About the Cisco TelePresence Video Communication Server (VCS)12
VCS base applications13
Standard features13
Optional features14
Installation and initial configuration16
About this guide17
Related documentation17
Training17
Glossary17
Accessibility notice17
Using the web interface18
Using the command line interface (CLI)19
Web page features and layout20
What’s new in this version?22
X8.1.122
X8.122
Network and system settings28
Network settings29
Configuring IP settings29
Configuring Ethernet settings31
Configuring DNS settings32
Configuring Quality of Service settings33
Intrusion protection34
Configuring firewall rules34
Current active firewall rules36
Configuring automated intrusion protection36
Network services40
Configuring system name and access settings40
Configuring SNMP settings43
Configuring time settings45
About the Cisco TelePresence Video Communication Server (VCS)
About the Cisco TelePresence Video
Communication Server (VCS)
The Cisco TelePresence Video Communication Server (VCS) software simplifies session management and
control of telepresence conferences. It provides flexible and extensible conferencing applications, enabling
organizations to benefit from increased employee productivity and enhanced communication with partners
and customers.
The VCS delivers exceptional scalability and resiliency, secure communications, and simplified large-scale
provisioning and network administration in conjunction with Cisco TelePresence Management Suite (Cisco
TMS).
The VCS interworks transparently with Cisco Unified Communications Manager (Unified CM), bringing rich
telepresence services to organizations with Unified CM. It also offers interoperability with third-party unified
communications, IP telephony networks, and voice-over-IP (VoIP) systems.
The VCS supports on-premises and cloud applications and is available as a dedicated appliance or as a
virtualized application on VMware, with additional support for Cisco Unified Computing System (Cisco UCS)
platforms.
You can deploy the VCS as the VCS Control for use within an enterprise and as the VCS Expressway for
business-to-business and remote and mobile worker external communication. An alternative solution, suited
to small to medium-sized businesses (SMBs), is the VCS Starter Pack Express.
Optional packages that you can deploy include FindMe, Device Provisioning, and Advanced Networking
(VCS Expressway only).
About the Cisco TelePresence Video Communication Server (VCS)
VCS base applications
The VCS is available with alternative base applications as described below.
VCS Control
VCS Control delivers any-to-any enterprise wide conference and session management and interworking
capabilities. It extends the reach of telepresence conferences by enabling interworking between Session
Initiation Protocol (SIP)- and H.323-compliant endpoints, interworking with third-party endpoints; it integrates
with Unified CM and supports third-party IP private branch exchange (IP PBX) solutions. VCS Control
implements the tools required for creative session management, including definition of aspects such as
routing, dial plans, and bandwidth usage, while allowing organizations to define call-management
applications, customized to their requirements.
VCS Expressway
The VCS Expressway deployed with the VCS Control enables smooth video communications easily and
securely outside the enterprise. It enables business-to-business video collaboration, improves the
productivity of remote and home-based workers, and enables service providers to provide video
communications to customers. The application performs securely through standards-based and secure
firewall traversal for all SIP and H.323 devices. As a result, organizations benefit from increased employee
productivity and enhanced communication with partners and customers.
It uses an intelligent framework that allows endpoints behind firewalls to discover paths through which they
can pass media, verify peer-to-peer connectivity through each of these paths, and then select the optimum
media connection path, eliminating the need to reconfigure enterprise firewalls.
The VCS Expressway is built for high reliability and scalability, supporting multivendor firewalls, and it can
traverse any number of firewalls regardless of SIP or H.323 protocol.
Standard features
The primary purpose of the VCS is to provides secure firewall traversal and session-based access to Cisco
Unified Communications Manager for remote workers, without the need for a separate VPN client.
The VCS has the following standard features:
n Provides secure firewall traversal and session-based access to Cisco Unified Communications Manager
for remote workers, without the need for a separate VPN client
n 2500 endpoint registrations on a standard appliance and 5000 registrations on Large VM server
deployments
n SIP Proxy/Registrar
n SIP Presence Server
n SIP Presence User Agent
n SIP and H.323 support, including SIP / H.323 interworking
n IPv4 and IPv6 support, including IPv4 / IPv6 interworking
About the Cisco TelePresence Video Communication Server (VCS)
n Bandwidth management on both a per-call and a total usage basis, configurable separately for calls within
the local subzones and to external systems and zones
n Automatic downspeeding option for calls that exceed the available bandwidth
n URI and ENUM dialing via DNS, enabling global connectivity
n Up to 500 non-traversal calls
n Up to 100 traversal calls on a standard appliance and 500 traversal calls on Large VM server deployments
n 1000 external zones with up to 2000 matches
n 1000 subzones and supporting up to 3000 membership rules
n Flexible zone configuration with prefix, suffix and regex support
n Can function as a standalone VCS or be neighbored with other systems such as other VCSs, gatekeepers
and SIP proxies
n n+1 redundancy, can be part of a cluster of up to 6 VCSs for increased capacity and redundancy
n Intelligent Route Director for single number dialing and network failover facilities
n Optional endpoint authentication (including AD authentication for Jabber Video clients)
n Control over which endpoints are allowed to register
n Call Policy (also known as Administrator Policy) including support for CPL
n Support for external policy servers
n Can be managed with Cisco TelePresence Management Suite (Cisco TMS) 13.2 or later
n AD authentication for administrators of the VCS
n Pre-configured defaults for:
l Cisco Unified Communications Manager neighbor zones
l Cisco TelePresence Advanced Media Gateway
l Nortel Communication Server neighbor zones
n Embedded setup wizard using a serial port for initial configuration
n System administration using a web interface or RS-232, SSH, and HTTPS
n Intrusion protection
Optional features
Some VCS features are available by the purchase and installation of the appropriate option key:
FindMe™
FindMe is a unique industry solution that gives individual video users a single alias on which they can be
contacted regardless of location. Users have the ability to log on to a web-based interface and control where
and how they are contacted. The FindMe feature also includes support for Microsoft Lync 2010/2013, which
enables FindMe aliases to register as Lync clients, and for Lync clients to view the presence status of
FindMe aliases.
About the Cisco TelePresence Video Communication Server (VCS)
Device Provisioning
The Device Provisioning option key allows VCS to provision endpoints with configuration information on
request and to supply endpoints with phone book information. (Endpoints including Jabber Video, E20, and
the EX and MX Series can request to be provisioned.) All configuration and phone book information is
managed in Cisco TMS. The data is then transferred to the VCS, from where it is distributed to endpoint
clients through the Provisioning Server running on the VCS.
See TMS provisioning and Cisco TMS Provisioning Extension Deployment Guide for more information about
how to configure provisioning.
SIP to Microsoft Lync 2010 / 2013 gatewaying
The Microsoft Lync back-to-back user agent (Lync B2BUA) on the VCS can be used to route SIP calls
between the VCS and a Microsoft Lync Server. It provides interworking between Microsoft ICE (used by
Lync clients) and media for communications with standard video endpoints.
The Microsoft Interoperability option key is required for all types of communication with Lync 2013.
Advanced Networking
The Advanced Networking option enables the LAN 2 Ethernet port on the VCS Expressway, allowing you to
have a secondary IP address for your VCS. This option also includes support for deployments where the
VCS Expressway is located behind a static NAT device, allowing it to have separate public and private IP
addresses.
This configuration is intended for deployments where the VCS Expressway is located in a DMZ between two
separate firewalls on separate network segments.
This guide has been divided into several sections, providing conceptual, configuration and reference
information about the various features and capabilities of the VCS. It describes a fully equipped version of the
VCS. Your version may not have all the described extensions installed.
Most configuration tasks on the VCS can be performed by using either the web interface or a command line
interface (CLI). This guide mainly describes how to use the web interface. Some VCS features are only
available through the CLI and these are described as appropriate, including the relevant CLI command.
In this guide, instructions for performing a task using the web interface are shown in the format Menu >
Submenu followed by the Name of the page that you will be taken to.
Where command line interface (CLI) commands are included, they are shown in the format:
See Related documentation [p.503] for a full list of documents and web sites referenced in this guide.
Training
Training is available online and at our training locations. For more information on all the training we provide
and where our training offices are located, visit www.cisco.com/go/telepresencetraining.
Glossary
A glossary of TelePresence terms is available at: https://tp-tools-web01.cisco.com/start/glossary/.
Accessibility notice
Cisco is committed to designing and delivering accessible products and technologies.
The Voluntary Product Accessibility Template (VPAT) for Cisco TelePresence Video Communication Server
is available here:
System configuration is normally carried out through the web interface.
To use the web interface:
1. Open a browser window and in the address bar type either:
l the IP address of the system
l the FQDN of the system
2. Click Administrator Login.
(This step only applies if you are using "standalone FindMe" i.e. FindMe without Cisco TMSPE.)
3. Enter a valid administrator Username and Password and click Login (see the user accounts section for
details on setting up administrator accounts). You are presented with the Overview page.
Note that when logging in using the VCS web interface, you may receive a warning message regarding the
VCS's security certificate. This can safely be ignored.
A command line interface is also available.
Required fields
All mandatory fields on web pages are indicated by a red star .
Supported browsers
The VCS web interface is designed for use with Internet Explorer 8 or 9 (not in compatibility mode), Firefox 3
or later, or Chrome. Later versions of Internet Explorer may also work, but are not officially supported. It may
work with Opera and Safari, but you could encounter unexpected behavior.
JavaScript and cookies must be enabled to use the VCS web interface.
Every page shows the page name and the menu path to that page. Each part of the menu
path is a link; clicking on any of the higher level menu items takes you to that page.
This icon appears on the top right corner of every page when there is a system alarm in
place. Click on this icon to go to the Alarms page which gives information about the alarm
and its suggested resolution.
browser window with help specific to the page you are viewing. It gives an overview of the
purpose of the page, and introduces any concepts configured from the page.
administrator session.
Page 21
Introduction
About this guide
Page
element
Field level
information
Information
bar
Sorting
columns
Select All
and
Unselect All
Mandatory
field
Peer-specific
configuration
item
System
Information
Description
An information box appears on the configuration pages whenever you either click on the
Information icon or click inside a field. This box gives you information about the particular
field, including where applicable the valid ranges and default value. To close the
information box, click on the X at its top right corner.
The VCS provides you with feedback in certain situations, for example when settings have
been saved or when you need to take further action. This feedback is given in a yellow
information bar at the top of the page.
Click on column headings to sort the information in ascending and descending order.
Use these buttons to select and unselect all items in the list.
Indicates an input field that must be completed.
†When a VCS is part of a cluster, most items of configuration are applied to all peers in a
cluster. However, items indicated with a † must be specified separately on each cluster
peer.
The name of the user currently logged in and their access privileges, the system name (or
LAN 1 IPv4 address if no system name is configured), local system time, currently selected
language, serial number and VCS software version are shown at the bottom of the page.
Note that you cannot change configuration settings if your administrator account has read-only privileges.
The new features introduced in this release of VCS software are described below.
X8.1.1
Unified Communications: mobile and remote access
Cisco Unified Communications mobile and remote access is a core part of the Cisco Collaboration Edge
Architecture. It allows endpoints such as Cisco Jabber to have their registration, call control, provisioning,
messaging and presence services provided by Cisco Unified Communications Manager (Unified CM) when
the endpoint is not within the enterprise network. The VCS provides secure firewall traversal and line-side
support for Unified CM registrations.
For more information including configuration recommendations and troubleshooting details, see Unified
Communications: Mobile and Remote Access via VCS Deployment Guide.
Support to modify Maximum transmission unit (MTU) size
You can configure the maximum transmission unit (MTU) for each network interface on the System > IP
page.
Changed functionality
The tcpdump facility has been removed from the Diagnostic logging tool.
Jabber Guest
Jabber Guest support has been removed (it was previously provided as a feature preview in X8.1). It will be
reintroduced in a future release of VCS software.
X8.1
Microsoft Lync 2013 / H.264 SVC support
The Microsoft Lync B2BUA now supports calls to and from Microsoft Lync 2013 clients. It provides
interworking between standard H.264 AVC and Lync 2013's H.264UC SVC codec. To use Lync 2013 you
must install the Microsoft Interoperability option key (formerly known as the Enhanced OCS Collaboration option key). Note that for Lync 2010, the Microsoft Interoperability option key requirements
remain as per previous releases (i.e. it is required for encrypted calls to and from Microsoft Lync Server and
for establishing ICE calls to Lync clients).
Presentation sharing via Lync 2013 is supported but only from VCS to Lync.
Support for standards-based H.264 SVC codecs
The B2BUA now supports calls to standards-based H.264 SVC codecs.
Improved performance and scalability
n VCS X8.1 software can take advantage of the improved performance and scalability capabilities that are
available when running on Large VM server deployments. It can support up to 500 traversal calls, 750 nontraversal calls and 5000 registrations. Note that standard VCS appliances or equivalent VM hardware still
provides support for up to 150 traversal calls, 750 non-traversal calls and 2500 registrations.
n The number of concurrent searches has increased from 100 to 500.
n For new installations of X8.1 or later, the default range for traversal media ports is 36000 – 59999. The
previous default range of 50000 - 54999 still applies to earlier releases that have upgraded to X8.1. The
larger range is required to support the improved scalability features.
n The media demultiplexing ports on the VCS Expressway now use the first set of ports from the general
range of traversal media ports instead of 2776 and 2777.
l On existing systems that have been upgraded to X8.1, this will be 50000 and 50001 by default.
l On new installations of X8.1, this will be 36000 and 36001 by default.
l On large VM deployments, the first 12 ports in the traversal media port range are used (50000 - 50011 or
36000 - 36011 as appropriate).
This applies to all RTP/RTCP media, regardless of whether it is H.323 or SIP. Thus, the previously used
Media demultiplexing RTP port and RTCP port settings (Configuration > Traversal > Ports) and
associated xConfiguration Traversal Server CLI commands have been removed.
Administrators will need to adjust their firewall settings accordingly.
New TURN server port framework
On Large VM server deployments you can configure a range of TURN request listening ports. The default
range is 3478 – 3483.
For new installations of X8.1 or later, the default range for TURN relay media ports is 24000 – 29999. The
previous default range of 60000 – 61799 still applies to earlier releases that have upgraded to X8.1.
Delegated credential checking for device authentication (SIP only)
By default, the VCS uses the relevant credential checking mechanisms (local database, Active Directory
Service or H.350 directory via LDAP) on the VCS performing the authentication challenge.
Alternatively you can now configure the VCS so that the credential checking of SIP messages is delegated,
via a traversal zone, to another VCS. Delegated credential checking is useful in deployments where you
want to allow devices to register on a VCS Expressway, but for security you want all communications with
authentication systems (such as an Active Directory server) to be performed inside the enterprise.
Credential checking for both Digest and NTLM messages may be delegated.
Automated protection
An automated intrusion protection feature has been added. It can be used to detect and block malicious
traffic and to help protect the VCS from dictionary-based attempts to breach login security.
It works by parsing the system's log files to look for repeated failures to access specific service categories,
such as SIP, SSH and web/HTTPS access. When the number of failures within a specified time window
reaches the configured threshold, the source host address (the intruder) is blocked for a period of time. You
can configure sets of addresses that are exempted always from one or more categories.
Automated protection should be used in combination with the existing firewall rules feature - use automated
protection to temporarily block specific threats and use firewall rules to block permanently a range of known
host addresses.
Licensing of audio-only SIP traversal calls
Audio-only SIP traversal calls are now treated distinctly from video SIP traversal calls. Each traversal call
license allows either 1 video call or 2 audio-only SIP calls. Hence, a 100 traversal call license would allow, for
example, 90 video and 20 SIP audio-only simultaneous calls. Any other audio-only call (non-traversal, H.323
or interworked) will consume a standard video call license (traversal or non-traversal as appropriate).
The Overview and Resource usage pages show separate counts for video and audio-only SIP traversal
calls.
Note that:
n VCS defines an "audio-only" SIP call as one that was negotiated with a single “m=” line in the SDP. Thus,
for example, if a person makes a “telephone” call but the SIP UA includes an additional m= line in the SDP,
the call will consume a video call license.
n While an "audio-only" SIP call is being established, it is treated (licensed) as a video call. It only becomes
licensed as "audio-only" when the call setup has completed. This means that if your system approaches its
maximum licensed limit, you may be unable to connect some "audio-only" calls if they are made
simultaneously.
TMS Agent functionality removed
TMS Agent (legacy mode) functionality has been removed. Instead, if you use TMS provisioning, you must
use TMS Provisioning Extension services.
Java application removed
The Java application has been removed. This removes the threat of Java security vulnerabilities.
OCS Relay functionality and Microsoft OCS 2007 zone profile removed
OCS Relay functionality and the Microsoft Office Communications Server 2007 zone profile have been
removed. The Cisco AM GW configuration options previously under the VCS configuration menu, and the
Cisco Advanced Media Gateway zone profile have also been removed.
Instead, we recommend that you use the Microsoft Lync B2BUA to route SIP calls between the VCS and a
Microsoft Lync Server, and to configure your Cisco AM GWs as B2BUA transcoders. Note that B2BUA
connections to Microsoft OCS are no longer supported from X8.1.
Support for Active Control
VCS supports Active Control (iX Channel passthrough) as supported by Cisco TelePresence Server 3.1 or
later and endpoints running TC6.2 or later. It can be configured on a per-zone basis.
FIPS140-2 cryptographic mode
VCS has implemented FIPS140-2 compliant features.
