Monday, October 31, 2022

UCCX Finesse login error - Authorization failed. Contact your system administrator

 When you re-generate Cisco CUCM tomcat certificate, you may get this error on finesse. 


1- Download tomcat.pem from CUCM publisher and uploaded the new CUCM tomcat certificates on the UCCX nodes as tomcat trust


2- Reload the UCCX

Monday, September 5, 2022

Expressway E and C Setup - MRA

Mobile and Remote access System Configuration

Expressway MRA use for registering your remote endpoints registering with CUCM without using VPN










Few Points

* If your are deploying over WAN, minimum recommended latency is 80ms

* Remote devices will be communicating with Edge initially using the Public IP, E Usually deploy in DMZ. C takes care of LAN side communication towards CUCM

* There will be two interface for Edge. Internal and External.

* Remote devices will be registered over Core, on CUCM you could find the registered device IP as C

* If you have redundancy, Then both C act as Active - Active


---------------------DNS Records-----------------


1 -  Create PTR DNS Record for each Xpressway C host

2 -  Create Expressway Cluster DNS for Cluster C

3 - Create PTR DNS Record for each Xpressway E host

4 -  Create Expressway Cluster DNS for Cluster E

5 -  Create SRV Records

create 2 Recors for Expressway E [ port number 8443]

service : _collab-edge

Protocol: _tls


---------------------Installation MRA with Expressway-----------------

** Install Both E and C. Following are the basic config

1- Add your NTP server on C and Expressway

2- Change your root CLI password

 Default User Name - root Default Password TANDBERG

command to change password 'passwd'

3- Add Options key on Both C and E. Once you add Expressway series key system will show as whether its Core or Edge

4- Add DNS server IP'series

5- Configure Clustering on C and E

->enter the Cluster Name and then add the peer 1 and 2 host name/IP address

->Reboot both E and C. Once it rebooted check your clustering is Active

6- Configure Unified Communication 

-> Go to Configuration-> Unified Communications -> Choose Mobile and remote access

7- Configure Domain > Add your Domain

8- Add a link between C and  CUCM 

configuration -> Unified Communications -> Unified  CM Servers -> Enter FQDN or IP or Pub

enter AXL details. Once its added CM cluster will be auto added

9- Add CA Certificate and Root Certificates 

On C go to Maintenance -> Security Certificates->  Trusted CA Certificates -> Browse and add rootCA certificate



Reinstalling CUC and UCCX Subscriber

We had UCS C220, recently UCS upgraded to C240 M4SX. All the secondary UC servers were running on 220. This new UCS racked in service provider managed DC. So the IP details were different. I have re-installed the subscriber and added to existing cluster. procedure is simple, steps given below

Note - During the installation you would require to enter the Web-security details (CN,OU etc)
use 'show web-security' to get the details from CLI. you would require to enter the OS admin password as well

UCCX Installation:
  1.  Login CCX Administration -> Go to System -> Servers -> and delete the subscriber node -> Restart the Publisher
  2. Once publisher is restarted check System -> Servers. Make sure Subscriber is removed from the cluster
  3. Start the installation, during the installation choose that this node as subscriber and enter the publisher details. Once installation completed check the cluster and DB replication. New subscriber will be part of cluster now 
CUC  Installation:
  1.  Login CUC Administration -> Go to System Settings -> Cluster -> Click Find -> Choose the Subscriber node -> Delete it -> Restart the Publisher
  2. Once publisher is restarted, make sure Subscriber is removed from the cluster
  3. Start the installation, during the installation choose that this node as subscriber and enter the publisher details. Once installation completed check the cluster and DB replication. New subscriber will be part of cluster now 

Friday, August 7, 2020

CUBE - ADD Diversion header for a specific number in FROM header

 

We had migrated all the DID's to SIP provider, however the Toll free numbers we had from Different Provider. All agents phone masked with TFN, But Since TFN from different provider SIP ITSP rejected the outbound calls agent make. To pass the TFN we need to add a Diversion header so that it will be authenticated from ITST and then call will be routed

request INVITE sip-header From modify "(.*sip:Your TFN @.*)" "\1\x0D\x0ADiversion: <sip:DID from ITSP@CUEB IP Address>"


Below Diversion header also work 

request INVITE sip-header Diversion add "Diversion: <sip:DID@CUEB IP Address>"

