The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Book Contents Book ContentsMobile and Remote Access Through Cisco Expressway Deployment Guide (X14.0)
This chapter contains information on the requirements and prerequisites that your deployment must meet in order to configure and deploy Mobile and Remote Access.
For MRA port information, go to the Cisco Expressway IP Port Usage Configuration Guide at Cisco Expressway Series Configuration Guides. The guide describes the ports that you can use between Expressway-C in the internal network, Expressway-E in the DMZ, and the public internet.
Network Infrastructure Requirements
Assign separate IP addresses to the Expressway-C and the Expressway-E. Do not use a shared address for both elements, as the firewall cannot distinguish between them.
The ideal scenario for MRA is to have a single domain with a split DNS configuration, and this is the recommended approach. This is not always possible, so there are some other approaches to deal with various alternative scenarios.
The domain to which the calls are routed must match with the MRA domain to which the endpoints were registered. For example, if endpoints are registered with the domain exp.example.com , the calls must be routed to this domain, and it must not be routed to the domain cluster1.exp.example.com .
A single domain means that you have a common domain ( example.com ) with separate internal and external DNS servers. This allows DNS names to be resolved differently by clients on different networks depending on DNS configuration, and aligns with basic Jabber service discovery requirements.
From X12.5, the Cisco Expressway Series supports the case where MRA clients use an external domain to lookup the _collab-edge SRV record, and the _cisco-uds SRV record for that same external domain cannot be resolved by the Expressway-C. This is typically the case when split DNS is not available for the external domain. And prior to X12.5 this required a pinpoint subdomain or some other DNS workaround on the Expressway-C, to satisfy the client requirements for resolving the _cisco-uds record.
Limitation: This case is not supported for Unified CM nodes identified by IP addresses, only for FQDNs.
This feature also supports a secondary case, for MRA deployments that only allow Jabber access over MRA even if users are working on-premises. In this case only one domain is required and typically the DNS records are publicly resolvable (although this is not required if MRA access is disallowed for users when off premises). The change in X12.5 means that there is no need to have a _cisco-uds._tcp. DNS SRV record available to Cisco Expressway-C or to the Jabber clients.
Deployments that require Jabber clients to always connect over MRA also benefit from the X12.5 update that no longer requires the Expressway-C to resolve the _cisco-uds DNS SRV record. So administrators only need to configure the _collab-edge DNS SRV record, and Jabber clients using service discovery will only have the option of connecting over MRA.
If you use both the CMS Web Proxy service and MRA on the same Expressway, the following configuration items must be assigned different values per service. If you try to use the same value, the service that was configured first will work, but the other one will fail:
Cisco Expressway supports Mobile and Remote Access with multiple external domains. With this deployment, you will have more than one external domain where your MRA clients may reside. Expressway-E must be able to connect to all of them. To configure this deployment, do the following:
For more detail, including a configuration checklist that summarizes the domain-specific configuration tasks for multiple domains, see Multidomain Configuration Summary.
This section summarizes the public (external) and local (internal) DNS requirements for MRA. For more information, see the Cisco Jabber Planning Guide for your version on the Jabber Install and Upgrade Guides page.
The public, external DNS must be configured with _collab-edge._tls. SRV records so that endpoints can discover the Expressway-Es to use for Mobile and Remote Access. You also need SIP service records for general deployment (not specifically for MRA).
Although we recommend that the local, internal DNS is configured with _cisco-uds._tcp. SRV records, from X12.5 this is no longer a requirement.
From version X8.8, if you use the IM and Presence Service over MRA (or any XMPP federation that uses XCP TLS connections between Expressway-C and Expressway-E), you must create forward and reverse DNS entries for each Expressway-E system. This is so that Expressway-C systems making TLS connections to them can resolve the Expressway-E FQDNs and validate the Expressway-E certificates. This requirement affects only the internal, LAN-side interface and does not apply to the external IP-side.
Create internal DNS records, for both forward and reverse lookups, for all Unified Communications nodes used with MRA. This allows Expressway-C to find the nodes when IP addresses or hostnames are used instead of FQDNs.
Ensure that the cisco-uds SRV records are NOT resolvable outside of the internal network, otherwise the Jabber client will not start MRA negotiation via the Expressway-E.
