Webex Messenger Deployment for Cisco Jabber 14.0

Total Page:16

File Type:pdf, Size:1020Kb

Webex Messenger Deployment for Cisco Jabber 14.0 Webex Messenger Deployment for Cisco Jabber 14.0 First Published: 2021-03-25 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version. Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2021 Cisco Systems, Inc. All rights reserved. CONTENTS PREFACE Change History ix New and Changed Information ix CHAPTER 1 Jabber Overview 1 Purpose of this Guide 1 About Cisco Jabber 1 CHAPTER 2 Workflows for Cloud and Hybrid Deployments 3 Workflow for a Cloud Deployment using Cisco Webex Messenger 3 Workflow for a Hybrid Deployment using Webex Messenger 3 CHAPTER 3 Configure Policies 5 Add a Policy 5 Add Actions to a Policy 5 Policy Actions in Cisco Webex 6 CHAPTER 4 Configure Clusters 11 Configure Visual Voicemail 11 Configure Cisco Unified Communications Manager Integration 12 CHAPTER 5 Create Users for Cloud Deployment 15 Create Users Workflow 15 Create New Users 16 User Provisioning Information 16 Enter User Provisioning Information 17 Create and Import a CSV File 18 Webex Messenger Deployment for Cisco Jabber 14.0 iii Contents CSV Fields 18 Select UTF-8 as the Encoding Format 20 Import and Export Users 21 Assign Users to Policies 21 CHAPTER 6 Create Users on Unified Communications Manager 23 Enable Synchronization 23 Specify an LDAP Attribute for the User ID 24 Specify an LDAP Attribute for the Directory URI 24 Perform Synchronization 25 Assign Roles and Groups 25 Authentication Options 26 Enable SAML SSO in the Client 26 Authenticate with the LDAP Server 27 CHAPTER 7 Configure Deskphone Control 29 Prerequisites 29 Configure Deskphone Control Taskflow 29 Enable Device for CTI 30 Configure Desk Phone Video 30 Troubleshooting Desk Phone Video 31 Enable Video Rate Adaptation 31 Enable RTCP on Common Phone Profiles 32 Enable RTCP on Device Configurations 32 Configure User Associations 33 Reset Devices 34 CHAPTER 8 Configure Softphone 37 Create Softphones Workflow 37 Create and Configure Cisco Jabber Devices 37 Provide Users with Authentication Strings 40 Add a Directory Number to the Device 41 Associate Users with Devices 41 Create Mobile SIP Profiles 42 Webex Messenger Deployment for Cisco Jabber 14.0 iv Contents Setting up System SIP Parameters 43 Configure the Phone Security Profile 44 CHAPTER 9 Configure Extend and Connect 47 Configure Extend and Connect Workflow 47 Enable User Mobility 47 Create CTI Remote Devices 48 Add a Remote Destination 49 CHAPTER 10 Configure Service Discovery for Remote Access 51 Service Discovery Requirements 51 DNS Requirements 51 Certificate Requirements 51 Test _collab-edge SRV Record 52 CHAPTER 11 Set Up Certificate Validation 53 Certificate Validation for Cloud Deployments 53 Update Profile Photo URLs 54 CHAPTER 12 Configure the Clients 55 Client Configuration Workflow 55 Introduction to Client Configuration 55 Set Client Configuration Parameters in Unified CM 56 Define Jabber Configuration Parameters 57 Assign Jabber Client Configuration to Service Profile 57 Create and Host the Client Configuration Files 57 Specify Your TFTP Server Address 58 Specify TFTP Servers in Phone Mode 59 Create Global Configurations 59 Create Group Configurations 60 Host Configuration Files 61 Restart Your TFTP Server 61 Configuration File 62 Set Parameters on Phone Configuration for Desktop Clients 62 Webex Messenger Deployment for Cisco Jabber 14.0 v Contents Parameters in Phone Configuration 62 Set Parameters on Phone Configuration for Mobile Clients 63 Parameters in Phone Configuration 63 Optional Configuration of Proxy Settings 64 Configure Proxy Settings for Cisco Jabber for Windows 64 Configure Proxy Settings for Cisco Jabber for Mac 64 Configure Proxy Settings for Cisco Jabber iPhone and iPad 65 Configure Proxy Settings for Cisco Jabber for Android 65 CHAPTER 13 Deploy Cisco Jabber Applications and Jabber Softphone for VDI 67 Accessories Manager 67 Download the Cisco Jabber Clients 68 Install Cisco Jabber for Windows 68 Use the Command Line 69 Example Installation Commands 69 Command Line Arguments 70 LCID for Languages 84 Run the MSI Manually 86 Create a Custom Installer 87 Get the Default Transform File 87 Create Custom Transform Files 87 Transform the Installer 88 Installer Properties 90 Deploy with Group Policy 90 Set a Language Code 91 Deploy the Client with Group Policy 91 Configure Automatic Updates for Windows 93 Uninstall