Being one of the UC market leaders, Cisco thoroughly supports its partner ecosystem providing Cisco Solution Partners with APIs and SDKs, labs and sandboxes to build UC-enabled solutions. Hundreds of Cisco technology partners worldwide develop software on top of Cisco Unified Communications Manager that helps employees to collaborate, sell, support and… among the CUCM-integrated apps you can find solutions improving the enterprise security.
These apps either increase the security of the CUCM-based communications network or use Cisco UC solutions to provide the enterprise security features. Here are several examples to get you an idea of what can be achieved with 3rd party apps integrated with Cisco UCM. Continue reading ‘Ways to Improve the Enterprise Security with Cisco UCM Apps’ »
I have been using this lab for casual testing & verification in my daily-work as well as Collaboration CCIE preparation during past 2 years. It should enable you to play with most basic features though emulating any hardware (like E1 or DSP etc) is still impossible. This platform was subjected to frequent changes and refinements in past 2 years, plus I have not touched it for quite a long time since I passed my Collaboration CCIE, so you might need to tweak it a bit before it can work perfectly for you.
Installing Windows Server 2008 R2 and Setup Active Directory
Exchange 2010 Step-by-Step Install
During the login of jabber client, it communicates with several UC servers like CUPS, CUCM, UnityConnection etc for authentication, config file downloading, registering. Most of those traffic is carried through HTTPS/XML. Therefore, in order to have a deep dive into the Jabber client login sequences and have an idea about what exactly is happening during Jabber login, decrypting HTTPS traffic between Jabber client and UC Servers is required. 2 steps to get it done, which are downloading the private key from UC Server, and inputting the private key into wireshark for decryption.
Method for Installing Jabber for windows
“User the Command Line”or “Create a Custom Installer”aims to specifying some login & system-level config parameters (such as whether clear existing bootstrap file, Server Type[CUP, Webex or CUCM], Server IP address, Domain, Install Language, Phone Mode, etc) during Installation. All those parameters are stored in a Bootstrap file (jabber-bootstrap.properties file – location: C:\ProgramData\Cisco Systems\Cisco Jabber) which will be read by Jabber for every login attempt.
“Run the MSI Manually”suits for a fresh install without any login & config parameters specified. When user logins, he has to manually select server type, server IP address etc. Note that, this install method will not clear local existing Bootstrap file and that might result in unexpected login results.
The jabber-bootstrap.properties file enables you to change login or system-level configs for Jabber client even when jabber is already installed. For example, edit jabber-bootstrap.properties file (location: C:\ProgramData\Cisco Systems\Cisco Jabber) and type UseLanguageID:1033 to change the client language.
CUPS is a cisco UC component which provides IM, Presence, Group Chat (Ad-hoc or Persistent) and also allows seamless integration with other UC components. There are basically 3 roles in Presence work flow. Watcher(could be a phone, client, trunk etc), Presence Entity, and Presence Server.The presence entity publishes its current status to the presence server by using a PUBLISH or REGISTER message(SIP/SIMPLE clients), or by using an XML Presence Stanza (XMPP clients).
What is Active Directory
Active Directory (AD): is Database storing all kinds of Objects and Policies which apply to the interoperations between Objects.
Object: It is the minimum component in the database that AD manipulates and each Object is associated with a set of mandatory and optional attributes or properties. Object can stand for User, Computer, Printer, Shared Folders or any other resources that used in a organization. Typical Objects in AD include Forest / Domain / OU / User / Group / Contact / Computer / Shared Folder / Printer / Site / Subnet etc.
Both Container Object & Leaf Object are identified in its own Organization Unity or Container by Common Name (CN) which is also termed Relative Distinguish Name (RDN). However, globally throughout the domian, each object is uniquely identified by Distinguished Name (DN).
Search Description: cn=users, dc=uclab, dc=com
Bulk Import or Update using CUCM BAT could be quite tricky if you initially taste it without review its long official user guide and possess very little hands-on experience of it. This post entails the critical tips that you have to bear in mind for BAT transaction, and walks you through the practice-verified BAT transaction procedure derived from my experiences in those cisco UC projects. Hopefully, this post can significantly reduce your time wasting in coping with all kinds of format errors, character encoding issues etc encountered during the BAT operation.
Rules to Keep in mind
Why GK & CUBE
Gatekeeper was initially introduced to interconnected several CUCM clusters in a simple and efficient way in large scale IPT network. Call Routing on GK is a 2-matching-steps (Zone Prefix & Technology Prefix) deal. Apart from that, GK also provides supplementary functions such as BW management, Call Admission Control, Name resolution etcs. Besides, GK also provides faster inter-cluster trunk failover than the scenario in which CUCM clusters inter-connected without GK.
CUBE (IPIPGW+SBC) was introduced to replace existing TDM-based (E1/T1) interconnection between Enterprise voice network and PSTN with pure IP-base connection (SIP Trunk). CUBE expands pure IP-based multimedia communication from Enterprise level to Service Provider Level. It also enables pure IP-based interconnection between 2 independent VoIP networks with better interoperatibility, flexibility and compatiblity. How does CUBE achieve that? It is actually done through signaling & medial interworking (terminate & re-orginate), interconnecting VoIP dial peers. Furthermore, as a device in voice network border (SBC: session border controller), it also provides Security features (NAT, NAT Traversal, AAA with RADIUS), QoS and Bandwidth Management.