Cisco Meeting Server 2 4 Installation Guide For Virtualized Deployments
Cisco Meeting Server 2 4 Installation Guide For Virtualized Deployments
1 Introduction 5
1.1 Overview of virtualized platforms 5
1.2 How to use this Guide 6
1.3 Differences in specific MMP commands 8
1.4 Differences in components enabled on the different platforms 8
2 Installation 10
2.1 Before You Start 10
2.1.1 About the Cisco Meeting Server software 10
2.1.2 Host requirements for the Cisco Meeting Server as a VM deployment 10
2.2 Installing via VMware on a specification-based server 12
2.3 Installing and initial configuration of Cisco Meeting Server 1000 14
2.3.1 Before You Start 14
2.3.2 Task 1—Unpacking and initial startup 14
2.3.3 Task 2—Configuring VMware Network Management 16
2.3.4 Task 3—Configuring the VMware Instance using vSphere client 17
2.3.5 Task 4—Retrieving and activating VMware Licenses 18
2.3.6 Task 5—Accessing the Cisco Meeting Server 1000 Console 19
3 Configuration 21
3.1 Creating your own Cisco Meeting Server Administrator Account 21
3.2 Setting up the Network Interface for IPv4 21
3.3 Adding Additional Network Interface(s) 22
3.4 Configuring the Web Admin Interface 23
3.4.1 Creating the certificate for the Web Admin Interface 23
3.4.2 Configuring the Web Admin Interface for HTTPS Access 25
Appendix C Branding 35
Appendix D Sizing a VM 36
D.1 Call Bridge VM 37
D.2 Edge VM 38
D.3 Database VM 39
Cisco Trademark 47
Change History
Date Change Summary
December 20, 2017 Added support for ESXi 6.5 and ESXi 6.0 Update 3 from Cisco Meeting Server
version 2.3.
November 27, 2017 Added Cisco Meeting Server 1000 additional installation detail. Removed
AWS references.
1 Introduction
The Cisco Meeting Server is a scalable software platform for voice, video and web content,
which integrates with a wide variety of third-party kit from Microsoft, Avaya and other vendors.
With the Cisco Meeting Server, people connect regardless of location, device, or technology.
The Cisco Meeting Server software runs as a virtualized deployment using VMware ESXi version
6.0 with virtual hardware vmx-11loaded onto the following platforms:
l Cisco Meeting Server 1000
l Cisco Multiparty Media 400v, 410v and 410vb
l specification-based VM platforms.
Note: From version 2.3, the Cisco Meeting Server supports ESXi 6.5 and ESX 6.0 Update 3.
Both ESXi 6.5 and ESX 6.0 Update 3 allow you to disable TLS 1.0 and TLS 1.1 from
communicating with ESXi.
Note: From version 2.4, Cisco Meeting Server software no longer supports Microsoft Hyper-V
virtualized deployments.
Customers often use virtualized deployments of the Cisco Meeting Server as the edge server in
a split deployment and in scalable deployments.
The functionality, and user experience for participants, is identical across all platforms running
the same software version. However, deployments are not interchangeable between the
virtualized deployments and physical deployments (Cisco Meeting Server 2000 and Acano X-
Series servers). For example, it is not possible to create a backup from a virtualized deployment
and roll it back on an Acano X-series server or vice versa.
CAUTION: Irrespective of which virtualized platform is running the Cisco Meeting Server
software, ensure the platform is up to date with the latest patches. Failure to maintain the
platform may compromise the security of your Cisco Meeting Server.
Cisco Meeting Server 1000: ships with VMWare ESXi version 6.0 and Cisco Meeting Server
pre-installed. However, this may not be the latest version of Cisco Meeting Server software
available. Follow the instructions in this guide to configure the Cisco Meeting Server 1000 and
apply the license. Once the Cisco Meeting Server is operational, check the version of software
installed using the MMP command version. The latest software is available here. To upgrade
the software installed on the Cisco Meeting Server 1000, follow the instructions in the release
notes for that software version.
Note: The default Cisco UCS ESXi credentials for the Cisco Meeting Server 1000 are: login as
root with a password of password. You are advised to change this login admin account. Be
aware that when you change the password, Cisco UCS ESXi will require a complex password.