New VMware installations
New VMware installations have a choice of 3 .ova files: Small (for Cisco Business Edition 6000
deployments), Medium (for typical deployments) or Large (for large-scale deployments). Note that the VM
.ova files are used for new installations only. Do not use them to upgrade your existing VM installation.
See VCS on Virtual Machine Installation Guide for information about deploying on UCS tested reference
configurations and their associated memory and CPU resource reservation requirements.
ICE messaging support
ICE messaging support is now configurable at the zone and subzone level.
Certificate management
The certificate management pages are now located under Maintenance > Security certificates:
n The management of CA certificates has been improved, allowing you to view, upload and delete individual
n The application now uses CiscoSSL (instead of OpenSSL).
n The xConfiguration and xCommand CLI command sets removed in version X7.2 have been reinstated.
n When using CPL to modify the source URL of a From header, any corresponding display name is also
modified to match the username part of the modified source URL.
n Improved web interface usability when switching between SRV and address record resolution modes when
configuring the address of an LDAP server for remote user account authentication.
Changed functionality
n For new installations of X8.1 or later, the default range for ephemeral ports is 30000 – 35999. Prior to
X8.1, the default range was 40000 – 49999. Existing systems upgraded to X8.1 or later will preserve their
previous port ranges.
n The Dual Network Interfaces option key is now called Advanced Networking. When the key is installed
you can now configure the use of dual network interfaces separately from the use of static NAT.
n Most system configuration items are now peer-specific (they are not replicated across peers when the VCS
is part of a cluster). See Specifying peer-specific items in clustered systems [p.164] for more information.
n New installations of VCS software now ship with a temporary trusted CA, and a server certificate issued
by that temporary CA. We strongly recommend that you replace the server certificate with one generated
by a trusted certificate authority, and that you install CA certificates for the authorities that you trust. If you
upgrade to this release from an earlier installation of VCS software, your existing server and trusted CA
certificates will not be affected.
n When configuring the sources for administrator account authentication, the Remote option is now labeled
as Remote only.
This also means you can no longer access the VCS via the default admin account if a Remote only
authentication source is in use. The Local option has also been renamed to Local only. Note: do not use Remote only if VCS is managed by Cisco TMS.
n The Reboot, Restart and Shutdown maintenance options have been combined into one Restart options
page.
n When starting a diagnostic log, the relevant system modules now have their log levels automatically set to
"debug" and are automatically reset to their original values when logging is stopped.
n You can no longer access the system over Telnet.
n The Expressway option key is now called Traversal Server.
n The DNS Local host name is now referred to as the System host name.
n Auditor access level now includes the Alarms page.
n The login account configuration pages are now accessed under a new top-level Users menu (previously
under Maintenance > Login accounts).
n The Clustering page is now accessed under the System menu.
n The System administration page is now accessed under System > Administration.
n The Firewall rules configuration pages are now accessed under System > Protection.
n The VCS configuration menu is now called just Configuration.
n The SIP page is now accessed directly via Configuration > Protocols > SIP and the Domains page is
now accessed via Configuration > Domains.
n The Calls page and menu is now called Call routing. Call routed mode is now called Call signaling
optimization and the options are On and Off.
n On the VCS Expressway, the VCS configuration > Expressway menu is now Configuration >
n All references to OCS/Lync B2BUA have been renamed to refer to Lync B2BUA. The Enhanced OCS
Collaboration option key is now called Microsoft Interoperability.
n References to 'Movi' have been changed to 'Jabber Video'.
n The FindMe configuration page is now accessed directly under Applications > FindMe.
n On the Upgrade page, the VCS platform component is now referred to as System platform.
n The Advanced account security page is now called Advanced security and is accessed via
Maintenance > Advanced security.
n The Local VCS inbound ports page is now called Local inbound ports, and the Local VCS outbound
ports page is now called Local outbound ports.
n The advanced zone configuration Empty INVITE allowed setting is now referred to as Send empty
INVITE for interworked calls.
n The following settings have been removed from the SIP configuration page: Require UDP BFCP mode
and Require Duo Video mode. They existed to provide support for interoperability issues with old
versions of Cisco TelePresence MXP endpoints. These settings can still be configured via the CLI if
necessary.
n The Login account authentication configuration page has been removed, and the Administrator
authentication source and FindMe authentication source settings are now on the Login account
LDAP configuration page.
n The xConfiguration Interworking Require Invite Header Mode is now Off by default.
n The Directory option has been removed from the list of restriction policies on the Registration
configuration page and the list of Call Policy modes on the Call Policy configuration page.
n The DNS lookup tool includes Unified Communications SRV services.
This section describes network services and settings related options that appear under the System menu of
the web interface. These options enable you to configure the VCS in relation to the network in which it is
located, for example its IP settings, firewall rules, intrusion protection and the external services used by the
VCS (for example DNS, NTP and SNMP).
The IP page (System > IP) is used to configure the IP protocols and network interface settings of the VCS.
IP protocol configuration
You can configure whether the VCS uses IPv4, IPv6 or Both protocols. The default is Both.
n IPv4: it only accepts registrations from endpoints using an IPv4 address, and only takes calls between two
endpoints communicating via IPv4. It communicates with other systems via IPv4 only.
n IPv6: it only accepts registrations from endpoints using an IPv6 address, and only takes calls between two
endpoints communicating via IPv6. It communicates with other systems via IPv6 only.
n Both: it accepts registrations from endpoints using either an IPv4 or IPv6 address, and takes calls using
either protocol. If a call is between an IPv4-only and an IPv6-only endpoint, the VCS acts as an IPv4 to
IPv6 gateway. It communicates with other systems via either protocol.
Some endpoints support both IPv4 and IPv6, however an endpoint can use only one protocol when
registering with the VCS. Which protocol it uses is determined by the format used to specify the IP address
of the VCS on the endpoint. After the endpoint has registered using either IPv4 or IPv6, the VCS only sends
calls to it using this addressing scheme. Calls made to that endpoint from another device using the other
addressing scheme are converted (gatewayed) by the VCS.
All IPv6 addresses configured on the VCS are treated as having a /64 network prefix length.
IPv4 to IPv6 gatewaying (interworking)
The VCS can act as a gateway for calls between IPv4 and IPv6 devices. To enable this feature, select an IP
protocol of Both. Calls for which the VCS is acting as an IPv4 to IPv6 gateway are traversal calls and
require a traversal call license.
IP gateways and IP routes (static routes)
You can set the default IPv4 gateway and IPv6 gateway used by the VCS. These are the gateways to which
IP requests are sent for IP addresses that do not fall within the VCS’s local subnet.
n The default IPv4 gateway is 127.0.0.1, which should be changed during the commissioning process.
n The IPv6 gateway, if entered, must be a static global IPv6 address. It cannot be a link-local or a stateless
auto-configuration (SLAAC) IPv6 address.
You can also configure additional IP routing information (static routes) on the VCS. This is sometimes
required when using the Advanced Networking option and deploying the VCS in a DMZ. They may also be
required occasionally in other complex network deployments.
n IP routes can be configured using the CLI only: routes can be added by using the xCommand RouteAdd
command and can be modified by using the xConfiguration IP Route commands.
n You can configure routes for up to 50 network and host combinations.
n Do not configure IP routes by logging into the system as root and using "ip route" statements.
LAN 1 is the primary network port on the VCS. You can configure the IPv4 address and subnet mask, the
IPv6 address and the Maximum transmission unit (MTU) for this port.
n The VCS is shipped with a default IP address of 192.168.0.100 (for both LAN ports). This lets you connect
the VCS to your network and access it via the default address so that you can configure it remotely.
n The IPv6 address, if entered, must be a static global IPv6 address. It cannot be a link-local or a stateless
auto-configuration (SLAAC) IPv6 address.
n If you have Advanced Networking installed, you can also configure these options for the LAN 2 port.
n The Maximum transmission unit (MTU) defaults to 1500 bytes.
About Advanced Networking
The Advanced Networking option key enables the LAN 2 port on a VCS for both management and call
signaling. This allows you to have a second IP address for your VCS. The option key also enables static
NAT functionality on a VCS Expressway.
Configuring dual network interfaces
Dual network interfaces are intended for deployments where the VCS Expressway is located in a DMZ
between two separate firewalls on separate network segments. In such deployments, routers prevent
devices on the internal network from being able to route IP traffic to the public internet, and instead the traffic
must pass through an application proxy such as the VCS Expressway.
To enable the use of dual network interfaces:
1. Ensure that the Advanced Networking option key is installed on the VCS Expressway.
2. Set Use dual network interfaces to Yes.
3. Set External LAN interface to LAN2.
LAN 2 should be used as the public interface of the VCS Expressway (if the VCS Expressway is ever
clustered, LAN 1 must be used for clustering, and the clustering interface must not be mapped through a
NAT).
This setting also determines the port from which TURN server relay allocations are made.
Note that:
n You should configure the LAN 1 port and restart the VCS before configuring the LAN 2 port.
n The LAN 1 and LAN 2 interfaces must be on different, non-overlapping subnets.
n If you have Advanced Networking enabled but only want to configure one of the Ethernet ports, you must
use LAN 1.
n If the VCS Expressway is in the DMZ, the outside IP address of the VCS Expressway must be a public IP
address, or if static NAT mode is enabled, the static NAT address must be publicly accessible.
n The VCS Expressway may also be used to traverse internal firewalls within an enterprise. In this case the
"public" IP address may not be publicly accessible, but is an IP address accessible to other parts of the
enterprise.
You can deploy the VCS Expressway behind a static NAT device, allowing it to have separate public and
private IP addresses. This feature is intended for use in deployments where the VCS Expressway is located
in a DMZ, and has the Advanced Networking feature enabled.
In these deployments, the externally-facing LAN port has static NAT enabled in order to use both a private
and public IPv4 address; the internally facing LAN port does not have static NAT enabled and uses a single
IPv4 (or IPv6) address.
In such a deployment, traversal clients should be configured to use the internally-facing IP address of the
VCS Expressway.
To enable the use of a static NAT:
1. Ensure that the Advanced Networking option key is installed.
2. For the externally-facing LAN port:
a. In the IPv4 address field, enter the VCS Expressway's private IP address.
b. Set IPv4 static NAT mode to On.
c. In the IPv4 static NAT address field, enter the VCS Expressway's public IP address - this is the IP
address of the outside of the NAT.
Static NAT restrictions when using SIP media encryption
You should not configure a VCS for SIP media encryption if that same VCS is also configured for static NAT.
If you do so, the private IP address will be sent in the SDP rather than the static NAT address and this will
cause calls to fail.
Note that the recommended configuration for VCS Control with VCS Expressway deployments is to:
n configure the same media encryption policy setting on the traversal client zone on VCS Control, the
traversal server zone on VCS Expressway, and every zone and subzone on VCS Expressway
n use static NAT on the VCS Expressway only
With this configuration the encryption B2BUA will be enabled on the VCS Control only.
Configuring Ethernet settings
The Ethernet page (System > Ethernet) is used to configure the speed of the connection between the VCS
and the Ethernet switch to which it is connected. The speed must be set to the same value on both systems.
If you have the Advanced Networking option enabled, you can configure the Ethernet speed separately for
each LAN port.
The default is Auto, which means that the two systems will auto-negotiate the appropriate speed.
Note: we recommend that you use the default value of Auto unless the switch to which you are connecting is
unable to auto-negotiate. A mismatch in Ethernet speed settings between the VCS and Ethernet switch will
at best result in packet loss; at worst it will make the system inaccessible for endpoints and system
administrators.
The DNS page (System > DNS) is used to configure the VCS's DNS servers and DNS settings.
Configuring the system host and domain name
The System host name defines the DNS host name that this VCS is known by.
n It must be unique for each peer in a cluster.
n It is used to identify the VCS on a remote log server (a default name of "TANDBERG" is used if the
System host name is not specified).
The Domain name is used when attempting to resolve unqualified server addresses (for example ldapserver). It is appended to the unqualified server address before the query is sent to the DNS server. If
the server address is fully qualified (for example ldapserver.mydomain.com) or is in the form of an IP
address, the domain name is not appended to the server address before querying the DNS server.
It applies to the following configuration settings in the VCS:
n LDAP server
n NTP server
n External Manager server
n Remote logging server
You are recommended to use an IP address or FQDN (Fully Qualified Domain Name) for all server
addresses.
Note that the FQDN of the VCS is the System host name plus the Domain name.
Impact on SIP messaging
The System host name and Domain name are also used to identify references to this VCS in SIP
messaging, where an endpoint has configured the VCS as its SIP proxy in the form of an FQDN (as opposed
to an IP address, which is not recommended).
In this case the VCS may, for example, reject an INVITE request if the FQDN configured on the endpoint
does not match the System host name and Domain name configured on the VCS. (Note that this check
occurs because the SIP proxy FQDN is included in the route header of the SIP request sent by the endpoint
to the VCS.)
DNS requests
By default, DNS requests use a random port from within the system's ephemeral port range.
If required, you can specify a custom port range instead by setting DNS requests port range to Use a
custom port range and then defining the DNS requests port range start and DNS requests port range
end fields. Note that setting a small source port range will increase your vulnerability to DNS spoofing
attacks.
Configuring DNS server addresses
You must specify at least one DNS server to be queried for address resolution if you want to:
n Use FQDNs (Fully Qualified Domain Names) instead of IP addresses when specifying external addresses
(for example for LDAP and NTP servers, neighbor zones and peers).
n Use features such as URI dialing or ENUM dialing.
Default DNS servers
You can specify up to 5 default DNS servers.
n The VCS only queries one server at a time; if that server is not available the VCS will try another server
from the list.
n The order that the servers are specified is not significant; the VCS attempts to favor servers that were last
known to be available.
Per-domain DNS servers
In addition to the 5 default DNS servers, you can specify 5 additional explicit DNS servers for specified
domains. This can be useful in deployments where specific domain hierarchies need to be routed to their
explicit authorities.
For each additional per-domain DNS server address you can specify up to 2 Domain names. Any DNS
queries under those domains are forwarded to the specified DNS server instead of the default DNS servers.
You can specify redundant per-domain servers by adding an additional per-domain DNS server address and
associating it with the same Domain names. In this scenario, DNS requests for those domains will be sent
in parallel to both DNS servers.
Tip: you can also use the DNS lookup tool (Maintenance > Tools > Network utilities > DNS lookup) to
check which domain name server (DNS server) is responding to a request for a particular hostname.
Caching DNS records
To improve performance, DNS lookups may be cached. This cache is flushed automatically whenever the
DNS configuration is changed.
You can also force the cache to be flushed by clicking Flush DNS cache.
Configuring Quality of Service settings
The Quality of Service (QoS) page (System > Quality of Service) is used to configure QoS options for
outbound traffic from the VCS.
This allows the network administrator to tag all signaling and media packets flowing through the VCS with
one specific QoS tag and hence provide the ability to prioritize video traffic over normal data traffic.
Management traffic, for example SNMP messages, is not tagged.
Supported mechanisms
The VCS supports the DiffServ (Differentiated Services) mechanism which puts the specified Tag value in
the TOS (Type Of Service) field of the IPv4 header or TC (Traffic Class) field of the IPv6 header.
Firewall rules provide the ability to configure IP table rules to control access to the VCS at the IP level. On
the VCS, these rules have been classified into groups and are applied in the following order:
n Dynamic system rules: these rules ensure that all established connections/sessions are maintained. They
also include any rules that have been inserted by the automated detection feature as it blocks specific
addresses. Finally, it includes a rule to allow access from the loopback interface.
n Non-configurable application rules: this incorporates all necessary application-specific rules, for example to
allow SNMP traffic and H.323 gatekeeper discovery.
n User-configurable rules: this incorporates all of the manually configured firewall rules (as described in this
section) that refine — and typically restrict — what can access the VCS. There is a final rule in this group
that allows all traffic destined for the VCS LAN1 interface (and the LAN 2 interface if the Advanced Networking option key is installed).
There is also a final, non-configurable rule that drops any broadcast or multicast traffic that has not already
been specifically allowed or denied by the previous rules.
By default any traffic that is destined for the specific IP address of the VCS is allowed access, but that traffic
will be dropped if the VCS is not explicitly listening for it. You have to actively configure extra rules to lock
down the system to your specifications.
Note that return traffic from outbound connections is always accepted.
User-configured rules
The user-configured rules are typically used to restrict what can access the VCS. You can:
n Specify the source IP address subnet from which to allow or deny traffic.
n Choose whether to drop or reject denied traffic.
n Configure well known services such as SSH, HTTP/HTTPS or specify customized rules based on
transport protocols and port ranges.
n Configure different rules for the LAN 1 and LAN 2 interfaces (if the Advanced Networking option key is
installed), although note that you cannot configure specific destination addresses such as a multicast
address.
n Specify the priority order in which the rules are applied.
Setting up and activating firewall rules
The Firewall rules configuration page is used to set up and activate a new set of firewall rules.
The set of rules shown will initially be a copy of the current active rules. (On a system where no firewall rules
have previously been defined, the list will be empty.) If you have a lot of rules you can use the Filter options
to limit the set of rules displayed. Note that the built-in rules are not shown in this list.
You can then change the set of firewall rules by adding new rules, or by modifying or deleting any existing
rules. Any changes made at this stage to the current active rules are held in a pending state. When you have
completed making all the necessary changes you can activate the new rules, replacing the previous set.