Cisco Jabber for Windows 94 Use the Installer 94 Use the Product Code 94 Install Cisco Jabber for Mac 95 Installer for Cisco Jabber for Mac 95 Run Installer Manually 96 URL Configuration for Cisco Jabber for Mac 96 Webex Messenger Deployment for Cisco Jabber 14.0 vi Contents Configure Automatic Updates for Mac 98 Install Cisco Jabber Mobile Clients 100 URL Configuration for Cisco Jabber for Android, iPhone, and iPad 100 Mobile Configuration Using Enterprise Mobility Management 102 EMM with Jabber for Intune 103 EMM with Jabber for BlackBerry 104 App Transport Security on iOS 107 Useful Parameters for MDM Deployments 107 Install Jabber Softphone for VDI 109 CHAPTER 14 Remote Access 111 Service Discovery Requirements Workflow 111 Service Discovery Requirements 111 DNS Requirements 111 Certificate Requirements 112 Test _collab-edge SRV Record 112 Test SRV Records 112 Cisco Anyconnect Deployment Workflow 113 Cisco AnyConnect Deployment 113 Application Profiles 113 Automate VPN Connection 114 Set Up Trusted Network Connection 114 Set Up Connect On-Demand VPN 115 Set Up Automatic VPN Access on Cisco Unified Communications Manager 116 AnyConnect Documentation Reference 117 Session Parameters 117 Set ASA Session Parameters 118 CHAPTER 15 Troubleshooting 119 Update the SSO Certificate for the Cisco Jabber Domain 119 Cisco Jabber Diagnostics Tool 120 Webex Messenger Deployment for Cisco Jabber 14.0 vii Contents Webex Messenger Deployment for Cisco Jabber 14.0 viii Change History • New and Changed Information, on page ix New and Changed Information Date Parameter Description of Change Section March 2021 Initial Publication Webex Messenger Deployment for Cisco Jabber 14.0 ix Change History Change History Webex Messenger Deployment for Cisco Jabber 14.0 x CHAPTER 1 Jabber Overview • Purpose of this Guide, on page 1 • About Cisco Jabber, on page 1 Purpose of this Guide This guide includes the following task-based information required to deploy and install Cisco Jabber: • Configuration and installation workflows that outline the processes to configure and install cloud or hybrid deployments. • How to configure the various services that the Cisco Jabber client interacts with, such as IM and Presence Service, Voice and Video Communication, Visual Voicemail, and Conferencing. • How to configure directory integration, certificate validation, and service discovery. • How to install the clients. Before you deploy and install Cisco Jabber, see the
Recommended publications
  • Digital Data Increasingly Plays a Central Role in Contemporary Politics and Public in September 2016 (DATACTIVE)
    Krisis 2018, Issue 1 1 Data Activism www.krisis.eu Reversing Data Politics: An Introduction to the Special Issue advertising to the monitoring of citizens. Many aspects of the state and the market Lonneke van der Velden and Stefania Milan today have to do with the ‘data economy’ and its rules (or lack thereof). In this special issue, we are also interested in ‘data politics’, but we want to shift the focus of the conversation. Big data corporations and intelligence agencies are not the only ones acting on datafication, or the process of turning into monetizable and analyzable data many aspects of life that had never been quantified before, such as people’s emotions and interpersonal connections. Non-governmental organiza- tions, hackers, and activists of all kinds provide a myriad of ‘alternative’ interven- tions, interpretations, and imaginaries of what data stands for and what can be done with it. The idea of the special issue emerged during a two-day workshop on ‘Contentious Data’ hosted by the research group DATACTIVE at the University of Amsterdam Digital data increasingly plays a central role in contemporary politics and public in September 2016 (DATACTIVE). As the organisers argued elsewhere, these life. Citizen voices in the so-called public sphere are increasingly mediated by pro- emerging forms of ‘data activism’, that is to say socio-technical mobilizations and prietary social media platforms such as Twitter and Facebook, and are thus shaped tactics taking a critical approach towards datafication and massive data collection, by algorithmic ranking and re-ordering. ‘Calculated publics’ fashioned by ‘new offer new epistemologies able to counteract the mainstream positivistic discourse kinds of human and machine interaction’ (Amoore and Piotukh 2016, 2) replace of datafication (Milan and van der Velden 2016).