Cisco Multiparty Media 400v, 410v and 410vb: if you purchased VMware license VMW-VS6-
410-K9 with the 410v or 410vb then this can be used when you migrate the 410v/410vb to
hosting the Cisco Meeting Server. Otherwise you will need to purchase a VMware license. You
do not need to delete the TelePresence Server VM providing you have sufficient RAM to also
hold the Cisco Meeting Server application. Simply use the shutdown command to turn off the
TelePresence Server, before following the steps in this guide and installing the Cisco Meeting
Server software.
specification-based VM platforms: if you are upgrading the server from a previous virtualized
Cisco Meeting Server installation, then follow the instructions in the Cisco Meeting Server
release notes. If this is a new installation, then follow this guide to create a VM and install the
Cisco Meeting Server software.
Note: The Cisco Meeting Server 1000 has different settings to the specification-based VM
server, the settings are pre-configured, do not change the settings.
shutdown Not available through Do not use the vSphere Enter “Y” when prompted.
MMP. Use Cisco UCS Man- power button. Use the The server can now be
ager to power down blade shutdown command safely powered off.
servers before removing instead.
power.
2 Installation
This chapter applies to deployments on specification-based VM platforms and Cisco Meeting
Server 1000. Follow Section 2.2 to deploy a VMware host. Follow Section 2.3 to deploy a
Cisco Meeting Server 1000.
Table 1: Host requirements for the Cisco Meeting Server running on third party servers
Minimum Recommended
Hypervisor For up to 32 virtual If your server supports upto 128 virtual cores then use: VMware
cores use: ESXi 6.0 with virtual hardware vsm-11.
VMware ESXi 5.0
If your server supports up to 64 virtual cores, use:
Update 3 with virtual
VMware ESXi 5.1 Update 2 with virtual hardware vsm-09 or ESXi
hardware vsm-08
5.5 Update 1 with virtual hardware vsm-10.
* additional memory should be available on the system for use by the hypervisor and any other VMs on the host.
In addition:
n All memory channels should be populated to maximize available memory bandwidth. There
are no special requirements for NUMA systems.
n Out-of-band management systems should not be configured to share a network port with
the VM. Internal testing has shown that they can cause bursts of packet loss and degraded
voice and video quality. Out-of-band management should either be configured to use a
dedicated network port or disabled.
n Where available, hyperthreading should be enabled on the host, without this there is capacity
reduction of up to 30.
n When comparing AMD and Intel processors, the number of AMD “Modules” (a pair of “cores”
sharing resources) should be compared to Intel “cores” (which execute a pair of
“hyperthreads”). In internal testing we have found that AMD processors provide 60-70%
capacity of an equivalent Intel processor. For this reason Intel processors are recommended
for production deployments.
n The CPUs used by the Cisco Meeting Server must be dedicated for its use. This is achieved
by:
o only running a single VM on the host, or
o pinning of all VMs on the host to specific cores and giving the Cisco Meeting Server sole
use of the assigned cores, and in addition, leaving a physical core with no VMs pinned to it
for the Hypervisor.
o following the co-residency requirements for Unified Communication in a Virtualized
Environment. Click on Cisco Meeting Server below the Conferencing heading.
n If a VMWare Hypervisor with EVC mode enabled is used, the EVC must be set to one of the
following modes or higher:
“B1”/AMD Opteron™ Generation 4
“L2”/Intel® Nehalem generation (formerly Intel® Xeon Core™ i7)
EVC modes which enforce compatibility with older CPUs than those listed above, are not
supported as they will disable SSE 4.2; SSE4.2 is required.
n An activation key for the Call Bridge is required for media calls. To obtain the activation key,
you need the MAC address of your virtual server. See Chapter 4 and Appendix B for
information on licensing.
Note: For every release of the Cisco Meeting Server for virtualized deployments, there will be an
.ova file for a new deployment, and an upgrade image (.img) for upgrading to the latest release.
This differs from the Acano Server releases which provided an ovf folder and associated files.
For a new installation follow this section; for an upgrade follow the release notes.
Note: Depending on how your virtual host is set up, some of the wizard settings may not
be displayed or may not be selectable.