1. Go to System > Protection > Firewall rules > Configuration.
2. Make your changes by adding new rules, or by modifying or deleting any existing rules as required.
You can change the order of the rules by using the up/down arrows and to swap the priorities of
adjacent rules.
l New or modified rules are shown as Pending (in the State column).l Deleted rules are shown as Pending delete.
3. When you have finished configuring the new set of firewall rules, click Activate firewall rules.
4. Confirm that you want to activate the new rules. This will replace the existing set of active rules with the
set you have just configured.
After confirming that you want to activate the new rules, they are validated and any errors reported.
5. If there are no errors, the new rules are temporarily activated and you are taken to the Firewall rules
confirmation page.
You now have 15 seconds to confirm that you want to keep the new rules:
l Click Accept changes to permanently apply the rules.l If the 15 seconds time limit expires or you click Rollback changes, the previous rules are reinstated
and you are taken back to the configuration page.
The automatic rollback mechanism provided by the 15 seconds time limit ensures that the client system
that activated the changes is still able to access the system after the new rules have been applied. If the
client system is unable to confirm the changes (because it can no longer access the web interface) then
the rollback will ensure that its ability to access the system is reinstated.
When configuring firewall rules, you also have the option to Revert all changes. This discards all pending
changes and resets the working copy of the rules to match the current active rules.
Rule settings
The configurable options for each rule are:
FieldDescriptionUsage tips
PriorityThe order in which the
firewall rules are applied.
InterfaceThe LAN interface on which
you want to control access.
IP address
and Prefix
length
ServiceChoose the service to which
These two fields together
determine the range of IP
addresses to which the rule
applies.
the rule applies, or choose
Custom to specify your own
transport type and port
ranges.
The rules with the highest priority (1, then 2, then 3 and so on) are
applied first.
Firewall rules must have unique priorities. Rule activation will fail if
there are multiple rules with the same priority.
This only applies if the Advanced Networking option key is installed.
The Address range field shows the range of IP addresses to which
the rule applies, based on the combination of the IP address and
Prefix length.
The prefix length range is 0-32 for an IPv4 address, and 0-128 for an
IPv6 address.
Note that if the destination port of a service is subsequently
reconfigured on the VCS, for example from 80 to 8080, any firewall
rules containing the old port number will not be automatically
updated.
Reject: Reject the traffic
with an 'unreachable'
response.
description of the firewall
rule.
Only applies if specifying a UDP or TCP Custom service.
Dropping the traffic means that potential attackers are not provided
with information as to which device is filtering the packets or why.
For deployments in a secure environment, you may want to
configure a set of low priority rules (for example, priority 50000) that
deny access to all services and then configure higher priority rules
(for example, priority 20) that selectively allow access for specific IP
addresses.
If you have a lot of rules you can use the Filter by description options
to find related sets of rules.
Current active firewall rules
The Current active firewall rules page (System > Protection > Firewall rules > Current active rules)
shows the user-configured firewall rules that are currently in place on the system. Note that there is also a set
of built-in rules that are not shown in this list.
If you want to change the rules you must go to the Firewall rules configuration page from where you can
set up and activate a new set of rules.
Configuring automated intrusion protection
The automated protection service can be used to detect and block malicious traffic and to help protect the
VCS from dictionary-based attempts to breach login security.
It works by parsing the system log files to detect repeated failures to access specific service categories,
such as SIP, SSH and web/HTTPS access. When the number of failures within a specified time window
reaches the configured threshold, the source host address (the intruder) and destination port are blocked for a
specified period of time. The host address is automatically unblocked after that time period so as not to lock
out any genuine hosts that may have been temporarily misconfigured.
You can configure ranges of addresses that are exempted from one or more categories (see Configuring
exemptions [p.38] below).
Automated protection should be used in combination with the firewall rules feature - use automated protection
to dynamically detect and temporarily block specific threats, and use firewall rules to permanently block a
range of known host addresses.
About protection categories
The set of available protection categories on your VCS are pre-configured according to the software version
that is running. You can enable, disable or configure each category, but you cannot add additional categories.
The rules by which specific log file messages are associated with each category are also pre-configured and
cannot be altered. You can view example log file entries that would be treated as an access failure/intrusion
within a particular category by going to System > Protection > Automated detection > Configuration and
clicking on the name of the category. The examples are displayed above the Status section at the bottom of
the page.
Enabling automated protection
To enable intrusion protection on your VCS:
1. Go to System > Administration.
2. Set Automated protection service to On.
3. Click Save.
4. You must then ensure that the required protection categories are enabled and configured, and that any
required exemptions are specified, as described below.
All protection categories are disabled by default.
Configuration) is used to enable and configure the VCS's protection categories, and to view current activity.
The page displays a summary of all available categories, showing:
n Status: this indicates if the category is configured to be On or Off. When On, it additionally indicates the
state of the category: this is normally Active, but may temporarily display Initializing or Shutting down when
a category has just been enabled or disabled. Check the alarms if it displays Failed.)
n Currently blocked: the number of addresses currently being blocked for this category.
n Total failures: the total number of failed attempts to access the services associated with this category.
n Total blocks: the total number of times that a block has been triggered. Note that:
l The Total blocks will typically be less than the Total failures (unless the Trigger level is set to 1).l The same address can be blocked and released several times per category, with each occurrence
counting as a separate block.
n Exemptions: the number of addresses that are configured as exempt from this category.
From this page, you can also view any currently blocked addresses or any exemptions that apply to a
particular category.
Enabling and disabling categories
To enable or disable one or more protection categories:
1. Go to System > Protection > Automated detection > Configuration.
2. Select the check box alongside the categories you want to enable or disable.
3. Click Enable or Disable as appropriate.
Configuring a category's blocking rules
To configure a category's specific blocking rules:
1. Go to System > Protection > Automated detection > Configuration.
2. Click on the name of the category you want to configure.
You are taken to the configuration page for that category.
l State: whether protection for that category is enabled or disabled.l Description: a free-form description of the category.l Trigger level and Detection window: these settings combine to define the blocking threshold for the
category. They specify the number of failed access attempts that must occur before the block is
triggered, and the time window in which those failures must occur.
l Block duration: the period of time for which the block will remain in place.
Exemptions) is used to configure any IP addresses that are to be exempted always from one or more
protection categories.
To configure exempted addresses:
1. Go to System > Protection > Automated detection > Exemptions.
2. Click on the Address you want to configure, or click New to specify a new address.
3. Enter the Address and Prefix length to define the range of IPv4 addresses you want to exempt.
4. Select the categories from which the address is to be exempted.
5. Click Add address.
Note that if you exempt an address that is currently blocked, it will remain blocked until its block duration
expires (unless you unblock it manually via the Blocked addresses page).
Managing blocked addresses
The Blocked addresses page (System > Protection > Automated detection > Blocked addresses) is
used to manage the addresses that are currently blocked by the automated protection service:
n It shows all currently blocked addresses and from which categories those addresses have been blocked.
n You can unblock an address, or unblock an address and at the same time add it to the exemption list. Note
that if you want to permanently block an address, you must add it to the set of configured firewall rules.
If you access this page via the links on the Automated detection overview page it is filtered according to
your chosen category. It also shows the amount of time left before an address is unblocked from that
category.
Investigating access failures and intrusions
If you need to investigate specific access failures or intrusion attempts, you can review all the relevant
triggering log messages associated with each category. To do this:
1. Go to System > Protection > Automated detection > Configuration.
2. Click on the name of the category you want to investigate.
3. Click View all matching intrusion protection triggers for this category.
The system will display all the relevant events for that category. You can then search through the list of
triggering events for the relevant event details such as a user name, address or alias.
Automated protection service and clustered systems
When the automated protection service is enabled in a clustered system:
n Each peer maintains its own count of connection failures and the trigger threshold must be reached on each
peer for the intruder's address to be blocked by that peer.
n Addresses are blocked against only the peer on which the access failures occurred. This means that if an
address is blocked against one peer it may still be able to attempt to access another peer (from which it
may too become blocked).
n A blocked address can only be unblocked for the current peer. If an address is blocked by another peer, you
must log in to that peer and then unblock it.
n Category settings and the exemption list are applied across the cluster.
n The statistics displayed on the Automated detection overview page are for the current peer only.
Additional information
n When a host address is blocked and tries to access the system, the request is dropped (the host receives
no response).
n A host address can be blocked simultaneously for multiple categories, but may not necessarily be blocked
by all categories. Those blocks may also expire at different times.
n When an address is unblocked (either manually or after its block duration expires), it has to fail again for the
full number of times as specified by the category's trigger level before it will be blocked for a second time by
that category.
n IPv6 host addresses are not supported (the automated protection service currently detects IPv4 host
address failures only).
n A category is reset whenever it is enabled. All categories are reset if the system is restarted or if the
automated protection service is enabled at the system level. When a category is reset:
l Any currently blocked addresses are unblocked.
l Its running totals of failures and blocks are reset to zero.
n You can view all Event Log entries associated with the automated protection service by clicking View all
intrusion protection events on the Automated detection overview page.
The System administration page (System > Administration) is used to configure the name of the VCS
and the means by which it is accessed by administrators.
System settings
System name
The System name is used to identify the VCS. It appears in various places in the web interface, and in the
display on the front panel of the unit (so that you can identify it when it is in a rack with other systems). The
System name is also used by Cisco TMS.
We recommend that you give the VCS a name that allows you to easily and uniquely identify it.
Ephemeral ports range
You can specify the Ephemeral port range start and end values. This defines the port range to use for
ephemeral outbound connections not otherwise constrained by VCS call processing.
The default range of 30000 – 35999 applies to new installations of X8.1 or later; the previous default range of
40000 – 49999 still applies to earlier releases that have upgraded to X8.1.
Administration access settings
While you can administer the VCS via a PC connected directly to the unit via a serial cable, you may want to
access the system remotely over IP. You can do this using either the web interface (via HTTPS) or through a
command line interface (via SSH).
The configurable options are:
FieldDescriptionUsage tips
Services
Serial port /
console
SSH serviceDetermines whether the VCS can be
Web interface
(over HTTPS)
Determines whether the system can
be accessed locally via either the
serial port (for a physical system) or
VMware console (for a virtual
machine). Default is On.
accessed via SSH and SCP. Default is
On.
Determines whether the VCS can be
accessed via the web interface.
Default is On.
Serial port / console access is always enabled for one
minute following a restart, even if it is normally
disabled.
Cisco TMS accesses the VCS via the web server. If
HTTPS mode is turned off, Cisco TMS will not be able to
access it.
The number of minutes that an
administration session (serial port,
HTTPS or SSH) or a FindMe session
may be inactive before the session is
timed out. Default is 30 minutes.
Per-account
session limit
The number of concurrent sessions
that each individual administrator
account is allowed on each VCS.
System
session limit
The maximum number of concurrent
administrator sessions allowed on
each VCS.
System protection
Automated
protection
service
Determines whether the automated
protection service is active. Default is
Off.
Web server configuration
Redirect HTTP
requests to
HTTPS
Determines whether HTTP requests
are redirected to the HTTPS port.
Default is On.
A value of 0 means that session time outs are disabled.
This includes web, SSH and serial sessions. Session
limits are not enforced on FindMe accounts or the root
account.
A value of 0 turns session limits off.
This includes web, SSH and serial sessions. Session
limits are not enforced on FindMe accounts or the root
account; however active root account sessions do
count towards the total number of current administrator
sessions.
A value of 0 turns session limits off.
After enabling the service you must go and configure
the specific protection categories.
HTTPS must also be enabled for access via HTTP to
function.
HTTP Strict
Transport
Security
(HSTS)
Determines whether web browsers
are instructed to only ever use a
secure connection to access this
server. Enabling this feature gives
added protection against man-in-themiddle (MITM) attacks.
On: the Strict-Transport-Security
header is sent with all responses
from the web server, with a 1 year
expiry time.
Off: the Strict-Transport-Security
header is not sent, and browsers
work as normal.
Controls the level of security required
to allow client systems (typically web
browsers) to communicate with the
VCS over HTTPS.
Not required: the client system does
not have to present any form of
certificate.
Certificate validation: the client
system must present a valid
certificate that has been signed by a
trusted certificate authority (CA). Note
that a restart is required if you are
changing from Not required to
Certificate validation.
Certificate-based authentication: the
client system must present a valid
certificate that has been signed by a
trusted CA and contains the client's
authentication credentials.
Default: Not required
Important:
Enabling Certificate validation means that your
browser (the client system) can use the VCS web
interface only if it has a valid (in date and not revoked
by a CRL) client certificate that is signed by a CA in the
VCS's trusted CA certificate list.
Ensure your browser has a valid client certificate
before enabling this feature. The procedure for
uploading a certificate to your browser may vary
depending on the browser type and you may need to
restart your browser for the certificate to take effect.
You can upload CA certificates on the Managing the
trusted CA certificate list [p.285] page, and test client
certificates on the Testing client certificates [p.292]
page.
Enabling Certificate-based authentication means that
the standard login mechanism is no longer available.
You can log in only if your browser certificate is valid
and the credentials it provides have the appropriate
authorization levels. You can configure how the VCS
extracts credentials from the browser certificate on the
By default, access via HTTPS and SSH is enabled. For optimum security, disable HTTPS and SSH and use
the serial port to manage the system. Because access to the serial port allows the password to be reset, we
recommend that you install the VCS in a physically secure environment.
HTTP Strict Transport Security (HSTS)
HTTP Strict Transport Security (HSTS) provides a mechanism where a web server forces a web browser to
communicate with it using secure connections only.
As of October 2012, this mechanism is supported by the following browsers:
n Chrome, versions 4.0.211.0 and later
n Firefox, versions 4 and later
When HSTS is enabled, a browser that supports HSTS will:
n Automatically turn any insecure links to the website into secure links (for example,
http://example.com/page/ is modified to https://example.com/page/ before accessing the
server).
n Only allow access to the server if the connection is secure (for example, the server's TLS certificate is
valid, trusted and not expired).
Browsers that do not support HSTS will ignore the Strict-Transport-Security header and work as before. They
will still be able to access the server.
Note that compliant browsers only respect Strict-Transport-Security headers if they access the server
through its fully qualified name (rather than its IP address).
VCS unit front panel
The LCD panel on the front of the VCS hardware unit has a rotating display of the VCS's system name, IP
addresses, alarms, and the number of current traversal calls, non-traversal calls and registrations.
To control the display of status items:
n ENTER stops the display from automatically rotating through the status items. This is useful if you need to
review all of the alarms or read a long IPv6 address. Press ENTER again to resume the rotating display.
n UP/DOWN displays the previous or next status item.
You can configure the front panel to hide this identifying information, if required for security reasons for
example, by using the CLI command xConfiguration Administration LCDPanel Mode. If the
mode is set to Off the front panel only displays "Cisco".
Configuring SNMP settings
The SNMP page (System > SNMP) is used to configure the VCS's SNMP settings.
Tools such as Cisco TMS or HP OpenView may act as SNMP Network Management Systems (NMS). They
allow you to monitor your network devices, including the VCS, for conditions that might require administrative
attention.
The VCS supports the most basic MIB-II tree (.1.3.6.1.2.1) as defined in RFC 1213.
The information made available by the VCS includes the following:
n disk space, memory, and other machine-specific statistics
By default, SNMP is Disabled, therefore to allow the VCS to be monitored by an SNMP NMS (including
Cisco TMS), you must select an alternative SNMP mode. The configurable options are:
FieldDescriptionUsage tips
SNMP modeControls the level of SNMP support.
Disabled: no SNMP support.
SNMPv3 (secure SNMP): supports authentication and
encryption.
SNMPv3 plus TMS support: secure SNMPv3 plus nonsecure access to OID 1.3.6.1.2.1.1.2.0 only.
SNMPv2c: non-secure community-based SNMP.
Community
name
System
contact
LocationSpecifies the physical location of the VCS.
UsernameThe VCS's SNMP username, used to identify this SNMP
v3 Authentication settings (only applicable to SNMPv3)
Authentication
mode
TypeThe algorithm used to encrypt authentication
The VCS's SNMP community name. The default is
public.
The name of the person who can be contacted
regarding issues with the VCS.
agent to the SNMP manager.
Enables or disables SNMPv3 authentication.
credentials.
SHA: Secure Hash Algorithm.
MD5: Message-Digest algorithm 5.
If you want to use secure SNMPv3 but
you also use Cisco TMS as your
external manager, you must select
SNMPv3 plus TMS support.
Only applies to SNMPv2c and
SNMPv3 plus TMS support.
The System contact and Location
are used for reference purposes by
administrators when following up on
queries.
Only applies when using secure
SNMPv3.
PasswordThe password used to encrypt authentication
credentials.
v3 Privacy settings (only applicable to SNMPv3)
Privacy modeEnables or disables SNMPv3 encryption.
TypeThe security model used to encrypt messages.
DES: Data Encryption Standard 56-bit encryption.
AES: Advanced Encryption Standard 128-bit
encryption.
PasswordThe password used to encrypt messages.Must be at least 8 characters.
The VCS does not support SNMP traps or SNMP sets, therefore it cannot be managed via SNMP.
Note: SNMP is disabled by default, because of the potentially sensitive nature of the information involved.
Do not enable SNMP on a VCS on the public internet or in any other environment where you do not want to
expose internal system information.
Configuring time settings
The Time page (System > Time) is used to configure the VCS's NTP servers and to specify the local time
zone.
An NTP server is a remote server with which the VCS synchronizes in order to ensure its time is accurate.
The NTP server provides the VCS with UTC time.
Accurate time is necessary for correct system operation.
