Free Essay

Traffic Modeling

In: Other Topics

Submitted By fsalvi
Words 13683
Pages 55
Cisco Unified Presence Deployment Guide
Release 6.0(1)

Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

Customer Order Number: Text Part Number: OL-12732-02

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. CCVP, the Cisco logo, and Welcome to the Human Network are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems, Inc.; and Access Registrar, Aironet, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networkers, Networking Academy, Network Registrar, PIX, ProConnect, ScriptShare, SMARTnet, StackWise, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0711R) Cisco Unified Presence Deployment Guide © 2008 Cisco Systems, Inc. All rights reserved.

CONTENTS
Preface
7 7 8 8 1-8

Purpose Audience

Organization Conventions

Related Documentation
8

Obtaining Documentation, Obtaining Support, and Security Guidelines Cisco Product Security Overview 10 Introduction
1-1 1-1 1-4

10

Microsoft Integration Related Documentation

Cisco Unified Communications Manager Configuration Overview Configure Service Parameters Assign Capabilities to End Users Associate a Device to a User
2-3 2-1 2-2

2-1

Configure Cisco Unified Presence as an Application Server
2-2 2-3

Associate a Primary Extension with Each Phone

Set Up IP Phone Messenger and Add PhoneMessenger as an Application User Assign End Users to a User Groups
2-5 2-5 2-6

2-4

Configure Phone Service for the Cisco IP PhoneMessenger Subscribe Phones to the Cisco IP PhoneMessenger Service Configure the SIP Trunk Security Profile
2-6

Add an Application User with the Standard AXL Access Role Enabled Configure SIP Trunks for Each Cisco Unified Presence Server Verify That the Required Services are Running Associate End Users With a Line Appearance CTI Gateway Configuration Checklist
2-11 2-9 2-9 2-8

2-7

Cisco Unified Presence Deployment Guide OL-12732-01

3

Contents

Cisco Unified Presence Configuration Overview Upload the License File
3-1

3-1

Add an Optional Secondary Cisco Unified Presence Node Configure Cisco IP Phone Messenger Settings Assign MOC Capabilities
3-3 3-3 3-4 3-5 3-2

3-2

Configure the Presence Gateway

Configure an Incoming Access Control List Configure an Outgoing Access Control List Configure the Proxy Server Settings Enable Services
3-5 4-1 3-5

Microsoft Integration Overview

Microsoft Office Live Communications Server 2005 with SP 1 Configuration Microsoft LCS Configuration Overview 4-1 Microsoft Active Directory Configuration Overview
4-2

4-1

Exchange Calendar Integration Configuration 4-4 Create a Receive As Account on the Exchange Server 4-4 Create a New Account 4-4 Create a User Account 4-5 Delegate Control as Exchange View Only to the Account 4-5 Add Receive As Permissions to the Account 4-6 Configure a Presence Gateway on the Cisco Unified Presence Server 4-6 Configure the Security Certificate on the Cisco Unified Presence Server 4-7 Install the CA Service 4-8 Download the Root Certificate 4-8 Upload the Root Certificate to the Cisco Unified Presence Server 4-8 Generate a CSR on IIS 4-9 Sign the CSR 4-10 Download the Signed Certificate 4-10 Upload the Signed Certificate on IIS 4-11 TLS Route Configuration Checklist
4-11 4-12 4-13

FIPS-Compliant Security Algorithms Configuration Checklist Microsoft Office Communicator 2005 Configuration Checklist

Cisco Unified Presence Deployment Guide

4

OL-12732-01

Contents

Cisco Click-to Call Plug-In for IBM Lotus Sametime Configuration Overview Prerequisites
5-1 5-2 5-2 5-5 5-5

5-1

Installing the Cisco Click-to-Call Plug-In Configuring the Cisco Click-to-Call Plug-In

Configuring the Lotus Sametime Server for Cisco Click-to-Call

Configuring Cisco Unified Communications Manager for Cisco Click-to-Call Configuring a SIP Trunk Security Profile 5-6 Configuring a SIP Trunk for Lotus Sametime Server 5-6 Configuring Digest Authentication on the SIP Trunk 5-7 Configuring the Username and Password 5-7
INDEX

Cisco Unified Presence Deployment Guide OL-12732-01

5

Contents

Cisco Unified Presence Deployment Guide

6

OL-12732-01

Preface
This preface provides an overview of the Cisco Unified Presence Deployment Guide.

Note

This document may not represent the latest Cisco product information that is available. You can obtain the most current documentation by accessing Cisco product documentation page at this URL: http://www.cisco.com/univercd/home/home.htm The preface covers these topics:
• • • • •

Purpose, page 7 Audience, page 8 Organization, page 8 Conventions, page 8 Obtaining Documentation, Obtaining Support, and Security Guidelines, page 10

Purpose
This document contains configuration checklists and procedures for setting up Cisco Unified Presence 6.0(1) and integrating it with Cisco Unified Communications Manager 6.0(1), as well as with the various Microsoft servers and products, including
• • • •

Microsoft Office Live Communications Server 2005 with Service Pack 1 (SP1) Microsoft Windows Server 2000 or 2003 Active Directory Microsoft Exchange Server 2003 Microsoft Office Communicator 2005

In addition, this document provides procedures for installing and configuring the Cisco plug-in for IBM Lotus Sametime 7.5.

Cisco Unified Presence Deployment Guide OL-12732-01

7

Preface Related Documentation

Audience
The Cisco Unified Presence Deployment Guide provides information for network administrators who are responsible for managing Cisco Unified Presence and Cisco Unified Communications Manager. This guide requires knowledge of telephony, IP networking technology, as well as knowledge of various Microsoft and IBM products.

Organization
The following table provides the organizations of this guide: Chapter Chapter 1, “Introduction” Chapter 2, “Cisco Unified Communications Manager Configuration Overview” Description Provides an overview of deploying Cisco Unified Presence. Provides an overview of the Cisco Unified Communications Manager configuration tasks that you must perform to deploy Cisco Unified Presence.

Chapter 3, “This chapter provides an overview of Provides an overview of the configuration tasks the required configuration tasks for Cisco Unified that you must perform on the Cisco Unified Presence server. Presence. Complete these steps from the Cisco Unified Presence Administration window.” Chapter 4, “Microsoft Integration Overview” Chapter 5, “Cisco Click-to Call Plug-In for IBM Lotus Sametime Configuration Overview” Provides an overview of deploying Cisco Unified Presence in a Microsoft environment. Provides instructions for installing and configuring the Cisco Click-to-Call plug-in for Lotus SameTime.

Related Documentation
For additional Cisco Unified Communications Manager documentation, refer to the Documentation for Cisco Unified Presence Release 6.0(10 at the following URL: http://www.cisco.com/en/US/products/ps6837/products_documentation_roadmaps_list.html

Conventions
This document uses the following conventions: Convention boldface font italic font [ ] {x|y|z} Description Commands and keywords are in boldface. Arguments for which you supply values are in italics. Elements in square brackets are optional. Alternative keywords are grouped in braces and separated by vertical bars.

Cisco Unified Presence Deployment Guide

8

OL-12732-01

Preface Related Documentation

Convention [x|y|z] string screen Description Optional alternative keywords are grouped in brackets and separated by vertical bars. A nonquoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks.

font font

Terminal sessions and information the system displays are in screen font. Information you must enter is in boldface screen font. Arguments for which you supply values are in italic screen font. This pointer highlights an important line of text in an example. The symbol ^ represents the key labeled Control—for example, the key combination ^D in a screen display means hold down the Control key while you press the D key. Nonprinting characters, such as passwords, are in angle brackets.

boldface screen

italic screen font ^

< >

Notes use the following conventions:

Note

Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication. Timesavers use the following conventions:

Timesaver

Means the described action saves time. You can save time by performing the action described in the paragraph. Tips use the following conventions:

Tip

Means the information contains useful tips. Cautions use the following conventions:

Caution

Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data. Warnings use the following conventions:

Warning

This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, you must be aware of the hazards involved with electrical circuitry and familiar with standard practices for preventing accidents.

Cisco Unified Presence Deployment Guide OL-12732-01

9

Preface Related Documentation

Obtaining Documentation, Obtaining Support, and Security Guidelines
For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

Cisco Product Security Overview
This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately. A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html. If you require further assistance please contact us by sending email to export@cisco.com.

Cisco Unified Presence Deployment Guide

10

OL-12732-01

CH A P T E R

1

Introduction
This document provides an overview of the Cisco Unified Presence deployment and configuration process, including the following major configuration requirements:
• • •

Cisco Unified Communications Manager configuration Cisco Unified Presence configuration, including CTI gateway Microsoft integration, which includes configuration checklists for the following Microsoft products:
– Microsoft Office Live Communications Server (LCS) – Microsoft Active Directory (AD) – Microsoft Office Communicator (MOC)

Microsoft Integration
The CTI gateway, a Cisco Unified Presence application module, allows Microsoft Office Communicator to work with Cisco Unified Communications Manager and supports Microsoft Office Communicator features, such as Click to Dial and Phone Control services. To work with Cisco Unified Communications Manager, Microsoft Live Communications Server uses a Computer Supported Telecommunications Applications (CSTA) XML interface. Figure 1-1 shows the overall Microsoft presence system architecture.

Cisco Unified Presence Deployment Guide OL-12732-01

1-1

Chapter 1 Microsoft Integration

Introduction

Figure 1-1

Overall Microsoft Presence Architecture

MS Office Applications

MS Active Directory

MS Exchange Outlook

MS Live Meeting

MSN/AOL/Yahoo IM users

PRESENCE/SIP NETWORK

SIP/SIMPLE

Microsoft LCS Server SIP Proxy/Presence/IM Gatway

CSTA SIP/XML 3rd-Party Call Control (ECMA-323)

Cisco Unified CallManager

SIP peer-to-peer applications

IP IP IP

Microsoft Office Communicator IM - Voice - Video - Data Collaboration

Figure 2 shows the messaging flow between a soft client (Microsoft Office Communicator) and the CTI gateway.

Cisco Unified Presence Deployment Guide

1-2

157601

OL-12732-01

Chapter 1

Introduction Microsoft Integration

Figure 2

Messaging Flow Between a Soft Client and the CTI Gateway

DNS

User Authentication (name, ID, email)

Active Directory

User Information (name, ID, email)

MOC Client 1 MOC Client 2 MOC Client n User ID or email, Extension Directory Number Dialed Directory Numbers LCS 1 SIP CSTA Cisco Unified Presence Server CTI Gateway CTI QBE AOI

Cisco Unified CallManager Cluster Node1 Primary Node2
157603 157603

Failover

Figure 3 shows the system components that must be configured for Microsoft Office Communicator and Cisco Unified Communications Manager phone integration to work properly.
Figure 3 Microsoft Office Communicator and Cisco Unified Communications Manager Phone Integration

DNS

User Authentication (name, ID, email)

Active Directory

User Information (name, ID, email)

MOC Client 1 MOC Client 2 MOC Client n User ID or email, Extension Directory Number Dialed Directory Numbers LCS 1 SIP CSTA Cisco Unified Presence Server CTI Gateway CTI QBE AOI

Cisco Unified CallManager Cluster Node1 Primary Node2 Failover

This deployment guide assumes that you have already installed Cisco Unified Presence software on your servers. For installation instructions, refer to the document Installing Cisco Unified Presence.

Cisco Unified Presence Deployment Guide OL-12732-01

1-3

Chapter 1 Related Documentation

Introduction

Related Documentation
Refer to the following documents for further information about related Cisco IP telephony applications and products:


Installing Cisco Unified Presence This document provides procedures for installing Cisco Unified Presence on the publisher database and subscriber servers.



Cisco Unified Presence Administration Guide This document provides step-by-step instructions for configuring, maintaining, and administering the Cisco Unified Presence voice over IP network.