    [Show full text]
  • Implementing a Stream Processing Engine
    Final Year Project School of Computer Science BSc (Hons) Computer Science with Industrial Experience Implementing a Stream Processing Engine Adam Dyk Supervised by Sandra Sampaio May 2016 Abstract This study presents the work undertaken to study the relationship between social network posts and election outcomes. Through the implementation of a general­purpose stream processing engine, a constant stream of data is used to compute statistics pertaining to presidential candidates. An initial background stage determined appropriate sources of data, examined previous solutions and raised awareness about possible challenges. The system was subsequently designed through consultation with stakeholders, with implementation following shortly after. The output of the solution was compared to election results and an identification of possible trends and patterns was undertaken. After comparison of system output and current US presidential election results, it is deemed likely that a relationship exists between social media postings and election outcomes. However, the extent to which social media can be used for the purpose of election polling is yet to be determined. Page 1 of 59 Acknowledgments I would like to sincerely thank Dr. Sandra Sampaio for her continuous dedication and commitment throughout this project. Her advice and help have been invaluable. Likewise, I would like to extend the thanks to Mr. Jock McNaught for his feedback during presentations and project deliverables that helped me to better and improve the final system. Page 2 of
    [Show full text]
  • The-Road-To-Mobility-2020.Pdf
    The 2020 Guide To Trends And Technology For Smart Cities And Transportation THE ROAD TO MOBILITY First Edition: The Road to Mobility The 2020 Guide to Trends and Technology for Smart Cities and Transportation Published by BlackBerry Limited, 2200 University Ave, E Waterloo, ON Canada N2K 047 ©2020 BlackBerry Limited. Trademarks, including but not limited to BLACKBERRY, EMBLEM Design, CYLANCE and QNX are the trademarks or registered trademarks of BlackBerry Limited, its subsidiaries and/or affiliates, used under license, and the exclusive rights to such trademarks are expressly reserved. All other trademarks are the property of their respective owners. To download PDF or e-book copies of the First Edition: The Road to Mobility visit: http://blackberry.com/roadtomobility2020 Thanks to: Edited By: Jeffrey Davis, Anthony Freed Copy Editor: Carla Johnson Project Manager: Swetha Sirupa Executive Sponsor: Mark Wilson Designer: Douglas Kraus Read Blogs.BlackBerry.com, and follow us on Twitter (@BlackBerry) and LinkedIn (https://www.linkedin.com/company/blackberry/) 2 | THE ROAD TO MOBILITY THE ROAD TO MOBILITY | 3 Table of Contents SECTION 3 Bottlenecks to Change .................................................................................72 The Elephant in the Room: Shifting Culture from Competition to Collaboration ...............................................................................74 Mobility Explodes Opportunities for Automotive. Let’s Seize the Moment. ......6 Faye Francy, Automotive ISAC John Chen, BlackBerry Challenges to
    [Show full text]
  • When Data Crimes Are Real Crimes: Voter Surveillance and the Cambridge Analytica Conflict by Jesse Gordon BA Honours, Universit
    When Data Crimes are Real Crimes: Voter Surveillance and the Cambridge Analytica Conflict by Jesse Gordon BA Honours, University of Saskatchewan, 2016 A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of MASTERS OF ARTS in the Department of Political Science © Jesse Gordon, 2019 University of Victoria All rights reserved. This Thesis may not be reproduced in whole or in part, by photocopy or other means, without the permission of the author. ii Supervisory Committee When Data Crimes are Real Crimes: Voter Surveillance and the Cambridge Analytica Conflict by Jesse Gordon BA, University of Saskatchewan, 2016 Supervisory Committee Dr. Colin Bennett, Department of Political Science Supervisor Dr. Arthur Kroker, Department of Political Science Departmental Member iii Abstract This thesis asks what conditions elevated the Cambridge Analytica (CA) conflict into a sustained and global political issue? Was this a privacy conflict and if so, how was it framed as such? This work demonstrates that the public outcry to CA formed out of three underlying structural conditions: The rise of the alt-right as an ideology, surveillance capitalism, and a growing and unregulated voter analytics industry. A network of actors seized the momentum of this conflict to drive the message that voter surveillance is a threat to democratic elections. These actors humanized the CA conflict and created a catalyst for a large scale public outrage to these previously ignored structures. Their focus on democratic threat also allowed this conflict to transcend the typical contours of a privacy conflict and demonstrate that the consequences of CA are societal, rather than personal.
    [Show full text]
  • Orca - the Outage That May Change History November 2012
    the Availability Digest www.availabilitydigest.com Orca - The Outage That May Change History November 2012 The Romney campaign looked forward with confidence to the November 6, 2012, U.S. presidential election. Not only were many polls improving in its favor, but it had a secret weapon that it did not disclose until just before Election Day. Orca! Orca was a massive, technologically sophisticated tool that was aimed at GOTV – Get Out The Vote – in the critical swing states that would decide the election outcome. In elections that are as close as this one was predicted to be, outperforming polls by a single point can mean that entire states and all their Electoral votes can be won. But Orca failed. It never got off the ground on Election Day. Was this outage the cause of Governor Romney’s loss to President Obama? We will never know the answer to this question, but it was quite likely a factor. Orca Orca was a Web-based application that allowed 37,000 Romney campaign workers spread among the precincts of several key swing states to monitor and report who was voting. This data was sent in real time to a campaign War Room at Republican headquarters in the Boston Garden (now the TD Garden), where it was compared to known Romney supporters in those precincts. The data was used by campaign headquarters to deploy calls and volunteers to known Romney supporters who hadn’t yet voted without wasting resources on those who had. To use Orca, a volunteer logged into the Orca web site on his or her smart phone.
    [Show full text]