Configuring the NTP servers
To configure the VCS with one or more NTP servers to be used when synchronizing system time, enter the
Address of up to five servers in one of the following formats, depending on the system's DNS settings (you
can check these settings on the DNS page, System > DNS):
n if there are no DNS servers configured, you must use an IP address for the NTP server
n if there are one or more DNS servers configured, you can use an FQDN or IP address for the NTP server
n if there is a DNS Domain name configured in addition to one or more DNS servers, you can use the
server name, FQDN or IP address for the NTP server
Three of the Address fields default to NTP servers provided by Cisco.
You can configure the Authentication method used by the VCS when connecting to an NTP server. Use one
of the following options for each NTP server connection:
Authentication
method
DisabledNo authentication is used.
Symmetric keySymmetric key authentication. When using this method a Key ID, Hash method and Pass
Private keyPrivate key authentication. This method uses an automatically generated private key with which
Description
phrase must be specified. The values entered here must match exactly the equivalent settings
on the NTP server. You can use the same symmetric key settings across multiple NTP servers.
However, if you want to configure each server with a different pass phrase, you must also ensure
that each server has a unique key ID.
to authenticate messages sent to the NTP server.
Displaying NTP status information
The synchronization status between the NTP server and the VCS is shown in the Status area as follows:
n Starting: the NTP service is starting.
n Synchronized: the VCS has successfully obtained accurate system time from an NTP server.
n Unsynchronized: the VCS is unable to obtain accurate system time from an NTP server.
n Down: the VCS's NTP client is not running.
n Reject: the NTP service is not accepting NTP responses.
Note that updates may take a few minutes to be displayed in the status table.
Other status information available includes:
FieldDescription
NTP serverThe actual NTP server that has responded to the request. This may be different to the NTP server
in the NTP server address field.
ConditionGives a relative ranking of each NTP server. All servers that are providing accurate time are
given a status of Candidate; of those, the server that the VCS considers to be providing the most
accurate time and is therefore using shows a status of sys.peer.
FlashA code giving information about the server's status. 00 ok means there are no issues. See the
Flash status word reference table [p.493] for a complete list of codes.
Authentication Indicates the status of the current authentication method. One of ok, bad or none. none is
specified when the Authentication method is Disabled.
EventShows the last event as determined by NTP (for example reachable or sys.peer)
ReachabilityIndicates the results of the 8 most recent contact attempts between the VCS and the NTP server,
with a tick indicating success and a cross indicating failure. The result of the most recent attempt
is shown on the far right.
Each time the NTP configuration is changed, the NTP client is restarted and the Reachability
field will revert to all crosses apart from the far right indicator which will show the result of the first
connection attempt after the restart. However, the NTP server may have remained contactable
during the restart process.
OffsetThe difference between the NTP server's time and the VCS's time.
DelayThe network delay between the NTP server and the VCS.
StratumThe degree of separation between the VCS and a reference clock. 1 indicates that the NTP
server is a reference clock.
Ref IDA code identifying the reference clock.
Ref timeThe last time that the NTP server communicated with the reference clock.
For definitions of the remaining fields on this page, and for further information about NTP, see Network Time
Protocol website.
VCS time display and time zone
Local time is used throughout the web interface. It is shown in the system information bar at the bottom of the
screen and is used to set the timestamp that appears at the start of each line in the Event Log.
Note that UTC timestamps are included at the end of each entry in the Event Log.
Internally, the VCS maintains its system time in UTC. It is based on the VCS's operating system time, which
is synchronized using an NTP server if one is configured. If no NTP servers are configured, the VCS uses its
own operating system time to determine the time and date.
Specifying your local Time zone lets the VCS determine the local time where the system is located. It does
this by offsetting UTC time by the number of hours (or fractions of hours) associated with the selected time
zone. It also adjusts the local time to account for summer time (also known as daylight saving time) when
appropriate.
The Login page configuration page (System > Login page) is used to specify a message and image to
appear on the login page for both users and administrators.
The Welcome message title and text will appear to administrators when attempting to log in using the CLI,
and to FindMe users and administrators when attempting to log in using the web interface.
You can upload an image that will appear above the welcome message on the login page when using the web
interface.
n supported image file formats are JPG, GIF and PNG
n images larger than 200x200 pixels will be scaled down
If the VCS is using the TMS Provisioning Extension services to provide FindMe account data, then users log
into their FindMe accounts through Cisco TMS, not through VCS.
Note that this feature is not configurable using the CLI.
The External manager page (System > External manager) is used to configure the VCS's connection to
an external management system.
An external manager is a remote system, such as the Cisco TelePresence Management Suite (Cisco TMS),
used to monitor events occurring on the VCS, for example call attempts, connections and disconnections,
and as a place for where the VCS can send alarm information. The use of an external manager is optional.
FieldDescriptionUsage tips
Address
and path
ProtocolDetermines whether
Certificate
verification
mode
To use an external manager,
you must configure the VCS
with the IP address or host
name and path of the external
manager to be used.
communications with the
external manager are over
HTTP or HTTPS. The default
is HTTPS.
Controls whether the
certificate presented by the
external manager is verified.
If you are using Cisco TMS as your external manager, use the
default path of tms/public/external/management/SystemManagementService.asmx.
If you enable verification, you must also add the certificate of the
issuer of the external manager's certificate to the file containing the
VCS's trusted CA certificates. This is done from the Managing the
trusted CA certificate list [p.285] page (Maintenance > Security
certificates > Trusted CA certificate).
Note that:
n the VCS will continue to operate without loss of service if its connection to Cisco TMS fails. This applies
even if the VCSs are clustered. No specific actions are required as the VCS and Cisco TMS will
automatically start communicating with each other again after the connection is re-established.
n Cisco TMS identifies the VCS as a "TANDBERG VCS".
Cisco TMSPE services are hosted on Cisco TMS. They provide the user, device and phone book data that is
used by the VCS's Provisioning Server to service provisioning requests from endpoint devices. They also
provide the VCS with the FindMe account configuration data that it uses to provide FindMe services.
The TMS Provisioning Extension services page (System > TMS Provisioning Extension services) is
used to configure how the VCS connects to the Cisco TMSPE services. We recommend that you use Cisco
TMS to make any changes to the Cisco TMSPE services' configuration settings. Any changes made to the
settings via this page will not be applied within Cisco TMS.
The FindMe service can only be configured if the FindMe option key is installed, and the Users, Phone books and Devices services can only be configured if the Device Provisioning option key is installed.
The configurable options are:
FieldDescriptionUsage tips
Default connection configuration
This section specifies default connection settings for accessing the Cisco TMSPE services. Each specific service
can choose to use these default settings or, alternatively, specify its own connection settings, for example if a
different Cisco TMSPE server is being used for each service.
Server addressThe IP address or Fully Qualified
Domain Name (FQDN) of the
service.
Destination portThe listening port on the Cisco
TMSPE service. Default is 443.
EncryptionThe encryption to use for the
connection to the Cisco TMSPE
service.
Off: no encryption is used.
TLS: TLS encryption is used.
Default is TLS.
Verify certificateControls whether the certificate
presented by the Cisco TMSPE
service is verified against the
VCS's current trusted CA list and, if
loaded, the revocation list. Default
is Yes.
A TLS connection is recommended.
If you enable verification:
n IIS (on the Cisco TMSPE server) must be installed
with a signed certificate and be set to enforce SSL
connections.
n You must add the certificate of the issuer of the Cisco
TMSPE server's certificate to the file containing the
VCS's trusted CA certificates. This is done from the
Managing the trusted CA certificate list [p.285] page
You can specify the connection details for each of the Cisco TMSPE services: Users, FindMe, Phone books and
Devices.
Connect to this
service
Polling intervalThe frequency with which the
Controls whether the hostname
contained within the certificate
presented by the Cisco TMSPE
service is verified by the VCS.
Default is Yes.
(or VCS cluster) with the Cisco
TMSPE service.
The username and corresponding
password used by the VCS to
authenticate itself with the Cisco
TMSPE service.
Controls whether the VCS
connects to the Cisco TMSPE
service. Default is No.
VCS checks the Cisco TMSPE
service for updates. Defaults are:
FindMe: 2 minutes
Users: 2 minutes
Phone books: 1 day
The Device service polling
interval is set to 30 seconds and
cannot be modified.
If enabled, the certificate hostname (also known as the
Common Name) must match the specified Server address. If the server address is an IP address, the
required hostname is obtained via a DNS lookup.
This only applies if Verify certificate is Yes.
The TMS administrator will supply this value.
The Base group ID used by the Devices service must
be explicitly specified as it is normally different from that
used by the other services.
If TLS encryption is not enabled, the authentication
password is sent in the clear.
If enabled, the status of the connection is shown to the
right of the field; this can be either Checking, Active or
Failed. Click details to view full status information.
You can request an immediate update of all services by
clicking Check for updates at the bottom of the page.
Use the default
connection
configuration
Controls whether the service uses
the default connection
configuration for Cisco TMSPE
services. Default is Yes.
A full and immediate resynchronization of all data between the VCS and Cisco TMS can be triggered at any
time by clicking Perform full synchronization (at the bottom of the of the TMS Provisioning Extension
services page). Note that this will result in a temporary (a few seconds) lack of service on the VCS while the
data is deleted and fully refreshed. If you only need to ensure that all of the latest updates within Cisco TMS
have been supplied to the VCS then click Check for updates instead.
Further status information
The menu options under Status > Applications > TMS Provisioning Extension services provide full
status information about the Cisco TMSPE services, including:
n the status of the connection between the VCS and the Cisco TMSPE services
n views of the user, FindMe and phone book data supplied by the Cisco TMSPE services
If No is selected, an additional set of connection
configuration parameters will appear. You can then
specify alternative connection details for the service that
will override those specified in the Default connection
configuration section.
Page 51
Network and system settings
Configuring TMS Provisioning Extension services
n a summary of the requests received from endpoint devices and the number of provisioning licenses being
consumed
n the status of the devices that are making provisioning requests to the VCS's Provisioning Server
This section describes how to configure your VCS Control and VCS Expressway in order to traverse
firewalls.
About firewall traversal53
Configuring a traversal client and server57
Configuring ports for firewall traversal58
Firewall traversal and authentication61
Configuring Expressway and traversal endpoint communications62
About ICE and TURN services63
The purpose of a firewall is to control the IP traffic entering your network. Firewalls will generally block
unsolicited incoming requests, meaning that any calls originating from outside your network will be
prevented. However, firewalls can be configured to allow outgoing requests to certain trusted destinations,
and to allow responses from those destinations. This principle is used by Cisco's Expressway technology to
enable secure traversal of any firewall.
The Expressway solution
The Expressway solution consists of:
n A VCS Expressway located outside the firewall on the public network or in the DMZ, which acts as the
firewall traversal server.
n A VCS Control or other traversal-enabled endpoint located in a private network, which acts as the firewall
traversal client.
The two systems work together to create an environment where all connections between the two are
outbound, i.e. established from the client to the server, and thus able to successfully traverse the firewall.
We recommend that both the VCS Expressway and the VCS Control run the same software version.
How does it work?
The traversal client constantly maintains a connection via the firewall to a designated port on the traversal
server. This connection is kept alive by the client sending packets at regular intervals to the server. When the
traversal server receives an incoming call for the traversal client, it uses this existing connection to send an
incoming call request to the client. The client then initiates the necessary outbound connections required for
the call media and/or signaling.
This process ensures that from the firewall’s point of view, all connections are initiated from the traversal
client inside the firewall out to the traversal server.
For firewall traversal to function correctly, the VCS Expressway must have one traversal server zone
configured on it for each client system that is connecting to it (this does not include traversal-enabled
endpoints which register directly with the VCS Expressway; the settings for these connections are
configured in a different way). Likewise, each VCS client must have one traversal client zone configured on it
for each server that it is connecting to.
The ports and protocols configured for each pair of client-server zones must be the same. See the
Configuring a traversal client and server [p.57] for a summary of the required configuration on each system.
Because the VCS Expressway listens for connections from the client on a specific port, you are
recommended to create the traversal server zone on the VCS Expressway before you create the traversal
client zone on the VCS Control.
Note that the traversal client and the traversal server must both be VCS systems (neither can be a Cisco
Expressway).
The "far end" (at home or at a hotel, for example) endpoint requirements to support firewall traversal are
summarized below:
n For H.323, the endpoint needs to support Assent or H460.18 and H460.19.
n For SIP, the endpoint just needs to support standard SIP.
l Registration messages will keep the "‘far end" firewall ports open for VCS to send messages to that
endpoint. The VCS waits for media from the endpoint behind the firewall, before returning media to it on
that same port – the endpoint does have to support media transmission and reception on the same port.
l The VCS also supports SIP outbound, which is an alternative method of keeping firewalls open without
the overhead of using the full registration message.
n SIP and H.323 endpoints can register to the VCS Expressway or they can just send calls to the VCS
Expressway as the local "DMZ" firewall has relevant ports open to allow communication to the VCS
Expressway over SIP and H.323 ports.
Endpoints can also use ICE to find the optimal (in their view of what optimal is) path for media
communications between themselves. Media can be sent directly from endpoint to endpoint, from endpoint
via the outside IP address of the destination firewall to the destination endpoint, or from the endpoint via a
TURN server to destination endpoint.
n The VCS supports ICE for calls where the VCS does not have to traverse media (for example if there is no
IPv4/IPv6 conversion or SIP / H.323 conversion required); typically this means 2 endpoints which are able
to support ICE, directly communicating to a VCS Expressway cluster.
n The VCS Expressway has its own built-in TURN server to support ICE-enabled endpoints.
H.323 firewall traversal protocols
The VCS supports two different firewall traversal protocols for H.323: Assent and H.460.18/H.460.19.
n Assent is Cisco’s proprietary protocol.
n H.460.18 and H.460.19 are ITU standards which define protocols for the firewall traversal of signaling and
media respectively. These standards are based on the original Assent protocol.
A traversal server and traversal client must use the same protocol in order to communicate. The two
protocols each use a different range of ports.
SIP firewall traversal protocols
The VCS supports the Assent protocol for SIP firewall traversal of media.
The signaling is traversed through a TCP/TLS connection established from the client to the server.
Media demultiplexing
The VCS Expressway uses media demultiplexing in the following call scenarios:
n Any H.323 or SIP call leg to/from a VCS Control through a traversal zone configured to use Assent.
n Any H.323 call leg to/from a VCS Control through a traversal server zone configured to use H460.19 in
demultiplexing mode
n H.323 call legs between a VCS Expressway and an Assent or H.460.19 enabled endpoint
The VCS Expressway uses non-demultiplexed media for call legs directly to/from SIP endpoints (that is
endpoints which do not support Assent or H.460.19), or if the traversal server zone is not configured to use
H.460.19 in demultiplexing mode.
Media demultiplexing ports on the VCS Expressway are allocated from the general range of traversal media ports. This applies to all RTP/RTCP media, regardless of whether it is H.323 or SIP. The default media port
range of 36000 to 59999 applies to new installations of X8.1 or later. The first 2 ports in the range are used for
multiplexed traffic only (with Large VM deployments the first 12 ports in the range – 36000 to 36011 – are
used). The previous default range of 50000 - 54999 still applies to earlier releases that have upgraded to X8.1.
For example, in a SIP call from within an enterprise to an endpoint at home through a VCS Control/VCS
Expressway pair, the only demultiplexing that would occur would be on the VCS Expressway ports facing
the VCS Control:
Enterprise
endpoint
Non-
RTP ports36002 3600436000 36002
RTCP ports 36003 3600536001 36003
VCS ControlVCS ExpresswayHome
demuxed
Nondemuxed
Demuxed Non-
demuxed
endpoint
However, an H.323 call from within an enterprise to an Assent capable H.323 endpoint at home through the
same VCS Control/VCS Expressway would perform demultiplexing on both sides of the VCS Expressway:
Enterprise
endpoint
Non-
RTP ports36002 3600436000 36000
RTCP ports 36003 3600536001 36001
VCS ControlVCS ExpresswayHome
demuxed
Nondemuxed
Demuxed Demuxed
endpoint
If the VCS Expressway has Advanced Networking, it will still use the same port numbers as described
above, but they will be assigned to the internal and external IP addresses.
Firewall traversal configuration overview
This section provides an overview to how the VCS can act as a traversal server or as a traversal client.
VCS as a firewall traversal client
The VCS can act as a firewall traversal client on behalf of SIP and H.323 endpoints registered to it, and any
systems that are neighbored with it. To act as a firewall traversal client, the VCS must be configured with
information about the systems that will act as its firewall traversal server.
You do this by adding a traversal client zone on the VCS client (Configuration > Zones > Zones) and
configuring it with the details of the traversal server. See Configuring traversal client zones [p.144] for more
information. You can create more than one traversal client zone if you want to connect to multiple traversal
servers.
Note that:
n In most cases, you will use a VCS Control as a firewall traversal client. However, a VCS Expressway can
also act as a firewall traversal client.
n The firewall traversal server used by the VCS client must be a VCS Expressway.
VCS as a firewall traversal server
The VCS Expressway has all the functionality of a VCS Control (including being able to act as a firewall
traversal client). However, its main feature is that it can act as a firewall traversal server for other Cisco
systems and any traversal-enabled endpoints that are registered directly to it. It can also provide TURN relay
services to ICE-enabled endpoints.
