CMGT - B - Webex Video Mesh Deployment Guide
CMGT - B - Webex Video Mesh Deployment Guide
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on
age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that
is hardcoded in the user interfaces of the product software, language used based on standards documentation, or language that is used by a referenced third-party product.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2022 Cisco Systems, Inc. All rights reserved.
CONTENTS
Date Change
July 7, 2022 • Updated the capacity estimates in Capacity for Video Mesh nodes.
• Removed mentions of the obsolete MM410v server throughout.
June 30, 2022 Added information on the new bulk provisioning scripts at https://github.com/
CiscoDevNet/webex-video-mesh-node-provisioning.
June 14, 2022 Changed steps to exchange certificate chains to include ECDSA certificates in
Exchange Certificate Chains Between Unified CM and Video Mesh Nodes
May 18, 2022 Changed the download site for the Reflector Tool to https://github.com/
CiscoDevNet/webex-video-mesh-reflector-client.
April 29,2022 Added information on the new feature in Keep your media on Video Mesh for all
external Webex meetings.
March 25, 2022 Updates to port usage in Ports and Protocols for Management.
Decemeber 10, 2021 Added CMS 2000 and noted upgrade issue for older CMS 1000s upgrading to
ESXi 7 in System and Platform Requirements for Video Mesh Node Software.
August 30, 2021 Added information on verifying that Webex has the correct source country for
your deployment in Verify That the Source Country Is Correct.
August 27, 2021 Added note on analytics reports visibility in Support and Limitations for Private
Meetings.
Date Change
August 13, 2021 Added information on the new Private Meetings feature in:
• Clusters in Video Mesh
• Private Meeting Call
• Private Meetings
July 22, 2021 Added information on how to verify that the system has the correct source location
for calls. Correct source locations aid in efficient routing. See Verify That the
Source Country Is Correct.
June 25, 2021 Noted that the Full Featured Webex Experience feature of the Webex App is
incompatible with Video Mesh in Clients and Devices That Use Video Mesh
Node.
May 7, 2021 Corrected the recommended cluster size to 100 in Guidelines for Video Mesh
Cluster Deployment.
April 12, 2021 Updated Configure Expressway TCP SIP Traffic Routing for Video Mesh to use
the Webex zone, instead of a new DNS zone.
February 9, 2021 • Added information on the new Go to Node in Control Hub to Access
Overview of Webex Video Mesh Node From Web Interface.
• Added Disable or Re-enable the Local Admin Account From Web Interface
section to describe new functionality.
• In each section that uses the node web interface, updated the steps to indicate
how to access the interface from Control Hub.
• Added Upload Security Certificates.
• Added Set External Logging to a Syslog Server.
December 11, 2020 • In Enable or Disable DNS Cachi, added information on DNS Cache wiping.
October 22, 2020 • In Ports and Protocols for Webex Meetings Traffic, added SIP signaling
port requirements.
October 19, 2020 • Removed reference to cloudfront.net which is no longer used by the service.
September 18, 2020 • Reduced the IP address range that is reserved for Webex Video Mesh Node
internal use from the original 172.17.0.0–172.17.255.255 (65,536 addresses)
to 172.17.42.0–172.17.42.63 (64 addresses).
August 26, 2020 • Added Webex Events support to Video Mesh Overview.
• Added new section Enable or Disable DNS Cachi.
Date Change
August 4, 2020 • Updated the following sections for short video address support:
• Integrate Video Mesh With Call Control Task Flow
• Configure Unified CM Secure TLS SIP Traffic Routing for Video Mesh
• Configure Unified CM TCP SIP Traffic Routing for Video Mesh
• Configure Expressway TCP SIP Traffic Routing for Video Mesh
July 9, 2020 • Added new section Set the Network Interface MTU Sizes.
June 26, 2020 • Added information about the new VMNLite deployment option in:
• Call Capacity on Video Mesh Node Platforms
• System and Platform Requirements for Video Mesh Node Software
• Install and Configure Video Mesh Node Software
• Removed mentions of default NTP server because the OVA no longer has
a default NTP server value.
• Updated Generate Video Mesh Packet Captures for Support with new
filtering options.
June 9, 2020 • Added information about the new weekly automatic software upgrade
scheduling option in:
• Register the Video Mesh Node to the Webex Cloud
• Set Video Mesh Cluster Upgrade Schedule
May 21, 2020 Updated Ports and Protocols for Management and Requirements for Proxy
Support for Video Mesh.
May 15, 2020 Updated Video Mesh Overview.
Date Change
April 25, 2020 • Added new sections in “Manage Webex Video Mesh Node From the Web
Interface”:
• Set the External Network Interface from the Video Mesh Node Web
Interface
• Add Internal and External Routing Rules
• Configure Container Network From Webex Video Mesh Node Web
Interface
January 22, 2020 • Added new section: “Factory Reset a Webex Video Mesh Node From The
Web Interface”.
• Added more details on connectivity checks in the “Manage Webex Video
Mesh Node from the Web Interface” section.
• Added in-room wireless share to the “Clients and Devices That Use Webex
Video Mesh Node” section.
December 12, 2019 • Added change passphrase and passphrase expiry procedures to the “Manage
Webex Video Mesh Node From the Web Interface” section in the Manage
and Troubleshoot chapter.
December 10, 2019 • Added the following information and port ranges to the traffic signature
tables (for QoS enabled and disabled:
• Source IP Address: Video Mesh Node
• Destination IP Address: Webex cloud media services
• Source UDP Ports: 35000 to 52499
• Destination UDP Ports: 5004
• Native DSCP Marking: AF41
• Media Type: Test STUN packets
Date Change
November 4, 2019 • Retired old analytics content and added new section.
• In the “Exchange Certificates” section, added information about the Subject
Alternative Name(s) field and added the following note in the Before You
Begin section: “For security reasons, we recommend that you use a CA
signed certificate on your Video Mesh nodes instead of the node's default
self-signed certificate.”
October 18, 2019 • Updated the description of the 1080p Control Hub setting to clarify that this
setting affects call capacity and only applies to on-premises SIP registered
devices. See Enable 1080p HD Video for On-Premises SIP Devices in Video
Mesh Node Meetings for more information.
• Updated the supported device and endpoints table to list only the tested
cloud-registered devices.
September 26, 2019 • Added new section Configure Network Settings from Video Mesh Node Web
Interface.
• Fixed the description if the Resource Utilization report. It now states:
“Average resource utilization for the media microservices used in the Video
Mesh clusters.”
• Added a note to the capacity section: “Overflows on low call volume
(especially SIP calls that originate on-premises) are not a true reflection of
scale. Video Mesh analytics (under Control Hub > Resources > Call
Activity) indicate the call legs that originate on-premises; they do no specify
the call streams that came in through the cascade to the Video Mesh node
for media processing. As remote participant numbers increase in a meeting,
the resulting cascade increases and consumes on-premises media resources
on the Video Mesh node.”
September 13, 2019 • Updated Install and Configure Video Mesh Node Software with network
configuration steps that appear on the Customize template page.
• Updated System and Platform Requirements for Video Mesh Node Software
with 72vCPUs (the equivalent of CMS 1000) for specifications-based
configuration.
Date Change
August 29, 2019 • Added Explicit Proxy and supported authentication types for explicit proxy
configurations (No auth, Basic, Digest, NTLM).
• Proxy Support for Edge Video Mesh
• Requirements for Proxy Support for Video Mesh
• Configure Webex Video Mesh Node for Proxy Integration
July 24, 2019 • In the Manage Webex Video Mesh Node From the Web Interface section,
made the following updates:
• Added new sections for Ping test, Trace Route test, NTP Server test,
Reflector Tool, and Debug User Account.
• Updated the Overview section—Removed cascades from the screenshot
and added OS version.
• Moved "Manage Video Mesh from the Console" content to the Appendix
of the guide.
• Renamed "Manage Webex Video Mesh" chapter to "Manage and
Troubleshoot Webex Video Mesh" and moved registration troubleshooting
content to that chapter.
July 9, 2019 • In Call Control and Meeting Integration Requirements for Video Mesh,
updated minimum supported versions for Unified CM, Expressway, and
Webex sites.
• In Clients and Devices That Use Video Mesh Node, added supported versions
of Jabber VDI and Webex VDI (they are SIP clients). Also added a testing
disclaimer.
May 24, 2019 • Added new sections on the troubleshooting features and updated overview
screen in the Video Mesh node web interface:
• Generate Webex Video Mesh Logs for Support
• Generate Webex Video Mesh Packet Captures for Support
• Access Overview of Webex Video Mesh Node From Web Interface
April 25, 2019 • Updated Manage and TroubleshootWebex Video Mesh to state that Control
Hub maintenance mode is required before performance any maintenance on
Video Mesh nodes.
Date Change
April 11, 2019 • Removed outdated information from Bandwidth Requirements. Updated the
content and diagrams, and changed the section name to Video Quality and
Scaling for Video Mesh.
• SIP based endpoints and clients (Cisco endpoints, Jabber, 3rd party SIP), registered to on-premises
call control (Cisco Unified Communications Manager or Expressway), that call into a Cisco Webex
meeting or Webex App meeting.
• Webex App app (including paired with room devices) that join a Webex meeting.
• Webex room and desk devices (including Webex Board) that directly join a Webex meeting.
• Provides optimized audio and video interactive voice response (IVR) to on-net SIP based endpoints and
clients.
• Webex clients (internal and external) continue to join meetings from the cloud.
• H.323, IP dial-in, and Skype for Business (S4B) endpoints continue to join meetings from the cloud.
• Supports 1080p 30fps high definition video as an option for meetings, if meeting participants that can
support 1080p are hosted through the local on-premises Video Mesh nodes. (If a participant joins an
in-progress meeting from the cloud, on-premises users continue to experience 1080p 30fps on supported
endpoints.)
• Enhanced and differentiated Quality of Service (QoS) marking: separate audio (EF) and video (AF41).
Note Webex Video Mesh does not currently support Webex Training.
Client or Device Type Uses Video Mesh Node on Uses Video Mesh Node on
Point to Point Call Multiparty Meeting
In-room wireless share between Webex App app and Yes Yes
supported Room, Desk, and Board devices.
Client or Device Type Uses Video Mesh Node on Uses Video Mesh Node on
Point to Point Call Multiparty Meeting
* It is not possible to guarantee that all on-premises devices and clients have been tested with the Video Mesh solution.
If you notice issues, contact you Cisco Account team to disable the Full Featured Webex Experience toggle.
Note Webex App apps continue to connect to Video Mesh nodes over shared port 5004. These ports are also used
by Webex App apps and endpoints for STUN reachability tests to Video Mesh nodes. Video Mesh node to
Video Mesh node for cascades use a destination shared port of 5004.
Note Media does not travel through the proxy. You must still open the required ports for media streams to reach
the cloud directly.
• Transparent Proxy (non-inspecting)—Video Mesh nodes are not configured to use a specific proxy server
address and should not require any changes to work with a non-inspecting proxy.
• Transparent Proxy (inspecting)—Video Mesh nodes are not configured to use a specific proxy server
address. No http(s) configuration changes are necessary on Video Mesh, however, the Video Mesh nodes
need a root certificate so that they trust the proxy. Inspecting proxies are typically used by IT to enforce
policies regarding which websites can be visited and types of content that are not permitted. This type
of proxy decrypts all your traffic (even https).
Note Resolution affects the call capacity on any Video Mesh node. For more information, see Capacity for Video
Mesh nodes, on page 12.
The resolution and framerate value is combined as XXXpYY—For example, 720p10 means 720p at 10 frames
per second.
The definition abbreviations (SD, HD, and FHD) in the sender row and receiver column refer to the upper
resolution of the client or device:
• SD—Standard Definition (576p)
• HD—High Definition (720p)
Receiver Sender
Webex — — — — — — —
Teams
Mobile
* Content Audio refers to the audio that is played from the specific content being shared, such as a streaming video. This audio stream is separate
from the regular meeting audio.
** Mixed Audio refers to a mix of the meeting participant audio and audio from the content share.
On-Premises call control Cisco Unified Communications Manager, Release 11.5(1) SU3 or later.
(We recommend the latest SU release.)
Cisco Expressway-C or E, Release X8.11.4 or later. (See the "Important
Information" section in the Expressway Release Notes for more
information.)
Meeting infrastructure Webex Meetings WBS33 or later. (You can verify that your Webex site
is on the correct platform if it has the Media Resource Type list available
in the Cloud Collaboration Meeting Room site options.)
To ensure that your site is ready for Video Mesh, contact your customer
success manager (CSM) or partner.
Note Video Mesh does not work on Webex sites with telephony
service provider (TSP) audio. The correct platform is not
available if you're using TSP audio.
Failover handling Cisco Expressway-C or E, Release X8.11.4 or later. (See the "Important
Information" section in the Expressway Release Notes for more
information.)
One Button to Push (OBTP) Cisco TMS 15.2.1 and Cisco TMSXE5.2, WBS31 Webex Productivity
Tools
Supported versions of the Webex Video Mesh supports Webex App for desktop (Windows, Mac) and
App app mobile (Android, iPhone, and iPad). To download the app for a supported
platform, go to https://www.webex.com/downloads.html.
Supported codecs See Webex| Video Specifications for Calls and Meetings for the
supported audio and video codecs. Note these caveats for Video Mesh:
• For video quality, Video Mesh supports up to 1080p in certain
scenarios. You can configure this setting in
https://admin.webex.com.
• For SIP video systems, Video Mesh supports SIP clients that do
dual tone multi frequency (DTMF) audio tones. The service also
supports keypad markup language (KPML).
• Webex Teams for Windows and Mac and Room, Desk, and Board
devices registered to the cloud support up to 1080p 30fps with
content audio.
• H.323 clients are mentioned in the data sheet, but they only go to
the cloud.
Supported Webex-registered Room, The following devices are tested and confirmed to work with Video
Desk, and Board devices Mesh nodes:
• Cisco DX70
• Cisco Webex DX80
• Cisco Webex Board 55
• Cisco Webex Room Kit
• Cisco Webex Room Kit Mini
• Cisco Webex Room Kit Plus
• Cisco Webex Room Kit Plus Precision 60
• Cisco Webex Room Kit Pro
• Cisco TelePresence SX10 Quick Set
• Cisco TelePresence SX20 Quick Set
• Cisco TelePresence SX80 Codec
• Cisco TelePresence MX200 G2
• Cisco TelePresence MX300 G2
• Cisco TelePresence MX700
• Cisco TelePresence MX800
You can't run Video Mesh nodes on the same platform with other services. For VMNLite deployments, we don't support coresidency
of VMNLite and non-VMNLite instances.
