Cisco Expressway Administrator Guide X8 7
Cisco Expressway Administrator Guide X8 7
Administrator Guide
Last Updated: February 2016
Offers proven and highly secure firewall-traversal technology to extend your organizational reach.
Helps enable business-to-business, business-to-consumer, and business-to-cloud-service-provider
connections.
Provides session-based access to comprehensive collaboration for remote workers, without the need for a
separate VPN client.
Supports a wide range of devices with Cisco Jabber for smartphones, tablets, and desktops.
Complements bring-your-own-device (BYOD) strategies and policies for remote and mobile workers.
The Expressway is deployed as a pair: an Expressway-C with a trunk and line-side connection to Unified CM, and an
Expressway-E deployed in the DMZ and configured with a traversal zone to an Expressway-C.
2
Cisco Expressway Administrator Guide
The Expressway is available on a dedicated CESeries appliance and also runs on VMware on a range of Cisco UCS
servers. See Expressway on Virtual Machine Installation Guide on the Expressway Install Guides page for more
information.
3
Cisco ExpresswayAdministrator Guide
Expressway-C
Expressway-C delivers any-to-any enterprise wide conference and session management and interworking
capabilities. It extends the reach of telepresence conferences by enabling interworking between Session Initiation
Protocol (SIP)- and H.323-compliant endpoints, interworking with third-party endpoints; it integrates with Unified CM
and supports third-party IP private branch exchange (IP PBX) solutions. Expressway-C implements the tools required
for creative session management, including definition of aspects such as routing, dial plans, and bandwidth usage,
while allowing organizations to define call-management applications, customized to their requirements.
Expressway-E
The Expressway-E deployed with the Expressway-C enables smooth video communications easily and securely
outside the enterprise. It enables business-to-business video collaboration, improves the productivity of remote and
home-based workers, and enables service providers to provide video communications to customers. The application
performs securely through standards-based and secure firewall traversal for all SIP and H.323 devices. As a result,
organizations benefit from increased employee productivity and enhanced communication with partners and
customers.
It uses an intelligent framework that allows endpoints behind firewalls to discover paths through which they can pass
media, verify peer-to-peer connectivity through each of these paths, and then select the optimum media connection
path, eliminating the need to reconfigure enterprise firewalls.
The Expressway-E is built for high reliability and scalability, supporting multivendor firewalls, and it can traverse any
number of firewalls regardless of SIP or H.323 protocol.
Standard Features
The primary purpose of the Expressway is to provides secure firewall traversal and session-based access to Cisco
Unified Communications Manager for remote workers, without the need for a separate VPN client.
Rich media session features
The following features are available when rich media session licenses are installed on the Expressway:
SIP Proxy
SIP / H.323 interworking
IPv4 and IPv6 support, including IPv4 / IPv6 interworking
QoS tagging
Bandwidth management on both a per-call and a total usage basis
Automatic downspeeding option for calls that exceed the available bandwidth
URI and ENUM dialing via DNS, enabling global connectivity
Up to 100 rich media sessions on a standard Small/Medium system and 500 rich media sessions on a Large
system
1000 external zones with up to 2000 matches
Flexible zone configuration with prefix, suffix and regex support
Can be neighbored with other systems such as a Cisco VCS or other gatekeepers and SIP proxies
Can be clustered with up to 6 Expressways to provide n+1 redundancy, and up to 4 x individual capacity.
Intelligent Route Director for single number dialing and network failover facilities
Call Policy (also known as Administrator Policy) including support for CPL
Support for external policy servers
4
Cisco Expressway Administrator Guide
Optional Features
Some Expressway features are available by the purchase and installation of the appropriate option key:
Advanced Networking
The Advanced Networking option enables the LAN 2 Ethernet port on the Expressway-E, allowing you to have a
secondary IP address for your Expressway. This option also includes support for deployments where the Expressway-
E is located behind a static NAT device, allowing it to have separate public and private IP addresses.
This configuration is intended for deployments where the Expressway-E is located in a DMZ between two separate
firewalls on separate network segments.
5
Cisco ExpresswayAdministrator Guide
See Expressway on Virtual Machine Installation Guide on the Expressway Install Guides page for more information.
CESeries Appliances
The Expressway is available as a dedicated CESeries appliance based on UCShardware, as follows:which is based
on a UCS C220 M3L:
CE500 appliance: used for standard installations. Based on a UCS C220 M3L and is equivalent to a Medium
VM
CE1000 appliance: offers extra performance and scalability capabilities. Based on a UCS C220 M3L and is
equivalent to a Large VM
CE1100 appliance:a new platform introduced to fit the UCSM4 chassis. Based on a UCSC220 M4L, replaces
the CE500 and CE1000. The CE1100 appliance operates as a medium capacity or large capacity Expressway,
depending on whether you install 1 Gbps or 10 Gbps NICs.
See the CE Series appliance installation guides for more information.
Related Documentation
See Related Documentation, page 364 for a full list of documents and web sites referenced in this guide.
6
Cisco Expressway Administrator Guide
Training
Training is available online and at our training locations. For more information on all the training we provide and where
our training offices are located, visit www.cisco.com/go/telepresencetraining.
Glossary
A glossary of TelePresence terms is available at: https://tp-tools-web01.cisco.com/start/glossary/.
Accessibility Notice
Cisco is committed to designing and delivering accessible products and technologies.
The Voluntary Product Accessibility Template (VPAT) for Cisco Expressway is available here:
http://www.cisco.com/web/about/responsibility/accessibility/legal_regulatory/vpats.html#telepresence
You can find more information about accessibility here:
www.cisco.com/web/about/responsibility/accessibility/index.html
7
Cisco ExpresswayAdministrator Guide
8
Cisco Expressway Administrator Guide
Command Types
Commands are divided into the following groups:
xStatus: these commands return information about the current status of the system. Information such as
current calls is available through this command group. See Command Reference xStatus, page 345 for a full
list of xStatus commands.
xConfiguration: these commands allow you to add and edit single items of data such as IP address and zones.
See Command Reference xConfiguration, page 283 for a full list of xConfiguration commands.
xCommand: these commands allow you to add and configure items and obtain information. See Command
Reference xCommand, page 328 for a full list of xCommand commands.
xHistory: these commands provide historical information about calls.
xFeedback: these commands provide information about events as they happen, such as calls.
Note that:
Typing an xConfiguration path into the CLI returns a list of values currently configured for that element (and
sub-elements where applicable).
Typing an xConfiguration path into the CLI followed by a ? returns information about the usage for that
element and sub-elements.
Typing an xCommand command into the CLI with or without a ? returns information about the usage of that
command.
9
Cisco ExpresswayAdministrator Guide
The elements included in the example web pages shown here are described in the table below.
Page Description
element
Page name Every page shows the page name and the menu path to that page. Each part of the menu
and location path is a link; clicking on any of the higher level menu items takes you to that page.
System This icon appears on the top right corner of every page when there is a system alarm in
alarm place. Click on this icon to go to the Alarms page which gives information about the alarm
and its suggested resolution.
Help This icon appears on the top right corner of every page. Clicking on this icon opens a new
browser window with help specific to the page you are viewing. It gives an overview of the
purpose of the page, and introduces any concepts configured from the page.
Log out This icon appears on the top right corner of every page. Clicking on this icon ends your
administrator session.
10
Cisco Expressway Administrator Guide
Page Description
element
Field level An information box appears on the configuration pages whenever you either click on the
information Information icon or click inside a field. This box gives you information about the particular
field, including where applicable the valid ranges and default value. To close the
information box, click on the X at its top right corner.
Information The Expressway provides you with feedback in certain situations, for example when
bar settings have been saved or when you need to take further action. This feedback is given in
a yellow information bar at the top of the page.
Sorting Click on column headings to sort the information in ascending and descending order.
columns
Select All Use these buttons to select and unselect all items in the list.
and Unselect
All
Peer- When an Expressway is part of a cluster, most items of configuration are applied to all
specific peers in a cluster. However, items indicated with a must be specified separately on each
configuration cluster peer.
item
System The name of the user currently logged in and their access privileges, the system name (or
Information LAN 1 IPv4 address if no system name is configured), local system time, currently selected
language, serial number and Expressway software version are shown at the bottom of the
page.
Note that you cannot change configuration settings if your administrator account has read-only privileges.
11
Cisco ExpresswayAdministrator Guide
Mobile and Remote Access with Cisco IPPhone 78/8800 Series Supported
12
Cisco Expressway Administrator Guide
For example, consider a cluster of four large VMs. If you set Maximum RDP transcode sessions to 20, then the
cluster would provide up to 80 simultaneous screen shares.
To configure your Cisco Collaboration environment to interoperate with Microsoft Lync, see the Microsoft Lync and
Cisco Expressway Deployment Guide on the Cisco Expressway Series Configuration Guides page.
Mobile and Remote Access with Cisco IPPhone 78/8800 Series
Mobile and Remote Access is now officially supported with the Cisco IPPhone 78/8800 Series, when the phones are
running firmware version 11.0(1) or later. We recommend Expressway X8.7 or later for use with these phones.
Cisco DX650
Cisco DX80
Cisco DX70
When deploying DXSeries or IPPhone 78/8800 Series endpoints to register with Cisco Unified Communications
Manager via Mobile and Remote Access, you need to be aware of the following:
Phone security profile: If the phone security profile for any of these endpoints has TFTPEncrypted Config
checked, you will not be able to use the endpoint via Mobile and Remote Access. This is because the
MRAsolution does not support devices interacting with CAPF(Certificate Authority Proxy Function).
Trust list: You cannot modify the root CAtrust list on these endpoints. Make sure that the Expressway-E's
server certificate is signed by one of the CAs that the endpoints trust, and that the CA is trusted by the
Expressway-C and the Expressway-E.
Bandwidth restrictions: The Maximum Session Bit Rate for Video Calls on the default region on Cisco
Unified Communications Manager is 384 kbps by default. The Default call bandwidth on Expressway-C is also
384 kbps by default. These settings may be too low to deliver the expected video quality for the DXSeries.
Hybrid Services and Expressway/VCSRebranding
We have changed some terminology in this release:
Expressway/VCS base
In previous versions of the Cisco Expressway Series and the Cisco TelePresence Video Communication
Server, the software was always branded as "VCSControl" before you activated it with a release key.
In X8.7, the product is now called "Expressway/VCSbase" when it is in this pre-activation state, which
shows that it can be activated as an Expressway or as a VCS.
These changes prepare us for a future release that will change the user experience of defining the purpose of
your Expressway.
Hybrid Services
Version X8.6.1 included support for a feature called "Cloud Extensions". That feature has been renamed to
"Hybrid Services" in the UI, documentation, and Cloud Collaboration Management.
Hybrid Services is a group name for a family of user services that are delivered in part by the Cisco
Collaboration Cloud and in part by your on-premises equipment.
The Expressway/VCSbase does not need a release key to register for Hybrid Services. After you register the
Expressway/VCSbase, it will be branded "Cisco Expressway base". You don't need to apply a release key for
subsequent upgrades.
Note:For these reasons, we are requiring new Hybrid Services customers to use version X8.7. If you are using X8.6.1
for Hybrid Services, we strongly recommend upgrading to X8.7.
13
Cisco ExpresswayAdministrator Guide
Note:The virtual Expressway now has virtual hardware version 8. This means that new installations of virtual
Expressway require ESXi 5.0 or later, and will not run on ESX/ESXi 4.x or earlier.
Keyword Filter for Syslog Output
You can now use keywords to filter the logs that Expressway sends to each remote syslog host. You can enter
comma delimited words or phrases, and the syslog daemon will only forward log messages that match at least one of
those keywords.
The keyword filter gives you more control over the types of messages that are published. You may only be interested
in some types of messages, or you may not be allowed to send potentially sensitive information over the channel to
the syslog server.
The user interface has also been improved as part of this change. In addition to the new keyword filter field, we've
added more granular control over the message format and transport connection. Previously, these options were
grouped into a "Mode" field and you could not configure them unless you chose the "Custom" mode.
Changes and Minor Enhancements
Multistream support is disabled in this release, pending a complete implementation in a future release.
Anew CLIcommand allows you to set the cipher suites used when the Expressway authenticates with the
ADdomain for LDAPqueries. The command is xconfiguration Authentication ADS CipherSuite.
A Hybrid Services menu item has been added to the Expressway-E, to support Expressway-based hybrid
services that are currently in development. The new menu item (Applications >Hybrid Services >Certificate
management) has no explicit purpose for X8.7.
Anew system metric has been added to monitor each CPUcore independently.
New parameters have been added to the .ova file so you can configure the VM's network properties when
deploying through vCenter.
See Cisco Expressway Virtual Machine Installation Guide on the Expressway installation guides page.
There is a delay when you deploy virtual machines with pre-configured network parameters. The deployment
will take a few minutes longer than deploying the VMwithout pre-configured network parameters.
The Expressway deployment guide now warns against choosing a single NIC, static NAT deployment of the
Expressway-E. The preferred option for deploying the Expressway-E in the DMZis to use both NICs.
See Cisco Expressway Basic Configuration Deployment Guide on the Expressway configuration guides page.
14
Cisco Expressway Administrator Guide
15
Network and System Settings
This section describes network services and settings related options that appear under the System menu of the web
interface. These options enable you to configure the Expressway in relation to the network in which it is located, for
example its IP settings, firewall rules, intrusion protection and the external services used by the Expressway (for
example DNS, NTP and SNMP).
Network Settings 16
Intrusion Protection 20
Network Services 26
Configuring External Manager Settings 33
Network Settings
Note: We recommend Auto unless the connected switch is unable to auto-negotiate. A mismatch in speed/duplex
mode between the two ends of the connection will cause packet loss and could make the system inaccessible.
Configuring IP Settings
The IP page (System > Network interfaces >IP) is used to configure the IP protocols and network interface settings
of the Expressway.
IP Protocol Configuration
You can configure whether the Expressway uses IPv4, IPv6 or Both protocols. The default is Both.
IPv4: it only takes calls between two endpoints communicating via IPv4. It communicates with other systems
via IPv4 only.
IPv6: it only takes calls between two endpoints communicating via IPv6. It communicates with other systems
via IPv6 only.
Both: it takes calls using either protocol. If a call is between an IPv4-only and an IPv6-only endpoint, the
Expressway acts as an IPv4 to IPv6 gateway. It communicates with other systems via either protocol.
All IPv6 addresses configured on the Expressway are treated as having a /64 network prefix length.
16
Cisco Expressway Administrator Guide
The Expressway can act as a gateway for calls between IPv4 and IPv6 devices. To enable this feature, select an IP
protocol of Both.
IPGateways
You can set the default IPv4 gateway and IPv6 gateway used by the Expressway. These are the gateways to which
IP requests are sent for IP addresses that do not fall within the Expressways local subnet.
The default IPv4 gateway is 127.0.0.1, which should be changed during the commissioning process.
The IPv6 gateway, if entered, must be a static global IPv6 address. It cannot be a link-local or a stateless
auto-configuration (SLAAC) IPv6 address.
LAN Configuration
LAN 1 is the primary network port on the Expressway. You can configure the IPv4 address and subnet mask, the
IPv6 address and the Maximum transmission unit (MTU) for this port.
The Expressway is shipped with a default IP address of 192.168.0.100 (for both LAN ports). This lets you
connect the Expressway to your network and access it via the default address so that you can configure it
remotely.
The IPv6 address, if entered, must be a static global IPv6 address. It cannot be a link-local or a stateless
auto-configuration (SLAAC) IPv6 address.
If you have Advanced Networking installed, you can also configure these options for the LAN 2 port.
The Maximum transmission unit (MTU) defaults to 1500 bytes.
Dual network interfaces are intended for deployments where the Expressway-E is located in a DMZ between two
separate firewalls on separate network segments. In such deployments, routers prevent devices on the internal
network from being able to route IP traffic to the public internet, and instead the traffic must pass through an
application proxy such as the Expressway-E.
To enable the use of dual network interfaces:
1. Ensure that the Advanced Networking option key is installed on the Expressway-E.
2. Set Use dual network interfaces to Yes.
3. Set ExternalLAN interface to LAN2.
LAN 2 should be used as the public interface of the Expressway-E (if the Expressway-E is ever clustered, LAN
1 must be used for clustering, and the clustering interface must not be mapped through a NAT).
This setting also determines the port from which TURN server relay allocations are made.
Note that:
You should configure the LAN 1 port and restart the Expressway before configuring the LAN 2 port.
The LAN 1 and LAN 2 interfaces must be on different, non-overlapping subnets.
If you have Advanced Networking enabled but only want to configure one of the Ethernet ports, you must use
LAN 1.
17
Cisco ExpresswayAdministrator Guide
If the Expressway-E is in the DMZ, the outside IP address of the Expressway-E must be a public IP address, or
if static NAT mode is enabled, the static NAT address must be publicly accessible.
The Expressway-E may also be used to traverse internal firewalls within an enterprise. In this case the
"public" IP address may not be publicly accessible, but is an IP address accessible to other parts of the
enterprise.
If you need to change the IPaddresses on one or both interfaces, you can do it via the UIor the CLI. You can
change both at the same time if required, and the new addresses take effect after a restart.
You can deploy the Expressway-E behind a static NAT device, allowing it to have separate public and private IP
addresses. This feature is intended for use in deployments where the Expressway-E is located in a DMZ, and has the
Advanced Networking feature enabled.
In these deployments, the externally-facing LAN port has static NAT enabled in order to use both a private and public
IPv4 address; the internally facing LAN port does not have static NAT enabled and uses a single IPv4 (or IPv6)
address.
In such a deployment, traversal clients should be configured to use the internally-facing IP address of the
Expressway-E.
To enable the use of a static NAT:
Note:The combination of having static NATmode on and having the B2BUA engaged to do media
encryption/decryption can cause the firewall outside the Expressway-E to mistrust packets originating from the
Expressway-E. You can work around this by configuring the firewall to allow NATreflection. If your firewall cannot
allow this, you must configure the traversal path such that the B2BUAon the Expressway-E is not engaged.
LDAP server
NTP server
18
Cisco Expressway Administrator Guide
You are recommended to use an IP address or FQDN (Fully Qualified Domain Name) for all server addresses.
Note that the FQDN of the Expressway is the System host name plus the Domain name.
Impact on SIP messaging
The System host name and Domain name are also used to identify references to this Expressway in SIP messaging,
where an endpoint has configured the Expressway as its SIP proxy in the form of an FQDN (as opposed to an IP
address, which is not recommended).
In this case the Expressway may, for example, reject an INVITE request if the FQDN configured on the endpoint does
not match the System host name and Domain name configured on the Expressway. (Note that this check occurs
because the SIP proxy FQDN is included in the route header of the SIP request sent by the endpoint to the
Expressway.)
DNS requests
By default, DNS requests use a random port from within the system's ephemeral port range.
If required, you can specify a custom port range instead by setting DNSrequests port range to Use a custom port
range and then defining the DNS requests port range start and DNS requests port range end fields. Note that
setting a small source port range will increase your vulnerability to DNS spoofing attacks.
Use FQDNs (Fully Qualified Domain Names) instead of IP addresses when specifying external addresses (for
example for LDAP and NTP servers, neighbor zones and peers).
Use features such as URI dialing or ENUM dialing.
Default DNS servers
You can specify up to 5 default DNS servers.
The Expressway only queries one server at a time; if that server is not available the Expressway will try another
server from the list.
The order that the servers are specified is not significant; the Expressway attempts to favor servers that were
last known to be available.
Per-domain DNS servers
In addition to the 5 default DNS servers, you can specify 5 additional explicit DNS servers for specified domains. This
can be useful in deployments where specific domain hierarchies need to be routed to their explicit authorities.
For each additional per-domain DNS server address you can specify up to 2 Domain names. Any DNS queries under
those domains are forwarded to the specified DNS server instead of the default DNS servers.
You can specify redundant per-domain servers by adding an additional per-domain DNS server address and
associating it with the same Domain names. In this scenario, DNS requests for those domains will be sent in parallel
to both DNS servers.
Tip: you can also use the DNS lookup tool (Maintenance > Tools > Network utilities > DNS lookup) to check which
domain name server (DNS server) is responding to a request for a particular hostname.
Caching DNSRecords
To improve performance, DNS lookups may be cached. This cache is flushed automatically whenever the DNS
configuration is changed.
You can also force the cache to be flushed by clicking Flush DNS cache.
19
Cisco ExpresswayAdministrator Guide
Static Routes
You can define static routes from the Expressway to an IPv4 or IPv6 address range. Go to System >Network
interfaces >Static routes.
On this page you can view, add, and delete static routes.
Static routes are sometimes required when using the Advanced Networking option and deploying the Expressway in
a DMZ. They may also be required in other complex network deployments.
To add a static route:
1. Enter the base destination address of the new static route from this Expressway
For example, enter 203.0.113.0 or 2001:db8::
2. Enter the prefix length that defines the range
Extending the example, you could enter 24 to define the IPv4 range 203.0.113.0 - 203.0.113.255, or 32 to
define the IPv6 range 2001:db8:: to 2001:db8:ffff:ffff:ffff:ffff:ffff:ffff.
The address range field shows the range calculated by the Expressway from the IPaddress and Prefix length.
3. Enter the IPaddress of the gateway for your new route
4. Select an ethernet interface for your new route
This option is only available if the second ethernet interface is enabled. Select LAN1 or LAN2 to force the
route via that interface, or select Auto to allow the Expressway to make this route on either interface.
5. Click Create route
The new static route is listed in the table. You can delete routes from this table if necessary.
Notes
IP routes can also be configured using the CLI, using xCommand RouteAdd and the xConfiguration IPRoute
commands.
You can configure routes for up to 50 network and host combinations.
Do not configure IP routes by logging in as root and using ip route statements.
Intrusion Protection
Dynamic system rules: these rules ensure that all established connections/sessions are maintained. They also
include any rules that have been inserted by the automated detection feature as it blocks specific addresses.
20
Cisco Expressway Administrator Guide
Specify the source IP address subnet from which to allow or deny traffic.
Choose whether to drop or reject denied traffic.
Configure well known services such as SSH, HTTP/HTTPS or specify customized rules based on transport
protocols and port ranges.
Configure different rules for the LAN 1 and LAN 2 interfaces (if the Advanced Networking option key is
installed), although note that you cannot configure specific destination addresses such as a multicast
address.
Specify the priority order in which the rules are applied.
New or modified rules are shown as Pending (in the State column).
Deleted rules are shown as Pending delete.
3. When you have finished configuring the new set of firewall rules, click Activate firewall rules.
4. Confirm that you want to activate the new rules. This will replace the existing set of active rules with the set
you have just configured.
After confirming that you want to activate the new rules, they are validated and any errors reported.
21
Cisco ExpresswayAdministrator Guide
5. If there are no errors, the new rules are temporarily activated and you are taken to the Firewall rules
confirmation page.
You now have 15 seconds to confirm that you want to keep the new rules:
Click Accept changes to permanently apply the rules.
If the 15 seconds time limit expires or you click Rollback changes, the previous rules are reinstated and you
are taken back to the configuration page.
The automatic rollback mechanism provided by the 15 seconds time limit ensures that the client system that
activated the changes is still able to access the system after the new rules have been applied. If the client
system is unable to confirm the changes (because it can no longer access the web interface) then the
rollback will ensure that its ability to access the system is reinstated.
When configuring firewall rules, you also have the option to Revert all changes. This discards all pending changes
and resets the working copy of the rules to match the current active rules.
Rule settings
The configurable options for each rule are:
Priority The order in which the The rules with the highest priority (1, then 2, then 3 and so on) are
firewall rules are applied. applied first.
Firewall rules must have unique priorities. Rule activation will fail if
there are multiple rules with the same priority.
Interface The LAN interface on which This only applies if the Advanced Networking option key is installed.
you want to control access.
IPaddress These two fields together The Address range field shows the range of IP addresses to which
and Prefix determine the range of IP the rule applies, based on the combination of the IP address and
length addresses to which the rule Prefix length.
applies.
The prefix length range is 0-32 for an IPv4 address, and 0-128 for an
IPv6 address.
Service Choose the service to which Note that if the destination port of a service is subsequently
the rule applies, or choose reconfigured on the Expressway, for example from 80 to 8080, any
Custom to specify your own firewall rules containing the old port number will not be automatically
transport type and port updated.
ranges.
Start and The port range to which the Only applies if specifying a UDP or TCP Custom service.
end port rule applies.
22
Cisco Expressway Administrator Guide
Action The action to take against Dropping the traffic means that potential attackers are not provided
any IP traffic that matches with information as to which device is filtering the packets or why.
the rule.
For deployments in a secure environment, you may want to configure
Allow: Accept the traffic. a set of low priority rules (for example, priority 50000) that deny
access to all services and then configure higher priority rules (for
Drop: Drop the traffic example, priority 20) that selectively allow access for specific IP
without any response to the addresses.
sender.
Description An optional free-form If you have a lot of rules you can use the Filter by description options
description of the firewall to find related sets of rules.
rule.
23
Cisco ExpresswayAdministrator Guide
1. Go to System >Administration.
2. Set Automated protection service to On.
3. Click Save.
4. You must then ensure that the required protection categories are enabled and configured, and that any
required exemptions are specified, as described below.
All protection categories are disabled by default.
Status: this indicates if the category is configured to be On or Off. When On, it additionally indicates the state
of the category: this is normally Active, but may temporarily display Initializing or Shutting down when a
category has just been enabled or disabled. Check the alarms if it displays Failed.)
Currently blocked: the number of addresses currently being blocked for this category.
Total failures: the total number of failed attempts to access the services associated with this category.
Total blocks: the total number of times that a block has been triggered. Note that:
The Total blocks will typically be less than the Total failures (unless the Trigger level is set to 1).
The same address can be blocked and released several times per category, with each occurrence counting
as a separate block.
Exemptions: the number of addresses that are configured as exempt from this category.
From this page, you can also view any currently blocked addresses or any exemptions that apply to a particular
category.
Enabling and disabling categories
To enable or disable one or more protection categories:
24
Cisco Expressway Administrator Guide
Configuring Exemptions
The Automated detection exemptions page (System > Protection >Automated detection > Exemptions) is used to
configure any IP addresses that are to be exempted always from one or more protection categories.
To configure exempted addresses:
It shows all currently blocked addresses and from which categories those addresses have been blocked.
You can unblock an address, or unblock an address and at the same time add it to the exemption list. Note
that if you want to permanently block an address, you must add it to the set of configured firewall rules.
If you access this page via the links on the Automated detection overview page it is filtered according to your chosen
category. It also shows the amount of time left before an address is unblocked from that category.
Each peer maintains its own count of connection failures and the trigger threshold must be reached on each
peer for the intruder's address to be blocked by that peer.
25
Cisco ExpresswayAdministrator Guide
Addresses are blocked against only the peer on which the access failures occurred. This means that if an
address is blocked against one peer it may still be able to attempt to access another peer (from which it may
too become blocked).
A blocked address can only be unblocked for the current peer. If an address is blocked by another peer, you
must log in to that peer and then unblock it.
Category settings and the exemption list are applied across the cluster.
The statistics displayed on the Automated detection overview page are for the current peer only.
Additional Information
When a host address is blocked and tries to access the system, the request is dropped (the host receives no
response).
A host address can be blocked simultaneously for multiple categories, but may not necessarily be blocked by
all categories. Those blocks may also expire at different times.
When an address is unblocked (either manually or after its block duration expires), it has to fail again for the
full number of times as specified by the category's trigger level before it will be blocked for a second time by
that category.
A category is reset whenever it is enabled. All categories are reset if the system is restarted or if the
automated protection service is enabled at the system level. When a category is reset:
Any currently blocked addresses are unblocked.
Its running totals of failures and blocks are reset to zero.
You can view all Event Log entries associated with the automated protection service by clicking View all
intrusion protection events on the Automated detection overview page.
Network Services
System Settings
System name
The System name is used to identify the Expressway. It appears in various places in the web interface, and in the
display on the front panel of the unit (so that you can identify it when it is in a rack with other systems). The System
name is also used by Cisco TMS.
We recommend that you give the Expressway a name that allows you to easily and uniquely identify it.
Ephemeral port range
You can specify the Ephemeral port range start and end values. This defines the port range to use for ephemeral
outbound connections not otherwise constrained by Expressway call processing.
The default range is 30000 to 35999.
26
Cisco Expressway Administrator Guide
Services
Serial port / Whether the system can be accessed Serial port / console access is always enabled for one
console locally via the VMware console. minute following a restart, even if it is normally disabled.
Default is On.
Web interface Whether the Expressway can be Cisco TMS accesses the Expressway via the web server.
(over HTTPS) accessed via the web interface. If HTTPS mode is turned off, Cisco TMS will not be able
Default is On. to access it.
Session limits
Per-account The number of concurrent sessions This includes web, SSH and serial sessions. Session
session limit that each individual administrator limits are not enforced on the root account.
account is allowed on each
Expressway. A value of 0 turns session limits off.
System The maximum number of concurrent This includes web, SSH and serial sessions. Session
session limit administrator sessions allowed on limits are not enforced on the root account; however
each Expressway. active root account sessions do count towards the total
number of current administrator sessions.
System protection
Automated Whether the automated protection After enabling the service you must go and configure the
protection service is active. Default is Off. specific protection categories.
service
Automatic Controls how management systems You must restart the system for any changes to take
discovery such as Cisco TMS can discover this effect.
protection Expressway.
Default is Off.
Redirect HTTP Determines whether HTTP requests are HTTPS must also be enabled for access via HTTP to
requests to redirected to the HTTPS port. Default is function.
HTTPS On.
27
Cisco ExpresswayAdministrator Guide
HTTP Strict Determines whether web browsers are See below for more information about HSTS.
Transport instructed to only ever use a secure
Security connection to access this server.
(HSTS) Enabling this feature gives added
protection against man-in-the-middle
(MITM) attacks.
Default is On.
28
Cisco Expressway Administrator Guide
Certificate Specifies whether HTTPS client Only applies if Client certificate-based security is
revocation list certificates are checked against enabled.
(CRL) certificate revocation lists (CRLs).
checking
None: no CRL checking is performed.
Default: All
CRL Controls the revocation checking Only applies if Client certificate-based security is
inaccessibility behavior if the revocation status enabled.
fallback cannot be established, for example if
behavior the revocation source cannot be
contacted.
By default, access via HTTPS and SSH is enabled. For optimum security, disable HTTPS and SSH and use the serial
port to manage the system. Because access to the serial port allows the password to be reset, we recommend that
you install the Expressway in a physically secure environment.
Automatically turn any insecure links to the website into secure links (for example, http://example.com/page/
is modified to https://example.com/page/ before accessing the server).
Only allow access to the server if the connection is secure (for example, the server's TLS certificate is valid,
trusted and not expired).
Browsers that do not support HSTS will ignore the Strict-Transport-Security header and work as before. They will still
be able to access the server.
Compliant browsers only respect Strict-Transport-Security headers if they access the server through its fully qualified
name (rather than its IP address).
29
Cisco ExpresswayAdministrator Guide
system uptime
system name
location
contact
interfaces
disk space, memory, and other machine-specific statistics
By default, SNMP is Disabled, therefore to allow the Expressway to be monitored by an SNMP NMS (including Cisco
TMS), you must select an alternative SNMP mode. The configurable options are:
SNMPmode Controls the level of SNMP support. If you want to use secure SNMPv3 but you also
use Cisco TMS as your external manager, you
Disabled: no SNMP support. must select v3 plus TMS support.
v3 secure SNMP: supports authentication
and encryption.
Description Custom description of the system as viewed When you leave this field empty, the system uses
by SNMP. The default is to have no custom its default SNMPdescription.
description (empty field).
Community The Expressway's SNMP community name. Only applies when using v2c or v3 plus TMS
name support.
The default is public.
System The name of the person who can be The System contact and Location are used for
contact contacted regarding issues with the reference purposes by administrators when
Expressway. following up on queries.
Username The Expressway's SNMP username, used to Only applies when using v3 secure SNMP or v3
identify this SNMP agent to the SNMP plus TMS support
manager.
30
Cisco Expressway Administrator Guide
The Expressway does not support SNMP traps or SNMP sets, therefore it cannot be managed via SNMP.
Note: SNMP is disabled by default, because of the potentially sensitive nature of the information involved. Do not
enable SNMP on a Expressway on the public internet or in any other environment where you do not want to expose
internal system information.
if there are no DNS servers configured, you must use an IP address for the NTP server
if there are one or more DNS servers configured, you can use an FQDN or IP address for the NTP server
if there is a DNS Domain name configured in addition to one or more DNS servers, you can use the server
name, FQDN or IP address for the NTP server
Three of the Address fields default to NTP servers provided by Cisco.
31
Cisco ExpresswayAdministrator Guide
You can configure the Authentication method used by the Expressway when connecting to an NTP server. Use one of
the following options for each NTP server connection:
Authentication Description
method
Symmetric key Symmetric key authentication. When using this method a Key ID, Hash method and Pass phrase
must be specified. The values entered here must match exactly the equivalent settings on the
NTPserver. You can use the same symmetric key settings across multiple NTP servers. However,
if you want to configure each server with a different pass phrase, you must also ensure that each
server has a unique key ID.
Private key Private key authentication. This method uses an automatically generated private key with which to
authenticate messages sent to the NTP server.
Field Description
NTP server The actual NTP server that has responded to the request. This may be different to the NTP server
in the NTP server address field.
Condition Gives a relative ranking of each NTP server. All servers that are providing accurate time are given
a status of Candidate; of those, the server that the Expressway considers to be providing the most
accurate time and is therefore using shows a status of sys.peer.
Flash A code giving information about the server's status. 00 ok means there are no issues. See the
Flash Status Word Reference Table, page 349 for a complete list of codes.
Authentication Indicates the status of the current authentication method. One of ok, bad or none. none is
specified when the Authentication method is Disabled.
Event Shows the last event as determined by NTP (for example reachable or sys.peer)
Reachability Indicates the results of the 8 most recent contact attempts between the Expressway and the NTP
server, with a tick indicating success and a cross indicating failure. The result of the most recent
attempt is shown on the far right.
Each time the NTP configuration is changed, the NTP client is restarted and the Reachability field
will revert to all crosses apart from the far right indicator which will show the result of the first
connection attempt after the restart. However, the NTP server may have remained contactable
during the restart process.
Offset The difference between the NTP server's time and the Expressway's time.
Delay The network delay between the NTP server and the Expressway.
32
Cisco Expressway Administrator Guide
Field Description
Stratum The degree of separation between the Expressway and a reference clock. 1 indicates that the NTP
server is a reference clock.
Ref time The last time that the NTP server communicated with the reference clock.
For definitions of the remaining fields on this page, and for further information about NTP, see Network Time Protocol
website.
Address To use an external manager, If you are using Cisco TMS as your external manager, use the default
and path you must configure the path of tms/public/external/management/
Expressway with the IP SystemManagementService.asmx.
address or host name and
path of the external manager
to be used.
33
Cisco ExpresswayAdministrator Guide
Certificate Controls whether the If you enable verification, you must also add the certificate of the
verification certificate presented by the issuer of the external manager's certificate to the file containing the
mode external manager is verified. Expressway's trusted CA certificates. This is done from the
Managing the Trusted CA Certificate List, page 189 page
(Maintenance > Security certificates > Trusted CA certificate).
Note that:
the Expressway will continue to operate without loss of service if its connection to Cisco TMS fails. This
applies even if the Expressways are clustered. No specific actions are required as the Expressway and Cisco
TMS will automatically start communicating with each other again after the connection is re-established.
Cisco TMS identifies the Expressway as a "TANDBERG VCS".
34
Cisco Expressway Administrator Guide
35
Firewall Traversal
This section describes how to configure your Expressway-C and Expressway-E in order to traverse firewalls.
An Expressway-E located outside the firewall on the public network or in the DMZ, which acts as the firewall
traversal server.
An Expressway-C or other traversal-enabled endpoint located in a private network, which acts as the firewall
traversal client.
The two systems work together to create an environment where all connections between the two are outbound, i.e.
established from the client to the server, and thus able to successfully traverse the firewall.
We recommend that both the Expressway-E and the Expressway-C run the same software version.
36
Cisco Expressway Administrator Guide
Expressway-E listens for connections from the client on a specific port, you are recommended to create the traversal
server zone on the Expressway-E before you create the traversal client zone on the Expressway-C.
Note that the traversal client and the traversal server must both be Expressway systems (neither can be a Cisco VCS).
Media Demultiplexing
The Expressway-E uses media demultiplexing in the following call scenarios:
Any H.323 or SIP call leg to/from an Expressway-C through a traversal zone configured to use Assent.
Any H.323 call leg to/from an Expressway-C through a traversal server zone configured to use H460.19 in
demultiplexing mode
H.323 call legs between an Expressway-E and an Assent or H.460.19 enabled endpoint
The Expressway-E uses non-demultiplexed media for call legs directly to/from SIP endpoints (that is endpoints which
do not support Assent or H.460.19), or if the traversal server zone is not configured to use H.460.19 in demultiplexing
mode.
Media demultiplexing ports on the Expressway-E are allocated from the general range of traversal media ports. This
applies to all RTP/RTCP media, regardless of whether it is H.323 or SIP. The default media traversal port range is
36000 to 59999, and is set on the Expressway-C at Configuration >Traversal Subzone. In Large Expressway
systems the first 12 ports in the range 36000 to 36011 by default are always reserved for multiplexed traffic. The
Expressway-E listens on these ports. You cannot configure a distinct range of demultiplex listening ports on Large
systems: they always use the first 6 pairs in the media port range. On Small/Medium systems you can explicitly
specify which 2 ports listen for multiplexed RTP/RTCP traffic, on the Expressway-E (Configuration > Traversal
>Ports). If you choose not to configure a particular pair of ports (Use configured demultiplexing ports = No), then
the Expressway-E will listen on the first pair of ports in the media traversal port range (36000 and 36001 by default).
For example, in a SIP call from within an enterprise to an endpoint at home through an Expressway-C/Expressway-E
pair, the only demultiplexing that would occur would be on the Expressway-E ports facing the Expressway-C:
However, an H.323 call from within an enterprise to an Assent capable H.323 endpoint at home through the same
Expressway-C/Expressway-E would perform demultiplexing on both sides of the Expressway-E:
37
Cisco ExpresswayAdministrator Guide
If the Expressway-E has Advanced Networking, it will still use the same port numbers as described above, but they
will be assigned to the internal and external IP addresses.
For the Expressway-E to act as a firewall traversal server for Cisco systems, you must create a traversal server zone
on the Expressway-E (Configuration > Zones > Zones) and configure it with the details of the traversal client. See
Configuring Traversal Server Zones, page 101 for more information.
You must create a separate traversal server zone for every system that is its traversal client.
To enable TURN relay services and find out more about ICE, see About ICE and TURN Services, page 43.
To reconfigure the default ports used by the Expressway-E, see Configuring Ports for Firewall Traversal, page
40.
The Advanced Networking option key enables the LAN 2 interface on the Expressway-E (the option is not available on
an Expressway-C). The LAN 2 interface is used in situations where the Expressway-E is located in a DMZ that
consists of two separate networks - an inner DMZ and an outer DMZ - and your network is configured to prevent
direct communication between the two.
With the LAN 2 interface enabled, you can configure the Expressway with two separate IP addresses, one for each
network in the DMZ. Your Expressway then acts as a proxy server between the two networks, allowing calls to pass
between the internal and outer firewalls that make up your DMZ.
When Advanced Networking is enabled, all ports configured on the Expressway, including those relating to firewall
traversal, apply to both IP addresses; you cannot configure ports separately for each IP address.
38
Cisco Expressway Administrator Guide
Step Description
On the Expressway-E, create a traversal server zone (this represents the incoming connection from the
Expressway-C). In the Username field, enter the Expressway-Cs authentication username.
On the Expressway-E, add the Expressway-Cs authentication username and password as credentials into
the local authentication database.
On the Expressway-C, create a traversal client zone (this represents the connection to the Expressway-E).
Enter the same authentication Username and Password as specified on the Expressway-E.
Configure all the modes and ports in the H.323 and SIP protocol sections to match identically those of the
traversal server zone on the Expressway-E.
39
Cisco ExpresswayAdministrator Guide
1. Each traversal client connects via the firewall to a unique port on the Expressway-E.
2. The server identifies each client by the port on which it receives the connection, and the authentication
credentials provided by the client.
3. After the connection has been established, the client regularly sends a probe to the Expressway-E to keep the
connection alive.
4. When the Expressway-E receives an incoming call for the client, it uses this initial connection to send an
incoming call request to the client.
5. The client then initiates one or more outbound connections. The destination ports used for these connections
differ for signaling and/or media, and depend on the protocol being used (see the following sections for more
details).
allow initial outbound traffic from the client to the ports being used by the Expressway-E
allow return traffic from those ports on the Expressway-E back to the originating client
Note: we recommend that you turn off any H.323 and SIP protocol support on the firewall: these are not needed in
conjunction with the Expressway solution and may interfere with its operation.
40
Cisco Expressway Administrator Guide
Small/Medium systems: 1 pair of RTP and RTCP media demultiplexing ports are used. They can either be
explicitly specified or they can be allocated from the start of the general range of traversal media ports.
Large systems: 6 pairs of RTP and RTCP media demultiplexing ports are used. They are always allocated from
the start of the traversal media ports range.
H.323 ports start at UDP/6001 and increment by 1 for every new traversal server zone.
SIP ports start at TCP/7001 and increment by 1 for every new traversal server zone.
You can change these default ports if necessary but you must ensure that the ports are unique for each traversal
server zone. After the H.323 and SIP ports have been set on the Expressway-E, matching ports must be configured on
the corresponding traversal client. Note that:
The default port used for the initial connections from MXP endpoints is the same as that used for standard RAS
messages, that is UDP/1719. While you can change this port on the Expressway-E, most endpoints will not
support connections to ports other than UDP/1719, therefore we recommend that you leave this as the
default.
You must allow outbound connections through your firewall to each of the unique SIP and H.323 ports that are
configured on each of the Expressway-Es traversal server zones.
The following table shows the default ports used for connections to the Expressway-E.
Assent TCP/2776: listening The RTP and RTCP media demultiplexing ports in Large system are always
port for H.225 and allocated from the start of the general range of traversal media ports
H.245 protocols (UDP/36000-36011*). In Small/Medium systems the media demultiplexing
ports can either be explicitly specified or they can be allocated from the start
of the traversal media ports range.
H.460.18/19 TCP/1720: listening The RTP and RTCP media demultiplexing ports in Large systems are always
port for H.225 allocated from the start of the general range of traversal media ports
protocol (UDP/36000-36011*). In Small/Medium systems the media demultiplexing
ports can either be explicitly specified or they can be allocated from the start
TCP/2777: listening of the traversal media ports range.
port for H.245
protocol RTP and RTCP media non-demultiplexing ports are allocated from the
remainder of the traversal media ports range: UDP/36002-59999*.
SIP SIP call signaling Where the traversal client is an Expressway, SIP media uses Assent to
uses the same port as traverse the firewall.
used by the initial
connection between
the client and server.
* The default media traversal port range is 36000 to 59999, and is set on the Expressway-C at Configuration
>Traversal Subzone. In Large Expressway systems the first 12 ports in the range 36000 to 36011 by default are
always reserved for multiplexed traffic. The Expressway-E listens on these ports. You cannot configure a distinct
range of demultiplex listening ports on Large systems: they always use the first 6 pairs in the media port range. On
Small/Medium systems you can explicitly specify which 2 ports listen for multiplexed RTP/RTCP traffic, on the
Expressway-E (Configuration > Traversal >Ports). If you choose not to configure a particular pair of ports (Use
configured demultiplexing ports = No), then the Expressway-E will listen on the first pair of ports in the media
traversal port range (36000 and 36001 by default).
41
Cisco ExpresswayAdministrator Guide
The call signaling ports are configured via Configuration > Traversal > Ports. The traversal media port range is
configured via Configuration > Traversal Subzone.
* The default media traversal port range is 36000 to 59999, and is set on the Expressway-C at Configuration
>Traversal Subzone. In Large Expressway systems the first 12 ports in the range 36000 to 36011 by default are
always reserved for multiplexed traffic. The Expressway-E listens on these ports. You cannot configure a distinct
range of demultiplex listening ports on Large systems: they always use the first 6 pairs in the media port range. On
Small/Medium systems you can explicitly specify which 2 ports listen for multiplexed RTP/RTCP traffic, on the
Expressway-E (Configuration > Traversal >Ports). If you choose not to configure a particular pair of ports (Use
configured demultiplexing ports = No), then the Expressway-E will listen on the first pair of ports in the media
traversal port range (36000 and 36001 by default).
** On Large systems you can configure a range of TURN request listening ports. The default range is 3478 3483.
42
Cisco Expressway Administrator Guide
Expressway-C The traversal server zone for the Expressway client must be
configured with the client's authentication Username. This is
The Expressway client provides its Username and set on the Expressway-E by using Configuration > Zones >
Password. These are set on the traversal client Zones > Edit zone, in the Connection credentials section.
zone by using Configuration > Zones > Zones >
Edit zone, in the Connection credentials section. There must also be an entry in the Expressway-Es
authentication database with the corresponding client
username and password.
Note that all Expressway traversal clients must authenticate with the Expressway-E.
About ICE
ICE (Interactive Connectivity Establishment) provides a mechanism for SIP client NAT traversal. ICE is not a protocol,
but a framework which pulls together a number of different techniques such as TURN and STUN.
It allows endpoints (clients) residing behind NAT devices to discover paths through which they can pass media, verify
peer-to-peer connectivity via each of these paths and then select the optimum media connection path. The available
paths typically depend on any inbound and outbound connection restrictions that have been configured on the NAT
device. Such behavior is described in RFC 4787.
An example usage of ICE is two home workers communicating via the internet. If the two endpoints can communicate
via ICE the Expressway-E may (depending on how the NAT devices are configured) only need to take the signaling
and not take the media. If the initiating ICE client attempts to call a non-ICE client, the call set-up process reverts to a
conventional SIP call requiring NAT traversal via media latching where the Expressway also takes the media.
For more information about ICE, see RFC 5245.
About TURN
TURN (Traversal Using Relays around NAT) services are relay extensions to the STUN network protocol that enable a
SIP or H.323 client to communicate via UDP or TCP from behind a NAT device.
For more information about TURN see RFC 5766, and for detailed information about the base STUN protocol, see RFC
5389.
Each ICE client requests the TURN server to allocate relays for the media components of the call. A relay is required
for each component in the media stream between each client.
After the relays are allocated, each ICE client has 3 potential connection paths (addresses) through which it can send
and receive media:
its host address which is behind the NAT device (and thus not reachable from endpoints on the other side of
the NAT)
43
Cisco ExpresswayAdministrator Guide
Small/Medium systems support up to 1800 relay allocations. This is typically enough to support 100 calls but
does depend on the network topology and the number of media stream components used for the call (for
example, some calls may use Duo Video, or other calls might be audio only).
A Large system supports up to 6000 relays, spread evenly across 6 ports where each port is limited to handling
1000 relays. This limit is not strictly enforced, so we recommend adding an SRVrecord for each port to enable
round robin.
Clustered Expressways: if the requested TURN server's relays are fully allocated the server will respond to the
requesting client with the details of an alternative server in the cluster (the TURN server currently with the
most available resources).
The Expressway's TURN services are supported over single and dual network interfaces (via the Advanced
Networking option). For dual network interfaces, the TURN server listens on both interfaces but relays are
allocated only on the Expressway's externally facing LAN interface.
Microsoft ICE (which is not standards-based) is not supported by the Expressway-E's TURN server; to enable
communications between the Expressway and Microsoft Lync clients that are registered through a Microsoft
Edge Server you need to use the B2BUA for Microsoft Lync.
The TURN server does not support bandwidth requests. Traversal zone bandwidth limits do not apply.
The Expressway-E TURN server supports TURN media over TCP and UDP. Configuration of the supported
protocols is available only through the CLI command xConfiguration Traversal Server TURN ProtocolMode.
The Expressway-E TURN server supports UDPrelays over TCP; it does not currently support TCPrelays.
44
Cisco Expressway Administrator Guide
TURN The listening port for TURN requests. The default is To allow endpoints such as Jabber
requests port 3478. Video to discover TURN services, you
need to set up DNS SRV records for _
On Large systems you can configure a range of TURN turn._udp. and _turn._tcp (either for
request listening ports. The default range is 3478 3483. the single port, or range of ports as
appropriate).
Authentication This is the realm sent by the server in its authentication Ensure that the client's credentials are
realm challenges. stored in the local authentication
database.
Media port The lower and upper port in the range used for the
range start / allocation of TURN relays.
end
The default TURN relay media port range is 24000
29999.
45
Unified Communications
This section describes how to configure the Expressway-C and Expressway-E for Unified Communications
functionality, a core part of the Cisco Collaboration Edge Architecture:
Note: You should configure only one Unified Communications traversal zone per Expressway.
1. Install a suitable server certificate on both the Expressway-C and the Expressway-E.
The certificate must include the Client Authentication extension. The system will not allow you to upload a
server certificate without this extension when Unified Communications features have been enabled.
The Expressway includes a built-in mechanism to generate a certificate signing request (CSR) and is the
recommended method for generating a CSR:
Ensure that the CA that signs the request does not strip out the client authentication extension.
The generated CSR includes the client authentication request and any relevant subject alternate names
for the Unified Communications features that have been enabled (see Server Certificate Requirements
for Unified Communications, page 48 if appropriate).
To generate a CSR and /or to upload a server certificate to the Expressway, go to Maintenance > Security
certificates > Server certificate. You must restart the Expressway for the new server certificate to take
effect.
46
Cisco Expressway Administrator Guide
2. Install on both Expressways the trusted Certificate Authority (CA) certificates of the authority that signed the
Expressway's server certificates.
There are additional trust requirements, depending on the Unified Communications features being deployed.
For mobile and remote access deployments:
The Expressway-C must trust the Unified CM and IM&P tomcat certificate.
If appropriate, both the Expressway-C and the Expressway-E must trust the authority that signed the
endpoints' certificates.
For Jabber Guest deployments:
When the Jabber Guest server is installed, it uses a self-signed certificate by default. However, you can
install a certificate that is signed by a trusted certificate authority. You must install on the Expressway-C
either the self-signed certificate of the Jabber Guest server, or the trusted CA certificates of the authority
that signed the Jabber Guest server's certificate.
To upload trusted Certificate Authority (CA) certificates to the Expressway, go to Maintenance > Security
certificates > Trusted CA certificate. You must restart the Expressway for the new trusted CA certificate to
take effect.
See Certificate Creation and Use With Expressway Deployment Guide for full information about how to create and
upload the Expressways server certificate and how to upload a list of trusted certificate authorities.
The Expressway-C and Expressway-E must be configured with a zone of type Unified Communications
traversal. This automatically configures an appropriate traversal zone (a traversal client zone when selected
on a Expressway-C, or a traversal server zone when selected on an Expressway-E) that uses SIP TLS with TLS
verify mode set to On, and Media encryption mode set to Force encrypted.
Both Expressways must trust each other's server certificate. As each Expressway acts both as a client and as
a server you must ensure that each Expressways certificate is valid both as a client and as a server.
If an H.323 or a non-encrypted connection is also required, a separate pair of traversal zones must be
configured.
To set up a secure traversal zone, configure your Expressway-C and Expressway-E as follows:
47
Cisco ExpresswayAdministrator Guide
3. Configure the fields as follows (leave all other fields with default values):
Expressway-C Expressway-E
SIP section
TLS verify subject name Not applicable Enter the name to look for in the traversal
client's certificate (must be in either the
Subject Common Name or the Subject
Alternative Name attributes). If there is a
cluster of traversal clients, specify the cluster
name here and ensure that it is included in
each client's certificate.
Location section
48
Cisco Expressway Administrator Guide
Also, when generating tomcat certificate signing requests for any products within the Cisco Collaboration Systems
Release 10.5.2, you need to be aware of CSCus47235. You need to work around this issue to ensure that the
FQDNsof the nodes are in the certificates as Subject Alternative Names. The Expressway X8.5.2 Release Notes have
the details of the workarounds.
Expressway Certificates
The Expressway certificate signing request (CSR) tool prompts for and incorporates the relevant subject alternate
name (SAN) entries as appropriate for the Unified Communications features that are supported on that Expressway.
The following table shows which CSR alternative name elements apply to which Unified Communications features:
Note:
You may need to produce a new server certificate for the Expressway-C if chat node aliases are added or
renamed, when IM and Presence nodes are added or renamed, or when new TLS phone security profiles are
added.
You must produce a new Expressway-E certificate if new chat node aliases are added to the system, or if the
Unified CM or XMPP federation domains are modified.
You must restart the Expressway for any new uploaded server certificate to take effect.
More details about the individual feature requirements per Expressway-C / Expressway-E are described below.
Expressway-C server certificate requirements
The Expressway-C server certificate needs to include the following elements in its list of subject alternate names:
Unified CM phone security profile names: the names of the Phone Security Profiles in Unified CM that are
configured for encrypted TLS and are used for devices requiring remote access. Use the FQDNformat and
separate multiple entries with commas.
Having the secure phone profiles as alternative names means that Unified CM can communicate via TLS with
the Expressway-C when it is forwarding messages from devices that use those profiles.
IM and Presence chat node aliases (federated group chat): the Chat Node Aliases (e.g.
chatroom1.example.com) that are configured on the IM and Presence servers. These are required only for
Unified Communications XMPP federation deployments that intend to support group chat over TLS with
federated contacts.
The Expressway-C automatically includes the chat node aliases in the CSR, providing it has discovered a set
of IM&P servers.
We recommend that you use DNSformat for the chat node aliases when generating the CSR. You must
include the same chat node aliases in the Expressway-E server certificate's alternative names.
49
Cisco ExpresswayAdministrator Guide
Figure 3 Entering subject alternative names for security profiles and chat node aliases on the
Expressway-C's CSRgenerator
Unified CM registrations domains: all of the domains which are configured on the Expressway-C for Unified
CM registrations. They are required for secure communications between endpoint devices and Expressway-E.
Select the DNSformat and manually specify the required FQDNs. Separate the FQDNs by commas if you need
multiple domains. You may select CollabEdgeDNS format instead, which simply adds the prefix collab-edge.
to the domain that you enter. This format is recommended if you do not want to include your top level domain
as a SAN (see example in following screenshot).
XMPP federation domains: the domains used for point-to-point XMPP federation. These are configured on
the IM&P servers and should also be configured on the Expressway-C as domains for XMPP federation.
Select the DNSformat and manually specify the required FQDNs. Separate the FQDNs by commas if you need
multiple domains. Do not use the XMPPAddress format as it may not be supported by your CA, and may be
discontinued in future versions of the Expressway software.
IM and Presence chat node aliases (federated group chat): the same set of Chat Node Aliases as entered
on the Expressway-C's certificate. They are only required for voice and presence deployments which will
support group chat over TLS with federated contacts.
Select the DNSformat and manually specify the required FQDNs. Separate the FQDNs by commas if you need
multiple domains. Do not use the XMPPAddress format as it may not be supported by your CA, and may be
discontinued in future versions of the Expressway software.
Note that you can copy the list of chat node aliases from the equivalent Generate CSR page on the
Expressway-C.
Figure 4 Entering subject alternative names for Unified CMregistration domains, XMPPfederation
domains, and chat node aliases, on the Expressway-E's CSRgenerator
See Certificate Creation and Use With Expressway Deployment Guide for full information about how to create and
upload the Expressways server certificate and how to upload a list of trusted certificate authorities.
50
Cisco Expressway Administrator Guide
Off-premises access: a consistent experience outside the network for Jabber and EX/MX/SX Series clients
Security: secure business-to-business communications
Cloud services: enterprise grade flexibility and scalable solutions providing rich WebEx integration and
Service Provider offerings
Gateway and interoperability services: media and signaling normalization, and support for non-standard
endpoints
Note that third-party SIP or H.323 devices can register to a Cisco VCS connected via a neighbor zone to a Cisco
Expressway and, if necessary, interoperate with Unified CM-registered devices over a SIP trunk.
51
Cisco ExpresswayAdministrator Guide
Unified CM provides call control for both mobile and on-premises endpoints.
Signaling traverses the Expressway solution between the mobile endpoint and Unified CM.
Media traverses the Expressway solution and is relayed between endpoints directly; all media is encrypted
between the Expressway-C and the mobile endpoint.
Deployment Scope
The following major Expressway-based deployments are mutually exclusive. They cannot be implemented together
on the same Expressway (or traversal pair):
52
Cisco Expressway Administrator Guide
Configuring a Secure Traversal Zone Connection for Unified Communications, page 46 (if your system does
not already have a secure traversal zone in place)
Server Certificate Requirements for Unified Communications, page 48
Note that if XMPP federation is to be used, the IM&P servers need to be discovered on the Expressway-C for all the
relevant information to be available when generating certificate signing requests.
1. Ensure that System host name and Domain name are specified (System > DNS).
2. Ensure that local DNS servers are specified (System > DNS).
3. Ensure that all Expressway systems are synchronized to a reliable NTP service (System > Time). Use an
Authentication method in accordance with your local policy.
If you have a cluster of Expressways you must do this for every peer.
53
Cisco ExpresswayAdministrator Guide
3. For each domain, turn On the services for that domain that Expressway is to support. The available services
are:
SIP registrations and provisioning on Unified CM: Endpoint registration, call control and provisioning for
this SIP domain is serviced by Unified CM. The Expressway acts as a Unified Communications gateway to
provide secure firewall traversal and line-side support for Unified CM registrations. The default is On.
IM and Presence Service: Instant messaging and presence services for this SIP domain are provided by the
Unified CM IM and Presence service. The default is On.
XMPPfederation: Enables XMPPfederation between this domain and partner domains. The default is On.
Deployment: Associates the domain with the selected deployment, if there are multiple deployments. This
setting is absent if there is only one deployment (there is always at least one).
Turn On all of the applicable services for each domain.
Note that these settings are not entirely independent. You cannot disable SIPregistration and provisioning
while using IMand Presence. You can disable IMand Presence while SIPregistrations and provisioning on
Unified CM is On, but the reverse is not true. So, if you switch IMand Presence Service On, then your setting
for SIPregistrations and provisioning is ignored and the Expressway-C behaves as though it was On.
Note: The connections configured in this procedure are static. You must refresh the configuration on the
Expressway-C after you reconfigure or upgrade any of the discovered Unified Communications nodes. For more
details, see Why Should IRefresh the Discovered Nodes?, page 57
Go to Configuration >Unified Communications ><UCserver type> and click Refresh servers.
If TLSverify mode is On when discovering UnifiedCommunications services, then you must configure the
Expressway-C to trust the certificates presented by the IMand Presence Service nodes and Unified CM servers.
54
Cisco Expressway Administrator Guide
55
Cisco ExpresswayAdministrator Guide
56
Cisco Expressway Administrator Guide
Expressway-C automatically generates non-configurable neighbor zones between itself and each discovered Unified
CM node. A TCP zone is always created, and a TLS zone is created also if the Unified CM node is configured with a
Cluster Security Mode (System > Enterprise Parameters > Security Parameters) of 1 (Mixed) (so that it can support
devices provisioned with secure profiles). The TLS zone is configured with its TLS verify mode set to On if the Unified
CM discovery had TLS verify mode enabled. This means that the Expressway-C will verify the CallManager
certificate for subsequent SIP communications. Each zone is created with a name in the format 'CEtcp-<node name>'
or 'CEtls-<node name>'.
A non-configurable search rule, following the same naming convention, is also created automatically for each zone.
The rules are created with a priority of 45. If the Unified CM node that is targeted by the search rule has a long name,
the search rule will use a regex for its address pattern match.
Note that load balancing is managed by Unified CM when it passes routing information back to the registering
endpoints.
When the Expressway-C "discovers" a Unified Communications node, it establishes a connection to read the
information required to create zones and search rules to proxy requests originating from outside of the network in
towards that node.
This configuration information is static. That is, the Expressway only reads it when you manually initiate discovery of
a new node, or when you refresh the configuration of previously discovered nodes. If any related configuration has
changed on a node after you discover it, the mismatch between the new configuration and what the Expressway-C
knows of that node will probably cause some kind of failure.
The information that the Expressway-C reads from the Unified Communications node is different for each node type
and its role. The following list contains examples of UCconfiguration that you can expect to require a refresh from the
Expressway. The list is not exhaustive; if you suspect that a configuration change on a node is affecting
MRAservices, you should refresh those nodes to eliminate one known source of potential problems.
57
Cisco ExpresswayAdministrator Guide
Visual Voicemail
Jabber Update Server
Custom HTML tabs / icons
Directory Photo Host
Advanced File Transfer (AFT)
Problem Report Tool server
Note: In order for the AFT feature to work across Expressway you must ensure that all Unified CM IM and Presence
Service nodes, across all Unified CM IM and Presence Service clusters, have been added to the whitelist either
manually or automatically.
To configure the set of addresses to which HTTP access will be allowed:
1. Ensure that System host name and Domain name are specified (System > DNS).
2. Ensure that public DNS servers are specified (System > DNS).
3. Ensure that all Expressway systems are synchronized to a reliable NTP service (System > Time). Use an
Authentication method in accordance with your local policy.
If you have a cluster of Expressways you must do this for every peer.
58
Cisco Expressway Administrator Guide
Note:The combination of <System host name>.<Domain name> is the FQDN of this Expressway-E. Ensure that this
FQDN is resolvable in public DNS.
If you have a cluster of Expressway-Es, you must ensure that the Domain name is identical on each peer, and it is
case-sensitive.
You must ensure that TURN services are disabled on the Expressway-E used for mobile and remote access.
59
Cisco ExpresswayAdministrator Guide
Figure 7 Multiple deployments to partition Unified Communications services accessed from outside the
network
Deployments and their associated domains and services are configured on the Expressway-C.
There is one primary deployment, called "Default deployment" unless you rename it, that automatically encloses all
domains and services until you create and populate additional deployments. This primary deployment cannot be
deleted, even if it is renamed or has no members.
To partition the services that you provide via mobile and remote access, create as many deployments as you need,
associate a different domain with each, and then associate the required Unified Communications resources with
each deployment.
You cannot associate one domain with more than one deployment. Similarly, each Unified Communications node
may only be associated with one deployment.
To create a new deployment:
1. Go to Configuration >Domains.
The domains and their associated services are listed here. The deployment column shows where the listed
domains are associated.
2. Click the domain name, or create a new domain (see Configuring Domains, page 84).
3. In the Deployment field, select the deployment which will enclose this domain.
4. Click Save.
60
Cisco Expressway Administrator Guide
1. Go to Configuration >Unified Communications > and then Unified CMservers, or IMand Presence Service
nodes, or Unity Connection servers.
Any previously discovered service nodes of the selected type are listed here. The deployment column shows
where the listed nodes are associated.
If the list is not properly populated, see Discovering Unified Communications Servers and Services, page 54.
2. Click the server / service node name.
3. In the Deployment field, select which deployment will enclose this server / service node.
4. Click Save.
Note: When you save this change, the Expressway-C refreshes the connection to the node, which may
temporarily disrupt the service to the connected users.
5. Repeat for any other Unified Communications services that will belong to the deployment.
61
Cisco ExpresswayAdministrator Guide
An Expressway-E and an Expressway-C are configured to work together at your network edge.
AUnified Communications traversal zone is configured between the Expressway-C and the Expressway-E.
The SIPdomain that will be accessed via SSOis configured on the Expressway-C.
The Expressway-C is in Mobile and remote access mode and has discovered the required Unified CM
resources.
The hostnames of the required Unified CM resources are added to the HTTP server allow list on the
Expressway-C.
If you are using multiple deployments, the Unified CM resources that will be accessed by SSOare in the same
deployment as the domain that will be called from Jabber clients.
On the Cisco Jabber clients:
Clients are configured to request the internal services using the correct domain names / SIPURIs / Chat
aliases.
The default browser can resolve the Expressway-E and the IdP.
On the Identity Provider:
The domain that is on the IdPcertificate must be published in the DNSso that clients can resolve the IdP.
Selecting an Identity Provider (IdP)
Cisco Collaboration solutions use SAML 2.0 (Security Assertion Markup Language) to enable SSO (single sign-on) for
clients consuming Unified Communications services.
SAML-based SSO is an option for authenticating UC service requests originating from inside the enterprise network,
and it is now extended to clients requesting UC services from outside via Mobile and Remote Access (MRA).
If you choose SAML-based SSO for your environment, note the following:
62
Cisco Expressway Administrator Guide
SAML 2.0 is not compatible with SAML 1.1 and you must select an IdP that uses the SAML 2.0 standard.
SAML-based identity management is implemented in different ways by vendors in the computing and
networking industry, and there are no widely accepted regulations for compliance to the SAML standards.
The configuration of and policies governing your selected IdP are outside the scope of Cisco TAC (Technical
Assistance Center) support. Please use your relationship and support contract with your IdP Vendor to assist
in configuring the IDP properly. Cisco cannot accept responsibility for any errors, limitations, or specific
configuration of the IdP.
Although Cisco Collaboration infrastructure may prove to be compatible with other IdPs claiming SAML 2.0
compliance, only the following IdPs have been tested with Cisco Collaboration solutions:
OpenAM 10.0.1
Active Directory Federation Services 2.0 (AD FS 2.0)
PingFederate 6.10.0.4
1. Configure a synchronizable relationship between the identity provider and your on-premises directory such
that authentication can securely be owned by the IdP. See Directory Integration and Identity Management in
the Cisco Collaboration System 10.x Solution Reference Network Designs (SRND) document.
2. Export SAMLmetadata file from the IdP. Check the documentation on your identity provider for the procedure.
For example, see Enable SAML SSO through the OpenAM IdP in the SAML SSO Deployment Guide for Cisco
Unified Communications Applications.
3. Import the SAMLmetadata file from the IdPto the Unified CM servers and Cisco Unity Connection servers that
will be accessed by single sign-on. See the Unified Communications documentation or help for more details.
4. Export the SAMLmetadata files from the Unified CM servers and Cisco Unity Connection servers. For example,
see High-Level Circle of Trust Setup in the SAML SSO Deployment Guide for Cisco Unified Communications
Applications.
5. Create the Identity Provider on the Expressway-C, by importing the SAMLmetadata file from the IdP.
6. Associate the IdP with SIPdomain(s) on the Expressway-C.
7. Export the SAMLmetadata file(s) from the (master) Expressway-C; ensure that it includes the externally
resolvable address of the (master) Expressway-E.
The SAMLmetadata file from the Expressway-C contains the X.509 certificate for signing and encrypting
SAML interchanges between the edge and the IdP, and the binding(s) that the IdP needs to redirect clients to
the Expressway-E (peers).
8. Import the SAMLmetadata files from the Unified CM servers and Cisco Unity Connection servers to the IdP. An
example using OpenAMis in the SAML SSO Deployment Guide for Cisco Unified Communications
Applications.
9. Similarly, import the SAMLmetadata file from the Expressway-C to the IdP. See your IdP documentation for
details.
10. Turn on SSOat the edge (on the Expressway-C and the Expressway-E).
63
Cisco ExpresswayAdministrator Guide
1. Open the IdP list (Configuration >Unified Communications > Identity providers (IdP)) and verify that your
IdP is in the list.
The IdPs are listed by their entity IDs. The associated domains for each are shown next to the ID.
2. Click Associate domains in the row for your IdP.
This shows a list of all the domains on this Expressway-C. There are checkmarks next to domains that are
already associated with this IdP. It also shows the IdP entity IDs if there are different IdPs associated with
other domains in the list.
3. Check the boxes next to the domains you want to associate with this IdP.
If you see (Transfer) next to the checkbox, checking it will break the domain's existing association and
associate it with this IdP.
4. Click Save.
The selected domains are associated with this IdP.
Note:The Expressway-C must have a valid connection to the Expressway-E before you can export the Expressway-
C's SAMLmetadata.
64
Cisco Expressway Administrator Guide
Configuring IDPs
This topic covers any known additional configurations that are required when using a particular IDPfor SSOover
MRA.
These configuration procedures are required in addition to the prerequisites and high level tasks already mentioned,
some of which are outside of the document's scope.
After creating Relying Party Trusts for the Expressway-Es, you must set some properties of each entity, to ensure that
AD FS formulates the SAMLresponses as Expressway-E expects them.
You also need to add a claim rule, for each relying party trust, that sets the uid attribute of the SAMLresponse to the
ADattribute value that users are authenticating with.
These procedures were verified on AD FS2.0, although the same configuration is required if you are using AD FS3.0.
You need to:
1. Open the Edit Claims Rule dialog, and create a new claim rule that sends ADattributes as claims
2. Select the ADattribute to match the one that identify the SSOusers to the internal systems, typically email or
SAMAccountName
3. Enter uid as the Outgoing Claim Type
65
Cisco ExpresswayAdministrator Guide
The option you should choose depends entirely on your implementation. If you have a homogenous environment, in
which all Unified CM nodes are capable of SSO, you can reduce response time and overall network traffic by
selecting No. By contrast, if you want clients to use either mode of getting the edge configuration - during rollout or
because you cannot guarantee that SSOis available on all nodes - you should select Yes.
Traversal zone SIP media UDP 36000 to 59999* 36000 (RTP), 36001
(RTCP) (defaults)
(for small/medium systems on X8.1 or
later)
66
Cisco Expressway Administrator Guide
36012 to 59999
36012 to 59999*
XMPP (IM and Presence) TCP Ephemeral port 7400 (IM and Presence)
HTTP (configuration file retrieval) TCP Ephemeral port 6970 (Unified CM)
Message Waiting Indicator (MWI) from TCP Ephemeral port 7080 (Unity Connection)
Unity Connection
* The default media traversal port range is 36000 to 59999, and is set on the Expressway-C at Configuration
>Traversal Subzone. In Large Expressway systems the first 12 ports in the range 36000 to 36011 by default are
always reserved for multiplexed traffic. The Expressway-E listens on these ports. You cannot configure a distinct
range of demultiplex listening ports on Large systems: they always use the first 6 pairs in the media port range. On
Small/Medium systems you can explicitly specify which 2 ports listen for multiplexed RTP/RTCP traffic, on the
Expressway-E (Configuration > Traversal >Ports). If you choose not to configure a particular pair of ports (Use
configured demultiplexing ports = No), then the Expressway-E will listen on the first pair of ports in the media
traversal port range (36000 and 36001 by default).
67
Cisco ExpresswayAdministrator Guide
Note that:
Ports 8191/8192 TCP and 8883/8884 TCP are used internally within the Expressway-C and the Expressway-E
applications. Therefore these ports must not be allocated for any other purpose. The Expressway-E listens
externally on port 8883; therefore we recommend that you create custom firewall rules on the external LAN
interface to drop TCP traffic on that port.
The Expressway-E listens on port 2222 for SSH tunnel traffic. The only legitimate sender of such traffic is the
Expressway-C (cluster). Therefore we recommend that you create the following firewall rules for the SSH
tunnels service:
one or more rules to allow all of the Expressway-C peer addresses (via the internal LAN interface, if
appropriate)
followed by a lower priority (higher number) rule that drops all traffic for the SSH tunnels service (on the
internal LAN interface if appropriate, and if so, another rule to drop all traffic on the external interface)
Supported Systems
68
Cisco Expressway Administrator Guide
Expressway-E does not support XMPP address translation (of email addresses, for example). External systems
must federate with the Jabber IDs that are native to Unified CM IM & Presence.
You can make the user's Unified CM IM&PJabber ID resemble the user's email address, so that the federated
partner can use email addresses for federation, by:
Prerequisites
Ensure that you are running the following software versions:
Ensure that Interdomain XMPPFederation has been disabled on Unified CM IM and Presence:
Go to Cisco Unified CM IM and Presence Administration > Presence > Inter Domain Federation > XMPP
Federation > Settings and ensure that XMPP Federation Node Status is set to Off.
You must disable Interdomain Federation on Unified CM IM&P before enabling XMPP federation on
Expressway.
69
Cisco ExpresswayAdministrator Guide
An Expressway-C (cluster) and Expressway-E (cluster) have been configured for Mobile and Remote Access
to Unified Communications services, as described in Mobile and Remote Access via Cisco Expressway
Deployment Guide. If only XMPP federation is required (video calls and remote registration to Unified CM are
not required), the following items do not have to be configured:
domains that support SIP registrations and provisioning on Unified CM or that support IM and Presence
services on Unified CM
Unified CM servers (you must still configure the IM&P servers)
HTTP server allow list
Note that federated communications are available to both on-premises clients (connected directly to Unified
CM IM&P) and off-premises clients (connected to Unified CM IM&P via mobile and remote access).
If you intend to use both TLS and group chat, the Expressway-C and Expressway-E server certificates must
include in their list of subject alternate names (using either XMPPAddress or DNS formats) the Chat Node
Aliases that are configured on the IM&P servers. Note that the Expressway-C automatically includes the chat
node aliases in its certificate signing requests (CSRs), providing it has discovered a set of IM&P servers. When
generating CSRs for the Expressway-E we recommend that you copy-paste the chat node aliases from the
equivalent Generate CSR page on the Expressway-C.
See Server Certificate Requirements for Unified Communications, page 48 for more information.
70
Cisco Expressway Administrator Guide
71
Cisco ExpresswayAdministrator Guide
Use static Indicates whether a controlled list of static routes are used to locate the federated XMPP
routes domains and chat node aliases, rather than DNS lookups. See Configuring How XMPP Servers
for Federated Domains and Chat Node Aliases Are Located, page 73 below.
Dialback Enter the dialback secret to use for identity verification with federated XMPP servers. If you
secret have multiple Expressway-E systems in the same deployment, they must all be configured
with the same dialback secret.
Security Indicates if a TLS connection to federated XMPP servers is required, preferred or not required.
mode
TLS required: the system guarantees a secure (encrypted) connection with the foreign
domain.
TLS optional: the system attempts to establish a TLS connection with the foreign domain. If it
fails to establish a TLS connection, it reverts to TCP.
No TLS: the system will not establish a TLS connection with the foreign domain. It uses a
non-encrypted connection to federate with the foreign domain.
In all cases, server dialback is used to verify the identity of the foreign server. The foreign
server must be configured to use server dialback. Note that SASL External is not a supported
configuration on the local server. Foreign servers may be configured to use SASL, but SASL
exchanges will not be supported by the local server.
Require Controls whether the certificate presented by the external client is verified against the
client-side Expressway's current trusted CA list and, if loaded, the revocation list.
security
certificates This setting does not apply if Security mode is No TLS.
Note that the federated domain name and any chat node aliases must be present in the
certificate's subject alternate name, regardless of this setting.
Privacy Controls whether restrictions are applied to the set of federated domains and chat node
mode aliases.
Allow list: Federation is allowed only with the domains and chat node aliases specified in the
allow list.
Deny list: Federation is allowed with any domain or chat node alias except for those specified
in the deny list.
Note that any domains or chat node aliases that are configured as static routes are included
automatically in the allow list.
See Configuring the Allow and Deny Lists for Federated Domains and Chat Node Aliases,
page 74 below.
72
Cisco Expressway Administrator Guide
4. Click Save
Your changes are applied. If you toggled XMPP federation support, you will be required to confirm that you
want to restart the XCProuter on the Expressway-C.
You may also need to restart the Unified CM IM&P XCP router services that are connected to the associated
Expressway-C.
5. Log on to each IM and Presence server to check for notifications that you need to restart the XCPRouters. If
you do need to restart them:
a. In Cisco Unified IM and Presence Serviceability, go to Tools > Control Center - Network Services.
b. Scroll down to the IMand Presence Services section and select Cisco XCPRouter.
c. Click Restart.
This causes a restart of all XCP services on the IM and Presence Service.
The service restart may take several minutes.
d. Repeat on each IM and Presence server.
You could use the utils service CLI option (accessed via the Cisco Unified IM and Presence Operating
System) to restart the services instead.
Configuring How XMPP Servers for Federated Domains and Chat Node Aliases Are Located
You can use DNS lookups to locate the XMPP servers for federated domains and chat node aliases, or you can
configure the addresses of specific XMPP servers.
To use DNS lookups:
73
Cisco ExpresswayAdministrator Guide
Note that all XMPP federated partners must publish in DNS the addresses of their XMPP servers as described in DNS
SRV Records for XMPP Federation, page 75.
To use static routes:
1. If you want to use static routes for group chat, you must contact the partners with whom you are federating to
get a list of their chat node aliases.
2. On Expressway-E, go to Configuration >Unified Communications.
3. Set Use static routes to On and click Save.
4. Click Configure static routes for federated XMPP domains.
5. On the Federated static routes page, click New.
6. Enter the details of the static route:
Address The IP address or Fully Qualified Domain Name (FQDN) of an XMPP server for this federated
domain or chat node alias.
7. Click Save.
8. Add as many additional static routes as required.
You can specify additional routes to alternative addresses for the same domain or chat node alias (all routes
have an equal priority).
Note that:
If there are no static routes defined for a federated domain or chat node alias, the system will use DNS
instead.
If static routes are defined for the federated domain or chat node alias, but the remote system cannot be
contacted over those routes, the system will not fall back to DNS.
If Privacy mode is set to Allow list and Use static routes is On, any domains (or chat node aliases) that are
configured as static routes are included automatically in the allow list.
Configuring the Allow and Deny Lists for Federated Domains and Chat Node Aliases
The allow and deny lists are used to control restrictions to the set of federated domains and chat node aliases. If
Privacy mode is set to Allow list or Deny list, you must add the domains and chat node aliases with which you want
to allow or deny federated connections.
This function manages restrictions at the domain / chat node alias level. Individual user-based privacy is controlled
by each client / end-user.
The allow list and deny list modes are mutually exclusive. Adomain/alias cannot be allowed and denied at the same
time.
When federation is first enabled, Privacy mode is set to Allow list by default. In effect this puts the system in a
'lockdown' mode you will not be allowed to connect with any federated domains or chat node aliases until you
either add them to the allow list, configure static routes, or change the Privacy mode setting.
74
Cisco Expressway Administrator Guide
4. To manage the domains and chat node aliases in the allow or deny lists, click either Federation allow list or
Federation deny list as appropriate.
In the resulting page you can add, modify or delete the items in the allow/deny list. Wildcards or regexes are
not allowed in the names; it must be an exact match.
All domains and chat node aliases that are configured as static routes are included automatically in the allow list.
_xmpp-server Records
You must publish an _xmpp-server DNS SRV record in DNS for your local domain so that remote enterprises can
access your federated XMPP services. For example:
Similarly, to allow federating parties to discover a particular XMPP federated domain (if they are not using static
routes), the federated enterprise must publish an _xmpp-server DNS SRV record in its public DNS server. For example:
All enterprises must publish the service on port 5269. The published FQDNs must also be resolvable in DNS to an IP
address.
Group Chat
If you configure the Group Chat feature on a Unified CM IM&P server in an XMPP federation deployment, you must
publish DNSSRV records for the federated chat node aliases.
To allow IM and Presence Service to discover a particular XMPP federated chat node alias, the federated enterprise
must publish an _xmpp-server DNS SRV record in its public DNS server. Similarly, IM and Presence Service must
publish the same DNS SRV record in DNS for its domain. For example:
Both enterprises must publish the service on port 5269. The published FQDN must also be resolvable to an IP address
in DNS.
Alternatively, to use group chat aliases on federated servers, you can configure static routes on the Expressway-E
(Configuration >Unified Communications >Federated static routes) for each chat node alias.
Note that:
The chat node aliases are configured on Unified CM IM&P Administration (Messaging > Group Chat Server
Alias Mapping).
Internal users do not need to use DNS to discover chat nodes; they get the chat room details from their local
IM&P servers.
See Chat configuration on IM and Presence for more information about point-to-point instant messaging and group
chat.
75
Cisco ExpresswayAdministrator Guide
An aggregated view is not displayed; only connections routed through the current peer are displayed.
In 2-way connections, the inbound and outbound communications may be managed by different peers.
76
Cisco Expressway Administrator Guide
Port 5269 is open in both directions between the internet and Expressway-E in the DMZ.
DNS settings: host name, domain name and default DNS server (System >DNS).
An accessible NTP server (System >Time).
An active Unified Communications traversal zone on the Expressway-C and its associated Expressway-E
(Status >Zones).
Unified Communications mode is set to Mobile and remote access on both the Expressway-C and the
Expressway-E (Configuration > Unified Communications > Configuration).
XMPP federation support is On on the Expressway-E (Configuration > Unified Communications >
Configuration).
If static routes are enabled, ensure that the appropriate routes for the federated XMPP domains have been
added to the Expressway-E (Configuration > Unified Communications > Federated static routes).
At least one domain is configured on the Expressway-C with XMPP federation set to On (Configuration
>Domains).
IM &Presence servers have been discovered on the Expressway-Cand have an active status (Configuration >
Unified Communications >IM and Presence servers).
If using DNSlookup, check that _xmpp-server public DNS records exist for the domains and chat node aliases
of all federated parties, and that they use port 5269.
Check that port 5269 is open in both directions between the internet and Expressway-E in the DMZ.
If the Expressway-C cannot connect to XCP on the Expressway-E remote host:
Check that the firewall has not blocked port 7400.
If the Expressway-E is running dual network interfaces, ensure that the traversal zone on the Expressway-C
is connected to the internally-facing interface on the Expressway-E.
Be aware that inbound and outbound connections can be routed through different cluster peers.
Valid server certificates are installed, they are in date and not revoked.
Both the remote and local server certificates must contain a valid domain in the Subject Alternative Name
(SAN). This applies even if Require client-side security certificates is disabled.
77
Cisco ExpresswayAdministrator Guide
If Require client-side security certificates is enabled, ensure that the server certificate is signed by a CA and
is not locally signed.
Certificate Authority (CA) certificates are installed.
If you are using group chat over TLS, ensure that the Expressway-C and Expressway-E server certificates
include in their list of subject alternate names (using either XMPPAddress or DNS formats) all of the Chat
Node Aliases that are configured on the IM and Presence servers.
Ensure that compatible security settings (TLS required, optional, no TLS) exist on your system and the remote
federated system.
See Server Certificate Requirements for Unified Communications, page 48 for more information.
Domains
Any domain configuration changes, when one or more existing domains are configured for IM and Presence services
on Unified CM or XMPP Federation will result in an automatic restart of the XCP router on both Expressway-C and
Expressway-E.
The end-user impact is temporary loss of federation and any Jabber clients using mobile and remote access will be
temporarily disconnected. The clients will automatically reconnect after a short period.
78
Cisco Expressway Administrator Guide
This will remove the Expressway-E XMPP federation node from all discovered IM&P servers. A notification will
appear on the IM&P administration interface to restart the XCP router on all affected IM&P nodes.
The end-user impact is that all IM&Psessions will be disconnected. That is, there is a loss of federation,
IM&Psessions over mobile and remote access will be disconnected, and sessions directly homed on the
IM&Pnode will be dropped. When the XCP router is restarted on each IM&P node, all XCP functionality on that
node will be disrupted.
Discovered IM & Presence Servers
Adding or deleting an IM & Presence publisher will require a restart of the XCP router on each IM & Presence node
associated with that publisher only if XMPP Federation is enabled.
This will remove the Expressway-E XMPP federation node from all discovered IM&P servers. A notification will
appear on the IM&P administration interface to restart the XCP router on all affected IM&P nodes.
The end-user impact is that all IM&Psessions will be disconnected. That is, there is a loss of federation,
IM&Psessions over mobile and remote access will be disconnected, and sessions directly homed on the
IM&Pnode will be dropped. When the XCP router is restarted on each IM&P node, all XCP functionality on that
node will be disrupted.
Note that turning the Unified Communications Mode back to On will reinsert the XMPP federation node and have the
same impact on the IM&P servers.
XMPP federation support
Changing the XMPP federation support setting will restart the Expressway-E XCP router.
This will result in the addition/removal of the Expressway-E XMPP federation node from all discovered IM &
Presence servers. A notification will appear on the IM&P administration interface to restart the XCP router on
all affected IM&P nodes.
The end-user impact is that all IM&Psessions will be disconnected. That is, there is a loss of federation,
IM&Psessions over mobile and remote access will be disconnected, and sessions directly homed on the
IM&Pnode will be dropped. When the XCP router is restarted on each IM&P node, all XCP functionality on that
node will be disrupted.
Other XMPP federation settings
Changing any of the other XMPP federation settings, such as static routes, security and privacy settings, or the
allow/deny lists, will only result in a restart of the XMPP Federation Connection Manager service on the Expressway-
E.
End-users may notice a temporary disruption to federation; any mobile and remote access IM&P sessions will remain
connected.
79
Cisco ExpresswayAdministrator Guide
The time taken for a client to reconnect to the XMPP service depends on the re-login limits specified in the Cisco
Server Recovery Manager service parameters on the IM&P server.
See the High Availability Client Login Profiles section in Configuration and Administration of IM and Presence Service
on Cisco Unified Communications Manager for the IM&P version that you are running.
Information Scope
In versions X8.6 and earlier, all Expressway configuration required for deployment with Jabber Guest was contained
in the Administrator Guide. From X8.7 onwards, that information is kept in a separate deployment guide. You can read
more detailed information about Jabber Guest in the following documents:
80
Cisco Expressway Administrator Guide
Cisco Expressway with Jabber Guest Deployment Guide, at the Expressway Configuration Guides page.
Cisco Jabber Guest Server Installation and Configuration Guide, for your version, at the Jabber Guest
Insallation and Upgrade Guides page.
Cisco Jabber Guest Administration Guide, for your version, at Jabber Guest Maintain and Operate Guides
page.
Cisco Jabber Guest Release Notes, for your version, at the Jabber Guest Release Notes page.
81
Protocols
This section provides information about how to configure the Expressway to support the SIP and H.323 protocols.
Configuring H.323 82
Configuring SIP 82
Configuring Domains 84
Configuring SIP and H.323 Interworking 85
Configuring H.323
The H.323 page (Configuration > Protocols > H.323) is used to configure the H.323 settings on the Expressway,
including:
Call signaling The listening port for H.323 call signaling. Default is
TCP port 1720.
Call signaling Specifies the lower port in the range used by H.323 The call signaling port range must be
port range calls after they are established. Default is 15000. great enough to support all the required
start and end concurrent calls.
Call time to live The interval (in seconds) at which the Expressway polls If the endpoint does not respond, the
the endpoints in a call to verify that they are still in the call will be disconnected.
call. Default is 120.
Configuring SIP
The SIP page (Configuration > Protocols > SIP) is used to configure the SIP settings on the Expressway, including:
82
Cisco Expressway Administrator Guide
SIP protocols The Expressway supports SIP over UDP, TCP and TLS At least one of the transport protocol
and ports transport protocols. Use the Mode and Port settings for modes must be On to enable SIP
each protocol to configure whether or not incoming and functionality.
outgoing connections using that protocol are supported,
and if so, the ports on which the Expressway listens for
such connections.
TCP outbound The range of ports the Expressway uses when TCP and The range must be sufficient to
port start / TLS connections are established. The default range is support all required concurrent
end 25000 to 29999. connections.
TLS The timeout period for TLS socket handshake. Default is 5 You may want to increase this value
handshake seconds. if TLS server certificate validation is
timeout slow (e.g. if OCSP servers do not
provide timely responses) and thus
cause connection attempts to
timeout.
Certificate Controls whether revocation checking is performed for We recommend that revocation
revocation certificates exchanged during SIP TLS connection checking is enabled.
checking establishment.
mode
Use OCSP Controls whether the Online Certificate Status Protocol To use OCSP, the X.509 certificate
(OCSP) may be used to perform certificate revocation to be checked must contain an
checking. OCSP responder URI.
83
Cisco ExpresswayAdministrator Guide
Use CRLs Controls whether Certificate Revocation Lists (CRLs) are CRLs can be used if the certificate
used to perform certificate revocation checking. does not support OCSP.
Allow CRL Controls whether the download of CRLs from the CDP URIs
downloads contained in X.509 certificates is allowed.
from CDPs
Fallback Controls the revocation checking behavior if the revocation Treat as not revoked ensures that
behavior status cannot be established, for example if the revocation your system continues to operate in
source cannot be contacted. a normal manner if the revocation
source cannot be contacted,
Treat as revoked: treat the certificate as revoked (and thus however it does potentially mean
do not allow the TLS connection). that revoked certificates will be
accepted.
Treat as not revoked: treat the certificate as not revoked.
SDP max size Specifies the maximum size of SDP payload that can be
handled by the Expressway (in bytes)
SIPTCPconnect Specifies the maximum number of seconds to wait for an You can reduce this to speed up
timeout outgoing SIP TCP connection to be established. the time between attempting a
broken route (eg. unavailable
Default is 10 seconds. onward SIPproxy peer) and failing
over to a good one.
Configuring Domains
The Domains page (Configuration > Domains) lists the domains managed by this Expressway for Unified
Communications services.
A domain name can comprise multiple levels. Each level's name can only contain letters, digits and hyphens, with
each level separated by a period (dot). A level name cannot start or end with a hyphen, and the final level name must
start with a letter. An example valid domain name is 100.example-name.com.
Note that values shown in the Index column correspond to the numeric elements of the %localdomain1%,
%localdomain2%, . . . %localdomain200% pattern matching variables.
You can configure up to 200 domains. (Note that you cannot configure domains on an Expressway-E.)
84
Cisco Expressway Administrator Guide
SIP registrations and provisioning on Unified CM: Endpoint registration, call control and provisioning for this
SIP domain is serviced by Unified CM. The Expressway acts as a Unified Communications gateway to provide
secure firewall traversal and line-side support for Unified CM registrations. The default is On.
IM and Presence Service: Instant messaging and presence services for this SIP domain are provided by the
Unified CM IM and Presence service. The default is On.
XMPPfederation: Enables XMPPfederation between this domain and partner domains. The default is On.
Deployment: Associates the domain with the selected deployment, if there are multiple deployments. This
setting is absent if there is only one deployment (there is always at least one).
Any domain configuration changes, when one or more existing domains are configured for IM and Presence services
on Unified CM or XMPP Federation will result in an automatic restart of the XCP router on both Expressway-C and
Expressway-E.
The end-user impact is temporary loss of federation and any Jabber clients using mobile and remote access will be
temporarily disconnected. The clients will automatically reconnect after a short period.
Ensure all your endpoints, both H.323 and SIP, register with an alias in the form name@domain.
Create a pre-search transform on the Expressway that strips the @domain portion of the alias for those URIs that
are in the form of number@domain.
See the pre-search transforms section for information about how to configure pre-search transforms, and the
stripping @domain for dialing to H.323 numbers section for an example of how to do this.
Interworking DTMFsignals
For SIPcalls, the Expressway implements RFC2833 for DTMFsignaling in RTP payloads.
For H.323 calls, the Expressway implements H.245 UserInputIndication for DTMFsignaling.
85
Cisco ExpresswayAdministrator Guide
When the Expressway is interworking a call between SIPand H.323, it also interworks the DTMFsignaling, but only
between RFC2833 signaling and H.245 UserInputIndications.
86
Cisco Expressway Administrator Guide
87
Device Authentication
This section provides information about the Expressway's authentication policy and the pages that appear under the
Configuration > Authentication menu.
88
Cisco Expressway Administrator Guide
When the Expressway uses a policy service it sends information about the call request to the service in a POST
message using a set of name-value pair parameters. Those parameters include information about whether the
request has come from an authenticated source or not.
More information about policy services, including example CPL, can be found in External Policy on Expressway
Deployment Guide.
CPL
If you are using the Call Policy rules generator on the Expressway, source matches are carried out against
authenticated sources. To specify a match against an unauthenticated source, just use a blank field. (If a source is
not authenticated, its value cannot be trusted).
If you use uploaded, handcrafted local CPL to manage your Call Policy, you are recommended to make your CPL
explicit as to whether it is looking at the authenticated or unauthenticated origin.
If CPL is required to look at the unauthenticated origin (for example, when checking non-authenticated
callers) the CPL must use unauthenticated-origin. (However, if the user is unauthenticated, they can call
themselves whatever they like; this field does not verify the caller.)
To check the authenticated origin (only available for authenticated or treat as authenticated devices) the
CPL should use authenticated-origin.
Note that due to the complexity of writing CPL scripts, you are recommended to use an external policy service
instead.
Check credentials: verify the credentials using the relevant authentication method. Note that in some
scenarios, messages are not challenged, see below.
Do not check credentials: do not verify the credentials and allow the message to be processed.
Treat as authenticated: do not verify the credentials and allow the message to be processed as if it is has
been authenticated. This option can be used to cater for endpoints from third-party suppliers that do not
support authentication within their registration mechanism. Note that in some scenarios, messages are
allowed but will still be treated as though they are unauthenticated, see below.
Authentication policy is selectively configurable for different zone types, based on whether they receive messaging:
The Default Zone, Neighbor zones, traversal client zones, traversal server zones and Unified Communications
traversal zones all allow configuration of authentication policy
DNS and ENUM zones do not receive messaging and so have no authentication policy configuration.
To edit a zone's Authentication policy, go to Configuration > Zones >Zones and click the name of the zone. The
policy is set to Do not check credentials by default when you create a new zone.
The behavior varies for H.323 and SIP messages as shown in the tables below:
H.323
Policy Behavior
Check Messages are classified as either authenticated or unauthenticated depending on whether any
credentials credentials in the message can be verified against the authentication database.
Do not check Message credentials are not checked and all messages are classified as unauthenticated.
credentials
89
Cisco ExpresswayAdministrator Guide
Policy Behavior
Treat as Message credentials are not checked and all messages are classified as authenticated.
authenticated
SIP
The behavior for SIP messages at the zone level depends upon the SIP authentication trust mode setting (meaning
whether the Expressway trusts any pre-existing authenticated indicators - known as P-Asserted-Identity headers -
within the received message).
90
Cisco Expressway Administrator Guide
To simplify this so that a devices credentials only have to be authenticated once (at the first hop), and to reduce the
number of SIP messages in your network, you can configure neighbor zones to use the Authentication trust mode
setting.
This is then used in conjunction with the zone's authentication policy to control whether pre-authenticated SIP
messages received from that zone are trusted and are subsequently treated as authenticated or unauthenticated
within the Expressway. Pre-authenticated SIP requests are identified by the presence of a P-Asserted-Identity field in
the SIP message header as defined by RFC 3325.
The Authentication trust mode settings are:
On: pre-authenticated messages are trusted without further challenge and subsequently treated as
authenticated within the Expressway. Unauthenticated messages are challenged if the Authentication policy
is set to Check credentials.
Off: any existing authenticated indicators (the P-Asserted-Identity header) are removed from the message.
Messages from a local domain are challenged if the Authentication policy is set to Check credentials.
Note:
We recommend that you enable authentication trust only if the neighbor zone is part of a network of trusted
SIP servers.
Authentication trust is automatically implied between traversal server and traversal client zones.
91
Zones and Neighbors
This section describes how to configure zones and neighbors on the Expressway (Configuration > Zones).
About Zones 92
Configuring Media Encryption Policy 93
Configuring ICE Messaging Support 93
The Default Zone 94
Configuring Default Zone access rules 95
Configuring Zones 96
About Zones
A zone is a collection of endpoints, either all registered to a single system or located in a certain way such as via an
ENUM or DNS lookup. Zones are used to:
control through links whether calls can be made between these zones
manage the bandwidth of calls
search for aliases
control the services available to endpoints within that zone by setting up its authentication policy
control the media encryption and ICE capabilities for SIP calls to and from a zone
You can configure up to 1000 zones. Each zone is configured as one of the following zone types:
See the Zone configuration section for information about the configuration options available for all zone types.
See the Configuring search and zone transform rules section for information about including zones as targets
for search rules.
Automatically generated neighbor zones
The Expressway may automatically generate some non-configurable neighbor zones:
92
Cisco Expressway Administrator Guide
An Expressway-C automatically generates neighbor zones between itself and each discovered Unified CM
node when the system is configured for mobile and remote access.
An Expressway automatically generates a neighbor zone named "To Microsoft Lync server via B2BUA" when
the Lync B2BUA is enabled.
The policy is configured on a per zone basis and applies only to that leg of the call in/out of that zone.
Encryption is applied to the SIP leg of the call, even if other legs are H.323.
Media encryption policy is configured through the Media encryption mode setting on each zone, however the
resulting encryption status of the call is also dependent on the encryption policy settings of the target system (such as
an endpoint or another Expressway).
The encryption mode options are:
Force encrypted: all media to and from the zone must be encrypted. If the target system/endpoint is
configured to not use encryption, then the call will be dropped.
Force unencrypted: all media must be unencrypted. If the target system/endpoint is configured to use
encryption, then the call may be dropped; if it is configured to use Best effort then the call will fall back to
unencrypted media.
Best effort: use encryption if available, otherwise fall back to unencrypted media.
Auto: no specific media encryption policy is applied by the Expressway. Media encryption is purely dependent
on the target system/endpoint requests. This is the default behavior and is equivalent to how the Expressway
operated before this feature was introduced.
Encryption policy (any encryption setting other than Auto) is applied to a call by routing it through a back-to-back user
agent (B2BUA) hosted on the Expressway.
When configuring your system to use media encryption you should note that:
Any zone with an encryption mode of Force encrypted or Force unencrypted must be configured as a SIP-only
zone (H.323 must be disabled on that zone).
TLS transport must be enabled if an encryption mode of Force encrypted or Best effort is required.
The call component routed through the B2BUA can be identified in the call history details as having a
component type of B2BUA.
There is a limit per Expressway of 100 simultaneous calls (500 calls on Large systems) that can have a media
encryption policy applied.
The B2BUA can also be invoked when ICE messaging support is enabled.
93
Cisco ExpresswayAdministrator Guide
The behavior depends upon the configuration of the ICE support setting on the incoming (ingress) and outgoing
(egress) zone. When there is a mismatch of settings i.e. On on one side and Off on the other side, the Expressway
invokes its back-to-back user agent (B2BUA) to perform ICE negotiation with the relevant host.
All zones have ICE support set to Off by default.
When the B2BUA performs ICE negotiation with a host, it can offer TURN relay candidate addresses. To do this, the
B2BUA must be configured with the addresses of the TURN servers to offer (via Applications > B2BUA > B2BUA
TURN servers).
The following matrix shows the Expressway behavior for the different possible combinations of the ICE support
setting when handling a call between, for example, zone A and zone B:
ICE Zone A
support
setting Off On
B2BUA is not normally invoked (however, see the B2BUA includes ICE candidates in messages to
Zone note below regarding media encryption policy). hosts in Zone A.
B
On B2BUA is invoked. Standard Expressway proxying behavior.
B2BUA includes ICE candidates in messages to B2BUA is not normally invoked (however, see the
hosts in Zone B. note below regarding media encryption policy).
Both zones = Off At least one zone is Yes The B2BUA will not perform any ICE negotiation with
not Auto either host.
Both zones = On At least one zone is Yes The B2BUA will perform ICE negotiation with both hosts.
not Auto
Both zones = On Both zones = Auto No The Expressway will not offer any TURN relay candidate
addresses to either of the ICE capable hosts. However,
note that each host device may have already been
provisioned with TURN relay candidate addresses.
Note that:
B2BUA routed calls are identified in the call history by a component type of B2BUA.
There is a limit of 100 concurrent calls (500 calls on Large systems) that can be routed via the B2BUA.
94
Cisco Expressway Administrator Guide
Authentication The Authentication policy See Authentication Policy Configuration Options, page 89 for
policy setting controls how the more information.
Expressway challenges
incoming messages to the
Default Zone.
Media The Media encryption mode See Configuring Media Encryption Policy, page 93 for more
encryption setting controls the media information.
mode encryption capabilities for SIP
calls flowing through the Default
Zone.
ICE support Controls whether ICE messages See Configuring ICE Messaging Support, page 93 for more
are supported by the devices in information.
this zone.
Use Default This controls whether access The default TLSport is 5061 and the default MTLSport is 5062.
Zone access rules are applied to external This setting does not affect other connections to the Default
rules on port systems that attempt to connect Zone (H.323 and SIPUDP/TCP).
to the Expressway TLSport via
the Default Zone. TLSand MTLS: Access rules are enabled for Default Zone
connection attempts to the Expressway TLSand MTLSports.
delete the default links to prevent any incoming calls from unrecognized endpoints
apply pipes to the default links to control the bandwidth consumed by incoming calls from unrecognized
endpoints
95
Cisco ExpresswayAdministrator Guide
The switch to control whether or not these rules are engaged on the default zone is on the Configuration >Zones >
Zones >DefaultZone page. See The Default Zone, page 94.
Priority Determines the order in which the rules are applied if the
certificate names match multiple rules. The rules with the
highest priority (1, then 2, then 3 and so on) are applied first.
Multiple rules with the same priority are applied in
configuration order.
Pattern The way in which the Pattern string must match the Subject You can test whether a pattern
type Common Name or any Subject Alternative Names contained matches a particular name by using
within the certificate. the Check pattern tool
(Maintenance > Tools > Check
Exact: the entire string must exactly match the name, pattern).
character for character.
Action The action to take if the certificate matches this access rule.
State Indicates if the rule is enabled or not. Use this setting to test configuration
changes, or to temporarily disable
certain rules. Any disabled rules still
appear in the rules list but are
ignored.
Configuring Zones
The Zones page (Configuration > Zones > Zones) lists all the zones that have been configured on the Expressway,
and lets you create, edit and delete zones.
It also displays the zone's H.323 or SIP connection status:
96
Cisco Expressway Administrator Guide
Failed: the protocol is enabled for that zone but its connection has failed
Checking: the protocol is enabled for that zone and the system is currently trying to establish a connection
To neighbor with another system (such as another Expressway or gatekeeper), create a connection over a firewall to
a traversal server or traversal client, or discover endpoints via an ENUM or DNS lookup, you must configure a zone on
the local Expressway. The available zone types are:
neighbor zone relationship definitions are one-way; adding a system as a neighbor to your Expressway does
not automatically make your Expressway a neighbor of that system
inbound calls from any configured neighbor are identified as coming from that neighbor
systems that are configured as cluster peers (formerly known as Alternates) must not be configured as
neighbors to each other
The configurable options for a neighbor zone are:
Configuration section:
97
Cisco ExpresswayAdministrator Guide
Type The nature of the specified zone, in relation to the After a zone has been created, the Type
local Expressway. Select Neighbor. cannot be changed.
Hop count The hop count is the number of times a request If the search request was received from
will be forwarded to a neighbor gatekeeper or another zone and already has a hop count
proxy (see the Hop counts section for more assigned, the lower of the two values is used.
information). This field specifies the hop count to
use when sending a search request to this
particular zone.
H.323 section:
Port The port on the neighbor system used for H.323 This must be the same port number as that
searches initiated from the local Expressway. configured on the neighbor system as its
H.323 UDP port.
SIP section:
Port The port on the neighbor system used for outgoing This must be the same port number as that
SIP messages initiated from the local Expressway. configured on the neighbor system as its SIP
TCP, SIP TLS or SIP UDP listening port
(depending on which SIP Transport mode is
in use).
TLS verify Controls whether the Expressway performs X.509 If the neighbor system is another Expressway,
mode certificate checking against the neighbor system both systems can verify each other's
when communicating over TLS. certificate (known as mutual authentication).
See TLS Certificate Verification of Neighbor
Systems, page 110 for more information.
Media Controls the media encryption policy applied by See Configuring Media Encryption Policy,
encryption the Expressway for SIP calls (including page 93 for more information.
mode interworked calls) to and from this zone.
ICE support Controls whether ICE messages are supported by See Configuring ICE Messaging Support, page
the devices in this zone. 93 for more information.
Authentication section:
Authentication Controls how the Expressway authenticates The behavior varies for H.323 messages, SIP
policy incoming messages from this zone and whether messages that originate from a local domain
they are subsequently treated as authenticated, and SIP messages that originate from non-
unauthenticated, or are rejected. local domains. See Authentication Policy
Configuration Options, page 89 for more
information.
SIP Controls whether authenticated SIP messages See SIP Authentication Trust, page 90 for
authentication (ones containing a P-Asserted-Identity header) more information.
trust mode from this zone are trusted without further
challenge.
98
Cisco Expressway Administrator Guide
Location section:
Location The IP address or FQDN of the neighbor system. Calls to an Expressway cluster are routed to
Peer 1 to Peer whichever peer in that neighboring cluster has
6 address Enter the addresses of additional peers if: the lowest resource usage. See Neighboring
Between Expressway Clusters, page 118 for
the neighbor is an Expressway cluster, in more information.
which case you must specify all of the
peers in the cluster For connections to non-Expressway systems,
the Expressway uses a round-robin selection
the neighbor is a resilient non-Expressway process to decide which peer to contact if no
system, in which case you must enter the resource usage information is available.
addresses of all of the resilient elements in
that system
Advanced section:
Zone profile Determines how the zone's advanced settings are See Zone Configuration: Advanced Settings,
configured. page 106 for details on the advanced settings.
Default: uses the factory default profile. Only use the Custom profile to configure the
individual advanced settings on the advice of
Custom: allows you to configure each setting Cisco customer support.
individually.
See Cisco Unified Communications Manager
Alternatively. choose one of the preconfigured with Expressway Deployment Guide for more
profiles to automatically use the appropriate information about the Cisco Unified
settings required for connections to that type of Communications Manager profiles.
system. The options include:
99
Cisco ExpresswayAdministrator Guide
Configuration section:
Type The nature of the specified zone, in relation to the local After a zone has been created,
Expressway. Select Traversal client. the Type cannot be changed.
Hop count The hop count is the number of times a request will be If the search request was
forwarded to a neighbor gatekeeper or proxy (see the Hop received from another zone and
counts section for more information). This field specifies the already has a hop count
hop count to use when sending a search request to this assigned, the lower of the two
particular zone. values is used.
Username and Traversal clients must always authenticate with traversal Multiple traversal client zones
Password servers by providing their authentication credentials. Each can be configured, each with
traversal client zone must specify a Username and distinct credentials, to connect
Password to be used for authentication with the traversal to one or more service providers.
server.
H.323 section:
Mode Determines whether H.323 calls are allowed to and from the
traversal server.
Protocol Determines which of the two firewall traversal protocols See Configuring Ports for
(Assent or H.460.18) to use for calls to the traversal server. Firewall Traversal, page 40 for
more information.
Port The port on the traversal server to use for H.323 calls to and For firewall traversal to work via
from the local Expressway. H.323, the traversal server must
have a traversal server zone
configured on it to represent this
Expressway, using this same port
number.
SIP section:
Mode Determines whether SIP calls are allowed to and from the
traversal server.
Port The port on the traversal server to use for SIP calls to and For firewall traversal to work via
from the Expressway. SIP, the traversal server must
have a traversal server zone
This must be different from the listening ports used for configured on it to represent this
incoming TCP, TLS and UDP SIP calls (typically 5060 and Expressway, using this same
5061). transport type and port number.
Unified Controls whether this traversal zone provides Unified If enabled, this zone must also be
Communications Communications services, such as mobile and remote configured to use TLS with TLS
services access. verify mode enabled.
100
Cisco Expressway Administrator Guide
Transport Determines which transport type is used for SIP calls to and
from the traversal server. The default is TLS.
TLS verify mode Controls X.509 certificate checking and mutual See TLS Certificate Verification
authentication between this Expressway and the traversal of Neighbor Systems, page 110
server when communicating over TLS. for more information.
Media Controls the media encryption policy applied by the See Configuring Media
encryption Expressway for SIP calls (including interworked calls) to Encryption Policy, page 93 for
mode and from this zone. more information.
ICE support Controls whether ICE messages are supported by the See Configuring ICE Messaging
devices in this zone. Support, page 93 for more
information.
Poison mode Determines if SIP requests sent to systems located via this
zone are "poisoned" such that if they are received by this
Expressway again they will be rejected.
Authentication section:
Authentication Controls how the Expressway authenticates incoming See Authentication Policy
policy messages from this zone and whether they are Configuration Options, page 89
subsequently treated as authenticated, unauthenticated, or for more information.
are rejected. The behavior varies for H.323 messages, SIP
messages that originate from a local domain and SIP
messages that originate from non-local domains.
Location section:
Peer 1 to Peer 6 The IP address or FQDN of the traversal server. See Neighboring Between
address Expressway Clusters, page 118
If the traversal server is an Expressway-E cluster, this for more information.
should include all of its peers.
Note:You must synchronize with an NTP server to make sure that traversal zones to work.
After you have neighbored with the traversal client you can:
101
Cisco ExpresswayAdministrator Guide
Configuration section:
Type The nature of the specified zone, in relation to the After a zone has been created, the
local Expressway. Select Traversal server. Type cannot be changed.
Hop count The hop count is the number of times a request will If the search request was received from
be forwarded to a neighbor gatekeeper or proxy (see another zone and already has a hop
the Hop counts section for more information). This count assigned, the lower of the two
field specifies the hop count to use when sending a values is used.
search request to this particular zone.
Username Traversal clients must always authenticate with There must also be an entry in the
traversal servers by providing their authentication Expressway-E's local authentication
credentials. database for the clients authentication
username and password. To check the
The authentication username is the name that the list of entries and add it if necessary, go
traversal client must provide to the Expressway-E. (It to the Local authentication database
is configured as the connection credentials page. Either:
Username in its traversal client zone.)
click on the Add/Edit local
authentication database link
go to Configuration >
Authentication > Local
database
H.323 section:
Protocol Determines the protocol (Assent or H.460.18) to use See Configuring Ports for Firewall
to traverse the firewall/NAT. Traversal, page 40 for more
information.
SIP section:
102
Cisco Expressway Administrator Guide
Port The port on the local Expressway-E to use for SIP This must be different from the listening
calls to and from the traversal client. ports used for incoming TCP, TLS and
UDP SIP calls (typically 5060 and
5061).
Unified Controls whether this traversal zone provides Unified If enabled, this zone must also be
Communications Communications services, such as mobile and configured to use TLS with TLS verify
services remote access. mode enabled.
TLS verify mode Controls X.509 certificate checking and mutual If the traversal client is clustered, the
and subject authentication between this Expressway and the TLS verify subject name must be the
name traversal client. FQDN of the cluster.
If TLS verify mode is enabled, a TLS verify subject See TLS Certificate Verification of
name must be specified. This is the certificate Neighbor Systems, page 110 for more
holder's name to look for in the traversal client's information.
X.509 certificate.
Media Controls the media encryption policy applied by the See Configuring Media Encryption
encryption Expressway for SIP calls (including interworked calls) Policy, page 93 for more information.
mode to and from this zone.
ICE support Controls whether ICE messages are supported by the See Configuring ICE Messaging
devices in this zone. Support, page 93 for more information.
Authentication section:
UDP retry The frequency (in seconds) with which the client The default UDP and TCP probe retry
interval sends a UDP probe to the Expressway-E if a keep intervals are suitable for most
alive confirmation has not been received. situations. However, if you experience
problems with NAT bindings timing out,
they may need to be changed.
103
Cisco ExpresswayAdministrator Guide
UDP retry count The number of times the client attempts to send a
UDP probe to the Expressway-E during call setup.
UDP keep alive The interval (in seconds) with which the client sends
interval a UDP probe to the Expressway-E after a call is
established, in order to keep the firewalls NAT
bindings open.
TCP retry The interval (in seconds) with which the traversal
interval client sends a TCP probe to the Expressway-E if a
keep alive confirmation has not been received.
TCP retry count The number of times the client attempts to send a
TCP probe to the Expressway-E during call setup.
TCP keep alive The interval (in seconds) with which the traversal
interval client sends a TCP probe to the Expressway-E when
a call is in place, in order to maintain the firewalls
NAT bindings.
Type The nature of the specified zone, in relation to the local Expressway. After a zone has been created, the
Select ENUM. Type cannot be changed.
Hop The hop count is the number of times a request will be forwarded to a If the search request was received
count neighbor gatekeeper or proxy (see the Hop counts section for more from another zone and already has
information). This field specifies the hop count to use when sending a hop count assigned, the lower of
a search request to this particular zone. the two values is used.
H.323 Determines whether H.323 records are looked up for this zone.
mode
SIP Determines whether SIP records are looked up for this zone.
mode
104
Cisco Expressway Administrator Guide
Type The nature of the specified zone, in relation to the After a zone has been created, the Type
local Expressway. Select DNS. cannot be changed.
Hop count The hop count is the number of times a request will If the search request was received from
be forwarded to a neighbor gatekeeper or proxy (see another zone and already has a hop count
the Hop counts section for more information). This assigned, the lower of the two values is used.
field specifies the hop count to use when sending a
search request to this particular zone.
TLS verify Controls whether the Expressway performs X.509 This setting only applies if the DNS lookup
mode and certificate checking against the destination system specifies TLS as the required protocol. If TLS
subject server returned by the DNS lookup. is not required then the setting is ignored. See
name TLS Certificate Verification of Neighbor
If TLS verify mode is enabled, a TLS verify subject Systems, page 110 for more information.
name must be specified. This is the certificate
holder's name to look for in the destination system
server's X.509 certificate.
Fallback The transport type to use for SIP calls from the DNS
transport zone, when DNS NAPTR records and SIP URI
protocol parameters do not provide the preferred transport
information.
Media Controls the media encryption policy applied by the See Configuring Media Encryption Policy,
encryption Expressway for SIP calls (including interworked calls) page 93 for more information.
mode to the internet.
ICE Controls whether ICE messages are supported by the See Configuring ICE Messaging Support, page
support devices in this zone. 93 for more information.
105
Cisco ExpresswayAdministrator Guide
Zone Determines how the zone's advanced settings are See Zone Configuration: Advanced Settings,
profile configured. page 106 for details on the advanced settings.
Default: uses the factory default profile. Only use the Custom profile to configure the
individual advanced settings on the advice of
Custom: allows you to configure each setting Cisco customer support.
individually.
Include Determines whether, if no NAPTR (SIP) or SRV (SIP and H.323) records Off DNS
address have been found for the dialed alias via this zone, the Expressway will
record then query for A and AAAA DNS records before moving on to query lower
priority zones. If A and AAAA records exist at the same domain for
systems other than those that support SIP or H.323, this may result in the
Expressway believing the search was successful and forwarding calls to
this zone, and the call will fail.
On: the Expressway queries for A or AAAA records. If any are found, the
Expressway will not then query any lower priority zones.
Off: the Expressway will not query for A and AAAA records and instead
will continue with the search, querying the remaining lower priority
zones.
Monitor peer Specifies whether the Expressway monitors the status of the zone's Yes Neighbor
status peers. If enabled, H.323 LRQs and/or SIP OPTIONS are periodically sent
to the peers. If a peer fails to respond, that peer is marked as inactive. If
all peers fail to respond the zone is marked as inactive.
Call signaling Specifies how the Expressway handles the signaling for calls to and from Auto Neighbor
routed mode this neighbor.
Calls via traversal zones or the B2BUA always take the signaling.
Automatically Determines what happens when the Expressway receives an H.323 Off Neighbor
respond to search, destined for this zone.
H.323
searches Off: an LRQ message is sent to the zone.
106
Cisco Expressway Administrator Guide
Automatically Determines what happens when the Expressway receives a SIP search Off Neighbor
respond to that originated as an H.323 search. DNS
SIP searches
Off: a SIP OPTIONS or SIP INFO message is sent.
This should normally be left as the default Off. However, some systems
do not accept SIP OPTIONS messages, so for these zones it must be set
to On. If you change this to On, you must also configure pattern matches
to ensure that only those searches that actually match endpoints in this
zone are responded to. If you do not, the search will not continue to
other lower-priority zones, and the call will be forwarded to this zone
even if it cannot support it.
Send empty Determines whether the Expressway generates a SIP INVITE message On Neighbor
INVITE for with no SDP to send via this zone. INVITES with no SDP mean that the DNS
interworked destination device is asked to initiate the codec selection, and are used
calls when the call has been interworked locally from H.323.
In most cases this option should normally be left as the default On.
However, some devices do not accept invites with no SDP, so for these
zones this should be set to Off.
Note that the settings for the pre-configured SDP are configurable via
the CLI using the xConfiguration Zones Zone [1..1000] [Neighbor/DNS]
Interworking SIP commands. They should only be changed on the
advice of Cisco customer support.
SIPparameter Determines whether the Expressway's B2BUA preserves or rewrites the Off Neighbor
preservation parameters in SIP requests routed via this zone.
DNS
On preserves the SIP Request URI and Contact parameters of requests
routing between this zone and the B2BUA. UCTraversal
Off allows the B2BUA to rewrite the SIP Request URI and Contact Traversal
parameters of requests routing between this zone and the B2BUA, if Server
necessary.
Traversal
Default: Off Client
SIP poison On: SIP requests sent to systems located via this zone are "poisoned" Off Neighbor
mode such that if they are received by this Expressway again they will be Traversal
rejected. client
Traversal
Off: SIP requests sent out via this zone that are received by this server
Expressway again will not be rejected; they will be processed as normal. DNS
107
Cisco ExpresswayAdministrator Guide
SIP Determines whether or not the Expressway allows encrypted SIP calls on Auto Neighbor
encryption this zone.
mode
Auto: SIP calls are encrypted if a secure SIP transport (TLS) is used.
SIP REFER Determines how SIP REFER requests are handled. Forward Neighbor
mode
Forward: SIP REFER requests are forwarded to the target.
SIP multipart Controls whether or not multipart MIME stripping is performed on Off Neighbor
MIME strip requests from this zone.
mode
This option should normally be left as the default Off.
SIP UPDATE Controls whether or not the Expressway strips the UPDATE method from Off Neighbor
strip mode the Allow header of all requests and responses received from, and sent
to, this zone.
This option should normally be left as the default Off. However, some
systems do not support the UPDATE method in the Allow header, so for
these zones this should be set to On.
Interworking Determines how the Expressway searches for SIP endpoints when Options Neighbor
SIP search interworking an H.323 call.
strategy
Options: the Expressway sends an OPTIONS request.
SIP Determines whether INVITE requests sent to this zone filter out Off Neighbor
UDP/BFCP UDP/BFCP. This option may be required to enable interoperability with DNS
filter mode SIP devices that do not support the UDP/BFCP protocol.
On: any media line referring to the UDP/BFCP protocol is replaced with
TCP/BFCP and disabled.
108
Cisco Expressway Administrator Guide
SIP UDP/IX Determines whether INVITE requests sent to this zone filter out Off Neighbor
filter mode UDP/UDT/IX or UDP/DTLS/UDT/IX. This option may be required to enable DNS
interoperability with SIP devices that do not support the UDP/UDT/IX or
UDP/DTLS/UDT/IX protocol.
SIP record Controls whether the Expressway uses its IP address or host name in the IP Neighbor
route address record-route or path headers of outgoing SIP requests to this zone. DNS
type
IP: uses the Expressway's IP address.
Hostname: uses the Expressway's System host name (if it is blank the IP
address is used instead).
SIP Proxy- A comma-separated list of option tags to search for and remove from None Neighbor
Require Proxy-Require headers in SIP requests received from this zone.
header strip
list
109
Cisco ExpresswayAdministrator Guide
SIP multipart MIME strip mode Off Off Off Off Off
For more information about configuring a SIP trunk between Expressway and Unified CM, see Cisco Unified
Communications Manager with Expressway Deployment Guide.
110
Cisco Expressway Administrator Guide
111
Clustering and Peers
This section describes how to set up a cluster of Expressway peers. Clustering is used to increase the capacity of
your Expressway deployment and to provide resiliency.
About Clusters
An Expressway can be part of a cluster of up to six Expressways. Each Expressway in the cluster is a peer of every
other Expressway in the cluster. When creating a cluster, you define a cluster name and nominate one peer as the
master from which all relevant configuration is replicated to the other peers in the cluster. Clusters are used to:
Increase the capacity of your Expressway deployment compared with a single Expressway.
Provide redundancy in the rare case that an Expressway becomes inaccessible (for example, due to a network
or power outage) or while it is in maintenance mode (for example, during a software upgrade).
About the configuration master
All peers in a cluster must have identical configuration for subzones, zones, links, pipes, authentication, bandwidth
control and Call Policy. To achieve this, you define a cluster name and nominate one peer as the configuration
master. Any configuration changes made to the master peer are then automatically replicated across all the other
peers in the cluster.
You should only make configuration changes on the primary Expressway.
Caution: Do not adjust any cluster-wide configuration until the cluster is stable with all peers running. Cluster
database replication will be negatively impacted if any peers are upgrading, restarting, or out of service when
you change the cluster's configuration.
Any changes made on other peers are not reflected across the cluster, and will be overwritten the next time the
primarys configuration is replicated across the peers. The only exceptions to this are some peer-specific
configuration items.
You may need to wait up to one minute before changes are updated across all peers in the cluster.
Secure communication between peers
The Expressway uses IPsec (Internet Protocol Security) to enable secure communication between each cluster peer.
Authentication is carried out through the use of a pre-shared access key.
Each peer in the cluster must be individually configured with the IP address and associated access key of every other
peer in that cluster.
112
Cisco Expressway Administrator Guide
CE1100 appliance can run with medium or large capacity, depending on whether it has 1Gbps or 10Gbps NICs
installed.
This is the maximum number of licenses the system can use. This limit specifically applies to the case where a peer
becomes unavailable and other peers must use its licenses to honor the cluster's overall capacity. This is not intended
as a production capcacity limit, only as a temporary measure to allow the affected peer to be returned to normal
service. We strongly discourage installing more than 100 licenses on any platform that has small or medium
capacity.
* On a Large system, the total TURN capacity of 6000 relays is spread evenly across 6 ports; each port is limited to
handling 1000 relays. On a Small/Medium system, there is a single TURN port that handles up to 1800 relays.
You can see a summary of all of the call and TURN relay licenses installed on each cluster peer by going to the Option
keys page and scrolling down to the Current licenses section.
If the call media traverses the cluster peers, or if either endpoint is registered with ASSENTor H.460 capability:
Capacity alarms are raised if either of the following usage thresholds are reached:
the number of concurrent calls reaches 90% of the capacity of the cluster
the number of concurrent calls on any one unit reaches 90% of the physical capacity of the unit
Setting Up a Cluster
Prerequisites
Before setting up a cluster of X8.7Expressway peers or adding an X8.7Expressway to a cluster, ensure that:
113
Cisco ExpresswayAdministrator Guide
All clusters peers are running the same version of code. The only occasion where different peers are allowed
to run different versions of code is for the short period of time while a cluster is being upgraded from one
version of code to another, during which time the cluster will operate in a partitioned fashion.
Each peer is using a hardware platform (appliance or virtual machine) with equivalent capabilities; for
example, you can cluster peers that are running on standard appliances with peers running on 2 core Medium
VMs, but you cannot cluster a peer running on a standard appliance with peers running on 8 core Large VMs.
Network Conditions Are Met
Each peer has a different LAN configuration (a different IPv4 address and a different IPv6 address, where
enabled).
Each peer in a cluster is within a 15ms hop (30ms round trip delay) of each and every other Expressway in or to
be added to the cluster.
Each peer in a cluster is directly routable to each and every other Expressway in or to be added to the cluster.
(There must be no NAT between cluster peers if there is a firewall ensure that the required ports are
opened.)
Basic Configuration Is Done
The DNS servers used by the Expressway peers must support both forward and reverse DNS lookups of all
Expressway peer addresses; the DNS servers must also provide address lookup for any other DNS functionality
required, such as:
NTP servers or the external manager if they configured using DNS names
Microsoft Lync Server FQDN lookup
LDAP server forward and reverse lookup (reverse lookups are frequently provided through PTR records)
Note: DNS server configuration does not replicate and you must configure the DNSserver address on each
peer.
A DNS SRV record is available for the cluster which contains A or AAAA records for each peer of the cluster.
This configuration is advised for video interoperability and business to business (B2B) video calling, but is not
required for Mobile and Remote Access.
(For MRA) Create a collab-edge SRVrecord for each peer in the Expressway-E cluster
(For B2B only) The Expressway-E cluster has a DNS SRV record that defines all cluster peers
Next Steps
To create your cluster you must first configure a primary peer and then add the other peers into the cluster one at a
time.
We recommend that you backup your Expressway data before setting up a cluster.
See Expressway Cluster Creation and Maintenance Deployment Guide on the Expressway Configuration Guides
page.
114
Cisco Expressway Administrator Guide
Maintaining a Cluster
The Clustering page (System > Clustering) lists the IP addresses of all the peers in the cluster, to which this
Expressway belongs, and identifies the master peer.
Cluster name
The Cluster name is used to identify one cluster of Expressways from another. Set it to the fully qualified domain
name (FQDN) used in SRV records that address this Expressway cluster, for example cluster1.example.com.
The FQDN can comprise multiple levels. Each level's name can only contain letters, digits and hyphens, with each
level separated by a period (dot). A level name cannot start or end with a hyphen, and the final level name must start
with a letter.
Cluster pre-shared key
The Expressway uses IPsec (Internet Protocol Security) to enable secure communication between each cluster peer.
The Cluster pre-shared key is the common IPsec access key used by each peer to access every other peer in the
cluster.
Note: each peer in the cluster must be configured with the same Cluster pre-shared key.
Setting configuration for the cluster
You should only make configuration changes on the primary Expressway.
Caution: Do not adjust any cluster-wide configuration until the cluster is stable with all peers running. Cluster
database replication will be negatively impacted if any peers are upgrading, restarting, or out of service when
you change the cluster's configuration.
Any changes made on other peers are not reflected across the cluster, and will be overwritten the next time the
primarys configuration is replicated across the peers. The only exceptions to this are some peer-specific
configuration items.
You may need to wait up to one minute before changes are updated across all peers in the cluster.
Systems that are configured as peers must not also be configured as neighbors to each other, and vice versa.
If peers are deployed on different LANs, there must be sufficient connectivity between the networks to ensure
a low degree of latency between the peers - a maximum delay of 15ms one way, 30ms round-trip.
Cluster peers can be in separate subnets. Peers communicate with each other using H.323 messaging, which
can be transmitted across subnet boundaries.
Deploying all peers in a cluster on the same LAN means they can be configured with the same routing
information such as local domain names and local domain subnet masks.
115
Cisco ExpresswayAdministrator Guide
To change the master peer you must log in to every other Expressway in the cluster and change the configuration
master on each peer:
Note: You should not modify configuration data that applies to all peers on any peer other than the primary peer. At
best it will result in the changes being overwritten from the primary; at worst it will cause cluster replication to fail.
Cluster configuration (System > Clustering)
The list of Peer IP addresses (including the peer's own IP address) that make up the cluster has to be specified on
each peer and they must be identical on each peer.
The Cluster name and Cluster pre-shared key have to be specified on each peer and must be identical for all peers.
Ethernet speed (System > Network interfaces >Ethernet)
The Ethernet speed is specific to each peer. Each peer may have slightly different requirements for the connection to
their Ethernet switch.
IP configuration (System > Network interfaces > IP)
LAN configuration is specific to each peer.
Each peer must have a different IPv4 address and a different IPv6 address.
IP gateway configuration is peer-specific. Each peer can use a different gateway.
Note that the IP protocol is applied to all peers, because each peer must support the same protocols.
IPstatic routes (System >Network interfaces >Static routes)
Any static routes you add are peer-specific and you may create different routes on different peers if required. If you
want all peers in the cluster to be able to use the same static route, you must create the route on each peer.
System name (System > Administration)
The System name must be different for each peer in the cluster.
DNS servers and DNS host name (System > DNS)
DNS servers are specific to each peer. Each peer can use a different set of DNS servers.
The System host name and Domain name are specific to each peer.
NTP servers and time zone (System > Time)
The NTP servers are specific to each peer. Each peer may use one or more different NTP servers.
116
Cisco Expressway Administrator Guide
The Time zone is specific to each peer. Each peer may have a different local time.
SNMP (System > SNMP)
SNMP settings are specific to each peer. They can be different for each peer.
Logging (Maintenance >Logging)
The Event Log and Configuration Log on each peer only report activity for that particular Expressway. The Log level
and the list of Remote syslog servers are specific to each peer. We recommend that you set up a remote syslog
server to which the logs of all peers can be sent. This allows you to have a global view of activity across all peers in
the cluster. See the logging section for further details.
Security certificates (Maintenance >Security certificates)
The trusted CA certificate, server certificate and certificate revocation lists (CRLs) used by the Expressway must be
uploaded individually per peer.
Administration access (System > Administration)
The following system administration access settings are specific to each peer:
1. Remove the Expressway peer from the cluster so that it becomes a standalone Expressway.
2. Restore the configuration data to the standalone Expressway.
3. Build a new cluster using the Expressway that now has the restored data.
117
Cisco ExpresswayAdministrator Guide
4. Take each of the other peers out of their previous cluster and add them to the new cluster. See Setting Up a
Cluster, page 113 for more information about adding and removing cluster peers.
Note: Systems that are configured as peers must not also be configured as neighbors to each other, and vice versa.
Neighboring your clusters
To neighbor your local Expressway (or Expressway cluster) to a remote Expressway cluster, you create a single zone
to represent the cluster and configure it with the details of all the peers in that cluster:
1. On your local Expressway (or, if the local Expressway is a cluster, on the primary peer), create a zone of the
appropriate type. This zone will represent the connection to the cluster.
2. In the Location section, enter the IP address or FQDN of each peer in the remote cluster in the Peer 1 to Peer
6 address fields.
Note that:
Ideally you should use IP addresses in these fields. If you use FQDNs instead, each FQDN must be different
and must resolve to a single IP address for each peer.
The order in which the peers in the remote Expressway cluster are listed here does not matter.
Whenever you add an extra Expressway to a cluster (to increase capacity or improve redundancy, for
example) you will need to modify any Expressways which neighbor to that cluster to let them know about the
new cluster peer.
1. For each peer in the cluster, go to the System > Clustering page.
2. Ensure each peer identifies the same Configuration master.
Unable to reach the cluster configuration master peer
The Expressway operating as the master peer could be unreachable for many reasons, including:
118
Cisco Expressway Administrator Guide
1. Log in to the peer as admin through the CLI (available by default over SSH and through the serial port).
2. Type xCommand ForceConfigUpdate.
This will delete the non-master Expressway configuration and force it to update its configuration from the master
Expressway.
Caution: Never issue this command on the master Expressway, otherwise all configuration for the cluster will be lost.
119
Dial Plan and Call Processing
This section provides information about the pages that appear under the Calls, Dial plan, Transforms and Call Policy
sub-menus of the Configuration menu. These pages are used to configure the way in which the Expressway receives
and processes calls.
1. The caller enters into their endpoint the alias or address of the destination endpoint. This alias or address can
be in a number of different address formats.
2. The destination address is received by the Expressway.
120
Cisco Expressway Administrator Guide
Note:The Expressway deliberately only searches for the first destination alias it reads from an H.323
Location Request. In very rare cases, this can lead to calls not being routed as expected.
A matching rule may apply a zone transform to the alias before sending the query on to its Target. A Target
can be one of the following types:
Neighbor zone: one of the Expressway's configured external neighbor zones, or a DNS or ENUM lookup
zone.
Policy service: an external service or application. The service will return some CPL which could, for
example, specify the zone to which the call should be routed, or it could specify a new destination alias.
6. If the search returns a new URI or alias (for example, due to a DNS or ENUM lookup, or the response from a
policy service), the process starts again: the new URI is checked against any pre-search transforms, Call
Policy is applied and a new Expressway search is performed.
7. If the alias is found within one of the external zones, or a routing destination is returned by the policy service,
the Expressway attempts to place the call.
8. If the alias is not found, it responds with a message to say that the call has failed.
Note: if your hop counts are set higher than necessary, you may risk introducing loops into your network. In these
situations a search request will be sent around the network until the hop count reaches 0, consuming resources
unnecessarily. This can be prevented by setting the Call loop detection mode to On.
When dialing by URI or ENUM, the hop count used is that for the associated DNS or ENUM zone via which the
destination endpoint (or intermediary SIP proxy or gatekeeper) was found.
Configuring hop counts for a zone
Hop counts are configured on a zone basis. To configure the hop count for a zone:
121
Cisco ExpresswayAdministrator Guide
Calls to Determines the way in which the Expressway attempts to call This setting applies to the call's
unknown IP systems which are not registered with one of its neighbors. destination address prior to any
addresses zone transforms, but after any
Direct: allows an endpoint to make a call to an unknown IP pre-search transforms or Call
address without the Expressway querying any neighbors. Policy rules have been applied.
Indirect: upon receiving a call to an unknown IP address, the See Dialing by IP Address, page
Expressway queries its neighbors for the remote address and if 140 for more information.
permitted routes the call through the neighbor.
Fallback alias The alias to which incoming calls are placed for calls where If no fallback alias is configured,
the IP address or domain name of the Expressway has been calls that do not specify an alias
given but no callee alias has been specified. will be disconnected. See below
for more information.
122
Cisco Expressway Administrator Guide
This transformation can be applied to the alias at two points in the routing process: as a pre-search transform, and as
a zone transform.
Pre-search transforms are applied before any Call Policy is applied and before the search process is
performed (see About Pre-Search Transforms, page 123 for more details).
Zone transforms are applied during the search process by each individual search rule as required. After the
search rule has matched an alias they can be used to change the target alias before the search request is sent
to a target zone or policy service (see Search and Zone Transform Process, page 125 for more details).
Search rules
Search rules are used to route incoming search requests to the appropriate target zones or policy services.
The Expressway's search rules are highly configurable. You can:
define alias, IP address and pattern matches to filter searches to specific zones or policy services
define the priority (order) in which the rules are applied and stop applying any lower-priority search rules after
a match is found; this lets you reduce the potential number of search requests sent out, and speed up the
search process
set up different rules according to the protocol (SIP or H.323) or the source of the query
limit the range of destinations or network services available to unauthenticated devices by making specific
search rules applicable to authenticated requests only
use zone transforms to modify an alias before the query is sent to a target zone or policy service
Note that multiple search rules can refer to the same target zone or policy service. This means that you can specify
different sets of search criteria and zone transforms for each zone or policy service.
The Expressway uses the protocol (SIP or H.323) of the incoming call when searching a zone for a given alias. If the
search is unsuccessful the Expressway may then search the same zone again using the alternative protocol,
depending on where the search came from and the Interworking mode (Configuration > Protocols > Interworking).
It applies to all incoming search requests received from neighbor, traversal client and traversal server zones,
and endpoints on the public internet.
It does not apply to requests received from peers (which are configured identically and therefore will have
already applied the same transform).
Each pre-search transform defines a string against which an alias is compared, and the changes to make to the alias
if it matches that string.
After the alias has been transformed, it remains changed and all further call processing is applied to the new alias.
Pre-search transform process
Up to 100 pre-search transforms can be configured. Each transform must have a unique priority number between 1
and 65534.
Every incoming alias is compared with each transform in order of priority, starting with that closest to 1. If and when a
match is made, the transform is applied to the alias and no further pre-search checks and transformations of the new
alias will take place. The new alias is then used for the remainder of the call routing process.
Further transforms of the alias may take place during the remainder of the search process as a result of Call
Policy (also known as Administrator Policy). If this is the case, the pre-search transforms are re-applied to the
new alias.
123
Cisco ExpresswayAdministrator Guide
If you add a new pre-search transform that has the same priority as an existing transform, all transforms with a
lower priority (those with a larger numerical value) will have their priority incremented by one, and the new
transform will be added with the specified priority. However, if there are not enough slots left to move all the
priorities down, you will get an error message.
Description An optional free-form description of the transform. The description appears as a tooltip if you
hover your mouse pointer over a transform in
the list.
Pattern type How the Pattern string must match the alias for You can test whether a pattern matches a
the rule to be applied. Options are: particular alias and is transformed in the
expected way by using the Check pattern
Exact: the entire string must exactly match the tool (Maintenance > Tools > Check pattern).
alias character for character.
Pattern string Specifies the pattern against which the alias is The Expressway has a set of predefined
compared. pattern matching variables that can be used
to match against certain configuration
elements.
124
Cisco Expressway Administrator Guide
Replace string The string to substitute for the part of the alias that Only applies if the Pattern behavior is
matches the pattern. Replace.
Additional text The string to add as a prefix or suffix. Only applies if the Pattern behavior is Add
Prefix or Add Suffix.
State Indicates if the transform is enabled or not. Use this setting to test configuration
changes, or to temporarily disable certain
rules. Any disabled rules still appear in the
rules list but are ignored.
Click on the transform you want to configure (or click New to create a new transform, or click Delete to remove a
transform).
1. The Expressway applies the search rules in priority order (all rules with a priority of 1 are processed first, then
priority 2 and so on) to see if the given alias matches the rules criteria based on the Source of the query and
the rule Mode.
2. If the match is successful, any associated zone transform (where the Mode is Alias pattern match and the
Pattern behavior is Replace or Strip) is applied to the alias.
3. The search rule's Target zone or policy service is queried (with the revised alias if a zone transform has been
applied) using the same protocol (SIP or H.323) as the incoming call request. Note that if there are many
successful matches for multiple search rules at the same priority level, every applicable Target is queried.
If the alias is found, the call is forwarded to that zone. If the alias is found by more than one zone, the call is
forwarded to the zone that responds first.
If the alias is not found using the native protocol, the query is repeated using the interworked protocol,
depending on the interworking mode.
If the search returns a new URI or alias (for example, due to an ENUM lookup, or the response from a policy
service), the entire Call Routing Process, page 120 starts again
125
Cisco ExpresswayAdministrator Guide
4. If the alias is not found, the search rules with the next highest priority are applied (go back to step 1) until:
the alias is found, or
all target zones and policy services associated with search rules that meet the specified criteria have been
queried, or
a search rule with a successful match has an On successful match setting of Stop searching
Note the difference between a successful match (where the alias matches the search rule criteria) and an alias being
found (where a query sent to a target zone is successful). The Stop searching option provides better control over the
network's signaling infrastructure. For example, if searches for a particular domain should always be routed to a
specific zone this option lets you make the search process more efficient and stop the Expressway from searching
any other zones unnecessarily.
Description An optional free-form description of the search The description appears as a tooltip if you
rule. hover your mouse pointer over a rule in the list.
Priority The order in the search process that this rule is The default configuration means that the Local
applied, when compared to the priority of the Zone is searched first for all aliases. If the alias
other search rules. All Priority 1 search rules are is not found locally, all neighbor, traversal
applied first, followed by all Priority 2 search client and traversal server zones are searched,
rules, and so on. More than one rule can be and if they cannot locate the alias the request
assigned the same priority, in which case any is sent to any DNS and ENUM zones.
matching target zones are queried
simultaneously. The default is 100.
Source The sources of the requests for which this rule Named sources creates the ability for search
applies. rules to be applied as dial plan policy for
specific zones.
Any: neighbor or traversal zones, and any non-
registered devices.
126
Cisco Expressway Administrator Guide
Source name The specific source zone for which the rule Only applies if the Source is set to Named.
applies. Choose from the Default Zone, Default
Subzone or any other configured zone.
Request Specifies whether the search rule applies only to This can be used in conjunction with the
must be authenticated search requests. Expressway's Authentication Policy to limit the
authenticated set of services available to unauthenticated
devices.
Pattern type How the Pattern string must match the alias for Applies only if the Mode is Alias Pattern Match.
the rule to be applied. Options are:
You can test whether a pattern matches a
Exact: the entire string must exactly match the particular alias and is transformed in the
alias character for character. expected way by using the Check pattern tool
(Maintenance > Tools > Check pattern).
Prefix: the string must appear at the beginning of
the alias.
Pattern string The pattern against which the alias is compared. Applies only if the Mode is Alias Pattern Match.
Pattern Determines whether the matched part of the Applies only if the Mode is Alias Pattern Match.
behavior alias is modified before being sent to the target
zone or policy service If you want to transform the alias before
applying search rules you must use pre-search
Leave: the alias is not modified. transforms.
Replace The string to substitute for the part of the alias Only applies if the Pattern behavior is Replace.
string that matches the pattern.
You can use regular expressions.
127
Cisco ExpresswayAdministrator Guide
On Controls the ongoing search behavior if the alias If Stop is selected, any rules with the same
successful matches the search rule. priority level as this rule are still applied.
match
Continue: continue applying the remaining
search rules (in priority order) until the endpoint
identified by the alias is found.
Target The zone or policy service to query if the alias You can configure external policy services to
matches the search rule. use as a target of search rules. This could be
used, for example, to call out to an external
service or application, such as a TelePresence
Conductor. The service will return some CPL
which could, for example, specify a new
destination alias which would start the search
process over again.
State Indicates if the search rule is enabled or not. Use this setting to test configuration changes,
or to temporarily disable certain rules. Any
disabled rules still appear in the rules list but
are ignored.
Click on the rule you want to configure (or click New to create a new rule, or click Delete to remove a rule).
Useful tools to assist in configuring search rules
You can test whether the Expressway can find an endpoint identified by a given alias, without actually placing
a call to that endpoint, by using the Locate tool (Maintenance > Tools > Locate).
You can test whether a pattern matches a particular alias and is transformed in the expected way by using the
Check pattern tool (Maintenance > Tools > Check pattern).
128
Cisco Expressway Administrator Guide
only when it receives a search request for an alias with a suffix of @sales.example.com. Sending any other search
requests to this particular VCS would take up resources unnecessarily. It would also be wasteful of resources to send
search requests for aliases that match this pattern to any other zone (there may be other lower priority search rules
defined that would also apply to these aliases). In which case setting On successful match to Stop means that the
Expressway will not apply any further (lower priority) search rules.
To achieve the example described above, on your Head Office Expressway create a zone to represent the Sales
Office VCS, and from the Create search rule page (Configuration > Dial plan > Search rules > New) set up an
associated search rule as follows:
Field Value
Priority 100
Source Any
Request must be No
authenticated
State Enabled
Field Value
Priority 100
Source Any
Request must be No
authenticated
State Enabled
129
Cisco ExpresswayAdministrator Guide
Field Value
Priority 100
Source Any
Request must be No
authenticated
State Enabled
Field Value
Priority 100
Source Any
Request must be No
authenticated
130
Cisco Expressway Administrator Guide
Field Value
State Enabled
Rule #2
Field Value
Priority 100
Source Any
Request must be No
authenticated
State Enabled
To achieve this, from the Create search rule page (Configuration > Dial plan > Search rules > New) set up two
search rules as follows:
Rule #1
Field Value
131
Cisco ExpresswayAdministrator Guide
Field Value
Priority 100
Source Any
Request must be No
authenticated
State Enabled
Rule #2
Field Value
Priority 100
Source Any
Request must be No
authenticated
State Enabled
132
Cisco Expressway Administrator Guide
Field Value
Priority 100
Request must be No
authenticated
State Enabled
Description An optional free-form description of the policy The description appears as a tooltip if you
service. hover your mouse pointer over a policy
service in the list.
Protocol The protocol used to connect to the policy The Expressway automatically supports
service. HTTP to HTTPS redirection when
communicating with the policy service
The default is HTTPS. server.
Certificate When connecting over HTTPS, this setting The Expressways root CA certificates are
verification controls whether the certificate presented by loaded via (Maintenance > Security
mode the policy server is verified. certificates > Trusted CA certificate).
133
Cisco ExpresswayAdministrator Guide
HTTPS Enable this option if you want to protect Go to Maintenance > Security
certificate certificate checking using CRLs and you have certificates > CRL management to
revocation manually loaded CRL files, or you have enabled configure how the Expressway uploads
list (CRL) automatic CRL updates. CRL files.
checking
Server Enter the IP address or Fully Qualified Domain If an FQDN is specified, ensure that the
address 1 - 3 Name (FQDN) of the server hosting the service. Expressway has an appropriate DNS
You can specify a port by appending :<port> configuration that allows the FQDN to be
to the address. resolved.
Status path The Status path identifies the path from where The policy server must supply return
the Expressway can obtain the status of the status information, see Policy Server
remote service. Status and Resiliency, page 223.
Password The password used by the Expressway to log in The maximum plaintext length is 30
and query the service. characters (which is subsequently
encrypted).
Default CPL This is the fallback CPL used by the You can change it, for example, to
Expressway if the service is not available. redirect to an answer service or recorded
message.
134
Cisco Expressway Administrator Guide
3. Configure the fields on the Create search rule page as appropriate for the searches you want to direct to the
external policy server.
This example shows how to divert calls to aliases ending in .meet to the external policy server:
Note that if Stop is selected the Expressway will not process any further search
rules for the original alias, but will restart the full call processing sequence if any
new aliases are returned in the CPL.
Target Select the policy service that was created in the previous step.
State Enabled
To divert all searches to the policy server you could set up 2 search rules that both target the policy service:
Note: when enabled, Call Policy is executed for all calls going through the Expressway.
You should use Call Policy to determine which callers can make or receive calls via the Expressway.
135
Cisco ExpresswayAdministrator Guide
configure basic Call Policy through the Call Policy rules page (Configuration > Call Policy > Rules) note
that this only lets you allow or reject specified calls, or
upload a Call Policy file that contains CPL script; however, due to the complexity of writing CPL scripts you
are recommended to use an external policy service instead
Only one of these two methods can be used at any one time to specify Call Policy. If a CPL script has been uploaded,
this takes precedence and you will not be able to use the Call Policy rules page; to use the page you must first delete
the CPL script that has been uploaded.
If Local CPL is enabled but no policy is configured or uploaded, then a default policy is applied that allows all calls,
regardless of source or destination.
The Policy service option is used if you want to refer all Call Policy decisions out to an external service. If you select
this option an extra set of configuration fields appear so that you can specify the connection details of the external
service. See Configuring Call Policy to Use an External Service, page 138 .
136
Cisco Expressway Administrator Guide
Source The alias or IP address that the calling endpoint used to identify itself when This field supports
pattern placing the call. If this field is blank, the policy rule applies to all incoming calls regular
from unauthenticated users, meaning calls where the endpoint making the call expressions.
is not registered and authenticated to a neighbor which in turn has
authenticated with the local Expressway.
Destination The alias or IP address that the endpoint dialed to make the call. This field supports
pattern regular
expressions.
Action Whether or not a call that matches the source and destination is permitted.
Allow: if both the Source and Destination aliases match those listed, call
processing will continue.
Reject: if both the Source and Destination aliases match those listed, the call
will be rejected.
Rearrange Each combination of Source and Destination is compared, in the order shown
on the Call Policy rules page, with the details of the call being made until a
match is found, at which point the call policy is applied. To move a particular
item to higher or lower in the list, thus giving the rule a higher or lower priority,
click on the and icons respectively.
Click on the rule you want to configure (or click New to create a new rule, or click Delete to remove a rule).
If Call Policy is configured to use a CPL script, this shows you the script that was uploaded.
If Call Policy is configured by the Call Policy rules page, this shows you the CPL version of those call policy
rules.
If Call Policy mode is On but a policy has not been configured, this shows you a default CPL script that allows
all calls.
You may want to view the file to take a backup copy of the Call Policy, or, if Call Policy has been configured using the
Call Policy rules page you could take a copy of this CPL file to use as a starting point for a more advanced CPL script.
If Call Policy has been configured using the Call Policy rules page and you download the CPL file and then upload it
back to the Expressway without editing it, the Expressway will recognize the file and automatically add each rule
back into the Call Policy rules page.
About CPL XSD files
The CPL script must be in a format supported by the Expressway. The Call Policy configuration page allows you to
download the XML schemas which are used to check scripts that are uploaded to the Expressway. You can use the
XSD files to check in advance that your CPL script is valid. Two download options are available:
137
Cisco ExpresswayAdministrator Guide
Show CPL XSD file: displays in your browser the XML schema used for the CPL script.
Show CPL Extensions XSD file: displays in your browser the XML schema used for additional CPL elements
supported by the Expressway.
Uploading a CPL script
To upload a new CPL file:
Protocol The protocol used to connect to the policy The Expressway automatically supports
service. HTTP to HTTPS redirection when
communicating with the policy service
The default is HTTPS. server.
Certificate When connecting over HTTPS, this setting The Expressways root CA certificates are
verification controls whether the certificate presented by loaded via (Maintenance > Security
mode the policy server is verified. certificates > Trusted CA certificate).
HTTPS Enable this option if you want to protect Go to Maintenance > Security
certificate certificate checking using CRLs and you have certificates > CRL management to
revocation manually loaded CRL files, or you have enabled configure how the Expressway uploads
list (CRL) automatic CRL updates. CRL files.
checking
138
Cisco Expressway Administrator Guide
Server Enter the IP address or Fully Qualified Domain If an FQDN is specified, ensure that the
address 1 - 3 Name (FQDN) of the server hosting the service. Expressway has an appropriate DNS
You can specify a port by appending :<port> configuration that allows the FQDN to be
to the address. resolved.
Status path The Status path identifies the path from where The policy server must supply return
the Expressway can obtain the status of the status information, see Policy Server
remote service. Status and Resiliency, page 223.
Password The password used by the Expressway to log in The maximum plaintext length is 30
and query the service. characters (which is subsequently
encrypted).
Default CPL This is the fallback CPL used by the You can change it, for example, to
Expressway if the service is not available. redirect to an answer service or recorded
message.
4. Click Save.
The Expressway should connect to the policy service server and start using the service for Call Policy
decisions.
Any connection problems will be reported on this page. Check the Status area at the bottom of the page and
check for additional information messages against the Server address fields.
Dialing by IP Address
Dialing by IP address is necessary when the destination endpoint is not registered with any system. See the Dialing by
IP Address, page 140 section for more information.
139
Cisco ExpresswayAdministrator Guide
Dialing by ENUM
ENUM dialing allows an endpoint to be contacted by a caller dialing an E.164 number - a telephone number - even if
that endpoint has registered using a different format of alias. The E.164 number is converted into a URI by the DNS
system, and the rules for URI dialing are then followed to place the call.
The ENUM dialing facility allows you to retain the flexibility of URI dialing while having the simplicity of being called
using just a number - particularly important if any of your callers are restricted to dialing using a numeric keypad.
To support ENUM dialing on the Expressway you must configure it with at least one DNS server and the appropriate
ENUM zones.
Full instructions on how to configure the Expressway to support ENUM dialing (both outbound and inbound) are given
in the ENUM dialing section.
Dialing by IP Address
Dialing by IP address is necessary when the destination endpoint is not registered with any system.
Calls to unknown IP addresses
Although the Expressway supports dialing by IP address, it is sometimes undesirable for the Expressway to be allowed
to place a call directly to an IP address that is not local. Instead, you may want a neighbor to place the call on behalf
of the Expressway, or not allow such calls at all. The Calls to unknown IP addresses setting (on the Dial plan
configuration page) configures how the Expressway handles calls made to IP addresses which are not on its local
network, or registered with one of its neighbors:
Direct: the Expressway attempts to place the call directly to the unknown IP address without querying any
neighbors.
Indirect: the Expressway forwards the search request to its neighbors in accordance with its normal search
process, meaning any zones that are the target of search rules with an Any IP Address mode. If a match is
found and the neighbors configuration allows it to connect a call to that IP address, the Expressway will pass
the call to that neighbor for completion.
Off: the Expressway will not attempt to place the call, either directly or indirectly to any of its neighbors.
The default setting is Indirect.
140
Cisco Expressway Administrator Guide
This setting applies to the call's destination address prior to any zone transforms, but after any pre-search transforms
or Call Policy rules have been applied.
Calling unregistered endpoints
An unregistered endpoint is any device that is not registered with an H.323 gatekeeper or SIP registrar. Although most
calls are made between endpoints that are registered with such systems, it is sometimes necessary to place a call to
an unregistered endpoint.
There are two ways to call to an unregistered endpoint:
by dialing its URI (this requires that the local Expressway is configured to support URI dialing, and a DNS record
exists for that URI that resolves to the unregistered endpoint's IP address)
by dialing its IP address
Recommended configuration for firewall traversal
When an Expressway-E is neighbored with an Expressway-C for firewall traversal, you should typically set Calls to
unknown IP addresses to Indirect on the Expressway-C and Direct on the Expressway-E.
Note: ENUM dialing relies on the presence of relevant DNS NAPTR records for the ENUM domain being queried. These
are the responsibility of the administrator of that domain.
141
Cisco ExpresswayAdministrator Guide
Note: if an ENUM zone and a DNS server have not been configured on the local Expressway, calls made using ENUM
dialing could still be placed if the local Expressway is neighbored with another Expressway that has been
appropriately configured for ENUM dialing. Any ENUM dialed calls will go via the neighbor. This configuration is useful
if you want all ENUM dialing from your enterprise to be configured on one particular system.
There must be a NAPTR record available in DNS that maps the called endpoints E.164 number to its URI. It is
the responsibility of the administrator of the enterprise to which the called endpoint belongs to provide this
record, and they will only make it available if they want the endpoints in their enterprise to be contactable via
ENUM dialing.
You must configure an ENUM zone on your local Expressway. This ENUM zone must have a DNS Suffix that is
the same as the domain where the NAPTR record for the called endpoint is held.
You must configure your local Expressway with the address of at least one DNS server that it can query for the
NAPTR record (and if necessary any resulting URI).
After the ENUM process has returned one or more URIs, a new search will begin for each of these URIs in accordance
with the URI dialing process. You also need to configure a DNS zone if they are to be located using a DNS lookup.
Calling process
The process below is followed when searching for an ENUM (E.164) number:
1. The Expressway initiates a search for the E.164 number as dialed. It follows the usual call routing process.
2. After applying any pre-search transforms, the Expressway checks its search rules to see if any of them are
configured with a Mode of either:
Any alias, or
Alias pattern match with a pattern that matches the E.164 number
3. The target zones associated with any matching search rules are queried in rule priority order.
If a target zone is a neighbor zone, the neighbor is queried for the E.164 number. If the neighbor supports
ENUM dialing, it may route the call itself.
If a target zone is an ENUM zone, the Expressway attempts to locate the endpoint through ENUM. As and
when each ENUM zone configured on the Expressway is queried, the E.164 number is transformed into an
ENUM domain as follows:
1. The digits are reversed and separated by a dot.
2. The DNS suffix configured for that ENUM zone is appended.
4. DNS is then queried for the resulting ENUM domain.
5. If the DNS server finds at that ENUM domain a NAPTR record that matches the transformed E.164 number (that
is, after it has been reversed and separated by a dot), it returns the associated URI to the Expressway.
142
Cisco Expressway Administrator Guide
6. The Expressway then initiates a new search for that URI (maintaining the existing hop count). The Expressway
starts at the beginning of the search process (applying any pre-search transforms, then searching local and
external zones in priority order).From this point, as it is now searching for a SIP/H.323 URI, the process for URI
dialing is followed.
In this example, we want to call Fred at Example Corp. Freds endpoint is actually registered with the URI
[email protected], but to make it easier to contact him his system administrator has configured a DNS NAPTR record
mapping this alias to his E.164 number: +44123456789.
We know that the NAPTR record for example.com uses the DNS domain of e164.arpa.
1. We create an ENUM zone on our local Expressway with a DNS suffix of e164.arpa.
2. We configure a search rule with a Pattern match mode of Any alias, and set the Target to the ENUM zone.
This means that ENUM will always be queried regardless of the format of the alias being searched for.
3. We dial 44123456789 from our endpoint.
4. The Expressway initiates a search for a registration of 44123456789 and the search rule of Any alias means the
ENUM zone is queried. (Note that other higher priority searches could potentially match the number first.)
5. Because the zone being queried is an ENUM zone, the Expressway is automatically triggered to transform the
number into an ENUM domain as follows:
a. The digits are reversed and separated by a dot: 9.8.7.6.5.4.3.2.1.4.4.
b. The DNS suffix configured for this ENUM zone, e164.arpa, is appended. This results in a transformed
domain of 9.8.7.6.5.4.3.2.1.4.4.e164.arpa.
6. DNS is then queried for that ENUM domain.
7. The DNS server finds the domain and returns the information in the associated NAPTR record. This tells the
Expressway that the E.164 number we have dialed is mapped to the SIP URI of [email protected].
8. The Expressway then starts another search, this time for [email protected]. From this point the process for URI
dialing is followed, and results in the call being forwarded to Freds endpoint.
Field Guidelines
Hop count The hop count specified for an ENUM zone is applied in the same manner as hop counts for
other zone types. The currently applicable hop count is maintained when the Expressway
initiates a new search process for the alias returned by the DNS lookup.
DNS suffix The suffix to append to a transformed E.164 number to create an ENUM host name. It
represents the DNS zone (in the domain name space) to be queried for a NAPTR record.
H.323 mode Controls if H.323 records are looked up for this zone.
SIP mode Controls if SIP records are looked up for this zone.
143
Cisco ExpresswayAdministrator Guide
Note that:
Any number of ENUM zones may be configured on the Expressway. You should configure at least one ENUM
zone for each DNS suffix that your endpoints may use.
Normal search rule pattern matching and prioritization rules apply to ENUM zones.
You must also configure the Expressway with details of DNS servers to be used when searching for NAPTR
records.
Configuring search rules for ENUM zones
If you want to be able to make ENUM calls via the Expressway, then at a minimum you should configure an ENUM
zone and a related search rule with:
144
Cisco Expressway Administrator Guide
where:
order and preference determine the order in which NAPTR records are processed. The record with the lowest
order is processed first, with those with the lowest preference being processed first in the case of matching
order.
flag determines the interpretation of the other fields in this record. Only the value u (indicating that this is a
terminal rule) is currently supported, and this is mandatory.
service states whether this record is intended to describe E.164 to URI conversion for H.323 or for SIP. Its
value must be either E2U+h323 or E2U+SIP.
regex is a regular expression that describes the conversion from the given E.164 number to an H.323 or SIP
URI.
replacement is not currently used by the Expressway and should be set to . (the full stop character).
Non-terminal rules in ENUM are not currently supported by the Expressway. For more information on these, see
section 2.4.1 of RFC 3761.
For example, the record:
IN NAPTR 10 100 "u" "E2U+h323" "!^(.*)$!h323:\[email protected]!" .
10 is the order
100 is the preference
u is the flag
E2U+h323 states that this record is for an H.323 URI
145
Cisco ExpresswayAdministrator Guide
ENUM dialing: to query for NAPTR records that map E.164 numbers to URIs
URI dialing: to look up endpoints that cannot be accessed via neighbor systems
To configure the DNS servers used by the Expressway for DNS queries:
146
Cisco Expressway Administrator Guide
On: the Expressway will fail any branch of a search that contains a loop, recording it as a level 2 "loop
detected" event. Two searches are considered to be a loop if they meet all of the following criteria:
have same call tag
are for the same destination alias
use the same protocol
originate from the same zone
Off: the Expressway will not detect and fail search loops. You are recommended to use this setting only in
advanced deployments.
Identifying Calls
Each call that passes through the Expressway is assigned a Call ID and a Call Serial Number. Calls also have a Call
Tag assigned if one does not already exist.
Call ID
The Expressway assigns each call currently in progress a different Call ID. The Call ID numbers start at 1 and go up to
the maximum number of calls allowed on that system.
Each time a call is made, the Expressway will assign that call the lowest available Call ID number. For example, if
there is already a call in progress with a Call ID of 1, the next call will be assigned a Call ID of 2. If Call 1 is then
disconnected, the third call to be made will be assigned a Call ID of 1.
The Call ID is not therefore a unique identifier: while no two calls in progress at the same time will have the same Call
ID, the same Call ID will be assigned to more than one call over time.
Note that the Expressway web interface does not show the Call ID.
Call Serial Number
The Expressway assigns a unique Call Serial Number to every call passing through it. No two calls on an Expressway
will ever have the same Call Serial Number. A single call passing between two or more Expressways will be identified
by a different Call Serial Number on each system.
Call Tag
Call Tags are used to track calls passing through a number of Expressways. When the Expressway receives a call, it
checks to see if there is a Call Tag already assigned to it. If so, the Expressway will use the existing Call Tag; if not, it
will assign a new Call Tag to the call. This Call Tag is then included in the calls details when the call is forwarded on.
A single call passing between two or more Expressways will be assigned a different Call Serial Number each time it
arrives at an Expressway (including one it has already passed through) but can be identified as the same call by use of
the Call Tag. This is particularly useful if you are using a remote syslog server to collate events across a number of
Expressways in your network.
The Call Tag also helps identify loops in your network - it is used as part of the automatic call loop detection feature,
and you can also search the Event Log for all events relating to a single call tag. Loops occur when a query is sent to
a neighbor zone and passes through one or more systems before being routed back to the original Expressway. In this
situation the outgoing and incoming query will have different Call Serial Numbers and may even be for different
destination aliases (depending on whether any transforms were applied). However, the call will still have the same
Call Tag.
Note: If a call passes through a system that is not an Expressway or TelePresence Conductor then the Call Tag
information will be lost.
147
Cisco ExpresswayAdministrator Guide
This returns details of each call currently in progress in order of their Call ID. The second line of each entry lists the
Call Serial Number, and the third lists the Call Tag.
Disconnecting Calls
Disconnecting a call using the web interface
To disconnect one or more existing calls using the web interface:
While it is quicker to use the call ID number to reference the call to be disconnected, there is a risk that in the
meantime the call has already been disconnected and the call ID assigned to a new call. For this reason, the
Expressway also allows you to reference the call using the longer but unique call serial number.
Note that when disconnecting a call, only the call with that Call Serial Number is disconnected. Other calls with the
same Call Tag but a different Call Serial Number may not be affected.
Limitations when disconnecting SIP calls
Call disconnection works differently for H.323 and SIP calls due to differences in the way the protocols work.
For H.323 calls, and interworked calls, the Disconnect command actually disconnects the call.
For SIP calls, the Disconnect command causes the Expressway to release all resources used for the call; the call will
appear as disconnected on the Expressway. However, endpoints will still consider themselves to be in the call. SIP
calls are peer-to-peer, and as the Expressway is a SIP proxy it has no authority over the endpoints. Releasing the
resources on the Expressway means that the next time there is any signaling from the endpoint to the Expressway,
the Expressway will respond with a '481 Call/Transaction Does Not Exist' causing the endpoint to clear the call.
Note that endpoints that support SIP session timers (see RFC 4028) have a call refresh timer which allows them to
detect a hung call (signaling lost between endpoints). The endpoints will release their resources after the next
session-timer message exchange.
148
Cisco Expressway Administrator Guide
149
Bandwidth Control
This section describes how to control the bandwidth that is used for calls within your Local Zone, as well as calls out
to other zones (Configuration > Traversal Subzone and Configuration > Bandwidth).
Default call The bandwidth to use for calls for which no bandwidth value Usually, when a call is initiated
bandwidth has been specified by the system that initiated the call. the endpoint will include in the
(kbps) request the amount of bandwidth
It also defines the minimum bandwidth to use on SIP to H.323 it wants to use.
interworked calls.
150
Cisco Expressway Administrator Guide
About Downspeeding
If bandwidth control is in use, there may be situations when there is insufficient bandwidth available to place a call at
the requested rate. By default (and assuming that there is some bandwidth still available) the Expressway will still
attempt to connect the call, but at a reduced bandwidth this is known as downspeeding.
Downspeeding can be configured so that it is applied in either or both of the following scenarios:
when the requested bandwidth for the call exceeds the lowest per-call limit for the subzone or pipes
when placing the call at the requested bandwidth would mean that the total bandwidth limits for that subzone
or pipes would be exceeded
You can turn off downspeeding, in which case if there is insufficient bandwidth to place the call at the originally
requested rate, the call will not be placed at all. This could be used if, when your network is nearing capacity, you
would rather a call failed to connect at all than be connected at a lower than requested speed. In this situation
endpoint users will get one of the following messages, depending on the system that initiated the search:
About Subzones
The Local Zone is made up of subzones. Subzones are used to control the bandwidth used by various parts of your
network.
Three special subzones the Default Subzone, the Traversal Subzone and the Cluster Subzone (only applies if the
Expressway is in a cluster) are automatically created and cannot be deleted.
Note that the Traversal Subzone is the only configurable subzone.
Default links between subzones
The Expressway is shipped with the Default Subzone and Traversal Subzone (and Default Zone) already created, and
with links between them. If the Expressway is added to a cluster then default links to the Cluster Subzone are also
established automatically. You can delete or amend these default links if you need to model restrictions of your
network.
151
Cisco ExpresswayAdministrator Guide
You can define the media port range anywhere within the range 1024 to 65533. Traversal media port start must be
an even number and Traversal media port end must be an odd number, because ports are allocated in pairs and the
first port allocated in each pair is even.
Up to 48 ports could be required for a single traversal call, and you can have up to 100 concurrent traversal calls on a
small/medium system, or 500 concurrent traversal calls on a large system. The default range is thus 48*500 = 24000
ports.
If you want to reduce the range, be aware that the Expressway will raise an alarm if the range is not big enough to
meet the nominal maximum of 48 ports per call for the licensed number of rich media sessions. You may need to
increase the range again if you add new licenses.
The nominal maximum number of ports allocated per call = max number of ports per allocation *max number of
allocation instances. This is 8 *6 = 48, and those numbers are derived as follows:
Each call can have up to 5 types of media; video (RTP/RTCP), audio (RTP/RTCP), second/duo video (RTP/RTCP),
presentation (BFCP), and far end camera control (H.224). If all these media types are in the call, then the call requires
8 ports; 3 RTP/RTCP pairs, 1 for BFCP, and 1 for H.224.
Each call has at least two legs (inbound to Expressway and outbound from Expressway), requiring two instances of
port allocation. Afurther four instances of allocation are required if the call is routed via the B2BUA. In this case, ports
are allocated at the following points:
In practice, you probably won't reach the maximum number of concurrent traversal calls, have them all routed
through the B2BUA, and have all the possible types of media in every call. However, we defined the default range to
152
Cisco Expressway Administrator Guide
accommodate this extreme case, and the Expressway raises an alarm if the total port requirement could exceed the
port range you specify.
The default media traversal port range is 36000 to 59999, and is set on the Expressway-C at Configuration
>Traversal Subzone. In Large Expressway systems the first 12 ports in the range 36000 to 36011 by default are
always reserved for multiplexed traffic. The Expressway-E listens on these ports. You cannot configure a distinct
range of demultiplex listening ports on Large systems: they always use the first 6 pairs in the media port range. On
Small/Medium systems you can explicitly specify which 2 ports listen for multiplexed RTP/RTCP traffic, on the
Expressway-E (Configuration > Traversal >Ports). If you choose not to configure a particular pair of ports (Use
configured demultiplexing ports = No), then the Expressway-E will listen on the first pair of ports in the media
traversal port range (36000 and 36001 by default).
Limitation Description
Total Limits the maximum bandwidth available for all concurrent traversal calls.
Calls handled by... The maximum bandwidth available to any individual traversal call.
For all the above limitations, the Bandwidth restriction setting has the following effect:
Configuring Links
Links are configured between zones and the Traversal Subzone.
The Links page (Configuration > Bandwidth > Links) lists all existing links and allows you to create, edit and delete
links.
The following information is displayed:
Field Description
Name The name of the link. Automatically created links have names based on the nodes that the link is
between.
Node 1 and The Traversal Subzone and the zone that the link is between.
Node 2
Pipe 1 and Any pipes that have been used to apply bandwidth limitations to the link. See Applying Pipes to
Pipe 2 Links, page 155 for more information. Note that in order to apply a pipe, you must first have
created it via the Pipes page.
Calls Shows the total number of calls currently traversing the link.
Bandwidth Shows the total amount of bandwidth currently being consumed by all calls traversing the link.
used
153
Cisco ExpresswayAdministrator Guide
You can configure up to 3000 links. Some links are created automatically when a zone is created.
Default Links
The Expressway is shipped with the Default Subzone, Traversal Subzone and Default Zone already created, and with
default links pre-configured between them as follows: DefaultSZtoTraversalSZ, DefaultSZtoDefaultZ and
TraversalSZtoDefaultZ. If the Expressway is in a cluster, an additional link, DefaultSZtoClusterSZ, between the
Default Subzone and the Cluster Subzone is also established.
You can edit any of these default links in the same way you would edit manually configured links. If any of these links
have been deleted you can re-create them, either:
Along with the pre-configured default links this ensures that, by default, any zone has connectivity to all other
subzones and zones. You may rename, delete and amend any of these default links.
Note: calls will fail if links are not configured correctly. You can check whether a call will succeed, and what
bandwidth will be allocated to it, using the CLI command xCommand CheckBandwidth.
Configuring Pipes
Pipes are used to control the amount of bandwidth used on calls between specific subzones and zones. The limits
can be applied to the total concurrent bandwidth used at any one time, or to the bandwidth used by any individual
call.
To apply these limits, you must first create a pipe and configure it with the required bandwidth limitations. Then when
configuring links you assign the pipe to one or more links. Calls using the link will then have the pipes bandwidth
limitations applied to them. See Applying Pipes to Links, page 155 for more information.
The Pipes page (Configuration > Bandwidth > Pipes) lists all the pipes that have been configured on the Expressway
and allows you to create, edit and delete pipes.
The following information is displayed:
Field Description
Total The upper limit on the total bandwidth used at any one time by all calls on all links to which this
bandwidth pipe is applied.
Per call The maximum bandwidth of any one call on the links to which this pipe is applied.
bandwidth
154
Cisco Expressway Administrator Guide
Field Description
Calls Shows the total number of calls currently traversing all links to which the pipe is applied.
Bandwidth Shows the total amount of bandwidth currently being consumed by all calls traversing all links to
used which the pipe is applied.
155
Applications
This section provides information about each of the additional services that are available under the Applications
menu of the Expressway.
156
Cisco Expressway Administrator Guide
to apply media encryption policy; this usage does not require any explicit B2BUA configuration
to support ICE messaging; the only B2BUA-related configuration required is to define the set of TURN servers
required to support ICE calls
to route SIP calls between the Expressway and a Microsoft Edge Server; this requires the manual configuration
of the Microsoft Lync B2BUA and the set of TURN servers available for use by the B2BUA
Note:The B2BUAdoes not use or preserve DSCPinformation (Differentiated Services Code Point) from incoming
traffic. It does not apply DSCPinformation to outgoing traffic.
Configuring B2BUATURNServers
The B2BUA TURN servers page (Applications > B2BUA > B2BUA TURN servers) is used to configure the set of
TURN servers available for use by a B2BUA instance. The page lists all the currently configured TURN servers and lets
you create, edit and delete TURN servers.
The B2BUA chooses which TURN server to offer via random load-balancing between all of the available servers.
There is no limit to the number of servers that can be configured for the B2BUA to choose from.
To use these TURN servers with the Microsoft Lync B2BUA, you must enable Offer TURN services on the Lync
B2BUA configuration page. They are used automatically by the B2BUA instance used when ICE messaging is enabled
for a zone.
The configurable options are:
TURN server address The IP address of a TURN server to offer when The TURN server must be RFC 5245
establishing ICE calls (for example, with a compliant, for example an Expressway-E
Microsoft Lync Edge server). TURN server.
TURN server port The listening port on the TURN server. Default
is 3478.
If the TURN server is running on a Large Expressway-E, you can make use of its scaling capabilities by specifying
additional address/port combinations.
157
Cisco ExpresswayAdministrator Guide
The Lync B2BUA has a maximum simultaneous call capability of 100 calls (for all system sizes, including Large
systems); however, calls that use transcoder resources count as 2 calls.
If a call is routed through the Lync B2BUA, the B2BUA always takes the media and always remains in the
signaling path. The call component that is routed through the B2BUA can be identified in the call history
details as having a component type of Microsoft Lync B2BUA.
The Lync B2BUA does not consume any call licenses in addition to the license required by the leg of the call
between the endpoint and the Expressway.
If all configured external transcoders reach their capacity limits, any calls that would normally route via a
transcoder will not fail; the call will still connect as usual but will not be transcoded.
The Lync B2BUA supports multiple TURN servers. TURN servers are recommended for calls traversing a
Microsoft Lync Edge server.
158
Cisco Expressway Administrator Guide
Bandwidth controls can be applied to the leg of the call between the endpoint and the B2BUA, but cannot be
applied to the B2BUA to Microsoft Lync leg of the call. However, because the B2BUA forwards the media it
receives without any manipulation, any bandwidth controls you apply to the Expressway to B2BUA leg will
implicitly apply to the B2BUA to Lync leg.
The non-configurable neighbor zone (named "To Microsoft Lync server via B2BUA") that connects the
Expressway to the Lync B2BUA uses a special zone profile of Microsoft Lync this profile is only used by the
Lync B2BUA and cannot be selected against any manually configured zones.
For more information about configuring Expressway and Microsoft Lync see:
Configuration section:
Lync signaling The IP address or Fully Qualified Domain Name You must also configure the IP addresses
destination (FQDN) of the Hardware Load Balancer, Director of the trusted hosts. These are the Lync
address or Front End Processor to which the Expressway devices that may send signaling messages
sends the signaling messages. to the Expressway.
Enable Controls whether the B2BUAoffers Remote You should enable this option if you want
RDPtranscoding Desktop Protocol transcoding. Lync users to be able to share their
for this B2BUA desktops or applications with other
This feature requires the Microsoft participants in a TelePresence Server
Interoperability option key. conference.
Default is No.
Enable external Controls whether calls may be routed through an You should enable this option if you need to
transcoders for external transcoder. use a transcoder such as the Cisco
this B2BUA TelePresence Advanced Media Gateway to
transcode between standard codecs (such
as H.264) and Microsoft RT Video and RT
Audio.
159
Cisco ExpresswayAdministrator Guide
Port on B2BUA The IP port used on the B2BUA for All transcoder communications are carried
for transcoder communicating with the transcoders. Default is out over TLS.
communications 65080.
Use transcoder Specifies whether the transcoder policy rules are If Enable transcoders for this B2BUA is
policy rules used to control access to the transcoders. Yes, then all calls are routed via the
Default is No. transcoders by default.
TURN section:
Offer TURN Controls whether the B2BUA offers TURN This is recommended for calls traversing a
services services. Default is No. Microsoft Lync Edge server.
Advanced settings: you should only modify the advanced settings on the advice of Cisco customer support.
Encryption Controls how the B2BUA handles encrypted and A call via the B2BUA comprises two legs:
unencrypted call legs. one leg from the B2BUA to a standard video
endpoint, and one leg from the B2BUA to
Required: both legs of the call must be encrypted. the Lync client. Either leg of the call could
be encrypted or unencrypted.
Auto: encrypted and unencrypted combinations
are supported. A setting of Auto means that the call can be
established for any of the encrypted and
The default is Auto. unencrypted call leg combinations. Thus,
one leg of the call could be encrypted while
the other leg could be unencrypted.
B2BUA media The port range used by the B2BUA for handling Ensure that the port range does not overlap
port range media. Default range is 5600057000. with other port ranges used by this
start/end Expressway or this Expressway's TURN
server.
Session refresh The maximum time allowed between session For further information see the definition of
interval refresh requests for SIP calls. Default is 1800 Session-Expires in RFC 4028.
seconds.
Minimum The minimum value the B2BUA will negotiate for For further information see the definition of
session refresh the session refresh interval for SIP calls. Default Min-SE header in RFC 4028.
interval is 500 seconds.
160
Cisco Expressway Administrator Guide
RDP TCP port Defines the range of TCPports on which the Each simultaneous RDPtranscoding
range start / end B2BUAlistens for theRDPmedia from Lync. session created on the B2BUArequires a
Default is 6000 - 6099. receiving port. The range is limited to 100
as this is the maximum possible number of
Note:Save the page and restart the Lync simultaneous transcode sessions.
B2BUAservice to apply your changes.
RDP UDP port Defines the range of UDPports on which the Each simultaneous RDPtranscoding
range start / end B2BUAtransmits transcoded RDPmedia towards session created on the B2BUArequires a
the BFCPreceiver. Default is 6100 - 6199. port to send the resulting BFCPmedia to
the conference. The range is limited to 100
Note:Save the page and restart the Lync as this is the maximum possible number of
B2BUAservice to apply your changes. simultaneous transcode sessions.
Maximum RDP Limits the number of simultaneous Higher values will mean that more system
transcode RDPtranscoding sessions on this Expressway. resources can be consumed by RDP
sessions Default is 10. transcoding, which could impact other
services. Maximum is 100.
Note:Save the page and restart the Lync
B2BUAservice to apply your changes.
CE500, 10
CE1100
, or
Medium
OVA
CE1000, 20
CE1100
, or Note:This recommendation requires
Large an active 10 Gbps network
OVA connection.
161
Cisco ExpresswayAdministrator Guide
Name An optional free-form description of the trusted The name is not used as part of the
host device. "trusted" criteria. It is provided only to help
distinguish between multiple devices, rather
than having to rely on their IP addresses.
The rules on this page are only applied if Use transcoder policy rules (also configured on the Microsoft Lync
B2BUA configuration page) is set to Yes.
A rule is applied if it matches either the source or destination alias of a call.
If the aliases associated with a call do not match any of the policy rules, the call will be routed via the
transcoder. Therefore you may want to consider having a general low priority rule with a regex pattern match
for all aliases that denies transcoder resources, and then have more specific rules with a higher priority that
define the participants that are allowed to use the transcoder resources.
162
Cisco Expressway Administrator Guide
The page lists all the currently configured rules and lets you create, edit, delete, enable and disable rules. Note that
you can click on a column heading to sort the list, for example by Rule name or Priority.
The configurable options are:
Description An optional free-form description of the rule. The description appears as a tooltip if you
hover your mouse pointer over a rule in the
list.
Priority Sets the order in which the rules are applied. The Multiple rules with the same priority are
rules with the highest priority (1, then 2, then 3 and applied in configuration order. For clarity you
so on) are applied first. are recommended to use unique priority
settings for each rule.
Pattern type The way in which the Pattern string must match You can test whether a pattern matches a
either the source or destination alias of the call. particular alias and is transformed in the
expected way by using the Check pattern
Exact: the entire string must exactly match the tool (Maintenance > Tools > Check pattern).
alias character for character.
State Indicates if the rule is enabled or not. Use this setting to test configuration
changes, or to temporarily disable certain
rules. Any disabled rules still appear in the
rules list but are ignored.
Multiple transcoders can be configured for load balancing purposes; the B2BUA automatically manages which
transcoder to use.
163
Cisco ExpresswayAdministrator Guide
Address The IP address or Fully Qualified Domain Name If you have several transcoders you are
(FQDN) of the transcoder. recommended to either use their IP
addresses or to give each device a different
FQDN.
1. Go to Applications > B2BUA > Microsoft Lync > B2BUA service restart.
2. Check the number of active calls currently in place.
3. Click Restart service.
The service should restart after a few seconds. The status of the B2BUA service is displayed on the B2BUA
configuration page.
Clustered Expressway systems
On a clustered Expressway you have to restart the Lync B2BUA service on every peer. You are recommended to
ensure the service is configured and running correctly on the master peer before restarting the B2BUA service on the
other peers.
164
Cisco Expressway Administrator Guide
Cisco Hybrid Services empower cloud-based and premises-based solutions to deliver a more capable, better
integrated collaboration user experience.
When you purchase Hybrid Services you get access to Cloud Collaboration Management an administrative
interface to the Cisco Collaboration Cloud. In Cloud Collaboration Management you can check your organization's
service entitlements and enable features for your users.
The on-premises components of Hybrid Services are called "connectors", and the Expressway software contains a
management connector to manage registration and other connectors.
The management connector is dormant until you register. When you register, the management connector is
automatically upgraded if a newer version is available.
The Expressway then downloads any other connectors that you selected using Cloud Collaboration Management.
They are not started by default and you need to do some configuration before they'll work.
The connectors are not active by default, and will not do anything until you configure and start them. You can do this
on new UI pages that the connectors install on the Expressway.
Connector upgrades are made available through Cloud Collaboration Management, and the management connector
will download the new versions to Expressway when you have authorized the upgrade.
You can also deregister, which disconnects your Expressway from Collaboration Cloud and removes all connectors
and related configuration.
Note:We do not normally advise downgrading Expressway, although we try to ensure that the interface remains
accessible if you are forced to restore a previous version. However, we explicitly do not support a downgrade of the
Expressway software from X8.6 versions while the Expressway is registered for Hybrid Services. If you have to
downgrade, you must deregister from Hybrid Services before you downgrade.
Hybrid Services are continuously developed and may be published more frequently than Expressway. This means that
information about Hybrid Services is maintained on the Hybrid Services help site, and several Expressway interface
pages link out to that site.
Connector Proxy
If you are already registered for Hybrid Services, visit the Hybrid Services help site to get more detailed and recent
information.
What is this proxy for?
Use the Applications >Hybrid Services>Connector Proxy page if this Expressway needs a proxy to connect to the
Cisco Collaboration Cloud. This proxy is not used by the Expressway for other purposes.
165
Cisco ExpresswayAdministrator Guide
The proxy must be capable of handling outbound HTTPSand secure web socket connections. It must also allow
those connections to be initiated by the Expressway using either basic authentication or no authentication.
You'll need the address of the proxy, the port it's listening on, and the basic authentication username and password
(if your proxy requires authentication).
Note:The Expressway-E cannot register for hybrid services. It must be connected by a secure traversal zone to the
Expressway (or cluster) that is registered to the Collaboration Cloud.
Root certificates from the following CAs will be installed when you click Get certificates:
166
Cisco Expressway Administrator Guide
167
User Accounts
This section provides information about how to configure administrator accounts, and how to display the details of all
active administrator sessions.
Account Authentication
Administrator accounts must be authenticated before access is allowed to the Expressway.
Expressway can authenticate accounts either locally or against a remote directory service using LDAP (currently, only
Windows Active Directory is supported), or it can use a combination of local and remotely managed accounts. The
remote option allows administration groups to be set up in the directory service for all Expressways in an enterprise,
removing the need to have separate accounts on each Expressway.
See Configuring Remote Account Authentication Using LDAP, page 172 and Authenticating Expressway Accounts
using LDAP Deployment Guide for more information about setting up remote authentication.
If a remote source is used for administrator account authentication, you also need to configure the Expressway with:
Account Types
Administrator accounts
Administrator accounts are used to configure the Expressway.
The Expressway has a default admin local administrator account with full read-write access. It can be used to
access the Expressway using the web interface, the API interface or the CLI. Note that you cannot access the
Expressway via the default admin account if a Remote only authentication source is in use.
168
Cisco Expressway Administrator Guide
You can add additional local administrator accounts which can be used to access the Expressway using the
web and API interfaces only.
Remotely managed administrator accounts can be used to access the Expressway using the web and API
interfaces only.
You can configure the complexity requirements for local administrator passwords on the Password security page
(Users > Password security). All passwords and usernames are case sensitive.
Note that:
The Configuration Log records all login attempts and configuration changes made using the web interface,
and can be used as an audit trail. This is particularly useful when you have multiple administrator accounts.
More than one administrator session can be running at the same time. These sessions could be using the web
interface, command line interface, or a mixture of both. This may cause confusion if each administrator
session attempts to modify the same configuration settings - changes made in one session will overwrite
changes made in another session.
You can configure account session limits and inactivity timeouts (see Configuring System Name and Access
Settings, page 26).
See the Configuring Administrator Accounts, page 170 section for more information.
Root account
The Expressway provides a root account which can be used to log in to the Expressway operating system. The root
account should not be used in normal operation, and in particular system configuration should not be conducted
using this account. Use the admin account instead.
See the Using the Root Account, page 178 section for more information.
Note: remember to change the passwords for the admin and root accounts from their default values.
Notes:
You can never set a blank password for any administrator account, regardless of this setting.
This setting affects only local administrator account passwords. It does not affect any other passwords used
on the Expressway, such as in the local authentication database, LDAP server, external registration
credentials, user account passwords, or administrator account passwords stored on remote credential
directories.
All passwords and usernames are case sensitive.
Non-configurable rules for strict passwords
The following password rules always apply when Enforce strict passwords is set to On. There is no way to configure
them:
Avoid multiple instances of the same characters (non-consecutive instances are checked)
Avoid three or more consecutive characters such as "abc" or "123"
Avoid dictionary words, or reversed dictionary words
Avoid palindromes, such as "risetovotesir"
169
Cisco ExpresswayAdministrator Guide
Note: You may experience precedence effects between the required number of character classes and the
number of characters per class.
For example, if you leave the default requirements of 2 characters of each class, there is an implied rule that 4
character classes are required. In this case, any setting of Minimum number of character classes is
irrelevant.
For another example, if you set the minimum number of character classes to 2, and set the minimum number of
characters required from each class to 0, then a password that contains characters from any two of the
classes will suffice (presuming it meets all the other criteria as well).
This default local administrator account has full Read-write access and can access the Expressway using the web
UI, the API interface, or the CLI. You can access the Expressway via the admin account even if a Remote
authentication source is in use.
The username for this account is admin (all lower case) and the default password is TANDBERG (all upper case).
170
Cisco Expressway Administrator Guide
You cannot delete, rename, or disable admin and you cannot change its access level from Read-write, but you can
disable its web and API access.
You should change the password as soon as possible. Choose a strong password, particularly if administration over
IP is enabled.
If you forget the password for the admin account, you can log in as another administrator account with read-write
access and change the password for the admin account. If there are no other administrator accounts, or you have
forgotten those passwords as well, you can still reset the password for the admin account providing you have
physical access to the Expressway. See Resetting Forgotten Passwords, page 177 for details.
Name The username for the administrator account. Some names such as "root" are reserved. Local
administrator account user names are case
sensitive.
Access The access level of the administrator account: The access permissions of the currently logged in
level user are shown in the system information bar at
Read-write: allows all configuration information the bottom of each web page.
to be viewed and changed. This provides the
same rights as the default admin account. The access level of the default admin account
cannot be changed from Read-write.
Read-only: allows status and configuration
information to be viewed only and not changed.
Some pages, such as the Upgrade page, are
blocked to read-only accounts.
Default: Read-write
Password The password that this administrator will use to All passwords on the Expressway are encrypted,
log in to the Expressway. so you only see placeholder characters here.
New Enter a new password for the account. This field only appears when you are changing a
password password.
Confirm Re-enter the password for the account. This field only appears when you create an
password account or when you change its password.
Default: Yes
171
Cisco ExpresswayAdministrator Guide
APIaccess Select whether this account is allowed to access This controls access to the XML and REST APIs by
the system's status and configuration using the systems such as Cisco TMS.
Application Programming Interface (API).
Default: Yes
Your Enter your own, current password here if the To improve security, the system requires that
current system requires you to authorize a change. administrators enter their own passwords when
password creating an account or changing a password.
Remote account authentication: this section allows you to enable or disable the use of LDAP for remote account
authentication.
Administrator Defines where administrator login credentials are Both allows you to continue to use
authentication authenticated. locally-defined accounts. This is useful
source while troubleshooting any connection or
Local only: credentials are verified against a local authorization issues with the LDAP server.
database stored on the system.
You cannot log in using a locally-
Remote only: credentials are verified against an configured administrator account,
external credentials directory. including the default admin account, if
Remote only authentication is in use.
Both: credentials are verified first against a local Note: do not use Remote only if
database stored on the system, and then if no Expressway is managed by Cisco TMS.
matching account is found the external credentials
directory is used instead.
LDAP server configuration: this section specifies the connection details to the LDAP server.
172
Cisco Expressway Administrator Guide
FQDN Defines how the LDAP server address is resolved. The SRV lookup is for either _ldap._tcp or
address _ldaps._tcp records, depending on
resolution SRV record: DNS SRV record lookup. whether Encryption is enabled. If multiple
servers are returned, the priority and
Address record: DNS A or AAAA record lookup. weight of each SRV record determines
the order in which the servers are used.
IP address: entered directly as an IP address.
Host name The way in which the server address is specified If using TLS, the address entered here
and Domain depends on the FQDN address resolution setting: must match the CN (common name)
contained within the certificate presented
or SRV record: only the Domain portion of the server by the LDAP server.
address is required.
Server
address Address record: enter the Host name and Domain.
These are then combined to provide the full server
address for the DNS address record lookup.
Port The IP port to use on the LDAP server. Non-secure connections use 389 and
secure connections use 636.
Encryption Determines whether the connection to the LDAP When TLS is enabled, the LDAP servers
server is encrypted using Transport Layer Security certificate must be signed by an authority
(TLS). within the Expressways trusted CA
certificates file.
TLS: uses TLS encryption for the connection to the
LDAP server. Click Upload a CA certificate file for TLS
(in the Related tasks section) to go to the
Off: no encryption is used. Managing the Trusted CA Certificate List,
page 189 page.
The default is TLS.
Certificate Specifies whether certificate revocation lists (CRLs) If you are using revocation lists, any
revocation list are checked when forming a TLS connection with the required CRL data must also be included
(CRL) LDAP server. within the CA certificate file.
checking
None: no CRL checking is performed.
Authentication configuration: this section specifies the Expressway's authentication credentials to use when
binding to the LDAP server.
173
Cisco ExpresswayAdministrator Guide
Bind DN The distinguished name (case insensitive) used by the Any special characters within a name
Expressway when binding to the LDAP server. must be escaped with a backslash as per
the LDAP standard (RFC 4514). Do not
It is important to specify the DN in the order cn=, then escape the separator character between
ou=, then dc= names.
Bind The password (case sensitive) used by the The maximum plaintext length is 60
password Expressway when binding to the LDAP server. characters, which is then encrypted.
SASL The SASL (Simple Authentication and Security Layer) Enable Simple Authentication and
mechanism to use when binding to the LDAP server. Security Layer if it is company policy to do
so.
None: no mechanism is used.
Bind Username of the account that the Expressway will use Configure this to be the
username to log in to the LDAP server (case sensitive). sAMAccountName; Security Access
Manager Account Name (in AD this is the
Only required if SASL is enabled. accounts user logon name).
Directory configuration: this section specifies the base distinguished names to use when searching for account
and group names.
Base DN for The ou= and dc= definition of the Distinguished Name The Base DN for accounts and groups
accounts where a search for user accounts should start in the must be at or below the dc level (include
database structure (case insensitive). all dc= values and ou= values if
necessary). LDAP authentication does not
It is important to specify the DN in the order ou=, then look into sub dc accounts, only lower ou=
dc= and cn= levels.
Base DN for The ou= and dc= definition of the Distinguished Name If no Base DN for groups is specified,
groups where a search for groups should start in the then the Base DN for accounts will be
database structure (case insensitive). used for both groups and accounts.
DNS unable to do reverse lookup Reverse DNS lookup is required for SASL authentication.
174
Cisco Expressway Administrator Guide
DNS unable to resolve LDAP server Check that a valid DNS server is configured, and check the spelling of the
address LDAP server address.
Failed to connect to LDAP server. Check that the LDAP server details are correct.
Check server address and port
Failed to setup TLS connection. CA certificate, private key and server certificate are required for TLS.
Check your CA certificate
Invalid Base DN for accounts Check Base DN for accounts; the current value does not describe a valid
part of the LDAP directory.
Invalid server name or DNS failure DNS resolution of the LDAP server name is failing.
Invalid bind credentials Check Bind DN and Bind password, this error can also be displayed if
SASL is set to DIGEST-MD5 when it should be set to None.
Invalid bind DN Check Bind DN; the current value does not describe a valid account in the
LDAP director.
There is no CA certificate installed CA certificate, private key and server certificate are required for TLS.
Name The name of the administrator group. The group names defined in the Expressway
must match the group namesthat have been
It cannot contain any of the following characters: set up in theremote directory serviceto
manage administrator access to this
/\[]:;|=,+*?><@" Expressway.
175
Cisco ExpresswayAdministrator Guide
Access The access level given to members of the administrator If an administrator belongs to more than one
level group: group, it is assigned the highest level
permission for each of the access settings
Read-write: allows all configuration information to be across all of the groups to which it belongs
viewed and changed. This provides the same rights as (any groups in a disabled state are ignored).
the default admin account. See Determining the access level for accounts
that belong in multiple groups, page 176
Read-only: allows status and configuration information below for more information.
to be viewed only and not changed. Some pages, such
as the Upgrade page, are blocked to read-only
accounts.
Default: Read-write
Default: Yes
API Determines whether members of this group are allowed This controls access to the XML and REST
access to access the system's status and configuration using APIs by systems such as Cisco TMS.
the Application Programming Interface (API).
Default: Yes
State Indicates if the group is enabled or disabled. Access will If an administrator account belongs to more
be denied to members of disabled groups. than one administrator group with a
combination of both Enabled and Disabled
states, their access will be Enabled.
Determining the access level for accounts that belong in multiple groups
If an administrator belongs to groups with different levels of access, the highest level of access is granted. Any
groups in a disabled state are ignored.
For example, if the following groups were configured:
Administrators Read-write - -
The following table shows examples of the access permissions that would be granted for accounts that belong in one
or more of those groups:
Administrators and Region A read-write access to the web interface but no API access
176
Cisco Expressway Administrator Guide
Administrators and Region B read-write access to the API interface, but no web interface access
Administrators and Region C read-write access to the web and API interfaces
Region A only read-only access to the web interface and no API access
1. Connect a PC to the Expressway using the serial cable. Serial port / console access is always enabled for one
minute following a restart, even if it is normally disabled.
2. Restart the Expressway.
3. Log in from the PC with the username pwrec. No password is required.
4. If the administrator account authentication source is set to Remote, you are given the option to change the
setting to Both; this will allow local administrator accounts to access the system.
5. Select the account (root or admin) whose password you want to change.
6. You will be prompted for a new password.
The pwrec account is only active for one minute following a restart. After that time you will have to restart the system
again to change the password.
177
Cisco ExpresswayAdministrator Guide
Note: the root account may allow access to sensitive information and it should not be used in normal operation, and
in particular system configuration should not be conducted using this account. Use the admin account instead.
1. Log in to the Expressway as root using the existing password. By default you can only do this using a serial
connection or SSH.
2. Type the command passwd.
You will be asked for the new password.
3. Enter the new password and when prompted, retype the password.
4. Type exit to log out of the root account.
Managing SSOtokens
Go to Users >SSOtoken holders to view the list of users who currently hold SSOtokens. This page can help you
troubleshoot issues related to single sign-on for a particular user.
You can also use this page to Purge tokens from all holders. This option is probably disruptive for your users so
make sure you need it before you proceed. You may need it, for example, if you know your security is compromised,
or if you are upgrading internal or edge infrastructure.
To manage the tokens of a particular user:
178
Cisco Expressway Administrator Guide
3. [Optional] Click Delete these tokens if you want the user's identity to be confirmed before they continue to
access the UCservices.
The next time the user's client attempts to access UCservices via this Expressway-C, the client will be
redirected to the IdP with a new, signed request. The user may need to reauthenticate at the IdP,so that it can
assert their identity to the Expressway-C. The user can then be issued with new tokens where authorized.
179
Maintenance
This section describes the pages that appear under the Configuration > Maintenance menu of the Expressway web
interface.
Caution:You will use root access to authorize your public key. Take care not to increase your security exposure or
cause any unsupported configuration. We strongly discourage using root.
180
Cisco Expressway Administrator Guide
We recommended that you upgrade Expressway components while the system is inactive.
If you are upgrading a cluster:
See Expressway Cluster Creation and Maintenance Deployment Guide on the Expressway Configuration
Guides page.
Expressway software components
All existing installed components are listed on the Upgrade page (Maintenance > Upgrade), showing their current
version and associated release key where appropriate.
181
Cisco ExpresswayAdministrator Guide
The main component is the System platform, and when upgraded this will typically include automatic upgrades of
some or all of the other components. However, you can independently upgrade the other components if required to
do so. The upgrade process ensures that compatibility is maintained across all components.
Upgrade prerequisites
The upgrade requires you to have:
a valid Release key, if you are upgrading to the next major release of the System platform, for example from
X8.1 to X9.0; it is not required for dot releases, for example X8.1 to X8.2
a software image file for the component you want to upgrade, and it is stored in a network location that is
locally accessible from your client computer; use the standard .tar.gz software image file when upgrading a
virtual machine (the .ova file is only required for the initial install of the Expressway software on VMware)
release notes for the software version you are upgrading to additional manual steps may be required
Contact your Cisco representative for more information on how to obtain these.
Backing up before upgrading
You should backup your system configuration before upgrading. Click System backup to go to the Backup and
restore page.
Upgrading and option keys
All existing option keys are retained through the upgrade from one version of the System platform to the next,
including upgrades to the next major release. However, you are recommended to take note of your existing option
keys before performing the upgrade.
New features may also become available with each major release of the System platform component, and you may
need to install new option keys to take advantage of these new features. Contact your Cisco representative for more
information on all the options available for the latest release of Expressway software.
Installing and rebooting
Upgrading the System platform component is a two-stage process. First, the new software image is uploaded onto
the Expressway. At the same time, the current configuration of the system is recorded, so that this can be restored
after the upgrade. During this initial stage the system will continue running on its existing software version, and all
normal system processes will continue.
The second part of the upgrade involves rebooting the system. It is only during the reboot that the Expressway installs
the new software version and restores the previous configuration. Rebooting causes all current calls to terminate.
This means that you can upload the new software at any time, and then wait until a convenient moment (for example,
when no calls are taking place) to switch to the new version by rebooting the system.
Note: Any configuration changes you make between the software upload and the reboot will be lost when the system
restarts using the new software version.
The upgrade of components other than the System platform does not involve a system reboot, however the services
provided by that component will be temporarily stopped while the upgrade process completes.
1. Review the relevant release notes to see if any special steps are required either before or after installing the
software image file.
2. Go to the Upgrade page (Maintenance > Upgrade).
182
Cisco Expressway Administrator Guide
3. Click Browse and select the software image file for the component you want to upgrade.
The Expressway automatically detects which component you are upgrading based upon the selected software
image file.
4. Enter the Release key if required.
5. Click Upgrade.
The Expressway will start loading the file. This may take a few minutes.
6. For upgrades to the System platform component, the Upgrade confirmation page is displayed:
a. Check that:
the expected New software version number is displayed
the MD5 hash and SHA1 hash values match the values displayed on the cisco.com page, where you
have downloaded the software image file
b. Click Continue with upgrade.
The System upgrade page opens and displays a progress bar while the software installs.
When the software has installed, a summary of active calls is displayed. These will be lost when you
reboot the system.
c. Click Reboot system.
Note that if you make any configuration changes between uploading the software and rebooting, those
changes will be lost when the system restarts.
After the reboot is complete you are taken to the Login page.
7. For upgrades to other components, the software is automatically installed. No reboot is required.
The upgrade is now complete. The Overview and Upgrade pages now show the upgraded software component
version numbers.
Note that some components may require option keys to enable them; this is done through the Option keys page
(Maintenance > Option keys).
Downgrading
If you need to downgrade to an earlier release of the System platform, configuration changes will be lost. When the
downgrade has completed you will have to restore a backup of the system configuration that was made against the
release you have just reinstalled. Other manual steps may be required you must review the release notes for the
version you are downgrading from.
To downgrade a component to an older release you should follow the same instructions as above for
upgrading, but select the appropriate software image file for the software version you want to downgrade to.
As with upgrading, you are recommended to backup your system configuration before downgrading.
A text file containing just the 16-character Release Key (required for the System platform component only).
Ensure there is no extraneous white space in this file.
The file containing the software image.
To transfer these files:
1. If you are upgrading the System platform component, upload the Release Key file using SCP/PSCP to the
/tmp/ folder on the system. The target name must be release-key, for example:
scp release-key [email protected]:/tmp/release-key
Enter the root password when prompted.
The Release Key file must be uploaded before the image file.
183
Cisco ExpresswayAdministrator Guide
Note: if you make any further configuration changes before rebooting, those changes will be lost when the system
restarts, so you are recommended to reboot your system immediately.
Configuring Logging
The Expressway provides syslogging features for troubleshooting and auditing purposes.
The Event Log is a rotating local log that records information about such things as calls and messages sent and
received.
The Expressway's logging options are configured on the Logging page (Maintenance > Logging) where you can:
specify the Local event log verbosity to change the depth of event information recorded locally
toggle Media statistics logging
toggle Call Detail Records
define one or more remote syslog server addresses
filter the events sent to each remote syslog server by severity
toggle System Metrics Collection
1 High-level events such as registration requests and call attempts. Easily human readable. For example:
call attempt/connected/disconnected
registration attempt/rejected
Note that endpoints or other devices cannot register to the Expressway. Registration requests will be
rejected and will be logged with 'License limit exceeded' messages.
logs of protocol messages sent and received (SIP, H.323, LDAP and so on) excluding noisy
messages such as H.460.18 keepalives and H.245 video fast-updates
184
Cisco Expressway Administrator Guide
protocol keepalives
call-related SIP signaling messages
4 The most verbose level: all Level 1, Level 2 and Level 3 events, plus:
See the Events and levels section for a complete list of all events that are logged by the Expressway, and the level at
which they are logged.
Notes:
Events are always logged locally (to the Event Log) regardless of whether or not remote logging is enabled.
Logging at level 3 or level 4 is not recommended for normal operation, because such detailed logging may
cause the 2GB log to rotate too quickly. You may need to record this level of detail while troubleshooting.
Changes to the log level affect both the Event Log that you can view via the web interface, and the
information that is copied to any remote log server.
Changes to the log level are not retrospective they only affect what is logged after you change the level.
The Expressway uses the following facilities for local logging. The software components / logs that map to the
(local) facilities are emphasised:
0 (kern)
3 (daemon)
16 (local0) Administrator
17 (local1) Config
18 (local2) Mediastats
19 (local3) Apache error
20 (local4) etc/opt/apache2
21 (local5) Developer
22 (local6) Network
Note:The message severity is Informational but media statistics messages are always published, irrespective of the
severity filters.
185
Cisco ExpresswayAdministrator Guide
If you select Service only the system keeps the CDRs for 7 days, and these CDRs can only be read via the
Representational State Transfer (REST)API to the Expressway. If you select Service and logging, the local data is
exposed in the Event Log, and the CDRs are also sent as INFOmessages to your syslog host.
Service Only CDRs are stored locally for 7 days and then deleted. The records are not
accessible via the web GUI.
Services and Logging CDRs are stored locally for 7 days and then deleted. The records are accessible
from the local event log and the external syslog server if external logging has
been enabled.
You can configure the Expressway to publish log messages to up to 4 remote syslog servers.
The syslog servers must support one of the following standard protocols:
BSD (as defined in RFC 3164)
IETF (as defined in RFC 5424)
Configuring Remote Syslog Servers
1. Go to Maintenance >Logging, and enter the IP addresses or Fully Qualified Domain Names (FQDNs) of the
Remote syslog servers to which this system will send log messages.
2. Click on the Options button for each server.
3. Specify the Transport protocol and Port you wish to use. The default is UDP over port 514. If you choose to
use TLS, you will see the option to enable Certificate Revocation List (CRL) checking for the syslog server.
4. In the Message Format field, select the writing format for remote syslog messages. The default is Legacy
BSD.
5. Use the Filter by Severity option to select how much detail to send. The Expressway sends messages of the
selected severity and all of the more severe messages.
6. Use the Filter by Keywords option if you only want to send messages with certain keywords.
7. Click Save.
Notes:
186
Cisco Expressway Administrator Guide
We recommend that you search for the most relevant keywords first to avoid any impact on system
performance. This ensures the system pushes the relevant log messages to the syslog server at the earliest
opportunity.
What are the Typical Values used for my Syslog Server?
The following table should help you select the format that best matches your logging server(s) and network
configuration and shows the typical values used.
Notes:
The UDPprotocol is stateless. If reliability of syslog messages is very important in your environment, you
should use a different transport protocol.
If there is a firewall between the Expressway and the syslog server, you must open the appropriate port to
allow the messages through.
If you select TLStransport, the Expressway must trust the syslog server's certificate. Upload the syslog
server's CAcertificate to the local trust store if necessary.
CRL checking when using TLS is disabled by default. To enable CRL, set CRLchecking to On and ensure that
relevant certificate revocation lists (CRLs) are loaded.
See About Security Certificates, page 189 for more information.
The remote server cannot be another Expressway.
An Expressway cannot act as a remote log server for other systems.
The Expressway uses the following facilities for remote logging. The software components / logs that map to
the (local) facilities are emphasised:
0 (kern)
3 (daemon)
16 (local0) Administrator
17 (local1) Config
18 (local2) Mediastats
19 (local3) Apache error
20 (local4) etc/opt/apache2
21 (local5) Developer
22 (local6) Network
187
Cisco ExpresswayAdministrator Guide
1. In the Add option key field, enter the key that has been provided to you for the option you want to add.
2. Click Add option.
Some option keys require that the Expressway is restarted before the option key will take effect. In such cases you
will receive an alarm on the web interface, which will remain in place as a reminder until the system has been
restarted. However, you can continue to use and configure the Expressway in the meantime.
Adding option keys using the CLI
To return the indexes of all the option keys that are already installed on your system:
xStatus Options
188
Cisco Expressway Administrator Guide
Note: when using the CLI to add an extra option key, you can use any unused option index. If you chose an existing
option index, that option will be overwritten and the extra functionality provided by that option key will no longer exist.
To see which indexes are currently in use, type xConfiguration option.
The server must have a certificate installed that verifies its identity. This certificate must be signed by a
Certificate Authority (CA).
The client must trust the CA that signed the certificate used by the server.
The Expressway allows you to install appropriate files so that it can act as either a client or a server in connections
using TLS. The Expressway can also authenticate client connections (typically from a web browser) over HTTPS. You
can also upload certificate revocation lists (CRLs) for the CAs used to verify LDAP server and HTTPS client
certificates.
The Expressway can generate server certificate signing requests (CSRs). This removes the need to use an external
mechanism to generate and obtain certificate requests.
For secure communications (HTTPS and SIP/TLS) we recommend that you replace the Expressway default certificate
with a certificate generated by a trusted certificate authority.
Note that in connections:
Note: be careful not to allow your CA certificates or CRLs to expire as this may cause certificates signed by those CAs
to be rejected.
Certificate and CRL files can only be managed via the web interface. They cannot be installed using the CLI.
See Managing the Trusted CA Certificate List, page 189 and Managing the Expressway's Server Certificate, page 190
for instructions about how to install certificates. For further information, see Certificate Creation and Use with
Expressway Deployment Guide.
To upload a new file containing one or more CA certificates, Browse to the required PEM file and click
Append CA certificate. This will append any new certificates to the existing list of CA certificates. If you are
replacing existing certificates for a particular issuer and subject, you have to manually delete the previous
certificates.
189
Cisco ExpresswayAdministrator Guide
To replace all of the currently uploaded CA certificates with the system's original list of trusted CA certificates,
click Reset to default CA certificate.
To view the entire list of currently uploaded trusted CA certificates, click Show all (decoded) to view it in a
human-readable form, or click Show all (PEM file) to view the file in its raw format.
To view an individual trusted CA certificate, click on View (decoded) in the row for the specific CA certificate.
To delete one or more CA certificates, tick the box(es) next to the relevant CA certificate(s) and click Delete.
Note: if you have enabled certificate revocation list (CRL) checking for TLS encrypted connections to an LDAP server
(for account authentication), you must add the PEM encoded CRL data to your trusted CA certificate file.
To view the currently uploaded server certificate file, click Show (decoded) to view it in a human-readable
form, or click Show (PEM file) to view the file in its raw format.
Note that if a certificate contains SRV-ID or XMPP-ID formatted entries, when that certificate is viewed those
entries will show as '<unsupported>'. That does not mean the certificate is invalid, but that the openssl code
does not know how to display those identifiers.
To replace the currently uploaded server certificate with the Expressway's original certificate, click Reset to
default server certificate.
Note: Do not allow your server certificate to expire as this may cause other external systems to reject your certificate
and prevent the Expressway from being able to connect to those systems.
Generating a certificate signing request (CSR)
The Expressway can generate server certificate signing requests. This removes the need to use an external
mechanism to generate and obtain certificate requests.
To generate a CSR:
190
Cisco Expressway Administrator Guide
4. Click Generate CSR. The system will produce a signing request and an associated private key.
The private key is stored securely on the Expressway and cannot be viewed or downloaded. You must never
disclose your private key, not even to the certificate authority.
5. You are returned to the Server certificate page. From here you can:
Download the request to your local file system so that it can be sent to a certificate authority. You are
prompted to save the file (the exact wording depends on your browser).
View the current request (click Show (decoded) to view it in a human-readable form, or click Show (PEM
file) to view the file in its raw format).
Note:
Only one signing request can be in progress at any one time. This is because the Expressway has to keep track
of the private key file associated with the current request. To discard the current request and start a new
request, click Discard CSR.
From version X8.5.1 the user interface provides an option to set the Digest algorithm. The default is set to
SHA-256, with options to change to SHA-1, SHA-384, or SHA-512.
The certificate signing request storage location changed in X8.
When you generate a CSR in X7, the application puts csr.pem and privkey_csr.pem into
/tandberg/persistent/certs.
When you generate a CSRin X8, the application puts csr.pem and privkey.pem into
/tandberg/persistent/certs/generated_csr.
If you want to upgrade from X7 and have an unsubmitted CSR, then we recommend discarding the CSRbefore
upgrade, and then regenerating the CSR after upgrade.
Uploading a new server certificate
When the signed server certificate is received back from the certificate authority it must be uploaded to the
Expressway.
The Upload new certificate section is used to replace the Expressway's current server certificate with a new
certificate.
To upload a server certificate:
191
Cisco ExpresswayAdministrator Guide
Unified CM phone security profile names: the names of the Phone Security Profiles in Unified CM that are
configured for encrypted TLS and are used for devices requiring remote access. Use the FQDNformat and
separate multiple entries with commas.
Having the secure phone profiles as alternative names means that Unified CM can communicate via TLS with
the Expressway-C when it is forwarding messages from devices that use those profiles.
IM and Presence chat node aliases (federated group chat): the Chat Node Aliases (e.g.
chatroom1.example.com) that are configured on the IM and Presence servers. These are required only for
Unified Communications XMPP federation deployments that intend to support group chat over TLS with
federated contacts.
The Expressway-C automatically includes the chat node aliases in the CSR, providing it has discovered a set
of IM&P servers.
We recommend that you use DNSformat for the chat node aliases when generating the CSR. You must
include the same chat node aliases in the Expressway-E server certificate's alternative names.
Figure 11 Entering subject alternative names for security profiles and chat node aliases on the
Expressway-C's CSRgenerator
Unified CM registrations domains: all of the domains which are configured on the Expressway-C for Unified
CM registrations. They are required for secure communications between endpoint devices and Expressway-E.
Select the DNSformat and manually specify the required FQDNs. Separate the FQDNs by commas if you need
multiple domains. You may select CollabEdgeDNS format instead, which simply adds the prefix collab-edge.
to the domain that you enter. This format is recommended if you do not want to include your top level domain
as a SAN (see example in following screenshot).
XMPP federation domains: the domains used for point-to-point XMPP federation. These are configured on
the IM&P servers and should also be configured on the Expressway-C as domains for XMPP federation.
Select the DNSformat and manually specify the required FQDNs. Separate the FQDNs by commas if you need
multiple domains. Do not use the XMPPAddress format as it may not be supported by your CA, and may be
discontinued in future versions of the Expressway software.
192
Cisco Expressway Administrator Guide
IM and Presence chat node aliases (federated group chat): the same set of Chat Node Aliases as entered
on the Expressway-C's certificate. They are only required for voice and presence deployments which will
support group chat over TLS with federated contacts.
Select the DNSformat and manually specify the required FQDNs. Separate the FQDNs by commas if you need
multiple domains. Do not use the XMPPAddress format as it may not be supported by your CA, and may be
discontinued in future versions of the Expressway software.
Note that you can copy the list of chat node aliases from the equivalent Generate CSR page on the
Expressway-C.
Figure 12 Entering subject alternative names for Unified CMregistration domains, XMPPfederation
domains, and chat node aliases, on the Expressway-E's CSRgenerator
when establishing SIP TLS connections, the CRL data sources are subject to the Certificate revocation
checking settings on the SIP configuration page
automatically downloaded CRL files override any manually loaded CRL files (except for when verifying SIPTLS
connections, when both manually uploaded or automatically downloaded CRL data may be used)
when validating certificates presented by external policy servers, the Expressway uses manually loaded CRLs
only
when validating TLS connections with an LDAP server for remote login account authentication, the
Expressway uses CRL data within the Trusted CA certificate only
193
Cisco ExpresswayAdministrator Guide
We recommend that you configure the Expressway to perform automatic CRL updates. This ensures that the latest
CRLs are available for certificate validation.
To configure the Expressway to use automatic CRL updates:
You can upload CRL files manually to the Expressway. Certificates presented by external policy servers can only be
validated against manually loaded CRLs.
To upload a CRL file:
The Expressway can establish a connection with an OCSP responder to query the status of a particular
certificate.The Expressway determines the OCSP responder to use from the responder URI listed in the certificate
being verified. The OCSP responder sends a status of 'good', 'revoked' or 'unknown' for the certificate.
The benefit of OCSP is that there is no need to download an entire revocation list. OCSPis supported for SIPTLS
connections only. See below for information on how to enable OCSP.
194
Cisco Expressway Administrator Guide
Outbound communication from the Expressway-E is required for the connection to the OCSPresponder. Check the
port number of the OCSPresponder you are using (typically this is port 80 or 443) and ensure that outbound
communication is allowed to that port from the Expressway-E.
Certificate Controls whether revocation checking is performed for We recommend that revocation
revocation certificates exchanged during SIP TLS connection checking is enabled.
checking establishment.
mode
Use OCSP Controls whether the Online Certificate Status Protocol To use OCSP, the X.509
(OCSP) may be used to perform certificate revocation certificate to be checked must
checking. contain an OCSP responder URI.
Use CRLs Controls whether Certificate Revocation Lists (CRLs) CRLs can be used if the
are used to perform certificate revocation checking. certificate does not support
OCSP.
Allow CRL Controls whether the download of CRLs from the CDP
downloads URIs contained in X.509 certificates is allowed.
from CDPs
Fallback Controls the revocation checking behavior if the Treat as not revoked ensures that
behavior revocation status cannot be established, for example if your system continues to operate
the revocation source cannot be contacted. in a normal manner if the
revocation source cannot be
Treat as revoked: treat the certificate as revoked (and contacted, however it does
thus do not allow the TLS connection). potentially mean that revoked
certificates will be accepted.
Treat as not revoked: treat the certificate as not
revoked.
195
Cisco ExpresswayAdministrator Guide
referred to as a Common Access Card or CAC) and the certificate contains appropriate credentials that have a
suitable authorization level.
1. Add the Expressway's trusted CA and server certificate files (on the Trusted CA certificate and Server
certificate pages, respectively).
2. Configure certificate revocation lists (on the CRL management page).
3. Use the Client certificate testing page to verify that the client certificate you intend to use is valid.
4. Set Client certificate-based security to Certificate validation (on the System administration page).
5. Restart the Expressway.
6. Use the Client certificate testing page again to set up the required regex and format patterns to extract the
username credentials from the certificate.
7. Only when you are sure that the correct username is being extracted from the certificate, set Client
certificate-based security to Certificate-based authentication.
In the Regex field, use the (?<name>regex) syntax to supply names for capture groups so that matching sub-
patterns can be substituted in the associated Username format field, for example,
/(Subject:.*, CN=(?<Group1>.*))/m.
The regex defined here must conform to PHP regex guidelines.
The Username format field can contain a mixture of fixed text and the capture group names used in the
Regex. Delimit each capture group name with #, for example, prefix#Group1#suffix. Each capture group
name will be replaced with the text obtained from the regular expression processing.
You can use the Client certificate testing page to test the outcome of applying different Regex and Username
format combinations to a certificate.
196
Cisco Expressway Administrator Guide
Test whether a client certificate is valid when checked against the Expressway's current trusted CA list and, if
loaded, the revocation list (see Managing Certificate Revocation Lists (CRLs), page 193).
Test the outcome of applying the regex and template patterns that retrieve a certificate's authorization
credentials (the username).
You can test against:
test against the certificate currently loaded into your browser (only available if the system is already
configured to use Certificate validation and a certificate is currently loaded)
2. Ignore the Certificate-based authentication pattern section - this is only relevant if you are extracting
authorization credentials from the certificate.
3. Click Check certificate.
4. The results of the test are shown in the Certificate test results section.
To retrieve authorization credentials (username) from the certificate:
197
Cisco ExpresswayAdministrator Guide
Any uploaded test file is automatically deleted from the Expressway at the end of your login session.
The regex is applied to a plain text version of an encoded certificate. The system uses the command openssl
x509 -text -nameopt RFC2253 -noout to extract the plain text certificate from its encoded format.
You can also get to the Language page by clicking on the Language link at the
bottom of every page.
System The default language used on the web You can select from the set of installed language packs.
default interface.
language
This The language used by the current browser This setting applies to the browser currently in use on the
browser on the current client computer. It can be client computer. If you access the Expressway user
set to use either the system default interface using a different browser or a different
language or a specific alternative computer, a different language setting may be in place.
language.
198
Cisco Expressway Administrator Guide
199
Cisco ExpresswayAdministrator Guide
Limitations
The following limitations apply:
Backups can only be restored to a system running the same version of software from which the backup was
made.
You can create a backup on one Expressway and restore it to a different Expressway, for example if the
original system has failed. However, before performing the restore you must install on the new system the
same set of option keys that were installed on the old system. If you attempt to restore a backup made on a
different Expressway, you will receive a warning message, but you will be allowed to continue.
Do not use backups to copy data between Expressways, because system specific information, such as IP
addresses, will be duplicated.
Note: We recommend that you take the Expressway unit out of service before performing a restore.
For extra information about backing up and restoring peers in a cluster, see the Cluster Upgrades, Backup and
Restore, page 117 section.
200
Cisco Expressway Administrator Guide
7. Click Continue with system restore to continue with the restore process.
This will restart your system, so ensure that there are no active calls.
After the system restarts, you are taken to the Login page.
Diagnostics Tools
This section provides information about how to use the diagnostics tools:
diagnostic logging
system snapshot
Network Log and Support Log advanced logging configuration tools
incident reporting
201
Cisco ExpresswayAdministrator Guide
These files can be sent to your Cisco support representative, if you have been requested to do so.
Caution: tcpdump files may contain sensitive information. Only send tcpdump files to trusted recipients.
Consider encrypting the file before sending it, and also send the decrypt password out-of-band.
Note that:
Only one diagnostic log can be produced at a time; creating a new diagnostic log will replace any previously
produced log.
The Expressway continually logs all system activity to a unified log file. The diagnostic logging facility works by
extracting a portion of this unified log. On busy systems the unified log file may become full over time and will
discard historic log data so that it can continue logging current activity. This means that all or part of your
diagnostic log could be overwritten. The system will warn you if you attempt to download a partial diagnostic
log file.
The diagnostic log will continue logging all system activity until it is stopped, including over multiple login
sessions and system restarts.
When starting a diagnostic log, the relevant system modules have their log levels automatically set to
"debug". You can ignore any "Verbose log levels configured" alarms; the log levels are reset to their original
values when you stop logging.
Diagnostic logging can only be controlled through the web interface; there is no CLI option.
The tcpdump has a maximum file size limit of 50 MB.
Clustered Systems
Diagnostic logging can also be used if your Expressway is a part of a cluster, however some activities only apply to
the "current" peer (the peer to which you are currently logged in to as an administrator):
The start and stop logging operations are applied to every peer in the cluster, regardless of the current peer.
The taking a tcpdump operation is applied to every peer in the cluster, regardless of the current peer.
Each cluster peer maintains its own unified log, and logs activity that occurs only on that peer.
Marker text is only applied to log of the current peer.
You can only download the diagnostic log from the current peer.
To add markers to other peers' logs, or to download diagnostic logs from other peers, you must log in as an
administrator to that other peer.
To collect comprehensive information for debugging purposes, we recommend that you extract the diagnostic log for
each peer in a cluster.
Status snapshot: contains the system's current configuration and status settings.
Logs snapshot: contains log file information (including the Event Log, Configuration Log and Network Log).
Full snapshot: contains a complete download of all system information. The preparation of this snapshot file
may take several minutes to complete and may lead to a drop in system performance while the snapshot is in
progress.
202
Cisco Expressway Administrator Guide
1. Click one of the snapshot buttons to start the download of the snapshot file. Typically your support
representative will tell you which type of snapshot file is required.
The snapshot creation process will start. This process runs in the background. If required, you can navigate
away from the snapshot page and return to it later to download the generated snapshot file.
When the snapshot file has been created, a Download snapshot button will appear.
2. Click Download snapshot. A pop-up window appears and prompts you to save the file (the exact wording
depends on your browser). Select a location from where you can easily send the file to your support
representative.
Caution: changing the logging levels can affect the performance of your system. You should only change a log level
on the advice of Cisco customer support.
To change a logging level:
1. Click on the Name of the module whose log level you want to modify.
2. Choose the required Level from the drop-down list.
A log level of Fatal is the least verbose; Trace is the most verbose.
Each message category has a log level of Info by default.
3. Click Save.
Caution: changing the logging levels can affect the performance of your system. You should only change a log level
on the advice of Cisco customer support.
To change a logging level:
1. Click on the Name of the module whose log level you want to modify.
2. Choose the required Level from the drop-down list.
A log level of Fatal is the least verbose; Trace is the most verbose.
Each message category has a log level of Info by default.
3. Click Save.
Incident Reporting
The incident reporting feature of the Expressway automatically saves information about critical system issues such as
application failures. You can:
Configure the Expressway to send the reports automatically to Cisco customer support
View the reports from the Expressway web interface
Download and send the reports manually to Cisco (usually at the request of Cisco customer support)
The information contained in these reports can then be used by Cisco customer support to diagnose the cause of the
failures. All information gathered during this process will be held in confidence and used by Cisco personnel for the
sole purpose of issue diagnosis and problem resolution.
203
Cisco ExpresswayAdministrator Guide
204
Cisco Expressway Administrator Guide
Field Description
Version The Expressway software version running when the incident occurred.
Build The internal build number of the Expressway software version running when the incident occurred.
Pending: indicates that the incident has been saved locally but not sent.
Sent: indicates that details of the incident have been sent to the URL specified in the Incident reporting
configuration page.
To view the information contained in a particular incident report, click on the report's Time. You will be taken to the
Incident detail page, from where you can view the report on screen, or download it as an XML file for forwarding
manually to Cisco customer support.
Field Description
Version The Expressway software version running when the incident occurred.
Build The internal build number of the Expressway software version running when the incident
occurred.
205
Cisco ExpresswayAdministrator Guide
Field Description
Process ID The process ID the Expressway application had when the incident occurred.
Release A true/false flag indicating if this is a release build (rather than a development build).
User name The name of the person that built this software. This is blank for release builds.
Stack The trace of the thread of execution that caused the incident.
Debug A full trace of the application call stack for all threads and the values of the registers.
information
Caution: for each call stack, the Debug information includes the contents of variables which may contain some
sensitive information, for example alias values and IP addresses. If your deployment is such that this information
could contain information specific to a particular person, read the caution regarding privacy-protected personal data
before you decide whether to enable automatic incident reporting.
Locating an Alias
The Locate tool (Maintenance > Tools > Locate) lets you test whether the Expressway can find an endpoint identified
by the given alias, within the specified number of "hops", without actually placing a call to that endpoint.
This tool is useful when diagnosing dial plan and network deployment issues.
To use this tool:
206
Cisco Expressway Administrator Guide
3. Select the Protocol used to initiate the search, either H.323 or SIP. The search may be interworked during the
search process, but the Expressway always uses the native protocol first to search those target zones and
policy services associated with search rules at the same priority, before searching those zones again using the
alternative protocol.
4. Select the Source from which to simulate the search request.
5. Select whether the request should be treated as Authenticated or not (search rules can be restricted so that
they only apply to authenticated messages).
6. Optionally, you can enter a Source alias. Typically, this is only relevant if the routing process uses CPL that
has rules dependent on the source alias. (If no value is specified a default alias of xcom-locate is used.)
7. Click Locate to start the search.
The status bar shows Searching... followed by Search completed. The results include the list of zones that
were searched, any transforms and Call Policy that were applied, and if found, the zone in which the alias was
located.
The locate process performs the search as though the Expressway received a call request from the selected Source
zone. For more information, see the Call Routing Process, page 120 section.
Port Usage
The pages under the Maintenance > Tools > Port usage menu show, in table format, all the IP ports that have been
configured on the Expressway.
The information shown on these pages is specific to that particular Expressway and varies depending on the
Expressway's configuration, the option keys that have been installed and the features that have been enabled.
The information can be sorted according to any of the columns on the page, so for example you can sort the list by IP
port, or by IP address.
Each page contains an Export to CSV option. This lets you save the information in a CSV (comma separated values)
format file suitable for opening in a spreadsheet application.
Note that IP ports cannot be configured separately for IPv4 and IPv6 addresses, nor for each of the two LAN
interfaces. In other words, after an IP port has been configured for a particular service, for example SIP UDP, this will
apply to all IP addresses of that service on the Expressway. Because the tables on these pages list all IP ports and all
IP addresses, a single IP port may appear on the list up to 4 times, depending on your Expressway configuration.
The port information is split into the following pages:
inbound traffic to the IP port on the Expressway from the source of the inbound communications, and
return traffic from that same Expressway IP port back out to the source of the inbound communication.
207
Cisco ExpresswayAdministrator Guide
outbound traffic out from the IP port on the Expressway to the destination of the outbound communications,
and
return traffic from that destination back to the same Expressway IP port.
Note: there are other remote devices not listed here to which the Expressway will be sending media and signaling, but
the ports on which these devices receive traffic from the Expressway is determined by the configuration of the
destination device, so they cannot be listed here. If you have opened all the ports listed in the Local outbound ports
page, the Expressway will be able to communicate with all remote devices. You only need to use the information on
this page if you want to limit the IP ports opened on your firewall to these remote systems and ports.
Network Utilities
This section provides information about how to use the network utility tools:
Ping: allows you to check that a particular host system is contactable from the Expressway and that your
network is correctly configured to reach it.
Traceroute: allows you to discover the details of the route taken by a network packet sent from the
Expressway to a particular destination host system.
Tracepath: allows you to discover the path taken by a network packet sent from the Expressway to a particular
destination host system.
DNS lookup: allows you to check which domain name server (DNS server) is responding to a request for a
particular hostname.
Ping
The Ping tool (Maintenance > Tools > Network utilities > Ping) can be used to assist in troubleshooting system
issues.
It allows you to check that a particular host system is contactable and that your network is correctly configured to
reach it. It reports details of the time taken for a message to be sent from the Expressway to the destination host
system.
To use this tool:
1. In the Host field, enter the IP address or hostname of the host system you want to try to contact.
2. Click Ping.
A new section will appear showing the results of the contact attempt. If successful, it will display the following
information:
Host The hostname and IP address returned by the host system that was queried.
208
Cisco Expressway Administrator Guide
Response time The time taken (in ms) for the request to be sent from the Expressway to the host system and
(ms) back again.
Traceroute
The Traceroute tool (Maintenance > Tools > Network utilities > Traceroute) can be used to assist in troubleshooting
system issues.
It allows you to discover the route taken by a network packet sent from the Expressway to a particular destination host
system. It reports the details of each node along the path, and the time taken for each node to respond to the request.
To use this tool:
1. In the Host field, enter the IP address or hostname of the host system to which you want to trace the path.
2. Click Traceroute.
A new section will appear with a banner stating the results of the trace, and showing the following information for
each node in the path:
TTL (Time to Live). This is the hop count of the request, showing the sequential number of the node.
Response This shows the IP address of the node, and the time taken (in ms) to respond to each packet received
from the Expressway.
*** indicates that the node did not respond to the request.
The route taken between the Expressway and a particular host may vary for each traceroute request.
Tracepath
The Tracepath tool (Maintenance > Tools > Network utilities > Tracepath) can be used to assist in troubleshooting
system issues.
It allows you to discover the route taken by a network packet sent from the Expressway to a particular destination host
system.
To use this tool:
1. In the Host field, enter the IP address or hostname of the host system to which you want to trace the route.
2. Click Tracepath.
A new section will appear with a banner stating the results of the trace, and showing the details of each node along
the path, the time taken for each node to respond to the request, and the maximum transmission units (MTU).
The route taken between the Expressway and a particular host may vary for each tracepath request.
DNS Lookup
The DNS lookup tool (Maintenance > Tools > Network utilities > DNS lookup) can be used to assist in
troubleshooting system issues.
It allows you to query DNS for a supplied hostname and display the results of the query if the lookup was successful.
To use this tool:
209
Cisco ExpresswayAdministrator Guide
2. In the Query type field, select the type of record you want to search for:
(for reverse lookups the Query type is ignored - the search automatically looks for PTR records)
A (IPv4 address) a record that maps the hostname to the host's IPv4 address
AAAA (IPv6 address) a record that maps the hostname to the host's IPv6 address
SRV (services) SRV records (which includes those specific to H.323, SIP, Unified Communications
and TURN services, see below)
NAPTR (Name a record that rewrites a domain name (into a URI or other domain name for
authority pointer) example)
3. By default the system will submit the query to all of the system's default DNSservers (System >DNS). To
query specific servers only, set Check against the following DNS servers to Custom and then select the DNS
servers you want to use.
4. Click Lookup.
A separate DNS query is performed for each selected Query type. The domain that is included within the query sent
to DNS depends upon whether the supplied Host is fully qualified or not (a fully qualified host name contains at least
one "dot"):
_h323ls._udp.<domain>
_h323rs._udp.<domain>
_h323cs._tcp.<domain>
_sips._tcp.<domain>
_sip._tcp.<domain>
_sip._udp.<domain>
_collab-edge._tls
_cisco-uds._tcp
_turn._udp.<domain>
_turn._tcp.<domain>
In each case, as for all other query types, either one or two queries may be performed for a <domain> of either Host
and/or Host.<system_domain>.
210
Cisco Expressway Administrator Guide
Results
A new section will appear showing the results of all of the queries. If successful, it will display the following
information:
TTL The length of time (in seconds) that the results of this query will be cached by the Expressway.
Class IN (internet) indicates that the response was a DNS record involving an internet hostname, server or IP
address.
Response The content of the record received in response to the query for this Name and Type.
Caution: do not restart, reboot or shut down the Expressway while the red ALM LED on the front of the unit is on. This
indicates a hardware fault. Contact your Cisco customer support representative.
Restarting
The restart function shuts down and restarts the Expressway application software, but not the operating system or
hardware. A restart takes approximately 3 minutes.
A restart is typically required in order for some configuration changes to take effect, or when the system is being
added to, or removed from, a cluster. In these cases a system alarm is raised and will remain in place until the system
is restarted.
If the Expressway is part of a cluster and other peers in the cluster also require a restart, we recommend that you wait
until each peer has restarted before restarting the next peer.
Rebooting
The reboot function shuts down and restarts the Expressway application software, operating system and hardware. A
reboot takes approximately 5 minutes.
Reboots are normally only required after software upgrades and are performed as part of the upgrade process. A
reboot may also be required when you are trying to resolve unexpected system errors.
Shutting down
A shutdown is typically required if you want to unplug your unit, prior to maintenance or relocation for example. The
system must be shut down before it is unplugged. Avoid uncontrolled shutdowns, in particular the removal of power to
the system during normal operation.
Effect on active calls
Any of these restart options will cause all active calls to be terminated. (If the Expressway is part of a cluster, only
those calls for which the Expressway is taking the signaling will be terminated.)
For this reason, the System status section displays the number of current calls so you can check these before you
restart the system. If you do not restart the system immediately, you should refresh this page before restarting to
check the current status of calls.
If Mobile and remote access is enabled, the number of currently provisioned sessions is displayed (Expressway-C
only).
211
Cisco ExpresswayAdministrator Guide
Restart/reboot: the Restarting/Rebooting page appears, with an orange bar indicating progress.
After the system has successfully restarted or rebooted, you are automatically taken to the Login page.
Shutdown: the Shutting down page appears.
This page remains in place after the system has successfully shut down but any attempts to refresh the
page or access the Expressway will be unsuccessful.
Developer Resources
The Expressway includes some features that are intended for the use of Cisco support and development teams only.
Do not access these pages unless it is under the advice and supervision of your Cisco support representative.
Caution: incorrect usage of the features on these pages could cause the system operation to become unstable,
cause performance problems and cause persistent corruption of system configuration.
These features are:
Experimental Menu
The Expressway web interface contains a number of pages that are not intended for use by customers. These pages
exist for the use of Cisco support and development teams only. Do not access these pages unless it is under the
advice and supervision of your Cisco support representative.
Caution: incorrect usage of the features on these pages could cause the system operation to become unstable,
cause performance problems and cause persistent corruption of system configuration.
To access these pages:
212
Cisco Expressway Administrator Guide
213
Overview and Status Information
You can view information about the current status, current calls and call history, and configuration of the Expressway
by using the Status menu options.
Status Overview
The Overview page (Status >Overview) provides an overview of the current status of the Expressway (or Expressway
cluster, if applicable). This page is displayed by default after logging in to the Expresswayas an administrator.
The following information is displayed:
Field Description
System information: many of the items in this section are configurable; click on the item name to go to its
configuration page.
System name The name that has been assigned to the Expressway.
Up time The amount of time that has elapsed since the system last restarted.
Software version The version of software that is currently installed on the Expressway.
214
Cisco Expressway Administrator Guide
Field Description
Options The maximum number of calls and the availability of additional Expressway features such as
TURN Relays and Advanced Networking, are controlled through the use of option keys. This
section shows all the options that are currently installed on the Expressway.
Resource usage
This section provides statistics about the current and cumulative license usage for calls.
It shows current and peak (highest concurrent) usage broken down by:
System Information
The System information page (Status > System > Information) provides details of the software, hardware, and time
settings of the Expressway.
Many of the items in the System information and Time information sections are configurable; click on the item name
to be taken to its configuration page.
The following information is displayed:
Field Description
System name The name that has been assigned to the Expressway.
Software version The version of software that is currently installed on the Expressway.
215
Cisco ExpresswayAdministrator Guide
Field Description
Software release The date on which this version of the software was released.
date
Software name The internal reference number for this software release.
Software options The maximum number of calls, and the availability of additional Expressway features such as
Advanced Networking, are controlled through the use of option keys. This section shows all
the optional features currently installed on the Expressway.
Hardware version The version number of the hardware on which the Expressway software is installed.
Serial number The serial number of the hardware or virtual machine on which the Expressway software is
installed.
Up time The amount of time that has elapsed since the system last restarted.
Time zone The time zone that has been configured on the Time page.
Local time If an NTP server is configured, the system time is shown in local time (UTC adjusted
according to the local time zone).
If no NTP server is configured, the time according to the Expressways operating system is
shown.
Administrator The number of current active administrator sessions. Click on the link to see the list of active
sessions sessions.
Ethernet Status
The Ethernet page (Status > System > Ethernet) shows the MAC address and Ethernet speed of the Expressway.
The page displays the following information for the LAN 1 port and, if the Advanced Networking option key has been
installed, the LAN 2 port:
Field Description
MAC address The MAC address of the Expressways Ethernet device for that LAN port.
Speed The speed of the connection between the LAN port on the Expressway and the Ethernet switch.
IP Status
The IP status page (Status > System > IP) shows the current IP settings of the Expressway.
The following information is displayed:
Field Description
IP section:
216
Cisco Expressway Administrator Guide
Field Description
IPv4: it only takes calls between two endpoints communicating via IPv4. It communicates
with other systems via IPv4 only.
IPv6: it only takes calls between two endpoints communicating via IPv6. It communicates
with other systems via IPv6 only.
Both: it takes calls using either protocol. If a call is between an IPv4-only and an IPv6-only
endpoint, the Expressway acts as an IPv4 to IPv6 gateway. It communicates with other
systems via either protocol.
Advanced Indicates whether the second LAN port has been enabled. This is done by installing the Advanced
Networking Networking option key.
LAN 1 Shows the IPv4 address and subnet mask, and IPv6 address of the LAN 1 port.
LAN 2 If the Advanced Networking option key has been installed, this shows the IPv4 address and subnet
mask, and IPv6 address of the LAN 2 port.
DNS section:
Server 1..5 The IP addresses of each of the DNS servers that are queried when resolving domain names. Up to 5
address DNS servers may be configured.
Domain Specifies the name to be appended to the host name before a query to the DNS server is executed.
Resource Usage
The Resource usage page (Status > System > Resource usage) provides statistics about the current and cumulative
license usage for calls.
It shows current and peak (highest concurrent) usage broken down by:
217
Cisco ExpresswayAdministrator Guide
The following types of licenses are pooled for use by any peer in a cluster, irrespective of which peer the licenses are
installed on:
CE1100 appliance can run with medium or large capacity, depending on whether it has 1Gbps or 10Gbps NICs
installed.
This is the maximum number of licenses the system can use. This limit specifically applies to the case where a peer
becomes unavailable and other peers must use its licenses to honor the cluster's overall capacity. This is not
intended as a production capcacity limit, only as a temporary measure to allow the affected peer to be returned to
normal service. We strongly discourage installing more than 100 licenses on any platform that has small or
medium capacity.
* On a Large system, the total TURN capacity of 6000 relays is spread evenly across 6 ports; each port is limited to
handling 1000 relays. On a Small/Medium system, there is a single TURN port that handles up to 1800 relays.
You can see a summary of all of the call and TURN relay licenses installed on each cluster peer by going to the Option
keys page and scrolling down to the Current licenses section.
If the call media traverses the cluster peers, or if either endpoint is registered with ASSENTor H.460 capability:
See About Clusters, page 112 for more information.
Call Status
Call status information can be displayed for both current and completed calls:
Current calls: the Call status page (Status > Calls > Calls) lists all the calls currently passing through the
Expressway.
Completed calls: the Call history page (Status > Calls > History) lists all the calls that are no longer active.
The list is limited to the most recent 500 calls, and only includes calls that have taken place since the
Expressway was last restarted.
If the Expressway is part of a cluster, all calls that apply to any peer in the cluster are shown, although the list is
limited to the most recent 500 calls per peer.
Call summary information
The following summary information is displayed initially:
218
Cisco Expressway Administrator Guide
Field Description
Start time The date and time when the call was placed.
End time The date and time when the call ended (completed calls only).
Destination The alias dialed from the device. This may be different from the alias to which the call was placed,
which may have been transformed (due to pre-search or zone transforms).
Protocol Shows whether the call used H.323, SIP, or both protocols. For calls passing through the B2BUA, this
may show "Multiple components"; you can view the call component summary section to see the
protocol of each individual call component.
Peer Identifies the cluster peer through which the call is being made.
Actions Click View to see further information about the call, including a list of all of the call components that
comprise that call.
On an Expressway-C, a Unified CM remote session will have 3 components (as it uses the B2BUA to enforce
media encryption). One of the Expressway components will route the call through one of the automatically
generated neighbor zones (with a name prefixed by either CEtcp or CEtls) between Expressway and Unified
CM.
On an Expressway-E, there will be one component and that will route the call through the
CollaborationEdgeZone.
Note that if both endpoints are outside of the enterprise (i.e. off premises), you will see this treated as 2 separate
calls.
Rich media sessions
If your system has a rich media session key installed and thus has been extended to support business-to-business
calls, and interworked or gatewayed calls to third-party solutions and so on, those calls are also listed on the call
status and call history pages.
219
Cisco ExpresswayAdministrator Guide
Disconnecting Calls
Click Disconnect to disconnect the selected calls. Note that if your Expressway is part of a cluster you have to be
logged into the peer through which the call is associated to be able to disconnect the call.
Call disconnection works differently for H.323 and SIP calls due to differences in the way the protocols work:
H.323 calls, and interworked H.323 to SIP calls: the Disconnect command will actually disconnect the call.
SIP to SIP calls: the Disconnect command will cause the Expressway to release all resources used for the call
and the call will appear on the system as disconnected. However, SIP calls are peer-to-peer and as a SIP
proxy the Expressway has no authority over the endpoints. Although releasing the resources may have the
side-effect of disconnecting the SIP call, it is also possible that the call signaling, media or both may stay up
(depending on the type of call being made). The call will not actually disconnect until the SIP endpoints
involved have also cleared their resources.
SIP calls via the B2BUA: as the B2BUA can control the state of a call, if you disconnect the leg of the call that
is passing through the B2BUA (where the Type is B2BUA), the call will fully disconnect. Note that the call may
take a few seconds to disappear from the Call status page you may have to refresh the page on your
browser.
B2BUA Calls
The B2BUA calls page (Status > Calls > Calls or Status > Calls > History, then click View for a particular B2BUA call)
provides overview information about a call routed through the B2BUA.
Calls are routed through the B2BUA if:
a media encryption policy (any encryption setting other than Auto) has been applied to the call
ICE messaging support has been triggered
the Microsoft Lync B2BUA service is enabled and the call has been routed through the To Microsoft Lync
server via B2BUA neighbor zone
Note that for Microsoft Lync B2BUA calls, you can click the Corresponding Expressway call link to see details of the
leg passing through the Expressway.
Search History
The Search history page (Status > Search history) lists the most recent 255 searches that have taken place since
the Expressway was last restarted.
About searches
Before a call can be placed, the endpoint being called must be located. The Expressway sends and receives a series
of messages during its attempt to locate the endpoint being called; these messages are each known as searches. An
individual call can have one or more searches associated with it, and these searches can be of different types.
The type of search message that is sent depends on whether the call is for SIP or H.323, and whether the call request
was received locally or from an external zone, as follows:
H.323 calls that are placed locally: two messages are sent - the first is an ARQ which locates the device being
called, and the second is the call Setup which sends a request to the device asking it to accept the call. Each
message shows up as a separate search in the Search history page, but only the Setup message is
220
Cisco Expressway Administrator Guide
Field Description
Start time The date and time at which the search was initiated.
Destination The alias that was dialed from the endpoint. This may be different from the alias to which the call was
actually placed, as the original alias may have been transformed either locally or before the neighbor
was queried.
Actions Allows you to click View to go to the Search details page, which lists full details of this search.
Search Details
The Search details page lists full information about either an individual search, or all searches associated with a
single call (depending on how you reached the page). The information shown includes:
View all events associated with this call tag takes you to the Event Log page, filtered to show only those
events associated with the Call Tag relating to this search.
View call information associated with this call tag takes you to the Call details page, where you can view
overview information about the call.
View all searches associated with this call tag is shown if you are viewing details of an individual search and
there are other searches associated with the same call. It takes you to a new Search details page which lists
full information about all the searches associated with the call's Call Tag.
221
Cisco ExpresswayAdministrator Guide
Field Description
Subzone name The names of each subzone currently configured on this Expressway.
Clicking on a Subzone name takes you to the configuration page for that subzone.
Bandwidth used The total amount of bandwidth used by all calls passing through the subzone.
Zone Status
The Zone status page (Status > Zones) lists all of the external zones on the Expressway. It shows the number of calls
and amount of bandwidth being used by each zone.
The list of zones always includes the Default Zone, plus any other zones that have been created.
The following information is displayed:
Field Description
Clicking on a zone Name takes you to the configuration page for that zone.
Calls The number of calls currently passing out to or received in from each zone.
Bandwidth The total amount of bandwidth used by all calls passing out to or received in from each zone.
used
Search This area is used to indicate if that zone is not a target of any search rules.
rule status
222
Cisco Expressway Administrator Guide
Bandwidth
Link Status
The Link status page (Status > Bandwidth > Links) lists all of the links currently configured on the Expressway, along
with the number of calls and the bandwidth being used by each link.
The following information is displayed:
Field Description
Name The name of each link. Clicking on a link Name takes you to the configuration page for that link.
Calls The total number of calls currently traversing the link. Note that a single call may traverse more than
one link, depending on how your system is configured.
Bandwidth The total bandwidth of all the calls currently traversing the link.
used
Pipe Status
The Pipe status page (Status > Bandwidth > Pipes) lists all of the pipes currently configured on the Expressway,
along with the number of calls and the bandwidth being used by each pipe.
The following information is displayed:
Field Description
Name The name of each pipe. Clicking on a pipe Name takes you to the configuration page for that pipe.
Calls The total number of calls currently traversing the pipe. Note that a single call may traverse more than
one pipe, depending on how your system is configured.
Bandwidth The total bandwidth of all the calls currently traversing the pipe.
used
223
Cisco ExpresswayAdministrator Guide
The Expressway uses the configured Default CPL if it fails to contact the policy service via any of the configured
addresses.
Note that this method provides resiliency but not load balancing i.e. all requests will be sent to Server 1 address,
providing that server address is functioning correctly.
Field Description
Clicking on a Name takes you to the configuration page for that service where you can change any of the
settings or see the details of any connection problems.
URL The address of the service. Note that each service can be configured with multiple server addresses for
resiliency. This field displays the server address currently selected for use by the Expressway.
Status The current status of the service based on the last attempt to poll that server.
Last Indicates when the service was last requested by the Expressway.
used
Field Description
Media destinations The address of destination system the media is being relayed to.
224
Cisco Expressway Administrator Guide
To access this page, go to Status > TURN relay usage, then click View for a TURN client, and then View again for the
required relay.
Further detailed information about the relay can be viewed by using the links in the Related tasks section at the
bottom of the page. These let you:
View permissions for this relay: information about the permissions that have been defined on this relay.
View channels for this relay: information about the channel bindings that have been defined on this relay.
View counters for this relay: information about the number of TURN requests received, and the number of
TURN success or error responses sent. It also shows counts of the number of packets forwarded to and from
the client that allocated this relay.
a list of all current and recent (shown in red) provisioning sessions (Expressway-C only)
a list of the automatically-generated SSH tunnels servicing requests through the traversal zone
Checking SSOStatistics
The SSOStatistics page (Status > Unified Communications >View detailed SSOstatistics) shows a summary of the
requests and responses issued, as well as more detailed statistics about successful and unsuccessful attempts to
sign on.
If there are no instances of a particular type of request or response, there is no counter shown for that type.
Lync B2BUA
225
Cisco ExpresswayAdministrator Guide
Managing Alarms
Alarms occur when an event or configuration change has taken place on the Expressway that requires some manual
administrator intervention, such as a restart. Alarms may also be raised for hardware and environmental issues such
as faulty disks and fans or high temperatures.
The Alarms page (Status > Alarms) provides a list of all the alarms currently in place on your system (and, where
applicable, their proposed resolution). When there are unacknowledged alarms in place on the Expressway, an alarm
icon appears at the top right of all pages. You can also access the Alarms page by clicking on the alarm icon.
Each alarm is identified by a 5-digit Alarm ID, shown in the rightmost column in the alarms list. The alarms are
grouped into categories as follows:
35nnn External applications and services (such as policy services or LDAP/AD configuration)
All alarms raised on the Expressway are also raised as Cisco TMS tickets. All the attributes of an alarm (its ID, severity
and so on) are included in the information sent to Cisco TMS.
Alarms are dealt with by clicking each Action hyperlink and making the necessary configuration changes to resolve
the problem.
Acknowledging an alarm (by selecting an alarm and clicking on the Acknowledge button) removes the alarm icon
from the web UI, but the alarm will still be listed on the Alarms page with a status of Acknowledged. If a new alarm
occurs, the alarm icon will reappear.
You cannot delete alarms from the Alarms page. Alarms are removed by the Expressway only after the
required action or configuration change has been made.
After a restart of the Expressway, any Acknowledged alarms that are still in place on the Expressway will
reappear with a status of New, and must be re-acknowledged.
The display indicates when the alarm was first and last raised since the Expressway was last restarted.
If your Expressway is a part of a cluster, the Alarms page shows all of the alarms raised by any of the cluster
peers. However, you can acknowledge only those alarms that have been raised by the "current" peer (the
peer to which you are currently logged in to as an administrator).
You can click the Alarm ID to generate a filtered view of the Event Log, showing all occurrences of when that
alarm has been raised and lowered.
See the alarms list for further information about the specific alarms that can be raised.
226
Cisco Expressway Administrator Guide
Logs
Event Log
The Event Log page (Status > Logs > Event Log) lets you view and search the Event Log, which is a list of the events
that have occurred on your system since the last upgrade.
The Event Log holds a maximum of 2GB of data; when this size is reached, the oldest entries are overwritten.
However, only the first 50MB of Event Log data can be displayed through the web interface.
Filtering the Event Log
The Filter section lets you filter the Event Log. It is displayed only if there is more than one page of information to
display. Log pages show 1000 records per page.
Enter the words you want to search for and click Filter.Only those events that contain all the words you entered are
shown.
To do more advanced filtering, click more options. This gives you additional filtering methods:
Contains the string: only includes events containing the exact phrase entered here.
Contains any of the words: includes any events that contain at least one of the words entered here.
Not containing any of the words: filters out any events containing any of the words entered here.
Note: use spaces to separate each word you want to filter by.
Click Filter to reapply any modified filter conditions. To return to the complete log listing, click Reset.
Reconfiguring the log settings
Clicking Configure the log settings takes you to the Logging configuration page. From this page, you can set the
level of events that are recorded in the Event Log, and also set up a remote server to which the Event Log can be
copied.
Saving the results to a local disk
Click Download this page if you want to download the contents of the results section to a text file on your local PC or
server.
Results section
The Results section shows all the events matching the current filter conditions, with the most recent being shown
first.
Most tvcs events contain hyperlinks in one or more of the fields (such fields change color when you hover over them).
You can click on the hyperlink to show only those events that contain the same text string. For example, clicking on
the text that appears after Event= filters the list to show all the events of that particular type. Likewise, clicking on a
particular Call-Id shows just those events that contain a reference to that particular call.
Event Log color coding
Certain events in the Event Log are color-coded so that you can identify them more easily. These events are as
follows:
Green events:
System Start
Admin Session Start/Finish
Installation of <item> succeeded
Call Connected
Request Successful
227
Cisco ExpresswayAdministrator Guide
Orange events:
System Shutdown
Intrusion Protection Unblocking
Purple events:
Diagnostic Logging
Red events:
Registration Rejected
Registration Refresh Rejected
Call Rejected
Security Alert
License Limit Reached
Decode Error
TLS Negotiation Error
External Server Communications Failure
Application Failed
Request Failed
System Backup Error
System Restore Error
Authorization Failure
Intrusion Protection Blocking
For more information about the format and content of the Event Log see Event Log Format, page 234 and Events and
Levels, page 237.
Configuration Log
The Configuration Log page (Status > Logs > Configuration Log) provides a list of all changes to the Expressway
configuration.
The Configuration Log holds a maximum of 30MB of data; when this size is reached, the oldest entries are
overwritten. The entire Configuration Log can be displayed through the web interface.
Filtering the Configuration Log
The Filter section lets you filter the Configuration Log. It is displayed only if there is more than one page of information
to display. Log pages show 1000 records per page.
Enter the words you want to search for and click Filter.Only those events that contain all the words you entered are
shown.
To do more advanced filtering, click more options. This gives you additional filtering methods:
Contains the string: only includes events containing the exact phrase entered here.
Contains any of the words: includes any events that contain at least one of the words entered here.
Not containing any of the words: filters out any events containing any of the words entered here.
Note: use spaces to separate each word you want to filter by.
Click Filter to reapply any modified filter conditions. To return to the complete log listing, click Reset.
228
Cisco Expressway Administrator Guide
Results section
The Results section shows all the web-based events, with the most recent being shown first.
Most events contain hyperlinks in one or more of the fields (such fields change color when you hover over them). You
can click on the hyperlink to show only those events that contain the same text string. For example, clicking on the
text that appears after Event= filters the list to show all the events of that particular type. Likewise, clicking on a
particular user shows just those events relating to that particular administrator account.
All events that appear in the Configuration Log are recorded as Level 1 Events, so any changes to the logging levels
will not affect their presence in the Configuration Log.
Configuration Log events
Changes to the Expressway configuration made by administrators using the web interface have an Event field of
System Configuration Changed.
The Detail field of each of these events shows:
Network Log
The Network Log page (Status > Logs > Network Log) provides a list of the call signaling messages that have been
logged on this Expressway.
The Network Log holds a maximum of 2GB of data; when this size is reached, the oldest entries are overwritten.
However, only the first 50MB of Network Log data can be displayed through the web interface.
The Filter section lets you filter the Network Log. It is displayed only if there is more than one page of information to
display. Log pages show 1000 records per page.
Enter the words you want to search for and click Filter.Only those events that contain all the words you entered are
shown.
To do more advanced filtering, click more options. This gives you additional filtering methods:
Contains the string: only includes events containing the exact phrase entered here.
Contains any of the words: includes any events that contain at least one of the words entered here.
Not containing any of the words: filters out any events containing any of the words entered here.
Note: use spaces to separate each word you want to filter by.
Click Filter to reapply any modified filter conditions. To return to the complete log listing, click Reset.
Reconfiguring the log settings
Clicking Configure the log settings takes you to the Network Log configuration page. From this page, you can set the
level of events that are recorded in the Network Log.
Saving the results to a local disk
Click Download this page if you want to download the contents of the results section to a text file on your local PC or
server.
Results Section
The Results section shows the events logged by each of the Network Log modules.
229
Cisco ExpresswayAdministrator Guide
Most events contain hyperlinks in one or more of the fields (such fields change color when you hover over them). You
can click on the hyperlink to show only those events that contain the same text string. For example, clicking on the
text that appears after Module= filters the list to show all the events of that particular type.
The events that appear in the Network Log are dependent on the log levels configured on the Network Log
configuration page.
Hardware Status
The Hardware page (Status > Hardware) provides information about the physical status of your Expressway
appliance.
Information displayed includes:
fan speeds
component temperatures
component voltages
Any appropriate minimum or maximum levels are shown to help identify any components operating outside of their
standard limits.
Warning: do not attempt to service the apparatus yourself as opening or removing covers may expose you to
dangerous voltages or other hazards, and will void the warranty. Refer all servicing to qualified service personnel.
Note that hardware status information is not displayed if the Expressway is running on VMware.
230
Cisco Expressway Administrator Guide
231
Reference Material
This section provides supplementary information about the features and administration of the Expressway.
Performance Capabilities
The performance capabilities of ExpresswayX8.7 software are summarized below. In all cases, note that:
You can cluster up to 6 Expressways to increase capacity. This offers N+1 redundancy, because the maximum
capacity of a cluster is 4 times the physical limit of a single Expressway.
Logging is at default levels.
Performance capacity will be reduced by features such as TURN relay services, RDPtranscoding, and by
configuring large numbers of zones and search rules.
232
Cisco Expressway Administrator Guide
CE1000 appliances, or Large VM servers (minimum 8 cores with 2 x 10Gb NIC), or CE1100 appliances with 10
Gbps NICs
Supports 500 encrypted traversal calls @ 768kbps or 1000 encrypted SIP audio-only traversal calls @ 64kbps, and
500 non-traversal calls.
This assumes a maximum sustained call rate of 10 calls per second.
CE500 appliances, or Small/Medium VM servers (2 cores and 1GbNIC), or CE1100 appliances with 1 Gbps NICs
Supports 100 encrypted traversal calls @ 768kbps and 500 non-traversal calls.
This assumes a maximum sustained call rate of 5 calls per second.
233
Cisco ExpresswayAdministrator Guide
1 High-level events such as registration requests and call attempts. Easily human readable. For example:
call attempt/connected/disconnected
registration attempt/rejected
Note that endpoints or other devices cannot register to the Expressway. Registration requests will be
rejected and will be logged with 'License limit exceeded' messages.
logs of protocol messages sent and received (SIP, H.323, LDAP and so on) excluding noisy
messages such as H.460.18 keepalives and H.245 video fast-updates
protocol keepalives
call-related SIP signaling messages
4 The most verbose level: all Level 1, Level 2 and Level 3 events, plus:
See the Events and levels section for a complete list of all events that are logged by the Expressway, and the level at
which they are logged.
where:
Field Description
process_name The name of the program generating the log message. This could include:
message_details The body of the message (see the Message details field section for further information).
234
Cisco Expressway Administrator Guide
Administrator Events
Administrator session related events are:
the name of the administrator user to whom the session relates, and their IP address
the date and time that the login was attempted, started, or ended
Name Description
Event The event which caused the log message to be generated. See Events and levels for a list of all events
that are logged by the Expressway, and the level at which they are logged.
User The username that was entered when a login attempt was made.
ipaddr The source IP address of the user who has logged in.
Protocol Specifies which protocol was used for the communication. Valid values are:
TCP
UDP
TLS
Reason Textual string containing any reason information associated with the event.
Service Specifies which protocol was used for the communication. Will be one of:
H323
SIP
H.225
H.245
LDAP
Q.931
NeighbourGatekeeper
Clustering
ConferenceFactory
235
Cisco ExpresswayAdministrator Guide
Name Description
Response- SIP response code or, for H.323 and interworked calls, a SIP equivalent response code.
code
Src-ip Source IP address (the IP address of the device attempting to establish communications). This can be
an IPv4 address or an IPv6 address.
Dst-ip Destination IP address (the IP address of the destination for a communication attempt). The
destination IP is recorded in the same format as Src-ip.
Src-port Source port: the IP port of the device attempting to establish communications.
Dst-port Destination port: the IP port of the destination for a communication attempt.
Src-alias If present, the first H.323 alias associated with the originator of the message.
If present, the first E.164 alias associated with the originator of the message.
Dst-alias If present, the first H.323 alias associated with the recipient of the message.
If present, the first E.164 alias associated with the recipient of the message.
Call-id The Call-ID header field uniquely identifies a particular invitation or all registrations of a particular
client.
Call- The local Call Serial Number that is common to all protocol messages for a particular call.
serial-
number
Tag The Tag is common to all searches and protocol messages across an Expressway network for all forks
of a call.
Call- Indicates if the Expressway took the signaling for the call.
routed
Request- The SIP or SIPS URI indicating the user or service to which this request is being addressed.
URI
Protocol- Shows the data contained in the buffer when a message could not be decoded.
buffer
236
Cisco Expressway Administrator Guide
Name Description
Time A full UTC timestamp in YYYY/MM/DD-HH:MM:SS format. Using this format permits simple ASCII text
sorting/ordering to naturally sort by time. This is included due to the limitations of standard syslog
timestamps.
Level The level of the event as defined in the About Event Log levels section.
Alarm An administrator has acknowledged an alarm. The Detail event parameter provides 1
acknowledged information about the nature of the issue.
Alarm lowered The issue that caused an alarm to be raised has been resolved. The Detail event 1
parameter provides information about the nature of the issue.
Alarm raised The Expressway has detected an issue and raised an alarm. The Detail event parameter 1
provides information about the nature of the issue.
Admin Session An unsuccessful attempt has been made to log in when the Expressway is configured to 1
CBA use certificate-based authentication.
Authorization
Failure
Admin Session An unsuccessful attempt has been made to log in as an administrator. This could be 1
Login Failure because an incorrect username or password (or both) was entered.
Application Exit The Expressway application has been exited. Further information may be provided in the 1
Detail event parameter.
Application The Expressway has started. Further detail may be provided in the Detail event 1
Start parameter.
Application The Expressway application is still running but has experienced a recoverable problem. 1
Warning Further detail may be provided in the Detail event parameter.
Authorization The user has either entered invalid credentials, does not belong to an access group, or 1
Failure belongs to a group that has an access level of "None". Applies when remote
authentication is enabled.
237
Cisco ExpresswayAdministrator Guide
Call Rejected A call has been rejected. The Reason event parameter contains a textual representation 1
of the H.225 additional cause code.
Call Rerouted The Expressway has Call signaling optimization set to On and has removed itself from the 1
call signaling path.
CBA An attempt to log in using certificate-based authentication has been rejected due to 1
Authorization authorization failure.
Failure
Certificate Indicates that security certificates have been uploaded. See the Detail event parameter 1
Management for more information.
Decode Error A syntax error was encountered when decoding a SIP or H.323 message. 1
Diagnostic Indicates that diagnostic logging is in progress. The Detail event parameter provides 1
Logging additional details.
Error Response The TURN server has sent an error message to a client (using STUN protocol). 3
Sent
External Server Communication with an external server failed unexpectedly. The Detail event parameter 1
Communication should differentiate between "no response" and "request rejected". Servers concerned
Failure are:
DNS
LDAP servers
Neighbor Gatekeeper
NTP servers
Peers
238
Cisco Expressway Administrator Guide
Hardware There is an issue with the Expressway hardware. If the problem persists, contact your 1
Failure Cisco support representative.
License Limit Licensing limits for a given feature have been reached. The Detail event parameter 1
Reached specifies the facility/limits concerned.
If this occurs frequently, you may want to contact your Cisco representative to purchase
more licenses.
Message An incoming RAS NSM Keepalive, H.225, H.245 or a RAS message between peers has 3
Received been received.
Message Sent An outgoing RAS NSM Keepalive, H.225, H.245 or a RAS message between peers has 3
been sent.
Outbound TLS The Expressway is unable to communicate with another system over TLS. The event 1
Negotiation parameters provide more information.
Error
Package Install A package, for example a language pack, has been installed or removed. 2
POST request A HTTP POST request was submitted from an unauthorized session. 1
failed
Provisioning Diagnostic messages from the provisioning server. The Detail event parameter provides 1
additional information.
Reboot A system reboot has been requested. The Reason event parameter provides specific 1
Requested information.
239
Cisco ExpresswayAdministrator Guide
Registration A registration request has been rejected. The Reason and Detail event parameters 1
Rejected provide more information about the nature of the rejection.
Restart A system restart has been requested. The Reason event parameter provides specific 1
Requested information.
Search Loop The Expressway is in Call loop detection mode and has identified and terminated a 2
detected looped branch of a search.
Secure mode The Expressway has successfully exited Advanced account security mode. 1
disabled
Secure mode The Expressway has successfully entered Advanced account security mode. 1
enabled
Security Alert A potential security-related attack on the Expressway has been detected. 1
240
Cisco Expressway Administrator Guide
Success The TURN server has sent a success message to a client (using STUN protocol). 3
Response Sent
System An item of configuration on the system has changed. The Detail event parameter contains 1
Configuration the name of the changed configuration item and its new value.
Changed
System restore System restore process has started backing up the current configuration 1
backing up
current config
System restore System restore process has completed backing up the current configuration 1
backup of
current config
completed
System Start The operating system has started. The Detail event parameter may contain additional 1
information if there are startup problems.
Upgrade Messages related to the software upgrade process. The Detail event parameter provides 1
specific information.
241
Cisco ExpresswayAdministrator Guide
CPL Reference
Call Processing Language (CPL) is an XML-based language for defining call handling. This section gives details of
the Expressways implementation of the CPL language and should be read in conjunction with the CPL standard RFC
3880.
The Expressway has many powerful inbuilt transform features so CPL should be required only if advanced call
handling rules are required.
The Expressway supports most of the CPL standard along with some TANDBERG-defined extensions. It does not
support the top level actions <incoming> and <outgoing> as described in RFC 3880. Instead it supports a single section
of CPL within a <taa:routed> section.
When Call Policy is implemented by uploading a CPL script to the Expressway, the script is checked against an XML
schema to verify the syntax. There are two schemas - one for the basic CPL specification and one for the TANDBERG
extensions. Both of these schemas can be downloaded from the web interface and used to validate your script before
uploading to the Expressway.
The following example shows the correct use of namespaces to make the syntax acceptable:
<?xml version="1.0" encoding="UTF-8" ?>
<cpl xmlns="urn:ietf:params:xml:ns:cpl"
xmlns:taa="http://www.tandberg.net/cpl-extensions"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="urn:ietf:params:xml:ns:cpl cpl.xsd">
<taa:routed>
<address-switch field="destination">
<address is="[email protected]">
<proxy/>
</address>
</address-switch>
</taa:routed>
</cpl>
Address
The address construct is used within an address-switch to specify addresses to match. It supports the use of regular
expressions.
Valid values are:
is=string Selected field and subfield exactly match the given string.
contains=string Selected field and subfield contain the given string. Note that the CPL standard only allows for
this matching on the display subfield; however the Expressway allows it on any type of field.
242
Cisco Expressway Administrator Guide
subdomain- If the selected field is numeric (for example, the tel subfield) then this matches as a prefix; so
of=string address subdomain-of="555" matches 5556734 and so on. If the field is not numeric then normal
domain name matching is applied; so
address subdomain-of="company.com" matches nodeA.company.com and so on.
regex="regular Selected field and subfield match the given regular expression.
expression"
All address comparisons ignore upper/lower case differences so address is="Fred" will also match fred, freD and so
on.
Field
Within the address-switch node, the mandatory field parameter specifies which address is to be considered. The
supported attributes and their interpretation are shown below:
originating-zone The name of the zone or subzone for the originating leg of the call. If the call originates from a
neighbor, traversal server or traversal client zone then this will equate to the zone name. In all
other cases this will be "DefaultZone".
originating-user If the relevant AuthenticationPolicy is Check credentials or Treat as authenticated this is the
username used for authentication, otherwise not-present.
registered- If the call originates from a registered endpoint this is the list of all aliases it has registered,
origin otherwise not-present.
destination The destination aliases.
original- The destination aliases.
destination
Note that any Authentication Policy settings that apply are those configured for the relevant zone according to the
source of the incoming message.
If the selected field contains multiple aliases then the Expressway will attempt to match each address node with all of
the aliases before proceeding to the next address node, that is, an address node matches if it matches any alias.
Subfield
Within the address-switch node, the optional subfield parameter specifies which part of the address is to be
considered. The following table gives the definition of subfields for each alias type.
If a subfield is not specified for the alias type being matched then the not-present action is taken.
address- Either h323 or sip, based on the type of endpoint that originated the call.
type
243
Cisco ExpresswayAdministrator Guide
user For URI aliases this selects the username part. For H.323 IDs it is the entire ID and for E.164 numbers it is
the entire number.
host For URI aliases this selects the domain name part. If the alias is an IP address then this subfield is the
complete address in dotted decimal form.
tel For E.164 numbers this selects the entire string of digits.
alias- Gives a string representation of the type of alias. The type is inferred from the format of the alias.
type Possible types are:
Address Type
Result
URI
url-ID
H.323 ID
h323-ID
Dialed Digits
dialedDigits
Otherwise
The otherwise node is executed if the address specified in the address-switch was found but none of the preceding
address nodes matched.
Not-Present
The not-present node is executed when the address specified in the address-switch was not present in the call setup
message. This form is most useful when authentication is being used. With authentication enabled the Expressway
will only use authenticated aliases when running policy so the not-present action can be used to take appropriate
action when a call is received from an unauthenticated user (see the example Call screening of authenticated users).
Location
As the CPL script is evaluated it maintains a list of addresses (H.323 IDs, URLs and E.164 numbers) which are used as
the destination of the call if a proxy node is executed. The taa:location node allows the location set to be modified
so that calls can be redirected to different destinations.
At the start of script execution the location set is initialized to the original destination.
The following attributes are supported on taa:location nodes. It supports the use of regular expressions.
Clear = "yes" | Specifies whether to clear the current location set before adding the new location. The
"no" default is to append this location to the end of the set.
url=string The new location to be added to the location set. The given string can specify a URL (for
example, [email protected]), H.323 ID or an E.164 number.
priority=<0.0..1.0> Specified either as a floating point number in the range 0.0 to 1.0, or random, which assigns a
| "random" random number within the same range. 1.0 is the highest priority. Locations with the same
priority are searched in parallel.
regex="<regular Specifies the way in which a location matching the regular expression is to be changed.
expression>"
replace="<string>"
244
Cisco Expressway Administrator Guide
source-url-for- Replaces the From header (source alias) with the specified string.
message="<string>"
source-url-for- Replaces any From header (source alias) that matches the regular expression with the
message- specified replacement string. If there are multiple From headers (applies to H.323 only) then
regex="<regular any From headers that do not match are left unchanged.
expression>"
together with
source-url-for-
message-
replace="<string>"
If the source URL of a From header is modified, any corresponding display name is also modified to match the
username part of the modified source URL.
Rule-Switch
This extension to CPL is provided to simplify Call Policy scripts that need to make decisions based on both the source
and destination of the call. A taa:rule-switch can contain any number of rules that are tested in sequence; as soon
as a match is found the CPL within that rule element is executed.
Each rule must take one of the following forms:
<taa:rule-switch>
<taa:rule origin="<regular expression>" destination="<regular expression>" message-regex="<regular
expression>">
<taa:rule authenticated-origin="<regular expression>" destination="<regular expression>" message-
regex="<regular expression>">
<taa:rule unauthenticated-origin="<regular expression>" destination="<regular expression>" message-
regex="<regular expression>">
<taa:rule registered-origin="<regular expression>" destination="<regular expression>" message-
regex="<regular expression>">
<taa:rule originating-user="<regular expression>" destination="<regular expression>" message-
regex="<regular expression>">
<taa:rule originating-zone="<regular expression>" destination="<regular expression>" message-
regex="<regular expression>">
</taa:rule-switch>
The meaning of the various origin selectors is as described in the field section.
The message-regex parameter allows a regular expression to be matched against the entire incoming SIP message.
Note that any rule containing a message-regex parameter will never match an H.323 call.
Proxy
On executing a proxy node the Expressway attempts to forward the call to the locations specified in the current
location set. If multiple entries are in the location set then this results in a forked call. If the current location set is
empty the call is forwarded to its original destination.
The proxy node supports the following optional parameters:
The proxy action can lead to the results shown in the table below.
245
Cisco ExpresswayAdministrator Guide
The CPL can perform further actions based on these results. Any results nodes must be contained within the proxy
node. For example:
<proxy timeout="10">
<busy>
<!--If busy route to recording service-->
<location clear="yes" url="recorder">
<proxy/>
</location>
</busy>
</proxy>
Reject
If a reject node is executed the Expressway stops any further script processing and rejects the current call.
The custom reject strings status=string and reason=string options are supported here and should be used together
to ensure consistency of the strings.
time-switch
string-switch
language-switch
priority-switch
redirect
mail
log
subaction
lookup
remove-location
CPL Examples
This section provides a selection of CPL examples:
246
Cisco Expressway Administrator Guide
Note:You can configure this behavior using Call Policy Rules, so you don't need to do it using a CPLscript. However,
you cannot use a combination of UIconfigured rules and uploaded CPLscript, so if you have any CPLrequirements
that you cannot implement using the UI rules, you must use a script for all of your rules. See About Call Policy, page
135.
In this example, only calls from users with authenticated source addresses are allowed. See About Device
Authentication, page 88 for details on how to enable authentication.
If calls are coming in through Expressway-E, then we recommend screening on the Expressway-E to prevent
unwelcome calls from progressing into the network.
<?xml version="1.0" encoding="UTF-8" ?>
<cpl xmlns="urn:ietf:params:xml:ns:cpl"
xmlns:taa="http://www.tandberg.net/cpl-extensions"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="urn:ietf:params:xml:ns:cpl cpl.xsd">
<taa:routed>
<address-switch field="authenticated-origin">
<not-present>
<!-- Reject call with a status code of 403 (Forbidden) -->
<reject status="403" reason="Denied by policy"/>
</not-present>
</address-switch>
</taa:routed>
</cpl>
Note:You can configure this behavior using Call Policy Rules, so you don't need to do it using a CPLscript. However,
you cannot use a combination of UIconfigured rules and uploaded CPLscript, so if you have any CPLrequirements
that you cannot implement using the UI rules, you must use a script for all of your rules. See About Call Policy, page
135.
In this example, user fred will not accept calls from anyone at annoying.com, or from any unauthenticated users. All
other users will allow any calls.
If calls are coming in through Expressway-E, then we recommend screening on the Expressway-E to prevent
unwelcome calls from progressing into the network.
<?xml version="1.0" encoding="UTF-8" ?>
<cpl xmlns="urn:ietf:params:xml:ns:cpl"
xmlns:taa="http://www.tandberg.net/cpl-extensions"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="urn:ietf:params:xml:ns:cpl cpl.xsd">
<taa:routed>
<address-switch field="destination">
<address is="fred">
<address-switch field="authenticated-origin" subfield="host">
<address subdomain-of="annoying.com">
<!-- Don't accept calls from this source -->
<!-- Reject call with a status code of 403 (Forbidden) -->
<reject status="403" reason="Denied by policy"/>
</address>
<not-present>
<!-- Don't accept calls from unauthenticated sources -->
<!-- Reject call with a status code of 403 (Forbidden) -->
<reject status="403" reason="Denied by policy"/>
</not-present>
<otherwise>
<!-- All other calls allowed -->
<proxy/>
</otherwise>
247
Cisco ExpresswayAdministrator Guide
</address-switch>
</address>
</address-switch>
</taa:routed>
</cpl>
CPL Example: Block Calls From Default Zone and Default Subzone
Note:You can configure this behavior using Call Policy Rules, so you don't need to do it using a CPLscript. However,
you cannot use a combination of UIconfigured rules and uploaded CPLscript, so if you have any CPLrequirements
that you cannot implement using the UI rules, you must use a script for all of your rules. See About Call Policy, page
135.
The script to allow calls from locally registered endpoints only can be extended to also allow calls from configured
zones but not from the Default Zone or Default Subzone.
<?xml version="1.0" encoding="UTF-8" ?>
<cpl xmlns="urn:ietf:params:xml:ns:cpl"
xmlns:taa="http://www.tandberg.net/cpl-extensions"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="urn:ietf:params:xml:ns:cpl cpl.xsd">
<taa:routed>
<address-switch field="registered-origin">
<not-present>
<address-switch field="originating-zone">
<address is="DefaultZone">
<!-- Reject call with a status code of 403 (Forbidden) -->
<reject status="403" reason="Denied by policy"/>
</address>
<address is="DefaultSubZone">
<!-- Reject call with a status code of 403 (Forbidden) -->
<reject status="403" reason="Denied by policy"/>
</address>
<otherwise>
<proxy/>
</otherwise>
</address-switch>
</not-present>
</address-switch>
</taa:routed>
</cpl>
Note:You can configure this behavior using Call Policy Rules, so you don't need to do it using a CPLscript. However,
you cannot use a combination of UIconfigured rules and uploaded CPLscript, so if you have any CPLrequirements
that you cannot implement using the UI rules, you must use a script for all of your rules. See About Call Policy, page
135.
In these examples, a gateway is registered to the Expressway with a prefix of 9 and the administrator wants to stop
calls from outside the organization being routed through it.
This can be done in two ways: using the address-switch node or the taa:rule-switch node. Examples of each are
shown below.
Note:You can achieve the same result with Call Routing on Cisco Unified Communications Manager. This example is
here because you may want to prevent these types of calls from getting any deeper into the network.
248
Cisco Expressway Administrator Guide
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="urn:ietf:params:xml:ns:cpl cpl.xsd">
<taa:routed>
<address-switch field="destination">
<address regex="9(.*)">
<address-switch field="originating-zone">
<!-- Calls coming from the traversal zone are not allowed to use this gateway -->
<address is="TraversalZone">
<!-- Reject call with a status code of 403 (Forbidden) -->
<reject status="403" reason="Denied by policy"/>
</address>
</address-switch>
</address>
</address-switch>
</taa:routed>
</cpl>
249
Cisco ExpresswayAdministrator Guide
When you next log in to the Expressway over SSH you may receive a warning that the key identity of the
Expressway has changed. Please follow the appropriate process for your SSH client to suppress this warning.
If your Expressway is subsequently downgraded to an earlier version of Expressway firmware, the default SSH
keys will be restored.
Note: Restoring default configuration causes the system to use its current default values, which may be different from
the previously configured values, particularly if the system has been upgraded from an older version. In particular this
may affect port settings, such as multiplexed media ports. After restoring default configuration you may want to reset
those port settings to match the expected behavior of your firewall.
Prerequisite Files
The factory-reset procedure described below rebuilds the system based on the most recent successfully-installed
software image. The files that are used for this reinstallation are stored in the /mnt/harddisk/factory-reset/ folder on
the system. These files are:
250
Cisco Expressway Administrator Guide
251
Cisco ExpresswayAdministrator Guide
Password Encryption
All passwords configured on the Expressway are stored securely in either an encrypted or hashed form. This applies
to the following items, which all have usernames and passwords associated with them:
LDAP server 60
Note that:
local administrator account passwords are hashed using SHA512; other passwords are stored in an encrypted
format
when a password is encrypted and stored, it uses more characters than the original plain text version of the
password
252
Cisco Expressway Administrator Guide
String Represents value returned by... When used in a Pattern field When used in a
Replace field
%ip% xConfiguration Ethernet 1 IP V4 Matches all IPv4 and IPv6 not applicable
Address addresses.
xConfiguration Ethernet 1 IP V6
Address Applies to all peer addresses if
xConfiguration Ethernet 2 IP V4 the Expressway is part of a
Address cluster.
xConfiguration Ethernet 2 IP V6
Address
%ipv4_1% xConfiguration Ethernet 1 IP V4 Matches the IPv4 address Replaces the string
Address currently configured for LAN 1. with the LAN 1 IPv4
address.
Applies to all peer addresses if
the Expressway is part of a If the Expressway is
cluster. part of a cluster, the
address of the local
peer is always used.
%ipv4_2% xConfiguration Ethernet 2 IP V4 Matches the IPv4 address Replaces the string
Address currently configured for LAN 2. with the LAN 2 IPv4
address.
Applies to all peer addresses if
the Expressway is part of a If the Expressway is
cluster. part of a cluster, the
address of the local
peer is always used.
253
Cisco ExpresswayAdministrator Guide
String Represents value returned by... When used in a Pattern field When used in a
Replace field
%ipv6_1% xConfiguration Ethernet 1 IP V6 Matches the IPv6 address Replaces the string
Address currently configured for LAN 1. with the LAN 1 IPv6
address.
Applies to all peer addresses if
the Expressway is part of a If the Expressway is
cluster. part of a cluster, the
address of the local
peer is always used.
%ipv6_2% xConfiguration Ethernet 2 IP V6 Matches the IPv6 address Replaces the string
Address currently configured for LAN 2. with the LAN 2 IPv6
address.
Applies to all peer addresses if
the Expressway is part of a If the Expressway is
cluster. part of a cluster, the
address of the local
peer is always used.
%systemname% xConfiguration SystemUnit Name Matches the Expressways Replaces the string
System Name. with the
Expressways
System Name.
You can test whether a pattern matches a particular alias and is transformed in the expected way by using the Check
pattern tool (Maintenance > Tools > Check pattern).
Port Reference
The following tables list the IP ports and protocols used by Expressway for general services and functions. Also see:
254
Cisco Expressway Administrator Guide
NTP System time updates (and important for 123 UDP outbound not configurable
H.235 security).
Clustering IPsec secure communication between 500 UDP inbound not configurable
cluster peers. outbound
Clustering IPsec secure communication between IP protocol 51 (IPSec inbound not configurable
cluster peers. AH) outbound
DNS Sending requests to DNS servers. 1024 - 65535 UDP outbound System >DNS
Gatekeeper Multicast gatekeeper discovery. The 1718 UDP inbound not configurable
discovery Expressway does not listen on this port
when H.323 Gatekeeper Auto discover
mode is set to Off (this disables IGMP
messages).
H.323 Listens for inbound H.323 UDP 1719 UDP inbound Configuration >
registration registrations. If the Expressway is part of outbound Protocols > H.323
Clustering a cluster, this port is used for inbound
and outbound communication with
peers, even if H.323 is disabled.
H.323 call Listens for H.323 call signaling. 1720 TCP inbound Configuration >
signaling Protocols > H.323
Assent call Assent signaling on the Expressway-E. 2776 TCP inbound Configuration >
signaling Traversal > Ports
H.460.18 call H.460.18 signaling on the Expressway- 2777 TCP inbound Configuration >
signaling E. Traversal > Ports
Traversal Optionally used on the Expressway-E for 2776/2777 UDP inbound Configuration >
server media demultiplexing RTP/RTCP media on outbound Traversal > Ports
demultiplexing Small/Medium systems only.
RTP/RTCP
TURN services Listening port for TURN relay requests 3478 UDP/TCP * inbound Configuration >
on Expressway-E. Traversal > TURN
SIP UDP Listens for incoming SIP UDP calls. 5060 UDP inbound Configuration >
outbound Protocols > SIP
SIP TCP Listens for incoming SIP TCP calls. 5060 TCP inbound Configuration >
Protocols > SIP
255
Cisco ExpresswayAdministrator Guide
SIP TLS Listens for incoming SIP TLS calls. 5061 TCP inbound Configuration >
Protocols > SIP
SIPMTLS Listens for incoming SIPMutual TLS 5062 TCP inbound Configuration >
calls. Protocols > SIP
B2BUA Internal ports used by the B2BUA. Other 5071, 5073 TCP inbound not configurable
traffic sent to these ports is blocked
automatically by the Expressway's non-
configurable firewall rules.
Traversal Port on the Expressway-E used for 6001 UDP, inbound Configuration >
server zone H.323 firewall traversal from a particular increments by 1 for Zones
H.323 Port traversal client. each new zone
Traversal Port on the Expressway-E used for SIP 7001 TCP, inbound Configuration >
server zone firewall traversal from a particular increments by 1 for Zones
SIP Port traversal client. each new zone
H.225 and Range of ports used for call signaling 15000 - 19999 TCP inbound Configuration >
H.245 call after a call is established. outbound Protocols > H.323
signaling port
range
SIP TCP Range of ports used by outbound 25000 - 29999 TCP outbound Configuration >
outbound port TCP/TLS SIP connections to a remote Protocols > SIP
range SIP device.
256
Cisco Expressway Administrator Guide
Multiplexed Ports used for multiplexed media in 36000 36001 UDP inbound Configuration >
traversal traversal calls. RTP and RTCP media (Small / Medium outbound Traversal Subzone
media demultiplexing ports are allocated from systems)
(Assent, the start of the traversal media ports
H.460.19 range. or
multiplexed
media) The default media traversal port range is 36000 36011 UDP
36000 to 59999, and is set on the (Large systems)
Expressway-C at Configuration
>Traversal Subzone. In Large
Expressway systems the first 12 ports in
the range 36000 to 36011 by default
are always reserved for multiplexed
traffic. The Expressway-E listens on
these ports. You cannot configure a
distinct range of demultiplex listening
ports on Large systems: they always use
the first 6 pairs in the media port range.
On Small/Medium systems you can
explicitly specify which 2 ports listen for
multiplexed RTP/RTCP traffic, on the
Expressway-E (Configuration >
Traversal >Ports). If you choose not to
configure a particular pair of ports (Use
configured demultiplexing ports = No),
then the Expressway-E will listen on the
first pair of ports in the media traversal
port range (36000 and 36001 by
default).
257
Cisco ExpresswayAdministrator Guide
Non- Range of ports used for non-multiplexed 36002 59999 UDP inbound Configuration >
multiplexed media. Ports are allocated from this (Small / Medium outbound Traversal Subzone
media port range in pairs, with the first port number systems)
range of each pair being an even number.
or
The default media traversal port range is
36000 to 59999, and is set on the 36012 59999 UDP
Expressway-C at Configuration (Large systems)
>Traversal Subzone. In Large
Expressway systems the first 12 ports in
the range 36000 to 36011 by default
are always reserved for multiplexed
traffic. The Expressway-E listens on
these ports. You cannot configure a
distinct range of demultiplex listening
ports on Large systems: they always use
the first 6 pairs in the media port range.
On Small/Medium systems you can
explicitly specify which 2 ports listen for
multiplexed RTP/RTCP traffic, on the
Expressway-E (Configuration >
Traversal >Ports). If you choose not to
configure a particular pair of ports (Use
configured demultiplexing ports = No),
then the Expressway-E will listen on the
first pair of ports in the media traversal
port range (36000 and 36001 by
default).
TURN relay Range of ports available for TURN media 24000 29999 UDP inbound Configuration >
media port relay. outbound Traversal > TURN
range
Note that two services or functions cannot share the same port and protocol; an alarm will be raised if you attempt to
change an existing port or range and it conflicts with another service.
* On Large systems you can configure a range of TURN request listening ports. The default range is 3478 3483.
258
Cisco Expressway Administrator Guide
LDAP account LDAP queries for login account 389 / 636 TCP Users >LDAP
authentication authentication. configuration
Incident reporting Sending application failure details. 443 TCP Maintenance >
Diagnostics > Incident
reporting > Configuration
Remote logging Sending messages to the remote 514 UDP Maintenance >Logging
syslog server. 6514 TCP
Neighbors (H.323) H.323 connection to a neighbor zone. 1710 UDP Configuration >Zones
Neighbors (SIP) SIP connection to a neighbor zone. 5060 / 5061 TCP Configuration >Zones
Traversal zone (H.323) H.323 connection to a traversal server. 6001 UDP Configuration >Zones
Traversal zone (SIP) SIP connection to a traversal server. 7001 TCP Configuration >Zones
TURN media relay Range of ports available for TURN 24000 29999 Configuration > Traversal
media relay. UDP > TURN (on Expressway-E)
Traversal zone SIP media UDP 36000 to 59999* 36000 (RTP), 36001
(RTCP) (defaults)
(for small/medium systems on X8.1 or
later)
259
Cisco ExpresswayAdministrator Guide
36012 to 59999
36012 to 59999*
XMPP (IM and Presence) TCP Ephemeral port 7400 (IM and Presence)
HTTP (configuration file retrieval) TCP Ephemeral port 6970 (Unified CM)
Message Waiting Indicator (MWI) from TCP Ephemeral port 7080 (Unity Connection)
Unity Connection
* The default media traversal port range is 36000 to 59999, and is set on the Expressway-C at Configuration
>Traversal Subzone. In Large Expressway systems the first 12 ports in the range 36000 to 36011 by default are
always reserved for multiplexed traffic. The Expressway-E listens on these ports. You cannot configure a distinct
range of demultiplex listening ports on Large systems: they always use the first 6 pairs in the media port range. On
Small/Medium systems you can explicitly specify which 2 ports listen for multiplexed RTP/RTCP traffic, on the
Expressway-E (Configuration > Traversal >Ports). If you choose not to configure a particular pair of ports (Use
configured demultiplexing ports = No), then the Expressway-E will listen on the first pair of ports in the media
traversal port range (36000 and 36001 by default).
260
Cisco Expressway Administrator Guide
Note that:
Ports 8191/8192 TCP and 8883/8884 TCP are used internally within the Expressway-C and the Expressway-E
applications. Therefore these ports must not be allocated for any other purpose. The Expressway-E listens
externally on port 8883; therefore we recommend that you create custom firewall rules on the external LAN
interface to drop TCP traffic on that port.
The Expressway-E listens on port 2222 for SSH tunnel traffic. The only legitimate sender of such traffic is the
Expressway-C (cluster). Therefore we recommend that you create the following firewall rules for the SSH
tunnels service:
one or more rules to allow all of the Expressway-C peer addresses (via the internal LAN interface, if
appropriate)
followed by a lower priority (higher number) rule that drops all traffic for the SSH tunnels service (on the
internal LAN interface if appropriate, and if so, another rule to drop all traffic on the external interface)
(The Lync B2BUA application should run Each call can use
on a separate "Gateway" Expressway up to 18 ports if
and so this range should not conflict with you Enable RDP
the standard traversal media port range) Transcoding for
this B2BUA.
Note:The Expressway does not forward
DSCPinformation that it receives in Increase this range
media streams. if you see "Media
port pool
exhausted"
warnings.
Desktop shares from Lync clients to TCP 56000 to 57000 Lync client RDPports
B2BUA
Transcoded desktop shares from B2BUA UDP 56000 to 57000 Recipient of media is dependent
to internal recipients on deployment and called alias;
eg. endpoint, TelePresence
Server, Expressway-C
261
Cisco ExpresswayAdministrator Guide
Ensure that the firewall is opened to allow the data traffic through from B2BUA to Expressway-E.
* On Large systems you can configure a range of TURN request listening ports. The default range is 3478 3483.
262
Cisco Expressway Administrator Guide
Regular expressions
Regular expressions can be used in conjunction with a number of Expressway features such as alias transformations,
zone transformations, CPL policy and ENUM. The Expressway uses POSIX format regular expression syntax. The table
below provides a list of commonly used special characters in regular expression syntax. This is only a subset of the
full range of expressions available. For a detailed description of regular expression syntax see the publication Regular
Expression Pocket Reference.
? Matches 0 or 1 repetitions of the previous 9?123 matches against 9123 and 123
character or expression.
[...] Matches a set of specified characters. Each [a-z] matches any alphabetical character
character in the set can be specified
individually, or a range can be specified by [0-9#*] matches against any single E.164 character -
giving the first character in the range the E.164 character set is made up of the digits 0-9 plus
followed by the - character and then the last the hash key (#) and the asterisk key (*)
character in the range.
[^...] Matches anything except the set of [^a-z] matches any non-alphabetical character
specified characters. Each character in the
set can be specified individually, or a range [^0-9#*] matches anything other than the digits 0-9, the
can be specified by giving the first character hash key (#) and the asterisk key (*)
in the range followed by the - character and
then the last character in the range.
(...) Groups a set of matching characters A regular expression can be constructed to transform a
together. Groups can then be referenced in URI containing a users full name to a URI based on their
order using the characters \1, \2, etc. as initials. The regular expression (.).*_(.).*
part of a replace string. (@example.com) would match against the user john_
[email protected] and with a replace string of \1\2\3
would transform it to [email protected]
| Matches against one expression or an .*@example.(net|com) matches against any URI for the
alternate expression. domain example.com or the domain example.net
263
Cisco ExpresswayAdministrator Guide
^ Signifies the start of a line. [^abc] matches any single character that is NOT one of
a, b or c
When used immediately after an opening
brace, negates the character set inside the
brace.
$ Signifies the end of a line. ^\d\d\d$ matches any string that is exactly 3 digits long
(?!...) Negative lookahead. Defines a (?!.*@example.com$).* matches any string that does not
subexpression that must not be present. end with @example.com
(?<!...) Negative lookbehind. Defines a .*(?<!net) matches any string that does not end with
subexpression that must not be present. net
264
Cisco Expressway Administrator Guide
Supported Characters
The Expressway supports the following characters when entering text in the CLI and web interface:
tabs
angle brackets ( < and > )
ampersand ( & )
caret ( ^ )
Note that some specific text fields (including Administrator groups) have different restrictions and these are noted in
the relevant sections of this guide.
Case sensitivity
Text items entered through the CLI and web interface are case insensitive. The only exceptions are passwords and
local administrator account names which are case sensitive.
265
Cisco ExpresswayAdministrator Guide
Call Types
The Expressway distinguishes between the following 2 types of call:
Unified CM remote sessions: these are "mobile and remote access" calls i.e.video or audio calls from
devices located outside the enterprise that are routed via the Expressway firewall traversal solution to
endpoints registered to Unified CM. These calls do not require rich media session licenses, although they do
contribute to overall load.
Rich media sessions: these calls consume rich media session licenses and consist of every other type of
video or audio call that is routed through the Expressway. This includes business-to-business calls, B2BUA
calls, and interworked or gatewayed calls to third-party solutions. The Expressway may take the media
(traversal) or just the signaling (non-traversal).
Audio-only SIP traversal calls are treated distinctly from video SIP traversal calls.Each rich media session
license allows either 1 video call or 2 audio-only SIP traversal calls. Hence, a 100 rich media session license
would allow, for example, 90 video and 20 SIP audio-only simultaneous calls. Any other audio-only call (non-
traversal, H.323 or interworked) will consume a rich media session license.
Note that:
Expressway defines an "audio-only" SIP call as one that was negotiated with a single m= line in the SDP.
Thus, for example, if a person makes a telephone call but the SIP UA includes an additional m= line in the
SDP, the call will consume a video call license.
While an "audio-only" SIP call is being established, it is treated (licensed) as a video call. It only becomes
licensed as "audio-only" when the call setup has completed. This means that if your system approaches its
maximum licensed limit, you may be unable to connect some "audio-only" calls if they are made
simultaneously.
The Expressway does not support midcall license optimization.
266
Cisco Expressway Administrator Guide
Unified CM remote sessions (these do not require a rich media session license)
all other firewall traversal calls that are not Unified CM remote sessions, where the local Expressway is either
the traversal client or traversal server
calls that are gatewayed (interworked) between H.323 and SIP on the local Expressway
calls that are gatewayed (interworked) between IPv4 and IPv6 on the local Expressway
for an Expressway-E with Advanced Networking enabled, calls that are inbound from one LAN port and
outbound on the other
a SIP to SIP call when one of the participants is behind a NAT (unless both endpoints are using ICE for NAT
traversal)
calls that invoke the B2BUA to apply a media encryption policy or for ICE messaging support
267
Cisco ExpresswayAdministrator Guide
Alarms
Alarms occur when an event or configuration change has taken place on the Expressway that requires some manual
administrator intervention, such as a restart. Alarms may also be raised for hardware and environmental issues such
as faulty disks and fans or high temperatures.
The Alarms page (Status > Alarms) provides a list of all the alarms currently in place on your system (and, where
applicable, their proposed resolution). When there are unacknowledged alarms in place on the Expressway, an alarm
icon appears at the top right of all pages. You can also access the Alarms page by clicking on the alarm icon.
Each alarm is identified by a 5-digit Alarm ID, shown in the rightmost column in the alarms list. The alarms are
grouped into categories as follows:
35nnn External applications and services (such as policy services or LDAP/AD configuration)
All alarms raised on the Expressway are also raised as Cisco TMS tickets. All the attributes of an alarm (its ID, severity
and so on) are included in the information sent to Cisco TMS.
List of alarms
The following table lists the alarms that can be raised on the Expressway.
10002 RAID degraded <problem description> Follow your Cisco RMA process Critical
to obtain replacement parts, and
then see 'Cisco UCS C220
Server Installation and Service
Guide' for information about how
to replace server components.
10003 PSU redundancy <problem description> Follow your Cisco RMA process Critical
lost to obtain replacement parts, and
then see 'Cisco UCS C220
Server Installation and Service
Guide' for information about how
to replace server components.
268
Cisco Expressway Administrator Guide
10004 RAID rebuilding <problem description> Wait for the rebuild to complete. Critical
On successful completion, all
RAID-related alarms will be
automatically lowered.
15004 Application An unexpected software error was View the incident reporting page Error
failed detected in <module>
15005 Database failure Please remove database and restore from Reboot the system Warning
backup, then reboot the system
15008 Failed to load The database failed to load; some Restore system data from Warning
database configuration data has been lost backup
15010 Application An unexpected software error was View the incident reporting page Error
failed detected in <module>
15011 Application An unexpected software error was View the incident reporting page Error
failed detected in <module>
15012 Language pack Some text labels may not be translated Contact your Cisco Warning
mismatch representative to see if an up-
to-date language pack is
available
15014 Restart required Core dump mode has been changed, Restart the system Warning
however a restart is required for this to
take effect
15016 Directory service The directory service database is not Restart the system Warning
database failure running
15017 Application The OpenDS service has stopped If the problem persists, contact Warning
failed unexpectedly and has been restarted your Cisco representative
15018 Boot selection Booted system does not match expected Reboot the system Critical
mismatch configuration; this may be caused by user
input or spurious characters on the serial
console during the boot
15019 Application An unexpected software error was Restart the system; if the Critical
failed detected in <details> problem persists, contact your
Cisco support representative
20003 Invalid cluster The cluster configuration is invalid Check the Clustering page and Warning
configuration ensure that this system's IP
address is included and there
are no duplicate IP addresses
269
Cisco ExpresswayAdministrator Guide
20004 Cluster The system is unable to communicate Check the clustering Warning
communication with one or more of the cluster peers configuration
failure
20005 Invalid peer One or more peer addresses are invalid Check the Clustering page and Warning
address ensure that all Peer fields use a
valid IP address
20006 Cluster The database is unable to replicate with Check the clustering Warning
database one or more of the cluster peers configuration and restart
communication
failure
20007 Restart required Cluster configuration has been changed, Restart the system Warning
however a restart is required for this to
take effect
20008 Cluster Automatic replication of configuration has Please wait until the upgrade Warning
replication error been temporarily disabled because an has completed
upgrade is in progress
20009 Cluster There was an error during automatic View cluster replication Warning
replication error replication of configuration instructions
20010 Cluster The NTP server is not configured Configure an NTP server Warning
replication error
20011 Cluster This peer's configuration conflicts with View cluster replication Warning
replication error the master's configuration, manual instructions
synchronization of configuration is
required
20012 Cluster This peer's cluster configuration settings Configure this peer's cluster Warning
replication error do not match the configuration master settings
peer's settings
20014 Cluster Cannot find master or this peer's View cluster replication Warning
replication error configuration file, manual synchronization instructions
of configuration is required
20015 Cluster The local Expressway does not appear in Check the list of peers for this Warning
replication error the list of peers cluster
20016 Cluster The master peer is unreachable Check the list of peers for this Warning
replication error cluster
20018 Invalid clustering H.323 mode must be turned On - Configure H.323 mode Warning
configuration clustering uses H.323 communications
between peers
20019 Cluster name If clustering is in use a cluster name must Configure the cluster name Warning
not configured be defined.
25001 Restart required Network configuration has been changed, Restart the system Warning
however a restart is required for this to
take effect
270
Cisco Expressway Administrator Guide
25002 Date and time The system is unable to obtain the correct Check the time configuration Warning
not validated time and date from an NTP server
25003 IP configuration IP protocol is set to both IPv4 and IPv6, Configure IP settings Warning
mismatch but the system does not have any IPv4
addresses defined
25004 IP configuration IP protocol is set to both IPv4 and IPv6, Configure IP settings Warning
mismatch but the system does not have an IPv4
gateway defined
25006 Restart required Advanced Networking option key has Configure your required LAN and Warning
been changed, however a restart is static NAT settings on the IP
required for this to take effect page and then restart the
system.
25007 Restart required QoS settings have been changed, Restart the system Warning
however a restart is required for this to
take effect
25008 Restart required Port configuration has been changed, Restart the system Warning
however a restart is required for this to
take effect
25009 Restart required Ethernet configuration has been changed, Restart the system Warning
however a restart is required for this to
take effect
25010 Restart required IP configuration has been changed, Restart the system Warning
however a restart is required for this to
take effect
25011 Restart required HTTPS service has been changed, Restart the system Warning
however a restart is required for this to
take effect
25013 IP configuration IP protocol is set to both IPv4 and IPv6, Configure IP settings Warning
mismatch but the system does not have an IPv6
gateway defined
25014 Configuration IP protocol is set to both IPv4 and IPv6, Configure IP settings Warning
warning but the Expressway does not have any
IPv6 addresses defined
25015 Restart required SSH service has been changed, however Restart the system Warning
a restart is required for this to take effect
25016 Ethernet speed An Ethernet interface speed setting has Configure Ethernet parameters Warning
not been negotiated to a value other than
recommended 1000Mb/s full duplex or 100Mb/s full
duplex; this may result in packet loss over
your network
25017 Restart required HTTP service has been changed, however Restart the system Warning
a restart is required for this to take effect
25018 Port conflict There is a port conflict between Review the port configuration on Warning
<function><port> and <function><port> the Local inbound ports and
Local outbound ports pages
271
Cisco ExpresswayAdministrator Guide
25019 Verbose log One or more modules of the Network Log Network Log and Support Log Warning
levels or Support Log are set to a level of Debug modules should be set to a level
configured or Trace of Info, unless advised otherwise
by your Cisco support
representative. If diagnostic
logging is in progress they will be
reset automatically when
diagnostic logging is stopped
25020 NTP client The system is unable to run the NTP client Check NTP status information, Warning
failure including any key configuration
and expiry dates
25021 NTP server not The system is unable to contact an NTP Check Time configuration and Warning
available server status; check DNS configuration
25022 Time not The system time of this server is different Ensure that your systems have Warning
synchronized from that on a server on the other side of a consistent Time configuration;
over traversal SIP traversal zone note that any changes may take
zone some time to become effective
30001 Capacity The number of concurrent traversal calls Contact your Cisco Warning
warning has approached the licensed limit representative
30002 Capacity The number of concurrent traversal calls Contact your Cisco Warning
warning has approached the unit's physical limit representative
30003 Capacity The number of concurrent non-traversal Contact your Cisco Warning
warning calls has approached the unit's physical representative
limit
30005 Capacity TURN relays usage has approached the Contact your Cisco Warning
warning unit's physical limit representative
30006 Restart required The release key has been changed, Restart the system Warning
however a restart is required for this to
take effect
30007 Capacity TURN relays usage has approached the Contact your Cisco Warning
warning licensed limit representative
30008 Invalid release The release key is not valid; if you do not Add/Remove option keys Warning
key have a valid key, contact your Cisco
support representative
30009 TURN relays TURN services are only available on Add/Remove option keys Warning
installed Expressway-E; TURN option key ignored
30011 TURN relay TURN services are enabled but no TURN Add option key or disable TURN Warning
licenses relay license option keys are installed services
required
30012 License usage Cluster peer <n> has been unavailable for Resolve the issue with this peer, Warning
of lost cluster more than <n> hours. Its licenses will be or remove it from the cluster
peer removed from the total available for use configuration
across the cluster on <date>.
272
Cisco Expressway Administrator Guide
30013 License usage Several cluster peers have been Resolve the issue with this peer, Warning
of lost cluster unavailable for more than <n> hours. Their or remove it from the cluster
peer licenses will be removed from the total configuration
available for use across the cluster as
follows: <details>.
30014 License usage Cluster peer <n> has been unavailable for Resolve the issue with this peer, Warning
of lost cluster more than <n> days. Its licenses will be or remove it from the cluster
peer removed from the total available for use configuration
across the cluster on <date>.
30015 License usage Several cluster peers have been Resolve the issue with this peer, Warning
of lost cluster unavailable for more than <n> days. Their or remove it from the cluster
peer licenses will be removed from the total configuration
available for use across the cluster as
follows: <details>.
30016 Licenses of lost Cluster peer <n> has been unavailable for Resolve the issue with this peer, Warning
cluster peer more than <n> days. Its licenses have or remove it from the cluster
have been taken been removed from the total available for configuration
off the license use across the cluster on <date>.
pool
30017 Licenses of lost Several cluster peers have been Resolve the issue with this peer, Warning
cluster peer unavailable for more than <n> days. Their or remove it from the cluster
have been taken licenses have been removed from the configuration
off the license total available for use across the cluster
pool as follows: <details>.
30018 Provisioning The number of concurrently provisioned Provisioning limits are set by Warning
licenses limit devices has reached the licensed limit Cisco TMS; contact your Cisco
reached representative if you require
more licenses
30020 Call license limit You have reached your license limit of If the problem persists, contact Warning
reached <n> concurrent traversal call licenses your Cisco representative to buy
more call licenses
30021 TURN relay You have reached your license limit of If the problem persists, contact Warning
license limit <n> concurrent TURN relay licenses your Cisco representative to buy
reached more TURN relay licenses
30022 Call capacity The number of concurrent non-traversal Add more capacity to your Warning
limit reached calls has reached the unit's physical limit system; contact your Cisco
representative
30023 Call capacity The number of concurrent traversal calls Add more capacity to your Warning
limit reached has reached the unit's physical limit system; contact your Cisco
representative
30024 TURN relay The number of concurrent TURN relay Add more capacity to your Warning
capacity limit calls has reached the unit's physical limit system; contact your Cisco
reached representative
30025 Restart required An option key has been changed, Restart the system Warning
however a restart is required for this to
take effect
273
Cisco ExpresswayAdministrator Guide
35001 Configuration Active Directory mode has been enabled Configure DNS hostname Warning
warning but the DNS hostname has not been
configured
35002 Configuration Active Directory mode has been enabled Configure NTP server Warning
warning but the NTP server has not been
configured
35003 Configuration Active Directory mode has been enabled Configure a DNS server Warning
warning but no DNS servers have been configured
35004 LDAP Remote login authentication is in use for Configure LDAP parameters Warning
configuration administrator accounts but a valid LDAP
required Server address, Port, Bind_DN and Base_
DN have not been configured
35005 Configuration Active Directory mode has been enabled Configure domain on Active Warning
warning but a domain has not been configured Directory Service page
35007 Configuration Active Directory SPNEGO disabled; you Enable SPNEGO Warning
warning are recommended to enable the SPNEGO
setting
35008 Configuration Active Directory mode has been enabled Configure workgroup on Active Warning
warning but a workgroup has not been configured Directory Service page
35010 TMS An import from the TMS Provisioning See the Expressway Event Log Warning
Provisioning Extension services has been canceled as for details, then check the
Extension it would cause the Expressway to exceed corresponding data within TMS;
services data internal table limits you must perform a full
import failure synchronization after the data
has been corrected in TMS
35011 TMS One or more records imported from the See the Expressway Event Log Warning
Provisioning TMS Provisioning Extension services have for details, then check the
Extension been dropped due to unrecognized data corresponding data within TMS;
services data format you must perform a full
import failure synchronization after the data
has been corrected in TMS
35012 Failed to Failed to connect to the LDAP server for Ensure that your H.350 directory Warning
connect to LDAP H.350 device authentication service is correctly configured
server
35013 Unified This system cannot communicate with Review the Event Log and check Warning
Communications one or more remote hosts: <Host 1, Host that the traversal zone between
SSH tunnel 2, ...> the Expressway-C and the
failure Expressway-E is active
Note that the list of hosts is truncated to
200 characters.
274
Cisco Expressway Administrator Guide
35014 Unified This system cannot communicate with Ensure that your firewall allows Warning
Communications one or more remote hosts traffic from the Expressway-C
SSHtunnel ephemeral ports to 2222 TCP on
notification the Expressway-E
failure
35015 Unified CM port There is a port conflict on Unified CM The same port on Unified CM Warning
conflict <name> between neighbor zone <name> cannot be used for line side
and Unified Communications (both are (Unified Communications) and
using port <number>) SIP trunk traffic. Review the port
configuration on Unified CM and
reconfigure the <zone> if
necessary
35016 SAML metadata Configuration changes have modified the Export the SAML metadata so Warning
has been local SAML metadata, which is now you can import it on the Identity
modified different to any copies on Identity Provider Provider
(s). This metadata may have been
modified by changing the server
certificate or the SSO-enabled domains,
or by changing the number of traversal
server peers or their addresses
40001 Security alert No CRL distribution points have been Check CRL configuration Warning
defined for automatic updates
40002 Security alert Automatic updating of CRL files has failed If the problem persists, contact Warning
your Cisco representative
40003 Insecure The root user has the default password View instructions on changing Warning
password in use set the root password
40004 Certificate- Your system is recommended to have Configure client certificate- Warning
based client certificate-based security set to based security
authentication Certificate-based authentication when in
required advanced account security mode
40005 Insecure The admin user has the default password Change the admin password Error
password in use set
40006 Security alert Unable to download CRL update Check CRL distribution points Warning
and the Event Log
40007 Security alert Failed to find configuration file for CRL If the problem persists, contact Warning
automatic updates your Cisco representative
40008 Security alert The SSH service is using the default key View instructions on replacing Warning
the default SSH key
40009 Restart required HTTPS client certificates validation mode Restart the system Warning
has changed, however a restart is
required for this to take effect
40011 Per-account A non-zero per-account session limit is Configure per-account session Warning
session limit required when in advanced account limit
required security mode
275
Cisco ExpresswayAdministrator Guide
40013 HTTPS client You are recommended to enable client Configure HTTPS client Warning
certificate side certificate validation for HTTPS certificate validation
validation connections when in advanced account
disabled security mode
40014 Time out period A non-zero system session time out Configure session time out Warning
required period is required when in advanced period
account security mode
40015 System session A non-zero system session limit is Configure system session limit Warning
limit required required when in advanced account
security mode
40016 Encryption Your login account LDAP server Configure login account LDAP Warning
required configuration is recommended to have server
encryption set to TLS when in advanced
account security mode
40017 Incident You are recommended to disable incident Configure incident reporting Warning
reporting reporting when in advanced account
enabled security mode
40020 Security alert The connection to the Active Directory Configure Active Directory Warning
Service is not using TLS encryption Service connection settings
40021 Remote logging You are recommended to disable the Configure remote logging Warning
enabled remote syslog server when in advanced
account security mode
40022 Security alert Active Directory secure channel disabled; Enable secure channel Warning
you are recommended to enable the
secure channel setting
40024 CRL checking Your login account LDAP server Configure login account LDAP Warning
required configuration is recommended to have server
certificate revocation list (CRL) checking
set to All when in advanced account
security mode
40025 SNMP enabled You are recommended to disable SNMP Configure SNMP mode Warning
when in advanced account security mode
40026 Reboot required The advanced account security mode has Reboot the Expressway Warning
changed, however a reboot is required for
this to take effect
40027 Security alert The connection to the TMS Provisioning Configure TMS Provisioning Warning
Extension services is not using TLS Extension services connection
encryption settings
40028 Insecure The root user's password is hashed using View instructions on changing Warning
password in use MD5, which is not secure enough the root password
40029 LDAP server CA A valid CA certificate for the LDAP Upload a valid CA certificate Warning
certificate is database has not been uploaded; this is
missing required for connections via TLS
276
Cisco Expressway Administrator Guide
40030 Security alert Firewall rules activation failed; the Check your firewall rules Warning
firewall configuration contains at least configuration, fix any rejected
one rejected rule rules and re-try the activation
40031 Security alert Unable to restore previous firewall Check your firewall rules Warning
configuration configuration, fix any rejected
rules, activate and accept the
rules; if the problem persists,
contact your Cisco
representative
40032 Security alert Unable to initialize firewall Restart the system; if the Warning
problem persists, contact your
Cisco representative
40033 Configuration The Default Zone access rules are Either disable UDP and TCP on Warning
warning enabled, but leaving SIP over UDP or SIP the SIP page to enforce
over TCP enabled offers a way to certificate identity checking
circumvent this security feature using TLS, or disable the access
rules for the Default Zone.
40034 Security alert Firewall rules activation failed; the Check your firewall rules Warning
firewall configuration contains rules with configuration, ensure all rules
duplicated priorities have a unique priority and re-try
the activation
40040 Unified TLS verify mode is not enabled on a Ensure that TLS verify mode is Warning
Communications traversal zone configured for Unified enabled on the traversal zone;
configuration Communications services you may also need to check the
error remote traversal system
40041 Security alert Automated intrusion protection rules are Disable and then re-enable the Warning
not available failed services
40043 Unified Media encryption is not enforced on a Ensure that media encryption is Warning
Communications traversal zone configured for Unified set to 'Force encrypted' on the
configuration Communications services traversal zone
error
40048 Unified Unified Communications services are Ensure that SIP TLS mode is set Warning
Communications enabled but SIP TLS is disabled to 'On' on SIP configuration page
configuration
error
40100 Security alert Firewall rules are not synchronized with Restart the system; if the Warning
network interfaces problem persists, contact your
Cisco representative
45002 Configuration Expected default link between the Default Configure default links Warning
warning Subzone and the Default Zone is missing
45003 Configuration H.323 and SIP modes are set to Off; one Configure H.323 and/or SIP Warning
warning or both of them should be enabled modes
45006 Configuration Expected default link between the Default Configure default links Warning
warning Subzone and the Cluster Subzone is
missing
277
Cisco ExpresswayAdministrator Guide
45007 Configuration Expected default link between the Default Configure default links Warning
warning Subzone and the Traversal Subzone is
missing
45008 Configuration Expected default link between the Configure default links Warning
warning Traversal Subzone and the Default Zone
is missing
45014 Configuration H.323 is enabled in a zone with a SIP On the relevant zone, either Warning
warning media encryption mode of "Force disable H.323 or select a
encrypted" or "Force unencrypted" different SIP media encryption
mode
45016 Configuration A zone has a SIP media encryption mode On the relevant zone, either set Warning
warning of "Best effort" or "Force encrypted" but the SIP transport to TLS or select
the transport is not TLS. TLS is required a different SIP media encryption
for encryption. mode
45018 Configuration DNS zones (including <zone_name>) Check that the SIP default Warning
warning have their SIP default transport protocol transport protocol for the DNS
set to <protocol>, but that protocol is zone and the system-wide SIP
disabled system-wide. transport settings are consistent
45019 Insufficient There is an insufficient number of media Increase the media port range Warning
media ports ports to support the number of licensed
calls
55001 B2BUA service Some B2BUA service specific Restart the B2BUA service Warning
restart required configuration has changed, however a
restart is required for this to take effect
55002 B2BUA The port on B2BUA for Expressway Check B2BUA configuration Warning
misconfiguration communications is misconfigured (advanced settings)
55003 B2BUA Invalid trusted host IP address of Lync Check configured addresses of Warning
misconfiguration device trusted hosts
55004 B2BUA The port on B2BUA for Lync Check B2BUA configuration Warning
misconfiguration communications is misconfigured (advanced settings)
55005 B2BUA The Lync signaling destination address is Check B2BUA configuration Warning
misconfiguration misconfigured
55005 B2BUA The Lync signaling destination address is Check B2BUA configuration Warning
misconfiguration misconfigured
55006 B2BUA The Lync signaling destination port is Check B2BUA configuration Warning
misconfiguration misconfigured
55007 B2BUA The Lync transport type is misconfigured Check B2BUA configuration Warning
misconfiguration
55008 B2BUA Missing or invalid FQDN of service Check the Expressway's system Warning
misconfiguration host name and domain name
55009 B2BUA Invalid IP address of service Check the Expressway's LAN 1 Warning
misconfiguration IPv4 address
55010 B2BUA The B2BUA media port range end value is Check B2BUA configuration Warning
misconfiguration misconfigured (advanced settings)
278
Cisco Expressway Administrator Guide
55011 B2BUA The B2BUA media port range start value is Check B2BUA configuration Warning
misconfiguration misconfigured (advanced settings)
55012 B2BUA Invalid Microsoft Lync B2BUA mode Check B2BUA configuration Warning
misconfiguration
55015 B2BUA Invalid trusted host IP address of Check configured addresses of Warning
misconfiguration transcoder trusted hosts
55016 B2BUA The setting to enable transcoders for this Check B2BUA configuration Warning
misconfiguration B2BUA is misconfigured (transcoder settings)
55017 B2BUA The port on B2BUA for transcoder Check B2BUA configuration Warning
misconfiguration communications is misconfigured (transcoder settings)
55018 B2BUA Transcoder address and/or port details Check B2BUA configuration Warning
misconfiguration are misconfigured (transcoder settings) and the
configured addresses of trusted
hosts
55019 B2BUA Invalid TURN server address Check B2BUA configuration Warning
misconfiguration (TURN settings)
55021 B2BUA The setting to offer TURN services for this Check B2BUA configuration Warning
misconfiguration B2BUA is misconfigured (TURN settings)
55023 B2BUA The transcoder policy rules are Check transcoder policy rules Warning
misconfiguration misconfigured configuration
55024 B2BUA The setting to use transcoder policy rules Check B2BUA configuration Warning
misconfiguration is misconfigured (transcoder settings)
55025 B2BUA The B2BUA has been enabled to use Configure one or more Warning
misconfiguration transcoders, but there are no transcoders transcoders
configured
55026 B2BUA TURN services are enabled, but there are Configure the TURN server Warning
misconfiguration no valid TURN servers configured address
55028 B2BUA The start and end media port ranges are Check the B2BUA media port Warning
misconfiguration misconfigured range settings
55029 B2BUA The media port ranges used by the B2BUA Check the port configuration for Warning
misconfiguration overlap with the media port ranges used both services
by <module>
55030 B2BUA The port used by the B2BUA for Check the port configuration for Warning
misconfiguration Expressway communications is also used both services
by <module>
55031 B2BUA The port used by the B2BUA for Lync Check the port configuration for Warning
misconfiguration communications is also used by <module> both services
55032 B2BUA The port used by the B2BUA for Check the port configuration for Warning
misconfiguration transcoder communications is also used both services
by <module>
279
Cisco ExpresswayAdministrator Guide
55033 B2BUA No valid Lync trusted host devices have Configure at least one Lync Warning
misconfiguration been configured trusted host device
55034 B2BUA No valid transcoder trusted hosts have Configure at least one Warning
misconfiguration been configured transcoder trusted host
55035 B2BUA The B2BUA cannot connect to the Restart the B2BUA service Warning
connectivity transcoders
problem
55036 B2BUA The B2BUA cannot connect to the Restart the B2BUA service Warning
connectivity Expressway
problem
55037 B2BUA The B2BUA cannot connect to Lync Check the Lync B2BUA status Warning
connectivity page for more information about
problem the problem; you will then need
to restart the B2BUA service
after making any configuration
changes
55101 B2BUA Invalid Expressway authorized host IP Restart the service; contact your Warning
misconfiguration address Cisco representative if the
problem persists
55102 B2BUA Invalid URI format of Expressway contact Restart the service; contact your Warning
misconfiguration address Cisco representative if the
problem persists
55103 B2BUA Invalid Expressway encryption mode Restart the service; contact your Warning
misconfiguration Cisco representative if the
problem persists
55104 B2BUA Invalid Expressway ICE mode Restart the service; contact your Warning
misconfiguration Cisco representative if the
problem persists
55105 B2BUA Invalid Expressway next hop host Restart the service; contact your Warning
misconfiguration configuration Cisco representative if the
problem persists
55106 B2BUA Invalid Expressway next hop liveness Restart the service; contact your Warning
misconfiguration mode Cisco representative if the
problem persists
55107 B2BUA Invalid Expressway next hop mode Restart the service; contact your Warning
misconfiguration Cisco representative if the
problem persists
55108 B2BUA Invalid Expressway next hop port Restart the service; contact your Warning
misconfiguration Cisco representative if the
problem persists
55109 B2BUA Invalid Expressway transport type Restart the service; contact your Warning
misconfiguration Cisco representative if the
problem persists
55110 B2BUA Invalid URI format of B side contact Restart the service; contact your Warning
misconfiguration address Cisco representative if the
problem persists
280
Cisco Expressway Administrator Guide
55111 B2BUA Invalid B side encryption mode Restart the service; contact your Warning
misconfiguration Cisco representative if the
problem persists
55112 B2BUA Invalid B side ICE mode Restart the service; contact your Warning
misconfiguration Cisco representative if the
problem persists
55113 B2BUA Invalid B side next hop liveness mode Restart the service; contact your Warning
misconfiguration Cisco representative if the
problem persists
55114 B2BUA Invalid B side next hop mode Restart the service; contact your Warning
misconfiguration Cisco representative if the
problem persists
55115 B2BUA Invalid command listening port Restart the service; contact your Warning
misconfiguration Cisco representative if the
problem persists
55116 B2BUA Invalid debug status path Restart the service; contact your Warning
misconfiguration Cisco representative if the
problem persists
55117 B2BUA Invalid service Restart the service; contact your Warning
misconfiguration Cisco representative if the
problem persists
55118 B2BUA Invalid software string Restart the service; contact your Warning
misconfiguration Cisco representative if the
problem persists
55119 B2BUA Invalid URI format of transcoding service Restart the service; contact your Warning
misconfiguration contact address Cisco representative if the
problem persists
55120 B2BUA Invalid transcoding service encryption Restart the service; contact your Warning
misconfiguration mode Cisco representative if the
problem persists
55121 B2BUA Invalid transcoding service ICE mode Restart the service; contact your Warning
misconfiguration Cisco representative if the
problem persists
55122 B2BUA Invalid transcoding service next hop Restart the service; contact your Warning
misconfiguration liveness mode Cisco representative if the
problem persists
55123 B2BUA The transcoding service transport type is Restart the service; contact your Warning
misconfiguration misconfigured Cisco representative if the
problem persists
55124 B2BUA The mandatory TURN server setting is Restart the service; contact your Warning
misconfiguration misconfigured Cisco representative if the
problem persists
55125 B2BUA Invalid Expressway next hop host Restart the service; contact your Warning
misconfiguration configuration Cisco representative if the
problem persists
281
Cisco ExpresswayAdministrator Guide
55126 B2BUA Invalid Expressway authorized host IP Restart the service; contact your Warning
misconfiguration address Cisco representative if the
problem persists
55127 B2BUA Cannot start B2BUA application because Configure the System host Warning
misconfiguration FQDN configuration is missing name and Domain name on the
DNS page, and then restart the
B2BUA service
55128 B2BUA Cannot start B2BUA application because Configure the LAN 1 IPv4 Warning
misconfiguration IPv4 interface address configuration is address on the IP page, and then
missing restart the B2BUA service
55129 B2BUA Cannot start B2BUA application because Configure the cluster name on Warning
misconfiguration cluster name configuration is missing the Clustering page
55130 B2BUA Invalid cluster name Check the cluster name and Warning
misconfiguration then restart the B2BUA service
55131 B2BUA Invalid session refresh interval Check B2BUA configuration Warning
misconfiguration (advanced settings), then restart
the B2BUA service
55132 B2BUA Invalid call resource limit Restart the service; contact your Warning
misconfiguration Cisco representative if the
problem persists
55133 B2BUA The B2BUA session refresh interval is Check both settings on the Warning
misconfiguration smaller than the minimum session refresh B2BUA configuration (advanced
interval settings) and then restart the
B2BUA service
55134 B2BUA Invalid minimum session refresh interval Check B2BUA configuration Warning
misconfiguration (advanced settings), then restart
the B2BUA service
55135 B2BUA A large number of Lync trusted host Review your network topology Warning
configuration devices have been configured; this may and try lowering the number of
warning impact performance, or in extreme cases trusted host devices on the
it may prevent calls from accessing B2BUA trusted hosts page.
enough network resources to connect
282
Cisco Expressway Administrator Guide
xConfiguration ? to return a list of all elements available under the xConfiguration command
xConfiguration ?? to return a list of all elements available under the xConfiguration command, along with the
valuespace, description and default values for each element
xConfiguration <element> ? to return all available sub-elements and their valuespace, description and default
values
xConfiguration <element> <sub-element> ? to return all available sub-elements and their valuespace,
description and default values
To set a configuration item, type the command as shown. The valid values for each command are indicated in the
angle brackets following each command, using the following notation:
Format Meaning
<0..63> Indicates an integer value is required. The numbers indicate the minimum and maximum
value. In this example the value must be in the range 0 to 63.
<S: 7,15> An S indicates a string value, to be enclosed in quotation marks, is required. The numbers
indicate the minimum and maximum number of characters for the string. In this example the
string must be between 7 and 15 characters long.
<Off/Direct/Indirect> Lists the set of valid values. Do not enclose the value in quotation marks.
[1..50] Square brackets indicate that you can configure more than one of this particular item. Each
item is assigned an index within the range shown.
For example IP Route [1..50] Address <S: 0,39> means that up to 50 IP routes can be
specified with each route requiring an address of up to 39 characters in length.
xConfiguration commands
All of the available xConfiguration commands are listed in the table below:
Determines whether HTTP calls will be redirected to the HTTPS port. You must restart the system for any changes to take effect.
Default: On.
283
Cisco ExpresswayAdministrator Guide
Determines whether the Expressway can be accessed via the web interface. This must be On to enable both web interface and
TMS access. You must restart the system for any changes to take effect. Default: On.
Controls whether the LCD panel on the front of the Expressway identifies the system. Default: On.
On: the system name and first active IP address are shown.
Off: the LCD panel reveals no identifying information about the system.
Determines whether the Expressway can be accessed via SSH and SCP. You must restart the system for any changes to take effect.
Default: On.
The fully qualified domain name used in SRV records that address this Expressway cluster, for example "cluster1.example.com".
The name can only contain letters, digits, hyphens and underscores.
Warning: if you change the cluster name after any user accounts have been configured on this Expressway, you may need to
reconfigure your user accounts to use the new cluster name.
Specifies which peer in this cluster is the master, from which configuration will be replicated to all other peers. A cluster consists
of up to 6 peers, including the local Expressway.
Specifies the IP address of one of the peers in the cluster to which this Expressway belongs. A cluster consists of up to 6 peers,
including the local Expressway. This must be a valid IPv4 or IPv6 address.
ApacheModReqTimeOut
You can set all available properties for the request timeout using a single shorthand command.
Modifes the number of seconds that the Apache web server waits for the request body. If the full request body is not received before
the timeout expires, Apache returns a timeout error. Default:20.
284
Cisco Expressway Administrator Guide
Modifes the number of seconds that the Apache web server waits for the request header. If the full request header is not received
before the timeout expires, Apache returns a timeout error. Default:20.
Toggles the custom Apache request timeout. Displays the status of the timeout if you omit the switch.
On: The default Apache request timeout is superseded with your settings (or the defaults) for Apachebody and Apacheheader.
Off: Apachebody and Apacheheader have no effect. The Apache request timeout defaults to 300 seconds.
The alias that will be dialed by the endpoints when the Multiway feature is activated. This must be pre-configured on all endpoints
that may be used to initiate the Multiway feature.
The Mode option allows you to enable or disable the Conference Factory application. Default: Off.
The last number of the range that replaces %% in the template used to generate a conference alias. Default: 65535.
The first number of the range that replaces %% in the template used to generate a conference alias. Default: 65535.
The alias that the Expressway will tell the endpoint to dial in order to create a Multiway conference on the MCU. This alias must
route to the MCU as a fully-qualified SIP alias
Descriptive name for the external application whose status is being referenced.
285
Cisco ExpresswayAdministrator Guide
Determines whether this account is allowed to access the system's status and configuration via the Application Programming
Interface (API). Default: On.
Determines whether this account is allowed to log in to the system using the web interface. Default: On.
Indicates if the account is enabled or disabled. Access will be denied to disabled accounts. Default: On.
The password that this administrator will use to log in to the Expressway.
Determines whether members of this group are allowed to access the system's status and configuration using the Application
Programming Interface (API). Default: On.
Determines whether members of this group are allowed to log in to the system using the web interface. Default: On.
Indicates if the group is enabled or disabled. Access will be denied to members of disabled groups. Default: On.
286
Cisco Expressway Administrator Guide
Specifies whether HTTPS client certificates are checked against certificate revocation lists (CRLs). CRL data is uploaded to the
Expressway via the CRL management page. Default: All.
Peer: only the CRL associated with the CA that issued the client's certificate is checked.
All: all CRLs in the trusted certificate chain of the CA that issued the client's certificate are checked.
Controls the revocation list checking behavior if the revocation status cannot be established, for example if the revocation source
cannot be contacted or no appropriate revocation list is present. Default: Ignore.
Fail: treat the certificate as revoked (and thus do not allow the TLS connection).
Controls the level of security required to allow client systems (typically web browsers) to communicate with the Expressway over
HTTPS. Default: NotRequired.
NotRequired : the client system does not have to present any form of certificate.
Validation : the client system must present a valid certificate that has been signed by a trusted certificate authority (CA). Note that a
restart is required if you are changing from Not required to Certificate validation.
Authentication : the client system must present a valid certificate that has been signed by a trusted CA and contains the client's
authentication credentials. When this mode is enabled, the standard login mechanism is no longer available.
The regular expression to apply to the client certificate presented to the Expressway. Use the (? regex) syntax to supply names for
capture groups so that matching sub-patterns can be substituted in the associated template. Default: /Subject:.*CN= (? ([^,\]|(\,))*)
/m
A template containing a mixture of fixed text and the capture group names used in the Regex. Delimit each capture group name
with # , for example, prefix#Group1#suffix. Each capture group name will be replaced with the text obtained from the regular
expression processing. The resulting string is used as the user's authentication credentials (username). Default:
#captureCommonName#
The password used by the Expressway when authenticating with another system. The maximum plaintext length is 128 characters,
which is then encrypted. Note: this does not apply to traversal client zones.
287
Cisco ExpresswayAdministrator Guide
The interval between digest authentication cache expiration checks in seconds. Default: 600
The interval between digest authentication cache expiration checks in seconds. Default: 10000
Determines whether local administrator account passwords must meet a minimum level of complexity before they are accepted. In
addition, passwords must not: be based on a dictionary word contain too many consecutive characters such as "abc" or "123",
contain too few different characters or be palindromes. Default: Off.
The maximum number of times the same character can be repeated consecutively. A value of 0 disables this check. Default: 0
The minimum number of character classes that must be present. There are four character classes: digit, upper case, lower case
and special. Use this setting if you want to mandate the use of 2-3 different character classes without requiring all of them to be
present. A value of 0 disables this check. Default: 0.
The minimum number of digits that must be present. A value of 0 disables this check. Default: 2.
288
Cisco Expressway Administrator Guide
The minimum number of lower case characters that must be present. A value of 0 disables this check. Default: 2.
The minimum number of special characters that must be present. A special character is anything that is not a letter or a digit. A
value of 0 disables this check. Default: 2
The minimum number of upper case characters that must be present. A value of 0 disables this check. Default : 2
The username used by the Expressway when authenticating with another system. Note: this does not apply to traversal client zones.
The bandwidth (in kbps) to use on calls managed by the Expressway where no bandwidth has been specified by the endpoint.
Default: 384.
Determines whether the Expressway attempts to downspeed a call if there is insufficient per-call bandwidth available to fulfill the
request. Default: On.
On: the Expressway will attempt to place the call at a lower bandwidth.
Determines whether the Expressway attempts to downspeed a call if there is insufficient total bandwidth available to fulfill the
request. Default: On.
On: the Expressway will attempt to place the call at a lower bandwidth.
Specifies the first zone or subzone to which this link will be applied.
289
Cisco ExpresswayAdministrator Guide
Specifies the second zone or subzone to which this link will be applied.
If this pipe has limited per-call bandwidth, sets the maximum amount of bandwidth (in kbps) available for any one call. Default:
1920.
Determines whether or not this pipe is limiting the bandwidth of individual calls. Default: Unlimited.
If this pipe has limited bandwidth, sets the maximum bandwidth (in kbps) available at any one time on the pipe. Default: 500000.
Determines whether or not this pipe is enforcing total bandwidth restrictions. Default: Unlimited.
Specifies whether the Expressway will check for call loops. Default: On.
290
Cisco Expressway Administrator Guide
Specifies whether the Expressway routes the signaling for calls. Default: Always.
Optimal: if possible, the Expressway will remove itself from the call signaling path, which may mean the call does not consume a
call license.
The way in which the Expressway attempts to call systems that are not registered with it or one of its neighbors. Default: Indirect.
Direct: allows an endpoint to make a call to an unknown IP address without the Expressway querying any neighbors. The call setup
would occur just as it would if the far end were registered directly to the local system.
Indirect: upon receiving a call to an unknown IP address, the Expressway will query its neighbors for the remote address and if
permitted will route the call through the neighbor.
Off: endpoints registered directly to the Expressway may only call an IP address of a system also registered directly to that
Expressway.
Specifies the alias to which incoming calls are placed for calls where the IP address or domain name of the Expressway has been
given but no callee alias has been specified.
CollaborationEdge Enabled:<On/Off>
CollaborationEdge JabbercEnabled:<On/Off>
CollaborationEdge JabbercProxyProtocol:<http/https>
Selects the protocol used to proxy Jabber Guest services requests through the Expressway.
Changes the hash algorithm that the Expressway uses when signing SAML authentication requests given to the client.
<index> is an integer distinguishing a particular IdP from the list that is configured on the Expressway.
291
Cisco ExpresswayAdministrator Guide
Determines whether the Expressway-C will check if the user's home node has SSO available.
On: The Expressway-E always tells the client that SSO is available, without actually checking the home node.
Off: Allow the Expressway-C to check if SSO is available on the user's home node before the Expressway-E responds to the client.
Note:The default value Off corresponds to the following default on the web UI: Check for internal SSOavailability:Yes
CollaborationEdge SsoEnabled:<On/Off>
CollaborationEdge SsoSipTokenExtraTtl:<0..172800>
Extends the lifetime of the SIP authorization token by the supplied number of seconds.
<index> is an integer distinguishing a particular IdP from the list that is configured on the Expressway.
Enter a name for this deployment. You can use multiple deployments to partition the Unified Communications services provided via
this Expressway. See Using deployments to partition Unified Communications services.
<index> is an integer distinguishing a particular IdP from the list that is configured on the Expressway.
The IP address of the DNS server to use only when resolving hostnames for the associated domain names.
The IP address of a default DNS server to use when resolving domain names. You can specify up to 5 servers. These default DNS
servers are used if there is no per-domain DNS server defined for the domain being looked up.
292
Cisco Expressway Administrator Guide
Specifies the lifetime of the authentication token issued by the Expressway to a successfully authenticated client. A client that
successfully authenticates should request a refresh before this token expires, or it will need to re-authenticate.
Specifies how long the Expressway waits between cache clearing operations. Only expired tokens are removed when the cache is
cleared, so this setting is the longest possible time that an expired token can remain in the cache.
Limits the number of times that any user's credentials can authorize via VCS per rate control period. Any device using the same
user credentials contributes to the number.
After the limit is reached, any further attempts to use these credentials are rejected until the current rate control period expires.
Defines the period (in seconds) over which authorizations are counted. If rate control is enabled, then a user's first authorization
starts the counter and the timer. When the rate control period expires, the counter is reset and a new period will start with the
user's next authorization.
Determines whether diagnostic core dump files are created. Default: On.
Determines whether details of application failures are automatically sent to a web service. Default: Off.
An optional proxy server to use for the HTTP/HTTPS connections to the incident reporting server.
293
Cisco ExpresswayAdministrator Guide
The URL of the web service to which details of application failures are sent. Default: https://cc-
reports.cisco.com/submitapplicationerror/
Specifies the IPv4 address of the specified LAN port. Note: you must restart the system for any changes to take effect.
If the Expressway is operating in static NAT mode, this specifies the external public IPv4 address of that static NAT. You must
restart the system for any changes to take effect.
Specifies whether the Expressway is located behind a static NAT. You must restart the system for any changes to take effect.
Default: Off.
Specifies the IPv4 subnet mask of the specified LAN port. You must restart the system for any changes to take effect.
Specifies the IPv6 address of the specified LAN port. You must restart the system for any changes to take effect.
Sets the speed of the Ethernet link from the specified LAN port. Use Auto to automatically configure the speed. You must restart the
system for any changes to take effect. Default: Auto.
Sets the IP address or Fully Qualified Domain Name (FQDN) of the external manager.
294
Cisco Expressway Administrator Guide
Controls whether the certificate presented by the external manager is verified. Default: On.
Determines whether or not the Expressway responds to gatekeeper discovery requests from endpoints. Default: On.
Specifies the upper port in the range to be used by calls once they are established. Default: 19999.
Specifies the lower port in the range to be used by calls once they are established. Default: 15000.
Specifies the port that listens for H.323 call signaling. Default: 1720.
Specifies the interval (in seconds) at which the Expressway polls the endpoints in a call to verify that they are still in the call.
Default: 120.
Specifies whether the prefix of the ISDN gateway is inserted into the caller's E.164 number presented on the destination endpoint.
Including the prefix allows the recipient to directly return the call. Default: ExcludePrefix.
IncludePrefix: inserts the ISDN gateway's prefix into the source E.164 number.
Determines whether or not the Expressway will provide H.323 gatekeeper functionality. Default: On.
Controls the compatibility settings of the SIP to H.323 interworking BFCP component. Default: Auto.
295
Cisco ExpresswayAdministrator Guide
Determines whether or not the Expressway will allow encrypted calls between SIP and H.323 endpoints. Default: Auto.
Controls whether the Expressway will perform replay protection for incoming SRTP packets when interworking a call. Default: Off.
Off: the Expressway will not check for replayed SRTP packets.
Determines whether or not the Expressway will act as a gateway between SIP and H.323 calls. Default: RegisteredOnly.
Controls whether the SIP to H.323 interworking function sends com.tandberg.sdp.duo.enable and com.tandberg.sdp.bfcp.udp in the
require header for dialog forming INVITEs. Default: Off.
The name to be appended to an unqualified host name before querying the DNS server. Used when attempting to resolve
unqualified domain names for NTP, LDAP, external manager and remote syslog servers. May also be used along with the System
host name to identify references to this Expressway in SIP messaging.
The DNS host name that this system is known by. This is not the fully-qualified domain name, just the host label portion. The name
can only contain letters, digits, hyphens and underscores. The first character must be a letter and the last character must be a letter
or a digit.
The upper source port in the range used for sending DNS queries. Requests choose a random port from this range. Warning: setting
a small source port range increases your vulnerability to DNS spoofing attacks. Default: 65535.
296
Cisco Expressway Administrator Guide
The lower source port in the range used for sending DNS queries. Requests choose a random port from this range. Warning: setting
a small source port range increases your vulnerability to DNS spoofing attacks. Default: 1024.
Determines whether outgoing DNS queries use the system's normal ephemeral port range, or a custom port range that you can
configure. Default: On.
The highest port in the range used for ephemeral outbound connections not otherwise constrained by Expressway call processing.
Default: 35999.
The lowest port in the range used for ephemeral outbound connections not otherwise constrained by Expressway call processing.
Default: 30000.
Specifies the IPv4 gateway of the Expressway. Note: you must restart the system for any changes to take effect. Default: 127.0.0.1
The type of QoS (Quality of Service) tags to apply to all signaling and media packets. You must restart the system for any changes to
take effect. Default: None.
DiffServ: puts the specified Tag value in the TOS (Type Of Service) field of the IPv4 header or TC (Traffic Class) field of the IPv6
header.
The value to stamp onto all signaling and media traffic routed through the system. You must restart the system for any changes to
take effect. Default: 0.
297
Cisco ExpresswayAdministrator Guide
Determines when RFC4821 Packetization Layer Path MTU Discovery is used by the Expressway network interface. Default:
Disabled.
Specifies an IP address used in conjunction with the Prefix Length to determine the network to which this route applies.
Specifies the LAN interface to use for this route. Auto: The Expressway will select the most appropriate interface to use. Default:
Auto.
The number of bits of the IP address which must match when determining the network to which this route applies. Default: 32.
Specifies the IPv6 gateway of the Expressway. You must restart the system for any changes to take effect.
IPProtocol: <Both/IPv4/IPv6>
Selects whether the Expressway is operating in IPv4, IPv6 or dual stack mode. You must restart the system for any changes to take
effect. Default: IPv4.
298
Cisco Expressway Administrator Guide
serviceonly: Call Detail Records are stored locally for 7 days and then deleted. The logged records are not accessible via the user
interface.
serviceandlogging: As for serviceonly, except the CDRs are accessible via the local Event log. If you have added syslog server
addresses, the records are sent to those as Info messages.
Default : off
Controls the granularity of Event Logging. 1 is the least verbose, 4 the most. Note: this setting is not retrospective; it determines
which events are written to the Event Log from now onwards. Default: 1
Important: A shorter interval has more impact on system performance, while a longer interval yields coarser metrics. We
recommend using the longest interval unless you need very fine metrics.
Default: 60
Toggles the System Metrics Collection service. Enter On to start collecting metrics for this system.
Default: Off
Enter the address of the listening server. You may use IP address, hostname, or FQDN.
Default: Empty
Enter the port on which the listening server is expecting System Metrics traffic.
Default: 25826
299
Cisco ExpresswayAdministrator Guide
Sets the Distinguished Name to use as the base when searching for administrator and user accounts.
Sets the Distinguished Name to use as the base when searching for administrator and user groups.
Specifies whether certificate revocation lists (CRLs) are checked when forming a TLS connection with the LDAP server. CRL data
is uploaded to the Expressway via the trusted CA certificate PEM file. Default: None.
Peer: only the CRL associated with the CA that issued the LDAP server's certificate is checked.
All: all CRLs in the trusted certificate chain of the CA that issued the LDAP server's certificate are checked.
Defines the type of LDAP directory that is being accessed. Default: ActiveDirectory.
Sets the encryption to use for the connection to the LDAP server. Default: TLS.
The SASL (Simple Authentication and Security Layer) mechanism to use when binding to the LDAP server. Default: DIGEST-MD5.
Sets the IP address or Fully Qualified Domain Name (FQDN) of the LDAP server to use when making LDAP queries.
300
Cisco Expressway Administrator Guide
Sets how the LDAP server address is resolved if specified as an FQDN. Default: AddressRecord.
Sets the IP port of the LDAP server to use when making LDAP queries. Non-secure connections use 389 and secure connections
use 636. Other ports are not supported. Default: 389.
Sets the user distinguished name to use when binding to the LDAP server.
Sets the password to use when binding to the LDAP server. The maximum plaintext length is 60 characters, which is then
encrypted.
Sets the username to use when binding to the LDAP server. Only applies if using SASL.
Defines where administrator login credentials are authenticated before access is allowed. Default: LocalOnly.
LocalOnly: credentials are verified against a local database stored on the Expressway.
RemoteOnly: credentials are verified against an external credentials directory, for example Windows Active Directory. Note that
this disables login access via the default admin account.
Both: credentials are verified first against a local database stored on the Expressway, and then if no matching account is found the
external credentials directory is used instead.
Defines the name for this entry in the local authentication database.
301
Cisco ExpresswayAdministrator Guide
Defines the password for this entry in the local authentication database.
Determines whether web browsers are instructed to only ever use a secure connection to access this server. Enabling this feature
gives added protection against man-in-the-middle (MITM) attacks. Default: On.
On: the Strict-Transport-Security header is sent with all responses from the web server, with a 1 year expiry time.
Off : the Strict-Transport-Security header is not sent, and browsers work as normal. Note: you must restart the system for any
changes to take effect.
Sets the number of minutes that an administration session (serial port, HTTPS or SSH) may be inactive before the session is timed
out. A value of 0 turns session time outs off. Default: 30.
The maximum number of concurrent administrator sessions allowed on the system. This includes web, SSH and serial sessions. A
value of 0 turns session limits off. Default: 0.
The number of concurrent sessions that each individual administrator account is allowed on the system. This includes web, SSH
and serial sessions. A value of 0 turns session limits off. Default: 0.
Sets the IP address or Fully Qualified Domain Name (FQDN) of up to 5 NTP servers to be used when synchronizing system time.
Specifies the option key of your software option. These are added to the system in order to add extra functionality, such as
increasing the systems capacity. Contact your Cisco support representative for further information.
302
Cisco Expressway Administrator Guide
The CPL used by the Expressway when the remote service is unavailable. Default: <reject status='403' reason='Service
Unavailable'/>
Specifies the password used by the Expressway to log in and query the remote service. The maximum plaintext length is 30
characters, which will then be encrypted.
Specifies the protocol used to connect to the remote service. Default: HTTPS.
Specifies the IP address or Fully Qualified Domain Name (FQDN) of the remote service.
Specifies the path for obtaining the remote service status. Default: status
Controls certificate revocation list checking of the certificate supplied by the policy service. When enabled, the server's X.509
certificate will be checked against the revocation list of the certificate authority of the certificate. Default: Off.
Controls X.509 certificate checking and mutual authentication between this Expressway and the policy service. When enabled, the
server's FQDN or IP address, as specified in the address field, must be contained within the server's X.509 certificate (in either the
Subject Common Name or the Subject Alternative Name attributes). Default: On.
Specifies the user name used by the Expressway to log in and query the remote policy service.
303
Cisco ExpresswayAdministrator Guide
The CPL used by the Expressway when the remote service is unavailable. Default: <reject status='504' reason='Policy Service
Unavailable'/>
Specifies the HTTP method type to use for the remote service. Default: POST.
Specifies the password used by the Expressway to log in and query the remote service. The maximum plaintext length is 30
characters, which will then be encrypted.
Specifies the protocol used to connect to the remote service. Default: HTTPS.
Specifies the IP address or Fully Qualified Domain Name (FQDN) of the remote service.
Specifies the path for obtaining the remote service status. Default: status
Controls certificate revocation list checking of the certificate supplied by the policy service. When enabled, the server's X.509
certificate will be checked against the revocation list of the certificate authority of the certificate. Default: Off.
304
Cisco Expressway Administrator Guide
Controls X.509 certificate checking and mutual authentication between this Expressway and the policy service. When enabled, the
server's FQDN or IP address, as specified in the address field, must be contained within the server's X.509 certificate (in either the
Subject Common Name or the Subject Alternative Name attributes). Default: On.
Specifies the user name used by the Expressway to log in and query the remote service.
The IP address or Fully Qualified Domain Name (FQDN) of up to 4 remote syslog servers to which the log is written. These servers
must support the BSD or IETF syslog protocols.
Controls whether the certificate supplied by the syslog server is checked against the certificate revocation list (CRL). Default: Off.
The format in which remote syslog messages are written. Default: bsd.
Select the minimum severity of log messages to send to this syslog server. Default: informational.
Select the syslog protocol to use when sending messages to the syslog server, or choose user_defined to configure individually the
transport type, port and format. Default: bsd.
The UDP/TCP destination port to use. Suggested ports: UDP=514 TCP/TLS=6514. Default : 514.
The transport protocol to use when communicating with the syslog server. If you use TLS encryption, you must upload a suitable CA
certificate file. Default: UDP.
Controls if and when the Expressway will warn that it is approaching its maximum licensed capacity for calls. The number
represents the percentage of the maximum that, when reached, will trigger a warning. 0: Warnings will never appear. Default: 90.
305
Cisco ExpresswayAdministrator Guide
Enter the maximum number of seconds to wait for an outgoing SIP TCP connection to be established. Default: 10.[OF:withheld ref
jason tomo end march 15, pending full implementation]
Specifies the maximum time (in seconds) that a nonce may be re-used for. Default: 300.
Length of nonce or cnonce to generate for use in SIP Digest authentication. Default: 60.
Maximum number of times that a nonce generated by the Expressway may be used by a client. Default: 128.
Example: xConfiguration SIP Authentication Digest Nonce Maximum Use Count: 128
The number of times a SIP UA will be challenged due to authentication failure before receiving a 403 Forbidden response. Default:
3.
The traversal zone to use when delegating credential checks for SIP messages for this domain.
Whether remote and mobile collaboration features are enabled. Default Off.
Specifies a domain for which this Expressway is authoritative. The domain name can comprise multiple levels. Each level's name
can only contain letters, digits and hyphens, with each level separated by a period (dot). A level name cannot start or end with a
hyphen, and the final level name must start with a letter. An example valid domain name is "100.example-name.com".
306
Cisco Expressway Administrator Guide
Controls whether the Expressway takes the media for an ICE to non-ICE call where the ICE participant is thought to be behind a
NAT device. Default: Off.
Determines whether or not the Expressway will provide SIP proxy functionality. Default: On.
Controls whether the Expressway requires the use of the com.tandberg.sdp.duo.enable extension for endpoints that support it.
Default: On.
Controls whether the Expressway will require the use of the com.tandberg.udp.bfcp extension for endpoints that support it. Default:
On.
Specifies the IP address of the next hop for this route, where matching SIP requests will be forwarded. Note: this command is
intended for developer use only.
Whether to forward authenticated requests. Default: Off. Note: this command is intended for developer use only.
On: only forward requests along route if incoming message has been authenticated.
The minimum value the Expressway will negotiate for the session refresh interval for SIP calls. For more information see the
definition of Min-SE header in RFC 4028. Default: 500.
The maximum time allowed between session refresh requests for SIP calls. For more information see the definition of Session-
Expires in RFC 4028. Default: 1800.
Determines whether incoming and outgoing SIP calls using the TCP protocol will be allowed. Default: On.
307
Cisco ExpresswayAdministrator Guide
Specifies the upper port in the range to be used by outbound TCP/TLS SIP connections. Default: 29999.
Specifies the lower port in the range to be used by outbound TCP/TLS SIP connections. Default: 25000.
Specifies the listening port for incoming SIP TCP calls. Default: 5060.
Controls whether Certificate Revocation Lists (CRLs) are used to perform certificate revocation checking. CRLs can be loaded
manually onto the Expressway, downloaded automatically from pre-configured URIs, or downloaded automatically from a CRL
distribution point (CDP) URI contained in the X.509 certificate. Default: On.
SIP TLS Certificate Revocation Checking CRL Network Fetch Mode: <On/Off>
Controls whether the download of CRLs from the CDP URIs contained in X.509 certificates is allowed. Default: On.
Example: xConfiguration SIP TLS Certificate Revocation Checking CRL Network Fetch Mode: On
Controls whether revocation checking is performed for certificates exchanged during SIP TLS connection establishment. Default:
Off.
Controls whether the Online Certificate Status Protocol (OCSP) may be used to perform certificate revocation checking. To use
OCSP, the X.509 certificate to be checked must contain an OCSP responder URI. Default: On.
Controls the revocation checking behavior if the revocation source cannot be contacted. Default: Fail.
Fail: treat the certificate as revoked (and thus do not allow the TLS connection).
Example: xConfiguration SIP TLS Certificate Revocation Checking Source Inaccessibility Behavior: Fail
SIPTLSCipherSuite:<S:0,1000>
Specifies the SIP TLS cipher suite to use in 'OpenSSL ciphers' format (See
https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT). Note that existing connections (e.g. zones and device
registrations) will be dropped when this configuration changes because a new TLS exchange must occur. Also note that aNULL
ciphers are not supported for inbound connections. Default: ALL:!EXP:!LOW:!MD5:@STRENGTH:+ADH
308
Cisco Expressway Administrator Guide
Determines whether incoming and outgoing SIP calls using the TLS protocol will be allowed. Default: On.
Specifies the listening port for incoming SIP TLS calls. Default: 5061.
Determines whether incoming and outgoing SIP calls using the UDP protocol will be allowed. Default: Off.
Specifies the listening port for incoming SIP UDP calls. Default: 5060.
The name of the person who can be contacted regarding issues with the Expressway. Default: Administrator.
309
Cisco ExpresswayAdministrator Guide
Sets the Expressway into maintenance mode.New calls are disallowed. Default: Off.
Defines the name of the Expressway. The system name appears in various places in the web interface and on the front panel of the
unit. Choose a name that uniquely identifies the system.
Sets the local time zone of the Expressway. Time zone names follow the POSIX naming convention e.g. Europe/London or
America/New_York. Default: GMT.
310
Cisco Expressway Administrator Guide
Replace: substitutes the matching part of the alias with the text in replace string.
The text string to use in conjunction with the selected Pattern behavior.
How the pattern string must match the alias for the transform to be applied. Default: Prefix.
Exact: the entire string must exactly match the alias character for character.
Assigns a priority to the specified transform. Transforms are compared with incoming aliases in order of priority, and the priority
must be unique for each transform. Default: 1 .
For traversal calls (where the Expressway takes the media as well as the signaling), specifies the upper port in the range to use for
the media. Ports are allocated from this range in pairs, the first of each being even. Thus the range must end with an odd number.
Default: 59999 .
311
Cisco ExpresswayAdministrator Guide
For traversal calls (where the Expressway takes the media as well as the signaling), specifies the lower port in the range to use for
the media. Ports are allocated from this range in pairs, the first of each being even. Thus the range must start with an even number.
Default: 36000 .
The port on the Expressway to use for Assent signaling. Default: 2776 .
The port on the Expressway to use for H460.18 signaling. Default: 2777 .
The realm sent by the server in its authentication challenges. Default: TANDBERG .
Determines whether the server requires requests to be authenticated. When enabled the server will also authenticate its responses.
Default: On.
The upper port in the range used for TURN relays. Default: 61799.
The lower port in the range used for TURN relays. Default: 60000.
Determines whether the Expressway offers TURN services to traversal clients. Default: Off .
The upper port in the range used for TURN requests. Default: 3483
312
Cisco Expressway Administrator Guide
The lower port in the range used for TURN requests. Default: 3478.
Controls how the Expressway authenticates incoming messages from this zone and whether they are subsequently treated as
authenticated, unauthenticated, or are rejected. The behavior varies for H.323 messages, SIP messages that originate from a local
domain and SIP messages that originate from non-local domains. Default: DoNotCheckCredentials.
The media encryption policy applied by the Expressway for SIP calls (including interworked calls) to and from this zone. Default:
Auto.
Controls whether the Expressway uses its IP address or host name in the record-route or path headers of outgoing SIP requests to
this zone. Note: setting this value to hostname also requires a valid DNS system host name to be configured on the Expressway.
Default: IP.
Controls whether the hostname contained within the certificate presented by the external system is verified by the Expressway. If
enabled, the certificate hostname (also known as the Common Name) is checked against the patterns specified in the Default Zone
access rules. Default: Off.
Controls whether the Expressway uses its IP address or host name in the record-route or path headers of outgoing SIP requests to
this zone. Note: setting this value to hostname also requires a valid DNS system host name to be configured on the Expressway.
Default: IP.
The bandwidth limit (in kbps) applied to any one traversal call being handled by the Expressway (applies only if the mode is set to
Limited). Default: 1920 .
313
Cisco ExpresswayAdministrator Guide
Determines whether there is a limit on the bandwidth of any one traversal call being handled by the Expressway. Default: Unlimited.
The total bandwidth (in kbps) allowed for all traversal calls being handled by the Expressway (applies only if the mode is set to
Limited). Default: 500000 .
Determines whether or not there is a limit to the total bandwidth of all traversal calls being handled by the Expressway. Default:
Unlimited.
SearchRules: use the configured search rules to determine which zones are queried and in what order.
Directory: use the facilities of a directory service to direct the request to the correct zones.
Specifies whether this search rule applies only to authenticated search requests. Default: No.
Example: xConfiguration Zones Policy SearchRules Rule 1 Description: "Send query to the DNS zone"
AliasPatternMatch: queries the zone only if the alias matches the corresponding pattern type and string.
AnyAlias: queries the zone for any alias (but not IP address).
AnyIPAddress: queries the zone for any given IP address (but not alias).
314
Cisco Expressway Administrator Guide
Determines whether the matched part of the alias is modified before being sent to the target zone. (Applies to Alias Pattern Match
mode only.) Default: Strip.
Replace: the matching part of the alias is substituted with the text in the replace string.
The string to substitute for the part of the alias that matches the pattern. (Applies to Replace pattern behavior only.)
The pattern against which the alias is compared. (Applies to Alias Pattern Match mode only.)
How the pattern string must match the alias for the rule to be applied. (Applies to Alias Pattern Match mode only.) Default: Prefix.
Exact: the entire string must exactly match the alias character for character.
The order in the search process that this rule is applied, when compared to the priority of the other search rules. All Priority 1
search rules are applied first, followed by all Priority 2 search rules, and so on. Default: 100 .
Specifies the ongoing search behavior if the alias matches this search rule. If 'stop' is selected, any rules with the same priority
level as this rule are still applied. Default: Continue.
Continue: continue applying the remaining search rules (in priority order) until the endpoint identified by the alias is found.
Stop: do not apply any more search rules, even if the endpoint identified by the alias is not found in the target zone.
315
Cisco ExpresswayAdministrator Guide
The sources of the requests for which this rule applies. Default: Any.
The name of the source (Sub)Zone for which this rule applies.
Example: xConfiguration Zones Policy SearchRules Rule 1 Source Name: "Local Office"
Indicates if the search rule is enabled or disabled. Disabled search rules are ignored. Default: Enabled .
The zone or policy service to query if the alias matches the search rule.
Example: xConfiguration Zones Policy SearchRules Rule 1 Target Name: "Sales Office"
Determines whether, if no NAPTR (SIP) or SRV (SIP and H.323) records have been found for the dialed alias via this zone, the
Expressway will then query for A and AAAA DNS Records. Default: Off .
Specifies which audio codec to use when empty INVITEs are not allowed. Default: G711u .
Example: xConfiguration Zones Zone 1 DNS Interworking SIP Audio DefaultCodec: G711u
Controls if the Expressway will generate a SIP INVITE message with no SDP to send to this zone. INVITEs with no SDP mean that
the destination device is asked to initiate the codec selection, and are used when the call has been interworked locally from H.323.
Default: On.
On: SIP INVITEs with no SDP will be generated and sent to this neighbor.
Off: SIP INVITEs will be generated and a pre-configured SDP will be inserted before the INVITEs are sent to this neighbor.
316
Cisco Expressway Administrator Guide
Specifies which video bit rate to use when empty INVITEs are not allowed. Default: 384 .
Example: xConfiguration Zones Zone 1 DNS Interworking SIP Video DefaultBitrate: 384
Specifies which video codec to use when empty INVITEs are not allowed. Default: H263 .
Example: xConfiguration Zones Zone 1 DNS Interworking SIP Video DefaultCodec: H263
Specifies which video resolution to use when empty INVITEs are not allowed. Default: CIF .
Example: xConfiguration Zones Zone 1 DNS Interworking SIP Video DefaultResolution: CIF
Determines which transport type is used for SIP calls from the DNS zone, when DNS NAPTR records and SIP URI parameters do
not provide the preferred transport information. RFC 3263 suggests that UDP should be used. Default: UDP.
Example: xConfiguration Zones Zone [1..1000] DNS SIP Default Transport: UDP
The media encryption policy applied by the Expressway for SIP calls (including interworked calls) to and from this zone. Default:
Auto.
Example: xConfiguration Zones Zone 1 DNS SIP Media Encryption Mode: Auto
Determines whether SIP requests sent out to this zone will be "poisoned" such that if they are received by the local Expressway
again they will be rejected. Default: Off .
On: SIP requests sent out via this zone that are received again by this Expressway will be rejected.
Off: SIP requests sent out via this zone that are received by this Expressway again will be processed as normal.
Zones Zone [1..1000] DNS SIP Record Route Address Type: <IP/Hostname>
Controls whether the Expressway uses its IP address or host name in the record-route or path headers of outgoing SIP requests to
this zone. Note: setting this value to Hostname also requires a valid DNS system host name to be configured on the Expressway.
Default: IP.
Example: xConfiguration Zones Zone 1 DNS SIP Record Route Address Type: IP
317
Cisco ExpresswayAdministrator Guide
Controls what happens when the Expressway receives a SIP search that originated as an H.323 search, destined for this zone.
Default: Off .
On: searches will be responded to automatically, without being forwarded to the zone.
Controls X.509 certificate checking between this Expressway and the destination system server returned by the DNS lookup. When
enabled, the domain name submitted to the DNS lookup must be contained within the server's X.509 certificate (in either the
Subject Common Name or the Subject Alternative Name attributes). Default: Off .
Zones Zone [1..1000] DNS SIP TLS Verify Subject Name: <S: 0..128>
The certificate holder's name to look for in the traversal client's X.509 certificate (must be in either the Subject Common Name or
the Subject Alternative Name attributes). If empty then the domain portion of the resolved URI is used.
Example: xConfiguration Zones Zone 1 DNS SIP TLS Verify Subject Name: "example.com"
Zones Zone [1..1000] DNS SIP UDP BFCP Filter Mode: <On/Off>
Determines whether INVITE requests sent to this zone filter out UDP/BFCP. This option may be required to enable interoperability
with SIP devices that do not support the UDP/BFCP protocol. Default: Off .
On: any media line referring to the UDP/BFCP protocol is replaced with TCP/BFCP and disabled.
Example: xConfiguration Zones Zone 1 DNS SIP UDP BFCP Filter Mode: Off
Preconfigured profiles: alternatively, choose one of the preconfigured profiles to automatically use the appropriate settings required
for connections to that type of system.
The DNS zone to append to the transformed E.164 number to create an ENUM host name which this zone is then queried for.
Determines whether H.323 calls will be allowed to and from this zone. Default: On .
318
Cisco Expressway Administrator Guide
Specifies the hop count to be used when sending an alias search request to this zone. Note: if the search request was received from
another zone and already has a hop count assigned, the lower of the two values will be used. Default: 15 .
Controls how the Expressway authenticates incoming messages from this zone and whether they are subsequently treated as
authenticated, unauthenticated, or are rejected. The behavior varies for H.323 messages, SIP messages that originate from a local
domain and SIP messages that originate from non-local domains. Default: DoNotCheckCredentials.
The port on the neighbor to use for H.323 calls to and from this Expressway. Default: 1720 .
The port on the neighbor to use for H.323 searches to and from this Expressway. Default: 1719 .
Determines what happens when the Expressway receives a H323 search, destined for this zone. Default: Off.
On: searches will be responded to automatically, without being forwarded to the zone.
Specifies which audio codec to use when empty INVITEs are not allowed. Default: G711u .
Example: xConfiguration Zones Zone 3 Neighbor Interworking SIP Audio DefaultCodec: G711u
Determines whether the Expressway will generate a SIP INVITE message with no SDP to send to this zone. INVITEs with no SDP
mean that the destination device is asked to initiate the codec selection, and are used when the call has been interworked locally
from H.323. Default: On .
On: SIP INVITEs with no SDP will be generated and sent to this neighbor.
Off: SIP INVITEs will be generated and a pre-configured SDP will be inserted before the INVITEs are sent to this neighbor.
319
Cisco ExpresswayAdministrator Guide
Controls if the Expressway offers encrypted SRTCP in calls to this zone. The Expressway will send an INFO request. Default: No.
Determines how the Expressway will search for SIP endpoints when interworking an H.323 call. Default: Options .
Example: xConfiguration Zones Zone 3 Neighbor Interworking SIP Search Strategy: Options
Specifies which video bit rate to use when empty INVITEs are not allowed. Default: 384 .
Example: xConfiguration Zones Zone 3 Neighbor Interworking SIP Video DefaultBitrate: 384
Specifies which video codec to use when empty INVITEs are not allowed. Default: H263 .
Example: xConfiguration Zones Zone 3 Neighbor Interworking SIP Video DefaultCodec: H263
Specifies which video resolution to use when empty INVITEs are not allowed. Default: CIF .
Example: xConfiguration Zones Zone 3 Neighbor Interworking SIP Video DefaultResolution: CIF
Specifies whether the zone monitors the aliveness of its neighbor peers. H323 LRQs and/or SIP OPTIONS will be periodically sent
to the peers. If any peer fails to respond, that peer will be marked as inactive. If no peer manages to respond the zone will be
marked as inactive. Default: Yes.
Specifies the IP address or Fully Qualified Domain Name (FQDN) of the neighbor. If the neighbor zone is an Expressway cluster,
this will be one of the peers in that cluster.
Controls if authenticated SIP messages (ones containing a P-Asserted-Identity header) from this zone are trusted. Default: Off .
The identifier that represents an instance of a local SIP Back-to-Back User Agent service.
320
Cisco Expressway Administrator Guide
Specifies whether Class 5 SIP responses from neighbor peers result in the zone being considered alive for use. Default: Yes.
Determines how the Expressway handles encrypted SIP calls on this zone. Default: Auto.
Auto: SIP calls are encrypted if a secure SIP transport (TLS) is used.
Controls whether multipart MIME stripping is performed on requests from this zone. This must be set to On for connections to a
Microsoft Office Communications Server 2007. Default: Off .
Example: xConfiguration Zones Zone 3 Neighbor SIP MIME Strip Mode: Off
The media encryption policy applied by the Expressway for SIP calls (including interworked calls) to and from this zone. Default:
Auto
Example: xConfiguration Zones Zone 3 Neighbor SIP Media Encryption Mode: Auto
How the Expressway handles media for calls to and from this neighbor, and where it will forward the media destined for this
neighbor. Default: Auto. .
Signaled: media is always taken for calls to and from this neighbor. It will be forwarded as signaled in the SDP received from this
neighbor.
Latching: media is always taken for calls to and from this neighbor. It will be forwarded to the IP address and port from which
media from this neighbor is received.
Auto: media is only taken if the call is a traversal call. If this neighbor is behind a NAT the Expressway will forward the media to the
IP address and port from which media from this zone is received (latching). Otherwise it will forward the media to the IP address
and port signaled in the SDP (signaled).
321
Cisco ExpresswayAdministrator Guide
Controls whether SIP requests sent out to this zone will be "poisoned" such that if they are received by the local Expressway again
they will be rejected. Default: Off .
On: SIP requests sent out via this zone that are received again by this Expressway will be rejected.
Off: SIP requests sent out via this zone that are received by this Expressway again will be processed as normal.
Specifies the port on the neighbor to be used for SIP calls to and from this Expressway. Default: 5061 .
Zones Zone [1..1000] Neighbor SIP ProxyRequire Strip List: <S: 0,255>
A comma separated list of option tags to search for and remove from Proxy-Require headers in SIP requests received from this
zone. By default, no option tags are specified.
Controls whether the Expressway will insert RFC3327 Path headers when proxying REGISTER messages toward this zone. If
disabled the Expressway will instead rewrite the contact header to allow interworking with SIP registrars that do not support
RFC3327. Default: Yes.
Example: xConfiguration Zones Zone [1..1000] Neighbor SIP RFC3327 Enabled: Yes
Zones Zone [1..1000] Neighbor SIP Record Route Address Type: <IP/Hostname>
Controls whether the Expressway uses its IP address or host name in the record-route or path headers of outgoing SIP requests to
this zone. Note: setting this value to Hostname also requires a valid DNS system host name to be configured on the Expressway.
Default: IP.
Example: xConfiguration Zones Zone 3 Neighbor SIP Record Route Address Type: IP
Controls what happens when the Expressway receives a SIP search that originated as an H.323 search, destined for this zone.
Default: Off .
On: searches will be responded to automatically, without being forwarded to the zone.
Controls X.509 certificate checking and mutual authentication for inbound and outbound connections between this Expressway and
the neighbor system. When enabled, the neighbor system's FQDN or IP address, as specified in the Peer address field, must be
contained within the neighbor's X.509 certificate (in either the Subject Common Name or the Subject Alternative Name attributes).
Default: Off .
322
Cisco Expressway Administrator Guide
Determines which transport type will be used for SIP calls to and from this neighbor. Default: TLS .
Zones Zone [1..1000] Neighbor SIP UDP BFCP Filter Mode: <On/Off>
Determines whether INVITE requests sent to this zone filter out UDP/BFCP. This option may be required to enable interoperability
with SIP devices that do not support the UDP/BFCP protocol. Default: Off .
On: any media line referring to the UDP/BFCP protocol is replaced with TCP/BFCP and disabled.
Example: xConfiguration Zones Zone 3 Neighbor SIP UDP BFCP Filter Mode: Off
Determines whether the Expressway strips the UPDATE method from the Allow header of all requests and responses going to and
from this zone. Default: Off .
Example: xConfiguration Zones Zone 3 Neighbor SIP UPDATE Strip Mode: Off
Specifies how the Expressway handles the signaling for calls to and from this neighbor. Default: Auto.
Auto: Signaling will be taken as determined by the Call Routed Mode configuration.
Always: Signaling will always be taken for calls to or from this neighbor, regardless of the Call Routed Mode configuration.
Preconfigured profiles: alternatively, choose one of the preconfigured profiles to automatically use the appropriate settings required
for connections to that type of system.
Determines whether SIP calls will be allowed to and from this zone. Default: On.
Controls how the Expressway authenticates incoming messages from this zone and whether they are subsequently treated as
authenticated, unauthenticated, or are rejected. The behavior varies for H.323 messages, SIP messages that originate from a local
domain and SIP messages that originate from non-local domains. Default: DoNotCheckCredentials.
323
Cisco ExpresswayAdministrator Guide
The password used by the Expressway when connecting to the traversal server. The maximum plaintext length is 128 characters,
which is then encrypted.
The user name used by the Expressway when connecting to the traversal server.
The port on the traversal server to use for H.323 firewall traversal calls from this Expressway. If the traversal server is an
Expressway-E, this must be the port number that is configured on the Expressway-E's traversal server zone associated with this
Expressway.
Determines which of the two firewall traversal protocols will be used for calls to and from the traversal server. Note: the same
protocol must be set on the server for calls to and from this traversal client. Default: Assent.
Specifies the IP address or Fully Qualified Domain Name (FQDN) of the traversal server. If the traversal server is an Expressway-E
cluster, this will be one of the peers in that cluster.
The interval (in seconds) with which a failed attempt to establish a connection to the traversal server should be retried. Default:
120.
The media encryption policy applied by the Expressway for SIP calls (including interworked calls) to and from this zone. Default:
Auto.
Example: xConfiguration Zones Zone 4 TraversalClient SIP Media Encryption Mode: Auto
324
Cisco Expressway Administrator Guide
Controls whether SIP requests sent out to this zone are "poisoned" such that if they are received by the local Expressway again
they will be rejected. Default: Off .