Configuring traversal server zones
For the VCS Expressway to act as a firewall traversal server for Cisco systems, you must create a traversal
server zone on the VCS Expressway (Configuration > Zones > Zones) and configure it with the details of
the traversal client. See Configuring traversal server zones [p.146] for more information.
You must create a separate traversal server zone for every system that is its traversal client.
Configuring other traversal server features
n For the VCS Expressway to act as a firewall traversal server for traversal-enabled endpoints (such as
Cisco MXP endpoints and any other endpoints that support the ITU H.460.18 and H.460.19 standards), no
additional configuration is required. See Configuring Expressway and traversal endpoint communications
[p.62] for more information.
n To enable TURN relay services and find out more about ICE, see About ICE and TURN services [p.63].
n To reconfigure the default ports used by the VCS Expressway, see Configuring ports for firewall traversal
[p.58].
Firewall traversal and Advanced Networking
The Advanced Networking option key enables the LAN 2 interface on the VCS Expressway (the option is not
available on a VCS Control). The LAN 2 interface is used in situations where the VCS Expressway is located
in a DMZ that consists of two separate networks - an inner DMZ and an outer DMZ - and your network is
configured to prevent direct communication between the two.
With the LAN 2 interface enabled, you can configure the VCS with two separate IP addresses, one for each
network in the DMZ. Your VCS then acts as a proxy server between the two networks, allowing calls to pass
between the internal and outer firewalls that make up your DMZ.
When Advanced Networking is enabled, all ports configured on the VCS, including those relating to firewall
traversal, apply to both IP addresses; you cannot configure ports separately for each IP address.
The basic steps in configuring a traversal client and server are as follows:
Step Description
On the VCS Expressway, create a traversal server zone (this represents the incoming connection from the
VCS Control). In the Username field, enter the VCS Control’s authentication username.
On the VCS Expressway, add the VCS Control’s authentication username and password as credentials
into the local authentication database.
On the VCS Control, create a traversal client zone (this represents the connection to the VCS Expressway).
Enter the same authentication Username and Password as specified on the VCS Expressway.
Configure all the modes and ports in the H.323 and SIP protocol sections to match identically those of the
traversal server zone on the VCS Expressway.
Enter the VCS Expressway’s IP address or FQDN in the Peer 1 address field.
Ports play a vital part in firewall traversal configuration. The correct ports must be set on the VCS
Expressway, traversal client and firewall in order for connections to be permitted.
Ports are initially configured on the VCS Expressway by the VCS Expressway administrator. The firewall
administrator and the traversal client administrator should then be notified of the ports, and they must
configure their systems to connect to these specific ports on the server. The only port configuration required
on the traversal client is the range of ports it uses for outgoing connections; the firewall administrator may
need to know this information so that if necessary they can configure the firewall to allow outgoing
connections from those ports.
The Port usage [p.311] pages (under Maintenance > Tools > Port usage) list all the IP ports that are being
used on the VCS, both inbound and outbound. This information can be provided to your firewall administrator
so that the firewall can be configured appropriately.
When Advanced Networking is enabled, all ports configured on the VCS, including those relating to firewall
traversal, apply to both IP addresses; you cannot configure ports separately for each IP address.
The Expressway solution works as follows:
1. Each traversal client connects via the firewall to a unique port on the VCS Expressway.
2. The server identifies each client by the port on which it receives the connection, and the authentication
credentials provided by the client.
3. After the connection has been established, the client regularly sends a probe to the VCS Expressway to
keep the connection alive.
4. When the VCS Expressway receives an incoming call for the client, it uses this initial connection to send
an incoming call request to the client.
5. The client then initiates one or more outbound connections. The destination ports used for these
connections differ for signaling and/or media, and depend on the protocol being used (see the following
sections for more details).
Configuring the firewall
For Expressway firewall traversal to function correctly, your firewall must be configured to:
n allow initial outbound traffic from the client to the ports being used by the VCS Expressway
n allow return traffic from those ports on the VCS Expressway back to the originating client
Note: we recommend that you turn off any H.323 and SIP protocol support on the firewall: these are not
needed in conjunction with the Expressway solution and may interfere with its operation.
Configuring traversal server ports
The VCS Expressway has specific listening ports used for firewall traversal. Rules must be set on your
firewall to allow connections to these ports. In most cases the default ports should be used. However, you
have the option to change these ports if necessary by going to the Ports page (Configuration > Traversal >
n H.323 Assent call signaling port; default is 2776
n H.323 H.460.18 call signaling port; default is 2777
Note that media demultiplexing ports are allocated from the general range of traversal media ports.
Configuring ports for connections from traversal clients
Each traversal server zone specifies an H.323 port and a SIP port to use for the initial connection from the
client. Each time you configure a new traversal server zone on the VCS Expressway, you are allocated
default port numbers for these connections:
n H.323 ports start at UDP/6001 and increment by 1 for every new traversal server zone.
n SIP ports start at TCP/7001 and increment by 1 for every new traversal server zone.
You can change these default ports if necessary but you must ensure that the ports are unique for each
traversal server zone. After the H.323 and SIP ports have been set on the VCS Expressway, matching ports
must be configured on the corresponding traversal client. Note that:
n The default port used for the initial connections from MXP endpoints is the same as that used for standard
RAS messages, that is UDP/1719. While you can change this port on the VCS Expressway, most
endpoints will not support connections to ports other than UDP/1719, therefore we recommend that you
leave this as the default.
n You must allow outbound connections through your firewall to each of the unique SIP and H.323 ports that
are configured on each of the VCS Expressway’s traversal server zones.
The following table shows the default ports used for connections to the VCS Expressway.
Table 1: Default traversal port connections
ProtocolCall signalingMedia
AssentUDP/1719: listening port for RAS
messages
TCP/2776: listening port for H.225 and
H.245 protocols
H.460.18/19 UDP/1719: listening port for RAS
messages
TCP/1720: listening port for H.225
protocol
TCP/2777: listening port for H.245
protocol
SIPSIP call signaling uses the same port as
used by the initial connection between
the client and server.
RTP and RTCP media demultiplexing ports are
allocated from the start of the traversal media ports
range: UDP/36000-36001*.
RTP and RTCP media demultiplexing ports are
allocated from the start of the traversal media ports
range: UDP/36000-36001*.
RTP and RTCP media non-demultiplexing ports are
allocated from the remainder of the traversal media
ports range: UDP/36002-59999*.
Where the traversal client is a VCS, SIP media uses
Assent to traverse the firewall.
* The default media port range of 36000 to 59999 applies to new installations of X8.1 or later. The first 2 ports
in the range are used for multiplexed traffic only (with Large VM deployments the first 12 ports in the range –
36000 to 36011 – are used). The previous default range of 50000 - 54999 still applies to earlier releases that
have upgraded to X8.1.
The call signaling ports are configured via Configuration > Traversal > Ports. The traversal media port
range is configured via Configuration > Local Zone > Traversal Subzone.
If your VCS Expressway does not have any endpoints registering directly with it, and it is not part of a
cluster, then UDP/1719 is not required. You therefore do not need to allow outbound connections to this port
through the firewall between the VCS Control and VCS Expressway.
Configuring TURN ports
The VCS Expressway can be enabled to provide TURN services (Traversal Using Relays around NAT)
which can be used by ICE-enabled SIP endpoints.
The ports used by these services are configurable via Configuration > Traversal > TURN.
The ICE clients on each of the SIP endpoints must be able to discover these ports, either by using SRV
records in DNS or by direct configuration.
Configuring ports for connections out to the public internet
In situations where the VCS Expressway is attempting to connect to an endpoint on the public internet, you
will not know the exact ports on the endpoint to which the connection will be made. This is because the ports
to be used are determined by the endpoint and advised to the VCS Expressway only after the server has
located the endpoint on the public internet. This may cause problems if your VCS Expressway is located
within a DMZ (where there is a firewall between the VCS Expressway and the public internet) as you will not
be able to specify in advance any rules that will allow you to connect out to the endpoint’s ports.
You can however specify the ports on the VCS Expressway that are used for calls to and from endpoints on
the public internet so that your firewall administrator can allow connections via these ports. The ports that
can be configured for this purpose are:
Table 2: Port connections out to the public internet
H.323SIPTURN
TCP/1720: signaling
UDP/1719: signaling
UDP/36000-59999: media*
TCP/15000-19999: signaling
TCP/5061: signaling
UDP/5060 (default): signaling
UDP/36000-59999: media*
TCP: a temporary port in the range
25000-29999 is allocated
UDP/3478 (default): TURN services
**
UDP/24000-29999 (default range):
media **
* The default media port range of 36000 to 59999 applies to new installations of X8.1 or later. The first 2 ports
in the range are used for multiplexed traffic only (with Large VM deployments the first 12 ports in the range –
36000 to 36011 – are used). The previous default range of 50000 - 54999 still applies to earlier releases that
have upgraded to X8.1.
** On Large VM server deployments you can configure a range of TURN request listening ports. The default
range is 3478 – 3483. The default TURN relay media port range of 24000 – 29999 applies to new installations
of X8.1 or later. The previous default range of 60000 – 61799 still applies to earlier releases that have
upgraded to X8.1.
The VCS Expressway allows only authenticated client systems to use it as a traversal server.
Upon receiving the initial connection request from the traversal client, the VCS Expressway asks the client
to authenticate itself by providing its authentication credentials. The VCS Expressway then looks up the
client’s credentials in its own authentication database. If a match is found, the VCS Expressway accepts the
request from the client.
The settings used for authentication depend on the type of traversal client:
Traversal clientVCS Expressway traversal server
VCS Control (or VCS Expressway)
The VCS client provides its Username and
Password. These are set on the traversal client
zone by using Configuration > Zones > Zones >
Edit zone, in the Connection credentials
section.
Endpoint
The endpoint client provides its Authentication
ID and Authentication Password.
The traversal server zone for the VCS client must be
configured with the client's authentication Username. This is
set on the VCS Expressway by using Configuration > Zones
> Zones > Edit zone, in the Connection credentials section.
There must also be an entry in the VCS Expressway’s
authentication database with the corresponding client
username and password.
There must be an entry in the VCS Expressway’s
authentication database with the corresponding client
username and password.
Note that all VCS traversal clients must authenticate with the VCS Expressway, even if the VCS
Expressway is not using device authentication for endpoint clients.
Authentication and NTP
All VCS traversal clients that support H.323 must authenticate with the VCS Expressway. The
authentication process makes use of timestamps and requires that each system uses an accurate system
time. The system time on a VCS is provided by a remote NTP server. Therefore, for firewall traversal to
work, all systems involved must be configured with details of an NTP server.
Configuring Expressway and traversal endpoint communications
Configuring Expressway and traversal endpoint
communications
Traversal-enabled H.323 endpoints can register directly with the VCS Expressway and use it for firewall
traversal.
The Locally registered endpoints page (Configuration > Traversal > Locally registered endpoints)
allows you to configure the way in which the VCS Expressway and traversal-enabled endpoints
communicate.
The options available are:
FieldDescription
H.323 Assent
mode
H.460.18 mode Determines whether or not H.323 calls using H.460.18/19 mode for firewall traversal are
H.460.19
demux mode
H.323
preference
UDP probe
retry interval
UDP probe
retry count
UDP probe
keep alive
interval
TCP probe
retry interval
TCP probe
retry count
Determines whether or not H.323 calls using Assent mode for firewall traversal are allowed.
allowed.
Determines whether the VCS Expressway operates in demultiplexing mode for calls from
locally registered endpoints.
On: uses the media demultiplexing ports for all calls.
Off: each call uses a separate pair of ports for media.
Determines which protocol the VCS Expressway uses if an endpoint supports both Assent and
H.460.18.
The frequency (in seconds) with which locally registered endpoints send a UDP probe to the
VCS Expressway.
The number of times locally registered endpoints attempt to send a UDP probe to the VCS
Expressway.
The interval (in seconds) with which locally registered endpoints send a UDP probe to the VCS
Expressway after a call is established, in order to keep the firewall’s NAT bindings open.
The frequency (in seconds) with which locally registered endpoints send a TCP probe to the
VCS Expressway.
The number of times locally registered endpoints attempt to send a TCP probe to the VCS
Expressway.
The interval (in seconds) with which locally registered endpoints send a TCP probe to the VCS
Expressway after a call is established, in order to keep the firewall’s NAT bindings open.
Page 63
Firewalltraversal
About ICE and TURN services
About ICE and TURN services
About ICE
ICE (Interactive Connectivity Establishment) provides a mechanism for SIP client NAT traversal. ICE is not
a protocol, but a framework which pulls together a number of different techniques such as TURN and STUN.
It allows endpoints (clients) residing behind NAT devices to discover paths through which they can pass
media, verify peer-to-peer connectivity via each of these paths and then select the optimum media
connection path. The available paths typically depend on any inbound and outbound connection restrictions
that have been configured on the NAT device. Such behavior is described in RFC 4787.
An example usage of ICE is two home workers communicating via the internet. If the two endpoints can
communicate via ICE the VCS Expressway may (depending on how the NAT devices are configured) only
need to take the signaling and not take the media (and is therefore a non-traversal call). If the initiating ICE
client attempts to call a non-ICE client, the call set-up process reverts to a conventional SIP call requiring
NAT traversal via media latching where the VCS also takes the media and thus requires a traversal license.
For more information about ICE, see RFC 5245.
About TURN
TURN (Traversal Using Relays around NAT) services are relay extensions to the STUN network protocol
that enable a SIP or H.323 client to communicate via UDP or TCP from behind a NAT device. Currently the
VCS supports TURN over UDP only.
For more information about TURN see RFC 5766, and for detailed information about the base STUN
protocol, see RFC 5389.
Each ICE client requests the TURN server to allocate relays for the media components of the call. A relay is
required for each component in the media stream between each client.
After the relays are allocated, each ICE client has 3 potential connection paths (addresses) through which it
can send and receive media:
n its host address which is behind the NAT device (and thus not reachable from endpoints on the other side
of the NAT)
n its publicly-accessible address on the NAT device
n a relay address on the TURN server
The endpoints then decide, by performing connectivity checks through ICE, how they are going to
communicate. Depending upon how the NAT devices are configured, the endpoints may be able to
communicate between their public-facing addresses on the NAT devices or they may have to relay the media
via the TURN server. If both endpoints are behind the same NAT device they can send media directly
between themselves using their internal host addresses.
After the media route has been selected, the TURN relay allocations are released if the chosen connection
paths do not involve routing via the TURN server. Note that the signaling always goes via the VCS,
regardless of the final media communication path chosen by the endpoints.
n A VCS appliance (or equivalent VM) supports up to 1800 relay allocations. This is typically enough to
support 100 calls but does depend on the network topology and the number of media stream components
used for the call (for example, some calls may use Duo Video, or other calls might be audio only). A Large
VM supports up to 6000 relays, spread evenly across 6 ports where each port is limited to handling 1000
relays.
n Clustered VCSs: if the requested TURN server's relays are fully allocated the server will respond to the
requesting client with the details of an alternative server in the cluster (the TURN server currently with the
most available resources).
n The VCS's TURN services are supported over single and dual network interfaces (via the Advanced
Networking option). For dual network interfaces, the TURN server listens on both interfaces but relays are
allocated only on the VCS's externally facing LAN interface.
n If static NAT is enabled on the VCS Expressway, the TURN relay candidate address that is offered will be
the internal/private IP address of the VCS Expressway, not its static NAT address. Thus ICE clients in
the public internet may not be able to route media via the TURN server.
n Microsoft ICE (which is not standards-based) is not supported by the VCS Expressway's TURN server; to
enable communications between the VCS and Microsoft Lync clients that are registered through a
Microsoft Edge Server you need to use the B2BUA for Microsoft Lync.
n The TURN server does not support bandwidth requests. Traversal zone bandwidth limits do not apply.
Configuring TURN services
TURN relay services are only available on the VCS Expressway. To use TURN services you need the
TURN Relay option key (this controls the number of TURN relays that can be simultaneously allocated by
the TURN server).
The TURN page (Configuration > Traversal > TURN) is used to configure the VCS Expressway's TURN
settings. If you are configuring your VCS Expressway for delegated credential checking you can also
determine, via the Authentication realm, the traversal zone through which credential checking of TURN
server requests is delegated.
The configurable options are:
FieldDescriptionUsage tips
TURN
services
TURN
requests port
Determines whether the VCS offers TURN
services to traversal clients.
The listening port for TURN requests. The default
is 3478.
On Large VM server deployments you can
configure a range of TURN request listening
ports. The default range is 3478 – 3483.
To allow endpoints such as Jabber Video
to discover TURN services, you need to set
up a DNS SRV record for _turn._udp.
(either for the single port, or range of ports
as appropriate).
If TURN services are already enabled,
any changes to the port numbers do not
come into effect until the TURN services
are restarted.
Controls whether the credential checking of
TURN server requests is delegated, via a
traversal zone, to another VCS. The associated
Authentication realm determines which traversal
zone is used.
Off: use the relevant credential checking
mechanisms (local database or H.350 directory
via LDAP) on the VCS performing the
authentication challenge.
On: delegate the credential checking to a
traversal client.
The default is Off.
This is the realm sent by the server in its
authentication challenges.
n When Delegated credential checking is Off,
this is a free-form text field.
n When Delegated credential checking is On,
you choose from the set of configured SIP
domains. The chosen domain also determines
the traversal zone through which credential
checking is delegated.
The lower and upper port in the range used for
the allocation of TURN relays.
The default TURN relay media port range of
24000 – 29999 applies to new installations of
X8.1 or later. The previous default range of 60000
– 61799 still applies to earlier releases that have
upgraded to X8.1.