Table 5: System and Platform Requirements for Video Mesh Node Software in a Production Environment
Hardware Configuration Production Deployment as a Single Production Deployment with VMNLite Notes
Virtual Machine VMs
Cisco Meeting Server • 72vCPUs (70 for Video Mesh Deploy as 3 identical virtual machine We recommend this
1000 (CMS 1000) Node, 2 for ESXi) instances, each with: platform for Video Mesh
Node.
• 60-GB main memory • 23 vCPUs
Caution If you deploy
• 80-GB local hard disk space • 20-GB main memory VMNLite on
• 80-GB local hard disk space a CMS 1000
with a
300-GB hard
drive, you can
run out of
space when
upgrading to
ESXi 7. We
recommend
that you
upgrade to at
least 500-GB
hard drives
before
upgrading
VMware.
Hardware Configuration Production Deployment as a Single Production Deployment with VMNLite Notes
Virtual Machine VMs
Specifications-based • 72vCPUs (70 for Video Mesh Deploy as 3 identical virtual machine Use either the CMS1000
Configuration Node, 2 for ESXi) instances, each with: or VMNLite option
during configuration.
(2.6-GHz Intel Xeon • 60-GB main memory • 23 vCPUs
E5-2600v3 or later
processor required) • 80-GB local hard disk space • 20-GB main memory
• 80-GB local hard disk space
• 48vCPUs (46 for Video Mesh Deploy as 2 identical virtual machine Use the VMNLite option
Node, 2 for ESXi) instances, each with: during configuration.
• 60-GB main memory • 23 vCPUs
Cisco Meeting Server Deploy as 8 identical virtual machine Deploy as 24 identical virtual machine We recommend this
2000 (CMS 2000) instances, each with: instances, each with: platform for Video Mesh
Node.
• 72vCPUs (70 for Video Mesh • 23 vCPUs
Node, 2 for ESXi) Each CMS 2000 blade
• 20-GB main memory needs dedicated hardware
• 60-GB main memory for the Video Mesh
• 80-GB local hard disk space
• 80-GB local hard disk space nodes.
Demo Environments
For basic demo purposes, you can use a specifications-based hardware configuration, with the following
minimum requirements:
• 14vCPUs (12 for Video Mesh Node, 2 for ESXi)
• 8-GB main memory
• 20-GB local hard disk space
• 2.6-GHz Intel Xeon E5-2600v3 or later processor
For more information about the demo software, see Video Mesh Node Demo Software, on page 111.
• For an explicit proxy or transparent inspecting proxy that inspects (decrypts traffic), you must have a
copy of the proxy's root certificate that you'll need to upload to the Video Mesh node trust store on the
web interface.
• We support the following explicit proxy and authentication type combinations:
• No authentication with http and https
• Basic authentication with http and https
• Digest authentication with https only
• NTLM authentication with http only
• For transparent proxies, you must use the router/switch to force HTTPS/443 traffic to go to the proxy.
You can also force Web Socket/444 to go to proxy. (Web Socket uses https.) Port 444 depends on your
network setup. If port 444 is not routed through the proxy, it must be open directly from the node to the
cloud.
Note Video Mesh requires web socket connections to cloud services, so that the nodes
function correctly. On explicit inspecting and transparent inspecting proxies, http
headers that are required for a proper websocket connection are altered and
websocket connections fail.
The symptom when this occurs on port 443 (with transparent inspecting proxy
enabled) is a post-registration warning in Control Hub: “Webex Video Mesh SIP
calling is not working correctly.” The same alarm can occur for other reasons
when proxy is not enabled. When websocket headers are blocked on port 443,
media does not flow between apps and SIP clients.
If media is not flowing, this often occurs when https traffic from the node over
port 444 or port 443 is failing:
• Proxy is not inspecting, but port 444 traffic is not allowed by the proxy.
• Port 443 or port 444 traffic is allowed by the proxy, but it is an inspecting
proxy and is breaking the websocket.
• Peak load
• Deployment model
Note Video Mesh usage doesn't impact your Webex license counts.
In general, adding more nodes to the cluster doesn't double the capacity because of the overhead for setting
up cascades. Use these numbers as general guidance. We recommend the following:
• Test out common meeting scenarios for your deployment.
• Use the analytics in Control Hub to see how your deployment is evolving and add capacity as needed.
Note Overflows on low call volume (especially SIP calls that originate on-premises) aren't a true reflection of scale.
Video Mesh analytics (under Control Hub > Resources > Call Activity) indicate the call legs that originate
on-premises. They don't specify the call streams that came in through the cascade to the Video Mesh node
for media processing. As remote participant numbers increase in a meeting, cascades increase and consume
on-premises media resources on the Video Mesh node.
This table lists capacity ranges for different mixes participants and endpoints on regular Video Mesh nodes.
Our testing included meetings with all participants on the local node and meetings with a mix of local and
cloud participants. With more participants on the Webex cloud, expect your capacity to fall in the lower end
of the range.
Meetings and 1-to-1 calls with only Webex App participants 720p 60–100
Note • The base resolution for Webex App meetings is 720p. But when you share, the participant thumbnails
are at 180p.
• These performance numbers assume that you enabled all the recommended ports.
Meetings and 1-to-1 calls with only Webex App 720p 175–275
participants
Note The base resolution for Webex App meetings is 720p. But when you share, the participant thumbnails are at
180p.
Each cluster contains logic that cascades meetings, except for Video Mesh private meetings, across other
cloud meeting clusters, as needed. Cascading provides a data path for media between clients in their meetings.
Meetings are distributed across nodes. Clients land on the most efficient node nearest to them, depending on
factors such as network topology, WAN link, and resource utilization.
The client's ability to ping media nodes determines reachability. An actual call uses a variety of potential
connection mechanisms, such as UDP and TCP. Before the call, the Webex device (Room, Desk, Board, and
Webex App) registers with the Webex cloud, which provides a list of cluster candidates for the call.
Note The nodes in a Video Mesh cluster require unimpeded communication with each other. Ensure that your
firewalls allow all communication between the Video Mesh nodes.
Important You can't use the short video address format (meet@your_site) if you reserve all Video Mesh clusters for
private meetings. These calls currently fail without a proper error message. If you leave some clusters
unreserved, calls with the short video address format can connect through those clusters.
capacity. The same applies for the Northern California cluster, during peak times in the New York cluster.
These aren't the only mechanisms used for effective deployment of resources, but they are the two main ones.
In addition to determining reachability, the clients also perform periodic round-trip delay tests using Simple
Traversal of UDP through NAT (STUN). STUN round-trip (SRT) delay is an important factor when selecting
potential resources during an actual call. When multiple clusters are deployed, the primary selection criteria
are based on the learned SRT delay. Reachability tests are performed in the background, initiated by a number
of factors including network changes, and do not introduce delays that affect call setup times. The following
two examples show possible reachability test outcomes.
Learned reachability information is provided to the Webex cloud every time a call is set up. This information
allows the cloud to select the best resource (cluster or cloud), depending on the relative location of the client
to available clusters and the type of call. If no resources are available in the preferred cluster, additional clusters
are tested for availability based on SRT delay. A preferred cluster is chosen with the lowest SRT delay. Calls
are served on premises from a secondary cluster when the primary cluster is busy. Local reachable Video
Mesh resources are tried first, in order of lowest SRT delay. When all local resources are exhausted, the
participant connects to the cloud.
Cluster definition and location is critical for a deployment that provides the best overall experience for
participants. Ideally, a deployment should provide resources where the clients are located. If not enough
resources are allocated where the clients make the majority of calls, more internal network bandwidth is
consumed to connect users to distant clusters.
On-premises Webex devices that have the same cluster affinity (preference, based on proximity to the cluster)
connect to the same cluster for a call. On-premises Webex devices with different on-premises cluster affinities,
connect to different clusters and the clusters then bridged to the cloud to combine the two environments into
a single call.
The Webex device connects to either on-premises cluster or cloud based upon its reachability. The following
show examples of the most-common scenarios.
continent), then the system selects the closest cloud media node in that geography instead of a Video Mesh
node.
• The Webex App app or device is on the enterprise network in San Jose.
• San Jose and Amsterdam clusters are at capacity or unavailable.
• SRT delay to the Shanghai cluster is greater than 250 ms and will likely introduce media quality issues.
• The San Francisco cloud cluster has an optimal SRT delay.
• The Shanghai Video Mesh cluster is excluded from consideration.
• As a result, the Webex App client overflows to the San Francisco cloud cluster.
Private meetings isolate all media to your network through Video Mesh. Unlike normal meetings, if the local
nodes are full, the media doesn't cascade to the Webex cloud. But, by default, private meetings can cascade
to different Video Mesh clusters on your network. For private meetings across geographic locations, your
Video Mesh clusters must have direct connectivity to each other to allow intercluster cascades, like HQ1_VMN
to Remote1_VMN in the figure.
All participants in a private meeting must belong to your organization. They can join using the Webex App
or an authenticated video system. Participants with VPN or MRA access to your network can join a private
meeting. But nobody can join a private meeting from outside your network.
• You can integrate Video Mesh nodes with your call control environment. For example deployments
with Video Mesh integrated with Unified CM, see Deployment Models For Video Mesh and Cisco
Unified Communications Manager, on page 23.
• The following types of address translation are supported:
• Dynamic Network Address Translation (NAT) using an IP pool
• Dynamic Port Address Translation (PAT)
• 1:1 NAT
• Other forms of NAT should work as long as the correct ports and protocols are used, but we
do not officially support them because they have not been tested.
• IPv4
• Static IP address for the Video Mesh Node
In general, try to tie the Video Mesh nodes to the Unified CM or Session Management Edition (SME) clusters.
As a best practice, keep the nodes as centralized as possible to the local branches.
Video Mesh supports Session Management Edition (SME). Unified CM clusters can be connected through
an SME, and then you must create a SME trunk that connects to the Video Mesh nodes.
This deployment model involves centralized networking and internet access. Typically, the central location
has a high employee concentration. In this case, a Video Mesh cluster can be located at central location for
optimized media handling.
Locating clusters in branch locations may not yield benefits in the short term and may lead to suboptimal
routing. We recommend that you deploy clusters in a branch only if there is frequent communication between
branches.
Geographic Distribution
The geographically distributed deployment is interconnected, but can exhibit noticeable latency between
regions. Lack of resources can cause suboptimal cascades to be setup in the short term when there are meetings
between users in each geographical location. In this model, we recommend that you allocate of Video Mesh
nodes near regional internet access.
This deployment model contains regional Unified CM clusters. Each cluster can contain a SIP trunk to select
resources in the local Video Mesh cluster. A second trunk can provide a failover path to an Expressway pair
if resources become limited.
Note The nodes in a Video Mesh cluster require unimpeded communication with each other. Ensure that your
firewalls allow all communication between the Video Mesh nodes.
The Video Mesh nodes in a cluster must be in the same VLAN or subnet mask.
Management Management Video Mesh As required Any TCP, Video Mesh node 443
computer node HTTPS
SSH for Management Video Mesh As required Any TCP Video Mesh node 22
access to computer node
Video Mesh
admin console
Intracluster Video Mesh Video Mesh IP address of Any TCP Video Mesh nodes 8443
Communication node node other Video
Mesh nodes
in the cluster
Management Video Mesh Webex cloud As required Any UDP, NTP Any 123*
node
UDP, DNS 53*
TCP,
HTTPS
(WebSockets)
Cascade Video Mesh Webex cloud Any Any TCP Any 444 or 443
Signaling node
Cascade Video Mesh Webex cloud Video Mesh Any*** UDP Any 5004
Media node node
For specific addresses 50000-53000
ranges, see the "IP
For details,
subnets for Webex
see the
Media services" section
"Webex
in Network
Services –
Requirements for
Port Numbers
Webex Services.
and
Protocols"
section in
Network
Requirements
for Webex
Services.
Management Video Mesh Webex cloud As required Any TCP, Any** 443
node HTTPS
Management Video Mesh Video Mesh Video Mesh Any TCP, Video Mesh node (2) 5000–5001
node (1) node (2) node (1) HTTPS
(WebSockets)
Internal Video Mesh All other Video Mesh Any UDP Any 10000–39999
Communication node Video Mesh node
nodes
* The default configuration in the OVA is configured for NTP and DNS. The OVA requires that you open those ports outbound to the internet.
If you configure a local NTP and DNS server, then you don't have to open ports 53 and 123 through the firewall.
** Because some cloud service URLs are subject to change without warning, ANY is the recommended destination for trouble-free operation of
the Video Mesh nodes. If you prefer to filter traffic based on URLs, see the “Webex Teams URLs for Hybrid Services” section of the Network
Requirements for Webex Services for more information.
***The ports vary depending on if you enable QoS. With QoS enabled, the ports are 52,500-65,500. With QoS off, the ports are 34,000-34,999.
The table and diagram show UDP ports that are used for audio and video streams, which are the main focus
of QoS network configurations. While network QoS marking policies for media over UDP are the focus of
the following table, Webex Video Mesh nodes also terminate TCP traffic for presentation and content sharing
for Cisco Webex Teams apps using ephemeral ports 52500–65500. If a firewall sits between the Video Mesh
nodes and the Cisco Webex Teams apps, those TCP ports also must be allowed for proper functioning.
Note Video Mesh Node marks traffic natively. This native marking is asymmetric in some flows and
depends on whether the source ports are shared ports (single port like 5004 for multiple flows to
various destinations and destination ports) or whether they are not (where the port falls in a range
but is unique to that specific bidirectional session).
To understand the native marking by a Video Mesh Node, note that the Video Mesh node marks
audio EF when it is not using the 5004 port as a source port. Some bidirectional flows like Video
Mesh to Video Mesh cascades or Video Mesh to Webex Teams App will be asymmetrically marked,
a reason to use the network to remark traffic based on the UDP port ranges provided.