The Meeting Server will automatically boot to the VMware console screen when startup is
complete and should be visible on the monitor.
11. Enter show network detail to confirm your changes. Once complete, enter the
command exit twice to log out of the CIMC.
12. Switch to your PC's browser, and browse to the IP address you configured or obtained
from the CIMC serial interface. Dismiss the certificate security warnings and a Cisco
landing page with username and password fields will display.
13. Login with the username of admin and the password you set when first connecting to the
CIMC.
14. When the Server Summary page loads, click the Launch KVM Console link under Actions.
The JAVA virtual console application loads. Depending on your Operating System and
browser you may get security warnings and dialogs to acknowledge and accept. Continue
until the application loads—it will show the monitor image as if you were directly connected
to the server. If the server is powered off, it will show a larger green window saying No
Signal.
15. If the server is powered off, from the Power menu, select Power On to start the server.
After a few minutes it should boot to the VMware console screen.
You can now use the virtual console the same as if you were connected using a local monitor
and keyboard.
5. (Optional) If you will access the Hypervisor management via a different VLAN from the
Meeting Server application, configure the VLAN that the Management Interface should
associate with.
6. Press Escape to return to the main menu, and Escape again to log out.
The VMware management IP address displays in the bottom left of the screen.
You should now have Ethernet connected to the Ethernet1 port on the rear of the server and
know the IP address in use by the VMware management network.
Server1000. These activation codes must be converted to license keys using the VMware public
website. You need internet and email access to complete this task.
3. If your network has DHCP, to find the current Meeting Server IP address, click on the
Summary tab while the Cisco Meeting Server VM is highlighted. The IP address the
Meeting Server has obtained will be shown under the General section. You can ssh to that
IP to continue the configuration of the Meeting Server software.
4. If your network does not have DHCP, you will have to assign an IP address to the VM using
the virtual machine console in the vSphere client and the Meeting Server MMP commands
ipv4 or ipv6 as described in Chapter 3 (or see the MMP Command Line Reference
Guide).
5. To access the console, click on the Console tab in the vSphere client when the Meeting
Server VM is selected. If the screen is blank, click within the window and press the Enter
key. A login prompt displays.
TIP: To regain mouse control outside the console window, press the Control and Alt keys
together.
3 Configuration
After creating your new admin accounts delete the default “admin” account.
Note: Any MMP user account at the admin level can also be used to log into the Web Admin
Interface of the Call Bridge. You cannot create users through the Web Admin Interface.
Note: Although these steps are for IPv4, there are equivalent commands for IPv6. See the MMP
Command Reference for a full description.
In the Cisco Meeting Server virtualized deployment, there is only one network interface initially,
but up to 4 are supported (see the next section). The initial interface is “a”, equivalent to
interface A on the Acano X-Series server. The MMP runs on this interface in the virtual
deployment.
1. Configure the Network Interface speed using the following MMP commands.
To set network interface speed, duplex and auto-negotiation parameters use the iface
command e.g. to display the current configuration on the Admin interface, in the MMP type:
iface a
To set the interface to 1GE, full duplex type:
iface a 1000 full
and to switch auto negotiation on or off, type:
iface a autoneg <on|off>
We recommend that the network interface is set to auto negotiation unless you have a
specific reason not to.
2. The “a” interface is initially configured to use DHCP. To view or reconfigure the IP settings:
a. Go on to step b. if you are using static IP addresses.
To find out the dhcp configured settings, type:
ipv4 a
Go on to step 3.
b. Configure to use static IP addresses (skip this step if you are using DHCP)
Use the ipv4 add command to add a static IP address to the interface with a specified
subnet mask and default gateway. For example, to add address 10.1.2.4 with prefix
length 16 (netmask 255.255.0.0) with gateway 10.1.1.1 to the interface, type:
ipv4 a add 10.1.2.4/16 10.1.1.1
To remove the IPv4 address, type:
ipv4 a del
3. Set DNS Configuration
a. To output the dns configuration, type:
dns
b. To set the application DNS server type:
dns add forwardzone <domain name> <server IP>
Note: A forward zone is a pair consisting of a domain name and a server address: if a
name is below the given domain name in the DNS hierarchy, then the DNS resolver can
query the given server. Multiple servers can be given for any particular domain name to
provide load balancing and fail over. A common usage will be to specify "." as the
domain name i.e. the root of the DNS hierarchy which matches every domain name, i.e.
is the server is on IP 10.1.1.1
If required, you can add a second network interface on VMWare. However, any two interfaces of
the Cisco Meeting Server must not be put into the same subnet.