See delegated credential checking for more
information.
When Delegated credential checking is
Off, ensure that the client's credentials are
stored in the relevant device authentication
database.
TURN relay status information
The TURN relays page lists all the currently active TURN relays on the VCS. You can also review further
details of each TURN relay including permissions, channel bindings and counters.
This section describes how to configure the VCS Control and VCS Expressway for Unified Communications
functionality, a core part of the Cisco Collaboration Edge Architecture:
Mobile and remote access67
Configuring mobile and remote access on VCS69
Cisco Unified Communications mobile and remote access is a core part of the Cisco Collaboration Edge
Architecture. It allows endpoints such as Cisco Jabber to have their registration, call control, provisioning,
messaging and presence services provided by Cisco Unified Communications Manager (Unified CM) when
the endpoint is not within the enterprise network. The VCS provides secure firewall traversal and line-side
support for Unified CM registrations.
The overall solution provides:
n Off-premises access: a consistent experience outside the network for Jabber and EX/MX/SX Series
clients
n Security: secure business-to-business communications
n Cloud services: enterprise grade flexibility and scalable solutions providing rich WebEx integration and
Service Provider offerings
n Gateway and interoperability services: media and signaling normalization, and support for non-standard
endpoints
Figure 3: Unified Communications: mobile and remote access
Note that third-party SIP or H.323 devices can register to the VCS Control and, if necessary, interoperate
with Unified CM-registered devices over a SIP trunk.
Figure 4: Typical call flow: signaling and media paths
n Unified CM provides call control for both mobile and on-premises endpoints.
n Signaling traverses the Expressway solution between the mobile endpoint and Unified CM.
n Media traverses the Expressway solution and is relayed between endpoints directly; all media is encrypted
between the VCS Control and the mobile endpoint.
Jabber client connectivity without VPN
The mobile and remote access solution supports a hybrid on-premises and cloud-based service model,
providing a consistent experience inside and outside the enterprise. It provides a secure connection for
Jabber application traffic without having to connect to the corporate network over a VPN. It is a device and
operating system agnostic solution for Cisco Unified Client Services Framework clients on Windows, Mac,
iOS and Android platforms.
It allows Jabber clients that are outside the enterprise to:
n use instant messaging and presence services
n make voice and video calls
n search the corporate directory
n share content
n launch a web conference
n access visual voicemail
Note that Jabber Web and Cisco Jabber Video for TelePresence (Jabber Video) are not supported.
This section describes the steps required to enable and configure mobile and remote access features on
VCS Control and VCS Expressway, and how to discover the Unified CM servers and IM&P servers used by
the service.
Note that this deployment requires valid certificates on both VCS Control and VCS Expressway. If XMPP
federation is to be used, the IM&P servers need to be discovered on the VCS Control for all the relevant
information to be available when generating certificate signing requests.
Setting up the VCS Control
This section describes the configuration steps required on the VCS Control.
Configuring DNS and NTP settings
Check and configure the basic system settings on VCS:
1. Ensure that System host name and Domain name are specified (System > DNS).
2. Ensure that local DNS servers are specified (System > DNS).
3. Ensure that all VCS systems are synchronized to a reliable NTP service (System > Time). Use an Authentication method in accordance with your local policy.
If you have a cluster of VCSs you must do this for every peer.
Configuring the VCS Control for Unified Communications
Enabling mobile and remote access
To enable mobile and remote access functionality:
1. Go to Configuration > Unified Communications > Configuration.
2. Set Unified Communications mode to Mobile and remote access.
3. Click Save.
Note that you must select Mobile and remote access before you can configure the relevant domains and
traversal zones.
Configuring the domains to route to Unified CM
You must configure the domains for which registration, call control, provisioning, messaging and presence
services are to be routed to Unified CM.
1. On VCS Control, go to Configuration > Domains.
2. Select the domains (or create a new domain, if not already configured) for which services are to be routed
to Unified CM.
3. For each domain, turn On the services for that domain that VCS is to support. The available services are:
l SIP registrations and provisioning on VCS: the VCS is authoritative for this SIP domain. The VCS
acts as a SIP registrar and Presence Server for the domain, and accepts registration requests for any
SIP endpoints attempting to register with an alias that includes this domain. The default is On.
l SIP registrations and provisioning on Unified CM: endpoint registration, call control and
provisioning for this SIP domain is serviced by Unified CM. The VCS acts as a Unified
Communications gateway to provide secure firewall traversal and line-side support for Unified CM
registrations. The default is Off.
l IM and Presence services on Unified CM: instant messaging and presence services for this SIP
domain are provided by the Unified CM IM and Presence service. The default is Off.
Turn On all of the applicable services for each domain. For example, the same domain may be used by
endpoints such as Jabber or EX Series devices that require line-side Unified Communications support,
and by other endpoints such as third-party SIP or H.323 devices that require VCS support. (In this
scenario, the signaling messages sent from the endpoint indicate whether line-side unified
communications or VCS support is required.)
Discovering IM&P and Unified CM servers
The VCS Control must be configured with the address details of the IM&P servers and Unified CM servers
that are to provide registration, call control, provisioning, messaging and presence services.
Note that IM&P server configuration is not required in the hybrid deployment model.
Uploading the IM&P / Unified CM tomcat certificate to the VCS Control trusted CA list
If you intend to have TLS verify mode set to On (the default and recommended setting) when discovering
the IM&P and Unified CM servers, the VCS Control must be configured to trust the tomcat certificate
presented by those IM&P and Unified CM servers.
1. Determine the relevant CA certificates to upload:
l If the servers are using self-signed certificates, the VCS Control's trusted CA list must include a copy
of the tomcat certificate from every IM&P / Unified CM server.
l If the servers are using CA-signed certificates, the VCS Control's trusted CA list must include the root
CA of the issuer of the tomcat certificates.
2. Upload the trusted Certificate Authority (CA) certificates to the VCS Control (Maintenance > Security
certificates > Trusted CA certificate).
3. Restart the VCS Control for the new trusted CA certificates to take effect (Maintenance > Restart
options).
Configuring IM&P servers
To configure the IM&P servers used for remote access:
1. On VCS Control, go to Configuration > Unified Communications > IM and Presence servers.
The resulting page displays any existing servers that have been configured.
2. Add the details of an IM&P publisher:
a. Click New.
b. Enter the IM and Presence publisher address and the Username and Password credentials
required to access the server. The address can be specified as an FQDN or as an IP address; we
recommend using FQDNs when TLS verify mode is On.
Note that these credentials are stored permanently in the VCS database. The IM&P user must have
the Standard AXL API Access role.
c. We recommend leaving TLS verify mode set to On to ensure VCS verifies the tomcat certificate
presented by the IM&P server for XMPP-related communications.
o
If the IM&P server is using self-signed certificates, the VCS Control's trusted CA list must include a
copy of the tomcat certificate from every IM&P server.
If the IM&P server is using CA-signed certificates, the VCS Control's trusted CA list must include
the root CA of the issuer of the tomcat certificate.
d. Click Add address.
The system then attempts to contact the publisher and retrieve details of its associated nodes.
Note that the status of the IM&P server will show as Inactive until a valid traversal zone connection
between the VCS Control and the VCS Expressway has been established (this is configured later in
this process).
3. Repeat for every IM&P cluster.
After configuring multiple publisher addresses, you can click Refresh servers to refresh the details of the
nodes associated with selected addresses.
Configuring Unified CM servers
To configure the Unified CM servers used for remote access:
1. On VCS Control, go to Configuration > Unified Communications > Unified CM servers.
The resulting page displays any existing servers that have been configured.
2. Add the details of a Unified CM publisher:
a. Click New.
b. Enter the Unified CM publisher address and the Username and Password credentials of an
application user account that can access the server. The address can be specified as an FQDN or as
an IP address; we recommend using FQDNs when TLS verify mode is On.
Note that these credentials are stored permanently in the VCS database. The Unified CM user must
have the Standard AXL API Access role.
c. We recommend leaving TLS verify mode set to On to ensure VCS verifies the certificates presented
by the Unified CM server (its tomcat certificate for AXL and UDS queries, and its CallManager
certificate for subsequent SIP traffic).
o
If the Unified CM server is using self-signed certificates, the VCS Control's trusted CA list must
include a copy of the tomcat certificate and the CallManager certificate from every Unified CM
server.
o
If the Unified CM server is using CA-signed certificates, the VCS Control's trusted CA list must
include the root CA of the issuer of the tomcat certificate and the CallManager certificate.
d. Click Add address.
The system then attempts to contact the publisher and retrieve details of its associated nodes.
3. Repeat for every Unified CM cluster.
After configuring multiple publisher addresses, you can click Refresh servers to refresh the details of the
nodes associated with selected addresses.
Automatically generated zones and search rules
VCS Control automatically generates non-configurable neighbor zones between itself and each discovered
Unified CM node. A TCP zone is always created, and a TLS zone is created also if the Unified CM node is
configured with a Cluster Security Mode (System > Enterprise Parameters > Security Parameters) of 1 (Mixed) (so that it can support devices provisioned with secure profiles). The TLS zone is configured with its
TLS verify mode set to On if the Unified CM discovery had TLS verify mode enabled. This means that the
VCS Control will verify the CallManager certificate for subsequent SIP communications. Each zone is
created with a name in the format 'CEtcp-<node name>' or 'CEtls-<node name>'.
A non-configurable search rule, following the same naming convention, is also created automatically for each
zone. The rules are created with a priority of 45. If the Unified CM node that is targeted by the search rule has
a long name, the search rule will use a regex for its address pattern match.
Note that load balancing is managed by Unified CM when it passes routing information back to the registering
endpoints.
Setting up the VCS Expressway
This section describes the configuration steps required on the VCS Expressway.
Configuring DNS and NTP settings
Check and configure the basic system settings on VCS:
1. Ensure that System host name and Domain name are specified (System > DNS).
2. Ensure that public DNS servers are specified (System > DNS).
3. Ensure that all VCS systems are synchronized to a reliable NTP service (System > Time). Use an
Authentication method in accordance with your local policy.
If you have a cluster of VCSs you must do this for every peer.
Configuring the VCS Expressway for Unified Communications
To enable mobile and remote access functionality:
1. Go to Configuration > Unified Communications > Configuration.
2. Set Unified Communications mode to Mobile and remote access.
3. Click Save.
Ensuring that TURN services are disabled on VCS Expressway
You must ensure that TURN services are disabled on the VCS Expressway used for mobile and remote
access.
1. Go to Configuration > Traversal > TURN.
2. Ensure that TURN services are Off.
Setting up VCS security certificates
This deployment requires secure communications between the VCS Control and the VCS Expressway, and
between the VCS Expressway and endpoints located outside the enterprise. Therefore, you must:
1. Install a suitable server certificate on both the VCS Control and the VCS Expressway. The certificate on
each VCS has different requirements for what needs to be included as subject alternate names as
described in VCS Control / VCS Expressway server certificate requirements below.
l The certificate must include the Client Authentication extension. (The system will not allow you to
upload a server certificate without this extension when mobile and remote access is enabled.)
l The VCS includes a built-in mechanism to generate a certificate signing request (CSR) and is the
recommended method for generating a CSR. This CSR includes the client authentication request and
can be used to help ensure each VCS certificate includes the correct subject alternate names for
Unified Communications and to establish a secure traversal zone. Ensure that the CA that signs the
request does not strip out the client authentication extension.
l To generate a CSR and /or to upload a server certificate to the VCS, go to Maintenance > Security
certificates > Server certificate. You must restart the VCS for the new server certificate to take effect.
2. Install on both VCSs the trusted Certificate Authority (CA) certificates of the authority that signed the
VCS's server certificates, and, if appropriate, the authority that signed the endpoints' certificates. The
VCS Control must also trust the Unified CM and IM&P tomcat certificate.
To upload trusted Certificate Authority (CA) certificates to the VCS, go to Maintenance > Security
certificates > Trusted CA certificate. You must restart the VCS for the new trusted CA certificate to
take effect.
VCS Control server certificate requirements
The VCS Control server certificate needs to include the following elements in its list of subject alternate
names:
n The Chat Node Aliases that are configured on the IM and Presence servers. These are required only for
Unified Communications XMPP federation deployments that intend to use both TLS and group chat. (Note
that Unified Communications XMPP federation will be supported in a future VCS release).
The VCS Control automatically includes the chat node aliases in the CSR, providing it has discovered a
set of IM&P servers.
n The names, in FQDN format, of all of the Phone Security Profiles in Unified CM that are configured for
encrypted TLS and are used for devices requiring remote access. This ensures that Unified CM can
communicate with VCS Control via a TLS connection when it is forwarding messages from devices that
are configured with those security profiles.
A new certificate may need to be produced if chat node aliases are added or renamed, such as when an IM
and Presence node is added or renamed, or if new TLS phone security profiles are added. You must restart
the VCS Control for any new uploaded server certificate to take effect.
VCS Expressway server certificate requirements
The VCS Expressway server certificate needs to include the following elements in its list of subject alternate
names:
n All of the domains which have been configured for Unified Communications. They are required for secure
communications between endpoint devices and VCS Expressway.
This should include the email address domain entered by users of the client application (e.g. Jabber) and
any presence domains (as configured on the VCS Control) if they are different. There is no need to include
the domains in DNS-SEC deployments.
n The same set of Chat Node Aliases as entered on the VCS Control's certificate, if you are deploying
federated XMPP.
Note that the list of required aliases can be viewed (and copy-pasted) from the equivalent Generate CSR
page on the VCS Control.
A new certificate must be produced if new presence domains or chat node aliases are added to the system.
You must restart the VCS Expressway for any new uploaded server certificate to take effect.
See Certificate Creation and Use With VCS Deployment Guide for full information about how to create and
upload the VCS’s server certificate and how to upload a list of trusted certificate authorities.
To support Unified Communications features such as mobile and remote access, there must be a secure
traversal zone connection between the VCS Control and the VCS Expressway:
n The traversal client zone and the traversal server zone must be configured to use SIP TLS with TLS verify
mode set to On, and Media encryption mode must be Force encrypted.
n Both VCSs must trust each other's server certificate. As each VCS acts both as a client and as a server
you must ensure that each VCS’s certificate is valid both as a client and as a server.
n If a H.323 or a non-encrypted connection is required, a separate pair of traversal zones must be configured.
To set up a secure traversal zone, configure your VCS Control and VCS Expressway as follows:
1. Go to Configuration > Zones > Zones.
2. Click New.
3. Configure the fields as follows (leave all other fields with default values):
VCS ControlVCS Expressway
Name"Traversal zone" for example"Traversal zone" for example
TypeTraversal clientTraversal server
Username"exampleauth" for example"exampleauth" for example
Password"ex4mpl3.c0m" for exampleClick Add/Edit local authentication database,
then in the popup dialog click New and enter
the Name ("exampleauth") and Password
("ex4mpl3.c0m") and click Create credential.
H.323 ModeOffOff
SIP section
ModeOnOn
Port
TransportTLSTLS
Unified
Communications
services
TLS verify modeOnOn
TLS verify subject
name
70017001
YesYes
Not applicableEnter the name to look for in the traversal
client's certificate (must be in either the Subject
Common Name or the Subject Alternative
Name attributes). If there is a cluster of traversal
clients, specify the cluster name here and
ensure that it is included in each client's
certificate.
Peer 2...6 addressEnter the FQDNs of additional peers
Do not check credentialsDo not check credentials
Expressway.
Note that if you use an IP address
(not recommended), that address
must be present in the VCS
Expressway server certificate.
if it is a cluster of VCS Expressways.
Not applicable
Not applicable
Note that you should enable Unified Communications services on one traversal zone only per VCS.
4. Click Create zone.
Checking the status of Unified Communications services
You can check the status of the unified communications services on both VCS Control and VCS
Expressway.
1. Go to Status > Unified Communications.
2. Review the list and status of domains, zones and (VCS Control only) Unified CM and IM&P servers.
Any configuration errors will be listed along with links to the relevant configuration page from where you
can address the issue.
Additional configuration
Configuring the HTTP server allow list (whitelist) on VCS Control
Jabber client endpoints may need to access additional web services inside the enterprise. This requires an
"allow list" of servers to be configured to which the VCS will grant access for HTTP traffic originating from
outside the enterprise.
The features and services that may be required, and would need whitelisting, include:
The IP addresses of all discovered Unified CM nodes (that are running the CallManager or TFTP service) and
IM&P nodes are added automatically to the allow list and cannot be deleted . Note, however, that they are not
displayed on the HTTP server allow list page.
To configure the set of addresses to which HTTP access will be allowed:
1. On VCS Control, go to Configuration > Unified Communications > Configuration.
2. Click HTTP server allow list.
3. Configure the hostnames or IP addresses of an HTTP server that a Jabber client located outside of the
enterprise is allowed to access.
Access is granted if the server portion of the client-supplied URI matches one of the names entered here,
or if it resolves via DNS lookup to a specified IP address.
The VCS supports the H.323 protocol: it is an H.323 gatekeeper.
It can also provide interworking between H.323 and SIP, translating between the two protocols to enable
endpoints that only support one of these protocols to call each other. In order to support H.323, the H.323
mode must be enabled.
Using the VCS as an H.323 gatekeeper
As an H.323 gatekeeper, the VCS accepts registrations from H.323 endpoints and provides call control
functions such as address translation and admission control.