Source IP Address Destination IP Address Source UDP Destination Native Media Type
Ports UDP Ports DSCP
Marking
Video Mesh Node Webex cloud media 35000 to 52499 5004 AF41 Test STUN
services packets
Video Mesh Node Webex cloud media 52500 to 62999 5004 EF Audio
services
Video Mesh Node Webex cloud media 63000 to 65500 5004 AF41 Video
services
Video Mesh Node Video Mesh Node* 52500 to 62999 5004 EF / AF41* Audio
Video Mesh Node Video Mesh Node* 63000 to 65500 5004 AF41 Video
Video Mesh Node Unified CM SIP 52500 to 62999 Unified CM SIP EF Audio
endpoints Profile
Video Mesh Node Unified CM SIP 63000 to 65500 Unified CM SIP AF41 Video
endpoints Profile
Video Mesh Node Webex Teams 5004 52000 to 52099 AF41 Audio
application or
endpoint**
Video Mesh Node Webex Teams 5004 52100 to 52299 AF41 Video
application or endpoint
*Video Mesh to Video Mesh cascades have asymmetrically marked media for the audio. When the Video Mesh Nodes initiates the cascade the
source ports for audio 52500 to 62999 are used and the VMN can mark EF for that audio, however the return audio from the Video Mesh node
answering the cascade will use the shared ports (5004) and thus mark that return audio traffic AF41.
**The direction of media traffic determines the DSCP markings. If the source ports are from the Video Mesh node (from the Video Mesh node
to Webex Teams app), the traffic is marked as AF41 only. Media traffic that originates from the Webex Teams app or Webex endpoints has the
separate DSCP markings, but the return traffic from the Video Mesh node shared ports does not.
Note Because the source ports are the same for all media regardless of destination, you cannot differentiate the
audio from video or content sharing based on port range with this setting disabled. This configuration does
let you configure firewall pin holes for media more easily that with Quality of Service enabled.
The table and diagram show UDP ports that are used for audio and video streams when QoS is disabled.
Source IP Address Destination IP Address Source UDP Destination Native Media Type
Ports UDP Ports DSCP
Marking
Video Mesh Node Webex cloud media 34000 to 34999 5004 AF41 Audio
services
Video Mesh Node Webex cloud media 34000 to 34999 5004 AF41 Video
services
Video Mesh Node Video Mesh Node 34000 to 34999 5004 AF41 Audio
Video Mesh Node Video Mesh Node 34000 to 34999 5004 AF41 Video
Video Mesh Node Unified CM SIP 34000 to 34999 Unified CM SIP AF41 Audio
endpoints Profile
Video Mesh Node Unified CM SIP 34000 to 34999 Unified CM SIP AF41 Video
endpoints Profile
Video Mesh Node Webex cloud media 35000 to 52499 5004 AF41 Test STUN
services packets
Video Mesh Node Webex Teams 5004 52000 to 52099 AF41 Audio
application or endpoint
Video Mesh Node Webex Teams 5004 52100 to 52299 AF41 Video
application or endpoint
Calling to Apps Video Mesh As required Any UDP and Any** 5004
meeting (Webex node TCP (Used
App by the
desktop and Webex App
mobile app)
apps)
SRTP
Webex (Any)
room, desk,
or board
device
SIP device Unified CM Video Mesh As required Ephemeral TCP or TLS Any** 5060 or
calling to or Cisco node (>=1024) 5061
meeting Expressway
(SIP call control
signaling)
Cascade Video Mesh Webex As required 34000–34999 UDP, SRTP Any** 5004
node cloud (Any)*
50000–53000***
Cascade Video Mesh Video Mesh As required 34000–34999 UDP, SRTP Any** 5004
node node (Any)*
Note Port 5004 is used for all cloud media and on-premises Video Mesh nodes.
Webex App apps continue to connect to Video Mesh nodes over shared ports 5004. These ports are also used
by Webex App apps and endpoints for STUN tests to Video Mesh nodes. Video Mesh node to Video Mesh
node for cascades use a destination shared port of 5004.
* TCP is also supported, but not preferred because it may affect media quality.
** If you want to restrict by IP addresses, see the IP address ranges that are documented in Webex Teams IP subnets for media.
*** The Expressway already uses this port range for the Webex cloud. So, most deployments won't require any updates to support this new
requirement for Video Mesh. But, if your deployment has more stringent firewall rules, you might need to update your firewall configuration to
open these ports for Video Mesh.
For the best experience using Webex in your organization, configure your firewall to allow all outbound TCP and UDP traffic that is destined
toward ports 5004 as well as any inbound replies to that traffic. The port requirements that are listed above assume that Video Mesh nodes are
deployed either in the LAN (preferred) or in a DMZ and that Webex App apps are in the LAN.
Note For bandwidth provisioning and capacity planning guidelines, see the Preferred Architecture documentation.
Based on the active speakers in the meeting, the cascade links are established. Each cascade can contain up
to 6 streams and the cascade is limited to 6 participants (6 in the direction of Webex Teams/SIP to Webex
cloud and 5 in the opposite direction). Each media resource (cloud and Video Mesh) ask the remote side for
the standard definition streams that are needed to fulfil the local endpoint requirements of all remote participants
across the cascade.
To provide a flexible user experience, the Webex platform can do multistream video to meeting participants.
This same ability applies to the cascade link between Video Mesh nodes and the cloud. In this architecture,
the bandwidth requirements vary depending on a number of factors, such as the endpoint layouts.
Architecture
In this architecture, Cisco Webex-registered endpoints send signaling to the cloud and media to the switching
services. On-premises SIP endpoints send signaling to the call control environment (Unified CM or
Expressway), which then sends it to the Video Mesh node. Media is sent to the transcoding service.
Cascades
Most Cisco endpoints can send 3 or 4 streams from a single source in a range of resolutions (from 1080p to
180p). The layout of the endpoint dictates the requirement for the streams needed on the far end of the cascade.
For active presence, the main video stream is 1080p or 720p, the video panes (PiPS) are 180p. For equal view,
the resolution is 480p or 360p for all participants in most cases. The cascade created between Video Mesh
nodes and the cloud also sends 720p, 360p and 180p in both directions. Content is sent as single stream, and
audio is sent as multiple streams.
Cascade bandwidth graphs that provide a per-cluster measurement are available in the Analytics menu in
Webex Control Hub. You cannot configure cascade bandwidth per meeting in Control Hub.
Note The maximum negotiated cascade bandwidth per meeting is 20Mbps for main video for all sources and the
multiple main video streams that they could send. This maximum value does not include the content channel
or audio.
Note In the diagrams, the bandwidth numbers for transmitted and received data are for example purposes only.
They are not an exhaustive coverage of all possible meetings and accompanying bandwidth requirements.
Different meeting scenarios (joined participants, device capabilities, content sharing within the meeting,
activity at any given point in time during the meeting) will yield different bandwidth levels.
This diagram shows a meeting with cloud and premises registered endpoints and an active speaker.
In the same meeting, this diagram shows an example of a cascade created between the Video Mesh nodes and
the cloud in both directions.
In the same meeting, this diagram shows an example of a cascade from the cloud.
This diagram shows a meeting with the same devices above, along with a Webex Meetings client. The system
sends the active speaker and last active speaker in high definition, along with an extra HD stream of the active
speaker for Webex Meeting clients because Video Mesh nodes do not support the Webex Meetings at this
time.
3. You must enable CMR for your Webex site under user profiles. (You can do this in a bulk update CSV
with the SupportCMR attribute).
Note If you have a Webex site that is managed in Site Administration, we recommend that you link it with Control
Hub now, in order to have access to a wider set of features. See Link Cisco Webex Sites to Control Hub for
Cisco Webex Teams and Analytics for more information.
For further information, see Feature Comparison and Migration Path from Collaboration Meeting Room
Hybrid to Video Mesh, on page 120 in the Appendix.
Related Topics
How Do I Contact My Customer Success Manager (CSM)?
Procedure
Step 1 In a web browser, enter this URL with the public IP address of your Expressway or endpoint at the end.
Example:
https://ds.ciscospark.com/v1/region/<public IP address>
Step 2 Verify that the countryCode is appropriate for the location of your Expressway or endpoint.
Step 3 If the location is incorrect, submit a request to correct the location of your public IP address to MaxMind at
https://support.maxmind.com/geoip-data-correction-request/correct-a-geoip-location.
Procedure
Step 2 Work with your partner, customer success manager, or trials representative to understand and prepare your
Webex environment so that it's ready to connect to Video Mesh. For more information, see Requirements for
Webex Services, on page 37.
Step 3 Record the following network information to assign to your Video Mesh nodes:
• IP address (Recommended)
• Network mask
• Gateway IP address
• DNS servers
• NTP servers
• A hostname and optionally domain name for the Video Mesh node. (Optional)
Note We recommend that you use IP addresses for Video Mesh. If you plan to configure the nodes
with FQDN, the FQDN value should be resolvable using all the entries in the DNS servers list
configured on the node. You must also create both forward- and reverse-DNS (A- and
PTR-records) in the DNS configuration.
Step 4 Before starting installation, make sure your Webex organization is enabled for Video Mesh. This service is
available for organizations with certain paid Webex service subscriptions as documented in License
Requirements for Cisco Webex Hybrid Services. Contact your Cisco partner or account manager for assistance.
Step 5 Choose a supported hardware or specifications-based configuration for your Video Mesh node, as described
in System and Platform Requirements for Video Mesh Node Software, on page 10.
Step 6 Make sure your server is running VMware ESXi 6 (or later) and vSphere 6 (or later) with a VM host operational.
Step 7 If you're integrating Video Mesh with your Unified CM call control environment and you want the participant
lists to be consistent across meeting platforms, make sure your Unified CM cluster security mode is set to
mixed mode so that it supports TLS-encrypted traffic. End-to-end encrypted traffic is required for this
functionality to work.
See the TLS setup chapter in the Security Guide for Cisco Unified Communications Manager for more
information about switching your Unified CM environment to mixed mode. See the Active Control solution
guide for more information about the features and about how to set up end-to-end encryption.
Step 8 If you're integrating a proxy (explicit, transparent inspecting, or transparent non-inspecting) with Video Mesh,
make sure you following the requirements as documented in Requirements for Proxy Support for Video Mesh,
on page 11.
What to do next
Install and Configure Video Mesh Node Software, on page 44
Procedure
Step 3 Set the Network Configuration of the Video Use this procedure to configure the network
Mesh Node in the Console, on page 47 settings for the Video Mesh Node if you didn't
configure them when you set up the node on
a virtual machine. You'll set a static IP address
and change the FQDN/hostname and NTP
servers. DHCP is not currently supported.
Step 4 Use these steps to configure the external After the node is back online and you verified
interface for a dual network interface (dual the internal network configuration, you can
NIC) deployment: configure the external network interface if
you're deploying the Video Mesh Node in your
• Set The External Network Interface of
network's DMZ so that you can isolate the
the Video Mesh Node, on page 49
enterprise (internal) traffic from the outside
• Add Internal and External Routing Rules, (external) traffic.
on page 50
You can also make exceptions or overrides to
the default routing rules.
Step 5 Register the Video Mesh Node to the Webex Use this procedure to register Video Mesh
Cloud, on page 51 nodes to the Webex cloud and complete
additional configuration. When you use
Control Hub to register your node, you create
a cluster to which the node is assigned. A
cluster contains one or more media nodes that
serve users in a specific geographic region.
The registration steps also configure SIP call
settings, set an upgrade schedule, and subscribe
to email notifications.
Step 6 Enable and verify Quality of Service (QoS) Enable QoS if you want Video Mesh nodes to
with the following tasks: automatically mark SIP traffic (on-premises
SIP registered endpoints) for both audio (EF)
• Enable Quality of Service (QoS) for
and video (AF41) separately with appropriate
Video Mesh Node, on page 54
class of service and use well-known port
• Verify Video Mesh Node Port Ranges ranges for specific media types. This change
With Reflector Tool in the Web Interface, will let you create QoS policies and effectively
on page 55 remark return traffic from the cloud if desired.
Use the Reflector Tool steps to verify the
correct ports are opened on your firewall.
Step 7 Configure Video Mesh Node for Proxy Use this procedure to specify the type of proxy
Integration, on page 57 that you want to integrate with a Video Mesh.
If you choose a transparent inspecting proxy,
you can use the node's interface to upload and
Step 8 Follow Integrate Video Mesh With Call SIP devices don't support direct reachability,
Control Task Flow, on page 59 and choose so you must use Unified CM or VCS
one of the following, depending on your call Expressway configuration to establish a
control, security requirements, and whether relationship between on-premises registered
you want to integrate Video Mesh with your SIP devices and your Video Meshclusters.
call control environment:
You only need to trunk your Unified CM or
• Configure Unified CM Secure TLS SIP VCS Expressway to Video Mesh Node,
Traffic Routing for Video Mesh, on page depending on your call control environment.
61 (TLS)
• Configure Unified CM TCP SIP Traffic
Routing for Video Mesh, on page 64
(TCP)
• Configure Expressway TCP SIP Traffic
Routing for Video Mesh, on page 67
(TCP)
Step 9 Exchange Certificate Chains Between Unified In this task, you download certificates from
CM and Video Mesh Nodes, on page 69 the Unified CM and Video Mesh interfaces
and upload one to the other. This step
establishes secure trust between the two
products and, in conjunction with the secure
trunk configuration, allows encrypted SIP
traffic and SRTP media in your organization
to land on Video Mesh nodes.
Step 10 Enable Media Encryption for the Organization Use this procedure to turn on media encryption
and Video Mesh Clusters, on page 71 for your organization and individual Video
Mesh clusters. This setting forces end-to-end
TLS setup and you must have a secure TLS
SIP trunk in place on your Unified CM that
points to your Video Mesh nodes.
Step 11 Enable Video Mesh for the Webex Site, on To use optimized media to the Video Mesh
page 72 Node for a Webex meeting, Personal Room
meeting, or Webex App meeting that allows
you to join from a video device, this
configuration needs to be turned on for the
Webex site. Enabling this setting links Video
Mesh and meeting instances in the cloud
together and allows cascades to occur from
Video Mesh nodes.
• A supported server with VMware ESXi or vCenter 6.0 or later installed and running
• Disable virtual machine backups and live migration. Video Mesh Node clusters are realtime systems;
any virtual machine pauses can make these systems unstable. (For maintenance activities on a Video
Mesh Node, use maintenance mode from Control Hub.)
Procedure
Step 1 Using your computer, open the VMware vSphere client and sign in to the vCenter or ESXi system on the
server.
Step 4 On the Select a name and folder page, enter a Virtual machine name for the Video Mesh Node (for example,
"Video_Mesh_Node_1"), choose a location where the virtual machine node deployment can reside, and then
click Next.
A validation check runs. After it finishes, the template details appear.
Step 7 On the Select storage page, ensure that the default disk format of Thick Provision Lazy Zeroed and VM
storage policy of Datastore Default are selected and then click Next.