Cisco Unified Serviceability Administration Guide for Cisco Unified Presence This document provides step-by-step instructions for configuring alarms, traces, and other reporting for Cisco Unified Presence serviceability and remote serviceability.



Cisco Unified Communications Operating System Administration Guide for Cisco Unified Presence The Cisco Unified Communications Operating System Guide provides information about using the Cisco Unified Communications Platform graphical user interface (GUI) and the command line interface (CLI) to perform many common system- and network-related tasks.



Disaster Recovery System Administration Guide for Cisco Unified Presence This document provides an overview of the Disaster Recovery System and provides procedures for performing various backup- and restore-related tasks.

Cisco Unified Presence Deployment Guide

1-4

OL-12732-01

CH A P T E R

2

Cisco Unified Communications Manager Configuration Overview
This chapter provides the configuration tasks for Cisco Unified Communications Manager 6.0(1). Complete these steps from the Cisco Unified Communications Manager Administration window. This chapter contains the following topics:
• • • • • • • • • • • • • • •

Configure Service Parameters, page 2-1 Configure Cisco Unified Presence as an Application Server, page 2-2 Assign Capabilities to End Users, page 2-2 Associate a Primary Extension with Each Phone, page 2-3 Associate a Device to a User, page 2-3 Set Up IP Phone Messenger and Add PhoneMessenger as an Application User, page 2-4 Assign End Users to a User Groups, page 2-5 Configure Phone Service for the Cisco IP PhoneMessenger, page 2-5 Subscribe Phones to the Cisco IP PhoneMessenger Service, page 2-6 Configure the SIP Trunk Security Profile, page 2-6 Add an Application User with the Standard AXL Access Role Enabled, page 2-7 Configure SIP Trunks for Each Cisco Unified Presence Server, page 2-8 Verify That the Required Services are Running, page 2-9 Associate End Users With a Line Appearance, page 2-9 CTI Gateway Configuration Checklist, page 2-11

Configure Service Parameters
Procedure
Step 1 Step 2 Step 3

Choose System > Service Parameters. In the Service Parameter Configuration window, select a Cisco Unified Communications Manager server from the drop-down list. For Service, select Cisco Communications Manager.

Cisco Unified Presence Deployment Guide OL-12732-01

2-1

Chapter 2 Configure Cisco Unified Presence as an Application Server

Cisco Unified Communications Manager Configuration Overview

Step 4 Step 5

In the Clusterwide Parameters (System - Presence) section, for Default Inter-Presence Group Subscription, select Allow Subscription. Click Save.

Note

For more information, see the Service Parameters Configuration chapter in the Cisco Unified Communications Manager Administration Guide.

Configure Cisco Unified Presence as an Application Server
Procedure
Step 1 Step 2

Choose System > Application Server. In the Find and List Application Servers window, click Add New. The Application Server Configuration window displays. For Application Server Type, select Cisco Unified Presence and click Next. In the Name field, enter the host name of your Cisco Unified Presence. Click Save.

Step 3 Step 4 Step 5

Note

For more information, see the Application Server Configuration chapter in the Cisco Unified Communications Manager Administration Guide.

Assign Capabilities to End Users
Procedure
Step 1

Choose System-> Licensing > Capabilities Assignment. The Find and List Capabilities Assignments window displays. To display a list of all users, click Find. In the search results section, click the user link to display the Capabilities Assignment Configuration window.

Step 2 Step 3

Tip

To assign capabilities to more than one user, check multiple user check boxes and click Bulk Assignment.

Step 4 Step 5

When the window displays, check the Enable CUP (Cisco Unified Presence) check box. For UPC Capability, check the Enable CUPC (Cisco Unified Personal Communicator) check box.

Cisco Unified Presence Deployment Guide

2-2

OL-12732-01

Chapter 2

Cisco Unified Communications Manager Configuration Overview Associate a Primary Extension with Each Phone

Step 6

Click Save.

Note

For more information on Cisco Unified Personal Communicator, see the Installation Guide for Cisco Unified Personal Communicator.

Associate a Primary Extension with Each Phone
Procedure
Step 1 Step 2

Choose Device > Phone. In the Find and List Phones window, add a new phone device by clicking Add New. The Add a New Phone window displays. For Phone Type, select a device from the drop-down list and click Next. For the device protocol, select a protocol from the drop-down list and click Next. From the Phone Configuration window, make entries or selections for these fields:
– MAC address: enter the MAC address of the phone. – For Device Pool, select Default. – For Phone Button Template, select Default. – For SCCP Phone Security Profile (or for SIP Phone Security Profile), select Standard SCCP

Step 3 Step 4

Profile for Auto Registration (or Standard SIP Profile for Auto Registration).
Step 5 Step 6 Step 7 Step 8

Click Save. In the Association Information section on the left, click the Add a New DN link. In the Directory Number Configuration window, enter a directory number for each phone. Click Save.

Note

For more information, see the Cisco Unified IP Phone Configuration chapter in the Cisco Unified Communications Manager Administration Guide.

Associate a Device to a User
Procedure
Step 1 Step 2

Choose User Management > End User. In the Find and List User window, search for the user if users are already in the database or click Add New to add a new user.

Cisco Unified Presence Deployment Guide OL-12732-01

2-3

Chapter 2 Set Up IP Phone Messenger and Add PhoneMessenger as an Application User

Cisco Unified Communications Manager Configuration Overview

Step 3 Step 4 Step 5 Step 6 Step 7 Step 8

In the End User Configuration window, enter information for the required fields (marked with an asterisk). Ensure that the PIN is numerical. For the Primary Extension at the bottom of the window, select the extension for each user. Click Save. When the window redisplays, click Device Associations. In the User Device Association window, select the device to associate and click Save Selected. Return to the End User Configuration window (choose User Management > End User) and check the Device Associations section to verify that the device is associated to the user.

Note

For more information, see the End User Configuration chapter in the Cisco Unified Communications Manager Administration Guide.

Set Up IP Phone Messenger and Add PhoneMessenger as an Application User
Note

You do not need to perform this step if you are using only Microsoft Office Communicator.
Procedure

Step 1 Step 2 Step 3 Step 4

Choose User Management > Application User. In the Find and List Application Users window, click Add New. In the Application User Configuration window, add a new user with the User ID of PhoneMessenger. In the Password and Confirm Password fields, enter the password for this user.

Note Step 5 Step 6

Remember this password for the Cisco Unified Presence configuration.

In the Device Information Available Devices section, select all devices that will subscribe to Cisco IP Phone Messenger and click the down arrow to move them into the Controlled Devices section. Click Save.

Note

For more information, see the Application User Configuration chapter in the Cisco Unified Communications Manager Administration Guide.

Cisco Unified Presence Deployment Guide

2-4

OL-12732-01

Chapter 2

Cisco Unified Communications Manager Configuration Overview Assign End Users to a User Groups

Assign End Users to a User Groups
Procedure
Step 1 Step 2 Step 3

Choose User Management > User Group. To display all user groups, click Find. Click the Standard Unified Unified CM End Users link. The User Group Configuration window displays. Click Add End Users to Group and, when the window redisplays, add all Cisco Unified Presence users to this group. For the Related Links menu, choose Back to Find/List and click Go. Click the Standard CTI Enabled link. The User Group Configuration window displays. Click Add End Users to Group and, when the window redisplays, add all Cisco Unified Presence users to this group.

Step 4 Step 5 Step 6

Step 7

Note

For more information, see the User Group Configuration chapter in the Cisco Unified Communications Manager Administration Guide.

Configure Phone Service for the Cisco IP PhoneMessenger
Note

You do not need to perform this step if you are only using Microsoft Office Communicator.
Procedure

Step 1 Step 2

Choose Device > Device Settings > Phone Services. In the Find and List IP Phone Services window, click Add New. The IP Phone Services Configuration window displays. In the Service Name field, enter PhoneMessenger. In the Service Description field, enter IP Phone Messenger. In the Service URL field, enter this URL: http://my-cups:8081/ippm/default?name=#DEVICENAME# where my-cups specifies the IP address of the Cisco Unified Presence unless DNS is enabled on the phone.

Step 3 Step 4 Step 5

Step 6

Click Save.

Cisco Unified Presence Deployment Guide OL-12732-01

2-5

Chapter 2 Subscribe Phones to the Cisco IP PhoneMessenger Service

Cisco Unified Communications Manager Configuration Overview

Note

For more information, see the Cisco Unified IP Phone Services Configuration chapter in the Cisco Unified Communications Manager Administration Guide.

Subscribe Phones to the Cisco IP PhoneMessenger Service
Note

You do not need to perform this step if you are using only Microsoft Office Communicator as your client.
Procedure

Step 1

Choose Device > Phone. The Find and List Phones window displays. To display a list of devices, click Find and, when the window redisplays, click a phone device link to access the Phone Configuration window. In the Related Links navigation box at the top right, select Subscribe/Unsubscribe Services from the drop-down list and click Go. In the Subscribed Cisco IP Phone Services window that displays, select PhoneMessenger (previously configured) from the Select a Service drop-down list and click Next. When the window redisplays, click Subscribe. When the window redisplays, click Save. Reset the phones individually or as a group.

Step 2 Step 3 Step 4 Step 5 Step 6 Step 7

Note

For more information, see the Cisco Unified IP Phone Configuration chapter in the Cisco Unified Communications Manager Administration Guide.

Configure the SIP Trunk Security Profile
Note

You do not need to perform this step to set up IPPM and Cisco Unified Personal Communicator if you are only using Microsoft Office Communicator as your client.
Procedure

Step 1

Choose System > Security Profile > SIP Trunk Profile. The Find and List SIP Trunk Security Profiles window displays. To display a list of available profiles, click Find.

Step 2

Cisco Unified Presence Deployment Guide

2-6

OL-12732-01

Chapter 2

Cisco Unified Communications Manager Configuration Overview Add an Application User with the Standard AXL Access Role Enabled

Step 3

In the search results, click the Non Secure SIP Trunk Profile link. The SIP Trunk Security Profile Configuration window displays. Verify that the setting for Device Security Mode is Non Secure. Verify that the setting for Incoming Transport Type is TCP+UDP. Verify that the setting for Outgoing Transport Type is TCP. Check to enable these items:
• • • •

Step 4 Step 5 Step 6 Step 7

Accept Presence Subscription Accept Out-of-Dialog REFER Accept Unsolicited Notification Accept Replaces Header

Step 8

Click Save.

Note

For more information, see the SIP Trunk Security Profile Configuration chapter in the Cisco Unified Communications Manager Administration Guide.

Add an Application User with the Standard AXL Access Role Enabled
Note

Consider this step as optional. During Cisco Unified Presence installation, you must enter an AXL User ID and AXL User password for an application user who has AXL API access enabled. You can use the CCMAdministrator application user, which has the Standard AXL API Access role enabled by default, or you can follow this step to create a new application user.
Create a new application user

Step 1

Choose User Management > Application User. The Find and List Application Users windows displays. Click Add New. The Application User Configuration window displays. In the User ID field, enter a new application user name; for example, AXLuserCUPS. Enter a password for this application user and confirm the password. From the list of available devices, select the devices that you want to control. Click Save.
Create a new user group and add the application user

Step 2

Step 3 Step 4 Step 5 Step 6

Step 7

Choose User Management > User Group.

Cisco Unified Presence Deployment Guide OL-12732-01

2-7

Chapter 2 Configure SIP Trunks for Each Cisco Unified Presence Server

Cisco Unified Communications Manager Configuration Overview

The Find and List User Groups window displays.
Step 8 Step 9 Step 10 Step 11 Step 12

Click Add New. Enter a name for the new user group; for example, group_AXLaccess, and click Save. Click Add Application Users to Group. Choose the new application user name that you created and click Add Selected. From the Related Links drop-down menu, choose Assign Role to User Group and click Go. The User Group Configuration window displays. Choose Standard AXL API Access and click Add Selected. Click Save. For more information, see the following chapters in the Cisco Unified Communications Manager Administration Guide:
• •

Step 13 Step 14

Application User Configuration User Group Configuration

Note

For more information about installing Cisco Unified Presence, see Installing Cisco Unified Presence, Release 1.0(2).