1. In the vSphere Client, open the Getting Started tab.
2. Select Edit Virtual Machine Settings.
3. Add an Ethernet Adapter with type VMXNET3 in the usual way.
Note: If you select an Ethernet Adaptor which is not VMXNET3, then you may experience
network connection problems, and may invalidate your license.
Note: You need a certificate uploaded for the Web Admin Interface even if you configure the Call
Bridge through the API rather than the Web Admin Interface.
The information below assumes that you trust Cisco to meet requirements for the generation of
private key material. If you prefer, you can generate the private key and the certificate externally
using a public Certificate Authority (CA), and then load the externally generated key/certificate
pair onto the MMP of the Cisco Meeting Server using SFTP. After obtaining the signed
certificate, go to Section 3.4.2.
Note: If testing your Cisco Meeting Server in a lab environment, you can generate a key and a
self-signed certificate on the server. To create a self-signed certificate and private key, log in to
the MMP and use the command:
pki selfsigned <key/cert basename>
where <key/cert basename> identifies the key and certificate which will be generated e.g. "pki
selfsigned webadmin" creates webadmin.key and webadmin.crt (which is self-signed). Self-
signed certificates are not recommended for use in production deployments (see
http://en.wikipedia.org/wiki/Self-signed_certificate)
The steps below explain how to generate a private key and the associated Certificate Signing
Request using the MMP command pki csr , and export them for signing by a CA.
1. Log in to the MMP and generate the private key and certificate signing request (CSR):
pki csr <key/cert basename> [<attribute>:<value>]
where:
<key/cert basename> is a string identifying the new key and CSR (e.g. "webadmin" results
in "webadmin.key" and "webadmin.csr" files)
and the allowed, but optional attributes are as follows and must be separated by a colon:
l CN: the commonName which should be on the certificate. Use the FQDN defined in DNS
A record as the Common Name. Failure to do this will result in browser certificate errors.
l OU: Organizational Unit
l O: Organization
l L: Locality
l ST: State
l C: Country
l emailAddress
Use quotes for values that are more than one word long, for example:
pki csr example CN:example.com "OU:Accounts UK" "O:My Company"
2. Send the CSR to one of the following:
l To a Certificate Authority (CA), such as Verisign who will verify the identity of the
requestor and issue a signed certificate.
l To a local or organizational Certificate Authority, such as an Active Directory server with
the Active Directory Certificate Services Role installed, see Appendix F.
Note: Before transferring the signed certificate and the private key to the Cisco Meeting Server,
check the certificate file. If the CA has issued you a chain of certificates, you will need to extract
the certificate from the chain. Open the certificate file and copy the specific certificate text
including the BEGIN CERTIFICATE and END CERTIFICATE lines and paste into a text file. Save the
file as your certificate with a .crt, .cer or .pem extension. Copy and paste the remaining
certificate chain into a separate file, naming it clearly so you recognize it as an intermediate
certificate chain and using the same extension ( .crt, .cer or .pem). The intermediate certificate
chain needs to be in sequence, with the certificate of the CA that issued the chain first, and the
certificate of the root CA as the last in the chain.
Note: The deployment automatically sets up the Web Admin Interface to use port 443 on
interface A. However, the Web Bridge also uses TCP port 443. If both the Web Admin Interface
and the Web Bridge use the same interface, then you need to change the port for the Web
Admin Interface to a non-standard port such as 445, use the MMP command webadmin
listen <interface> <port>.
For example:
webadmin certs webadmin.key webadmin.crt
webadmin listen b 443
webadmin restart
webadmin enable
Test that you can access the Web Admin Interface, i.e. enter your equivalent of https://cms-
server.mycompany.com (or the IP address) in your browser and login using the MMP user
account you created earlier.
The banner shown in Figure 2 below will be displayed until a cms.lic license file is uploaded.