Step 8 On the Select networks page, choose the network option from the list of entries to provide the desired
connectivity to the VM.
• For Internal Interface Network, choose the node's internal IP address.
• For External InterfaceNetwork, choose the external IP address that faces the public network. Ignore
this option if you don't have a dual NIC deployment.
Note The inside interface (the default interface for traffic) is used for CLI, SIP trunks, SIP traffic and
node management. The outside (external) interface is for HTTPS and websockets communication
to the Webex cloud, along with the cascades traffic from the nodes to a meeting.
For a DMZ deployment, you can set up the Video Mesh node with the dual network interface (NIC). This
deployment lets you separate the internal enterprise network traffic (used for interbox communication, cascades
between node clusters, and to access the node's management interface) from the external cloud network traffic
(used for connectivity to the outside world and cascades to the cloud). All nodes in a cluster must be in dual
NIC mode; a mixture of single and dual NIC is not supported.
Note For an existing installation of Video Mesh Node software, you cannot upgrade from a single NIC
to a dual NIC configuration. You must do a fresh install of Video Mesh Node in this case.
Step 9 On the Customize template page, configure the following network settings:
• Hostname (Optional)—Enter the FQDN (hostname and domain) or a single word hostname for the node.
Note • To ensure a successful registration to the cloud, use only lowercase characters in the
FQDN or hostname that you set for the Video Mesh Node. Capitalization is not supported
at this time.
• When using or configuring FQDN or hostname, you must also enter a valid and resolvable
domain. The total length of the FQDN must not exceed 64 characters.
• IP Address— Enter the IP address for the internal interface of the node.
• Mask—Enter the subnet mask address in dot-decimal notation. For example, 255.255.255.0.
• Gateway—Enter the gateway IP address. A gateway is a network node that serves as an access point to
another network.
• DNS Servers—Enter a comma-separated list of DNS servers, which handle translating domain names
to numeric IP addresses. (Up to 4 DNS entries are allowed.)
• NTP Servers—Enter your organization's NTP server or another external NTP server that can be used
in your organization. You can also use a comma-separated list to enter multiple NTP servers.
• The Video Mesh Node must have an internal IP address and resolvable DNS name. The node IP address
must not belong to the IP address range reserved for Video Mesh Node internal use. The default reserved
IP address range is 172.17.42.0–172.17.42.63, which can be configured later in the Diagnostic menu.
This IP address range is for communication within the Video Mesh Node and between the software
containers which hold the different components of the node—for example, SIP interface and media
transcoding.
• Deploy all the nodes on the same subnet or VLAN, so that all nodes in a cluster are reachable from
wherever the clients reside in your network.
• For a dual NIC DMZ deployment, you can set the external IP address in the node console, after you've
saved the internal network configuration and rebooted the node later.
If preferred, you can skip the network setting configuration and follow the steps in Set the Network
Configuration of the Video Mesh Node in the Console, on page 47 after you sign into the node.
Step 10 On the Ready to Complete page, verify that all the settings that you entered match the guidelines in this
procedure, and then click Finish.
After deployment of the OVA is complete, your Video Mesh Node appears in the list of VMs.
Step 11 Right-click the Video Mesh Node VM, and then choose Power > Power On.
The Video Mesh Node software is installed as a guest on the VM Host. You are now ready to sign in to the
console and configure the Video Mesh Node.
Troubleshooting Tips
You may experience a delay of a few minutes before the node containers come up. A bridge firewall message
appears on the console during first boot, during which you can't sign in.
What to do next
Log in to the Video Mesh Node Console, on page 47
Procedure
Step 1 From the VMware vSphere client, go to the Video Mesh Node VM, and then choose Console.
The Video Mesh Node VM boots up and a login prompt appears. If the login prompt does not appear, press
Enter. You may briefly see a message that indicates the system is being initialized.
Step 2 Use the following default username and password to log in:
a) Login: admin
b) Password: cisco
Because you are logging in to the Video Mesh Node for the first time, you must change the administrator
passphrase (password).
Step 3 For (current) password, enter the default password (from above), and then press Enter.
Step 4 For new password, enter a new passphrase, and then press Enter.
Step 5 For retype new password, retype the new passphrase, and then press Enter.
A "Password successfully changed" message appears, and then the initial Video Mesh Node screen appears
with a message about unauthorized access being prohibited.
What to do next
Set the Network Configuration of the Video Mesh Node in the Console, on page 47
Note The inside interface (the default interface for traffic) is used for CLI, SIP trunks, SIP traffic and node
management. The outside (external) interface is for HTTPS and websockets communication to the Webex
cloud, along with the cascades traffic from the nodes to a meeting.
Procedure
Step 1 Open the node console interface through the VMware vSphere client and then sign in using the admin
credentials.
After first time setup of the network settings and if the Video Mesh is reachable, you can access the node
interface through secure shell (SSH).
Step 2 From the main menu of the Video Mesh Node console, choose option 2 Edit Configuration and then click
Select.
Step 3 Read the prompt that the calls will end on the Video Mesh Node, and then click Yes.
Step 4 Click Static, enter the IP address for the internal interface, Mask, Gateway, and DNS values for your
network.
• The Video Mesh Node must have an internal IP address and resolvable DNS name. The node IP address
must not belong to the IP address range reserved for Video Mesh Node internal use. The default reserved
IP address range is 172.17.42.0–172.17.42.63, which can be configured in the Diagnostic menu. This
IP address range is for communication within the Video Mesh Node and between the software containers
which hold the different components of the node—for example, SIP interface and media transcoding.
• Deploy all the nodes on the same subnet or VLAN, so that all nodes in a cluster are reachable from
wherever the clients reside in your network.
• For a dual NIC DMZ deployment, you can set the external IP address in the next procedure, after you've
saved the internal network configuration and rebooted the node.
Step 5 Enter your organization's NTP server or another external NTP server that can be used in your organization.
After you configure the NTP server and save network settings, you can follow the steps in Check Health of
Video Mesh Node From Console, on page 116 to verify that the time is synchronizing correctly through the
specified NTP servers.
Step 7 Click Save, and then click Save Changes & Reboot.
During the save, DNS validation is performed if you provided a domain. A warning is displayed if the FQDN
(hostname and domain) is not resolvable using the DNS server addresses provided. You may choose to save
by ignoring the warning but calls will not work until the FQDN can resolve to the DNS configured on the
node. After the Video Mesh Node reboots, the network configuration changes take effect.
What to do next
Once the software image is installed and configured with the network settings (IP Address, DNS, NTP, and
so on) and accessible on the enterprise network, you can move to the next step of securely registering it to
the cloud. The IP address that is configured on the Video Mesh Node is accessible only from the enterprise
network. From a security perspective, the node is hardened whereby only customer administrators can access
the node interface to perform configuration.
Set The External Network Interface of the Video Mesh Node, on page 49
Procedure
Step 1 From the main menu of the Video Mesh Node console, choose option 5 External IP Configuration and then
click Select.
Step 2 Click 1 Enable/Disable, then Select, and then Yes to enable the external IP address options on the node.
Step 3 As you did with the initial network configuration, enter the IP Address (external), Mask, and Gateway
values.
Note The Interface field shows the name of the external interface for the node.
Step 5 To validate the internal and external IP address configuration, from the main menu of the console, go to 4
Diagnostics, and then choose Ping.
Step 6 In the ping field, enter a destination address that you want to test, such as an external destination or an internal
IP address, and then click OK.
• Test an external destination (example, cisco.com); if successful, the results show that the destination was
accessed from the external interface.
• Test an internal IP address; if successful, the results show that the address was accessed from the internal
interface.
What to do next
Register the Video Mesh Node to the Webex Cloud, on page 51
Procedure
Step 1 From the Video Mesh node interface, choose 5 External IP Configuration and then click Select.
Step 2 Choose 3 Manage Routing Rules, and then click Select.
The first time you open this page, the default system routing rules appear in the list. By default, all internal
traffic goes through the internal interface and external traffic through the external interface.
You can add manual overrides to these rules in the next steps.
Caution Custom routing rules may create potential for conflicts with other routing. For example, you may define a
rule that freezes your SSH connection to the Video Mesh Node interface. If this happens, do one of the
following and then remove or modify the routing rule:
• Open an SSH connection to the public IP address of the Video Mesh Node.
• Access the Video Mesh Node through the ESXi console
Procedure
Step 1 From the customer view in https://admin.webex.com, go to Services > Hybrid, and then choose one:
• If this is the first Video Mesh Node you're registering, click Set up on the Video Mesh card, and then
click Next.
Note On this page, you can review the prerequisites. See Complete the Prerequisites for Video Mesh,
on page 39 for more information.
• If you've already registered one or more Video Mesh Nodes, click View all on the Video Mesh card, and
then click Add Resource.
You sign in to Control Hub using the customer admin credentials. The Control Hub admin functionality is
available only to users who are defined as admins. See Customer Account Roles for more information.
Step 2 Make sure you have installed and configured your Video Mesh Node, click Yes, I'm ready to register..., and
then click Next.
Step 3 In Create a new or select a cluster, choose one:
• For a new cluster, enter a name for the cluster to which you want to assign your Video Mesh Node.
• For an existing cluster, Click the field and then choose an existing cluster to add the new node to.
Tip We recommend that you name a cluster based on where the nodes of the cluster are located
geographically. Examples: "San Francisco" or "New York" or "Dallas."
Step 4 In Enter the FQDN or IP address, enter the fully qualified domain name (FQDN) or internal IP address of
your Video Mesh Node and then click Next.
• If you use FQDN, enter a domain that can be resolved by DNS.
• If you use an IP address, enter the same internal IP address that you used to configure the node from the
console.
An FQDN must resolve directly to the IP address. Otherwise it is not useable. We perform the validation on
FQDN to rule out any typo or configuration mismatch.
Note The dual network interface does not support specifying an FQDN for the external IP address. The
FQDN can be added only on the screen where internal IP address is entered. That is what the FQDN
must resolve to using the DNS servers that are specified on the same screen.
Step 5 Under Upgrade Schedule, choose a time, frequency, and time zone.
The default is a daily upgrade schedule. You can change it to a weekly schedule on a specific day. When an
upgrade is available, the Video Mesh Node software automatically upgrades during the time that you select.
Note When an upgrade is available, you can use Upgrade Now to start the upgrade before the next
maintenance window or Postpone to defer it until the subsequent window.
Step 6 Under Email Notifications, add any administrator email addresses to subscribe to notifications about service
alarms and software upgrades.
Your administrator email address is automatically added, but you may remove it if you prefer.
Step 7 Toggle the Video Quality setting on to enable 1080p 30fps video.
With this setting, participants that join a meeting that is hosted in a Video Mesh Node can use 1080p 30fps
video if they are all inside the corporate network and they're using a high definition-capable device. The setting
applies to all clusters of nodes.
Note • If this setting is off, the default is 720p.
• For video resolutions that the Webex App supports, see Video Specifications for Calls and
Meetings.
Step 8 Read the information under Complete Registration and then click Go to Node to register the node to the
Webex cloud.
A new browser tab opens to check the node. This step white lists the Video Mesh Node using the IP address
of node. During the registration process, Control Hub redirects you to the Video Mesh Node. The IP address
must be whitelisted, otherwise registration will fail. The registration process must be completed from the
enterprise network where the node is installed.
Step 9 Check Allow Access to the Webex Video Mesh Node, and then click Continue.
Step 10 Click Allow.
Your account is validated, your Video Mesh Node is registered and the message "Registration Complete"
appears indicating your Video Mesh Node is now registered to Webex.
The Video Mesh Node gets machine credentials based on your organization's entitlements. The generated
machine credentials expire periodically and are refreshed.
Step 11 Click the portal link or close the tab to go back to the Video Mesh page.
On the Video Mesh page, you now see the new cluster that contains the Video Mesh Node that you registered.
• If you go to the cluster, you'll see the new Video Mesh Node, which initially shows a status of Registering.
The node changes to Running when it is ready for use in your Webex organization.
• Because the software is a container that contains a couple of services from the cloud infrastructure, it
gets updates from the cloud to remain in sync with the cloud services. Required updates may install
shortly after you register the node to the cloud. You can also change your automatic upgrade schedule.
See Configure Automatic Upgrades for Cisco Webex Hybrid Services Resources for more information.
• If you installed the demo image on the node that you registered, you'll see a “demo mode” yellow-status
alarm. This alarm is normal, but you should install the full software image before the 90-day grace period
expires for the demo image.
At this point, the Video Mesh node is ready to communicate with Cisco cloud services over the secured
channels using a token issued for authentication.The Video Mesh node also communicates with Docker Hub
(docker.com, docker.io). Docker is used by Video Mesh node to store containers for distribution to different
Video Mesh nodes all over the world. Only Cisco has credentials to write to Docker Hub. The Video Mesh
nodes can reach out to Docker Hub using read-only credentials to download the containers for upgrades.
Note Images are downloaded based on checksum, which is transmitted to the node as part of the
provisioning data. See this document for more details on how docker pull works:
https://docs.docker.com/v17.09/engine/userguide/storagedriver/imagesandcontainers/
#sharing-promotes-smaller-images
Video Mesh Node to the cloud. If this setting is not enabled, then the devices do not use the Video
Mesh Node and connect directly to the cloud (just like a scenario where the meeting overflows to
the cloud).
• The Video Mesh Node can connect to your Webex site or to another customer or partner's Webex site.
For example, Site A deployed a Video Mesh Node cluster and registered it with the example1.webex.com
domain. If users in Site A dial in to [email protected], they use the Video Mesh Node
and a cascade can be created. If the users in site A dial [email protected], the Site A
users will use their local Video Mesh Node and connect to the meeting on Site B's Webex organization
(assuming that Site B also has video platform 2.0 and has the preceding Video Mesh CMR setting
enabled).
What to do next
• To register additional nodes, repeat these steps.
• If an upgrade is available, we recommend that you apply it as soon as possible. The upgrade process uses
these steps:
1. The provisioning data is pushed to the Cisco Webex cloud by the Cisco development team over
secured channels. The provisioning data is signed. For the containers, the provisioning data contains
name, checksum, version, and so on. Video Mesh Node also gets its provisioning data from the Cisco
Webex cloud over secured channels.
2. Once Video Mesh Node gets its provisioning data, the node authenticates with read-only credentials
and downloads the container with specific checksum and name and upgrades the system. Each
container running on Video Mesh Node has an image name and checksum. These attributes are
uploaded to the Cisco Webex cloud using secured channels.