Configure SIP Trunks for Each Cisco Unified Presence Server
Note

To set up IPPM and Cisco Unified Personal Communicator, provision one SIP trunk for each Cisco Unified Presence server that is associated with this Cisco Unified Communications Manager. You do not need to perform this step if you are using only Microsoft Office Communicator as your client. Choose Device > Trunk. The Find and List Trunks window displays. Click Add New. The Trunk Configuration window displays. For Trunk Type, select SIP Trunk. For Device Protocol, select SIP. Click Next. For Device Name, enter CUPS-SIP-Trunk. For Device Pool, select Default. For Destination Port, enter 5070. In the SIP Information section at the bottom of the window, for the Destination Address field, enter my-cups.sip.com where my-cups.sip.com specifies the fully qualified domain name of Cisco Unified Presence.

Step 1

Step 2

Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9

Cisco Unified Presence Deployment Guide

2-8

OL-12732-01

Chapter 2

Cisco Unified Communications Manager Configuration Overview Verify That the Required Services are Running

Step 10 Step 11 Step 12

For SIP Trunk Security Profile, select Non Secure SIP Trunk Profile. For SIP Profile, select Standard SIP Profile. Click Save.

Note

For more information, see the Trunk Configuration chapter in the Cisco Unified Communications Manager Administration Guide.

Verify That the Required Services are Running
Procedure
Step 1

From the Navigation menu, choose Cisco Unified Communications Manager Serviceability and click Go. The Cisco Unified Communications Manager Serviceability window displays.

Step 2 Step 3 Step 4

Choose Tools > Control Center - Feature Services. In the Control Center - Feature Services window, for server, select a Cisco Unified Communications Manager server from the drop-down list. When the Control Center - Feature Services window redisplays, make sure the following services are running:
• • • • •

Cisco Communications Manager Cisco TFTP Cisco Extension Mobility Cisco Communications Manager Cisco IP Phone Services Cisco AXL Web Service

Note

For more information, see the Managing Services chapter in the Cisco Unified Serviceability Administration Guide for Cisco Unified Presence.

Associate End Users With a Line Appearance
Note

You can also use Bulk Administration to map users to line appearances. For more information, see the Cisco Unified Communications Manager Bulk Administration Guide.

Cisco Unified Presence Deployment Guide OL-12732-01

2-9

Chapter 2 Associate End Users With a Line Appearance

Cisco Unified Communications Manager Configuration Overview

Procedure
Step 1

From the Cisco Unified Communications Manager Administration window, choose Device > Phone. The Find and List Phones window displays. Search for a specific phone or click Find to display all devices. Click the Device Name for the phone you want to configure. The Phone Configuration window displays. In the Associate Information pane, click the directory number you want to associate. The Directory Number Configuration displays. At the bottom of the window, click Associate End Users. In the pop-up window that displays, choose the users you want to associate with the line appearance. Click Add Selected. Click Save.

Step 2 Step 3

Step 4

Step 5 Step 6 Step 7 Step 8

Cisco Unified Presence Deployment Guide

2-10

OL-12732-01

Chapter 2

Cisco Unified Communications Manager Configuration Overview CTI Gateway Configuration Checklist

CTI Gateway Configuration Checklist
Table 1 shows the required configuration tasks for the CTI gateway. Complete these tasks from Cisco Unified Communications Manager Administration and Cisco Unified Presence Administration.
Table 1 CTI Gateway Configuration Checklist

Configuration Steps
Step 1

Related Documentation For more information, see the Application User chapter in the Cisco Unified Communications Manager Administration Guide.

From the Cisco Unified Communications Manager Administration window, add an application user:
a.

Choose User Management > Application User. The Find and List Application Users windows displays. Click Add New. The Application User Configuration window displays. In the User ID field, enter an application username of your choice; for example, CtiGW. Enter a password for this application user and confirm the password. Click Save. Choose User Management > User Group. The Find and List User Groups window displays. Click Find. Click the Standard CTI Enabled link. The User Group Configuration window displays. Click Add Application Users to Group. Choose the application user that you created and click Add Selected.

b.

c. d. e. Step 2

Add the application user to the Standard CTI Enabled user group:
a.

For more information, see the Application User chapter in the Cisco Unified Communications Manager Administration Guide.

b. c.

d. e.

Cisco Unified Presence Deployment Guide OL-12732-01

2-11

Chapter 2 CTI Gateway Configuration Checklist

Cisco Unified Communications Manager Configuration Overview

Table 1

CTI Gateway Configuration Checklist (continued)

Configuration Steps
Step 3

Related Documentation For more information, see the Application User chapter in the Cisco Unified Communications Manager Administration Guide.

Add the application user to the Standard CTI Allow Control of All Devices user group:
a.

Choose User Management > User Group. The Find and List User Groups window displays. Click Find. Click the Standard CTI Allow Control of All Devices link. The User Group Configuration window displays. Click Add Application Users to Group. Choose application user that you created and click Add Selected. Click Save.

b. c.

d. e. f. Step 4

Configure the CTI gateway settings in Cisco Unified Presence Administration:
a.

Choose Application > CTI Gateway > Settings. The CTI Gateway Settings window displays. From the Application Status drop-down menu, choose On to enable the CTI gateway. You must enable the CTI gateway. By default, the Application Status specifies Off. Enter the appropriate CTI gateway application settings for your site. Click Save.

For more information, see the Application User chapter in the Cisco Unified Presence Administration Guide.

b. Note

c. d.

Cisco Unified Presence Deployment Guide

2-12

OL-12732-01

CH A P T E R

3

Cisco Unified Presence Configuration Overview
This chapter provides an overview of the required configuration tasks for Cisco Unified Presence. Complete these steps from the Cisco Unified Presence Administration window. This chapter contains the following topics:
• • • • • • • • •

Upload the License File, page 3-1 Add an Optional Secondary Cisco Unified Presence Node, page 3-2 Configure Cisco IP Phone Messenger Settings, page 3-2 Assign MOC Capabilities, page 3-3 Configure the Presence Gateway, page 3-3 Configure an Incoming Access Control List, page 3-4 Configure an Outgoing Access Control List, page 3-5 Configure the Proxy Server Settings, page 3-5 Enable Services, page 3-5

Upload the License File
Note

Upload the license file, which enforces licenses for the Cisco Unified Presence application.
Procedure

Step 1

Choose System > Licensing > License File Upload. The License File Upload window displays. Click Upload License File. Browse to the location of the upload file and click Upload.

Step 2 Step 3

Note

For more information, see the License File Upload chapter in the Cisco Unified Presence Administration Guide.

Cisco Unified Presence Deployment Guide OL-12732-01

3-1

Chapter 3 Add an Optional Secondary Cisco Unified Presence Node

Cisco Unified Presence Configuration Overview

Add an Optional Secondary Cisco Unified Presence Node
Note

Perform these steps before installing the subscriber node.
Procedure

Step 1

Choose System > Server. The Server Configuration window displays. For Host Name/IP Address, enter the hostname or IP address of the subscriber node. This address matches the hostname that you entered in the Cisco Unified Communications Manager Administration window from the System > Application Server menu. Click Save.

Step 2

Step 3

Note

For more information, see the Server Configuration chapter in the Cisco Unified Presence Administration Guide.

Configure Cisco IP Phone Messenger Settings
Note

You do not need to perform this step if you are using only Microsoft Office Communicator.
Procedure

Step 1

Choose Application > IP Phone Messenger > Settings. The IP Phone Messenger Settings window displays. Configure the application password to be the same as the one that was configured for the PhoneMessenger user in Cisco Unified Communications Manager Administration (User Management > Application User menu).

Step 2

Note

The Application Username and the Application Password get configured automatically during installation.

Step 3

Click Save.

Note

For more information, see the IP Phone Messenger Settings chapter in the Cisco Unified Presence Administration Guide.

Cisco Unified Presence Deployment Guide

3-2

OL-12732-01

Chapter 3

Cisco Unified Presence Configuration Overview Assign MOC Capabilities

Assign MOC Capabilities
Note

Ensure that you have assigned MOC capabilities to each Microsoft Office Communicator user.
Procedure

Step 1

Choose Application > CTI Gateway > MOC Assignment. The Find and List MOC Assignments window displays.

Note

For more information, see the MOC Assignment chapter in the Cisco Unified Presence Administration Guide.

Configure the Presence Gateway
Note

Use presence gateways to configure the gateways that the presence engine must know about to receive presence information.
Procedure

Step 1

Choose Cisco Unified Presence > Presence Engine > Presence Gateways. The Find and List Communications Manager Presence Gateways window displays. Click Add New. The Presence Gateway Configuration window displays. Enter the appropriate parameter values, as described in Table 3-1. Click Save.

Step 2

Step 3 Step 4

Note

For more information, see the Presence Gateways chapter in the Cisco Unified Presence Administration Guide.

Cisco Unified Presence Deployment Guide OL-12732-01

3-3

Chapter 3 Configure an Incoming Access Control List

Cisco Unified Presence Configuration Overview

Table 3-1

Presence Gateway Configuration Settings

Field Presence Gateway Type

Description From the drop-down list, specify the gate type:
• • Note

CUCM—Cisco Unified Communications Manager gateway Outlook—Microsoft Exchange gateway for Outlook Calendaring Cisco Unified Presence Administration displays the appropriate fields for the gateway type that you choose.

Description Presence Gateway Account Name (Outlook only)

This parameter specifies the description of this presence gateway. Maximum characters: 255 This parameter specifies the fully qualified domain name or the IP address of the associated gateway. This parameter specifies the global account name that Cisco Unified Presence uses to connect to the Microsoft Exchange server.

Account Password (Outlook This parameter specified the account password for the Microsoft only) Exchange server. Confirm Password (Outlook This parameter confirms the account password for the Microsoft only) Exchange server and must match the Account Password entry. Presence Gateway Port (Outlook only) This parameter specifies the port to which you connect on the Microsoft Exchange server. Default value: 443 Trust Certificate Subject CN This parameter specifies the Trust Certificate Common Name value. (Outlook only)

Configure an Incoming Access Control List
Procedure
Step 1

Choose Cisco Unified Presence > Proxy Server > Incoming ACL. The Find and List Allowed Incoming Hosts window displays. Click Add New. The Proxy Access Control List Configuration window displays. For Address Pattern, enter IP address of the associated Microsoft LCS. Click Save.

Step 2

Step 3 Step 4

Note

For more information, see the Incoming ACL chapter in the Cisco Unified Presence Administration Guide.

Cisco Unified Presence Deployment Guide

3-4

OL-12732-01

Chapter 3

Cisco Unified Presence Configuration Overview Configure an Outgoing Access Control List

Configure an Outgoing Access Control List
Procedure
Step 1

Choose Cisco Unified Presence > Proxy Server > Outgoing ACL. The Find and List Allowed Incoming Hosts window displays. Click Add New. The Proxy Access Control List Configuration window displays. For Address Pattern, enter IP address of the associated Microsoft LCS. Click Save.

Step 2

Step 3 Step 4

Note

For more information, see the Outgoing ACL chapter in the Cisco Unified Presence Administration Guide.

Configure the Proxy Server Settings
Procedure
Step 1 Step 2 Step 3 Step 4

Choose Cisco Unified Presence > Proxy Server > Settings. For Method/Event Routing Status, choose On. For Preferred Proxy Server, choose Default SIP Proxy TCP Listener. Click Save.