On: SIP requests sent out via this zone that are received again by this Expressway will be rejected.
Off: SIP requests sent out via this zone that are received by this Expressway again will be processed as normal.
Specifies the port on the traversal server to be used for SIP calls from this Expressway. If your traversal server is an Expressway-E,
this must be the port number that has been configured in the traversal server zone for this Expressway.
Determines which firewall traversal protocol will be used for SIP calls to and from the traversal server. Note: the same protocol
must be set on the server for calls to and from this traversal client. Default: Assent.
Controls X.509 certificate checking and mutual authentication between this Expressway and the traversal server. When enabled,
the server's FQDN or IP address, as specified in the Peer address field, must be contained within the server's X.509 certificate (in
either the Subject Common Name or the Subject Alternative Name attributes). Default: Off .
Determines which transport type will be used for SIP calls to and from the traversal server. Default: TLS .
Controls how the Expressway authenticates incoming messages from this zone and whether they are subsequently treated as
authenticated, unauthenticated, or are rejected. The behavior varies for H.323 messages, SIP messages that originate from a local
domain and SIP messages that originate from non-local domains. Default: DoNotCheckCredentials.
The name used by the traversal client when authenticating with the traversal server. If the traversal client is an Expressway, this
must be the Expressways authentication user name. If the traversal client is a gatekeeper, this must be the gatekeepers System
Name.
Determines whether the Expressway will operate in demultiplexing mode for calls from the traversal client. Default: Off .
On: allows use of the same two ports for all calls.
Off: each call will use a separate pair of ports for media.
Example: xConfiguration Zones Zone 5 TraversalServer H323 H46019 Demultiplexing Mode: Off
325
Cisco ExpresswayAdministrator Guide
Specifies the port on the Expressway being used for H.323 firewall traversal from this traversal client. Default: 6001, incrementing
by 1 for each new zone.
Determines which of the two firewall traversal protocols will be used for calls to and from the traversal client. Note: the same
protocol must be set on the client for calls to and from this traversal server. Default: Assent .
The media encryption policy applied by the Expressway for SIP calls (including interworked calls) to and from this zone. Default:
Auto
Example: xConfiguration Zones Zone 5 TraversalServer SIP Media Encryption Mode: Auto
Controls whether SIP requests sent out to this zone are "poisoned" such that if they are received by the local Expressway again
they will be rejected. Default: Off .
On: SIP requests sent out via this zone that are received again by this Expressway will be rejected.
Off: SIP requests sent out via this zone that are received by this Expressway again will be processed as normal.
The port on the Expressway being used for SIP firewall traversal from this traversal client. Default: 7001, incrementing by 1 for each
new zone.
Determines which firewall traversal protocol will be used for SIP calls to and from the traversal client. Note: the same protocol
must be set on the client for calls to and from this traversal server. Default: Assent.
Controls X.509 certificate checking and mutual authentication between this Expressway and the traversal client. If enabled, a TLS
verify subject name must be specified. Default: Off.
326
Cisco Expressway Administrator Guide
The certificate holder's name to look for in the traversal client's X.509 certificate (must be in either the Subject Common Name or
the Subject Alternative Name attributes).
Example: xConfiguration Zones Zone 5 TraversalServer SIP TLS Verify Subject Name: "myclientname"
Determines which of the two transport types will be used for SIP calls between the traversal client and Expressway. Default: TLS .
Sets the interval (in seconds) with which the traversal client will send a TCP probe to the Expressway once a call is established, in
order to keep the firewalls NAT bindings open. Default: 20.
Sets the number of times the traversal client will attempt to send a TCP probe to the Expressway. Default: 5 .
Sets the frequency (in seconds ) with which the traversal client will send a TCP probe to the Expressway. Default: 2 .
Sets the interval (in seconds) with which the traversal client will send a UDP probe to the Expressway once a call is established, in
order to keep the firewalls NAT bindings open. Default: 20.
Sets the number of times the traversal client will attempt to send a UDP probe to the Expressway. Default: 5.
Sets the frequency (in seconds) with which the traversal client will send a UDP probe to the Expressway. Default: 2.
Determines the nature of the specified zone, in relation to the local Expressway.
TraversalClient: there is a firewall between the zones, and the local Expressway is a traversal client of the new zone.
TraversalServer: there is a firewall between the zones and the local Expressway is a traversal server for the new zone.
327
Cisco ExpresswayAdministrator Guide
Format Meaning
<0..63> Indicates an integer value is required. The numbers indicate the minimum and maximum
value.
<S: 7,15> An S indicates a string value, to be enclosed in quotation marks, is required. The numbers
indicate the minimum and maximum number of characters for the string.
<Off/Direct/Indirect> Lists the set of valid values for the command. Do not enclose the value in quotation marks
(r) (r) indicates that this is a required parameter. Note that the (r) is not part of the command
itself.
To obtain information about using each of the xCommand commands from within the CLI, type:
328
Cisco Expressway Administrator Guide
AdminAccountAdd
Password(r): <Password>
AccessAPI: <On/Off>
Whether this account is allowed to access the system's status and configuration via the API. Default: On.
AccessWeb: <On/Off>
Whether this account is allowed to log in to the system using the web interface. Default: On.
Enabled: <On/Off>
Indicates if the account is enabled or disabled. Access is denied to disabled accounts. Default: On.
AdminAccountDelete
AdminGroupAdd
AccessAPI: <On/Off>
Whether members of this group are allowed to access the system's status and configuration using the API. Default: On.
AccessWeb: <On/Off>
Whether members of this group are allowed to log in to the system using the web interface. Default: On.
Enabled: <On/Off>
Indicates if the group is enabled or disabled. Access is denied to members of disabled groups. Default: On.
AdminGroupDelete
329
Cisco ExpresswayAdministrator Guide
Boot
CheckBandwidth
A diagnostic tool that returns the status and route (as a list of nodes and links) that a call of the specified type and bandwidth would
take between two nodes. Note that this command does not change any existing system configuration.
Bandwidth(r): <1..100000000>
CallType(r): <Traversal/NonTraversal>
Example: xCommand CheckBandwidth Node1: "DefaultSubzone" Node2: "UK Sales Office" Bandwidth: 512 CallType:
nontraversal
CheckPattern
A diagnostic tool that allows you to check the result of an alias transform (local or zone) before you configure it on the system.
The alias you want to use to test the pattern match or transform.
Type(r): <Exact/Prefix/Suffix/Regex>
How the pattern string must match the alias for the pattern behavior to be applied.
Behavior(r): <Strip/Leave/Replace/AddPrefix/AddSuffix>
The text string to use in conjunction with the selected Pattern behavior.
Example: xCommand CheckPattern Target: "[email protected]" Pattern: "@a.net" Type: "suffix" Behavior: replace
Replace: "@a.com"
ClearAllStatus
330
Cisco Expressway Administrator Guide
CredentialAdd
Name(r): <String>
Defines the name for this entry in the local authentication database.
Password(r): <Password>
Defines the password for this entry in the local authentication database.
The maximum plaintext length is 128 characters, which will then be encrypted.
CredentialDelete
Name(r): <String>
Cucmconfigadd
Address(r): <Value>
Axlpassword(r): <Value>
Axlusername(r): <Value>
The user name used by the Expressway to access the Unified CM publisher.
CertValidationDisabled: <On/Off>
Controls X.509 certificate checking against the certificate presented by the Unified CM publisher. Default: On
Cucmconfigdelete
Address(r): <Value>
DefaultLinksAdd
Restores links between the Default Subzone, Traversal Subzone and the Default Zone.
331
Cisco ExpresswayAdministrator Guide
DefaultValuesSet
Resets system parameters to default values. Level 1 resets most configuration items to their default value, with the exception of the
Level 2 and Level 3 items. Level 2 resets configuration items related to remote authentication, plus Level 1 items to their default
value. Level 3 resets all critical configuration items, plus Level 1 and Level 2 items to their default value.
Level(r): <1..3>
DisconnectCall
Disconnects a call.
Call: <1..1000>
The serial number of the call to be disconnected. You must specify either a call index or a call serial number.
Dnslookup
Hostname: <Value>
RecordType: <all/a/aaaa/srv/naptr>
The type of record you want to search for. If not specified, all record types are returned.
DNSPerDomainServerAdd
Adds a DNS server to use only for resolving hostnames for specific domains.
Address(r): <Value>
The IP address of the DNS server to use when resolving hostnames for the associated domain names.
Domain1(r): <Value>
Domain2(r): <Value>
Index: <0..5>
332
Cisco Expressway Administrator Guide
DNSPerDomainServerDelete
Deletes a DNS server used for resolving hostnames for a specific domain.
Address: <Value>
DNSServerAdd
Adds a default DNS server. Default servers are used if there is no per-domain DNS server defined for the domain being looked up.
Address(r): <Value>
The IP address of a default DNS server to use when resolving domain names.
Index: <0..5>
DNSServerDelete
Address: <Value>
DomainAdd
The domain name. It can comprise multiple levels. Each level's name can only contain letters, digits and hyphens, with each
level separated by a period (dot). A level name cannot start or end with a hyphen, and the final level name must start with a
letter.
Edgesip: <On/Off>
Endpoint registration, call control and provisioning services are provided by Unified CM. Default: Off.
Edgexmpp: <On/Off>
Instant messaging and presence services for this SIP domain are provided by the Unified CM IM&P service. Default: Off.
Xmppfederation: <On/Off>
Controls whether the domain is available for XMPP federation. Default: Off.
Example: xCommand DomainAdd Name: "100.example-name.com" Authzone: "Traversal zone" Edge: Off
DomainDelete
Deletes a domain.
DomainId(r): <1..200>
333
Cisco ExpresswayAdministrator Guide
Edgessodeletetokens
Username(r): <String>
Edgessopurgetokens
Edgessostatusclear
FeedbackDeregister
ID: <1..3>
FeedbackRegister
Activates notifications on the event or status changes described by the expressions. Notifications are sent in XML format to the
specified URL. Up to 15 expressions may be registered for each of 3 feedback IDs.
ID: <1..3>
ForceConfigUpdate
Forces the relevant configuration on this peer to be updated to match that of the cluster master.
334
Cisco Expressway Administrator Guide
HTTPProxyExtraTargetsAdd
Server(r):<S:1,1024>
The hostname or IP address of an HTTP server that a Jabber client located outside of the enterprise is allowed to access. Access
is granted if the server portion of the client-supplied URI matches the name entered here, or if it resolves via DNS lookup to an IP
address specified here.
Description:<S:0,1024>
HTTPProxyExtraTargetsDelete
Server(r):<S:1,1024>
The hostname or IP address of the HTTP server that you want to remove from the allow list.
HTTPProxyJabberCTargetsAdd
Configures a Jabber Guest Server and associates it with a Jabber Guest domain.
DomainIndex(r): <0..200>
Index of the domain with which this Jabber Guest Server is associated
Host(r): <S:1,1024>
The FQDN of a Jabber Guest Server to use for the selected domain. This must be an FQDN, not an unqualified hostname or an IP
address.
Note that you can specify alternative addresses for the same domain, each with different priorities.
Priority: <0..9>
The order in which connections to this hostname are attempted for this domain. All priority 1 hostnames for the domain are
attempted first, followed by all priority 2 hostnames, and so on.
HTTPProxyJabberCTargetsDelete
Example:
335
Cisco ExpresswayAdministrator Guide
LinkAdd
Specifies the first zone or subzone to which this link will be applied.
Specifies the second zone or subzone to which this link will be applied.
Example: xCommand LinkAdd LinkName: "Subzone1 to UK" Node1: "Subzone1" Node2: "UK Sales Office" Pipe1:
"512Kb ASDL"
LinkDelete
Deletes a link.
LinkId(r): <1..3000>
336
Cisco Expressway Administrator Guide
Locate
Runs the Expressway's location algorithm to locate the endpoint identified by the given alias, searching locally, on neighbors, and
on systems discovered through the DNS system, within the specified number of 'hops'. Results are reported back through the
xFeedback mechanism, which must therefore be activated before issuing this command (e.g. xFeedback register event/locate).
HopCount(r): <0..255>
Protocol(r): <H323/SIP>
The zone from which to simulate the search request. Choose from the Default Zone (an unknown remote system), the Local Zone
(a locally registered endpoint) or any other configured neighbor, traversal client or traversal server zone.
Authenticated: <Yes/No>
The source alias to be used for the search request. Default: xcom-locate
Example: xCommand Locate Alias: "[email protected]" HopCount: 15 Protocol: SIP SourceZone: LocalZone
Authenticated: Yes SourceAlias: [email protected]
Networkinterface
Controls whether the LAN 2 port is enabled for management and call signaling.
DualInterfaces(r): <enable/disable/status>
NTPServerAdd
Address(r): <Value>
The IP address or Fully Qualified Domain Name (FQDN) of the NTP server to add.
NTPServerDelete
Address(r): <Value>
The IP address or Fully Qualified Domain Name (FQDN) of the NTP server to delete.
337
Cisco ExpresswayAdministrator Guide
OptionKeyAdd
Adds a new option key to the Expressway. These are added to the Expressway in order to add extra functionality, such as
increasing the Expressway's capacity. Contact your Cisco representative for further information.
OptionKeyDelete
OptionKeyId(r): <1..64>
Ping
Hostname: <Value>
The IP address or hostname of the host system you want to try to contact.
PipeAdd
TotalMode: <Unlimited/Limited/NoBandwidth>
Controls total bandwidth restrictions for the pipe. NoBandwidth: no calls can be made using this pipe. Default: Unlimited.
Total: <1..100000000>
If this pipe has limited bandwidth, sets the maximum bandwidth (in kbps) available at any one time on the pipe. Default: 500000.
PerCallMode: <Unlimited/Limited/NoBandwidth>
Controls bandwidth restrictions of individual calls. NoBandwidth: no calls can be made using this pipe. Default: Unlimited.
PerCall: <1..100000000> For limited per-call mode, sets the maximum bandwidth (in kbps) available per call. Default: 1920.
Example: xCommand PipeAdd PipeName: "512k ADSL" TotalMode: Limited Total: 512 PerCallMode: Limited PerCall:
128
PipeDelete
Deletes a pipe.
PipeId(r): <1..1000>
338
Cisco Expressway Administrator Guide
PolicyServiceAdd
Protocol: <HTTP/HTTPS>
Specifies the protocol used to connect to the remote service. Default: HTTPS
Verify: <On/Off>
Controls X.509 certificate checking and mutual authentication between this Expressway and the policy service. When enabled,
the server's FQDN or IP address, as specified in the address field, must be contained within the server's X.509 certificate (in
either the Subject Common Name or the Subject Alternative Name attributes). Default: On
CRLCheck: <On/Off>
Controls certificate revocation list checking of the certificate supplied by the policy service. When enabled, the server's X.509
certificate will be checked against the revocation list of the certificate authority of the certificate. Default: Off
Specifies the IP address or Fully Qualified Domain Name (FQDN) of the remote service.
Specifies the path for obtaining the remote service status. Default: status
Specifies the user name used by the Expressway to log in and query the remote service.
The password used by the Expressway to log in and query the remote service. The maximum plaintext length is 30 characters.
The CPL used when the remote service is unavailable. Default: <reject status='403' reason='Service Unavailable'/>
Example: xCommand PolicyServiceAdd Name: "Conference" Description: "Conference service" Protocol: HTTPS
Verify: On CRLCheck: On Address: "service.example.com" Path: "service" StatusPath: "status" UserName:
"user123" Password: "password123" DefaultCPL: "<reject status='403' reason='Service Unavailable'/>"
PolicyServiceDelete
PolicyServiceId(r): <1..20>
339
Cisco ExpresswayAdministrator Guide
RemoteSyslogAdd
Address(r): <Value>
Crlcheck: <On/Off>
Controls whether the certificate supplied by the syslog server is checked against the certificate revocation list (CRL). Default :
Off
Format: <bsd/ietf>
The format in which remote syslog messages are written. Default : bsd
Loglevel: <emergency/alert/critical/error/warning/notice/informational/debug>
The minimum severity of log messages to send to this syslog server. Default: informational.
Mode: <bsd/ietf/ietf_secure/user_defined>
The syslog protocol to use when sending messages to the syslog server. Default: bsd.
Port: <1..65535>
The UDP/TCP destination port to use. Suggested ports: UDP=514 TCP/TLS=6514 Default : 514
Transport: <udp/tcp/tls>
The transport protocol to use when communicating with the syslog server. Default: udp
Example: xCommand RemoteSyslogAdd Address: "remote_server.example.com" Crlcheck: Off Format: bsd Loglevel:
warning Mode: bsd Port: 514 Transport: udp
RemoteSyslogDelete
Address(r): <Value>
The IP address or Fully Qualified Domain Name (FQDN) of the remote syslog server to delete.
Port(r): <1..65535>
Transport(r): <udp/tcp/tls>
Restart
340
Cisco Expressway Administrator Guide
RouteAdd
Specifies an IP address used in conjunction with the prefix length to determine the network to which this route applies. Default:
32
PrefixLength(r): <1..128>
Specifies the number of bits of the IP address which must match when determining the network to which this route applies.
Interface: <Auto/LAN1/LAN2>
The LAN interface to use for this route. Auto: the Expressway will select the most appropriate interface to use. Default: Auto
RouteDelete
Deletes a route.
RouteId(r): <1..50>
SearchRuleAdd
Adds a new search rule to route searches and calls toward a zone or policy service.
The zone or policy service to query if the alias matches the search rule.
Example: xCommand SearchRuleAdd Name: "DNS lookup" ZoneName: "Sales Office" Description: "Send query to the
DNS zone"
SearchRuleDelete
SearchRuleId(r): <1..2000>
341
Cisco ExpresswayAdministrator Guide
Tracepath
Discover the path taken by a network packet sent to a particular destination host system.
Hostname: <Value>
The IP address or hostname of the host system to which you want to trace the path.
Traceroute
Discover the route taken by a network packet sent to a particular destination host system. It reports the details of each router along
the path, and the time taken for each router to respond to the request.
Hostname: <Value>
The IP address or hostname of the host system to which you want to trace the route.
TransformAdd
Type: <Exact/Prefix/Suffix/Regex>
How the pattern string must match the alias for the transform to be applied. Exact: the entire string must exactly match the alias
character for character. Prefix: the string must appear at the beginning of the alias. Suffix: the string must appear at the end of
the alias. Regex: the string is treated as a regular expression. Default: Prefix
Behavior: <Strip/Replace/AddPrefix/AddSuffix>
How the alias is modified. Strip: removes the matching prefix or suffix from the alias. Replace: substitutes the matching part of
the alias with the text in the replace string. AddPrefix: prepends the replace string to the alias. AddSuffix: appends the replace
string to the alias. Default: Strip
The text string to use in conjunction with the selected Pattern behavior.
Priority: <1..65534>
Assigns a priority to the specified transform. Transforms are compared with incoming aliases in order of priority, and the priority
must be unique for each transform. Default: 1
State: <Enabled/Disabled>
Indicates if the transform is enabled or disabled. Disabled transforms are ignored. Default: Enabled
Example: xCommand TransformAdd Pattern: "example.net" Type: suffix Behavior: replace Replace: "example.com"
Priority: 3 Description: "Change example.net to example.com" State: Enabled
342
Cisco Expressway Administrator Guide
TransformDelete
Deletes a transform.
TransformId(r): <1..100>
UcxnConfigAdd
Configures a link to a Cisco Unity Connection server, for use with Mobile and Remote Access.
Address(r): <S:0,1024>
CertValidationDisabled: <On/Off>
If CertValidationDisabled is Off, the Cisco Unity Connection system's FQDN or IP address must be contained within the X.509
certificate presented by that system (in either the Subject Common Name or the Subject Alternative Name attributes of the
certificate). The certificate itself must also be valid and signed by a trusted certificate authority.
DeploymentId: <1..65535>
This Unity Connection publisher is associated with the selected deployment and can only communicate with other members of
the selected deployment. It cannot communicate with members of other deployments.
Password(r): <S:1,1024>
The password used by the Expressway-C to access the Cisco Unity Connection publisher.
Username(r): <S:1,1024>
The username used by the VCS to access the Unity Connection publisher.
UcxnConfigDelete
Address(r): <S:0,1024>
Xmppdelete
Address(r): <Value>
The IP address or Fully Qualified Domain Name (FQDN) of the IM and Presence server to delete.
343
Cisco ExpresswayAdministrator Guide
Xmppdiscovery
Address(r): <Value>
The IP address or Fully Qualified Domain Name (FQDN) of the IM and Presence server to discover.
Axlpassword(r): <Password>
Axlusername(r): <String>
CertValidationDisabled: <On/Off>
Controls X.509 certificate checking against the certificate presented by the IM and Presence publisher. Default: On
ZoneAdd
Type(r): <Neighbor/TraversalClient/TraversalServer/ENUM/DNS>
Determines the nature of the specified zone, in relation to the local Expressway. Neighbor: the new zone will be a neighbor of
the local Expressway. TraversalClient: there is a firewall between the zones, and the local Expressway is a traversal client of the
new zone. TraversalServer: there is a firewall between the zones and the local Expressway is a traversal server for the new
zone. ENUM: the new zone contains endpoints discoverable by ENUM lookup. DNS: the new zone contains endpoints
discoverable by DNS lookup.
ZoneDelete
Deletes a zone.
ZoneId(r): <1..1000>
ZoneList
A diagnostic tool that returns the list of zones (grouped by priority) that would be queried, and any transforms that would be applied,
in a search for a given alias.
Note that this command does not change any existing system configuration.
344
Cisco Expressway Administrator Guide
xStatus ? to return a list of all elements available under the xStatus command
xStatus elements
The current xStatus elements are:
Alarm
Alternates
Applications
Authentication
B2BUACalls
B2buapresencerelayservice
B2buapresencerelayuser
CDR
Cafe
Calls
Cloud
Cluster
CollaborationEdge
EdgeConfigProvisioning
Edgeconfigprovisioning
Edgedomain
Edgeexternalfqdn
Edgesso
ExternalManager
Fail2banjailbannedaddress
Feedback
Firewall
Gwtunnels
H323
HTTPProxy
Hardware
Iptablesacceptedrule
345
Cisco ExpresswayAdministrator Guide
Iptablesrule
License
Links
Mediastatistics
NetworkInterface
Ntpcertificates
Options
PhonebookServer
Pipes
Policy
PortUsage
ResourceUsage
SIP
SipServiceDomains
SipServiceZones
SystemMetrics
SystemUnit
TURN
Teststatus
Time
Traversalserverresourceusage
Tunnels
Warnings
XMPP
Xcps2s
Zones
346
Cisco Expressway Administrator Guide
Call Policy (also known as Admin Policy) to control the allowing, rejecting, routing (with fallback if calls fail)
and forking of calls.
Search rules (policy can be applied for specific dial plan search rules).
Each of these areas can be configured independently of each other as to whether or not to use a policy service. If a
policy service is used, the decisions made by the policy service replace (rather than supplement) those made by the
Expressway.
When configuring policy services:
Up to 3 external policy servers may be specified to provide resiliency (and not load balancing).
Default CPL can be configured, to be processed by the Expressway as a fallback, if the service is not
available.
The status and reachability of the service can be queried via a status path.
More information about policy services, including example CPL, can be found in the External Policy on Expressway
Deployment Guide.
AUTHENTICATED_SOURCE_ALIAS
AUTHENTICATION_USER_NAME
CLUSTER_NAME
DESTINATION_ALIAS
DESTINATION_ALIAS_PARAMS
GLOBAL_CALL-SERIAL_NUMBER GUID
LOCAL_CALL_SERIAL_NUMBER GUID
REGISTERED_ALIAS
SOURCE_ADDRESS
SOURCE_IP
347
Cisco ExpresswayAdministrator Guide
SOURCE_PORT
UNAUTHENTICATED_SOURCE_ALIAS
UTCTIME
ZONE_NAME
Cryptography support
External policy servers should support TLS and AES-256/AES-128/3DES-168.
SHA-1 is required for MAC and Diffie-Hellman / Elliptic Curve Diffie-Hellman key exchange; the Expressway does not
support MD5.
and this will stop the search via that particular search rule.
This default CPL mean that in the event of a loss of connectivity to the policy server, all call requests will be rejected.
If this is not your required behavior then you are recommended to specify alternative default CPL.
We recommend that you use unique reason values for each type of service, so that if calls are rejected it is clear why
and which service is rejecting the request.
348
Cisco Expressway Administrator Guide
Supported RFCs
Expressway supports the following RFCs:
RFC Description
2460 Internet Protocol, Version 6 (IPv6) Specification (partial, static global addresses only)
2560 X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
2833 RTP Payload for DTMF Digits, Telephony Tones and Telephony Signals
349
Cisco ExpresswayAdministrator Guide
RFC Description
3325 Private Extensions to the Session Initiation Protocol (SIP) for Asserted Identity within Trusted Networks
3326 The Reason Header Field for the Session initiation Protocol (SIP)
3327 Session Initiation Protocol (SIP) Extension Header Field for Registering Non-Adjacent Contacts
3489 STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs)
3581 An Extension to the Session Initiation Protocol (SIP) for Symmetric Response Routing
3761 The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application
(ENUM)
3880 Call Processing Language (CPL): A Language for User Control of Internet Telephony Services
3903 Session Initiation Protocol (SIP) Extension for Event State Publication
4443 Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification
4480 RPID: Rich Presence Extensions to the Presence Information Data Format (PIDF)
4787 Network Address Translation (NAT) Behavioral Requirements for Unicast UDP
5104 Codec Control Messages in the RTP Audio-Visual Profile with Feedback (AVPF): Temporary Maximum Media
Stream Bit Rate Request (TMMBR)
350
Cisco Expressway Administrator Guide
RFC Description
5627 Obtaining and Using Globally Routable User Agent URIs (GRUUs) in the Session Initiation Protocol (SIP).
Note that this RFC is only partially supported: Public GRUU is supported; Temporary GRUU is not supported.
5766 Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN)
6156 Traversal Using Relays around NAT (TURN) Extension for IPv6
351
Cisco ExpresswayAdministrator Guide
X8.6.1
X8.6
X8.5.3
X8.5.2
X8.5.1
X8.5
X8.2
X8.1.1
X8.6.1
X8.6.1 is a maintenance release. No new features are introduced.
X8.6
Table 22 Feature history by release number
Cisco DXSeries endpoints over MRA Supported with endpoint Supported with endpoint
version 10.2.4(99) or later version 10.2.4(99) or later
Cisco IPPhone 7800/8800 Series over MRA Preview with endpoint version Preview with endpoint version
10.3.1 or later 10.3.1 or later
352
Cisco Expressway Administrator Guide
Notes:
1. If you are using the Optimize Resources feature with Lync screen sharing, you need TelePresence Conductor
version XC4.0 or later.
2. If you are using the Optimize Resources feature with Lync screen sharing, you need TelePresence Server
version 4.2 or later.
3. Requires Cisco VCSControl for H.323 registrations, not shown in the diagram.
To configure your Cisco Collaboration environment to interoperate with Microsoft Lync, see the Microsoft Lync and
Cisco Expressway Deployment Guide on the Cisco Expressway Series Configuration Guides page.
Hybrid Services
What are Hybrid Services and what do they do?
Cisco Hybrid Services empower cloud-based and premises-based solutions to deliver a more capable, better
integrated collaboration user experience.
When you purchase Hybrid Services you get access to Cloud Collaboration Management an administrative
interface to the Cisco Collaboration Cloud. In Cloud Collaboration Management you can check your organization's
service entitlements and enable features for your users.
The on-premises components of Hybrid Services are called "connectors", and the Expressway software contains a
management connector to manage registration and other connectors.
The management connector is dormant until you register. When you register, the management connector is
automatically upgraded if a newer version is available.
The Expressway then downloads any other connectors that you selected using Cloud Collaboration Management.
They are not started by default and you need to do some configuration before they'll work.
The connectors are not active by default, and will not do anything until you configure and start them. You can do this
on new UI pages that the connectors install on the Expressway.
Connector upgrades are made available through Cloud Collaboration Management, and the management connector
will download the new versions to Expressway when you have authorized the upgrade.
You can also deregister, which disconnects your Expressway from Collaboration Cloud and removes all connectors
and related configuration.
353
Cisco ExpresswayAdministrator Guide
Note:We do not normally advise downgrading Expressway, although we try to ensure that the interface remains
accessible if you are forced to restore a previous version. However, we explicitly do not support a downgrade of the
Expressway software from X8.6 versions while the Expressway is registered for Hybrid Services. If you have to
downgrade, you must deregister from Hybrid Services before you downgrade.
Hybrid Services are continuously developed and may be published more frequently than Expressway. This means that
information about Hybrid Services is maintained on the Hybrid Services help site, and several Expressway interface
pages link out to that site.
System Metrics Collection is a feature on Expressway that publishes system performance statistics, enabling remote
monitoring of performance.
The Expressway collects statistics about the performance of the hardware, OS, and the application, and publishes
these statistics to a remote host (typically a data analytics server) that aggregates the data.
You can configure this feature on Expressway via the web interface or the command line. The configuration from one
peer applies throughout the cluster, so we recommend that you configure it on the master peer if you are monitoring a
cluster.
There is also some configuration required on the remote server; the collectd daemon should be running on the server,
and should have the collectd network plugin configured to listen on an address that can be seen by the clients.
Further details depend on your monitoring environment and are beyond the scope of this information.
You can use the data to generate graphs, aggregate statistics, and analyze performance, using tools such as
Circonus and Graphite.
For more detail, see the Cisco Expressway Serviceability Guide on the Cisco Expressway Series Maintain and
Operate Guides page.
354
Cisco Expressway Administrator Guide
Cisco DX650
Cisco DX80
Cisco DX70
Cisco IP Phone 8800 Series
Cisco IP Phone 7800 Series
When deploying DXSeries or IPPhone 78/8800 Series endpoints to register with Cisco Unified Communications
Manager via Mobile and Remote Access, you need to be aware of the following:
Phone security profile: If the phone security profile for any of these endpoints has TFTPEncrypted Config
checked, you will not be able to use the endpoint via Mobile and Remote Access. This is because the
MRAsolution does not support devices interacting with CAPF(Certificate Authority Proxy Function).
Trust list: You cannot modify the root CAtrust list on these endpoints. Make sure that the Expressway-E's
server certificate is signed by one of the CAs that the endpoints trust, and that the CA is trusted by the
Expressway-C and the Expressway-E.
Bandwidth restrictions: The Maximum Session Bit Rate for Video Calls on the default region on Cisco
Unified Communications Manager is 384 kbps by default. The Default call bandwidth on Expressway-C is also
384 kbps by default. These settings may be too low to deliver the expected video quality for the DXSeries.
(Preview) Multiple Presence Domains / Multiple IM Address Domains via MRA
Jabber 10.6 can be deployed into an infrastructure where users are organized into more than one domain, or into
domains with subdomains. This requires IMand Presence Service 10.0.x (or later).
Limited testing has shown that this feature works via MRA. Hence this feature is in preview with Expressway X8.5.1
and later, pending further testing and full support in a future version of Expressway.
Note: This feature is distinct from the multiple deployments feature released in X8.5. That feature is limited to one
domain per deployment, where all IMand Presence Service clusters within a deployment serve a single domain. This
feature is different because it concerns MRAsupport for all IMand Presence Service clusters within a deployment
serving a common set of one or more Presence domains.
Each new domain impacts the Expressways performance. We currently recommend that you do not exceed 50
domains.
Updated language packs
Language packs are now available for the following languages. The packs include localized web interface and
embedded webhelp.
Japanese
Russian
Korean
Note:These localizations apply to the X8.5.1 versions of the UIand embedded help. They complete the set
announced in the X8.5.3 release notes (Chinese, French, German, and Spanish).
Changes and minor enhancements
The functionality provided by the Interworking option key is now included in the Expressway option key.
There is a new option to modify the SIPTCPconnect timeout (Configuration >Protocols >SIP>Advanced).
The default is 10 seconds.
355
Cisco ExpresswayAdministrator Guide
Mutual TLSauthentication can now be configured for SIPcalls (Configuration >Protocols >SIP). Two new
parameters were added Mutual TLSmode (default Off) and Mutual TLS port (default 5062).
Anew zone parameter called SIP parameter preservation controls whether the SIPURIand Contact
parameters are preserved between the zone and the B2BUA.
Anew zone parameter called Preloaded SIP routes support controls whether the zone processes SIP INVITE
requests that contain the Route header.
There is a new command line option to change the cipher suites used for SIPTLS connections. The command
takes a colon-delimited string of cipher suites (see
https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT). For example, to set the current
Expressway default suite, use:
xConfiguration SIP TLS CipherSuite: ALL:!EXP:!LOW:!MD5:@STRENGTH:+ADH
The diagnostic log now includes two new .xml files, to record the xconfig and xstatus of the Expressway at the
time the log was taken.
The Call Detail Records (CDR) switch has moved from the System >Administration page to the Maintenance
>Logging page.
The CLIcommands xCommand LoginUserAdd and xCommand LoginUserDelete have been replaced by xCommand
CredentialAdd and xCommand CredentialDelete.
The hop count logic has changed so that internal hops between the Expressway application and its B2BUA do
not decrement the hop count.
Several advanced zone parameters have been removed because they are no longer required. These are SIP
SDP attribute line limit mode, SIP SDP attribute line limit length, and SIP Duo Video filter mode.
The Maximum authorizations per period default has increased to 8.
X8.5.3
X8.5.3 is a maintenance release. No new features are introduced. X8.5.3 supersedes X8.5.2.
Cisco DXSeries Supported with Supported with Preview (no KPML) Preview (no KPML)
endpoints over MRA 10.2.4(99) and later 10.2.4(99) and later
Cisco IPPhone Preview (with Preview (with Preview (no KPML) Preview (no KPML)
7800/8800 Series over KPML) KPML)
MRA
356
Cisco Expressway Administrator Guide
X8.5.2
Note:This release has been withdrawn and is no longer available for download.
MRAsupport for new endpoints
Mobile and Remote Access is being expanded to include the following new endpoints.
The DXSeries endpoints are officially supported via MRAif they are running version 10.2.4(99) or later. The Cisco
IPPhone 78/8800 Series endpoints are not yet officially supported via MRA, but they must be running version 10.3.1
or later if you want to preview them with Mobile and Remote Access.
Cisco DX650
Cisco DX80
Cisco DX70
Cisco IP Phone 8800 Series
Cisco IP Phone 7800 Series
When deploying DXSeries or IPPhone 78/8800 Series endpoints to register with Cisco Unified Communications
Manager via Mobile and Remote Access, you need to be aware of the following:
Phone security profile: If the phone security profile for any of these endpoints has TFTPEncrypted Config
checked, you will not be able to use the endpoint via Mobile and Remote Access. This is because the
MRAsolution does not support devices interacting with CAPF(Certificate Authority Proxy Function).
Trust list: You cannot modify the root CAtrust list on these endpoints. Make sure that the Expressway-E's
server certificate is signed by one of the CAs that the endpoints trust, and that the CA is trusted by the
Expressway-C and the Expressway-E.
Bandwidth restrictions: The Maximum Session Bit Rate for Video Calls on the default region on Cisco
Unified Communications Manager is 384 kbps by default. The Default call bandwidth on Expressway-C is also
384 kbps by default. These settings may be too low to deliver the expected video quality for the DXSeries.
KPMLpass-through
With Key Press Markup Language support, phone users outside the network can use endpoint-signaled Unified CM
features like off-hook dial, group call pickup, abbreviated dial and others.
Updated language packs
The web interface and embedded webhelp are localized into the following languages.
Chinese
French
357
Cisco ExpresswayAdministrator Guide
German
Spanish
Japanese
Korean
Russian
This release introduces rate control for successful authorisations, via MRA,of users accessing collaboration
services; this feature applies to SSO-authenticated users as well as non-SSO-authenticated users.
The Single Sign-On feature introduced in X8.5.1 has been further improved in this release. The status
information concerning user tokens has been improved. You can also purge tokens issued to a user, or to all
users, if necessary. The UIfor the SAMLexport feature has been improved.
The cluster database (CDB) resiliency has been improved.
X8.5.1
SSOover MRA
The Expressway-C now defaults to SHA-256 for signing SSOrequests it gives to clients, and you can change it to use
SHA-1 if required. In version X8.5, when the SSOfeature was previewed, the Expressway-C defaulted to SHA-1 and
there was no way to select a different algorithm.
Note:If you were using the SSOfeature with X8.5, this change may cause it to stop working after upgrade to X8.5.1.
You have two options to resolve this: leave the new default on the Expressway-C, and you may need to reconfigure
the IdPto expect requests to be signed with SHA-256 (recommended for better security); the other option is to revert
the Expressway-C's signing algorithm to SHA-1 for your IdP (go to Configuration >Unified Communications
>Identity Providers (IdP), locate your IdProw, then in Actions column click Configure Digest).
Jabber 10.6 File Transfer support
The Cisco Jabber file transfer over MRAlimitation, which was previously documented in Expressway documents, has
now changed as follows:
Peer-to-peer file transfer when using IMand Presence Service and Jabber is unsupported via MRA.
Managed File Transfer (MFT) with IMand Presence Service 10.5.2 (and later) and Jabber 10.6 (and later)
clients is supported via MRA.
File transfer with WebEx Messenger Service and Cisco Jabber is supported via MRA.
Jabber 10.6 can be deployed into an infrastructure where users are organized into more than one domain, or into
domains with subdomains. This requires IMand Presence Service 10.0.x (or later).
Limited testing has shown that this feature works via MRA. Hence this feature is in preview with Expressway X8.5.1
and later, pending further testing and full support in a future version of Expressway.
358
Cisco Expressway Administrator Guide
Note: This feature is distinct from the multiple deployments feature released in X8.5. That feature is limited to one
domain per deployment, where all IMand Presence Service clusters within a deployment serve a single domain. This
feature is different because it concerns MRAsupport for all IMand Presence Service clusters within a deployment
serving a common set of one or more Presence domains.
Each new domain impacts the Expressways performance. We currently recommend that you do not exceed 50
domains.
X8.5
Feature previews
The following features are implemented in this version for the purpose of previewing with dependent systems. They
are not currently supported and should not be relied upon in your production environment. Full support for these
features is planned for a future release of the Expressway software.
(Preview) Single sign-on over MRA
Enables single sign-on (common identity) for SSO-capable clients that are accessing on-premises Unified
Communications services from outside the network.
(Preview) MRAsupport for new endpoints
Mobile and Remote Access is extended in this release to include support for the Cisco DXSeries endpoints, and the
8800 Series and 7800 Series IPphones, registering to Cisco Unified Communications Manager. Some features on the
IPphones, particularly where they rely on DTMF/KPML pass-through, were not available in X8.5. This limitation was
resolved in X8.5.2.
359
Cisco ExpresswayAdministrator Guide
Multiple deployments for partitioning mobile and remote access to Unified Communications
services
This release introduces the concept of "deployments" to the Expressway.
Adeployment is an abstract boundary used to enclose a domain and one or more Unified Communications service
providers, such as Unified CM, Cisco Unity Connection, and IMand Presence Service nodes.
The purpose of multiple deployments is to partition the Unified Communications services available to mobile and
remote access (MRA) users. This enables different subsets of MRAusers to access different sets of services over the
same Expressway pair. We recommend that you do not exceed 10 deployments.
For example, consider an implementation of two sets of Unified Communications infrastructure to provide a live
MRAenvironment and a staging environment, respectively. This implementation might also require an isolated
environment for sensitive communications.
360
Cisco Expressway Administrator Guide
Figure 16 Multiple deployments to partition Unified Communications services accessed from outside the
network
Serviceability improvements
Secure connection checker
This new utility enables you to test whether or not a secure connection can be made from the Expressway. It checks
the validity of certificates presented by the transacting parties, looking for errors that would prevent the secure
connection.
You simply enter an FQDN, hostname, or IPaddress to test the secure connection without otherwise affecting your
configuration.
The feature can be used in the following circumstances:
you are discovering Unified Communications servers / nodes while configuring Mobile and Remote Access,
and wish to test whether TLSor HTTPSwill be possible with the configured nodes
you are configuring a Unified Communications traversal zone, or Secure Traversal zone, between the
Expressway-C and the Expressway-E
You can now filter the logs that Expressway sends to each remote syslog host by severity level.
For example, your syslog host is typically receiving syslog messages from multiple systems, so you may want to limit
Expressway to sending only "Error" messages (and anything more severe) to this host. If you want to leave the host
untouched while troubleshooting a Expressway problem, you could configure a second, temporary, host to receive
"Debug" level (most verbose = messages of all severities). Then you could safely remove the configuration after
resolving the issue, without risking your primary syslog host.
Call detail records (CDRs)
The Expressway now has the ability to record call connections and disconnections. There is a new service that allows
short-lived CDRs to be read from the Expressway by an external system.
There is also an option to log the CDRs more permanently, in which case the CDRs are published as Informational
messages to your syslog host. This option also keeps CDRs for a few days on the event log, but the local data could
rotate quickly.
Note:CDR reporting is best effort and should not be relied upon for accurate billing purposes.
361
Cisco ExpresswayAdministrator Guide
Media statistics
Amedia statistics logging service has been added to this release. When the service is active, up to 2GB of data is
kept locally in a rotating log. The stats are also published as syslog messages for offline storage and analysis. For
each call, the Expressway tracks statistics like packet counts, bitrates, and jitter.
Other changes
Enhancements and usability improvements
You can add static IProutes via the web UI, where previously these could only be added by CLI. There is a
new page System >Network interfaces >Static routes to provide this functionality.
The Certificate Signing Request (CSR) generator now enables you to select the digest algorithm requested for
your certificate. The options are SHA-1, SHA-256 (new default), SHA-384, and SHA-512. In Expressway
versions prior to X8.5.1, the CSRpage had no way to select the algorithm, and the CSR used SHA-1 by
default.
Changed functionality
When changing an administrator account password, the logged in administrator is now required to authorize
the change by entering their own password.
The IPand Ethernet configuration pages have a new menu location. Previously these were System >IPand
System >Ethernet. These pages are now System >Network interfaces >IP and System >Network
interfaces >Ethernet.
The Expressway-C now defaults to SHA-256 for signing SSOrequests it gives to clients, and you can change
it to use SHA-1 if required. In version X8.5, when the SSOfeature was previewed, the Expressway-C
defaulted to SHA-1 and there was no way to select a different algorithm.
Note:If you were using the SSOfeature with X8.5, this change may cause it to stop working after upgrade to
X8.5.1. You have two options to resolve this: leave the new default on the Expressway-C, and you may need
to reconfigure the IdPto expect requests to be signed with SHA-256 (recommended for better security); the
other option is to revert the Expressway-C's signing algorithm to SHA-1 for your IdP (go to Configuration
>Unified Communications >Identity Providers (IdP), locate your IdProw, then in Actions column click
Configure Digest).
X8.2
Unified Communications: Jabber Guest
Cisco Jabber Guest is a consumer to business (C2B) solution that extends the reach of Cisco's enterprise telephony
to people outside of a corporate firewall who do not have phones registered with Cisco Unified Communications
Manager.
External XMPP federation
External XMPP federation enables users registered to Unified CM IM & Presence to communicate via the Expressway-
E with users from a different XMPP deployment.
TURN media over TCP
The Expressway-E TURN server supports TURNmedia over TCP.
This allows clients to use TURN services in environments where UDP connections are not supported or blocked.
Configuration of the supported protocols is available only through the CLI command xConfiguration Traversal
Server TURN ProtocolMode.
362
Cisco Expressway Administrator Guide
This automatically configures an appropriate traversal zone (a traversal client zone when selected on a Expressway-
C, or a traversal server zone when selected on an Expressway-E) that uses SIP TLS with TLS verify mode set to On,
and Media encryption mode set to Force encrypted.
This replaces the previous Unified Communications services setting that was available when configuring traversal
client and traversal server zones. Existing zones configured in previous software versions for Unified
Communications services are automatically converted to use the new Unified Communications traversal zone type.
Note that this zone type applies to the web interface only, the underlying CLI configuration settings have not
changed.
Support for X-cisco-srtp-fallback
Support has been added for the X-cisco-srtp-fallback package, allowing the Expressway's B2BUA to use Cisco
Unified Communications Manager-style best effort media encryption for the automatically generated TLSneighbor
zones.
RTP and RTCP media demultiplexing ports
In Small/Medium systems, 1 pair of RTP and RTCP media demultiplexing ports are used. These can now either be
explicitly specified (Configuration > Traversal > Ports) or they can be allocated from the start of the general range of
traversal media ports. In previous X8 releases they were always allocated from the start of the traversal media ports
range.
In Large systems, 6 pairs of RTP and RTCP media demultiplexing ports are used. These are still always allocated from
the start of the traversal media ports range.
After upgrading to X8.2, all existing traversal media port configurations / firewall requirements are maintained.
Diagnostic logging
The diagnostic logging feature has been extended to include:
an xconfig file
an xstatus file
enabling the tcpdump (if requested) cluster-wide
consolidating all of the files into a single downloadable diagnostic log archive (per peer)
an indication on the web administration page of which user / IP address initiated the logging
The xconfig and xstatus files are taken at the start of the logging process.
SIPREFERsupport
The Expressway B2BUA has SIP REFER message support. A SIP REFER mode advanced zone configuration
parameter has been introduced.
By default it will forward REFER messages, but it can be configured to terminate REFER messages and use the B2BUA
to perform the transfer (typically to a bridge) on behalf of the far endpoint.
Other enhancements and usability improvements
The HTTP server allow list page (used for mobile and remote access clients to access additional web services
inside the enterprise) now displays any automatically configured entries.
You can configure the timeout period for TLS socket handshake (Configuration >Protocols > SIP).
The TURN relay status page (Status > TURN relay usage) now provides a summary list of all the clients that
are connected to the TURN server. From there you can select a specific client to see all of the relays and ports
that it is using.
Ability to copy search rules. You can use the Clone action on the search rules listing page (Configuration
>Dial plan >Search rules) to copy and then edit an existing search rule.
The DNS lookup tool allows you to select which DNS servers (from the configured set of default DNS servers)
to use for the lookup.
The automated protection service now supports IPv6 addresses.
363
Cisco ExpresswayAdministrator Guide
Changed functionality
Access to the systemunit.xml file is now protected. Only authenticated Expressway administrator accounts can
access the file. This may affect the discovery of Expressway by Cisco TMS.
Call status and call history now indicates components routed through the B2BUA for encryption or ICE support with a
component type of 'B2BUA' (formerly 'Encryption B2BUA').
Note:The combination of having static NATmode on and having the B2BUA engaged to do media
encryption/decryption can cause the firewall outside the Expressway-E to mistrust packets originating from the
Expressway-E. You can work around this by configuring the firewall to allow NATreflection. If your firewall cannot
allow this, you must configure the traversal path such that the B2BUAon the Expressway-E is not engaged.
X8.1.1
Unified Communications: mobile and remote access
Cisco Unified Communications mobile and remote access is a core part of the Cisco CollaborationEdge Architecture.
It allows endpoints such as Cisco Jabber to have their registration, call control, provisioning, messaging and
presence services provided by Cisco Unified Communications Manager (Unified CM) when the endpoint is not within
the enterprise network. The Expressway provides secure firewall traversal and line-side support for Unified CM
registrations.
For more information including configuration recommendations and troubleshooting details, see Unified
Communications: Mobile and Remote Access via Expressway Deployment Guide.
Support to modify Maximum transmission unit (MTU) size
You can configure the maximum transmission unit (MTU) for each network interface on the System >IP page.
Diagnostic logging
The tcpdump facility has been removed from the Diagnostic logging tool.
Jabber Guest
Jabber Guest support has been removed (it was previously provided as a feature preview in X8.1). It will be
reintroduced in a future release of Expressway software.
Related Documentation
The following table lists documents and web sites referenced in this document, and other supporting documentation.
All documentation for the latest version of Expressway can be found at www.cisco.com.
Title Link
364
Cisco Expressway Administrator Guide
Title Link
DNS and BIND Fourth Edition, Albitz and Liu, OReilly and Associates, ISBN: 0-
596-00158-4
ITU Specification: H.235 Security and encryption for H-Series multimedia http://www.itu.int/rec/ T-REC-
terminals H.235/en
ITU Specification: H.350 Directory services architecture for multimedia http://www.itu.int/rec/ T-REC-
conferencing H.350/en
RFC 2782: A DNS RR for specifying the location of services (DNS SRV) http://tools.ietf.org/html/rfc2782
RFC 2915: The Naming Authority Pointer (NAPTR) DNS Resource Record http://tools.ietf.org/html/rfc2915
RFC 3263: Session Initiation Protocol (SIP): Locating SIP Servers http://tools.ietf.org/html/rfc3263
RFC 3326: The Reason Header Field for the Session Initiation Protocol (SIP) http://tools.ietf.org/html/rfc3326
RFC 3327: Session Initiation Protocol (SIP) Extension Header Field for http://tools.ietf.org/html/rfc3327
Registering Non-Adjacent Contacts
RFC 3489: STUN - Simple Traversal of User Datagram Protocol (UDP) Through http://tools.ietf.org/html/rfc3489
NATs
365
Cisco ExpresswayAdministrator Guide
Title Link
RFC 3761: The E.164 to URI Dynamic Delegation Discovery System (DDDS) http://tools.ietf.org/html/rfc3761
Application (ENUM)
RFC 3880: Call Processing Language (CPL): A Language for User Control of http://tools.ietf.org/html/rfc3880
Internet Telephony Services
RFC 4028: Session Timers in the Session Initiation Protocol (SIP) http://tools.ietf.org/html/rfc4028
RFC 4787: Network Address Translation (NAT) Behavioral Requirements for http://tools.ietf.org/html/rfc4787
Unicast UDP
RFC 5627: Obtaining and Using Globally Routable User Agent URIs (GRUUs) in http://tools.ietf.org/html/rfc5627
SIP
Traversal Using Relays around NAT (TURN): Relay Extensions to Session http://tools.ietf.org/html/rfc5766
Traversal Utilities for NAT (STUN)
366
Cisco Expressway Administrator Guide
Legal Notices
Copyright Notice
The product that is covered by this Administrator Guide is protected under copyright, patent, and other intellectual
property rights of various jurisdictions.
This product is Copyright 2014, Tandberg Telecom UK Limited. All rights reserved.
TANDBERG is now part of Cisco. Tandberg Telecom UK Limited is a wholly owned subsidiary of Cisco Systems, Inc.
This product includes copyrighted software licensed from others. A list of the licenses and notices for open source
software used in this product can be found at: http://www.cisco.com/en/US/products/ps13435/products_licensing_
information_listing.html.
This product includes software developed by Computing Services at Carnegie Mellon University
(http://www.cmu.edu/computing/).
This product includes software developed by the University of California, Berkeley and its contributors.
IMPORTANT: USE OF THIS PRODUCT IS SUBJECT IN ALL CASES TO THE COPYRIGHT RIGHTS AND THE TERMS AND
CONDITIONS OF USE REFERRED TO ABOVE. USE OF THIS PRODUCT CONSTITUTES AGREEMENT TO SUCH TERMS
AND CONDITIONS.
AVC Video License
With respect to each AVC/H.264 product, we are obligated to provide the following notice:
This product is licensed under the AVC patent portfolio license for the personal use of a consumer or other uses in
which it does not receive remuneration to (i) encode video in compliance with the AVC standard (AVC video) and/or
(ii) decode AVC video that was encoded by a consumer engaged in a personal activity and/or was obtained from a
video provider licensed to provide AVC video. No license is granted or shall be implied for any other use. Additional
information may be obtained from MPEGLA, L.L.C.
See http://www.mpegla.com.
Accordingly, please be advised that service providers, content providers, and broadcasters are required to obtain a
separate use license from MPEG LA prior to any use of AVC/H.264 encoders and/or decoders.
Patent Information
This product is covered by one or more of the following patents:
US7,512,708
EP1305927
EP1338127
367
Cisco Legal Information
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE
WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED
TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST
TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE
INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS
REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR
CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of
California, Berkeley (UCB) as part of UCBs public domain version of the UNIX operating system. All rights reserved.
Copyright 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE
SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL
WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING,
USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR
INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA
ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual
addresses and phone numbers. Any examples, command display output, network topology diagrams, and other
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone
numbers in illustrative content is unintentional and coincidental.
All printed copies and duplicate soft copies are considered un-Controlled copies and the original on-line version
should be referred to for latest version.
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco
website at www.cisco.com/go/offices.
2015 Cisco Systems, Inc. All rights reserved.
Cisco Trademark
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other
countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks
mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
368
Cisco Expressway Administrator Guide
369