Procedure
Step 1 From the customer view in https://admin.webex.com, go to Services > Hybrid, click Edit settings on the
Video Mesh card.
Step 2 Scroll to Quality of Service and click Enable.
When enabled, you get the large, discrete port range (determined by on-premises call control configuration)
that's used for audio and video for on-premises SIP clients/endpoints and intracluster cascades with unique
DSCP markings:.
All SIP and cascade traffic from Video Mesh nodes is marked with EF for audio and AF41 for video. The
discrete port ranges are used as source ports for cascade media to other Video Mesh nodes and cloud media
nodes as well as source and destination ports for SIP client media. Webex Teams apps and cascade media
continue to use the destination shared port of 5004.
Note All Video Mesh return traffic (audio, video, content) from the shared ports is marked with AF41.
The audio traffic needs to be remarked to EF in your network, based on the source port numbers.
A status message appears that shows which nodes are being enabled one-by-one for the QoS port range. You
can click review pending nodes to see a list of nodes that are pending for QoS. Enabling this setting can take
up to 2 hours, depending on call traffic on the nodes.
Step 3 If QoS is not fully enabled in 2 hours, open a case with support for further investigation.
The nodes reboot and are updated with the new port range.
If you decide to disable the setting, you get the small, consolidate port range that's used for both audio and
video (34000–34999). All traffic from Video Mesh nodes (SIP, cascades, cloud traffic, and so on) gets a single
marking of AF41.
Verify Video Mesh Node Port Ranges With Reflector Tool in the
Web Interface
The reflector tool (a combination of a server on the Video Mesh node and client through a Python script) is
used to verify whether the required TCP/UDP ports are open from Video Mesh nodes.
Procedure
Step 1 From the customer view in https://admin.webex.com, enable maintenance node for the Video Mesh Node by
following these instructions.
Step 2 Wait for the node to show a 'Ready for maintenance' status in Control Hub.
Step 3 Open the Webex Video Mesh node interface.
For instructions, see Manage Video Mesh Node From the Web Interface, on page 92.
Step 4 Scroll to Reflector Tool, and then start either the TCP Reflector Server or UDP Reflector Server, depending
on what protocol you want to use.
Step 5 Click Start Reflector Server, and then wait for the server to start successfully.
You'll see a notice when the server starts.
Step 6 From a system (such as a PC) on a network that you want Video Mesh nodes to reach, run the script with the
following command:
$ python <local_path_to_client_script>/reflectorClient.py --ip <ip address of the server>
--protocol <tcp or udp>
At the end of the run, the client shows a success message if all the required ports are open:
The client shows a failed message if any required ports are not open:
Step 7 Resolve any port issues on the firewall and then rerun the above steps.
Step 8 Run the client with --help to get more details.
Procedure
Step 1 Enter the Video Mesh setup URL https://[IP or FQDN/setup in a web browser, enter the admin
credentials you set up for the node, and then click Sign In.
Step 2 Go to Trust Store & Proxy, and then choose an option:
• No Proxy—The default option before you integrate a proxy. No certificate update is required.
• Transparent Non-Inspecting Proxy—Video Mesh nodes are not configured to use a specific proxy
server address and should not require any changes to work with a non-inspecting proxy. No certificate
update is required.
• Transparent Inspecting Proxy—Video Mesh nodes are not configured to use a specific proxy server
address. No http(s) configuration changes are necessary on Video Mesh; however, the Video Mesh nodes
need a root certificate so that they trust the proxy. Inspecting proxies are typically used by IT to enforce
policies regarding which websites can be visited and types of content that are not permitted. This type
of proxy decrypts all your traffic (even https).
• Explicit Proxy—With explicit proxy, you tell the client (Video Mesh nodes) which proxy server to use,
and this option supports several authentication types. After you choose this option, you must enter the
following information:
a. Proxy IP/FQDN—Address that can be used to reach the proxy machine.
b. Proxy Port—A port number that the proxy uses to listen for proxied traffic.
c. Proxy Protocol—Choose http (Video Mesh tunnels its https traffic through the http proxy) or https
(traffic from the Video Mesh node to the proxy uses the https protocol). Choose an option based on
what your proxy server supports.
d. Choose from among the following authentication types, depending on your proxy environment:
Option Usage
Option Usage
Step 3 Click Upload a Root Certificate or End Entity Certificate, and then locate and choose the root certificate
for the explicit or transparent inspecting proxy.
The certificate is uploaded but not yet installed because the node needs to be rebooted to install the certificate.
Click the arrow by the certificate issuer name to get more details or click Delete if you made a mistake and
want to reupload the file.
Step 4 For transparent inspecting or explicit proxies, click Check Proxy Connection to test the network connectivity
between the Video Mesh node and the proxy.
If the connection test fails, you'll see an error message that shows the reason and how you can correct the
issue.
Step 5 After the connection test passes, for explicit proxy, turn the toggle on to Route all port 443/444 https requests
from this node through the explicit proxy. This setting requires 15 seconds to take effect.
Step 6 Click Install All Certificates Into the Trust Store (appears whenever a root certificate was added during
proxy setup) or Reboot (appears if no root certificate was added), read the prompt, and then click Install if
you're ready.
The node reboots within a few minutes.
Step 7 After the node reboots, sign in again if needed, and then open the Overview page to check the connectivity
checks to make sure they are all in green status.
The proxy connection check only tests a subdomain of webex.com. If there are connectivity problems, a
common issue is that some of the cloud domains listed in the install instructions are being blocked at the
proxy.
Note When you use the short video address format ([email protected]), the Video
Mesh node always handles the call. The node handles the call even if the call is
to a site that doesn't have Video Mesh enabled.
Procedure
Configure Unified CM Secure TLS SIP Traffic Routing for Video Mesh
Procedure
Field Value
X.509 Subject Name Enter the common name of the Video Mesh node certificate.
Secure Certificate Subject or
Subject Alternate Name
d) Leave all other fields with their default values and save your changes.
Step 3 Add a new SIP trunk to point to your Video Mesh clusters:
Step 4 Create a SIP trunk to point to an Expressway for Webex cloud failover.
Caution You can use a SIP trunk already in place for an existing Unified CM and Expressway deployment.
If you create another one, and you also run Mobile Remote Access (MRA) with those Expressways,
you can break MRA.
a) From Cisco Unified CM Administration, choose Device > Trunk, and then click Add New.
b) Choose SIP Trunk for the trunk type; leave the other values and click Next.
c) Enter a meaningful name, such as “Video_Mesh_VCS_Trunk”.
d) For Calling and Connecting Party Info Format, check Deliver URI and DN in connected party, if
available. This setting enables blended identity. It allows the SIP trunk to transmit the enterprise-side
party's directory URI to Webex.
e) Under SIP Information - Destination, enter an IP address or fully qualified domain name (FQDN) for
each of your Expressways. For the Port, enter 5060.
f) For SIP Profile, choose Standard SIP Profile For Cisco VCS.
Step 5 Create a new route group for calls to Video Mesh clusters:
a) From Cisco Unified CM Administration, choose Call Routing > Route/Hunt > Route Group, and then
click Add New.
b) Enter a meaningful name, such as “Video Mesh Node Route Group”.
c) Change the Distribution Algorithm to Top Down.
d) In the Route Group Member Information section, Find the Devices with name Video Mesh.
e) Add “Video_Mesh_SIP_Trunk_UCMtoVMN” by clicking Add to Route Group.
f) Save your changes.
Step 6 For overflow to the cloud, create a new route group for calls to Expressway:
a) From Cisco Unified CM Administration, choose Call Routing > Route/Hunt > Route Group, and then
click Add New.
b) Enter a meaningful name, such as “Video Mesh Expressway Route Group”.
c) Change the Distribution Algorithm to Top Down.
d) In the Route Group Member Information section, Find the Devices with name Video Mesh.
e) Add “Video_Mesh_VCS_Trunk” by clicking Add to Route Group.
f) Save your changes.
Step 7 Create a new route list for calls to Video Mesh clusters and Expressway:
a) From Cisco Unified CM Administration, choose Call Routing > Route/Hunt > Route List, and then
click Add New.
b) Enter a meaningful name, such as “Video Mesh Node Route List”.
c) Set the Cisco Unified Communications Manager Group to Default, or another value depending on
your configuration.
d) Save your changes.
e) In the Route List Member Information section, click Add Route Group, and then choose Video Mesh
Route Group.
f) Leave the defaults for the other settings, and then save your changes.
g) In the Route List Member Information section, click Add Route Group, and then choose Video Mesh
Expressway Route Group.
h) Leave the defaults for the other settings, and then save your changes.
Step 8 Create a SIP route pattern for the short video address dialing format for Webex meetings:
a) From Call Routing > SIP Route Pattern, click Add New and enter the name “Video Mesh Route
Pattern for Webex Short URIs”.
b) In the IPv4 pattern, enter webex.com as the domain.
c) For SIP Trunk/Route List, choose the Route List created for Video Mesh—For example, “Video Mesh
Route List”.
d) Leave all other fields with their default values and save your changes.
With the short video address dialing feature, users no longer have to remember the Webex site name to join
a Webex meeting or event using a video system. They can join the meeting faster because they only need to
know the meeting or event number.
d) Leave all other fields with their default values and save your changes.
Field Value
d) Leave all other fields with their default values and save your changes.
Step 3 Add a new SIP trunk to point to your Video Mesh clusters:
• In a Unified CM-only deployment, add a single trunk.
• In an SME deployment, a trunk typically exists between Unified CM and SME. Add another trunk
between SME and Video Mesh nodes. Both trunks must have the same settings specified below.
a) From Cisco Unified CM Administration, choose Device > Trunk, and then click Add New.
b) Choose SIP Trunk for the trunk type; leave the other values and click Next.
a) From Cisco Unified CM Administration, choose Device > Trunk, and then click Add New.
b) Choose SIP Trunk for the trunk type; leave the other values and click Next.
c) Enter a meaningful name, such as “Video_Mesh_VCS_Trunk”.
d) For Calling and Connecting Party Info Format, check Deliver URI and DN in connected party, if
available. This setting enables blended identity. It allows the SIP trunk to transmit the enterprise-side
party's directory URI to Webex.
e) Under SIP Information - Destination, enter an IP address or fully qualified domain name (FQDN) for
each of your Expressways. For the Port, enter 5060.
f) For SIP Profile, choose Standard SIP Profile For Cisco VCS.
Step 5 Create a new route group for calls to Video Mesh clusters:
a) From Cisco Unified CM Administration, choose Call Routing > Route/Hunt > Route Group, and then
click Add New.
b) Enter a meaningful name, such as “Video Mesh Node Route Group”.
c) Change the Distribution Algorithm to Top Down.
d) In the Route Group Member Information section, Find the Devices with name Video Mesh.
e) Add the “Video_Mesh_SIP_Trunk_UCMtoVMN” by clicking Add to Route Group.
f) Save your changes.
Step 6 For overflow to the cloud, create a new route group for calls to Expressway:
a) From Cisco Unified CM Administration, choose Call Routing > Route/Hunt > Route Group, and then
click Add New.
b) Enter a meaningful name, such as “Video Mesh Expressway Route Group”.
c) Change the Distribution Algorithm to Top Down.
d) In the Route Group Member Information section, Find the Devices with name Video Mesh.
e) Add the “Video_Mesh_VCS_Trunk” by clicking Add to Route Group.
Type Neighbor
H.323
Mode Off
SIP
Mode On
Port 5060
Transport TCP
Location
Peer [n] Address Enter the IP addresses for each Video Mesh node.
c) Leave the other fields with their default settings, and then save your changes.
Step 2 Create dial patterns for Video Mesh clusters for Webex sites:
a) From Expressway-C, go to Configuration > Dial Plan > Search Rules, and then click New.
b) Configure the following fields for the Webex site search rule:
Rule Name Enter a rule name that easily identifies the search rule—for example,
WebexVideoMesh-YourSite
Priority 100 is the default. Ensure that this number is lower than the cloud
fallback and B2B rules.
Protocol SIP
Target Choose the Video Mesh zone that you created—for example,
WebexVideoMeshZone.
c) Leave the other fields with their default settings, and then save your changes.
Step 3 Create a traversal client and zone pair that points to the cloud Expressway for failover:
a) See the Expressway Basic Configuration Guide for your release for steps to create the traversal client and
zone pair.
Step 4 Create a fallback search rule to the Traversal Client Zone that leads to the Expressway-E:
a) From Expressway-C, go to Configuration > Dial Plan > Search Rules, and then click New.
b) Configure the following fields:
Rule Name Enter a rule name that easily identifies the search rule—for example,
WebexVideoMesh-Failover
Priority 100 is the default. Ensure that the priority is lower by entering a
number that is higher than the Video Mesh dial pattern and B2B rules.
Protocol SIP
Target Choose the Traversal Client Zone that leads to the Expressway-E.
c) Leave the other fields with their default settings, and then save your changes.
Step 5 From Expressway-E, go to Configuration > Zones > Zones. Click New and add the Webex Zone.
In versions before X8.11, you created a new DNS zone for this purpose.
Rule Name Enter a rule name that easily identifies the search rule—for example,
WebexVideoMesh-toCloud
Priority Enter a higher value than the rule for the local Video Mesh nodes. If
the nodes are set to 100, set this value to 101. You must also ensure
that the value is lower than all B2B rules on your Expressway.
Protocol SIP
Source Named
Source Name Choose the secure traversal server zone from Expressway-C—for
example, WebexVideoMeshZone
Step 7 For SIP devices registered to the Expressway-C, open the device IP address in a browser, go to Setup, scroll
to SIP, and choose Standards from the Type drop-down.
Note In a clustered environment, you must install CA and server certificates on each node individually.
Procedure
Step 1 Open the Video Mesh node interface (IP address/setup, for example, https://192.0.2.0/setup) in
your browser and sign in with the node's admin credentials.
Step 2 Go to Server Certificatesand request and upload a certificate and key pair as needed:
a) (Optional) If you need a certificate issued from a certified provider, click Create a Certificate Signing
Request. Fill out the required information (including the Subject Alternative Name(s), which are FQDNs
that must contain the common name, and then generate the request. Download the CSR to submit the
request to the provider. (You can request multiple ones. They return the certificate authority (CA) signed
certificate (the private key was already generated during the CSR creation step)
Note The common name is not a URL. It doesn’t include any protocol (for example http:// or https://),
port number, or pathname. The commonName field in the X.509 certificate specification represents
the common name. For https://www.example.com, the correct value is example.com.
The private key is already in place when you generate a CSR. If you don't use the CSR creation step, you
must upload a private key.
b) When you have the certificate and key, click Upload a Server Certificate (.crt or .pem file), choose the
certificate file, then click Upload a Private Key (.key file) and enter a passphrase if you have one.
c) After you get the certificate, go to the first Video Mesh node in a cluster, click Install Server Certificate,
read the prompt, click Install, then click OK.
A cloud-registered Video Mesh node gracefully shuts down, waiting up to 2 hours for any calls to end.
The node then completes the certificate installation. A prompt appears when the server certificate installs.
You can then reload the page to view the new certificate and key entry.
d) Click Download next to the certificate and key files to save a local copy.
Save the files somewhere that's easy to remember and leave the Video Mesh instance open in the browser
tab.
e) Go to the next Video Mesh node in the cluster, fill in the passphrase, and then upload the private key file.
Then click Upload a Server Certificate and then choose Install Server Certificate, read the prompt,
click Install, then click OK.
f) Repeat these steps for any Video Mesh nodes in the same cluster.
Step 3 In another browser tab, from Cisco Unified OS Administration, go to Security > Certificate Management.
Enter your search criteria and click Find, then choose the filename of the certificate or Certificate Trust List
(CTL) and click Download.
Save the Unified CM file somewhere that's easy to remember and leave Unified CM instance open in the
browser tab.
Step 4 Go back to the Video Mesh node interface tab, click Trust Store & Proxy, and then choose an option:
• If the Unified CM uses a CA certificate that's signed by a well-known organization, then the Video Mesh
node trusts it automatically. The trust is based on the list of root certificates from the VMN node's host
OS, which update periodically.
• If the Unified CM uses a CA certificate that's signed by an internal enterprise CA root certificate, add
that root certificate to the node. That root certificate is available from within the enterprise, but might
not be downloadable from Unified CM.
• Add both the ECDSA and RSA certificates that the Unified CM uses to serve external requests. These
certificates can be self-signed or CA certificates.
• If you downloaded a single certificate, click Upload a Root Certificate or End Entity Certificate (.crt
or .pem file), and choose the CallManager.pem certificate file that you downloaded. Click Install All
Certificates into the Trust Store, read the prompt, click Install, and then reboot the node.
• If you downloaded a certificate chain, upload the root CA certificate and intermediate CA certificate,
and then click Install All Certificates into the Trust Store, read the prompt, and then click Install.
A cloud-registered Video Mesh node gracefully shuts down, waiting up to 2 hours for any calls to end. To
install the CallManager.pem certificate, the node automatically reboots. When it comes back online, a prompt
appears when the CallManager.pem certificate installs on the Video Mesh node. You can then reload the page
to view the new certificate.
Step 5 Go back to the Cisco Unified OS Administration tab and click Upload Certificate/Certificate Chain. Choose
the certificate name from the Certificate Purpose drop-down list, browse to the file that you downloaded
from the Video Mesh node interface, and then click Open.
Step 6 To upload the file to the server, click Upload File.
If you're uploading a certificate chain, you must upload all certificates in the chain.
Note Restart the affected service after uploading the certificate. When the server comes back up, you can
access the CCMAdmin or CCMUser GUI to verify that your newly added certificates are in use.
Settings Result
Unified CM is not configured with a secure trunk and Calls won't fail but they fall back to non-secure mode.
this Video Mesh Control Hub setting is enabled.
Caution Cisco endpoints must also be configured with a security profile and TLS negotiation for end-to-end encryption
to work. Otherwise, calls overflow to the cloud from endpoints that are not configured with TLS. We
recommend that you enable this feature only if all endpoints can be configured to use TLS.
Procedure
Step 1 From the customer view in https://admin.webex.com, go to Services > Hybrid, and then click Settings on
the Video Mesh card.
Step 2 Scroll to Media Encryption and toggle on the setting.
This setting makes encryption mandatory on all media channels that pass through Video Mesh nodes in your
organization. Note the preceding table and caution note for situations where calls may fail and what's required
for end-to-end encryption to work.
Step 3 Click Show all and repeat the following steps on each Video Mesh cluster that you want to enable for secure
SIP traffic.
a) Select a Video Mesh cluster entry in the list, and then click Edit cluster settings.
b) Scroll to SIP Calls and check the checkbox.
c) Under Trusted SIP sources, enter the Common Name (CN) or any FQDNs that are present in the Subject
Alternative Name on the Callmanager certificate (typically the FQDN of the Unified CM).
These entries are identified as trusted SIP sources and are allowed to send secure SIP calls to Webex
Video Mesh.
Procedure
Step 1 Choose one, depending on how you manage your Webex site:
• For Control Hub-managed, from the customer view in https://admin.webex.com, go to Services > Hybrid,
click the Webex site from the Meetings card, and then click Configure to access the the Webex site
configuration options.
• For Site Admin-managed, proceed directly to Site Administration
(https://SITENAME.webex.com/admin, where “SITENAME” is your Webex site name), and
then follow the steps below.
Step 2 From Common Settings, click Cloud Collaboration Meeting Rooms (CMR), choose Video Mesh for
Media Resource Type, and then click Update at the bottom.
This setting links Video Mesh and meeting instances in the cloud together and allows cascades to occur from
Video Mesh nodes. The setting should populate across your environment after 15 minutes. If you leave this
field set to Cloud (the default option), all meetings are hosted in the cloud and the Video Mesh node is not
used.
Procedure
Step 3 During the meeting, access the Webex Conference information from Call Details.
Step 4 Verify that Encryption section shows the Type as AES-128 and the Status as On.
Note Video Mesh analytics and troubleshooting reports show data in the time zone that is set for the local browser.
Analytics
Video Mesh analytics provide a long-term trend (up to 3 months of data) in the categories of engagement,
resource usage, and bandwidth usage.
Procedure
Step 1 From the customer view in https://admin.webex.com, choose Analytics, and then click Video Mesh on the
upper-right side of the screen.
Step 2 Click a category, depending on the type of data you're looking for:
• Engagement
• Resources
• Bandwidth Usage
Tip Click info to get a short description of the donut graph or chart. When done reading, click info
again to flip back to the graph view.
Step 3 From the drop-down on the right, choose an option to fìlter on how far back in time you want to show data.
• Last 7 Days (Default)—Changes the horizontal axis to every 1 hour.
• Last 24 Hours—Changes the horizontal axis to every 10 minutes.
• Last 30 Days—Changes the horizontal axis to every 3 hours.
Step 4 Interact with the charts or donut graphs by using the following options as needed:
• Click one or more segments on the donut graph or chart view and then click to update the donut view
and the corresponding chart view.
• On a specific graph or overview, click maximize if you want to increase the view. The other graphs
and overviews won't appear. Click minimize to zoom back out to the defaul analytics view.
• Choose legend items on the graph or overview to update the view on that specific legend item and then
click . For example, after you select the legend item Cloud and On-Premises, the line graph updates
with that data highlighted.
• Choose the lasso tool and use it to draw a freehand selection across the data that you want to filter
on and then click .
• On a graph that shows data in a time range, narrow down to a specific time range by clicking on the left
and dragging your mouse to the right and then clicking . (This action affects all the related data that
appears on the analytics page.)
Tip Hover over sections of a donut, lines on a graph, or insight points on a graph to view more information
on the specific point in time of the data.
Note To start over from within the same graph or overview, click .
To start over by exiting out of the graph or overview and returning to the main analytics view, click
Clear selection.
The filtered view opens in a new tab. If you want to return to the view before the filter that you created, you
can click the X in the tab name to clear the selection.
Step 5 After you've filtered data in the reports, click more , and then choose a file format option, which saves a
local copy of the report so you can use it offline (for example, in an internally created report):
• PDF
• PNG
• CSV
Step 6 Click Clear all if you'd like to reset the analytics view.
Procedure
Step 1 From the customer view in https://admin.webex.com, choose Troubleshooting, then Status, then click View
Details on the Video Mesh card.
Tip Click info to get a short description of the donut graph or chart. When done reading, click info
again to flip back to the graph view.
Step 2 From the drop-down on the right, choose an option to fìlter on how far back in time you want to show data.
• Last 4 Hours (Default)—When you choose this option, the graph data refreshes every 1 minute.
• Last 24 Hours—When you choose this option, the graph data refreshes every 10 minutes.
Note You can also choose All Clusters or a specific cluster to change the filtered view.
Step 3 Interact with the charts or donut graphs by using the following options as needed:
• Hover over segments on the donut graph or chart view to view information about that specific data point.
• Click legend items on the graph or overview to update the view on the other legend items. For example,
after you select the legend item On-Premises, the line graph updates to exclude On-Premises and only
include the data for the other legend items.
• On a graph that shows data in a time range, narrow down to a specific time range by clicking on the left
and dragging your mouse to the right. (This action affects all the related data that appears on the analytics
page.)
Tip Hover over sections of a donut, lines on a graph, or insight points on a graph to view more information
on the specific point in time of the data.
Step 4 After you've filtered data in the reports, click more , and then choose a file format option, which saves a
local copy of the report so you can use it offline (for example, in an internally created report):
• PNG
• JPG
• PDF
• CSV
• XLSX
Procedure
Step 1 From the customer view in https://admin.webex.com, go to Troubleshooting, click Status, and then under
the Video Mesh section, choose View Details next to Monitoring Tool.
Step 2 Mouse over or click Configure Test, and then click Run-Now.
Step 3 Click Ok to start the test.
What to do next
The results appear as data in the monitoring tool overview page in Control Hub. You can hover over the dots
on the timeline to see the test results. You can also see the test results for each node.
Procedure
Step 1 From the customer view in https://admin.webex.com, go to Troubleshooting, click Status, and then under
the Video Mesh section, choose View Details next to Monitoring Tool.
Step 2 Mouse over or click Configure Test, and then click Periodic.
Step 3 Choose an option:
• Check All Clusters if you want to run the test on all Video Mesh nodes that are in clusters registered to
your Control Hub organization.
• Check individual cluster names if you want to run the test on all Video Mesh nodes that are in specific
clusters registered to your Control Hub organization. Any unchecked cluster entries are excluded from
the test.
• Within individual clusters, check individual node names that are in specific clusters registered to your
Control Hub organization. Any unchecked node entries are excluded from the test.
What to do next
The results appear as data in the monitoring tool overview page in Control Hub. You can hover over the dots
on the timeline to see the test results. You can also see the test results for each node.
The setting applies to all clusters that contain Video Mesh nodes.
Note Cloud-registered devices continue to send and receive 1080p streams, regardless of this setting being turned
on or off.
Procedure
Step 1 From the customer view in https://admin.webex.com, go to Services > Hybrid, and then click Settings on
the Video Mesh card.
Step 2 Toggle on Video Quality.
If this setting is off, the default is 720p.
For video resolutions that the Webex App supports, see Video Specifications for Calls and Meetings.
Private Meetings
The Private Meeting feature enhances the security of your meeting by terminating the media on your premises.
When you schedule a private meeting, the media always terminates on the Video Mesh nodes inside your
corporate network with no cloud cascade.
As shown here, private meetings never cascade to the cloud. The media terminates entirely on your Video
Mesh clusters. Your Video Mesh clusters can only cascade with each other.
Private meetings isolate all media to your network through Video Mesh. Unlike normal meetings, if the local
nodes are full, the media does not cascade to the Webex cloud. But, by default, private meetings can cascade
to different Video Mesh clusters on your network. For private meetings across geographic locations, your
Video Mesh clusters must have direct connectivity to each other to allow intercluster cascades. In the previous
figure, HQ1_VMN to Remote1_VMN can cascade to each other.
All participants in a private meeting must belong to your organization. They can join using the Webex App
or an authenticated video system. A video system must have on-premises connectivity to your Video Mesh
node, either through a wired connection, VPN, or MRA. Participants with VPN or MRA access to your network
can join a private meeting. But nobody can join a private meeting from outside your network.
You can reserve a Video Mesh cluster for private meetings. When the reserved cluster is full, the private
meeting media cascades out to your other Video Mesh clusters. When the reserved cluster is full, private
meetings and non-private meetings share the resources of your remaining clusters.
Non-private meetings don’t use reserved clusters, reserving those resources for the private meetings. If a
non-private meeting runs out of resources on your network, it cascades out to the Webex cloud instead.
Note The Webex App with the Full Featured Webex Experience enabled is incompatible with Video Mesh. For
details, see Clients and Devices That Use Video Mesh Node, on page 2.
• Only scheduled meetings can use the private meeting type. See the Schedule a Cisco Webex Private
Meeting article for details.
• Private meetings always use the native Webex App. You can't join a private meeting if your Webex App
cross launches the Webex Meetings app.
• You can use any current Video Mesh supported device.
• Your nodes can use any current image: 72vCPU, 48vCPU, and 23vCPU.
• Private meeting logic doesn’t create any gaps in metrics. We collect the same metrics for Control Hub
as for non-private meetings.
Note Because some users don't activate this feature, the analytics reports for private
meetings don't appear if your org doesn't have a private meeting in 90 days.
Limitations
Private meetings have these limitations:
• Private meetings only support VoIP for audio. They don’t support Webex Edge Audio or PSTN.
• You can’t use a personal meeting room (PMR) for a private meeting.
• Private meetings don’t support Webex features that require a connection to the cloud, such as, Cloud
Recording, Transcription, and Webex Assistant.
• You can’t join a private meeting from an unauthenticated video system, even one with the Webex App
on it.
Procedure
When you enable this setting, it applies to all meetings for your organization, even those previously scheduled.
Important You can't use the short video address format (meet@your_site) if you reserve all Video Mesh clusters for
private meetings. These calls currently fail without a proper error message. If you leave some clusters
unreserved, calls with the short video address format can connect through those clusters.
Procedure
Step 1 From the customer view in https://admin.webex.com, go to Services > Hybrid and click Show all on the
Video Mesh card.
Step 2 Select your Video Mesh cluster from the list and click Edit cluster settings.
Step 3 Scroll to Private Meetings and enable the setting.
Step 4 Save your change.
External Network Access Denied An external user joins from outside To join a private meeting, external
the corporate network without VPN users need access to the corporate
You need to be on the corporate
or MRA. network through a VPN or MRA.
network to attend the Private
Meeting. Paired Webex devices An external user is on VPN, but Device media doesn't tunnel to the
located outside the corporate they're paired to an unauthenticated corporate network through the
network would not be able to join device. VPN. The device can't join a
the meeting, in such a scenario try private meeting.
connecting your laptop, mobile to
the corporate network and join the Instead, after connecting to VPN,
meeting in unpaired mode. the remote user should join a
private meeting in device unpaired
mode from their desktop or mobile
client.
No Available Clusters A user is on the corporate network Your Video Mesh clusters are:
(on-premises or remote by VPN),
The clusters hosting this private • At capacity
but can’t join a private meeting.
meeting are at peak capacity,
unreachable, offline, or not • Unreachable
registered. Please contact your IT • Offline
admin for assistance.
• Not registered
Not Authorized A user from a different org than the Only users belonging to the host
host org tries to join the private org can join a private meeting.
You are not authorized to attend
meeting.
this Private meeting as you are not
a member of the Host Organization. A device from a different org than Only devices belonging to the host
Please reach out to the Host of the the host org tries to join the private org can join a private meeting.
meeting. meeting.
This setting is off by default, which maintains the behavior from previous releases. In those releases, your
Video Mesh didn’t cascade to Webex and your participants joined through the Webex cloud nodes.
Procedure
Procedure
Step 5 After you read and understand the message, click Deregister Node.
Procedure
Step 1 From the customer view in https://admin.webex.com, go to Services > Hybrid, and then choose Show all on
the Video Mesh card.
Step 2 From the list, select the node that you want to move and then click Actions (the vertical ellipsis).
Step 3 Select Move Node.
Step 4 Choose the appropriate radio button for where you want to move the node:
• Select an existing cluster—Choose an existing cluster from the drop-down list.
• Create a new cluster—Enter a name for the new cluster in the field.
Related Topics
Move a Node in to Maintenance Mode
Procedure
Step 1 From the customer view in https://admin.webex.com, go to Services > Hybrid, and then click View all on
the Video Mesh card.
Step 2 Click a media resource and then click Edit cluster settings.
Step 3 On the Settings page, scroll to Upgrade, and then choose the time, frequency, and time zone for the upgrade
schedule.
Note Upgrades may take longer than a few minutes if the Video Mesh node is waiting for active calls to
end. For a more immediate upgrade process, we recommend that you schedule the automatic upgrade
window outside of your regular business hours.
Step 4 (Optional) If needed, click Postpone to defer the upgrade one time, until the subsequent window.
Under the time zone, the next available upgrade date and time are displayed.
Upgrade Behavior
1. The node makes periodic requests to the cloud to see if an update is available.
2. The cloud does not make the upgrade available until the cluster's upgrade window arrives. When the
upgrade window arrives, the node's next periodic update request to the cloud delivers the update
information.
3. The node pulls updates over a secure channel.
4. Existing services gracefully shut down to stop incoming calls routing to the node. The graceful
shutdown also gives existing calls time to complete (up to 2 hours).
5. The upgrade installs.
6. The cloud only triggers the upgrade for a percentage of nodes in a cluster at a time.
Procedure
Step 1 From the customer view in https://admin.webex.com, go to Services > Hybrid, and then click View all.
Step 2 From the list of resources, scroll to the Video Mesh resource that you want to delete, and then click Edit
Cluster Settings.
Tip You can click Video Mesh to filter on just Video Mesh resources.
Procedure
Step 1 From the customer view in https://admin.webex.com, go to Services > Hybrid, choose Settings on the Video
Mesh card.
Step 2 Click Deactivate.
Step 3 Review the list of clusters and read the disclaimer in the dialog.
Step 4 Check the check box to confirm that you understand this action, and click Deactivate on the dialog.
Step 5 When you are ready to deactivate your Video Mesh, click Deactivate Service.
Deactivation removes all Video Mesh nodes and clusters. Video Mesh is no longer configured.
Solution Make sure your network allows connectivity on the ports required for Video Mesh. For details, see
Ports and Protocols Used by Video Mesh, on page 26.
Caution Maintenance mode is intended solely to prepare a node for shutdown or reboot so that you can make certain
networking setting changes (DNS, IP, FQDN) or prepare for hardware maintenance such as replace RAM,
hard drive, and so on.
When you place a node into maintenance mode, it does a graceful shutdown of calling services (stops accepting
new calls and waits up to 2 hours for existing calls to complete). The purpose of the graceful shutdown of
calling services is to allow reboot or shutdown of the node without causing dropped calls.
The overview is the default page and has the following information:
• Call Status—Provides the number of ongoing calls through the node.
• Node Details—Provides the node type, software image, software version, OS version, QoS status, and
maintenance mode status.
• Node Health—Provides usage data (CPU, memory, disk), and service status (Management Service,
Messaging Service, NTP Sync).
• Network Settings—Provides network information: hostname, interface, IP, gateway, DNS, NTP, and
whether dual IP is enabled.
• Registration Details—Provides registration status, organization name, org ID, cluster the node is a part
of, and cluster ID.
• Cloud Connectivity—Runs a series of tests from the node to the Webex cloud and third party destinations
that the node needs to access to run properly.
• Three types of tests are run: DNS resolution, server response time, and bandwidth.
Note • DNS tests validate that the node can resolve a particular domain. These tests
report as failed if the server does not respond within 10 seconds. They show
as "Passed" with an orange "warning color" if the response time is between
1.5 and 10 seconds. The periodic DNS checks on the node generate alarms
if the DNS response time is longer than 1.5 seconds.
• Connect tests validate that the node can connect to a particular HTTPS URL
and receive a response (responses other than proxy or gateway errors are
accepted as evidence of connection).
• The list of tests run from the overview page are not exhaustive and do not
include port 444 or websocket tests.
• The node sends alarms if calling processes cannot complete websocket
connections to the cloud or connect to call-related services.
• A Pass or Fail result appears next to each test; you can hover over this text to see more information
about what was checked when the test ran.
As shown in the screenshot that follows, alarm notifications can also appear in the side panel, if any alarms
were generated by the node. These notifications identify potential issues on the node and make suggestions
for how you can troubleshoot or resolve these issues. If no alarms were generated, the notification panel does
not appear.
Figure 10: Example of the Overview Page in the Video Mesh Node Web Interface
Procedure
Step 3 Change the following settings for Host and Network Configuration as needed:
• Under Edit Hostname and Domain, change the Hostname and Domain values.
An error is displayed if the FQDN (hostname and domain) does not have the correct format.
• Under Network Mode, Enable DHCP is listed, but DHCP is not supported. You must set a static IP
address, subnet mask, and gateway.
• Under Edit Network Configuration, change the IP Address (for the internal interface), Subnet Mask,
and Gateway(a network node that serves as an access point to another network) values.
Note The Video Mesh Node must have an internal IP address and resolvable DNS name. The node
IP address must not belong to the IP address range reserved for Video Mesh Node internal use.
The default reserved IP address range is 172.17.42.0–172.17.42.63, which can be configured
later in the Diagnostic menu in the node console. This IP address range is for communication
within the Video Mesh Node and between the software containers which hold the different
components of the node—for example, SIP interface and media transcoding.
• Under Edit DNS Servers, change the DNS server entries, which handle translating domain names to
numeric IP addresses. You can enter up to 4 DNS servers.
Step 4 Click Save Host and Network Configuration, and after the popup appears that says the node needs to reboot,
click Save and Reboot.
During the save, all fields are validated on the server side. Warnings that appear generally indicate that the
server isn't reachable or a valid response wasn't returned when queried—for example, if the FQDN is not
resolvable using the DNS server addresses provided. You may choose to save by ignoring the warning but
calls will not work until the FQDN can resolve to the DNS configured on the node. Another possible error
state is if the gateway address is not in the same subnet as the IP address. After the Video Mesh Node reboots,
the network configuration changes take effect.
If the NTP server is an FQDN and that isn’t resolvable, a warning is returned. If the NTP server FQDN is
resolved but the resolved IP can't be queried for NTP time, a warning is returned.
Set The External Network Interface From The Video Mesh Node Web Interface
If your network topology changes, you can use the web interface for each Webex Video Mesh node and change
the network settings there. You may see a caution about changing the network settings. However, you can
still save the changes in case you're making changes to your network after changing Webex Video Mesh node
settings.
You can configure the external network interface if you're deploying the Video Mesh Node in your network's
DMZ so that you can isolate the enterprise (internal) traffic from the outside (external) traffic.
Procedure
Step 8 If there are errors, click Ok to close the error dialog box, fix the errors, and click Save External Network
Configuration again.
What to do next
To validate the internal and external IP address configuration, do the steps in Run a Ping from Video Mesh
Node Web Interface, on page 103.
• Test an external destination (example, cisco.com); if successful, the results show that the destination was
accessed from the external interface.
• Test an internal IP address; if successful, the results show that the address was accessed from the internal
interface.
Add Internal and External Routing Rules From Video Mesh Node Web Interface
In a dual network interface (NIC) deployment, you can fine tune the routing for Video Mesh nodes by adding
user-defined route rules for external and internal interfaces. The default routes are added to the nodes, but
you can make exceptions—for example, external subnets or host addresses that need to be accessed through
the internal interface, or internal subnets or host addresses that need to be accessed from the external interface.
Perform the following steps as needed.
Procedure
Step 4 To add a rule, click Add Routing Rule, then choose one of the following option:.
• For Network Type, click Internal, and then enter the external subnet or host IP address to use for the
internal route.
• For Network Type, click External, and then enter the internal subnet or host IP address to use for the
external route.
Step 6 To delete one or more user-defined rules,check the check box in the column to the left of the rules and then
click Delete Routing Rule(s).
Note The default routes cannot be deleted, but you can delete any user-defined overrides that you
configured.
Caution Custom routing rules may create potential for conflicts with other routing. For example, you may define a
rule that freezes your SSH connection to the Video Mesh Node interface. If this happens, do one of the
following and then remove or modify the routing rule:
• Open an SSH connection to the public IP address of the Video Mesh Node.
• Access the Video Mesh Node through the ESXi console
Procedure
Procedure
Step 2 Go to Network.
The current network settings for the node appear.
What to do next
If you put the node in maintenance mode to change the MTU, turn off maintenance mode.
Procedure
When you enable DNS caching, the DNS Cache Statistics displays the following statistics:
Statistic Description
Cache Entries The number of previous DNS resolutions that the DNS Cache server
has stored
Statistic Description
Cache Hits The number of times since the cache reset that the cache handled a DNS
request from Video Mesh, without querying the customer DNS server
Cache Misses The number of times since the cache reset that the customer DNS server
handled a DNS request from Video Mesh rather than through the cache
Cache Hit Percent The percent of DNS requests from Video Mesh that the cache handled
without querying the customer DNS server
Cache Server Outbound DNS The number of DNS queries that the Video Mesh DNS cache server
queries made against the customer DNS servers
Cache Server Inbound DNS queries The number of DNS queries that Video Mesh made against its internal
DNS Cache server
Outbound to Inbound Query Ratio The ratio of DNS queries made by Video Mesh against the customer
DNS server to the queries made by Video Mesh against its internal DNS
Cache server
Inbound Queries Per Second The average number of DNS queries per second that Video Mesh made
against its internal DNS Cache server
Outbound Queries Per Second The average number of DNS queries per second that Video Mesh made
against the customer DNS servers
Outbound DNS Latency [time The percent of DNS queries that Video Mesh made against the customer
range] DNS servers where the response time fell into the described time range
Use the Wipe DNS Cache button to reset the DNS cache when TAC requests. After wiping the DNS cache,
you see a higher Outbound to Inbound Query Ratio as the cache replenishes. You don't need to place the
node in maintenance mode to wipe the cache.
What to do next
Move the node out of maintenance mode. Then repeat the task on any other nodes that require a change.
Note In a clustered environment, you must install CA and server certificates on each node individually.
Procedure
default self-signed certificate. To create and upload the certificate and key pairs on the Video Mesh node, go
to Server Certificates, and follow these steps:
a) If you need a certificate issued from a certified provider, click Create a Certificate Signing Request.
Fill out the required information (including the Subject Alternative Name(s), which are FQDNs that
must contain the common name). Then, generate and download the CSR to submit the request to the
provider. You can create multiple CSRs. The provider returns the certificate authority (CA) signed
certificate. (The CSR creation step already generated the private key.)
Note The common name is not a URL. It doesn’t include any protocol (e.g. http:// or https://), port
number, or pathname. The commonName field in the X.509 certificate specification technically
represents the common name. For https://www.example.com, the correct value is example.com.
b) When you have the certificate and key, click Upload a Server Certificate (.crt or .pem file), choose the
certificate file, then click Upload a Private Key (.key file) and enter a passphrase if you have one.
The private key is already in place when a CSR is generated. You only need to upload a private key if
you do not use the CSR creation step.
c) After you get the certificate, go to the first Video Mesh node in a cluster, click Install Server Certificate,
read the prompt, click Install, then click OK.
A Video Mesh node that's registered to the cloud waits up to 2 hours for any calls to end and puts itself
into a temporary inactive state (quiesces). Once either the existing calls finish or 2 hours pass (whichever
comes first), this node completes the certificate installation. A prompt appears when the server certificate
installation completes, and you can then reload the page to view the new certificate and key entry.
d) Click Download next to the certificate and key files to save a local copy.
Save the files somewhere that's easy to remember and leave the instance open in the browser tab.
e) Go to the second Video Mesh node in the cluster, fill in the passphrase, and then upload the private key
file. Then click Upload a Server Certificate and then choose Install Server Certificate, read the prompt,
click Install, then click OK.
f) Repeat these steps on every other Video Mesh node in the same cluster.
Step 3 Choose an option depending on how the external server's CA certificate is signed:
• If the server's CA certificate is signed by a generally recognized organization, such as DigiCert, GeoTrust,
or GlobalSign, the Video Mesh node will trust it based on the list of root certificates from the Video
Mesh node's host OS, which are updated periodically. Skip to Step Step 6, on page 102.
• If the server's CA certificate is signed by an internal enterprise CA root certificate, the root certificate
from that authority must be added to the Video Mesh node. Continue with the next step.
Step 4 Get the certificate or certificate trust list (CTL) that the external server uses.
As with the Video Mesh node certificate, save the external server file somewhere that's easy to remember.
Step 5 Go back to the Webex Video Mesh node interface tab, click Trust Store & Proxy, then choose an option:
• To install a single CA certificate, click Upload a Root Certificate or End Entity Certificate (.crt or
.pem file), and then choose the certificate file from your computer, click Install All Certificates into
the Trust Store, read the prompt, click Install, and then reboot the node.
• To install a certificate chain, upload the root CA certificate and intermediate CA certificate, and then
click Install All Certificates into the Trust Store, read the prompt, and then click Install.