After you upload and apply the license file, the banner is removed. However, before you can
apply the license you need to configure the port that the Call Bridge will listen on, and upload the
Call Bridge certificates. This is described in the deployment guides as the type of certificates
required for the Call Bridge is determined by your deployment.
Refer to Section 4 for information on obtaining and applying a license file, after the Call Bridge
has been configured.
Note: This is the MAC address of your VM, not the MAC address of the server platform that
the VM is installed on.
2. Open the Cisco License Registration Portal and register the PAK code and the MAC address
of your Meeting Server.
3. You will be sent a single license file via email. Rename the license file to cms.lic either before
or during transfer.
4. Transfer the license file to the MMP of your Meeting Server using SFTP.
a. Find the IP address of the MMP using the MMP command iface a
b. Connect your SFTP client to the IP address of the MMP and log in using the credentials
of an MMP admin user.
n the Single Split Server Deployment Guide if you are deploying on a split Core/Edge
deployment
n the Scalability & Resilience Guide if you are deploying multiple servers (single combined or
split Core or Edge servers) that you will cluster.
Remember to use the shutdown command rather than using the vSphere power button when
you want to shut down the Cisco Meeting Server.
Type of Cisco Meeting Server 2000 Cisco Meeting Cisco Multiparty Cisco Multiparty
calls (from version 2.4) Server 1000 Media 410v Media 400v
HD calls 700 96 64 36
(720p30)
From version 2.4, you no longer need to purchase a branding license to apply single or multiple
branding to the WebRTC app login page, IVR messages, SIP or Lync call messages or invitation
text.
The XMPP activation key is included in the Cisco Meeting Server software.
In addition to feature licenses, user licenses also need to be purchased, there are 3 different
types of user licenses:
n PMP Plus,
n SMP Plus,
n ACU
You need to have the Call Bridge activated to create any calls, if you require demo licenses to
evaluate the product then contact your Cisco sales representative.
Acano X-Series Servers do not require an activation key. VMs configured as Edge servers do
not require an activation key for the Call Bridge.
To apply the license after uploading the license file, you need to restart the Call Bridge. However,
you must configure the Call Bridge certificates and a port on which the Call Bridge listens before
you can do this. These steps are part of the Cisco Meeting Server configuration and described
in the Cisco Meeting Server deployment guides.
The banner “This CMS is running in evaluation mode; no calls will be possible until it is licensed.”
is displayed in the Web Admin interface until a valid cms.lic file is uploaded. After you upload the
license file, the banner is removed.
B.1.2 Recording
Recording is controlled by license keys, where one license allows one simultaneous recording.
The license is applied to the server hosting the Call Bridge (core server) which connects to the
Recorder, not the server hosting the Recorder.
Note: The recommended deployment for production usage of the Recorder is to run it on a
dedicated VM with a minimum of 4 physical cores and 4GB . In such a deployment, the Recorder
should support 2 simultaneous recordings per physical core, so a maximum of 8 simultaneous
recordings.
To purchase recording license keys, you will need the following information:
n number of simultaneous recordings,
n MAC address of interface A on the servers hosting the Call Bridges.
Multiparty licensing is available in two variations: Personal Multiparty Plus (PMP Plus) licensing,
which offers a named host license, and Shared Multiparty Plus (SMP Plus) licensing, which
offers a shared host license. Both Personal Multiparty Plus and Shared Multiparty Plus licenses
can be used on the same server.
Note: Prior to release 2.1, Ad Hoc conferences never consumed PMP Plus licenses. From 2.1
the initiator of the Ad Hoc conference can be identified and if they have been assigned a PMP
Plus license then that is used for the conference.
Media Stream Number of licenses per Capacity Number of licenses required per call
Unit leg
1080p30 0.5 2
720p30 1 1
480p30 2 0.5
Each CU also entitles the Licensee to content sharing in each meeting containing at least one
video participant. For more information refer to the terms and conditions of the CU license.
Note: The owner is set using the field ownerJid when POSTing or PUTing a /coSpace object.
When GETing the /coSpace both the ownerJid and ownerId are returned for the user.