Enable Services
Procedure
Step 1 Step 2

At the top, right in the Navigation window, choose Cisco Unified Presence Serviceability from the drop-down list and click Go. Choose Tools > Service Activation. The Service Activation window displays. For Server, select a Cisco Unified Presence from the drop-down list. When the Service Activation window redisplays, in the Cisco Unified Presence Services section at the bottom of the window, click the check boxes to enable these services:
• •

Step 3 Step 4

Cisco Enterprise SIP Proxy Cisco Enterprise Presence Engine

Cisco Unified Presence Deployment Guide OL-12732-01

3-5

Chapter 3 Enable Services

Cisco Unified Presence Configuration Overview

Step 5 Step 6

If you are using clustering, make sure to enable these services on the second node. Click Save.

Note

For more information, see the Managing Services chapter in the Cisco Unified Presence Serviceability Administration Guide.

Cisco Unified Presence Deployment Guide

3-6

OL-12732-01

CH A P T E R

4

Microsoft Integration Overview
This chapter provides an overview of the configuration tasks that you must perform to deploy Cisco Unified Presence in a Microsoft environment. This chapter contains the following topics:
• • • • • •

Microsoft Office Live Communications Server 2005 with SP 1 Configuration, page 4-1 Microsoft Active Directory Configuration Overview, page 4-2 Exchange Calendar Integration Configuration, page 4-4 TLS Route Configuration Checklist, page 4-11 FIPS-Compliant Security Algorithms Configuration Checklist, page 4-12 Microsoft Office Communicator 2005 Configuration Checklist, page 4-13

Microsoft Office Live Communications Server 2005 with SP 1 Configuration
This section provides the configuration tasks that are required to configure Microsoft Live Communications Server 2005 with Service Pack 1 to integrate with Cisco Unified Presence. Perform the following steps from the Microsoft Office Live Communications Server (LCS) 2005 application window. For more information, refer to the Microsoft documentation that is specified for each configuration task.

Note

Ensure that all Microsoft software patches have been applied for LCS and on all PCs that are running the Microsoft Office Communicator clients.

Microsoft LCS Configuration Overview
Note

You can find more information about Live Communications Server 2005 at the following URL: http://office.microsoft.com/en-us/FX011526591033.aspx

Cisco Unified Presence Deployment Guide OL-12732-01

4-1

Chapter 4 Microsoft Active Directory Configuration Overview

Microsoft Integration Overview

Procedure
Step 1 Step 2 Step 3

Ensure that Microsoft Office LCS is properly installed and activated. For the Authentication Protocol, choose NTLM or the appropriate authentication protocol for your site. Configure a static route for each Cisco Unified Presence that is associated with this LCS. For the domain, enter the fully qualified domain name.

Note

The static route domain URI that you enter here must match the SIP URI that you enter when you configure Remote Call Control in Active Directory. For more information, see the “Microsoft Active Directory Configuration Overview” section on page 4-2.

For detailed information on how to configure static routes, refer to the Live Communications Server 2005 online help.
Step 4

Add an authorized host record for each Cisco Unified Presence that is associated with this LCS.

Tip

For the authorized host, you can enter either the IP address or the fully qualified network address.

Microsoft Active Directory Configuration Overview
This section provides the configuration tasks that are required to configure Microsoft Windows Server Active Directory to integrate with Cisco Unified Presence. Perform the following steps from the Microsoft Active Directory application window.

Note

For detailed information on how to configure Active Directory, refer to the Active Directory online help. You can also find more information about Microsoft Windows Server Active Directory at the following URL: http://technet2.microsoft.com/windowsserver/en/technologies/featured/ad/default.mspx
Procedure

Step 1

Add a user name and the telephone number that are associated with that particular user. Ensure that the user names that are configured in active directory are the same as the user names that are configured in Cisco Unified Communications Manager.

Caution

For properly working integrated systems, ensure that the user names in active directory and Cisco Unified Communications Manager are identical. For the users that you added, enable live communications in the Properties window. Enter the SIP URI and the LCS name or LCS pool.

Step 2 Step 3

Cisco Unified Presence Deployment Guide

4-2

OL-12732-01

Chapter 4

Microsoft Integration Overview Microsoft Active Directory Configuration Overview

Caution Step 4 Step 5

Ensure the LCS name or LCS pool name does not contain the underscore character. Enable Remote User Access and Remote Call Control. Enter the Tel URI. Cisco recommends that you use the following format for the TEL URI: tel:xxxx;phone-context=dialstring where
• •

xxxx also specifies the directory number that the CTI Manager reports to Cisco Unified Presence as the calling or called number when a call gets placed. phone-context=dialstring enables the MOC client to control one of the devices that are associated

with the directory number. If you enter the device ID, the MOC client can only control that particular device; for example: tel:xxxx;phone-context=dialstring;device=SEP0002FD3BB5C5 If you enter the partition, the MOC client specifies the partition for the directory number; for example: tel:xxxx;phone-context=dialstring;device=SEP0002FD3BB5C5;partition=myPartition If you do not enter the device ID in the TEL URI, CTI Gateway determines the devices that are associated with the line directory number. If only one device is associated with the line DN, CTI Gateway uses that device. If you do not enter the device ID in the TEL URI and two devices are associated with the line DN (shared line), CTI Gateway uses the following rules to select a device:
• • •

If one of the two devices is Cisco IP Communicator and its status is registered, CTI Gateway uses that device. If one of the two devices is Cisco IP Communicator, but it is not registered, CTI Gateway uses the alternate hard device. If two hard devices exist on the shared line, CTI Gateway monitors the two devices while making a call on the shared line. When the user answers, CTI Gateway monitors that device.

If more than two devices are associated with a line DN, you must specify the desired device in the TEL URI.
Step 6

Enter the Remote Call Control SIP URI; for example: sip:8000@my-cups.my-domain.com where my-cups.my-domain.com specifies the fully qualified domain name of the Cisco Unified Presence that you configured.

Note

The SIP URI that you enter here must match the static route URI that you enter when you configure static routes in Microsoft Office Live Communications Server 2005. For more information, see the “Microsoft Office Live Communications Server 2005 with SP 1 Configuration” section on page 4-1.

Cisco Unified Presence Deployment Guide OL-12732-01

4-3

Chapter 4 Exchange Calendar Integration Configuration

Microsoft Integration Overview

Exchange Calendar Integration Configuration
To configure exchange calendar integration, you must complete the following tasks:
• • •

Create a Receive As account on the exchange server. Configure a presence gateway on the Cisco Unified Presence server. Configure the security certificate on the Cisco Unified Presence server.

Note

You may already have an administrator account that is configured on the exchange server, but the default administrator configuration may not let you log into other user accounts. Cisco recommends that you create a separate administrator account for exchange calendar integration. This section contains the following topics:
• • • • • •

Create a Receive As Account on the Exchange Server, page 4-4 “Create a User Account” section on page 4-5 “Delegate Control as Exchange View Only to the Account” section on page 4-5 “Add Receive As Permissions to the Account” section on page 4-6 “Configure a Presence Gateway on the Cisco Unified Presence Server” section on page 4-6 “Configure the Security Certificate on the Cisco Unified Presence Server” section on page 4-7

Create a Receive As Account on the Exchange Server
This section provides the tasks that you must perform to create a Receive As account on the server.

Create a New Account
Note

Perform these steps on the Microsoft Exchange Server.
Procedure

Step 1 Step 2

Create a new account on the exchnage server. Set Delegate Control as Exchange View Only.e

Note

If the display of Administrative Groups is not enabled, right click Exchange and check the check box for Display Administrative Groups.

Step 3

Add Receive Permissions to the account.

Cisco Unified Presence Deployment Guide

4-4

OL-12732-01

Chapter 4

Microsoft Integration Overview Exchange Calendar Integration Configuration

Note

You can find more information about Microsoft Exchange Server at the following URL: http://www.microsoft.com/exchange/default.mspx

Create a User Account
Use the following procedure to create a user account.
Procedure
Step 1 Step 2

Start Active Directory Users and Computers (ADUC) on the exchange server. Right click the Users container and choose New | User. The New Object User window displays. Enter the naming information for the user account. Click Next. The default mailbox settings for the user account display. Click Next. The summary window displays. To complete creating the user account, click Finish.

Step 3 Step 4

Step 5

Step 6

Delegate Control as Exchange View Only to the Account
To create a Receive As account, you must add the account to mailbox administration.
Procedure
Step 1 Step 2 Step 3 Step 4

On the exchange server, open the Exchange System Manager. Navigate to the Administrative Groups folder. Choose the Administrative Group to which you want to add the account that you created. Right click the group and choose Delegate Control from the pop-up menu. The Exchange Administration Delegation Wizard window displays. Click Next. Click Add. The Delegate Control window displays. Click Browse and choose the user account that you created. For the role, choose Exchange View Only Administrator. Click OK.

Step 5 Step 6

Step 7 Step 8 Step 9

Cisco Unified Presence Deployment Guide OL-12732-01

4-5

Chapter 4 Exchange Calendar Integration Configuration

Microsoft Integration Overview

Step 10

In the summary window, click Finish to save your changes.

Add Receive As Permissions to the Account
Procedure
Step 1 Step 2 Step 3

On the exchange servier, open the Exchange System Manager. Navigate to Administrative Groups > First Administrative Group > Servers > First Server > Mailbox Store. Right click the mailbox store and choose Properties. The Properties window displays. Choose the Security tab and click Add. In the Enter the object name to select field, enter the name of the account that you want to use. Choose Receive As to grant Receive As permissions to this administrator account on all mailbox stores against which you need to access calendar information. Click OK. The account that you set up now has full permissions to log in to the mailbox store. To verify that you configured the Receive As account correctly, try to log in to Outlook for Web Access (OWA) for a user with the following URL: http://exchange.domain/Exchange/user/Calendar where
• •

Step 4 Step 5 Step 6 Step 7

Step 8

exchange.domain is the name and domain of your exchange server. user can be any user for which you are trying to create a backend subscription into the Calendar service.

Step 9

If you cannot log in, the account is not configured correctly, and you need to recreate the account using the steps in this section.

Configure a Presence Gateway on the Cisco Unified Presence Server
Note

Perform the follow step from Cisco Unified Presence Administration. For more information, see the Cisco Unified Presence Administration Guide.
Procedure

Step 1

Choose Cisco Unified Presence > Presence Engine > Presence Gateways. The Find and List Presence Gateways window displays. Click Add New.

Step 2

Cisco Unified Presence Deployment Guide

4-6

OL-12732-01

Chapter 4

Microsoft Integration Overview Exchange Calendar Integration Configuration

The Presence Gateway Configuration window displays.
Step 3 Step 4

For Presence Gateway Type, choose Outlook. Enter the appropiate values for the remaining parameters, which are described in Table 4-1.

Table 4-1

Presence Gateway Configuration Settings

Field Presence Gateway Type

Description From the drop-down list, specify the gate type:
• • Note

CUCM—Cisco Unified Communications Manager gateway Outlook—Microsoft Exchange gateway for Outlook Calendaring Cisco Unified Presence Administration displays the appropriate fields for the gateway type that you choose.

Description Presence Gateway

This parameter specifies the description of this presence gateway. Maximum characters: 255 This parameter specifies the fully qualified domain name or the IP address of the associated gateway.
Note

This parameter must be the the same as the subject CN of the IIS certificate on the Exchange server.

Account Name (Outlook only)

This parameter specifies the global account name that Cisco Unified Presence uses to connect to the Microsoft Exchange server.
Note

Enter the account name for the Receive As account that you created on the exchange server.

Account Password (Outlook This parameter specified the account password for the Microsoft only) Exchange server. Confirm Password (Outlook This parameter confirms the account password for the Microsoft only) Exchange server and must match the Account Password entry. Presence Gateway Port (Outlook only) This parameter specifies the port to which you connect on the Microsoft Exchange server. Default value: 443 Trust Certificate Subject CN This parameter specifies the Trust Certificate Common Name value. (Outlook only)

Configure the Security Certificate on the Cisco Unified Presence Server
To configure the security certificate on the Cisco Unified Presence, you must perform the following tasks:
• • • • •

Install the certificate authority (CA) service. Download the root certificate. Upload the root certificate to the Cisco Unified Presence server. Generate a certificate signing request (CSR) on the Internet Information Server (IIS). Have the CA on your system sign the CSR.

Cisco Unified Presence Deployment Guide OL-12732-01

4-7

Chapter 4 Exchange Calendar Integration Configuration

Microsoft Integration Overview

• •

Download the signed certificate. Upload the signed certificate on IIS.

Install the CA Service
Procedure
Step 1 Step 2 Step 3 Step 4 Step 5

Choose Start > Control Panel > Add or Remove Programs. In the Add or Remove Programs window, click Add/Remove Windows Components. Under Components, choose Certificate Services. On the Warning that displays, click Yes. On the CA Type window, choose Standalone Root CA and click Next. The CA Identifying Information window displays. In the Common Name for this CA field, enter the name of the server and click Next. The Certificate Database Settings window displays. Accept the defaults on the Certificate Database Settings window and click Next. When you are prompted to stop Internet Information Services, click Yes. When you are prompted to enable Active Server Pages (ASP), click Yes. After the installation process completes, click Finish.

Step 6

Step 7 Step 8 Step 9 Step 10

Download the Root Certificate
Procedure
Step 1 Step 2

Log in to your CA server and open a web browser. Open the following URL: http://127.0.0.1/crtsrv Click on Download a CA certificate, certificate chain, or CRL. For the Encoding Method, choose Base 64. Click Download CA Certificate. Save the certificate, certnew.cer, to the local disk.

Step 3 Step 4 Step 5 Step 6

Upload the Root Certificate to the Cisco Unified Presence Server
Procedure
Step 1

Copy of FTP the certnew.cer certificate file to the computer that you use to administer your Cisco Unified Presence server.

Cisco Unified Presence Deployment Guide

4-8

OL-12732-01

Chapter 4

Microsoft Integration Overview Exchange Calendar Integration Configuration

Step 2 Step 3

From the Navigation menu on the Cisco Unified Presence Administration login window, choose Cisco Unified OS Administration and click Go. Enter your username and password for Cisco Unified Operating System Administration and click Login. The Cisco Unified Operating System Administration window displays. Choose Security > Certificate Management. The Certificate List window displays. Click Upload Certificate. The Upload Certificate pop-up window displays. From the Certificate Name drop-down menu, choose Presence Engine-trust. Click Browse and choose certnew.cer. Click Upload File.

Step 4

Step 5

Step 6 Step 7 Step 8

Generate a CSR on IIS
Note

To generate a CSR, perform the following steps on the computer from which you administer Cisco Unified Presence.
Procedure

Step 1

From Administrative Tools, open Internet Information Services. The Internet Information Services window displays. Right click on Default Web Site and choose Properties. The Default Web Site Properties window displays. Choose the Directory Security tab and click Server Certificate. The Web Server Certificate Wizard window displays. Click Next. Choose Create a new certificate and click Next. Choose Prepare the request now, but send it later and click Next. Enter an appropriate name for the the certificate and choose 1024 for the bit length. Click Next. Enter your organization and organizational unit and click Next. For Common Name, enter the name of your exchange server and click Next. Enter your geographical information and click Next. Enter an appropriate filename for the certificate request and click Next. Review your information on the Request File Summary window and click Next. Click Finish.

Step 2

Step 3

Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14

Cisco Unified Presence Deployment Guide OL-12732-01

4-9

Chapter 4 Exchange Calendar Integration Configuration

Microsoft Integration Overview

Sign the CSR
Note

To have your CA server sign the certificate request file, perform the following steps on your CA server.
Procedure

Step 1 Step 2

Copy the certificate request file to your CA server. Open the following URL: http://local-server/certserv or http://127.0.0.1/certsrv Click the Request a certificate link. Choose advanced certificate request. Choose Submit a certificate request by using a base-64-encoded CMC or PKCS #10 file, or submit a renewal request by using a base-64-encoded PKCS #7 file. Using a text editor like Notepad, open the CSR that you generated. Copy all information from and including -----BEGIN CERTIFICATE REQUEST to and including END CERTIFICATE REQUEST----Paste the content of the CSR into the Certificate Request text box. Click Submit. The Request ID displays. In Administrative Tools, open Certificate Authority. The Certificate Authority window displays the request you just submitted under Pending Requests. Right click on your request and choose All Tasks. Click Issue. Click Issued certificates and verify that your certificate has been issued.

Step 3 Step 4 Step 5 Step 6 Step 7

Step 8 Step 9

Step 10

Step 11 Step 12 Step 13

Download the Signed Certificate
Procedure
Step 1

In Administrative Tools, open Certificate Authority. The pending Certificate Request that you just issued displays in Issued Certificates. Right click the request and choose Open. Click the Details tab. Click Copy to File.

Step 2 Step 3 Step 4

Cisco Unified Presence Deployment Guide

4-10

OL-12732-01

Chapter 4

Microsoft Integration Overview TLS Route Configuration Checklist

The Certificate Export Wizard displays.
Step 5 Step 6 Step 7 Step 8 Step 9 Step 10

Click Next. Choose Base-64 encoded X.509 and click Next. Enter the location where you want to store the certificate and use cert.cer for the certificate name. Click Next. Review the summary information and click Finish. Copy cert.cer to the computer that you use to administer Cisco Unified Presence.

Upload the Signed Certificate on IIS
Note

To upload the signed certificate, perform the following step on the computer that you use to administer Cisco Unified Presence.
Procedure

Step 1

From Administrative Tools, open Internet Information Services. The Internet Information Services window displays. Right click Default Web Site and choose Properties. The Default Web Site Properties window displays. Click the Directory Security tab and click Server Certificate. The Webserver Certificate Wizard displays. Click Next. Click Process the pending request and install the certificate and click Next. To choose your certificate, click Browse . Click Next. For the SSL port, enter 443 and click Next. To close the wizard, click Finish.

Step 2

Step 3

Step 4 Step 5 Step 6 Step 7 Step 8 Step 9

TLS Route Configuration Checklist
Table 2 shows the tasks to perform for TLS route configuration (TLC). Perform these tasks on the Microsoft LCS.

Cisco Unified Presence Deployment Guide OL-12732-01

4-11

Chapter 4 FIPS-Compliant Security Algorithms Configuration Checklist

Microsoft Integration Overview

Table 2

TLC Route Configuration Checklist

Configurations Steps
Step 1 Add a static route: a. b. c. Note

Related Documentation For more information, refer to the Windows Server TechCenter online at the following URL: http://technet2.microsoft.com/Windows Server/en/library/49960f07-4a4c-4e049aef-82ab0e8efc0d1033.mspx?mfr=tru e

Right click LCS server pool and choose Properties. Choose the Routing tab and click Add. In Next hop, choose Network Address and enter the hostname or FQDN for the Cisco Unified Presence. Ensure that the value that you enter matches the Subject CN of the Cisco Unified Presence certificate. To check the Subject CN of the Cisco Unified Presence certificate, log in to Cisco Unified Communications Operating System Administration, navigate to Security > Certificate Management > Display Certificate, and choose Own Certificates and sipproxy. For Transport, choose TLS. Choose port 5062. Port 5062 represents the default port where Cisco Unified Presence listens for peer authentication TLS connections. Choose Replace host in request URI. Choose the LCS certificate that you have already configured. You can choose the certificate by looking for the friendly name that you entered. For more information, see the “Configure the Security Certificate on the Cisco Unified Presence Server” section on page 4-7. Click the Host Authorization tab. Double click the Cisco Unified Presence server. Check the check boxes for Throttle as server and Treat as Authenticated. Click OK. Resort the LCS server and wait for it to become ready. The LCS server pool displays the outbound static route that you configured.

d. e. Note

f. g.

Step 2 Mark the Cisco Unified Presence as an authenticated host: a. b. c. d. e.

For more information, refer to the Windows Server TechCenter online at the following URL: http://technet2.microsoft.com/Windows Server/en/library/49960f07-4a4c-4e049aef-82ab0e8efc0d1033.mspx?mfr=tru e

FIPS-Compliant Security Algorithms Configuration Checklist
To enable Federal Information Processing Standard (FIPS) algorithms, follow the configuration tasks shown in Table 3. Perform these tasks on the Microsoft LCS server and the Cisco Unified Presence server.

Cisco Unified Presence Deployment Guide

4-12

OL-12732-01

Chapter 4

Microsoft Integration Overview Microsoft Office Communicator 2005 Configuration Checklist

Table 3

FIPS-Compliant Security Algorithms Configuration Checklist

Configurations Steps
Step 1 Configure the LCS server to send TLSv1 with TLS cipher

Related Documentation

TLS_RSA_WITH_3DES_EDE_CBC_SHA:
a. b. c. d. e.

For more detailed information on configuring FIPS-compliant algorithms, refer to the FIPS-compliant algorithm Choose Start > Administrative Tools > Domain Controller Security information for Microsoft Windows Policy. Server at the following URL: In the console tree, click Security Settings. http://technet2.microsoft.com/Windows Click Local Policies and choose Security Settings. Server/en/Library/6ff574cb-30c4-4ad98d5e-aee697c65b9b1033.mspx In the Details pane, choose the FIPS security setting. Modify the security settings and click OK. Log in to Cisco Unified Presence Administration. Navigate to Cisco Unified Presence > Security > TLS Context Configuration. The Find and List TLS Contexts window displays. For more information, refer to the Cisco Unified Presence Administration Guide.

Step 2 Configure TLS context on Cisco Unified Presence: a. b.

c. d.

Click Find. Click Default_Cisco_UPS_SIP_Proxy_Peer_Auth_TLS_Context. The TLS Context Configuration window displays. From the list of available TLS ciphers, click TLS_RSA_WITH_3DES_EDE_CBC_SHA. Click the down arrow to move it to Selected TLS Ciphers. From the list of available TLS peer subjects, click the TLS peer subject that you configured. Click the down arrow to move it to Selected TLS Peer Subjects. Click Save. Log in to Cisco Unified Presence Serviceability Administration. Navigate to Tools > Service Activation. Restart the Cisco UPS SIP Proxy service.

e. f. g. h. i. j. k. l.

Microsoft Office Communicator 2005 Configuration Checklist
Table 4 shows the configuration tasks that are required to configure Microsoft Office Communicator 2005 to integrate with Cisco Unified Presence. Perform the following steps from the Microsoft Office Communicator 2005 application window. For more information, refer to the Microsoft documentation that is specified for each configuration task.

Cisco Unified Presence Deployment Guide OL-12732-01

4-13

Chapter 4 Microsoft Office Communicator 2005 Configuration Checklist

Microsoft Integration Overview

Note

Ensure that all Microsoft software patches have been applied for LCS and on all PCs that are running the Microsoft Office Communicator clients.

Table 4

Microsoft Office Communicator 2005 Configuration Checklist

Configurations Steps Enter a sign-in name that you previously configured in Microsoft Active Directory. For more information, see the “Microsoft Active Directory Configuration Overview” section on page 4-2. Ensure that the user names that are configured in active directory are the same as the user names that are configured in Cisco Unified Communications Manager.

Related Documentation For detailed information on how to configure Microsoft Office Communicator 2005, refer to the Microsoft Office Communicator online help. You can also find more information about Microsoft Office Communicator 2005 at the following URL: http://www.office.microsoft.com/en-us/assi stance/HA011992481033.aspx#Deploymen tGuide

Caution

For properly working integrated systems, ensure that the user names in active directory and Cisco Unified Communications Manager are identical.

Enter the IP address or FQDN of the Microsoft Live Communications Server For detailed information on how to and choose to connect by using TCP. configure Microsoft Office Communicator 2005, refer to the Microsoft Office Communicator online help. You can also find more information about Microsoft Office Communicator 2005 at the following URL: http://www.office.microsoft.com/en-us/assi stance/HA011992481033.aspx#Deploymen tGuide Choose Enable Phone Integration. For detailed information on how to configure Microsoft Office Communicator 2005, refer to the Microsoft Office Communicator online help. You can also find more information about Microsoft Office Communicator 2005 at the following URL: http://www.office.microsoft.com/en-us/assi stance/HA011992481033.aspx#Deploymen tGuide

Cisco Unified Presence Deployment Guide

4-14

OL-12732-01

Chapter 4

Microsoft Integration Overview Microsoft Office Communicator 2005 Configuration Checklist

Table 4

Microsoft Office Communicator 2005 Configuration Checklist (continued)

Configurations Steps For most users, you can choose Automatic Configuration.

Related Documentation For detailed information on how to configure Microsoft Office Communicator 2005, refer to the Microsoft Office Communicator online help. You can also find more information about Microsoft Office Communicator 2005 at the following URL: http://www.office.microsoft.com/en-us/assi stance/HA011992481033.aspx#Deploymen tGuide

After the users log in, they can choose the default device for calling phone numbers, either the phone or the computer.
Note

If the user specifies computer as the default device, Cisco Unified Presence does not get integrated with LCS.

For detailed information on how to configure Microsoft Office Communicator 2005, refer to the Microsoft Office Communicator online help. You can also find more information about Microsoft Office Communicator 2005 at the following URL: http://www.office.microsoft.com/en-us/assi stance/HA011992481033.aspx#Deploymen tGuide

In MOC configuration, choose Microsoft Office Outlook as the personal information manager, if appropriate.

For detailed information on how to configure Microsoft Office Communicator 2005, refer to the Microsoft Office Communicator online help. You can also find more information about Microsoft Office Communicator 2005 at the following URL: http://www.office.microsoft.com/en-us/assi stance/HA011992481033.aspx#Deploymen tGuide

Cisco Unified Presence Deployment Guide OL-12732-01

4-15

Chapter 4 Microsoft Office Communicator 2005 Configuration Checklist

Microsoft Integration Overview

Cisco Unified Presence Deployment Guide

4-16

OL-12732-01

CH A P T E R

5

Cisco Click-to Call Plug-In for IBM Lotus Sametime Configuration Overview
This chapter provides the procedures that you need to install the Cisco Click-to-Call plug-in on an IBM Lotus Domino Server and to configure Cisco Unified Communications Manager to accept calls that the click-to-call plug-in originated. This chapter includes the following sections:
• • • • • • • • •

Prerequisites, page 5-1 Installing the Cisco Click-to-Call Plug-In, page 5-2 Configuring the Cisco Click-to-Call Plug-In, page 5-2 Configuring the Lotus Sametime Server for Cisco Click-to-Call, page 5-5 Configuring Cisco Unified Communications Manager for Cisco Click-to-Call, page 5-5 Configuring a SIP Trunk Security Profile, page 5-6 Configuring a SIP Trunk for Lotus Sametime Server, page 5-6 Configuring Digest Authentication on the SIP Trunk, page 5-7 Configuring the Username and Password, page 5-7

Prerequisites
Before you install the click-to-call plug-in, ensure that you have the following software:
• • •

IBM Lotus Domino Server 7 IBM Sametime Server 7.5.1 Cisco Unified Communications Manager Release 6.0(1)

For information on installing or upgrading IBM Lotus Domino Server, see appropriate installation documentation at the following URL: http://www-128.ibm.com/developerworks/lotus/documentation/domino/ For more information on installing and configuring Lotus Sametime, see the appropriate documentation at the following URL: http://www-128.ibm.com/developerworks/lotus/documentation/sametime/ For Cisco Unified Communications Manager Release 6.0(1) documentation, see the following URL: http://www.cisco.com/en/US/products/sw/voicesw/ps556/tsd_products_support_series_home.html

Cisco Unified Presence Deployment Guide OL-12732-01

5-1

Chapter 5 Installing the Cisco Click-to-Call Plug-In

Cisco Click-to Call Plug-In for IBM Lotus Sametime Configuration Overview

Installing the Cisco Click-to-Call Plug-In
To install the Cisco Click-to-Call plug-in, follow this procedure:
Procedure
Step 1 Step 2

Download Cisco Click-to-Call to the computer where you want to install the plug-in. On the machine where you want to install the click-to-call plug-in, stop the Lotus Domino Server service.

Tip

For instructions on stopping a service, see the documentation that accompanied your operating system.

Step 3

To launch the InstallShield wizard, double-click the appropriate click-to-call plug-in for your operating system. The InstallShield Wizard for Cisco Click to Call 6.0(1) displays. Click Next. An installation summary window displays. After reviewing the installation summary information, click Install to confirm the installation. The wizard installs the plug-in and displays additional summary information. To complete the installation, click Finish.

Step 4

Step 5

Step 6

Note

Before you start the Lotus Domino Server service, you must configure the Cisco Click-to-Call plug-in. See “Configuring the Cisco Click-to-Call Plug-In” section on page 5-2.

Configuring the Cisco Click-to-Call Plug-In
To configure the Cisco Click-to-Call plug-in, follow this procedure:
Note

Before you start the Lotus Domino Server service, you must configure at least one associated Cisco Unified Communications Manager server.

Procedure
Step 1

On the computer where you installed the Cisco Click-to-Call plug-in, navigate to the following directory:
\lotus\domino

Step 2

Using a text editor, open the following file:
ClickToConfCUCM.properties

Cisco Unified Presence Deployment Guide

5-2

OL-12732-01

Chapter 5

Cisco Click-to Call Plug-In for IBM Lotus Sametime Configuration Overview Configuring the Cisco Click-to-Call Plug-In

Step 3 Step 4

Specify the name and port number for at least one associated Cisco Unified Communications Manager server. Specify any other parameter values that are required for your installation. Example 5-1 shows the properties file for the Cisco Click-to-Call plug-in. After you specify the necessary values, save the ClickToConfCUCM.properties file. Start the Lotus Domino Server service. Verify that the Lotus Domino Server service is running.

Step 5 Step 6 Step 7

Tip

For instructions on starting a service, see the documentation that accompanied your operating system.

Example 5-1

Properties File for Cisco Click-to-Call Plug-in

#Cisco Click to Call 6.0(1) v124 (Sametime Server Plug-in) configuration file #Note: For changes made to this file to take effect, you will need to restart the Lotus Domino Server. #APPLICATION_NAME (optional) #This field should be alphanumeric. #Valid characters include alphabet(A-Z and/or a-z) and numbers(1-9) only. #Default: c2c APPLICATION_NAME= #LOCAL_LISTENER_HOST (optional) #Set the ip address/fqdn that your Sametime Server is listening on. #Defaults to the first active ip address of the system, if left empty. LOCAL_LISTENER_HOST= #LOCAL_LISTENER_PORT (optional) #Set the port that you want to listen on for SIP messages. #It needs to be a unreserved port between 0 and 65535. #Defaults to 5060 if left empty. LOCAL_LISTENER_PORT= #Call Managers (required) #Atleast one CUCM[X]_HOST _must_ be configured #Add as many as you like, as long as they are numbered sequentially. #If the host is an ip address: # * If you do not specify a port, the port will default to 5060 #If the host is a dns name and if DNS_SRV_SUPPORT is disabled (default): # * If you do not specify a port, the port will default to 5060 #If the host is a dns name and if DNS_SRV_SUPPORT is enabled: # * Read the comments for DNS_SRV_SUPPORT. CUCM1_HOST= CUCM1_PORT= CUCM2_HOST= CUCM2_PORT= CUCM3_HOST=

Cisco Unified Presence Deployment Guide OL-12732-01

5-3

Chapter 5 Configuring the Cisco Click-to-Call Plug-In

Cisco Click-to Call Plug-In for IBM Lotus Sametime Configuration Overview

CUCM3_PORT= CUCM4_HOST= CUCM4_PORT= CUCM5_HOST= CUCM5_PORT= CUCM6_HOST= CUCM6_PORT= CUCM7_HOST= CUCM7_PORT= CUCM8_HOST= CUCM8_PORT= CUCM9_HOST= CUCM9_PORT= CUCM10_HOST= CUCM10_PORT= #Application's Credentials for digest authentication (optional) #Add as many as you like, as long as they are numbered sequentially. REALM1= REALM1_USERNAME= REALM1_PASSWORD= REALM2= REALM2_USERNAME= REALM2_PASSWORD= REALM3= REALM3_USERNAME= REALM3_PASSWORD= REALM4= REALM4_USERNAME= REALM4_PASSWORD= REALM5= REALM5_USERNAME= REALM5_PASSWORD= #MODE (optional) #Either "sequential" or "roundrobin" #sequential mode: Every new Click To Call request will go to the first CUCM configured. If that CUCM # does not respond, it will then use the sequentially next configured CUCM. #round robin mode: Every new Click to Call request will go to the least used CUCM. If that CUCM # does not respond, it will then use the next least used CUCM. #Default: sequential MODE= #DNS_SRV_SUPPORT (optional) #Either "true" or "false" #true: Enables DNS SRV support. #false: Disables DNS SRV support. #Notes: If DNS_SRV_SUPPORT is enabled: # * You _must_ use fully qualified domain names for all your CUCM[X]_HOST's # * If you do _not_ specify a CUCM[X]_PORT then a DNS SRV lookup will

Cisco Unified Presence Deployment Guide

5-4

OL-12732-01

Chapter 5

Cisco Click-to Call Plug-In for IBM Lotus Sametime Configuration Overview Configuring the Lotus Sametime Server for Cisco Click-to-Call

# # # # # #

* *

be attempted for the hostname. The port is determined from the SRV lookup. If you _do_ specify a CUCM[X]_PORT, then an A lookup will be attempted for the hostname provided. DNS SRV should not be used for load balancing. If you wish to load balance set the MODE to "roundrobin".

#Default: false DNS_SRV_SUPPORT=

Configuring the Lotus Sametime Server for Cisco Click-to-Call
To configure your Lotus Sametime Server to work with Cisco Click-to-Call, use the following procedure:
Procedure
Step 1

To access your Lotus Sametime Server, enter the following URL: http://server-address/stcenter.nsf where server-address is the domain name or IP address of your Lotus Sametime Server. On the window that displays, click the Administer the Server link. Log in to Lotus Sametime Server. After you log in, click the Policies link. For Cisco Click-to-Call to work, ensure that you enable the following parameter: Allow telephony for contact lists, instant messaging, and instant meetings Ensure that your other policies are set up correctly for your site.

Step 2 Step 3 Step 4 Step 5

Step 6

Configuring Cisco Unified Communications Manager for Cisco Click-to-Call
To configure you Cisco Unified Communications Manager to work with the Cisco Click-to-Call plug-in, use the following procedure:

Note

For more information on Cisco Unified Communications Manager Administration, refer to the Cisco Unified Communications Manager Administration Guide.

Cisco Unified Presence Deployment Guide OL-12732-01

5-5

Chapter 5 Cisco Click-to Call Plug-In for IBM Lotus Sametime Configuration Overview Configuring Cisco Unified Communications Manager for Cisco Click-to-Call

Configuring a SIP Trunk Security Profile
Procedure
Step 1

From Cisco Unified Communications Manager Administration, choose System > Security Profile > SIP Trunk Security Profile. The Find and List SIP Trunk Security Profiles window displays.

Step 2

Click Add New. The SIP Trunk Security Profile Configuration window displays. Enter a name and description for this SIP trunk security profile. Check the Accept Out-of-Dialog REFER check box. Click Save.

Step 3 Step 4 Step 5

Configuring a SIP Trunk for Lotus Sametime Server
To configure a SIP trunk for Lotus Sametime Server and tie it to your SIP Trunk Security Profile, use the following procedure:
Procedure
Step 1

From Cisco Unified Communications Manager Administration, choose Device > Trunk. The Find and List Trunks window displays. Click Add New. The Trunk Configuration window displays. From the Trunk Type drop-down menu, choose SIP Trunk. For Device Protocol, accept the default value, SIP. Click Next. Enter a device name and description for this trunk. For Device Pool, choose Default. For Destination Address, enter the IP address of the Lotus Sametime Server. For SIP Trunk Security Profile, choose the SIP trunk security profile that you created. For SIP Profile, choose Standard SIP Profile. Click Save. For your changes to take effect, click Reset.

Step 2

Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12

Cisco Unified Presence Deployment Guide

5-6

OL-12732-01

Chapter 5

Cisco Click-to Call Plug-In for IBM Lotus Sametime Configuration Overview Configuring Cisco Unified Communications Manager for Cisco Click-to-Call

Configuring Digest Authentication on the SIP Trunk
Note

You can perform the steps in this section to ensure that only authenticated users can access the trunk; however, be aware that the steps in this section are optional. To configure digest authentication on the SIP trunk, use this procedure:
Procedure

Step 1

From Cisco Unified Communications Manager Administration, choose System > Security Profile > SIP Trunk Security Profile. The Find and List SIP Trunk Security Profiles window displays.

Step 2 Step 3

Click Find. Click the SIP trunk security profile that you created for Cisco Click-to-Call. The SIP Trunk Security Profile Configuration window displays. Check the Enable Digest Authentication check box. Click Save. For your changes to take effect, click Reset. To configure the realm, choose System > Enterprise Parameters. Enter the appropriate value for the Cluster ID field.

Step 4 Step 5 Step 6 Step 7 Step 8

Configuring the Username and Password
To configure a new username and password for SIP authentication, follow this procedure.
Procedure
Step 1

Choose User Management > Application User. The Find and List Application Users window displays. Click Add New. The Application User Configuration window displays. Enter your User ID, password, and digest credentials. Check the check box for Accept Out-of-dialog REFER. Click Save. Choose System > Security Profile > SIP Trunk Security Profile. The Find and List SIP Trunk Security Profiles window displays. Click Find. Click the SIP trunk security profile that you created for Cisco Click-to-Call. The SIP Trunk Security Profile Configuration window displays.

Step 2

Step 3 Step 4 Step 5 Step 6

Step 7 Step 8

Cisco Unified Presence Deployment Guide OL-12732-01

5-7

Chapter 5 Cisco Click-to Call Plug-In for IBM Lotus Sametime Configuration Overview Configuring Cisco Unified Communications Manager for Cisco Click-to-Call

Step 9

For your changes to take effect, click Reset.

Cisco Unified Presence Deployment Guide

5-8

OL-12732-01

INDEX

A access control lists incoming privacy active directory configuring configuring
4-2 3-4 3-5

IP Phone Messenger settings license files
3-1 3-3 3-3

3-2

MOC capabilities presence gateways

privacy access control lists proxy server settings second nodes services
3-5 3-2 3-5

3-5

application servers
2-2

click-to-call plug-in Cisco Unified Communications Manager
5-5

C
Cisco Unified Communications Manager adding application users
2-7 2-3

configuring installing

5-2 5-7

digest authentication on SIP trunks
5-2 5-5

Lotus SameTime server prerequisites properties file
2-9 5-1 5-3 2-3

associate primary extension with phone associating a device to a user capabilities assignment click-to-call plug-in
5-5 2-2 2-2

associating end users with line appearances

SIP trunk security profiles CTI gateways configuring
2-11

5-6 5-6

SIP trunks for Lotus SameTime server

configuring application servers configuring CTI gateways configuring SIP trunks
2-8 2-11

configuring SIP trunks for click-to-call plug-in enabling AXL access roles IP Phone Messenger required services service parameters
2-9 2-1 2-6 2-6 2-4 2-5 2-7

5-6

E end users associating with line appearances capabilities assignment exchange calendar integration CA services configuring
4-8 4-4 4-5 2-2 2-9

phone service for IP Phone Messenger

SIP trunk security profile user groups
2-5

subscribing phones to IP Phone Messenger Cisco Unified Presence incoming access control lists
3-4

delegating control as Exchange View Only downloading root certificates downloading signed certificates generating CSRs on IIS
4-9 4-8 4-10

Cisco Unified Presence Deployment Guide OL-12732-01

IN-1

Index

presence gateways receive as accounts security certificates signing CSRs
4-10

4-6 4-4 4-6

configuring proxy server settings
4-8 4-11 3-5

3-3 4-6

configuring for exchange calendar integration

receive as permissions
4-7

uploading root certificates uploading signed certificates user accounts
4-5

R receive as accounts creating
4-4 4-6

I
IP Phone Messenger configuring
2-4 2-5 3-2

permissions

S security certificates configuring for exchange calendar integration service parameters configuring services Cisco Unified Communications Manager
2-9 2-1 4-7

configuring phone service

configuring settings on Cisco Unified Presence

L
LCS configuring license files uploading
3-1 4-1

Cisco Unified Presence SIP trunks configuring
2-8

3-5

configuring for click-to-call plug-in

5-6

M
Microsoft integration overview SeeMOC Microsoft Office Live Communications Server See LCS MOC assigning capabilities in Cisco Unified Presence configuring
4-13 3-3 1-1

Lotus SameTime server security profiles
2-6

5-6

Microsoft Office Communicator

T
TLS routes configuring
4-11

U user accounts creating on an exchange server
4-5

P presence gateways

user groups assigning end users
2-5

Cisco Unified Presence Deployment Guide

IN-2

OL-12732-01

Similar Documents

Premium Essay

Traffic Modeling

...University of Phoenix Material Traffic Modeling Figure 1 shows the intersections of five one-way streets and the number of cars that enter each intersection from both directions. For example, I1 shows that 400 cars per hour enter from the top and that 450 cars per hour enter from the left. See the Applications section in Section 6.2 of College Algebra as a reference. For this assignment, use Figure 1 to answer the questions following the figure and to prepare a Microsoft® PowerPoint® presentation. [pic] Figure 1. The intersections of five one-way streets The letters a, b, c, d, e, f, and g represent the number of cars moving between the intersections. To keep the traffic moving smoothly, the number of cars entering the intersection per hour must equal the number of cars leaving per hour. 1. Describe the situation. 2. Create a system of linear equations using a, b, c, d, e, f, and g that models continually flowing traffic. 3. Solve the system of equations. Variables f and g should turn out to be independent. 4. Answer the following questions: a. List acceptable traffic flows for two different values of the independent variables. b. The traffic flow on Maple Street between I5 and I6 must be greater than what value to keep traffic moving? c. If g = 100, what is the maximum value for f? d. If g = 100, the flows represented by b, c, and d must be greater than what values? In this situation, what are the minimum values...

Words: 279 - Pages: 2

Free Essay

Traffic Modeling

...Traffic Modeling Paper Concepts of math can be displayed and solved in many different ways. There are equations, graphs, and word problems and several concepts that can be used as examples to help solve mathematical issues. In week four of this College Algebra class Learning Team B was present with an assignment involving a traffic model. The traffic model is the key to helping Learning Team B solve the problems the assignment presents. The traffic model represents a number of cars within the area at any given time represented by letters. Learning team B must solve questions based on this model. There are several equations that were made in order to prove that the numbers of cars entering and leaving each intersection must be equal to keep traffic moving smoothly. Variables f and g are independent variables. This means that variables a through e are dependent on variables f and g. The number of cars at intersection a depends on how many cars turn from intersection f. The number of cars at intersection b depends on how many cars turn right from intersections f and g. This tells you that there are infinitely many solutions since the number of cars that turn onto Elm from Oak, Pine, and Aspen vary. Similarly the number of cars that turn onto Maple from Oak, Pine, and Aspen also vary. To list two acceptable traffic flows first let variable f be equal to 365 cars/hr and let variable g be equal to 400 cars/hr. Variable a would be equal to 850-365, which equals 485 cars/hr. Variable...

Words: 1174 - Pages: 5

Free Essay

Traffic Modeling Instructions

...University of Phoenix Material Traffic Modeling Figure 1 shows the intersections of five one-way streets and the number of cars that enter each intersection from both directions. For example, I1 shows that 400 cars per hour enter from the top and that 450 cars per hour enter from the left. See the Applications section in Section 6.2 of College Algebra as a reference. For this assignment, use Figure 1 to answer the questions following the figure and to prepare a Microsoft® PowerPoint® presentation. Figure 1. The intersections of five one-way streets The letters a, b, c, d, e, f, and g represent the number of cars moving between the intersections. To keep the traffic moving smoothly, the number of cars entering the intersection per hour must equal the number of cars leaving per hour. 1. Describe the situation. 2. Create a system of linear equations using a, b, c, d, e, f, and g that models continually flowing traffic. 3. Solve the system of equations. Variables f and g should turn out to be independent. 4. Answer the following questions: a. List acceptable traffic flows for two different values of the independent variables. b. The traffic flow on Maple Street between I5 and I6 must be greater than what value to keep traffic moving? c. If g = 100, what is the maximum value for f? d. If g = 100, the flows represented by b, c, and d must be greater than what values? In this situation, what are the minimum values for a and e? e. This model has five...

Words: 278 - Pages: 2

Free Essay

Traffic Modeling

...Influence of Visual Media Paper Carolyn R. Slaughter HUM/176 October 6, 2013 Dr. Steven H. Mathew Influence of Visual Media Paper What would this world be without the influence of visual media? People want to see what is going on in the world around them. In the United States people want to watch TV and it has a great influence on culture experiences. People want to keep up with the latest celebrity gossip, and political pros and cons. In today’s society visual media is used in new ways, at one time people were only able to watch TV in their homes, now it’s available on digital televisions, DVD, smartphones, tablets, and computers. At one time there were only three major broadcasting networks available (ABC, NBC, and CBS) for viewing primetime movies and shows in America. These networks would appeal to a general family audience. (Lule, 2012) Visual media is an important aspect in many people lives; it provides entertainment for many people. The entertainment media has shaped the American culture and its values in many different ways. Today the young as well as the old try to mimic what they see celebrities do. If Miley Cyrus Twerked on a YouTube video, and her fans went insane over the video, now the young people who are her fans wants to do the Twerk dance in spite of how ridiculous some may view it as being. Parent have to preview the content their children are watching on TV whether it be in movies, videos, or music. After viewing the video on YouTube it is easy...

Words: 689 - Pages: 3

Free Essay

Traffic Modeling Example

...An Application Involving Traffic Modeling According to Blitzer (2009), checkpoint four "shows a system of four one-way streets" (p. 573). The numbers in the figure denote the number of cars per minute that travel in the direction shown. a. Use the requirement that the number of cars entering each of the intersections per minute must equal the number of cars leaving per minute to set up a system of equations in w, x, y, and z. For Intersection I1: Because 5+10=15 cars enter and w+z cars leave the intersection I1, then w+z=15. For Intersection I2: Because w+x cars enter the intersection and 10+20=30 cars leave, then w+x=30. For Intersection I3: Because 15+30=45 cars enter the intersection and x+y cars leave, then x+y=45. For Intersection I4: Because y+z cars enter the intersection and 10+20=30 cars leave. traffic will keep flowing if y+z=30. Arrange the equations where the variables are on one side and the constants are on the other side of the equal sign. w+z=15 w+x=30 x+y=45 y+z=30 System of equations: w+z=15 w+x=30 x+y=45 y+z=30 b. Use Gaussian elimination to solve the system. System of equations: w+z=15 w+x=30 x+y=45 y+z=30 Put system of equations in matrix form. w x y z 1 0 0 1 15 1 1 0 0 30 0 1 1 0 45 0 0 1 1 30 Solve the system of equations. -1R1+R2 -1R2+R3 -1R3+R4 w x y z 1 0 0 1 15 0 1 0 -1 15 0 0 1 1 30 0 0 0 0 0 w+z=15 x-z=15 y+z=30 The last...

Words: 488 - Pages: 2

Free Essay

Discuss the Impact of the Automobile’s Rise on Urban Form During the Twentieth Century and Critically Evaluate Planning Measures Used to Limit the Negative Social and Environmental Aspects

...concerns caused by the increase in vehicle usage include pedestrian safety, residential livability, and environmental deterioration. I have decided to explore this question by considering features that have both affected urban form and also acted as planning measures to limit negative social and environmental impacts, these include motorway developments, the garden city urban planning approach and Greenbelts. With over 15 million units of Ford Motor T sold between 1908 and 1927 (Flink, 2001), urban form was most dramatically influenced in American cities during the correlating time period. Planners began to oppose the conventional Roman-grid layouts, where streets were arranged at perpendicular angles to each other. Rising traffic congestion at intersections placed pressure on city planners to reorganise the structural layout in attempts to liberate these chaotic streets. Pedestrians were heavily victimised by the automobile’s rise as modern highway codes and road systems had not yet been established. “Pedestrians crossed the streets whenever and wherever they chose” (Brown, 2006) and coupled with the fact that automobiles had high-speed potentials; together, this created a dangerous environment for city residents especially in Britain with increasing road accidents (Plowden, 1973; see table 1)....

Words: 1675 - Pages: 7

Premium Essay

Gloablization

...is based on the most happening concern of Dhaka city- Traffic congestion. Dhaka, the capital city of Bangladesh is burdened with many different problems, namely housing problem, sanitation problem and problem related to water logging, etc. Yet, among many other problems, the city has been experiencing severe traffic-problem which is a common phenomenon in our daily life. Dhaka city situation is more alarming mainly due to vehicular movement and traffic jam. There are different types of vehicular namely, car, bus, jeep, truck, minibus, microbus, auto-rickshaw, tempo, mini-truck, motorcycles and innumerable numbers of rickshaws. There are many reasons behind traffic jam in Bangladesh. Among them some major factors are as follows: • Undisciplined traffic signal in the road. • Indiscipline among the road user. • Might is right, everybody are free to park their vehicle on Road. • No knowledge of traffic rules which encourage violating the rules. • Enforcement of rules by dishonest persons who are busy in collection of illegal money from traffic rules violators. • Heavy numbers of vehicle on roads. Time is the most valuable things in the twenty first centaury no doubt. And traffic jam is killing the most productive time of the people of Dhaka city. Time is going on and on and we are lagging behind. The world is becoming speedy where as we are becoming slower. To reduce traffic jam we can take steps such as: • Have a good public...

Words: 388 - Pages: 2

Free Essay

Reverse Around a Corner

...Reverse round a corner step by step technique The reverse round a corner or left corner reverse as it is sometimes known is one of 4 manoeuvres you will need to learn before taking the driving test. The reverse round a corner manoeuvre is also one of the more common manoeuvres asked by the test examiner for you to perform. This tutorial will demonstrate an ideal technique that the examiner will be looking for in order to pass this part of the driving test. The test examiner will be looking for 3 key skills demonstrated by yourself in order to successfully complete the reverse round a corner manoeuvre. These skills are: • • • Accuracy - The test examiner will be assessing your ability to reverse round the corner, not touching the curb or straying too far onto the other side of the road. Control - The examiner will be judging your ability to keep the car at a slow and stable speed by use of clutch control. Observation. Effective and all round observation must be taken whilst performing the reverse round a corner manoeuvre. Reverse round a corner diagram A During the driving test, the examiner will ask you to park up on the left on many occasions. They are observing your accuracy and safety for parking. Another occasion may be the examiner is going to request you demonstrate the reverse round a corner. The examiner will ask you to park up on the left, just before the turn you are going to reverse into as in diagram A. When the examiner asks you to park ...

Words: 2333 - Pages: 10

Premium Essay

In the Present Age of Speed, It Is Imperative That All Modes of Travel, Especially the Road Travel in India Is Made Safe for All Categories of People. Comment.

...roads remain free from all types of hassels and harrowing happenings. Unless and until the Ministry of Surface Transport, Traffic Regulatory Agencies/Police etc. put road safety under the scanner and devise meaningful and result-oriented ways and means to render road travel a pleasant experience, things would not improve. Strict adherence to traffic rules and regulations is just one of the measures that can bring about perceptible change in the situation. Unfortunately, the series of accidents that occur on Indian roads day in and day out brings home the terrible truth that raising the safety bar on Indian roads remains a pipedream. When the tools of high technology are readily available and there is no shortage of funds, it is not comprehensible why this vital area of transport, both goods and humans, remains vulnerable to accidents. Ironically, while new roads are being built, and newer, supposedly safer automobiles— with safety features like airbags, crash sensors etc—race out of the factories, the country’s road safety record remains abysmal. No doubt, several factors contribute to the appalling statistics that tell the sorry state of affairs on roads. In India, this is particularly true since the facilities available for non-motorised users are poor or even non-existent. It is high time the authorities did more than indulge in “traffic drives” to book errant drivers. Only a zero tolerance policy on a sustained basis to educate people on good road sense will...

Words: 335 - Pages: 2

Premium Essay

Rumors in a Small Town

...that was right in the middle of town. It caught on fire and burnt down about 6 months ago. They are rebuilding but the building now is a lot bigger than the previous one. That being said, I don’t feel there needs to be another big building right behind it, right in the middle of town. It will completely change the landscape of the town. People come to Wimberley for the tourist experience. Not for the big town experience. They can stay home for that. There are two roads on either side of the land where they want to build. They are two lane roads. The town put in really nice sidewalks a few years ago. Where are they going to expand the roads to accommodate the amount of traffic that will be coming? They have Market Days on the first Saturday of the month. That day is a good indication of the amount of traffic we will get on a daily basis. The camp that is happy about HEB coming thinks that it will be competition for Brookshire Bros. and then BB will have to lower their prices. I’ve even heard some people say that hopefully it will put Brookshire Brothers out of business. These people can’t see the big picture. Let me ask a question. Who is HEB’s biggest competitor? Walmart. What does Walmart like to do? Come into small towns and take over big empty buildings. Then what happens? They start putting small town Mom and Pop stores out of business. Do we want that to happen? I know I don’t. I don’t believe that this will be a good thing, HEB coming into my small town. I’m not...

Words: 379 - Pages: 2

Premium Essay

The Australian Road Rules

...unlearn much of what he has learned in his own State and to learn a lot that is strange to him. This produces irritation – or worse - in the motor owner and motor driver, and tends to unnecessary costs of traffic administration (which the motorist usually has to pay for). It also adds to traffic dangers through ignorance or unfamiliarity with local conditions or practices on the part of drivers. Therefore, anything that can be done to lay down a national basis for motor traffic control must be of much practical value. Commonsense suggests that there should be uniformity instead of variety, and that the growing volume of interstate traffic requires a national instead of a local viewpoint in things common to traffic in all of the States. Were all motor vehicles kept within their own State boundaries, little disadvantage would arise from the present welter of confusing motor legislation, but when a system becomes national, a system (or lack of system) of arbitrarily fixed laws that differ substantially in matters in which there should be common agreement appears absurd, if not intolerable. I do not consider that it would be very difficult, once the groundwork had been prepared, to induce the various State Governments to agree to a national conference of traffic authorities and representatives of the recognised motoring organisations in the...

Words: 3747 - Pages: 15

Free Essay

How Distractions Will Affect the Driving?

...How distractions will affect the driving? There are many factors which can distract a driver on the road. Distracted driving can occur any time a driver's attention is taken away from where they should be focusing their concentration - the driving task. There are many different types of distractions, both inside and outside the car. A physical distraction causes you to take your hands off the wheel, such as eating a sandwich. A mental distraction takes your mind away from the road, such as speaking with a passenger. Mental distractions may be more difficult to identify, as we often take discussions with passengers to be a “normal” part of driving. “Driver distractions include cell phones, eating, drinking, changing a CD, fiddling with radio dials, talking to a passenger, experiencing emotional distress, minding children, personal grooming, looking at billboards or even other vehicles on the road” (CAA, 2012). A lot can happen when a driver is distracted. For example, there is a significant increase in driving with no hands on the wheel, not watching the road, sudden braking and wandering into other lanes which can result in lack of focus on the road, increase the chances of collisions and a hazard to pedestrians, yourself and other road users. I personally witnessed drivers on an everyday basis being distracted while driving on the road. For example, many would be texting or making a phone call, some will be looking somewhere...

Words: 329 - Pages: 2

Premium Essay

Health and Social

...A health promotion is the provision of information and education both to individuals and to the nation, which will enable them to make positive lifestyle choices. It enables people to take control over factors that affect their own health and so do something to improve their health and wellbeing. The first campaign that I will look at is the Change 4 Life programme. The purpose of Change 4 Life is to inform readers about the health risks associated with not eating healthy foods and not being active. The campaign is run by the department of health and is aimed at all age ranges. It is a UK social campaign that is designed to prevent or reduce child obesity by raising awareness to both children and parents. The campaign provides information about the risks of obesity and also provides information, advice and guidance on how to change your lifestyle to improve your health. Information can be accessed through their website http://www.nhs.uk/Change4Life/Pages/why-change-for-life.aspx, there are also leaflets available and TV adverts to encourage change. SmokeFree NHS is a health promotion that aims to provide advice and support to help people stop smoking. The promotion provides information about the risks and dangers of smoking and informs people about the support that is available to help them quit. The purpose of the campaign is to raise awareness of the health risks associated with smoking and to encourage people to stop smoking or from starting to smoke. THINK is a government...

Words: 398 - Pages: 2

Free Essay

Week 10 Karanja

...8/9/2014 Prof. Karanja Week 10 Ch. 8 Ex. 5 An example of a good Six Sigma project would be discovering ways to improve traffic safety in my neighborhood. In the Ardwick-Ardmore district of Landover, Maryland, there are many problems with traffic patterns in the neighborhood. The main backbone, which is Ardwick-Ardmore Road is a constant strip of road with no deterrent traffic lights to delegate traffic flow. Turning onto this street from adjacent avenues can be risky due to the right of way that remains with participants traveling on Ardwick-Ardmore Road. By implementing a Six Sigma plan, traffic flow can be improved with changes in the grid plan. DEFINE: The problem at hand is the fact that the constant traffic flow on Ardwick-Ardmore Road can be dangerous to motorists traveling from adjacent roads. MEASURE: Data can be generated by using a survey for passing pedestrians based on their experiences on Ardwick-Ardmore road. Motorists can be selected at random to a timed trial of merging onto Ardwick-Ardmore road from their originated streets from which they traveled. Data results that include collisions, close-calls, and reckless driving will be accepted as valid entries. ANALYZE: Trends can be developed. There may be a possibility that traffic patterns increase during a specific timeframe, etc. IMPROVE: Implement new ideas to deter potential collisions and close-calls based off of the information collected. CONTROL: Continue to track the data input to validate assumptions...

Words: 253 - Pages: 2

Premium Essay

Type of Drivers

...What Type of Driver Are You? Driving is a task we must take part in on a daily basis, but after several years of driving in frustrating and hectic rush hour traffic one can begin to hate even the thought of going to the grocery store. The roads are filled with very different types of drivers; Competent, Overly Cautious, Distracted, and Reckless are just a few of them. How we determine which category we best fall under can be a challenge, because in our minds we think we are good drivers, but in most cases we’re too oblivious to these classifications. First, there are the rare competent drivers who drive safely by not speeding and obey the common driving laws. Competent drivers are always coming to a full stop, looking both ways, using turn signals, and yielding when necessary. This type of driver is the most agreeable of the bunch, putting others at no risk. More of them on the road and the world would be a better place. We tend to think of bad drivers as the ones who charge down the road, wrecking everything in their path, but is it just as bad to be too cautious? Second to the competent, are the overly cautious drivers. They seem to be the ones to cause traffic jams and frustrate other drivers, because they are so indecisive and unpredictable. You know the kind - won't speed up to merge and stops at the end of on-ramps, sits helplessly at a four-way stop because they don't know what to do, slams on the brakes for no apparent reason, and, of course, refusing to exceed the...

Words: 515 - Pages: 3