To enable the VCS as an H.323 gatekeeper, you must ensure that H.323 mode is set to On (Configuration
> Protocols > H.323).
Note that this is the default setting, so the VCS will work as an H.323 gatekeeper "out of the box", without
any other special configuration.
H.323 endpoint registration
H.323 endpoints in your network must register with the VCS in order to use it as their gatekeeper.
There are two ways an H.323 endpoint can locate a VCS with which to register: manually or automatically.
The option is configured on the endpoint itself under the Gatekeeper Discovery setting (consult your endpoint
manual for how to access this setting).
n If the mode is set to automatic, the endpoint will try to register with any VCS it can find. It does this by
sending out a Gatekeeper Discovery Request, to which eligible VCSs will respond.
n If the mode is set to manual, you must specify the IP address of the VCS with which you want your
endpoint to register, and the endpoint will attempt to register with that VCS only.
Preventing automatic H.323 registrations
You can prevent H.323 endpoints being able to register automatically with the VCS by disabling Auto
Discovery on the VCS (Configuration > Protocols > H.323).
The H.323 page (Configuration > Protocols > H.323) is used to configure the H.323 settings on the VCS,
including:
n whether H.323 is enabled or not
n H.323 gatekeeper settings
n whether to insert the prefix of the ISDN gateway into the caller's E.164 number presented on the
destination endpoint
The configurable options are:
FieldDescriptionUsage tips
H.323 mode Enables or disables H.323 on
the VCS. H.323 support is On
by default.
Registration
UDP port
Call
signaling
TCP port
Call
signaling
port range
start and
end
Registration
conflict
mode
The listening port for H.323
UDP registrations. Default is
1719.
The listening port for H.323 call
signaling. Default is 1720.
Specifies the lower port in the
range used by H.323 calls after
they are established. Default is
15000.
Determines how the system
behaves if an endpoint
attempts to register an alias
currently registered from
another IP address.
Reject: denies the new
registration. This is the default.
Overwrite: deletes the original
registration and replaces it
with the new registration.
The default VCS configuration uses standard port numbers so
you can use H.323 services out of the box without having to first
set these up.
The call signaling port range must be great enough to support all
the required concurrent calls.
An H.323 endpoint may attempt to register with the VCS using
an alias that has already been registered on the VCS from
another IP address. The reasons for this could include:
n Two endpoints at different IP addresses are attempting to
register using the same alias.
n A single endpoint has previously registered using a particular
alias. The IP address allocated to the endpoint then changes,
and the endpoint attempts to re-register using the same alias.
Reject is useful if your priority is to prevent two users registering
with the same alias. Overwrite is useful if your network is such
that endpoints are often allocated new IP addresses, because it
will prevent unwanted registration rejections.
Note that in a cluster a registration conflict is only detected if the
registration requests are received by the same peer.
Time to liveThe interval (in seconds) at
which an H.323 endpoint must
re-register with the VCS in
order to confirm that it is still
functioning. Default is 1800.
Some older endpoints do not support the ability to periodically reregister with the system. In this case, and in any other situation
where the system has not had a confirmation from the endpoint
within the specified period, it will send an IRQ to the endpoint to
verify that it is still functioning.
Page 80
Protocols
FieldDescriptionUsage tips
Configuring H.323
Call time to
live
The interval (in seconds) at
which the VCS polls the
endpoints in a call to verify that
they are still in the call. Default
is 120.
Auto
discover
Determines whether it will
respond to Gatekeeper
Discovery Requests sent out by
endpoints. The default is On.
Caller IDSpecifies whether the prefix of
the ISDN gateway is inserted
into the caller's E.164 number
presented on the destination
endpoint.
If the endpoint does not respond, the call will be disconnected.
The system polls endpoints in a call regardless of whether the
call type is traversal or non-traversal.
To prevent H.323 endpoints being able to register automatically
with the VCS, set Auto discover to Off. This means that
endpoints can only register with the VCS if their Gatekeeper Discovery setting is Manual and they have been configured with
the VCS’s IP address.
Including the prefix allows the recipient to directly return the call.
The VCS supports the SIP protocol. It can act as a SIP registrar, SIP proxy and as a SIP Presence Server.
The VCS can provide interworking between SIP and H.323, translating between the two protocols to enable
endpoints that only support one of these protocols to call each other.
To support SIP:
n SIP mode must be enabled.
n At least one of the SIP transport protocols (UDP, TCP or TLS) must be active. Note that the use of UDP is
not recommended for video as SIP message sizes are frequently larger than a single UDP packet.
VCS as a SIP registrar
For a SIP endpoint to be contactable via its alias, it must register its Address of Record (AOR) and its
location with a SIP registrar. The SIP registrar maintains a record of the endpoint’s details against the
endpoint’s AOR. The AOR is the alias through which the endpoint can be contacted; it is a SIP URI and
always takes the form username@domain.
When a call is received for that AOR, the SIP registrar refers to the record to find its corresponding endpoint.
(Note that the same AOR can be used by more than one SIP endpoint at the same time, although to ensure
that all endpoints are found they must all register with the same VCS or VCS cluster.)
A SIP registrar only accepts registrations for domains for which it is authoritative. The VCS can act as a SIP
registrar for up to 200 domains. To make the VCS act as a SIP registrar, you must configure it with the SIP
domains for which it will be authoritative . It will then handle registration requests for any endpoints
attempting to register against that domain. Note that the VCS will also accept registration requests where the
domain portion of the AOR is either the FQDN or the IP address of the VCS. Whether or not the VCS accepts
a registration request depends on its registration control settings.
In a Unified Communications deployment, endpoint registration for SIP devices may be provided by Unified
CM. In this scenario, the VCS provides secure firewall traversal and line-side support for Unified CM
registrations. When configuring domains, you must select the system - either Unified CM or VCS to provide
registration services for each domain.
SIP endpoint registration
There are two ways a SIP endpoint can locate a registrar with which to register: manually or automatically.
The option is configured on the endpoint itself under the SIP Server Discovery option (consult your endpoint
user guide for how to access this setting; it may also be referred to as Proxy Discovery).
n If the Server Discovery mode is set to automatic, the endpoint will send a REGISTER message to the
SIP server that is authoritative for the domain with which the endpoint is attempting to register. For
example, if an endpoint is attempting to register with a URI of john.smith@example.com, the request
will be sent to the registrar authoritative for the domain example.com. The endpoint can discover the
appropriate server through a variety of methods including DHCP, DNS or provisioning, depending upon
how the video communications network has been implemented.
n If the Server Discovery mode is set to manual, the user must specify the IP address or FQDN of the
registrar (VCS or VCS cluster) with which they want to register, and the endpoint will attempt to register
with that registrar only.
n If an endpoint is registered to the VCS, the VCS will be able to forward inbound calls to that endpoint.
n If the VCS is not configured with any SIP domains, the VCS will act as a SIP server. It may proxy
registration requests to another registrar, depending upon the SIP registration proxy mode setting.
Registration refresh intervals
Depending on the typical level of active registrations on your system, you may want to configure the
Standard registration refresh strategy to Variable and set the refresh intervals as follows:
Active registrationsMinimum refresh intervalMaximum refresh interval
1–1004560
101–500150200
501–1000300400
1000–1500450800
1500+7501000
If you want to ensure registration resiliency, use SIP outbound registrations as described below.
SIP registration resiliency
The VCS supports multiple client-initiated connections (also referred to as "SIP Outbound") as outlined in
RFC 5626.
This allows SIP endpoints that support RFC 5626 to be simultaneously registered to multiple VCS cluster
peers. This provides extra resiliency: if the endpoint loses its connection to one cluster peer it will still be able
to receive calls via one of its other registration connections.
VCS as a SIP proxy server
The VCS acts as a SIP proxy server when SIP mode is enabled. The role of a proxy server is to forward
requests (such as REGISTER and INVITE) from endpoints or other proxy servers on to further proxy servers
or to the destination endpoint.
The VCS's behavior as a SIP proxy server is determined by:
n the SIP registration proxy mode setting
n the presence of Route Set information in the request header
n whether the proxy server from which the request was received is a neighbor of the VCS
A Route Set specifies the path to take when requests are proxied between an endpoint and its registrar. For
example, when a REGISTER request is proxied by the VCS, it adds a path header component to the request.
This signals that calls to that endpoint should be routed through the VCS. This is usually required in
situations where firewalls exist and the signaling must follow a specified path to successfully traverse the
firewall. For more information about path headers, see RFC 3327.
When the VCS proxies a request that contains Route Set information, it forwards it directly to the URI
specified in the path. Any call processing rules configured on the VCS are bypassed. This may present a
security risk if the information in the Route Set cannot be trusted. For this reason, you can configure how the
VCS proxies requests that contain Route Sets by setting the SIP registration proxy mode as follows:
n Off: requests containing Route Sets are rejected. This setting provides the highest level of security.
n Proxy to known only: requests containing Route Sets are proxied only if the request was received from a
known zone.
n Proxy to any: requests containing Route Sets are always proxied.
In all cases, requests that do not have Route Sets are proxied as normal in accordance with existing call
processing rules. This setting only applies to dialog-forming requests, such as INVITE and SUBSCRIBE.
Other requests, such as NOTIFY, are always proxied regardless of this setting.
Proxying registration requests
If the VCS receives a registration request for a domain for which it is not acting as a Registrar (the VCS does
not have that SIP domain configured), then the VCS may proxy the registration request onwards. This
depends on the SIP registration proxy mode setting, as follows:
n Off: the VCS does not proxy any registration requests. They are rejected with a “403 Forbidden” message.
n Proxy to known only: the VCS proxies the request in accordance with existing call processing rules, but
only to known neighbor, traversal client and traversal server zones.
n Proxy to any: this is the same as Proxy to known only but for all zone types i.e. it also includes ENUM and
DNS zones.
If your network is set up to proxy registration requests, we recommend that you disable GRUU on the VCS
systems that are acting as a Registrar for those proxied requests. If GRUU is left enabled, Presence may not
work properly for the proxy registered endpoints.
GRUU can only be disabled via the CLI (xConfiguration SIP GRUU Mode: Off).
Accepting proxied registration requests
If the VCS receives a proxied registration request, in addition to the VCS's standard registration controls, you
can also control whether the VCS accepts the registration depending upon the zone through which the
request was received. You do this through the Accept proxied registrations setting when configuring a
zone.
Proxied registrations are classified as belonging to the zone they were last proxied from. This is different from
non-proxied registration requests which are assigned to a subzone within the VCS.
VCS as a SIP Presence Server
The VCS supports the SIP-based SIMPLE protocol. It can act as a Presence Server and Presence User
Agent for any of the SIP domains for which it is authoritative. For full information on how to enable and use
the VCS as a SIP Presence server, see the Presence section.
The SIP page (Configuration > Protocols > SIP) is used to configure the SIP settings on the VCS,
including:
n SIP functionality and SIP-specific transport modes and ports
n certificate revocation checking modes for TLS connections
n registration controls for standard and outbound registrations
n authentication controls for delegated credential checking
SIP functionality and SIP-specific transport modes and ports
This section contains the basic settings for enabling SIP functionality and for configuring the various SIPspecific transport modes and ports. The configurable options are:
FieldDescriptionUsage tips
SIP modeEnables and disables SIP functionality (SIP registrar and
SIP proxy services) on the VCS. Default is On.
SIP protocols
and ports
TCP outbound
port start / end
Session
refresh
interval
Minimum
session
refresh
interval
The VCS supports SIP over UDP, TCP and TLS transport
protocols. Use the Mode and Port settings for each
protocol to configure whether or not incoming and
outgoing connections using that protocol are supported,
and if so, the ports on which the VCS listens for such
connections.
By default UDP is Off, and TCP and TLS are On. The
default ports are:
n UDP port: 5060
n TCP port: 5060
n TLS port: 5061
The range of ports the VCS uses when TCP and TLS
connections are established. The default range is 25000
to 29999.
The maximum time allowed between session refresh
requests for SIP calls. Default is 1800 seconds.
The minimum value the VCS will negotiate for the session
refresh interval for SIP calls. Default is 500 seconds.
This mode must be enabled to use
either the Presence Server or the
Presence User Agent.
At least one of the transport
protocols must be set to a Mode of On for SIP functionality to be
supported.
The range must be sufficient to
support all required concurrent
connections.
For further information see the
definition of Session-Expires in RFC
4028.
For further information see the
definition of Min-SE header in RFC
4028.
Certificate revocation checking modes
This section controls the certificate revocation checking modes for SIP TLS connections. The configurable
options are:
Use OCSPControls whether the Online Certificate Status Protocol
Use CRLsControls whether Certificate Revocation Lists (CRLs) are
Allow CRL
downloads
from CDPs
Fallback
behavior
Controls whether revocation checking is performed for
certificates exchanged during SIP TLS connection
establishment.
(OCSP) may be used to perform certificate revocation
checking.
used to perform certificate revocation checking.
Controls whether the download of CRLs from the CDP
URIs contained in X.509 certificates is allowed.
Controls the revocation checking behavior if the
revocation status cannot be established, for example if
the revocation source cannot be contacted.
Treat as revoked: treat the certificate as revoked (and
thus do not allow the TLS connection).
Treat as not revoked: treat the certificate as not revoked.
Default: Treat as not revoked
We recommend that revocation
checking is enabled.
To use OCSP, the X.509 certificate
to be checked must contain an
OCSP responder URI.
CRLs can be used if the certificate
does not support OCSP.
CRLs can be loaded manually onto
the VCS, downloaded
automatically from preconfigured
URIs (see Managing certificate
revocation lists (CRLs) [p.288]), or
downloaded automatically from a
CRL distribution point (CDP) URI
contained in the X.509 certificate.
Treat as not revoked ensures that
your system continues to operate in
a normal manner if the revocation
source cannot be contacted,
however it does potentially mean
that revoked certificates will be
accepted.
Registration controls
This section contains the registration controls for standard and outbound SIP registrations. The configurable
options are:
The method used to generate the SIP registration expiry
period (the period within which a SIP endpoint must reregister to prevent its registration expiring) for standard
registrations.
Maximum: uses the lesser of the configured Maximum
refresh value and the value requested in the registration.
Variable: generates a random value between the
configured Minimum refresh value and the lesser of the
configured Maximum refresh value and the value
requested in the registration.
The default is Maximum.
The minimum allowed value for a SIP registration refresh
period for standard registrations. Requests for a value
lower than this will result in the registration being rejected
with a 423 Interval Too Brief response. The default is 45
seconds.
The maximum allowed value for a SIP registration refresh
period for standard registrations. Requests for a value
greater than this will result in a lower value being returned
(calculated according to the Standard registration refresh strategy). The default is 60 seconds.
The Maximum setting uses the
requested value providing it is
within the specified maximum and
minimum ranges.
The Variable setting calculates a
random refresh period for each
registration (and re-registration)
request in an attempt to continually
spread the load. The VCS never
returns a value higher than what
was requested.
This applies only to endpoints
registered with the VCS. It does not
apply to endpoints whose
registrations are proxied through
the VCS.
See Registration refresh intervals
[p.82]
Outbound
registration
refresh
strategy
Outbound
registration
refresh
minimum
The method used to generate the SIP registration expiry
period for outbound registrations.
Maximum: uses the lesser of the configured Maximum
refresh value and the value requested in the registration.
Variable: generates a random value between the
configured Minimum refresh value and the lesser of the
configured Maximum refresh value and the value
requested in the registration.
The default is Variable.
The minimum allowed value for a SIP registration refresh
period for outbound registrations. Requests for a value
lower than this will result in the registration being rejected
with a 423 Interval Too Brief response. The default is 600
seconds.
These options work in the same
manner as for the Standard registration refresh strategy.
However, outbound registrations
allow a much higher maximum
value than standard registrations.
This is because standard
registrations use the re-registration
mechanism to keep their
connection to the server alive. With
outbound registrations the keepalive process is handled by a
separate, less resource-intensive
process, meaning that reregistrations (which are more
resource-intensive) can be less
frequent.
The maximum allowed value for a SIP registration refresh
period for an outbound registration. Requests for a value
greater than this will result in a lower value being returned
(calculated according to the Outbound registration refresh strategy). The default is 3600 seconds.
Specifies how proxied registrations and requests
containing Route Sets are handled when the VCS
receives a registration request for a domain for which it is
not acting as a Registrar.
Off: registration requests are not proxied (but are still
permitted locally if the VCS is authoritative as a Registrar
for that domain). Requests with existing Route Sets are
rejected.
Proxy to known only: registration requests are proxied in
accordance with existing call processing rules, but only
to known neighbor, traversal client and traversal server
zones. Requests containing Route Sets are proxied only
if they were received from a known zone.
Proxy to any: registration requests are proxied in
accordance with existing call processing rules to all
known zones. Requests containing Route Sets are
always proxied.
The default is Off.
See Proxying registration requests
[p.83] for more information.
Authentication controls
This section contains the device authentication controls for enabling delegated credential checking. The
configurable options are:
FieldDescriptionUsage tips
Delegated
credential
checking
Controls whether the credential checking of SIP
messages is delegated, via a traversal zone, to another
VCS.
Off: use the relevant credential checking mechanisms
(local database, Active Directory Service or H.350
directory via LDAP) on the VCS performing the
authentication challenge.
On: delegate the credential checking to a traversal client.
The default is Off.
Note that delegated credential
checking must be enabled on both
the traversal server and the
traversal client.
See delegated credential checking
for more information.
The Domains page (Configuration > Domains) lists the SIP domains managed by this VCS.