Monday, May 11, 2020

device Model code risdb

When you run 'show risdb query list phone'  device name will not be shown. instead it will be in enum code. complete enum code s given below

enum name
15 EMCC Base Phone
20 SCCP Phone
30 Analog Access
40 Digital Access
42 Digital Access+
43 Digital Access WS-X6608
47 Analog Access WS-X6624
50 Conference Bridge
51 Conference Bridge WS-X6608
62 H.323 Gateway
70 Music On Hold
71 Device Pilot
73 CTI Route Point
80 Voice Mail Port
90 Route List
100 Load Simulator
110 Media Termination Point
111 Media Termination Point Hardware
120 MGCP Station
121 MGCP Trunk
122 GateKeeper
125 Trunk
126 Tone Announcement Player
254 Unknown MGCP Gateway
255 Unknown
52 Cisco IOS Conference Bridge (HDV2)
53 Cisco Conference Bridge (WS-SVC-CMM)
83 Cisco IOS Software Media Termination Point (HDV2)
84 Cisco Media Server (WS-SVC-CMM-MS)
112 Cisco IOS Media Termination Point (HDV2)
113 Cisco Media Termination Point (WS-SVC-CMM)
131 SIP Trunk
132 SIP Gateway
133 WSM Trunk
85 Cisco Video Conference Bridge (IPVC-35xx)
522 BlackBerry MVS VoWifi
640 Usage Profile
598 Ascom IP-DECT Device
599 Cisco TelePresence Exchange System
36041 Cisco TelePresence Conductor
36219 Interactive Voice Response
61 H.323 Phone
72 CTI Port
134 Remote Destination Profile
30027 Analog Phone
30028 ISDN BRI Phone
2 Cisco 12 SP+
3 Cisco 12 SP
4 Cisco 12 S
1 Cisco 30 SP+
5 Cisco 30 VIP
9 Cisco 7935
6 Cisco 7910
7 Cisco 7960
8 Cisco 7940
10 Cisco VGC Phone
11 Cisco VGC Virtual Phone
48 VGC Gateway
12 Cisco ATA 186
124 7914 14-Button Line Expansion Module
336 Third-party SIP Device (Basic)
374 Third-party SIP Device (Advanced)
115 Cisco 7941
119 Cisco 7971
20000 Cisco 7905
302 Cisco 7985
307 Cisco 7911
308 Cisco 7961G-GE
309 Cisco 7941G-GE
335 Motorola CN622
348 Cisco 7931
358 Cisco Unified Personal Communicator
365 Cisco 7921
369 Cisco 7906
375 Cisco TelePresence
376 Nokia S60
30002 Cisco 7920
30006 Cisco 7970
30007 Cisco 7912
30008 Cisco 7902
30016 Cisco IP Communicator
30018 Cisco 7961
30019 Cisco 7936
30032 SCCP gateway virtual phone
30035 IP-STE
404 Cisco 7962
412 Cisco 3951
431 Cisco 7937
434 Cisco 7942
435 Cisco 7945
436 Cisco 7965
437 Cisco 7975
446 Cisco 3911
550 Cisco ATA 187
631 Third-party AS-SIP Endpoint
36049 BEKEM 36-Button Line Expansion Module
613 Cisco TelePresence Profile 52 (C60)
540 Cisco 8961
228 7915 24-Button Line Expansion Module
586 Cisco 8941
628 IMS-integrated Mobile (Basic)
36227 Cisco TelePresence MX800 Dual
493 Cisco 9971
36241 Cisco TelePresence DX70
36225 Cisco 8865
478 Cisco TelePresence 1000
562 Cisco Dual Mode for iPhone
606 Cisco TelePresence Codec C90
617 Cisco TelePresence MX200
253 SPA8800
611 Cisco TelePresence Profile 42 (C60)
620 Cisco TelePresence TX9200
582 Generic Single Screen Room System
684 Cisco 8851
497 Cisco 6961
593 Cisco Cius
584 Cisco TelePresence EX90
607 Cisco TelePresence Codec C60
621 Cisco 7821
36042 Cisco DX80
503 Cisco Unified Client Services Framework
232 CKEM 36-Button Line Expansion Module
688 Cisco TelePresence SX80
689 Cisco TelePresence MX200 G2
604 Cisco TelePresence EX60
36232 Cisco 8851NR
610 Cisco TelePresence Profile 42 (C20)
521 Transnova S3
548 Cisco 6911
558 Cisco TelePresence 400
36217 Cisco 8811
229 7916 12-Button Line Expansion Module
36216 Cisco 8821
36043 Cisco DX70
585 Cisco 8945
632 Cisco Cius SP
577 Cisco 7926
481 Cisco TelePresence 500-37
642 Carrier-integrated Mobile
633 Cisco TelePresence Profile 42 (C40)
36239 Cisco TelePresence DX80
564 Cisco 6945
583 Generic Multiple Screen Room System
626 Cisco TelePresence SX20
652 Cisco Jabber for Tablet
608 Cisco TelePresence Codec C40
623 Cisco 7861
690 Cisco TelePresence MX300 G2
616 Cisco TelePresence Profile 65 Dual (C90)
622 Cisco 7841
635 CTI Remote Device
468 Cisco Unified Mobile Communicator
614 Cisco TelePresence Profile 52 Dual (C60)
36213 Cisco 7811
681 Cisco ATA 190
505 Cisco TelePresence 1300-65
682 Cisco TelePresence SX10
86 Cisco IOS Heterogeneous Video Conference Bridge
484 Cisco 7925
615 Cisco TelePresence Profile 65 (C60)
592 Cisco 3905
634 Cisco VXC 6215
575 Cisco Dual Mode for Android
88 Cisco IOS Homogeneous Video Conference Bridge
547 Cisco 6901
520 Cisco TelePresence 1100
588 Generic Desktop Video Endpoint
479 Cisco TelePresence 3000
480 Cisco TelePresence 3200
36210 Cisco TelePresence IX5000
591 Cisco TelePresence 1300-47
627 Cisco TelePresence MX300
36224 Cisco 8845
645 Universal Device Template
36207 Cisco TelePresence MX700
619 Cisco TelePresence TX9000
580 Cisco E20
537 Cisco 9951
594 VKEM 36-Button Line Expansion Module
597 Cisco TelePresence MCU
659 Cisco 8831
648 Cisco Unified Communications for RTX
685 Cisco 8861
36208 Cisco TelePresence MX800
495 Cisco 6921
230 7916 24-Button Line Expansion Module
590 Cisco TelePresence 500-32
647 Cisco DX650
36235 Cisco Spark Remote Device
557 Cisco TelePresence 200
683 Cisco 8841
496 Cisco 6941
87 Cisco IOS Guaranteed Audio Video Conference Bridge
609 Cisco TelePresence Quick Set C20
227 7915 12-Button Line Expansion Module
596 Cisco TelePresence TX1310-65
612 Cisco TelePresence Profile 52 (C40)

