Mobile Remote Access Via Expressway Deployment Guide X8 11 4 PDF
Mobile Remote Access Via Expressway Deployment Guide X8 11 4 PDF
Expressway
Deployment Guide
First Published: April 2014
Last Updated: April 2019
2
Contents
Preface 5
Change History 5
This Guide also Applies for the VCS 6
Related Documentation 7
Mobile and Remote Access Overview 9
Deployment Scope 10
Mobile & Remote Access Ports 10
Jabber Client Connectivity Without VPN 10
Deployment Scenarios 11
Single Network Elements 11
Single Clustered Network Elements 12
Multiple Clustered Network Elements 12
Hybrid Deployment 13
Unsupported Deployments 13
Key Supported and Unsupported Features with Mobile and Remote Access 16
Clients and Endpoints Supported with MRA 16
Known Unsupported Client and Endpoint Features 16
Unsupported Expressway Features and Limitations 18
Configuration Prerequisites 19
Required Versions 19
Configuration Recommendations and Requirements 20
Expressway Configuration Summary 24
Unified Communications Prerequisites 25
Configuring a Secure Traversal Zone Connection for Unified Communications 25
Server Certificate Requirements for Unified Communications 27
Configuring Mobile and Remote Access on Expressway 31
Installing Expressway Security Certificates and Setting Up a Secure Traversal Zone 31
Setting Up the Expressway-C for Mobile and Remote Access 31
Discover Unified Communications Servers and Services for Mobile and Remote Access 33
Configuring MRA Access Control 38
Checking the Status of Unified Communications Services 43
About the HTTP Allow List on Expressway-C 43
Setting Up the Expressway-E for Mobile and Remote Access 45
SAML SSO Authentication Over the Edge 46
Using Deployments to Partition Unified Communications Services 52
Dial via Office-Reverse through MRA 54
Built-in-Bridge Recording through MRA 56
Enabling Support for Apple Push Notifications (APNS) 58
Additional Information 60
Maintenance Mode on the Expressway 60
3
Mobile and Remote Access Through Cisco Expressway Deployment Guide
4
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Preface
Preface
Change History
Table 1 Mobile and Remote Access Through Cisco ExpresswayDeployment Guide Change History
April 2019 Update DNS section that URL for Cisco Meeting Server Web Proxy and MRA Clarification
domain cannot be the same.
March Clarify that refresh of discovered nodes prevents devices connecting to Clarification
2019 MRA during the refresh.
December Update Limitation regarding chat/messaging services over MRA with OAuth External software
2018 refresh plus IM and Presence Service presence redundancy groups. version change
November Correct omission in document (add to limitations some caveats about Clarification
2018 recording over MRA).
September Updated for X8.11.2 (change to limitations for chat/messaging if user X8.11.2 release
2018 authentication by OAuth refresh).
September Updated for Webex and Spark platform rebranding, and for X8.11.1 X8.11.1 release
2018 maintenance release.
Clarification
Also add to Unsupported Expressway Features and Limitations section, a
known issue with chat/messaging services over MRA if user authentication
is by OAuth refresh (self-describing tokens).
July 2018 Include Hunt Group support, subject to Cisco Unified Communications Software dependency
Manager 11.5(1)SU5 or later fixed version. change
July 2018 Updated for X8.11. Also removed port reference topic, which is now X8.11 release
available in the Cisco Expressway IP Port Usage Guide.
May 2018 Clarify MFT over MRA is not supported when using an unrestricted version of Clarification
IM and Presence Service.
December Add configuration step to enable SIP protocol (disabled by default on new Content defect
2017 installs).
November Clarify which Cisco IP Phones in the 88xx series support MRA Content defect
2017 (Configuration Overview section).
September Add links to information about supported features for MRA-connected Content enhancement
2017 endpoints. Add information about Collaboration Solutions Analyzer.
August Deskphone control functions bullet removed from "Unsupported Contact Content defect
2017 Center Features" as not applicable.
July 2017 Clarify required versions for Unified Communications software. Corrected Content defect
duplicated prerequisites for Push Notifications feature.
April 2017 Added details on partial support for Cisco Jabber SDK features. Content defect
5
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Preface
Table 1 Mobile and Remote Access Through Cisco ExpresswayDeployment Guide Change History (continued)
January Updated section on unsupported features when using MRA. Added X8.9.1 release
2017 description of Maintenance Mode. Clarified that Expressway-C and
Expressway-E need separate IP addresses.
September Unsupported deployments section updated. Minimum versions note about Clarification to avoid
2016 TLS added. misconfiguration
August Updated DNS prerequisite to create reverse lookup entries for Expressway-E Customer found defect
2016
February Troubleshooting topic updated with information about CSCux16696. Notable issue
2016 Republished with X8.7.1. discovered post X8.7
but not yet fixed in
X8.7.1.
June 2015 Updated. Note about internal DNS lookups for UC nodes. X8.5.3 release
April 2015 Information about authorization rate control and document defects X8.5.2 release
addressed.
December Added new features and corrections from X8.2 version. X8.5 release
2014
August Re-issued X8.1.1 version of this document with shared line limitation, as per Content defect
2014 X8.2 version.
July 2014 Re-issued with updated client support details and a media encryption Content defect
limitation removed.
July 2014 Re-issued with updated firewall advice and unsupported deployment. Content defect
6
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Preface
Related Documentation
Information contained in the following documents and sites may be required to assist in setting up your Unified
Communications environment:
7
Mobile and Remote Access Through Cisco Expressway Deployment Guide
8
Mobile and Remote Access Through Cisco Expressway Deployment Guide
■ Off-premises access: a consistent experience outside the network for Jabber and EX/MX/SX Series clients
■ Security: secure business-to-business communications
■ Cloud services: enterprise grade flexibility and scalable solutions providing rich Cisco Webex integration and
service provider offerings
■ Gateway and interoperability services: media and signaling normalization, and support for non-standard
endpoints
Note: Third-party SIP or H.323 devices can register to the Expressway-C and, if necessary, interoperate with Unified
CM-registered devices over a SIP trunk.
Unified CM provides call control for both mobile and on-premises endpoints.
9
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Signaling traverses the Expressway solution between the mobile endpoint and Unified CM. Media traverses the
Expressway solution and is relayed between endpoints directly.
All media is encrypted between the Expressway-C and the mobile endpoint.
Deployment Scope
The following major Expressway-based deployments do not work together. They cannot be implemented together on
the same Expressway (or traversal pair):
Note: Cisco Jabber Video for TelePresence (Jabber Video) does not work with MRA, although it is supported as a
general client registered to Expressway.
10
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Deployment Scenarios
Deployment Scenarios
This section describes the supported deployment environments:
Note: The only supported Mobile and Remote Access deployments are based on one-to-one Unified Communications
zones between Expressway-C clusters and Expressway-E clusters.
11
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Deployment Scenarios
■ Jabber clients can access their own cluster through any route.
■ Expressway-C uses round robin to select a node (publisher or subscriber) when routing home cluster discovery
requests.
■ Each combination of Unified CM and IM and Presence Service clusters must use the same domain.
■ Intercluster Lookup Service (ILS) must be active on the Unified CM clusters.
■ Intercluster peer links must be configured between the IM and Presence Service clusters, and the Intercluster
Sync Agent (ICSA) must be active.
12
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Deployment Scenarios
Hybrid Deployment
In this scenario, IM and Presence services for Jabber clients are provided via the WebEx cloud.
Unsupported Deployments
VPN Links
VPN links, between the Expressway-C and the Unified CM services / clusters, are not supported.
13
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Deployment Scenarios
Explicitly, we do not support VCS Control traversal to Expressway-E, nor do we support Expressway-C traversal to
VCS Expressway.
Unclustered or Many-to-One Traversal Connections
We do not support Unified Communications zones from one Expressway-C cluster to multiple unclustered
Expressway-Es.
We also do not support multiple Unified Communications zones from one Expressway-C cluster to multiple
Expressway-Es or Expressway-E clusters.
14
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Deployment Scenarios
You could potentially place the Expressway-C in a DMZ that does not use static NAT, but we strongly discourage this
deployment because it requires a lot of management on the inmost firewall. We always recommend placing the
Expressway-C in the internal network.
15
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Key Supported and Unsupported Features with Mobile and Remote Access
■ Supported clients and endpoints. Where to get information about MRA-compatible devices, and what features
they support when connected over MRA.
■ Key unsupported features for clients and endpoints. Lists client/endpoint features that are known not to work
in certain MRA situations. This is not an exhaustive list. For full details refer to the documentation for the
endpoint or client concerned.
■ Unsupported Expressway features that are known not to work in certain MRA situations.
■ Jabber clients
See Supported Services in the Remote Access section, Planning Guide for Cisco Jabber (for your version) on
the Install and Upgrade Guides page.
■ IP Phone 7800 Series
See Phone Features Available for Mobile and Remote Access Through Expressway in the Phone Features and
Setup chapter, Cisco IP Phone 7800 Series Administration Guide for Cisco Unified Communications Manager
on the Maintain and Operate Guides page.
■ IP Phone 8811, 8841, 8845, 8861 and 8865
See Phone Features Available for Mobile and Remote Access Through Expressway in the Phone Features and
Setup chapter, Cisco IP Phone 8800 Series Administration Guide for Cisco Unified Communications Manager
on the Maintain and Operate Guides page.
■ This item applies if you have multiple IM and Presence Service clusters configured on Cisco Expressway-C,
and some of them run software earlier than version 11.5n. In this case, because Cisco Expressway-C may
select any cluster (round robin approach), it might select a cluster on an older software version. If so, IM and
Presence Service features that require 11.5 are unavailable for endpoints connected over MRA.
■ These limitations exist for recording over MRA connections:
— Recording only works for direct person-to-person calls, not for conferences. This includes Built-in-Bridge
(BiB) recording.
— Recording is not currently supported for the Silent Monitoring and Whisper Coaching features.
— Call recording for Cisco Jabber endpoints has the following limitations (which also apply on premises):
• Cisco Unified Communications Manager does not allow Jabber mobile devices to be CTI-monitored.
• Jabber does not support injecting recording tones into the media stream.
16
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Key Supported and Unsupported Features with Mobile and Remote Access
■ For supported Cisco Jabber clients connected over MRA, the E911NotificationURL feature requires a static
HTML page for the notification, to ensure that the web page renders correctly. Scripts and link tags are not
supported.
■ Directory access mechanisms other than the Cisco User Data Service (UDS) are not supported for Jabber
clients over MRA.
■ Endpoint failover behavior:
— Cisco Jabber clients support IM and Presence Service failover over MRA. However, they don't support any
other type of MRA-related redundancy or failover—including SIP, voicemail, and User Data Services (UDS).
The clients use a single UDS server only.
Note: This also applies on premises, and not just over MRA.
— If an Expressway-C or Expressway-E node fails, active MRA calls through the failed Expressway node will
be lost. This applies to all device types, including Jabber clients.
SIP registration failover is supported over MRA, for Cisco IP Phones and devices running TC or CE software.
This includes failure of Cisco Expressway-C, Cisco Expressway-E, or a Cisco Unified Communications
Manager node. SIP registration failover is subject to certain conditions:
If an Expressway node fails, another active node must be available in the Expressway cluster.
To support Cisco Unified Communications Manager failover over MRA, Cisco IP Phones need clustered
Expressway-C and Expressway-E servers. Devices running TC or CE software do not need clustered
Expressway servers for this case.
■ Cisco Jabber 12.5 or later is needed if you want chat/messaging services over MRA with authentication using
OAuth refresh (self-describing tokens) and you configure IM and Presence Service presence redundancy
groups. With this release of Expressway, user login failures will occur in this scenario if Jabber versions before
12.5 are in use.
■ These limitations exist for recording over MRA connections, including for Built-in-Bridge (BiB) recording:
— Recording only works for direct person-to-person calls, and not for conferences.
— Recording is not currently supported for Silent Monitoring and Whisper Coaching features.
■ The Expressway does not encrypt the iX protocol on behalf of other entities. So iX must be encrypted end to
end, with the endpoints and conferencing server doing the encryption, or it must be unencrypted end to end.
Note: For iX to work over MRA, the iX-capable endpoints must use encrypted phone security profiles and the
conferencing server must be capable of encrypted iX.
■ Certificate provisioning to remote endpoints is not supported over MRA. For example, the Certificate Authority
Proxy Function (CAPF). If you can do the first-time configuration on premises (inside the firewall) including
CAPF enrolment, then these endpoints can use encrypted TFTP configuration files over MRA. But you can't do
the CAPF enrolment over MRA, so you must bring the endpoints back on-premises for subsequent certificate
operations.
■ Features that rely on the SIP UPDATE method (RFC 3311) will not work as expected, because the Expressway
does not support this method. For example, Unified CM and endpoints use UPDATE to implement blind
transfer, which does not work correctly over MRA.
■ Peer-to-peer file transfer when using IM and Presence Service and Jabber is not supported over MRA.
■ Managed File Transfer (MFT) over MRA is supported when using IM and Presence Service 10.5.2 and later and
Jabber 10.6 and later clients. MFT over MRA is not supported when using an unrestricted version of IM and
Presence Service.
■ File transfer with WebEx Messenger Service and Cisco Jabber is supported.
■ Additional mobility features including GSM handoff and session persistence are not supported over MRA.
■l Hunt groups (including hunt pilots and hunt lists) are supported over MRA when using Cisco Unified
Communications Manager version 11.5(1)SU5, or any later version that has the relevant change.
■ The Cisco Unified Communications Self Care Portal is not supported over MRA.
17
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Key Supported and Unsupported Features with Mobile and Remote Access
18
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Configuration Prerequisites
Configuration Prerequisites
This section summarizes the steps to configure the Unified Communications system for Mobile and Remote Access
(MRA). It assumes that the following items are already set up:
■ A basic Expressway-C and Expressway-E configuration, as specified in the following document. (The
document describes the networking options for deploying Expressway-E in the DMZ.)
— For Expressway: Expressway Basic Configuration (Expressway-C with Expressway-E) Deployment Guide
— For VCS: Cisco VCS Basic Configuration (Control with Expressway) Deployment Guide
■ Unified CM and IM and Presence Service are configured as specified in Configuration and Administration of IM
and Presence Service on Cisco Unified Communications Manager (for your version), at Cisco Unified
Communications Manager Configuration Guides
Required Versions
MRA through Cisco Expressway requires the following components. These are minimum requirements, and some
individual MRA features need later software versions (specified where applicable in the relevant part of the guide).
Notable features that have later software version dependencies, include OAuth token authentication and Push
Notifications.
19
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Configuration Prerequisites
Considerations for Android-based DX650, DX80, and DX70 devices and supported IP Phone 7800/8800 models
If you deploy these devices to register with Cisco Unified Communications Manager through MRA, be aware of the
following points. For DX endpoints, these considerations only apply to Android-based devices and do not apply to
DX70 or DX80 devices running CE software:
■ Trust list: You cannot modify the root CA trust list on IP Phone 7800/8800 devices. Make sure that the
Expressway-E's server certificate is signed by one of the CAs that the devices trust, and that the CA is trusted
by the Expressway-C and the Expressway-E.
■ Off-hook dialling: The way KPML dialing works between these devices and Unified CM means that you need
CUCM 10.5(2)SU2 or later to be able to do off-hook dialing via MRA. You can work around this dependency by
using on-hook dialing.
IP Addresses
Assign separate IP addresses to the Expressway-C and the Expressway-E. Do not use a shared address for both
elements, as the firewall cannot distinguish between them.
Network Domain
We strongly recommend configuring your network servers as a single domain, for both internal and external access.
DNS
SRV Records
This section summarizes the public (external) and local (internal) DNS requirements for MRA. For more information,
see the Cisco Jabber Planning Guide for your version on the Jabber Install and Upgrade Guides page.
Important! From version X8.8 onward, you must create forward and reverse DNS entries for all Expressway-E
systems, so that systems making TLS connections to them can resolve their FQDNs and validate their
certificates.
Public DNS (external domains)
The public, external DNS must be configured with _collab-edge._tls.<domain> SRV records so that endpoints can
discover the Expressway-Es to use for Mobile and Remote Access. You also need SIP service records for general
deployment (not specifically for MRA). For example, for a cluster of 2 Expressway-E systems:
20
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Configuration Prerequisites
You must create internal DNS records, for both forward and reverse lookups, for all Unified Communications nodes
used with MRA. This allows Expressway-C to find the nodes when IP addresses or hostnames are used instead of
FQDNs.
Ensure that the cisco-uds SRV records are NOT resolvable outside of the internal network, otherwise the Jabber
client will not start MRA negotiation via the Expressway-E.
URL for Cisco Meeting Server Web Proxy and MRA domain cannot be the same
If you use both the CMS Web Proxy service and MRA on the same Expressway, the following configuration items must
be assigned different values per service. If you try to use the same value, the service that was configured first will
work, but the other one will fail:
■ MRA domain(s). The domain(s) configured on Expressway and enabled for Unified CM registration.
■ CMS Web Proxy URL link. Defined in the Expressway Guest account client URI setting on Expressway's
Configuration > Unified Communications > Cisco Meeting Server page.
Firewall
■ Ensure that the relevant ports have been configured on your firewalls between your internal network (where
the Expressway-C is located) and the DMZ (where the Expressway-E is located) and between the DMZ and
the public internet. See the Cisco Expressway IP Port Usage Configuration Guide, for your version, on the
Cisco Expressway Series configuration guides page.
■ Do not use a shared address for the Expressway-E and the Expressway-C, as the firewall cannot distinguish
between them. If you use static NAT for IP addressing on the Expressway-E, make sure that any NAT
operation on the Expressway-C does not resolve to the same traffic IP address. We do not support shared NAT
addresses between Expressway-E and Expressway-C.
■ If your Expressway-E has one NIC enabled and is using static NAT mode, the following requirement applies:
You must enter the FQDN of the Expressway-E, as it is seen from outside the network, as the peer address on
the Expressway-C's secure traversal zone. The reason for this is that in static NAT mode, the Expressway-E
requests that incoming signaling and media traffic should be sent to its external FQDN, rather than its private
name.
This also means that the external firewall must allow traffic from the Expressway-C to the Expressway-
E's external FQDN. This is known as NAT reflection, and may not be supported by all types of firewalls.
For more information, see the Advanced network deployments appendix in the following document:
— For Expressway: Expressway Basic Configuration (Expressway-C with Expressway-E) Deployment Guide
— For VCS: Cisco VCS Basic Configuration (Control with Expressway) Deployment Guide
Bandwidth Restrictions
The Maximum Session Bit Rate for Video Calls on the default region on Cisco Unified Communications Manager is
384 kbps by default. The Default call bandwidth on Expressway-C is also 384 kbps by default. These settings may be
too low to deliver the expected video quality for MRA-connected devices.
21
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Configuration Prerequisites
Mutual authentication is optional, and these devices are not required to provide client certificates. If you do want to
configure mutual TLS, you cannot use CAPF enrolment to provision the client certificates. Instead, manually apply the
certificates to the devices. The client certificates must be signed by an authority that is trusted by the Expressway-E.
Jabber Clients
Jabber clients verify the identity of the Expressway-E they are connecting to by validating its server certificate. To do
this, they must have the certificate authority that was used to sign the Expressway-E's server certificate in their list of
trusted CAs.
Jabber uses the underlying operating system's certificate mechanism:
Unified CM
1. If you have multiple Unified CM clusters, you must confgure ILS (Intercluster Lookup Service) on all of the
clusters. The Expressway needs to communicate with each user's home Unified CM cluster, and to discover
the home cluster it sends a UDS (User Data Service) query to any one of the Unified CM nodes.
For details, search for "Intercluster Lookup Service" in the Unified CM documentation for your version.
2. Ensure that the Maximum Session Bit Rate for Video Calls between and within regions (System > Region
Information > Region) is set to a suitable upper limit for your system, for example 6000 kbps.
22
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Configuration Prerequisites
3. These items apply to the Phone Security Profiles in Unified CM (System > Security > Phone Security Profile):
a. If a Phone Security Profile has TFTP Encrypted Config checked, you can't use these devices through
MRA. The MRA solution does not support devices interacting with CAPF (Certificate Authority Proxy
Function).
b. Phone Security Profiles that are configured for TLS and used for devices requiring remote access must
have a Name in the form of an FQDN that includes the enterprise domain. For example,
jabber.secure.example.com. (This is because those names must be present in the list of Subject Alternate
Names in the Expressway-C's server certificate.)
Note: Secure profiles must set Device Security Mode to Encrypted, because the Expressway does not
allow unencrypted TLS connections. When Device Security Mode is set to Authenticated, Unified CM
only offers the NULL-SHA cipher suite, which the Expressway rejects.
4. If Unified CM servers (System > Server) are configured by Host Name (rather than IP address), then ensure
that those host names are resolvable by the Expressway-C.
5. If you are using secure profiles, ensure that the root CA of the authority that signed the Expressway-C
certificate is installed as a CallManager-trust certificate (Security > Certificate Management in the Cisco
Unified OS Administration application).
6. Ensure that the Cisco AXL Web Service is active on the Unified CM publishers you will be using to discover
the Unified CM servers that are to be used for remote access. To check this, select the Cisco Unified
Serviceability application and go to Tools > Service Activation.
7. Ensure that the IP Addressing Mode for all MRA-configured devices is set to IPV4_ONLY.
23
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Configuration Prerequisites
8. We recommend that MRA devices are configured to use publicly accessible NTP servers, either directly or by
Device Mobility.
a. Configure a public NTP server System > Phone NTP Reference.
b. Add the Phone NTP Reference to a Date/Time Group (System > Date/Time Group).
c. Assign the Date/Time Group to the Device Pool of the endpoint (System > Device Pool).
1. Ensure that System host name and Domain name are specified for every Expressway, and that all Expressway
systems are synchronized to a reliable NTP service.
Note: The hostname can contain only letters, digits, hyphens, and underscores. The first character must be a
letter, and the last character must be a letter or a digit.
2. Enable the SIP protocol on the Expressway-E and on the Expressway-C.
(SIP is disabled by default on new installs.)
3. [Recommended] Disable automated intrusion protection on the Expressway-C and configure it on
Expressway-E.
From X8.9, this feature is enabled by default on new installations. See Expressway Automated Intrusion
Protection, page 63.
4. Set Unified Communications mode to Mobile and Remote Access.
5. Configure the Unified CM, IM and Presence Service, and Cisco Unity Connection servers on the Expressway-
C.
6. Configure the domains on the Expressway-C for which services are to be routed to Unified CM.
7. [Optional] Create additional deployments and associate domains and UC services with them.
8. Install appropriate server certificates and trusted CA certificates.
9. Configure a Unified Communications traversal zone connection between the Expressway-E and the
Expressway-C.
10. If required, configure the HTTP server allow list for any web services inside the enterprise that need to be
accessed from remote Jabber clients.
11. [Optional] Configure SSO over collaboration edge, to allow for common identity between external Jabber
clients and the users' Unified CM profiles
Configuration changes on the Expressway generally take immediate effect. If a system restart or other action is
required, you are notified through a banner message or an alarm.
24
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Note: Configure only one Unified Communications traversal zone per Expressway traversal pair. That is, one Unified
Communications traversal zone on the Expressway-C cluster, and one corresponding Unified Communications
traversal zone on the Expressway-E cluster.
1. Install a suitable server certificate on both the Expressway-C and the Expressway-E.
— The certificate must include the Client Authentication extension. The system will not let you upload a server
certificate without this extension when Unified Communications features are enabled.
— The Expressway includes a built-in mechanism to generate a certificate signing request (CSR) and is the
recommended method for generating a CSR:
• Ensure that the CA that signs the request does not strip out the client authentication extension.
• The generated CSR includes the client authentication request and any relevant subject alternate names
for the Unified Communications features that have been enabled (see Server Certificate Requirements
for Unified Communications, page 27).
— To generate a CSR and /or to upload a server certificate to the Expressway, go to Maintenance > Security
> Server certificate. You must restart the Expressway for the new server certificate to take effect.
2. Install on both Expressways the trusted Certificate Authority (CA) certificates of the authority that signed the
Expressway's server certificates.
There are additional trust requirements, depending on the Unified Communications features being deployed.
For Mobile and Remote Access deployments:
— The Expressway-C must trust the Unified CM and IM&P tomcat certificate.
— If appropriate, both the Expressway-C and the Expressway-E must trust the authority that signed the
endpoints' certificates.
For Jabber Guest deployments:
— When the Jabber Guest server is installed, it uses a self-signed certificate by default. However, you can
install a certificate that is signed by a trusted certificate authority. You must install on the Expressway-C
either the self-signed certificate of the Jabber Guest server, or the trusted CA certificates of the authority
that signed the Jabber Guest server's certificate.
To upload trusted Certificate Authority (CA) certificates to the Expressway, go to Maintenance > Security >
Trusted CA certificate. You must restart the Expressway for the new trusted CA certificate to take effect.
See Cisco Expressway Certificate Creation and Use Deployment Guide on the Expressway configuration guides page.
25
Mobile and Remote Access Through Cisco Expressway Deployment Guide
■ The Expressway-C and Expressway-E must be configured with a zone of type Unified Communications
traversal. This automatically configures an appropriate traversal zone (a traversal client zone when selected
on Expressway-C or a traversal server zone when selected on Expressway-E) that uses SIP TLS with TLS
verify mode set to On, and Media encryption mode set to Force encrypted.
■ Both Expressways must trust each other's server certificate. As each Expressway acts both as a client and as
a server you must ensure that each Expressway’s certificate is valid both as a client and as a server.
■ If an H.323 or a non-encrypted connection is also required, a separate pair of traversal zones must be
configured.
To set up a secure traversal zone, configure your Expressway-C and Expressway-E as follows:
26
Mobile and Remote Access Through Cisco Expressway Deployment Guide
3. Configure the fields as follows (leave all other fields with default values):
Expressway-C Expressway-E
SIP section
Port Must match the Expressway- 7001 (default. See the Cisco Expressway IP
E setting. Port Usage Configuration Guide, for your
version, on the Cisco Expressway Series
configuration guides page.)
TLS verify subject name Not applicable Enter the name to look for in the traversal
client's certificate (must be in either the
Subject Common Name or the Subject
Alternative Name attributes). If there is a
cluster of traversal clients, specify the cluster
name here and ensure that it is included in
each client's certificate.
Authentication section
Location section
27
Mobile and Remote Access Through Cisco Expressway Deployment Guide
■ CallManager certificate
■ tomcat certificate
These certificates are automatically installed on the Cisco Unified Communications Manager and by default they are
self-signed and have the same common name (CN).
We recommend using CA-signed certificates. However, if you do use self-signed certificates, the two certificates
must have different common names. The Expressway does not allow two self-signed certificates with the same CN.
So if the CallManager and tomcat self-signed certificates have the same CN in the Expressway's trusted CA list, the
Expressway can only trust one of them. This means that either secure HTTP or secure SIP, between Expressway-C
and Cisco Unified Communications Manager, will fail.
Also, when generating tomcat certificate signing requests for any products in the Cisco Collaboration Systems
Release 10.5.2, you need to be aware of CSCus47235. You need to work around this issue to ensure that the
FQDNs of the nodes are in the certificates as Subject Alternative Name (SAN) entries. The Expressway X8.5.3
Release Note on the Release Notes page has details of the workarounds.
■ cup-xmpp certificate
■ tomcat certificate
We recommend using CA-signed certificates. However, if you do use self-signed certificates, the two certificates
must have different common names. The Expressway does not allow two self-signed certificates with the same CN. If
the cup-xmpp and tomcat (self-signed) certificates have the same CN, Expressway only trusts one of them, and some
TLS attempts between Cisco Expressway-E and IM and Presence Service servers will fail. For more details, see
CSCve56019.
Expressway Certificates
The Expressway certificate signing request (CSR) tool prompts for and incorporates the relevant Subject Alternative
Name (SAN) entries as appropriate for the Unified Communications features that are supported on that Expressway.
The following table shows which CSR alternative name elements apply to which Unified Communications features:
Add these items as subject alternative names When generating a CSR for these purposes
Business
Mobile and
XMPP to
Remote Jabber Guest
Federation Business
Access
Calls
Unified CM registrations domains
(despite their name, these have more in common with Required on
Expressway- — — —
service discovery domains than with Unified CM SIP
registration domains) E only
28
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Add these items as subject alternative names When generating a CSR for these purposes
Business
Mobile and
XMPP to
Remote Jabber Guest
Federation Business
Access
Calls
(Clustered systems only) Expressway cluster name Required on Required on Required on
Expressway- Expressway- Expressway-
C only C only C only
Note:
■ You may need to produce a new server certificate for the Expressway-C if chat node aliases are added or
renamed. Or when IM and Presence nodes are added or renamed, or new TLS phone security profiles are
added.
■ You must produce a new Expressway-E certificate if new chat node aliases are added to the system, or if the
Unified CM or XMPP federation domains are modified.
■ You must restart the Expressway for any new uploaded server certificate to take effect.
More details about the individual feature requirements per Expressway-C / Expressway-E are described below.
Expressway-C server certificate requirements
The Expressway-C server certificate needs to include the following elements in its list of subject alternate names:
■ Unified CM phone security profile names: the names of the Phone Security Profiles in Unified CM that are
configured for encrypted TLS and are used for devices requiring remote access. Use the FQDN format and
separate multiple entries with commas.
Having the secure phone profiles as alternative names means that Unified CM can communicate via TLS with
the Expressway-C when it is forwarding messages from devices that use those profiles.
■ IM and Presence chat node aliases (federated group chat): the Chat Node Aliases (e.g.
chatroom1.example.com) that are configured on the IM and Presence servers. These are required only for
Unified Communications XMPP federation deployments that intend to support group chat over TLS with
federated contacts.
The Expressway-C automatically includes the chat node aliases in the CSR, providing it has discovered a set
of IM&P servers.
We recommend that you use DNS format for the chat node aliases when generating the CSR. You must
include the same chat node aliases in the Expressway-E server certificate's alternative names.
Figure 4 Entering subject alternative names for security profiles and chat node aliases on the
Expressway-C's CSR generator
29
Mobile and Remote Access Through Cisco Expressway Deployment Guide
■ Unified CM registrations domains: all of the domains which are configured on the Expressway-C for Unified
CM registrations. Required for secure communications between endpoint devices and Expressway-E.
The Unified CM registration domains used in the Expressway configuration and Expressway-E certificate, are
used by Mobile and Remote Access clients to lookup the _collab-edge DNS SRV record during service
discovery. They enable MRA registrations on Unified CM, and are primarily for service discovery.
These service discovery domains may or may not match the SIP registration domains. It depends on the
deployment, and they don't have to match. One example is a deployment that uses a .local or similar private
domain with Unified CM on the internal network, and public domain names for the Expressway-E FQDN and
service discovery. In this case, you need to include the public domain names in the Expressway-E certificate
as SANs. There is no need to include the private domain names used on Unified CM. You only need to list the
edge domain as a SAN.
Select the DNS format and manually specify the required FQDNs. Separate the FQDNs by commas if you need
multiple domains. You may select CollabEdgeDNS format instead, which simply adds the prefix collab-edge.
to the domain that you enter. This format is recommended if you do not want to include your top level domain
as a SAN (see example in following screenshot).
■ XMPP federation domains: the domains used for point-to-point XMPP federation. These are configured on
the IM&P servers and should also be configured on the Expressway-C as domains for XMPP federation.
Select the DNS format and manually specify the required FQDNs. Separate the FQDNs by commas if you need
multiple domains. Do not use the XMPPAddress format as it may not be supported by your CA, and may be
discontinued in future versions of the Expressway software.
■ IM and Presence chat node aliases (federated group chat): the same set of Chat Node Aliases as entered
on the Expressway-C's certificate. They are only required for voice and presence deployments which will
support group chat over TLS with federated contacts.
Note that you can copy the list of chat node aliases from the equivalent Generate CSR page on the
Expressway-C.
Figure 5 Entering subject alternative names for Unified CM registration domains, XMPP federation
domains, and chat node aliases, on the Expressway-E's CSR generator
See Cisco Expressway Certificate Creation and Use Deployment Guide on the Expressway configuration guides page.
30
Mobile and Remote Access Through Cisco Expressway Deployment Guide
■ Installing Expressway Security Certificates and Setting Up a Secure Traversal Zone, page 31
■ Setting Up the Expressway-C for Mobile and Remote Access, page 31
■ Discover Unified Communications Servers and Services for Mobile and Remote Access, page 33
■ About the HTTP Allow List on Expressway-C, page 43
■ Setting Up the Expressway-E for Mobile and Remote Access, page 45
■ Checking the Status of Unified Communications Services, page 43
■ (Optional) Using Deployments to Partition Unified Communications Services, page 52
■ (Optional) Configuring SAML SSO Authentication Over the Edge, page 46
■ Configuring a Secure Traversal Zone Connection for Unified Communications, page 25 (if your system does
not already have a secure traversal zone in place)
■ Server Certificate Requirements for Unified Communications, page 27
If you want to use XMPP federation, the IM&P servers must be discovered on the Expressway-C. So that all relevant
information is available when generating certificate signing requests.
1. System host name and Domain name are specified (System > DNS).
2. Local DNS servers are specified (System > DNS).
3. All Expressway systems are synchronized to a reliable NTP service (System > Time). Use an Authentication
method in accordance with your local policy.
If you have a cluster of Expressways you must do this for every peer.
31
Mobile and Remote Access Through Cisco Expressway Deployment Guide
— SIP registrations and provisioning on Expressway: the Expressway is authoritative for this SIP domain.
The Expressway acts as a SIP registrar for the domain (and Presence Server in the case of VCS systems),
and accepts registration requests for any SIP endpoints attempting to register with an alias that includes
this domain.
— SIP registrations and provisioning on Unified CM: Endpoint registration, call control and provisioning for
this SIP domain is serviced by Unified CM. The Expressway acts as a Unified Communications gateway to
provide secure firewall traversal and line-side support for Unified CM registrations.
— IM and Presence Service: Instant messaging and presence services for this SIP domain are provided by the
Unified CM IM and Presence service.
— XMPP federation: Enables XMPP federation between this domain and partner domains.
— Deployment: Associates the domain with the selected deployment, if there are multiple deployments. This
setting is absent if there is only one deployment (there is always at least one).
Turn On all of the applicable services for each domain. For example, the same domain may be used by
endpoints such as Jabber or EX Series devices that require line-side Unified Communications support, and by
other endpoints such as third-party SIP or H.323 devices that require Expressway support. (In this scenario,
the signaling messages sent from the endpoint indicate whether line-side unified communications or
Expressway support is required.)
Note that these settings are not entirely independent. You cannot disable SIP registration and provisioning
on Unified CM while using IM and Presence. You can disable IM and Presence while SIP registrations and
provisioning on Unified CM is On, but the reverse is not true. So, if you switch IM and Presence Service On,
then your setting for SIP registrations and provisioning on Unified CM is ignored and the Expressway-C
behaves as though it was On.
32
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Note: This feature is disabled by default, because it impacts some features on earlier versions of Unified CM.
If you are using a Unified CM version before 11.5(1)SU3, and you enable SIP Path headers on Expressway-C, the
following Unified CM features will report the MRA devices' IP addresses instead of the Expressway's IP address:
■ Device Mobility
■ Real-Time Monitoring Tool (RTMT)
■ Cisco Emergency Responder (CER)
Other features may also be affected by this change. The devices' IP addresses are not useful for determining their
location, as they are typically from reserved private ranges and could overlap with your organization's internal range.
Discover Unified Communications Servers and Services for Mobile and Remote
Access
The Expressway-C must be configured with the address details of the Unified Communications services/nodes that
are going to provide registration, call control, provisioning, voicemail, messaging, and presence services to MRA
users.
IM and Presence Service configuration is not required if you're deploying the hybrid model, as these services are
provided by the Cisco Webex cloud.
33
Mobile and Remote Access Through Cisco Expressway Deployment Guide
The connections configured in this procedure are static. After you reconfigure or upgrade any of the discovered
Unified Communications nodes, you must refresh the configuration on the Expressway-C as described in the tasks
below (Configuration > Unified Communications > <UC server type>; click Refresh servers). More detail about
why this is needed is in Why It's Necessary to Refresh Discovered Nodes, page 37. Be aware that as described in that
section, Jabber and other endpoints cannot connect during the refresh.
34
Mobile and Remote Access Through Cisco Expressway Deployment Guide
3. Repeat the discovery procedure for other Unified CM nodes/clusters, if required.
4. Click Refresh servers to refresh all the node details after configuring multiple publisher addresses.
35
Mobile and Remote Access Through Cisco Expressway Deployment Guide
2. Add the details of an IM and Presence Service database publisher node:
a. Click New.
b. Enter the address of the IM and Presence Service database publisher node.
You must enter an FQDN when TLS verify mode is On.
c. Enter the Username and Password of an account that can access this server.
Note: These credentials are stored permanently in the Expressway database. The corresponding IM and
Presence Service user must have the Standard AXL API Access role.
d. [Recommended] Leave TLS verify mode switched On to ensure Expressway verifies the node's tomcat
certificate (for XMPP-related communications).
e. [Optional] Select which deployment this node/cluster will belong to.
The Deployment field does not show if you have not created multiple deployments. All nodes belong to the
default deployment if you choose not to use multiple deployments.
f. Click Add address.
If you enabled TLS verify mode, then the Expressway tests whether a secure connection can be
established. It does this so you can find any TLS configuration errors before it continues the discovery
process.
If the secure connection test was successful, or if you did not enable TLS verify mode, then the system
attempts to contact the publisher and retrieve details of its associated nodes.
Note: The status of the discovered node will be Inactive unless a valid traversal zone connection exists
between the Expressway-C and the Expressway-E (may not yet be configured).
3. Repeat the discovery procedure for other IM and Presence Service nodes/clusters, if required.
4. Click Refresh servers to refresh all the node details after configuring multiple publisher addresses.
36
Mobile and Remote Access Through Cisco Expressway Deployment Guide
37
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Authentication None
path Hidden field until MRA is enabled. Defines how MRA authentication is controlled. before
MRA
SAML SSO authentication: Clients are authenticated by an external IdP. turned on
UCM/LDAP basic authentication: Clients are authenticated locally by the Unified CM UCM/LDAP
against their LDAP credentials. after MRA
turned on
SAML SSO and UCM/LDAP: Allows either method.
None: No authentication is applied. The default until MRA is first enabled. The
"None" option is required (rather than just leaving MRA turned off) because some
deployments must turn on MRA to allow functions which are not actually MRA. (Such
as the Web Proxy for Meeting Server, or XMPP Federation.) Only these customers
should use "None". It is not recommended in other cases.
38
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Authorize by This option requires self-describing tokens for authorization. It's our recommended On
OAuth token authorization option for all deployments that have the infrastructure to support them.
with refresh
Only Jabber clients are currently capable of using this authorization method. Other
MRA endpoints do not currently support it. The clients must also be in OAuth token
with refresh authorization mode.
Important: From X8.10.1, the Expressway fully supports the benefits of self-
describing tokens (including token refresh, fast authorization, and access policy
support). However, not all of the benefits are actually available throughout the wider
solution. Depending on what other products you use (Unified CM, IM and Presence
Service, Cisco Unity Connection) and what versions they are on, not all products fully
support all benefits of self-describing tokens.
If you use this option on Expressway, you must also enable OAuth with refresh on
the Unified CMs, and on Cisco Unity Connection if used. The process is
summarized below.
Authorize by Available if Authentication path is SAML SSO or SAML SSO and UCM/LDAP. Off
OAuth token
(previously This option requires authentication through the IdP. Currently, only Jabber clients are
SSO Mode) capable of using this authorization method, which is not supported by other MRA
endpoints.
Authorize by Available if Authentication path is UCM/LDAP or SAML SSO and UCM/LDAP. Off
user
credentials Clients attempting to perform authentication by user credentials are allowed through
MRA. This includes Jabber, and supported IP phone and TelePresence devices.
39
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Check for Available if Authorize by OAuth token with refresh or Authorize by OAuth token is No
internal enabled.
authentication
availability The default is No, for optimal security and to reduce network traffic.
The request asks whether the client may try to authenticate the user by OAuth token,
and includes a user identity with which the Expressway-C can find the user's home
cluster:
Yes: The get_edge_sso request will ask the user’s home Unified CM if OAuth tokens
are supported. The home Unified CM is determined from the identity sent by the
Jabber client's get_edge_sso request.
No: If the Expressway is configured not to look internally, the same response will be
sent to all clients, depending on the Edge authentication settings.
The option to choose depends on your implementation and security policy. If all
Unified CM nodes support OAuth tokens, you can reduce response time and overall
network traffic by selecting No. Or select Yes if you want clients to use either mode
of getting the edge configuration - during rollout or because you can't guarantee
OAuth on all nodes.
Caution: Setting this to Yes has the potential to allow rogue inbound requests from
unauthenticated remote clients. If you specify No for this setting, the Expressway
prevents rogue requests.
40
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Identity Available if Authentication path is SAML SSO or SAML SSO and UCM/LDAP. —
providers:
Create or Selecting an Identity Provider
modify IdPs
Cisco Collaboration solutions use SAML 2.0 (Security Assertion Markup Language) to
enable SSO (single sign-on) for clients consuming Unified Communications services.
If you choose SAML-based SSO for your environment, note the following:
■ SAML 2.0 is not compatible with SAML 1.1 and you must select an IdP that
uses the SAML 2.0 standard.
■ SAML-based identity management is implemented in different ways by
vendors in the computing and networking industry, and there are no widely
accepted regulations for compliance to the SAML standards.
■ The configuration of and policies governing your selected IdP are outside the
scope of Cisco TAC (Technical Assistance Center) support. Please use your
relationship and support contract with your IdP Vendor to assist in configuring
the IdP properly. Cisco cannot accept responsibility for any errors, limitations,
or specific configuration of the IdP.
■ OpenAM 10.0.1
■ Active Directory Federation Services 2.0 (AD FS 2.0)
■ PingFederate® 6.10.0.4
Identity Available if Authentication path is SAML SSO or SAML SSO and UCM/LDAP. —
providers:
Export SAML For details about working with SAML data, see SAML SSO Authentication Over the
data Edge, page 46.
Allow Jabber By default the IdP or Unified CM authentication page is displayed in an embedded No
iOS clients to web browser (not the Safari browser) on iOS devices. That default browser is unable
use embedded to access the iOS trust store, and so cannot use any certificates deployed to the
Safari devices.
This setting optionally allows Jabber on iOS devices to use the native Safari browser.
Because the Safari browser is able to access the device trust store, you can now
enable password-less authentication or two-factor authentication in your OAuth
deployment.
A potential security issue exists for this option. The mechanism to return browser
control from Safari to Jabber after the authentication completes, uses a custom URL
scheme that invokes a custom protocol handler. It's possible that another application
other than Jabber could intercept the scheme and gain control from iOS. In that
case, the application would have access to the OAuth token in the URL.
If you are confident that your iOS devices will not have other applications that
register the Jabber custom URL scheme, for example because all mobile devices are
managed, then it's safe to enable the option. If you are concerned about the
possibility of another app intercepting the custom Jabber URL, then do not enable
the embedded Safari browser.
41
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Configuring Cisco Unified Communications Manager / Cisco Unity Connection for OAuth with
Refresh
To use self-describing tokens on Expressway (Authorize by OAuth token with refresh), you must also enable OAuth
with refresh on Unified CM, and on Unity Connection if you use it. The settings are summarized here for convenience.
For details, refer to the Cisco Unified CM / Unity Connection documentation.
■ For Unified CM, enable OAuth with Refresh Login Flow, and Caching, in the System > Enterprise Parameters.
■ For Unity Connection, enable OAuth with Refresh Login Flow and add CUCM Publisher to the Authz server
settings.
How to check Unified CM support
You can check what authorization methods your Unified CM servers support, on the Expressway Configuration >
Unified Communications > Unified CM servers page. This displays the version numbers in use.
■ For Unified CM, go to Configuration > Unified Communications > Unified CM servers and click Refresh
servers.
■ For Unity Connection, go to Configuration > Unified Communications > Unity Connection servers and click
Refresh servers.
42
Mobile and Remote Access Through Cisco Expressway Deployment Guide
For the AFT feature to work across Expressway, make sure that all Unified CM IM and Presence Service nodes are on
the allow list, whether manually or automatically added.
43
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Column Description
Protocol The protocol on which the rule allows clients to communicate with these types of nodes.
Ports The ports on which the rule allows clients to communicate with these types of nodes.
Match Exact or Prefix. Depends on the nature of the service the clients access with the help of this rule.
type
Path The path to the resource that clients access with the help of this rule. This may not be present, or may
only be a partial match of the actual resource, if the rule allows Prefix match.
Methods The HTTP methods that will be allowed through by this rule (such as GET).
44
Mobile and Remote Access Through Cisco Expressway Deployment Guide
5. Configure the rule to your requirements. Here is some advice for each of the fields:
Column Description
Description Enter a meaningful description for this rule, to help you recognize its purpose.
Url Specify a URL that MRA clients are allowed to access. For example, to allow access to
https://www.example.com:8080/resource/path just type it in exactly like that.
a. The protocol the clients are using to access the host must be http:// or https://
b. Specify a port when using a non-default port eg. :8080
(Default ports are 80 (http) and 443 (https))
c. Specify the path to limit the rule scope (more secure), eg. /resource/path
If you select Prefix match for this rule, you can use a partial path or omit the path. Be
aware that this could be a security risk if the target resources are not resilient to
malformed URLs.
Your decision here depends on your environment. It is more secure to use exact matches, but
you may need more rules. It is more convenient to use prefix matches, but there is some risk
of unintentionally exposing server resources.
Deployment If you are using multiple deployments for your MRA environment, you also need to choose
which deployment uses the new rule. You won't see this field unless you have more than one
deployment.
6. Click Create Entry to save the rule and return to the editable allow list.
7. [Optional] Click View/Edit to change the rule.
1. Go to Configuration > Unified Communications > HTTP allow list > Upload rules.
2. Browse to and select the CSV file containing your rule definitions.
See Allow List Rules File Reference, page 73.
3. Click Upload.
The Expressway responds with a success message and displays the Editable inbound rules page.
45
Mobile and Remote Access Through Cisco Expressway Deployment Guide
1. System host name and Domain name are specified (System > DNS).
2. Public DNS servers are specified (System > DNS).
3. All Expressway systems are synchronized to a reliable NTP service (System > Time). Use an Authentication
method in accordance with your local policy.
If you have a cluster of Expressways you must do this for every peer.
Note: The combination of <System host name>.<Domain name> is the FQDN of this Expressway-E. Ensure that this
FQDN is resolvable in public DNS.
If you have a cluster of Expressway-Es, make sure that the Domain name is identical on each peer, and it is case-
sensitive.
Enable SIP Protocol
SIP and H.323 protocols are disabled by default on new installs of X8.9.2 and later versions.
■ Cisco Jabber 10.6 or later. Jabber clients are the only endpoints supported for OAuth token authorization
through Mobile and Remote Access (MRA).
■ Cisco Unified Communications Manager 10.5(2) or later
■ Cisco Unity Connection 10.5(2) or later
■ Cisco Unified Communications Manager IM and Presence Service 10.5(2) or later
How it works
46
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Cisco Jabber determines whether it is inside the organization's network before requesting a Unified Communications
service. If Jabber is outside the network, it requests the service from the Expressway-E on the edge of the network. If
SAML SSO authentication is enabled at the edge, the Expressway-E redirects Jabber to the IdP with a signed request
to authenticate the user.
The IdP challenges the client to identify itself. When this identity is authenticated, the IdP redirects Jabber's service
request back to the Expressway-E with a signed assertion that the identity is authentic.
The Expressway-E trusts the IdP, so it passes the request to the appropriate service inside the network. The Unified
Communications service trusts the IdP and the Expressway-E, so it provides the service to the Jabber client.
47
Mobile and Remote Access Through Cisco Expressway Deployment Guide
We recommend self-describing token authorization for all deployments, assuming the necessary infrastructure exists
to support it. Subject to proper Expressway configuration, if the Jabber client presents a self-describing token then
the Expressway simply checks the token. No password or certificate-based authentication is needed. The token is
issued by Unified CM (regardless of whether the configured authentication path is by external IdP or by the Unified
CM). Self-describing token authorization is used automatically if all devices in the call flow are configured for it.
The Expressway-C performs token authorization. This avoids authentication and authorization settings being exposed
on Expressway-E.
Prerequisites
■ Expressway is already providing Mobile and Remote Access for Cisco Jabber.
■ All other devices in the call flow are similarly enabled.
■ You have the following minimum product versions installed, or later:
■ An Expressway-E and an Expressway-C are configured to work together at your network edge.
■ A Unified Communications traversal zone is configured between the Expressway-C and the Expressway-E.
■ The SIP domain that will be accessed via OAuth is configured on the Expressway-C.
■ The Expressway-C has MRA enabled and has discovered the required Unified CM resources.
■ The required Unified CM resources are in the HTTP allow list on the Expressway-C.
■ If you are using multiple deployments, the Unified CM resources to be accessed by OAuth are in the same
deployment as the domain to be called from Jabber clients.
On the Cisco Jabber clients:
■ Clients are configured to request the internal services using the correct domain names / SIP URIs / Chat
aliases.
■ The default browser can resolve the Expressway-E and the IdP.
On Unified CM:
■ Users who are associated with non-OAuth MRA clients or endpoints, have their credentials stored in Unified
CM. Or Unified CM is configured for LDAP authentication.
On the Identity Provider:
The domain that is on the IdP certificate must be published in the DNS so that clients can resolve the IdP.
48
Mobile and Remote Access Through Cisco Expressway Deployment Guide
■ SAML 2.0 is not compatible with SAML 1.1 and you must select an IdP that uses the SAML 2.0 standard.
■ SAML-based identity management is implemented in different ways by vendors in the computing and
networking industry, and there are no widely accepted regulations for compliance to the SAML standards.
■ The configuration of and policies governing your selected IdP are outside the scope of Cisco TAC (Technical
Assistance Center) support. Please use your relationship and support contract with your IdP Vendor to assist
in configuring the IdP properly. Cisco cannot accept responsibility for any errors, limitations, or specific
configuration of the IdP.
Although Cisco Collaboration infrastructure may prove to be compatible with other IdPs claiming SAML 2.0
compliance, only the following IdPs have been tested with Cisco Collaboration solutions:
■ OpenAM 10.0.1
■ Active Directory Federation Services 2.0 (AD FS 2.0)
■ PingFederate® 6.10.0.4
49
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Note: You can change the signing algorithm after you have imported the metadata, by going to Configuration
> Unified Communications > Identity Providers (IdP), locating your IdP row then, in the Actions column,
clicking Configure Digest).
1. Open the IdP list (Configuration > Unified Communications > Identity providers (IdP)) and verify that your IdP
is in the list.
The IdPs are listed by their entity IDs. The associated domains for each are shown next to the ID.
2. Click Associate domains in the row for your IdP.
This shows a list of all the domains on this Expressway-C. There are checkmarks next to domains that are
already associated with this IdP. It also shows the IdP entity IDs if there are different IdPs associated with
other domains in the list.
3. Check the boxes next to the domains you want to associate with this IdP.
If you see (Transfer) next to the check box, checking it breaks the domain's existing association and
associates the domain with this IdP.
4. Click Save.
The selected domains are associated with this IdP.
50
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Configuring IdPs
This topic covers any known additional configurations that are needed when using a particular IdP for OAuth token-
based authorization over MRA.
These configuration procedures are required in addition to the prerequisites and high level tasks already mentioned,
some of which are outside of the document's scope.
1. Open the Edit Claims Rule dialog, and create a new claim rule that sends AD attributes as claims
2. Select the AD attribute to match the one that identify the OAuth users to the internal systems, typically email
or SAMAccountName
3. Enter uid as the Outgoing Claim Type
51
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Figure 7 Multiple deployments to partition Unified Communications services accessed from outside the
network
Deployments and their associated domains and services are configured on the Expressway-C.
One primary deployment (called "Default deployment" unless you rename it) automatically encloses all domains and
services until you create and populate additional deployments. This primary deployment cannot be deleted, even if it
is renamed or has no members.
To partition the services that you provide through Mobile and Remote Access, create as many deployments as you
need. Associate a different domain with each one, and then associate the required Unified Communications
resources with each deployment.
You cannot associate one domain with more than one deployment. Similarly, each Unified Communications node may
only be associated with one deployment.
To create a new deployment:
52
Mobile and Remote Access Through Cisco Expressway Deployment Guide
1. Go to Configuration > Unified Communications > and then Unified CM servers, or IM and Presence Service
nodes, or Unity Connection servers.
Any previously discovered service nodes of the selected type are listed here. The deployment column shows
where the listed nodes are associated.
If the list is not properly populated, see Discover Unified Communications Servers and Services for Mobile and
Remote Access, page 33.
2. Click the server / service node name.
3. In the Deployment field, select which deployment will enclose this server / service node.
4. Click Save.
Note: When you save this change, the Expressway-C refreshes the connection to the node, which may
temporarily disrupt the service to the connected users.
5. Repeat for any other Unified Communications services that will belong to the deployment.
53
Mobile and Remote Access Through Cisco Expressway Deployment Guide
54
Mobile and Remote Access Through Cisco Expressway Deployment Guide
55
Mobile and Remote Access Through Cisco Expressway Deployment Guide
1. When you dial a number, a signal is sent to Cisco Unified Communications Manager over the IP path (WLAN or
mobile network). See stage 1 of Figure 2 or Figure 3.
2. Cisco Unified Communications Manager calls your mobile number or the Alternate Number you set (see stage
2 of Figure 2 or Figure 3.)
3. When you answer, Cisco Unified Communications Manager extends the call to the number you dialed and you
hear ring back (see stage 3 of Figure 2 or Figure 3).
4. When the person answers, the ongoing call is hairpinned at the enterprise PSTN gateway.
■ If you made the call using a Mobile Identity, your call is anchored at the enterprise gateway. The call is active
on your mobile and desk phone, so you can switch between the two (see stage 4 of Figure 2).
■ If you specified an Alternate Number, your ongoing call is not anchored and you cannot pick up on your desk
phone (see stage 4 of Figure 3).
Notes:
■ You can use Dual Tone Multi Frequency-based (DTMF) mid-call features (for example *81 for hold) on
anchored calls if there is out-of-band DTMF relay between the PSTN gateway and Cisco Unified
Communications Manager. You cannot utilize mid-call features when using an Alternate Number.
■ To prevent the callback leg from Cisco Unified Communications Manager routing to your voicemail — thus
stopping the voicemail call going through to the person you are dialing — Cisco recommends that you set your
DVO-R voicemail policy to ‘user controlled’. This ensures you must generate a DTMF tone by pressing any key
on the keypad before your call can proceed.
Note: Although this feature now works for users calling over Mobile and Remote Access, there is no configuration on
the Expressway. There is some configuration required on the Unified CM nodes and Cisco Jabber clients.
Configuration checklist for DVO-R
■ For Expressway: Configuring Dial via Office-Reverse to Work with Mobile and Remote Access at
http://www.cisco.com/c/en/us/support/unified-communications/expressway-series/products-
configuration-examples-list.html
■ For VCS:Configuring Dial via Office-Reverse to Work with Mobile and Remote Access at
http://www.cisco.com/c/en/us/support/unified-communications/telepresence-video-communication-
server-vcs/products-configuration-examples-list.html
56
Mobile and Remote Access Through Cisco Expressway Deployment Guide
1. Verify that the BiB recording system in the Unified CM works correctly, before you configure BiB for MRA.
2. Make sure that the prerequisites listed above are in place.
3. SIP Path headers must be enabled on Cisco Expressway-C:
a. On the Cisco Expressway-C, go to Configuration > Unified Communications > Configuration.
b. Set SIP Path headers to On.
Note: The default Cisco Expressway-C behavior is to rewrite the Contact header in REGISTER messages. When you
turn SIP Path headers on, Cisco Expressway-C does not rewrite the Contact header, but adds its address into the
Path header instead.
57
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Note: If Unified CM detects a remote or mobile Jabber for iPhone and iPad connection, it always sends a Push
Notification as well as a SIP Invite.
Prerequisites and recommendations
No specific configuration is needed on the Expressway for Push Notifications, assuming Expressway-E is already
providing Mobile and Remote Access (MRA) for Jabber iOS devices. However, these prerequisites and
recommendations apply:
■ Push Notifications in the Expressway require a network connection between Expressway and the Cisco
WebEx cloud, and between Cisco Jabber and the Push Notification servers in the Apple cloud. They cannot
work in a private network, with no internet connection.
■ Expressway is already providing Mobile and Remote Access for Jabber for iPhone and iPad. MRA must be fully
configured (domain, zone, server settings).
■ Depending on your Unified CM configuration, the Unified CM may need a forward proxy to send Push
Notifications to the Cisco Collaboration Cloud.
■ We recommend using self-describing token authorization.
■ Expressway-E restart required for Push Notifications with instant messages. After you enable Push
Notifications on the IM and Presence Service you need to restart the Expressway-E. Until the restart,
Expressway-E can't recognize the push capability on IM and Presence Service, and does not send PUSH
messages to the Jabber clients.
■ You need the following Push Notification-enabled software versions, or later:
■ — Expressway X8.10.1 (preview status only in X8.10)
58
Mobile and Remote Access Through Cisco Expressway Deployment Guide
1. Configure OAuth token validation on the Expressway (see Configuring MRA Access Control, page 38).
2. Unified CM must be able to make HTTPS connections to Cisco's cloud services. To allow that you may have to
configure Unified CM to use a forward proxy server (depending on your requirements for external requests from
iOS devices).
CAUTION: Although the built-in forward proxy is in the Expressway interface, it is not currently supported
and it should not be used.
59
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Additional Information
Additional Information
Maintenance Mode on the Expressway
Maintenance mode on the Expressway has been enhanced so that you can bring an MRA system down in a managed
way.
When you engage maintenance mode, the Expressway stops accepting new calls or proxy (MRA) traffic. Existing calls
and chat sessions are not affected.
As users end their sessions normally, the system comes to a point when it is not processing any traffic of a certain
type, and then it shuts that service down.
If users try to make new calls or start new chat sessions while the Expressway is in maintenance mode, the clients
will receive a service unavailable response, and they might then choose to use another peer (if they are capable).
This fail-over behavior depends on the client, but restarting the client should resolve any connection issues if there
are active peers in the cluster.
The Unified Communications status pages also show (Maintenance Mode) in any places where MRA services are
affected.
Maintenance mode: Maintenance mode is not supported over MRA for endpoints running CE software. The
Expressway drops MRA calls from these endpoints when you enable maintenance mode.
60
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Additional Information
1. Go to System > Security > SIP Trunk Security Profile and select the profile used for the SIP trunk.
If this profile is used for connections from other devices, you may want to create a separate security profile for
the SIP trunk connection to Expressway.
2. Configure the Incoming Port to be different from that used for line registrations.
3. Click Save and then click Apply Config.
On Expressway:
1. Go to Configuration > Zones > Zones and select the Unified CM neighbor zone used for the SIP trunk.
(Note that the automatically generated neighbor zones between Expressway-C and each discovered Unified
CM node for line side communications are non-configurable.)
2. Configure the SIP Port to the same value as the Incoming Port configured on Unified CM.
3. Click Save.
See Cisco TelePresence Cisco Unified Communications Manager with Expressway (SIP Trunk) Deployment Guide for
more information about configuring a SIP trunk.
Note: Secure profiles are downgraded to use TCP if Unified CM is not in mixed mode.
61
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Additional Information
The Expressway neighbor zones to Unified CM use the names of the Unified CM nodes that were returned by Unified
CM when the Unified CM publishers were added (or refreshed) to the Expressway. The Expressway uses those
returned names to connect to the Unified CM node. If that name is just the host name then:
Media Encryption
Media encryption is enforced on the call legs between the Expressway-C and the Expressway-E, and between the
Expressway-E and endpoints located outside the enterprise.
The encryption is physically applied to the media as it passes through the B2BUA on the Expressway-C.
Limitations
■ In Expressway-E systems that use dual network interfaces, XCP connections (for IM&P XMPP traffic) always
use the non-external (i.e. internal) interface. This means that XCP connections may fail in deployments where
the Expressway-E internal interface is on a separate network segment and is used for system management
purposes only, and where the traversal zone on the Expressway-C connects to the Expressway-E's external
interface.
■ For information about endpoint or Expressway features which are not supported over MRA, see Key Supported
and Unsupported Features with Mobile and Remote Access, page 16
Protocol Summary
The table below lists the protocols and associated services used in the Unified Communications solution.
62
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Additional Information
attacks, which can originate from multiple client devices authorizing the same user, or from clients that reauthorize
more often than necessary.
Each time a client supplies credentials to authorize the user, the Expressway checks whether this attempt would
exceed the Maximum authorizations per period within the previous number of seconds specified by the Rate control
period.
If the attempt would exceed the chosen maximum, then the Expressway rejects the attempt and issues the HTTP error
429 "Too Many Requests".
The authorization rate control settings are configurable in the Advanced section of the Configuration > Unified
Communications > Configuration page.
Credential Caching
Note: These settings do not apply to clients that are using SSO (common identity) for authenticating via MRA.
The Expressway caches endpoint credentials which have been authenticated by Unified CM. This caching improves
overall performance because the Expressway does not always have to submit endpoint credentials to Unified CM for
authentication.
The caching settings are configurable in the Advanced section of the Configuration > Unified Communications
> Configuration page.
Credentials refresh interval specifies the lifetime of the authentication token issued by the Expressway to a
successfully authenticated client. A client that successfully authenticates should request a refresh before this token
expires, or it will need to re-authenticate. The default is 480 minutes (8 hours).
Credentials cleanup interval specifies how long the Expressway waits between cache clearing operations. Only
expired tokens are removed when the cache is cleared, so this setting is the longest possible time that an expired
token can remain in the cache. The default is 720 minutes (12 hours).
■ http-ce-auth
■ http-ce-intrusion
■ sshpfwd-auth
■ sshpfwd-intrusion
■ xmpp-intrusion
This change affects new systems. Upgraded systems keep their existing protection configuration.
On Expressway-C:
The Expressway-C receives a lot of inbound traffic from Unified CM and from the Expressway-E when it is used for
Mobile and Remote Access.
If you want to use automated protection on the Expressway-C, you should add exemptions for all hosts that use the
automatically created neighbor zones and the Unified Communications secure traversal zone. The Expressway does
not automatically create exemptions for discovered Unified CM or related nodes.
63
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Additional Information
On Expressway-E:
You should enable the Automated protection service (System > System administration) if it is not yet running.
To protect against malicious attempts to access the HTTP proxy, you can configure automated intrusion protection on
the Expressway-E (System > Protection > Automated detection > Configuration).
We recommend that you enable the following categories on the Expressway-E:
Note: The Automated protection service uses Fail2ban software. It protects against brute force attacks that originate
from a single source IP address.
64
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Appendix 1: Troubleshooting
Appendix 1: Troubleshooting
General Techniques 65
Expressway Certificate / TLS Connectivity Issues 68
Cisco Jabber Sign In Issues 69
Expressway Returns "401 Unauthorized" Failure Messages 70
Call Failures due to "407 Proxy Authentication Required" or "500 Internal Server Error" Errors 70
Call Bit Rate is Restricted to 384 kbps / Video Issues when Using BFCP (Presentation Sharing) 70
Endpoints Cannot Register to Unified CM 71
IM and Presence Service Realm Changes 71
No Voicemail Service ("403 Forbidden" Response) 71
"403 Forbidden" Responses for Any Service Requests 71
Client HTTPS Requests are Dropped by Expressway 71
Unable to Configure IM&P Servers for Remote Access 71
Invalid SAML Assertions 72
"502 Next Hop Connection Failed" Messages 72
General Techniques
■ Server or CA certificates
■ DNS configuration
■ Domain configuration
1. First, you can use the CollabEdge validator tool to validate your MRA deployment. It simulates a Jabber client
sign in process, and provides feedback on the result.
2. If the CollabEdge validator can't identify the issue, we suggest that you collect logs from the Expressway while
attempting to sign in. Then use the log analysis component in the CSA to analyze the logs.
65
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Appendix 1: Troubleshooting
66
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Appendix 1: Troubleshooting
■ _collab-edge._tls
■ _cisco-uds._tcp
■ Current calls: the Call status page (Status > Calls > Calls) lists all the calls currently taking place to or from
devices registered with the Expressway, or that are passing through the Expressway.
■ Completed calls: the Call history page (Status > Calls > History) lists all the calls that are no longer active.
The list is limited to the most recent 500 calls, and only includes calls that have taken place since the
Expressway was last restarted.
The same set of call status information is also shown on the Calls by registration page (accessed via the
Registration details page).
If the Expressway is part of a cluster, all calls that apply to any peer in the cluster are shown, although the list is
limited to the most recent 500 calls per peer.
Identifying Mobile and Remote Access calls
The call status and call history pages show all call types. Unified CM remote sessions (if Mobile and Remote Access is
enabled) as well as VCS traversal and non-traversal calls, or Expressway RMS sessions.
To distinguish between the call types, you must drill down into the call components. Mobile and Remote Access calls
have different component characteristics depending on whether the call is being viewed on the Expressway-C or
Expressway-E:
■ On the Expressway-C, a Unified CM remote session has three components (as it uses the B2BUA to enforce
media encryption). One of the Expressway components routes the call through one of the automatically
generated neighbor zones (with a name prefixed by either CEtcp or CEtls) between Expressway and Unified
CM.
■ On the Expressway-E, there is one component and that routes the call through the CollaborationEdgeZone.
If both endpoints are outside of the enterprise (that is, off premises), you will see this treated as two separate calls.
Rich media sessions (for Expressway only)
If your system has a rich media session key installed and thus supports business-to-business calls, and interworked
or gatewayed calls to third-party solutions and so on, those calls are also listed on the call status and call history
pages.
67
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Appendix 1: Troubleshooting
CiscoSSL 5.4.3 Rejects Diffie-Hellman Keys with Fewer than 1024 Bits
If you are running version 9.x, or earlier, of Unified CM or Unified CM IM&P, with Expressway version X8.7.2 or later,
then the SSL handshake between the two systems will fail by default.
The symptom is that all MRA endpoints fail to register or make calls after you upgrade to Expressway X8.7.2 or later.
The cause of this issue is an upgrade of the CiscoSSL component to 5.4.3 or later. This version rejects the default
(768 bit) key provided by Unified CM when using D-H key exchange.
You must either upgrade your infrastructure or consult the Cisco Technical Assistance Center to check whether it's
possible to modify the default configurations for Unified CM and/or Unified CM IM&P to support TLS (CSCuy59366
refers).
68
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Appendix 1: Troubleshooting
■ Your MRA solution is configured for authorization by OAuth token (with or without refresh)
■ The Jabber user's access token has expired
■ Jabber does one of these:
— Resumes from desktop hibernate
— Recovers network connection
— Attempts fast login after it has been signed out for several hours
Behavior:
■ Some Jabber modules attempt to authorize at Expressway-E using the expired access token.
■ The Expressway-E (correctly) denies these requests.
■ If there are more than 5 such requests from a particular Jabber client, the Expressway-E blocks that IP address
for ten minutes (by default).
Symptoms:
The affected Jabber clients' IP addresses are added to the Expressway-E's Blocked addresses list, in the
HTTP proxy authorization failure category. You can see these on System > Protection > Automated detection
> Blocked addresses.
Workaround:
There are two ways you can work around this issue; you can increase the detection threshold for that particular
category, or you can create exemptions for the affected clients. We describe the threshold option here because the
exemptions may well be impractical in your environment.
Jabber popup warns about invalid certificate when connecting from outside the network
This is a symptom of an incorrectly configured server certificate on the Expressway-E. The certificate could be self-
signed, or it may not have the external DNS domain of your organization listed as a subject alternative name (SAN).
This is expected behavior from Jabber. We recommend that you install a certificate issued by a CA that Jabber trusts,
and that the certificate has the domains Jabber is using included in its list of SANs. See Server Certificate
Requirements for Unified Communications, page 27.
69
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Appendix 1: Troubleshooting
Users can recover from this issue by signing out and resetting Jabber. See CSCux16696.
This typically occurs if the IM and Presence Intercluster Sync Agent is not working correctly. See IM and Presence
intercluster deployment configuration for more information.
Call Failures due to "407 Proxy Authentication Required" or "500 Internal Server
Error" Errors
Call failures can occur if the traversal zones on Expressway are configured with an Authentication policy of Check
credentials. Ensure that the Authentication policy on the traversal zones used for Mobile and Remote Access is set to
Do not check credentials.
Call Bit Rate is Restricted to 384 kbps / Video Issues when Using BFCP
(Presentation Sharing)
This can be caused by video bit rate restrictions within the regions configured on Unified CM.
Ensure that the Maximum Session Bit Rate for Video Calls between and within regions (System > Region
Information > Region) is set to a suitable upper limit for your system, for example 6000 kbps.
70
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Appendix 1: Troubleshooting
■ Endpoints may not be able to register to Unified CM if there is also a SIP trunk configured between Unified CM
and Expressway-C. If a SIP trunk is configured, you must ensure that it uses a different listening port on
Unified CM from that used for SIP line registrations to Unified CM. See SIP Trunks Between Unified CM and
Expressway-C, page 61 for more information.
■ Secure registrations may fail ('Failed to establish SSL connection' messages) if the server certificate on the
Expressway-C does not contain in its Subject Alternate Name list, the names of all of the Phone Security
Profiles in Unified CM that are configured for encrypted TLS and are used for devices requiring remote access.
Note that these names — in both Unified CM and in the Expressway's certificate — must be in FQDN format.
71
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Appendix 1: Troubleshooting
1. Go to the Status > Unified Communications page on the Expressway-E. Did the Expressway-E report any
issues?
2. If the status looks normal, click the SSH tunnel status link at the foot of the status page. If one or more tunnels
to the Expressway-C node is down, that is probably causing the 502 error.
72
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Where:
1 Deployment Optional Name of the deployment that uses this rule. Required when you
have more than one deployment, otherwise supply an empty
argument.
4 Description Optional Text description of the rule. Enclose with double quotes if there are
spaces.
Example CSV file
Url,Deployment,HttpMethods,MatchType,Description
https://myServer1:8443/myPath1,myDomain1,GET,,"First Rule"
http://myServer2:8000/myPath2,myDomain200,"GET,PUT",exact,
https://myServer3:8080/myPath3,myDomain1,,prefix,"Third Rule"
https://myServer4/myPath4,myDomain1,,prefix,"Fourth Rule"
http://myServer5/myPath5,myDomain1,,prefix,"Fifth Rule"
■ List the parameter names (as shown) in the first line of the file
■ One rule per line, one line per rule
■ Separate arguments with commas
■ Correctly order the rule values as shown in the table above
■ Enclose values that have spaces in them with double quotes
73
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Where:
1 ExpectedResult Required allow or block. Specifies whether the test expects that the rules
should allow or block the specified URL.
2 Deployment Optional Name of the deployment to test with this URL. If you omit this
argument, the test will use the default deployment.
3 Description Optional Text description of the rule. Enclose with double quotes if there
are spaces.
4 HttpMethod Optional Specify one HTTP method to test eg. PUT. Defaults to GET if not
supplied.
Example CSV file
Url,ExpectedResult,Deployment,Description,HttpMethod
https://myServer1:8443/myPath1,block,"my deployment","a block test",GET
http://myServer2:8000/myPath2,allow,"my deployment","an allow test",PUT
https://myServer4/myPath4,allow,,,GET
http://myServer4/myPath4,block,,,POST
74
Mobile and Remote Access Through Cisco Expressway Deployment Guide
Cisco Trademark
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other
countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks
mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
75