Appendix C Branding
Some aspects of the participant experience of meetings hosted on Meeting Servers can be
branded, they include :
n the WebRTC app sign in background image, sign in logo, text below sign in logo and the text
on the browser tab,
n IVR messages,
n SIP/Lync call messages,
n some text on the meeting invitation.
From version 2.4, no license is required to apply single or multiple brands to these customizable
features. If you apply a single brand with only a single set of resources specified (one WebRTC
app sign in page, one set of voice prompts, one invitation text), then these resources are used
for all spaces, IVRs and Web Bridges in the deployment. Multiple brandings allow different
resources to be used for different spaces, IVRs and Web Bridges, the resources can be assigned
at the system, tenant, space or IVR level.
Either use the API to apply a single branding or multiple brandings, or use the Web Admin
interface if you only wish to apply a single brand to the IVR messages, SIP/Lync call messages or
meeting invites. The Customization Guidelines describes the elements that can be branded and
explains how to apply the branding files.
Note: The WebRTC app sign in page cannot be rebranded using the Web Admin interface, nor
can multiple brandings be applied via the Web Admin Interface.
Appendix D Sizing a VM
The Cisco Meeting Server is designed for maximum flexibility, it is highly scalable and allows the
“mix and matching” of optimized Acano X-series servers and VM deployments, for example
using VM on edge servers and Acano X-Series server at the core for a highly scalable distributed
architecture, or placing all components within a VM deployment on a single standardized server.
Maximum flexibility is also carried through into the wide range of standard servers and
specifications the Cisco Meeting Server software can run on. Appendix E provides details for
one of the most popular virtualization technologies: VMware. The Cisco Meeting Server
software also runs effectively on an array of more specialized servers, for example for
applications requiring portable and rugged form factors.
The whole Cisco Meeting Server or individual components of the Cisco Meeting Server can be
run in a virtual machine (VM) deployment. For instance:
l a single VM can run all components,
l a single VM can run the edge components (Web Bridge, TURN server, Load Balancer)
connected to an Acano X-Series server running the Call Bridge and other core
components (for instance, XMPP server, H.323 Gateway).
l one VM running edge components, connecting to a second VM running the Call Bridge
and other core components.
Figure 3 illustrates the Cisco Meeting Server software components and their typical
deployment. Each instance can be on a VM or Acano X-Series server.
Figure 3: Cisco Meeting Server software components and their typical deployment
Figure 4 illustrates a distributed Cisco Meeting Server deployment using both VMs and Acano
X-Series servers. Example signaling and media paths for two Cisco Meeting Apps are shown.
Figure 4: Distributed Acano deployment using both VMs and Acano Server
When a VM is configured to run one or more Cisco Meeting Server components, Cisco
recommends that the entire host is dedicated to the VM. This provides best performance for
real time media applications and ensures high quality end user experience. The sizing of VMs
depends on the components being used.
The VM should be configured to use all but one of the host physical cores. When hyperthreading
is enabled the number of available logical cores is double the number of physical cores, so in the
dual E5-2680v2 system above, there are 40 virtual CPUs, of which 38 should be allocated to
the VM. If an option is available to choose both number of sockets and number of cores per
socket, a single socket should be configured with all the virtual CPU cores.
Over subscription of the host, either by incorrectly setting the number of Cisco Meeting Server
VM virtual CPUs or by contention for CPU resources amongst VMs, causes scheduling delays
and results in degraded media quality. A Cisco Meeting Server VM, correctly configured
according to the recommendations above, will degrade gracefully by dropping frame rate
and/or resolution if pushed over capacity.
1GB RAM for each underlying physical CPU core should be allocated to the VM. For the system
above, the VM should be configured with 19GB corresponding to the 19 physical CPU cores in
use.
D.2 Edge VM
The requirements for other components are lower, and a VM can be used in a split core-edge
deployment to provide edge functionality, for example Web Bridge, TURN server, Load Balancer
on an edge VM. This edge VM can be coupled with either a core VM or an Acano X-Series server
configured as a core.
A VM configured to provide edge services to an Acano X-Series server should be configured
with a minimum of 8 virtual CPUs and 8 GB RAM. A VM providing edge services to a single Core
VM should be configured with a minimum of 4 virtual CPUs and 4 GB RAM.