Saturday, January 11, 2020

How to change Cisco CIMC Password

The procedure to change CIMC Password

1- Login CIMC GUI
2- Admin -> User Management
3- Click on the Admin Account -> Select Modify user 
4- In the pop up  window tick Chanage Password
5- Enter the new password and Save
6- You don’t need to restart any service or CIMC to effect the changes
7- You can logout and login back to check new password

Cisco UCS firmware upgrade


Recently I have upgraded UCS C240 from firmware to 4.0,



1-      Download UCS CIMC firmware from Cisco.com (Path Downloads Home >>Servers - Unified Computing>>UCS C-Series Rack-Mount Standalone Server Software>>UCS C240 M5 Rack Server Software)

2-      Login CIMC and Launch KVM (I was using Java)

3-      Activate the Virtual Devices from Virtual Media tab

4-      Map the ISO to the CD/DVD option.

5-      Then reboot the system waiting for the option to press F6

6-      select the Cisco vKVM-Mapped option (Cisco vKVM-Mapped vDVD1xx)

7-      Now the system will start copying the files and will perform some checks. This step would take 10-15 mins

8-      Host Upgrade Utility will show you list of upgrades, choose all or Specific

9-      When the upgrade completes all components will have status PASS: this would take 20-40 mins

10-   Click Exit and the server will reboot and activate the new CIMC. Wait for the server to come back up and you will see that CIMC has been upgraded

Ref below document, which talks about UCS firmware upgrade brief with screen shot.