams, and
other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2015 Cisco Systems, Inc. All rights reserved.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.6) Page 55 of 55
To enable Single Sign-On (SSO) using SAML, several prerequisites must be met: The IdP must use SAML 2.0, and the enterprise must configure a synchronizable relationship between the IdP and the on-premises directory for secure authentication. SAML metadata files must be exchanged between the IdP and Cisco services, such as Unified CM and Cisco Unity Connection. The configuration of the IdP must align with Cisco's requirements, and the Digest for signing SAML requests must be set appropriately .
To secure a Unified Communications traversal zone between Expressway-C and Expressway-E, proper server certificates and trusted CA certificates must be installed on both sides. Configuring a single traversal zone per Expressway ensures streamlined security management and reduces potential vulnerabilities, supporting features like mobile and remote access .
DNS settings in Expressway-C are fundamental for specifying the system's host and domain names and ensuring resolution of local DNS servers. These configurations facilitate reliable communication between Expressway systems and ensure that Unified Communications services are correctly routed, maintaining seamless and efficient network operations .
The Unified Communications traversal zone between Expressway-C and Expressway-E requires the installation of suitable security certificates on both systems and specific configuration steps to establish a secure traversal path. This traversal zone is significant in that it supports Unified Communications features such as mobile and remote access, allowing secure and reliable communication between internal and external networks .
NAT reflection limitations could prevent traffic from the Expressway-C to the Expressway-E's external FQDN from being correctly routed through the firewall, potentially hindering the deployment of Cisco Expressway for remote access. Consideration should be given to operating within the capabilities of existing firewalls or upgrading them to support NAT reflection, as it is crucial for maintaining communication in the network configuration .
Configuring Intercluster Lookup Service (ILS) on Unified CM clusters is necessary because it allows the Expressway to discover the user's home Unified CM cluster by sending a User Data Service (UDS) query to any of the Unified CM nodes. This is essential for proper communication between the Expressway and the Unified CM, ensuring that the system can correctly process calls from remote and mobile users .
Associating domains with an Identity Provider (IdP) on Expressway-C allows Mobile and Remote Access (MRA) users of those domains to authenticate through the IdP, thus enabling SSO. The configuration process involves verifying the IdP in the configuration list, selecting the domains to associate with the IdP, and saving these associations to ensure that SSO can be used for those domains .
Using public NTP servers ensures that mobile and remote devices remain synchronized and maintain accurate time settings. This is crucial in a Cisco Unified Communications setup for facilitating time-sensitive communications and logging. Proper configuration aligns time across devices, reducing discrepancies and improving the overall reliability of communication services .
NAT reflection is required so that traffic can be allowed from the Expressway-C to the Expressway-E's external FQDN, facilitating communication through the firewall. This is crucial for setting up successful Unified Communications Mobile and Remote Access. However, not all types of firewalls support NAT reflection, presenting a potential challenge in the configuration. For more details, refer to the Expressway Basic Configuration guide .
The Intercluster Sync Agent (ICSA) is crucial in ensuring that the user database is replicated between multiple IM and Presence Service clusters. This replication allows Expressway-C to route XMPP traffic accurately by maintaining an up-to-date and synchronized user database across all clusters in a deployment. Proper configuration of Intercluster peer links and activation of ICSA on all clusters is essential for enabling this functionality .