For more information, see the "Advanced networking deployments" appendix in the Expressway Basic Configuration (Expressway-C with Expressway-E) Deployment Guide
The Maximum Session Bit Rate for Video Calls on the default region on Cisco Unified Communications Manager is 384 kbps by default. The Default call bandwidth on Expressway-C is also 384 kbps by default. These settings may be too low to deliver the expected video quality for MRA-connected devices.
Unified Communications Requirements
The following table provides minimum releases of Cisco UC products in order for MRA to be supported with various features.
Legacy Authentication (LDAP)
Legacy Authentication with SSO
OAuth with Refresh
OAuth Refresh with SSO
IM and Presence Service (optional)
Cisco Unity Connection (optional)
Clusterwide SAML SSO: 11.5(1)
Per node SSO: OpenAM: 8.6(2) SAML SSO: 10.0(1)
The following Cisco Unified Communications Manager configuration requirements exist for deploying Mobile and Remote Access:
Additional requirements exist if you are deploying ICE Media Path Optimization. For details, see Prerequisites for ICE Media Path Optimization.
To deploy IM clients over MRA, the following configuration requirements exist for the IM and Presence Service:
This topic covers the following certificate requirements for Mobile and Remote Access (MRA):
We recommend that you use CA-signed certificates for Mobile and Remote Access.
The following table shows the certificates that each application uses for Mobile and Remote Access along with the certificate upload requirements for those applications. This table assumes that you're using CA-signed certificates for all certificates that MRA uses.
Presents these certificates for MRA
Each Unified CM cluster must trust the Expressway-C certificate. For each cluster, make sure of the following:
IM and Presence Service
Each IM and Presence Service cluster must trust the Expressway-C certificate. For each cluster, make sure of the following:
Expressway-C certificate (CA-signed)
Expressway-C must trust the certificates presented by each Unified CM and IM and Presence Service cluster. In addition, Expressway-C must trust the Expressway-E certificates. Make sure of the following:
Expressway-E certificate (CA-signed)
Expressway-E must trust the Expressway-C certificate. Make sure of the following:
Certificate management is simplified if you use the same CA to sign certificates for all applications as it is already installed on each application. However, you may want to limit certificate costs by using a public CA for Expressway-E and an enterprise CA for internal applications.
Note | You can also use self-signed certificates for Cisco Unified Communications Manager and the IM and Presence Service. Then, the certificate requirements will be same as in the above table with one exception. On Expressway-C, rather than installing the root CA certificate(s) that signs the Unified CM and IM and Presence Service certificates, install the actual certificates that Unified CM (CallManager, Tomcat) and IM and Presence Service (cup-xmpp, Tomcat) use for Mobile and Remote Access. |
Note | For the UC traversal zone between Expressway-C and Expressway-E, it's not sufficient to install the root CA certificate that the other Expressway application uses. You must install the CA certificate chain (root plus intermediate certificates) that the other Expressway application uses. |
The Expressway certificate signing request (CSR) tool prompts for and incorporates the relevant Subject Alternative Name (SAN) entries as appropriate for the Unified Communications features that are supported on that Expressway.
The following table highlights CSR requirements when generating the Expressway-C and Expressway-E certificates for Mobile and Remote Access.
Subject Alternative Names
The Expressway-C list of Subject Alternative Names must include:
The Expressway-E list of Subject Alternative Names must include:
The certificate must include the Client Authentication extension. The system won't let you upload a certificate without this extension.
Note | Make sure that the CA that signs the request doesn't strip out the client authentication extension. |
The certificate must include the Client Authentication extension. The system won't let you upload a certificate without this extension.
Note | Make sure that the CA that signs the request doesn't strip out the client authentication extension. |
Note | We recommend that you use DNS format for the chat node aliases when generating the CSRs for both Expressways. |
Note | Expressway-C automatically includes the chat node aliases in the certificate signing request (CSR), providing it has discovered a set of IM and Presence Service servers. |
The following steps describe how to generate CSRs and to upload certificates onto Expressway.