A Video Mesh node that's registered to the cloud waits up to 2 hours for any calls to end and puts itself into
a temporary inactive state (quiesces). To install the certificate, the node must reboot and does so automatically.
When it comes back online, a prompt appears when the certificate is installed on the Video Mesh node, and
you can then reload the page to view the new certificate.
Step 6 Repeat the certificate or certificate chain upload on every other Video Mesh node in the same cluster.
Procedure
Step 3 When you open a case or interact with the Cisco TAC, include the upload identifier value so that your support
engineer can access the logs.
If you submitted the log to Cisco directly, you don't need to upload the log bundle to the TAC case.
What to do next
While logs are uploading to Cisco or being downloaded, you can run a packet capture from the same screen.
Caution The packet capture functionality is intended for debugging purposes only. If you run a packet capture on a
live Video Mesh node that is hosting active calls, the packet capture may affect the performance of the node
and the generated file might be overwritten. This causes a loss of captured data. We recommend that you run
the packet capture only during off peak hours or when the call count is less than 3 on the node.
Procedure
Step 3 (Optional) In the Packet Capture section, you can limit the capture to packets on a specific interface, filter
by packets to or from specific hosts, or filter by packets on one or more ports.
Step 4 To begin the process, toggle on the Start Packet Capture setting.
Step 5 When you are done, toggle off the Start Packet Capture setting.
Step 6 Choose one:
• Click Send PCAP to Cisco to send the packet capture from the node directly to Cisco. You'll see a status
indicator that changes as the packet capture is uploaded.
• Click Download to save a local copy of the packet capture from the node. You can attach it to a case
later.
After a package capture is uploaded, an upload identifier shows on the page. Support uses this value to identify
your uploaded packet capture. The maximum size for packet captures is 2 GB.
Step 7 When you open a case or interact with the Cisco TAC, include the upload identifier value so that your support
engineer can access the packet capture.
Procedure
The test runs and you'll see a ping success or failure message. The test does not have a timeout limit. If you
receive a failure or the test runs indefinitely, check the destination value that you entered and your network
settings.
Procedure
Procedure
Procedure
Step 1 From the customer view in https://admin.webex.com, enable maintenance node for the Video Mesh Node by
following these instructions.
Step 2 Wait for the node to show a 'Ready for maintenance' status in Control Hub.
Step 3 Open the Webex Video Mesh node interface.
For instructions, see Manage Video Mesh Node From the Web Interface, on page 92.
Step 4 Scroll to Reflector Tool, and then start either the TCP Reflector Server or UDP Reflector Server, depending
on what protocol you want to use.
Step 5 Click Start Reflector Server, and then wait for the server to start successfully.
You'll see a notice when the server starts.
Step 6 From a system (such as a PC) on a network that you want Video Mesh nodes to reach, run the script with the
following command:
$ python <local_path_to_client_script>/reflectorClient.py --ip <ip address of the server>
--protocol <tcp or udp>
At the end of the run, the client shows a success message if all the required ports are open:
The client shows a failed message if any required ports are not open:
Step 7 Resolve any port issues on the firewall and then rerun the above steps.
Step 8 Run the client with --help to get more details.
Enable Debug User Account From Video Mesh Node Web Interface
If support requires access to the Webex Video Mesh node, you can temporarily enable a debug user account
so that support can run further troubleshooting.
Procedure
Step 3 Copy the passphrase, paste it in the support ticket or directly to the support engineer, and then click OK when
you have it saved.
The debug user account is valid for 3 days, after which it expires.
What to do next
You can disable the account before it expires if you return to the Troubleshooting page and then toggle off
the Enable Debug User setting.
Procedure
Important Only a Full Administrator for your Webex organization can use this feature. Other administrators, including
Partner and External Full Administrators, don't have the Go To Node option for the Video Mesh resources.
Procedure
Note You can't disable the admin account until you've registered the node to the cloud.
Step 6 On the confirmation screen, click Disable or Enable to complete the change.
Once you disable the admin user, you can't sign in to the Video Mesh node through the WebUI or the CLI
launched from SSH. However, you can sign in using the admin user credentials through a CLI launched from
the VMware ESXi console.
Procedure
Step 5 Sign in using your new admin login and passphrase (password).
Procedure
The Administration page also shows dates for the last passphrase change and the next time the password
expires.
If you have a syslog server, you can set your Webex Video Mesh node to log to the external server audit trail
information, such as:
• Details on administrator sign-ins
• Configuration changes (including turning maintenance mode on or off)
• Software updates
The node aggregates the logs, if any, and sends them to the server every ten minutes.
Procedure
The properties of the log message follow this format: Priority Timestamp Hostname Tag Message.
Property Description
Priority The value is always 131, based on the formula: Priority = (Facility Code * 8) +
Severity.
The facility code is 16 for "local0". The severity is 3 for "notice".
Message The message is a JSON string of at least 1KB. Its size depends on the number of
aggregated events in the ten minute interval.
Note • The Video Mesh Node demo software is not supported by the Cisco TAC.
• You cannot upgrade the Video Mesh Node demo software to the full production software version.
Specifications
See System and Platform Requirements for Video Mesh Node Software, on page 10 for the specs-based
configuration for Video Mesh Node software.
The demo software supports either a single network interface or a dual network interface.
Capacity
We do not test the demo image for capacity. You should only use it to test out basic meeting scenarios. See
the use cases that follow for guidance.
Caution Maintenance mode is intended solely to prepare a node for shutdown or reboot so that you can make certain
networking setting changes (DNS, IP, FQDN) or prepare for hardware maintenance such as replace RAM,
hard drive, and so on.
When you place a node into maintenance mode, it does a graceful shutdown of calling services (stops accepting
new calls and waits up to 2 hours for existing calls to complete). The purpose of the graceful shutdown of
calling services is to allow reboot or shutdown of the node without causing dropped calls.
Procedure
Step 1 Open the node console interface through the VMware vSphere client and then sign in using the admin
credentials.
After first time setup of the network settings and if the Video Mesh is reachable, you can access the node
interface through secure shell (SSH).
Step 2 From the main menu of the Video Mesh Node console, choose option 2 Edit Configuration and then click
Select.
Step 3 Read the prompt that the calls will end on the Video Mesh Node, and then click Yes.
Step 4 Click Static, enter the IP address for the internal interface, Mask, Gateway, and DNS values for your
network.
• The Video Mesh Node must have an internal IP address and resolvable DNS name. The node IP address
must not belong to the IP address range reserved for Video Mesh Node internal use. The default reserved
IP address range is 172.17.42.0–172.17.42.63, which can be configured in the Diagnostic menu. This
IP address range is for communication within the Video Mesh Node and between the software containers
which hold the different components of the node—for example, SIP interface and media transcoding.
• Deploy all the nodes on the same subnet or VLAN, so that all nodes in a cluster are reachable from
wherever the clients reside in your network.
• For a dual NIC DMZ deployment, you can set the external IP address in the next procedure, after you've
saved the internal network configuration and rebooted the node.
Step 5 Enter your organization's NTP server or another external NTP server that can be used in your organization.
After you configure the NTP server and save network settings, you can follow the steps in Check Health of
Video Mesh Node From Console, on page 116 to verify that the time is synchronizing correctly through the
specified NTP servers.
Step 7 Click Save, and then click Save Changes & Reboot.
During the save, DNS validation is performed if you provided a domain. A warning is displayed if the FQDN
(hostname and domain) is not resolvable using the DNS server addresses provided. You may choose to save
by ignoring the warning but calls will not work until the FQDN can resolve to the DNS configured on the
node. After the Video Mesh Node reboots, the network configuration changes take effect.
Procedure
Step 1 Open the node console interface through the VMware vSphere client or SSH into a reachable IP address, and
then sign in using the admin credentials.
Step 2 Open and log in to the VMware ESXi console of the VM for your Video Mesh node.
Step 3 In the main menu, choose option 3 Manage Administrator Passphrase, then 1 Change Administrator
Passphrase, and then click Enter.
Step 4 Read the information on the password expired page, click Enter, and then click it again after the password
expiry message.
Step 5 Press Enter.
Step 6 After you're signed out of the console, go back to the sign in screen, and then sign in using the admin login
and passphrase (password) that you expired.
You are prompted to change your password.
Step 7 For Old password, enter the current passphrase, and then press Enter.
Step 8 For New password, enter a new passphrase, and then press Enter.
Step 9 For Re-enter new password, retype the new passphrase, and then press Enter.
A "password changed" message appears and then you go back to the sign in screen.
Step 10 Sign in using your new admin login and passphrase (password).
Step 11
Procedure
Step 1 Open the node console interface through the VMware vSphere client or SSH into a reachable IP address, and
then sign in using the admin credentials.
Step 2 From the Video Mesh node console, go to 4 Diagnostics, and then choose Ping.
Step 3 In the ping field, enter a destination address that you want to test, such as an IP address or hostname, and then
click OK.
The test runs and you'll see a ping success or failure message. If you receive a failure, check the destination
value that you entered and your network settings.
Procedure
Step 1 Open the node console interface through the VMware vSphere client or SSH into a reachable IP address, and
then sign in using the admin credentials.
Step 2 From the Video Mesh node console, go to 4 Diagnostics, choose 2 Enable Debug User Account, and after
the prompt, click Yes.
Step 3 After a message appears that the debug user account was created successfully, click OK to show the encrypted
passphrase.
You'll send the encrypted passphrase to support. They use this temporary account and decrypted passphrase
to securely access your Video Mesh node for troubleshooting. This account expires after 3 days, or you can
disable it when support is finished.
Step 4 Select the start and end of the encrypted data, and copy-paste it into the support ticket or email that you're
sending to support.
Step 5 After you send this information to support, return to the Video Mesh node console and press any key to go
back to the main menu.
What to do next
The account expires in 3 days, but when support indicates that they finished troubleshooting on the node, you
can return the Video Mesh node console, go to 4 Diagnostics, and then choose 3 Disable Debug User Account
to disable the account before it expires.
Procedure
Step 1 Open the node console interface through the VMware vSphere client or SSH into a reachable IP address, and
then sign in using the admin credentials.
Step 2 In the main menu, click option 4 Diagnostics and then press Enter.
Step 3 Click 4 Export Log Files, provide feedback if you want, and then click Next.
Step 4 Choose an option:
• Send Logs using SCP, confirm the export of the logs, enter the SCP details (Host, Username, and
Dest_Folder), and then click OK.
• Send Logs to Cisco, and then confirm the export of the logs.
What to do next
Tip After you send logs, we recommend that you send feedback directly from the Webex App app so that your
support contacts have all the information that they need to help you.
Related Topics
Contact Support
Procedure
Step 1 Open the node console interface through the VMware vSphere client or SSH into a reachable IP address, and
then sign in using the admin credentials.
Step 2 From the Video Mesh node console, go to 4 Diagnostics, and then choose 6 Check Node Health to view the
following information about the node:
• Management Service Container
• ETCD (key value store that reliably stores data across a cluster)
• NTP Synchronized
• Disk Space (Free/Used%)
• Memory (Free/Used%)
Procedure
Step 1 Open the node console interface through the VMware vSphere client or SSH into a reachable IP address, and
then sign in using the admin credentials.
Step 2 From the main menu of the Video Mesh node console, go to 4 Diagnostics, and then choose 7 Configure
Container Network. After the caution that states that active calls will end on the node, click Yes.
Step 3 Change the values for Container Bridge IP and Network Mask, as needed, and then click Save.
You'll see a screen that shows the container network information, including the IP address range reserved for
internal operations on the Video Mesh node.
Procedure
Step 1 From the customer view in https://admin.webex.com, enable maintenance node for the Video Mesh Node by
following these instructions.
Step 2 Wait for the node to show a 'Ready for maintenance' status in Control Hub.
Step 3 Open the node console interface through the VMware vSphere client or SSH into a reachable IP address, and
then sign in using the admin credentials.
Step 4 From the Video Mesh Node interface, go to Diagnostics > Reflector Server > Reflector Server for TCP
or (UDP). Start the server either for TCP or for UDP.
Step 5 Scroll to Reflector Tool, and then start either the TCP Reflector Server or UDP Reflector Server, depending
on what protocol you want to use.
Step 6 Click Start Reflector Server, and then wait for the server to start successfully.
You'll see a notice when the server starts.
Step 7 From a system (such as a PC) on a network that you want Video Mesh nodes to reach, run the script with the
following command:
$ python <local_path_to_client_script>/reflectorClient.py --ip <ip address of the server>
--protocol <tcp or udp>
At the end of the run, the client shows a success message if all the required ports are open:
The client shows a failed message if any required ports are not open:
Step 8 Resolve any port issues on the firewall and then rerun the above steps.
Step 9 Run the client with --help to get more details.
Procedure
Step 1 Open the node console interface through the VMware vSphere client or SSH into a reachable IP address, and
then sign in using the admin credentials.
Step 2 From the Video Mesh node console, go to 4 Diagnostics, and then choose 8 Factory Reset.
Step 3 Ensure that you understand the information in the note that appears, and then click Reset.
The node reboots automatically after the factory reset.
Note The steps vary, depending on the bundled version of ESXi on the hardware platform.
Procedure
Step 1 Sign into the virtual machine interface and then shut down the software that is running on the platform.
Step 2 Delete the software application that was running on the platform.
There must be no software images remaining on the platform. Also, you cannot run Video Mesh node software
alongside other software on the same platform.
Step 3 Deploy a new virtual machine from a new OVF or OVA file.
Step 4 Enter a name for the virtual machine and choose the Video Mesh node OVA file.
Step 5 Change disk provisioning to Thick.
Step 6 Upload the mfusion.ova software image that you downloaded.
Step 7 When the virtual machine is running, return to Log in to the Video Mesh Node Console, on page 47 and
continue initial configuration of the Video Mesh node.
In-Meeting Unified Roster (Webex Client) No Unified Roster (Webex Client and
Experience TelePresence Server)
Unified Controls (Webex Client)
Separate Controls (Webex Client and
Lock/Unlock meeting
TelePresence Server)
Mute/Unmute TelePresence participants
Depending on the hosting resources in the cloud, some endpoints will show all three screens of a three-screen
room in the film strip, while others will only show one pane. The Webex App app shows just 1 pane, even if
the media is on-premises.
For large meetings that overflow from one node and cascade to a second, the same is seen by any endpoints
hosted on a different node to the one hosting the three-screen system (only one pane visible in the layout).
Presentation sharing requires BFCP to be negotiated through the call path.