D.3 Database VM
Note: This section is applicable only if you choose to use one or more external databases.
The host server for a database has modest CPU requirements, but requires large storage and
memory. We do not mandate a qualified VM host but recommend:
n Four vCPUs, 8GB RAM and 100GB data store
(The OVF will be set to these parameters so that they are the defaults post-deployment)
n Sandy Bridge (or later) class Intel processors (e.g. E5-2670 or E5-2680 v2)
n The data store should reside on either a high IO per second SAN or local SSD storage
n The data must reside on the same vdisk as the OS
The Cisco UCS C220 M4 which is currently used as the host for the Cisco Meeting Server 1000
could be used, but the VM database would only use a small percentage of the server’s
resources. Using this server, other VMs could be also hosted on the same server as the VM
database, if desired.
E.1 VMWare
Core VMs should be configured to use the entire host. This ensures that a CPU core is available
for the ESXi kernel to perform management and network operations.
As part of internal testing we regular benchmark a variety of CPU and server configurations.
During these tests synthetic calls are added over time, gradually increasing the demands on the
VM and pushing it over capacity. Several internal statistics are monitored to ensure quality of
user experience. In addition, ESXi statistics are monitored and diagnostic logs are collected.
Since Acano is a VMware Technology Alliance Partner, these logs are submitted to VMware QA
teams as part of VMware Ready certification.
Although not recommended, it is possible to run other VMs alongside the Cisco Meeting Server
VM as long as CPU isolation domains are created to prevent contention. This technique is
known as “anti-pinning”, and involves explicitly pinning every VM to a subset of the cores. The
Cisco Meeting Server VM must be the only VM pinned to its cores, and all other VMs need to be
explicitly pinned to other cores.
For example, if a 20 core dual E5-2680v2 host is available, but only 25 concurrent 720p30 call
legs are required, then anti-pinning can be used. Using the 2.5 calls/core ratio, 10 physical
cores are required to provide this capacity. 10 cores can be used for other tasks.
With hyperthreading enabled, 40 logical cores are available and ESXi labels these logical cores
by index 0-39. The Cisco Meeting Server VM should be allocated 20 virtual CPUs and
configured with scheduling affinity 0-19. All other VMs running on the host must be explicitly
configured with affinity 20-39 to create the pair of isolation domains. It may also be necessary
to leave a physical core with no VMs pinned to it for the ESXi scheduler.
VMXNet3 virtual network adapters are preferred as they require lower overhead than other
adaptor types. All virtual network adapters should be the same type.
VMware vMotion and High Availability (HA) technologies are fully supported. VMware Fault
Tolerance (FT) is not supported as it is limited to single virtual core VMs. High level tools such as
VMware vCenter Operations Manager are fully supported.
Note: If a VMWare hypervisor with EVC mode enabled is used, the EVC must be set to one of the
following modes or higher:
“B1”/AMD Opteron™ Generation 4
“L2”/Intel® Nehalem generation (formerly Intel® Xeon Core™ i7)
EVC modes which enforce compatibility with older CPUs than those listed above, are not
supported as they will disable SSE 4.2; SSE4.2 is required.
5. Using the Server Manager page on the CA, locate the Pending Requests folder under the CA
Role.
6. Right-click on the pending request that matches the Request ID given in CMD window and
select All Tasks > Issue.
7. The resulting signed certificate is in the Issued Certificates folder. Double-click on the
certificate to open it and open the Details tab (see right).
Now transfer the certificate (e.g. webadmin.crt) and private key to the MMP of the Cisco
Meeting Server using SFTP, see Section 3.4.2.
CAUTION: If you are using a CA with the Web Enrolment feature installed, you may copy the CSR
text including the BEGIN CERTIFICATE REQUEST and END CERTIFICATE REQUEST lines to
submit. After the certificate has been issued, copy only the certificate and not the Certificate
Chain. Be sure to include all text including the BEGIN CERTIFICATE and END CERTIFICATE lines
and paste into a text file. Then save the file as your certificate with a .pem, .cer or .crt extension.
Cisco Trademark
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates
in the U.S. and other countries. To view a list of Cisco trademarks, go to this url:
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their
respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (1110R)