A domain name can comprise multiple levels. Each level's name can only contain letters, digits and hyphens,
with each level separated by a period (dot). A level name cannot start or end with a hyphen, and the final level
name must start with a letter. An example valid domain name is 100.example-name.com.
Note that values shown in the Index column correspond to the numeric elements of the %localdomain1%,%localdomain2%, . . . %localdomain200% pattern matching variables.
You can configure up to 200 domains.
Configuring the supported services for Unified
Communications (VCS Control only)
When the VCS Control has been enabled for Unified Communications mobile and remote access, you must
select the services that each domain will support. The options are:
n SIP registrations and provisioning on VCS: the VCS is authoritative for this SIP domain. The VCS
acts as a SIP registrar and Presence Server for the domain, and accepts registration requests for any SIP
endpoints attempting to register with an alias that includes this domain. The default is On.
n SIP registrations and provisioning on Unified CM: endpoint registration, call control and provisioning
for this SIP domain is serviced by Unified CM. The VCS acts as a Unified Communications gateway to
provide secure firewall traversal and line-side support for Unified CM registrations. The default is Off.
n IM and Presence services on Unified CM: instant messaging and presence services for this SIP domain
are provided by the Unified CM IM and Presence service. The default is Off.
If you have enabled delegated credential checking (Configuration > Protocols > SIP), you need to specify
the traversal zone to use when delegating credential checks for SIP messages for this domain. This only
applies to the SIP domains for which VCS is acting as the service provider and SIP registrar.
You can specify a different zone for each SIP domain, if required.
Choose Do not delegate if you want to continue to use this VCS Expressway to perform the credential
checking.
Testing the credential checking service
To verify whether the VCS to which credential checking has been delegated is able to receive messages and
perform the relevant authentication checks:
1. Go to Configuration > Domains.
2. Select the relevant domains.
3. Click Test credential checking service.
The system displays a Results section and reports whether the receiving VCS can be reached over the
traversal zone and, additionally, if it is able to perform credential checking for both NTLM and SIP digest
type challenges.
If you are not using NTLM authentication in your video network, and thus the receiving VCS is not
configured with a connection to an Active Directory Service, then the NTLM check will be expected to
fail.
The Interworking page (Configuration > Protocols > Interworking) lets you configure whether or not the
VCS acts as a gateway between SIP and H.323 calls. The translation of calls from one protocol to the other
is known as “interworking”.
By default, the VCS acts as a SIP–H.323 and H.323–SIP gateway but only if at least one of the endpoints
that are involved in the call is locally registered. You can change this setting so that the VCS acts as a SIP–
H.323 gateway regardless of whether the endpoints involved are locally registered. You also have the option
to disable interworking completely.
The options for the H.323 <-> SIP interworking mode are:
n Off: the VCS does not act as a SIP–H.323 gateway.
n Registered only: the VCS acts as a SIP–H.323 gateway but only if at least one of the endpoints is locally
registered.
n On: the VCS acts as a SIP–H.323 gateway regardless of whether the endpoints are locally registered.
You are recommended to leave this setting as Registered only (where calls are interworked only if at least
one of the endpoints is locally registered). Unless your network is correctly configured, setting it to On (where
all calls can be interworked) may result in unnecessary interworking, for example where a call between two
H.323 endpoints is made over SIP, or vice versa.
Calls for which the VCS acts as a SIP to H.323 gateway are traversal calls. The VCS always takes the
media for SIP–H.323 interworked calls so that it can independently negotiate payload types on the SIP and
H.323 sides and VCS will re-write these as the media passes.
Also in a SIP SDP negotiation, multiple codec capabilities can be agreed (more than one video codec can be
accepted) and the SIP device is at liberty to change the codec it uses at any time within the call. If this
happens, because VCS is in the media path it will close and open logical channels to the H.323 device as the
media changes (as required) so that media is passed correctly.
Searching by protocol
When searching a zone, the VCS first performs the search using the protocol of the incoming call. If the
search is unsuccessful the VCS may then search the zone again using the alternative protocol, depending on
where the search came from and the Interworking mode. Note that the zone must also be configured with
the relevant protocols enabled (SIP and H.323 are enabled on a zone by default).
n If the request has come from a neighboring system and Interworking mode is set to Registered only, the
VCS searches the Local Zone using both protocols, and all other zones using the native protocol only
(because it will interwork the call only if one of the endpoints is locally registered).
n If Interworking mode is set to On, or the request has come from a locally registered endpoint, the VCS
searches the Local Zone and all external zones using both protocols.
Enabling SIP endpoints to dial H.323 numbers
SIP endpoints can only make calls in the form of URIs — such as name@domain. If the caller does not
specify a domain when placing the call, the SIP endpoint automatically appends its own domain to the
number that is dialed.
So if you dial 123 from a SIP endpoint, the search will be placed for 123@domain. If the H.323 endpoint
being dialed is just registered as 123, the VCS will not be able to locate the alias 123@domain and the call
will fail. The solutions are to either:
n Ensure all your endpoints, both H.323 and SIP, register with an alias in the form name@domain.
n Create a pre-search transform on the VCS that strips the @domain portion of the alias for those URIs that
are in the form of number@domain.
See the pre-search transforms section for information about how to configure pre-search transforms, and
the stripping @domain for dialing to H.323 numbers section for an example of how to do this.
For an endpoint to use the VCS as its H.323 gatekeeper or SIP registrar, the endpoint must first register with
the VCS. The VCS can be configured to control which devices are allowed to register with it by using the
following mechanisms:
n a device authentication process based on the username and password supplied by the endpoint
n a registration restriction policy that uses either Allow Lists or Deny Lists or an external policy service to
specify which aliases can and cannot register with the VCS
n restrictions based on IP addresses and subnet ranges through the specification of subzone membership
rules and subzone registration policies
You can use these mechanisms together. For example, you can use authentication to verify an endpoint’s
identity from a corporate directory, and registration restriction to control which of those authenticated
endpoints may register with a particular VCS.
You can also control some protocol-specific behavior, including:
n the Registration conflict mode and Auto discover settings for H.323 registrations
n the SIP registration proxy mode for SIP registrations
For specific information about how registrations are managed across peers in a cluster, see the Sharing
registrations across peers [p.166] section.
In a Unified Communications deployment, endpoint registration for SIP devices may be provided by Unified
CM. In this scenario, the VCS provides secure firewall traversal and line-side support for Unified CM
registrations. When configuring domains, you must select the system - either Unified CM or VCS to provide
registration services for each domain.
Finding a VCS with which to register
Before an endpoint can register with a VCS, it must determine which VCS it can or should be registering with.
This setting is configured on the endpoint, and the process is different for SIP and H.323.
Registrations on a VCS Expressway
If a traversal-enabled endpoint registers directly with a VCS Expressway, the VCS Expressway will provide
the same services to that endpoint as a VCS Control, with the addition of firewall traversal. Traversalenabled endpoints include all Cisco TelePresence Expressway™ endpoints and third-party endpoints which
support the ITU H.460.18 and H.460.19 standards.
Endpoints that are not traversal-enabled can still register with a VCS Expressway, but they may not be able
to make or receive calls through the firewall successfully. This will depend on a number of factors:
n whether the endpoint is using SIP or H.323
n the endpoint’s position in relation to the firewall
n whether there is a NAT in use
n whether the endpoint is using a public IP address
For example, if an endpoint is behind a NAT or firewall, it may not be able to receive incoming calls and may
not be able to receive media for calls it has initiated. SIP endpoints can also work behind a NAT but can only
receive video if they send it as well.
To ensure firewall traversal will work successfully for H.323 endpoints behind a NAT, the endpoint must be
traversal-enabled.
MCU, gateway and Content Server registration
H.323 systems such as gateways, MCUs and Content Servers can also register with a VCS. They are
known as locally registered services. These systems are configured with their own prefix, which they provide
to the VCS when registering. The VCS will then know to route all calls that begin with that prefix to the
gateway, MCU or Content Server as appropriate. These prefixes can also be used to control registrations.
SIP devices cannot register prefixes. If your dial plan dictates that a SIP device should be reached via a
particular prefix, then you should add the device as a neighbor zone with an associated search rule using a
pattern match equal to the prefix to be used.
Note that the Cisco TelePresence MPS 200 and MPS 800, and the Cisco TelePresence Content Server both
support Expressway. They can therefore register directly with a VCS Expressway for firewall traversal.
Configuring registration restriction policy
The Registration configuration page (Configuration > Registration > Configuration) is used to control
how the VCS manages its registrations.
The Restriction policy option specifies the policy to use when determining which endpoints may register
with the VCS. The options are:
n None: any endpoint may register.
n Allow List: only those endpoints with an alias that matches an entry in the Allow List may register.
n Deny List: all endpoints may register, unless they match an entry on the Deny List.
n Policy service: only endpoints that register with details allowed by the external policy service may register.
The default is None.
If you use an Allow List or Deny List, you must also go to the appropriate Registration Allow List or
Registration Deny List configuration page to create the list.
The Policy service option is used if you want to refer all registration restriction policy decisions out to an
external service. If you select this option an extra set of configuration fields appear so that you can specify
the connection details of the external service. See Configuring Registration Policy to use an external service
[p.99].
Registering aliases
After the device authentication process (if required) has been completed, the endpoint will then attempt to
register its aliases with the VCS.
H.323
When registering, the H.323 endpoint presents the VCS with one or more of the following:
Users of other registered endpoints can then call the endpoint by dialing any of these aliases.
n You are recommended to register your H.323 endpoints using a URI. This facilitates interworking between
SIP and H.323, as SIP endpoints register using a URI as standard.
n You are recommended to not use aliases that reveal sensitive information. Due to the nature of H.323, call
setup information is exchanged in an unencrypted form.
SIP
When registering, the SIP endpoint presents the VCS with its contact address (IP address) and logical
address (Address of Record). The logical address is considered to be its alias, and will generally be in the
form of a URI.
H.350 directory authentication and registrations
If the VCS is using an H.350 directory service to authenticate registration requests, the Source of aliases
for registration setting is used to determine which aliases the endpoint is allowed to attempt to register with.
See Using an H.350 directory service lookup via LDAP [p.120] for more information.
Attempts to register using an existing alias
An endpoint may attempt to register with the VCS using an alias that is already registered to the system.
How this is managed depends on how the VCS is configured and whether the endpoint is SIP or H.323.
n H.323: an H.323 endpoint may attempt to register with the VCS using an alias that has already been
registered on the VCS from another IP address. You can control how the VCS behaves in this situation by
configuring the Registration conflict mode, on the H.323 page (Configuration > Protocols > H.323).
n SIP: a SIP endpoint will always be allowed to register using an alias that is already in use from another IP
address. When a call is received for this alias, all endpoints registered using that alias will be called
simultaneously. This SIP feature is known as “forking”.
Blocking registrations
If you have configured the VCS to use a Deny List, you will have an option to block the registration. This will
add all the aliases used by that endpoint to the Deny List.
Removing existing registrations
After a restriction policy has been activated, it controls all registration requests from that point forward.
However, any existing registrations may remain in place, even if the new list would otherwise block them.
Therefore, you are recommended to manually remove all existing unwanted registrations after you have
implemented a restriction policy.
To manually remove a registration, go to Status > Registrations > By device, select the registrations you
want to remove, and click Unregister.
If the registered device is in an active call and its registration is removed (or expires), the effect on the call is
dependent on the protocol:
n H.323: the call is taken down.
n SIP: the call stays up by default. This SIP behavior can be changed but only via the CLI by using the
All endpoints must periodically re-register with the VCS in order to keep their registration active. If you do not
manually delete the registration, the registration could be removed when the endpoint attempts to re-register,
but this depends on the protocol being used by the endpoint:
n H.323 endpoints may use "light" re-registrations which do not contain all the aliases presented in the initial
registration, so the re-registration may not get filtered by the restriction policy. If this is the case, the
registration will not expire at the end of the registration timeout period and must be removed manually.
n SIP re-registrations contain the same information as the initial registrations so will be filtered by the
restriction policy. This means that, after the list has been activated, all SIP registrations will disappear at
the end of their registration timeout period.
The frequency of re-registrations is determined by the Registration expire delta setting for SIP
(Configuration > Protocols > SIP) and the Time to live setting for H.323 (Configuration > Protocols >
When an endpoint attempts to register with the VCS it presents a list of aliases. One of the methods provided
by the VCS to control which endpoints are allowed to register is to set the Restriction policy (on the
Configuring registration restriction policy [p.94] page) to Allow List or Deny List and then to include any one of
the endpoint’s aliases on the Allow List or the Deny List as appropriate. Each list can contain up to 2,500
entries.
When an endpoint attempts to register, each of its aliases is compared with the patterns in the relevant list to
see if it matches. Only one of the aliases needs to appear in the Allow List or the Deny List for the registration
to be allowed or denied.
For example, if the Restriction policy is set to Deny List and an endpoint attempts to register using three
aliases, one of which matches a pattern on the Deny List, that endpoint’s registration will be denied.
Likewise, if the Restriction policy is set to Allow List, only one of the endpoint’s aliases needs to match a
pattern on the Allow List for it to be allowed to register using all its aliases.
Allow Lists and Deny Lists are mutually exclusive: only one may be in use at any given time. You can also
control registrations at the subzone level. Each subzone's registration policy can be configured to allow or
deny registrations assigned to it via the subzone membership rules.
Configuring the registration Allow List
The Registration Allow List page (Configuration > Registration > Allow List) shows the endpoint
aliases and alias patterns that are allowed to register with the VCS. Only one of an endpoint's aliases needs
to match an entry in the Allow List for the registration to be allowed.
To use the Allow List, you must select a Restriction policy of Allow List on the Registration configuration
page.
The configurable options are:
FieldDescriptionUsage tips
Description An optional free-form description
of the entry.
Pattern
type
The way in which the Pattern
string must match the alias.
Options are:
Exact: the alias must match the
pattern string exactly.
Prefix: the alias must begin with
the pattern string.
Suffix: the alias must end with
the pattern string.
Regex: the pattern string is a
regular expression.
You can test whether a pattern matches a particular alias by
using the Check pattern tool (Maintenance > Tools > Check
The Registration Deny List page (Configuration > Registration > Deny List) shows the endpoint aliases
and alias patterns that are not allowed to register with the VCS. Only one of an endpoint's aliases needs to
match an entry in the Deny List for the registration to be denied.
To use the Deny List, you must select a Restriction policy of Deny List on the Registration configuration
page.
The configurable options are:
FieldDescriptionUsage tips
Description An optional free-form description
of the entry.
Pattern
type
Pattern
string
The way in which the Pattern
string must match the alias.
Options are:
Exact: the alias must match the
pattern string exactly.
Prefix: the alias must begin with
the pattern string.
Suffix: the alias must end with
the pattern string.
Regex: the pattern string is a
regular expression.
The pattern against which an
alias is compared.
You can test whether a pattern matches a particular alias by
using the Check pattern tool (Maintenance > Tools > Check
Configuring Registration Policyto use an external service
Configuring Registration Policy to use an
external service
To configure Registration Policy to refer all registration restriction policy decisions out to an external service:
1. Go to Configuration > Registration > Configuration.
2. Select a Restriction policy of Policy service.
3. Configure the fields as follows:
FieldDescriptionUsage tips
ProtocolThe protocol used to connect to the policy
service.
The default is HTTPS.
Certificate
verification
mode
HTTPS
certificate
revocation list
(CRL)
checking
Server
address 1 - 3
When connecting over HTTPS, this setting
controls whether the certificate presented by
the policy server is verified.
If On, for the VCS to connect to a policy server
over HTTPS, the VCS must have a root CA
certificate loaded that authorizes that server’s
server certificate. Also the certificate's Subject
Common Name or Subject Alternative Name
must match one of the Server address fields
below.
Enable this option if you want to protect
certificate checking using CRLs and you have
manually loaded CRL files, or you have
enabled automatic CRL updates.
Enter the IP address or Fully Qualified Domain
Name (FQDN) of the server hosting the service.
You can specify a port by appending :<port>
to the address.
The VCS automatically supports HTTP to
HTTPS redirection when communicating
with the policy service server.
The VCS’s root CA certificates are loaded
via (Maintenance > Security certificates
> Trusted CA certificate).
Go to Maintenance > Security
certificates > CRL management to
configure how the VCS uploads CRL files.
If an FQDN is specified, ensure that the
VCS has an appropriate DNS
configuration that allows the FQDN to be
resolved.
For resiliency, up to three server
addresses can be supplied.
PathEnter the URL of the service on the server.
Status pathThe Status path identifies the path from where
the VCS can obtain the status of the remote
service.
The default is status.
UsernameThe username used by the VCS to log in and
query the service.
PasswordThe password used by the VCS to log in and
The policy server must supply return status
information, see Policy server status and
resiliency [p.338].
The maximum plaintext length is 30
characters (which is subsequently
encrypted).
Page 100
Registration control
Configuring Registration Policyto use an external service
FieldDescriptionUsage tips
Default CPLThis is the fallback CPL used by the VCS if the
service is not available.
You can change it, for example, to redirect
to an answer service or recorded
message.
For more information, see Default CPL for
policy services [p.492].
4. Click Save.
The VCS should connect to the policy service server and start using the service for Registration Policy
decisions.
Any connection problems will be reported on this page. Check the Status area at the bottom of the page
and check for additional information messages against the Server address fields.
Cisco VCS Administrator Guide (X8.1.1)Page 100 of 507
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.