Note | For detailed procedures and information on how to use the Certificate Signing Request tool to generate CSRs for Cisco Expressway certificates, and how to upload and download certificates on Expressway refer to the Cisco Expressway Certificate Creation and Use Deployment Guide on the Expressway Configuration Guides page. |
Legacy Authentication (LDAP)
Legacy Authentication with SSO
OAuth with Refresh
OAuth Refresh with SSO
Cisco Jabber for Windows
Cisco Jabber for iPhone and iPad
Cisco Jabber for Android
Cisco Jabber for Mac
Jabber clients verify the identity of the Expressway-E they are connecting to by validating its server certificate. To do this, they must have the certificate authority that was used to sign the Expressway-E's server certificate in their list of trusted CAs.
Jabber uses the underlying operating system's certificate mechanism:
Jabber client configuration details for MRA are provided in the installation and configuration guide for the relevant client:
Expressway supports calling for MRA-connected Webex clients that are running a compatible software version:
Cisco IP Phone 7800 Series
Cisco IP Phone 8800 Series except Cisco Wireless IP Phone 8821 and 8821-EX and Cisco Unified IP Conference Phone 8831
Cisco IP Conference Phone 7832
Cisco IP Conference Phone 8832
Android-based Cisco DX650, DX70, and DX80 devices
Cisco Webex Desk Series endpoints, such as:
All CE releases supported by the hardware
Cisco Webex Board Series endpoints, such as:
All CE releases supported by the hardware
Cisco Webex Room Series endpoints, such as:
All CE releases supported by the hardware
Cisco TelePresence endpoints: SX Series, EX Series, MX Series, Profile Series, C Series
Cisco TelePresence and Webex endpoints:
Ensure that the provisioning mode is set to Cisco UCM via Expressway.
These devices must verify the identity of the Expressway-E they are connecting to by validating its server certificate. To do this, they must have the certificate authority that was used to sign the Expressway-E's server certificate in their list of trusted CAs.
The devices ship with a list of default CAs which cover the most common providers (including Verisign and Thawte). If the relevant CA is not included, it must be added (for instructions, see the endpoint administrator guide).
Mutual authentication is optional, and these devices are not required to provide client certificates. If you do want to configure mutual TLS, you cannot use CAPF enrolment to provision the client certificates. Instead, manually apply the certificates to the devices. The client certificates must be signed by an authority that is trusted by the Expressway-E.
If you deploy these devices to register with Cisco Unified Communications Manager through MRA, be aware of the following points. For DX endpoints, these considerations only apply to Android-based devices and do not apply to DX70 or DX80 devices running CE software:
For information about which features are supported over MRA for specific clients and endpoints, refer to the relevant product documentation:
See "Supported Services” in the “Remote Access” chapter of the Planning Guide for Cisco Jabber (for your version).
Cisco IP Phone 7800 Series
See “Phone Features Available for Mobile and Remote Access Through Expressway” in the “Phone Features and Setup” chapter, Cisco IP Phone 7800 Series Administration Guide for Cisco Unified Communications Manager .
Cisco IP Conference Phone 7832
See “Phone Features Available for Mobile and Remote Access Through Expressway” in the “Phone Features and Setup” chapter, Cisco IP Conference Phone 7832 Administration Guide for Cisco Unified Communications Manager .
Cisco IP Phone 8800 Series
See “Phone Features Available for Mobile and Remote Access Through Expressway” in the “Phone Features and Setup” chapter, Cisco IP Phone 8800 Series Administration Guide for Cisco Unified Communications Manager .
Cisco IP Conference Phone 8832
See “Phone Features Available for Mobile and Remote Access Through Expressway” in the “Phone Features and Setup” chapter, Cisco IP Conference Phone 8832 Administration Guide for Cisco Unified Communications Manager .
MRA supports different features in different deployment scenarios, and when different clients and endpoints are used. This section provides information about:
This section lists some key client and endpoint features that we know don't work with MRA-connected devices.
Note | Refer to your endpoint or client documentation for more information. The following list isn't exhaustive. |
Note | For iX to work over MRA, configure the conferencing server with an encrypted trunk to Unified CM and make sure that the endpoints/ Jabber are running a suitable, iX-capable software version. |
You can use the following supported Cisco Jabber SDK features over MRA: