Cisco Expressway X12.5.7: Release Notes
Cisco Expressway X12.5.7: Release Notes
Cisco Expressway X12.5.7: Release Notes
X12.5.7
Release Notes
First Published: January 2019
Last Updated: March 2020
Contents
Preface 3
Change History 3
Supported Platforms 5
Related Documentation 6
Feature History Summary 8
Changes in X12.5.7 9
CAUTION - Please Read Before you Install X12.5.7 9
Direct 9-1-1 Calls for "Kari's Law" (Expressway as Call Control using PSTN Gateway) 9
Software Changes and Enhancements 9
Documentation Changes 9
Changes in X12.5.6 10
Software Changes and Enhancements 10
Documentation Changes 10
Changes in X12.5.5 10
Software Changes and Enhancements 10
Changes in X12.5.4 11
1
Cisco Expressway Series Release Notes
2
Cisco Expressway Series Release Notes
Preface
Preface
Change History
Table 1 Release Notes Change History
March 2020 Only SHA passwords supported for SNMP from Document
X12.5.7. clarification
3
Cisco Expressway Series Release Notes
Preface
4
Cisco Expressway Series Release Notes
Preface
Supported Platforms
Table 2 Expressway Software Versions Supported by Platform
‡ As of 13th November 2018, you cannot order the CE1100 appliance from Cisco. See the End-of-sale announcement
for other important dates in the lifecycle of this platform.
Advance Notice - Hardware Service Support for CE500 and CE1000 Appliances to be
Withdrawn
Cisco will withdraw support services for the Cisco Expressway CE500 and CE1000 appliance hardware platforms in a
future release. More details are available in the End-of-sale announcement.
5
Cisco Expressway Series Release Notes
Preface
Related Documentation
Table 3 Links to Related Documents and Videos
Support videos Videos provided by Cisco TAC engineers about certain common Expressway
configuration procedures are available on the Expressway/VCS Screencast Video List
page
Installation - virtual Cisco Expressway Virtual Machine Installation Guide on the Expressway installation
machines guides page
Installation - physical Cisco Expressway CE1200 Appliance Installation Guide on the Expressway installation
appliances guides page
Basic configuration for Cisco Expressway Registrar Deployment Guide on the Expressway configuration guides
registrar / single page
systems
Basic configuration for Cisco Expressway-E and Expressway-C Basic Configuration Deployment Guide on the
firewall traversal / Expressway configuration guides page
paired systems
Administration and Cisco Expressway Administrator Guide on the Expressway maintain and operate guides
maintenance page
Cisco Expressway Serviceability Guide on the Expressway maintain and operate guides
page
Clustering Cisco Expressway Cluster Creation and Maintenance Deployment Guide on the
Expressway configuration guides page
Certificates Cisco Expressway Certificate Creation and Use Deployment Guide on the Expressway
configuration guides page
Ports Cisco Expressway IP Port Usage Configuration Guide on the Expressway configuration
guides page
Unified Mobile and Remote Access Through Cisco Expressway on the Expressway configuration
Communications guides page
Cisco Meeting Server Cisco Meeting Server with Cisco Expressway Deployment Guide on the Expressway
configuration guides page
Cisco Meeting Server API Reference Guide on the Cisco Meeting Server programming
guides page
Other Cisco Meeting Server guides are available on the Cisco Meeting Server
configuration guides page
6
Cisco Expressway Series Release Notes
Preface
Microsoft infrastructure Cisco Expressway with Microsoft Infrastructure Deployment Guide on the Expressway
configuration guides page
Cisco Jabber and Microsoft Skype for Business Infrastructure Configuration Cheatsheet
on the Expressway configuration guides page
Rest API Cisco Expressway REST API Summary Guide on the Expressway configuration guides
page (high-level information only as the API is self-documented)
Multiway Conferencing Cisco TelePresence Multiway Deployment Guide on the Expressway configuration guides
page
7
Cisco Expressway Series Release Notes
Virtualized Systems - ESXi Qualification and Please see the Cisco Expressway on Virtual Machine Installation
version support Guide for details
MRA: SIP UPDATE Method Support for Supported Supported Supported Supported
Session Refresh
MRA: Media Path Optimization for ICE Supported Supported Supported Supported
Features which are not new in X12.5 but included for information due to their former preview
status:
Cisco Meeting App can use the Preview Supported Supported Supported
Expressway-E TURN Server
Multiple Presence Domains over MRA Preview Preview Preview Preview
Smart Call Home Deprecated and Deprecated and Deprecated and Deprecated
Preview Preview Preview and
Preview
8
Cisco Expressway Series Release Notes
Changes in X12.5.7
Changes in X12.5.7
CAUTION - Please Read Before you Install X12.5.7
Expressways that are currently running version X8.5.3 or earlier need a two-stage upgrade. In this case you must
upgrade to an intermediate, approved version before upgrading to this release, as described in Upgrade
Prerequisites and Software Dependencies, page 26.
Cisco Jabber 12.5 or later is needed if you want chat/messaging services over MRA with authentication using OAuth
refresh (self-describing tokens) and you configure IM and Presence Service presence redundancy groups. With this
release of Expressway, user login failures will occur in this scenario if Jabber versions before 12.5 are in use.
Direct 9-1-1 Calls for "Kari's Law" (Expressway as Call Control using PSTN
Gateway)
This item applies if you add a Gateway to Expressway that enables PSTN calling, including 911 emergency calls
placed in the United States. The recent "Kari's Law" mandated by the Federal Communications Commission, requires
multi-line telephone systems (MLTS) to allow direct 911 calling.
Expressway now supports compliance with Kari's Law as follows:
■ The previous requirement to have at least one RMS license installed before a call can be placed does not now
apply to 911 calls.
■ The latest Expressway Administrator Guide describes an example dial plan configuration to route 911 calls
without a prefix or additional digits, from Expressway-registered endpoints with dialing facilities.
Documentation Changes
For CE1200 appliance-based Expressways, the Limitations section now include version recommendations for the
C220 M5 server UCS firmware (also mentioned in the Expressway CE1200 Installation Guide).
9
Cisco Expressway Series Release Notes
Changes in X12.5.6
Changes in X12.5.6
Software Changes and Enhancements
■ General software maintenance and bug fixing.
■ A significant bug fixed by this release is CSCvq89030, which caused issues if a Neighbor zone configured with
SRV lookup returned more peers than the maximum peers field configured for the zone.
■ If you are deploying a new Expressway and you want to use ACME, please follow the workaround provided in
associated Bug ID CSCvr82346. (Existing deployments that are already registered to ACME are unaffected.)
■ The search lists for Open and Resolved Issues, page 20 have been updated for this maintenance release.
Documentation Changes
Currently, if a Expressway node in a clustered deployment fails or loses network connectivity for any reason, or if the
Unified CM restarts, all active calls going through the affected node will fail. The calls are not handed over to another
cluster peer. This behavior was not documented in previous releases, but is now mentioned in the Limitations section
in these notes (and also in the Mobile and Remote Access Through Cisco Expressway guide for X12.5.x.)
Changes in X12.5.5
Software Changes and Enhancements
■ General software maintenance and bug fixing.
■ Cisco Webex Edge Audio without Expressway-C. For business to business cases (not for MRA) in this release
we successfully tested using Edge Audio with the Webex Edge Connect product, and without an Expressway-
C. So Expressway-E connects to Cisco Unified Communications Manager without Expressway-C. No traversal
or firewall is required for this scenario, and Expressway E connects the Webex Cloud directly to Cisco Unified
Communications Manager. The tested configuration uses standard Webex Edge Audio over the internet, with
a Neighbor zone between Cisco Unified Communications Manager and Expressway -E. The Webex zone
media encryption mode needs to be "On" (the default is "Auto").
This scenario requires inbound connections to be opened on the internal firewall. So it is not supported for
standard Expressway deployments with the usual dual firewall configuration.
■ The ESXi 6.7 Update 2 version has been successfully tested for hosting Expressway Large VMs. (This was
actually available in X12.5.4 but due to an oversight was not mentioned in the previous release notes.)
Note that issues exist with the ESXi Side-Channel-Aware Scheduler, as described in VMware's knowledge
base article on the subject.
■ Static NAT on TURN. Since X12.5.3, NAT reflection is not required for standalone Expressway deployments
that use the Expressway TURN server. In X12.5.5, support for static NAT functionality on TURN is extended to
clustered systems, subject to these requirements:
— After the upgrade to X12.5.5, restart all the peers in the cluster.
— If you later add a new peer to the cluster, restart all of the existing peers after you add the new one.
— Peers which are configured as TURN servers must be reachable using the private addresses for their
corresponding public interfaces.
Bug ID CSCvp74492 relates to these changes (bug ID CSCvq93633 relates to the current limitations to restart
all peers).
■ The Single SAML for Clusters section in these release notes has been fixed to remove a requirement in
cluster-wide mode to generate a self-signed certificate. This was incorrect information.
■ The search lists for Open and Resolved Issues, page 20 have been updated for this maintenance release.
10
Cisco Expressway Series Release Notes
Changes in X12.5.4
Changes in X12.5.4
Software Changes and Enhancements
■ A release key is not required to upgrade a system on X8.6.x or later software to this release.
■ General software maintenance and bug fixing.
■ Search lists for Open and Resolved Issues, page 20 are updated for this maintenance release.
■ User documentation now includes links to videos by Cisco TAC engineers about certain common Expressway
configuration procedures.
11
Cisco Expressway Series Release Notes
Changes in X12.5.3
The following features and preview features are deprecated from Expressway version X12.5, and support for them in
Expressway will be withdrawn in a subsequent release.
■ Support for Cisco Jabber Video for TelePresence (Movi). This item relates to Cisco Jabber Video for
TelePresence (works in conjunction with Cisco Expressway for video communication) and not to the Cisco
Jabber soft client that works with Unified CM.
■ FindMe device/location provisioning service
■ Smart Call Home
■ Expressway forward proxy
Changes in X12.5.3
Software Changes and Enhancements
■ General software maintenance and bug fixing.
■ Static NAT on TURN. In earlier releases, deployments configured with Static NAT on Expressway-E’s TURN
server required NAT reflection on the external firewall. This is because when Static NAT is configured,
Expressway-E sends incoming signaling and media traffic to its external IP address. In this condition, you must
configure NAT reflection on the external firewall to “hairpin” or reflect the media back to Expressway. This is
not a recommended configuration, as some firewalls do not support NAT reflection. From X12.5.3, we have
addressed this challenge by removing the requirement for NAT reflection in Expressway deployments that use
the Expressway TURN server. Expressway now has the ability to detect its own address.
■ The search lists for Open and Resolved Issues, page 20 have been updated for this maintenance release.
Changes in X12.5.2
Software Changes and Enhancements
■ General software maintenance and bug fixing.
■ The search lists for Open and Resolved Issues, page 20 have been updated for this maintenance release.
■ The ESXi 6.7 Update 1 version has been successfully tested for hosting Expressway virtual machines.
■ The Expressway Small VM (OVA virtual appliance) is now supported on the VMware ESXi virtual hardware
platform, subject to the same hardware requirements as specified for Small VMs running on a Cisco Business
Edition (BE) 6000 platform.
■ From X12.5.2, the Back-to-Back User Agent (B2BUA) can forward the Reason header in SIP response
messages. Note that in case of multiple Reason headers presented in an incoming SIP message, B2BUA
forwards only the first Reason header. This capacity was introduced to mitigate an issue with Unified CM not
forwarding the calls that are declined to voicemail. Bug ID CSCvk38038 refers.
12
Cisco Expressway Series Release Notes
Changes in X12.5.1
Changes in X12.5.1
Software Changes and Enhancements
■ General software maintenance and bug fixing.
Note: The bugs fixed in this maintenance release include CSCvp21304 - if Expressway is the registrar, non-
traversal calls are not counted and call status does not display on the Overview page in the web user
interface. This issue was included in the X8.11.4 release notes Notable Issues list, and is now resolved.
■ Previously (from X8.10), intracompany/intradomain calls through Expressway between Cisco Meeting Server
and Microsoft Skype for Business on-premise users, consumed RMS licenses on Expressway-C. From
X12.5.1, this is resolved and these calls no longer consume an RMS license. Bug ID CSCvn49463 refers.
■ These features which were previously in preview status are now fully supported by Expressway:
— Fixes to the Management Connector software on Expressway in this version accommodate a different
registration flow when you start using the Expressway to host connectors for Hybrid Services.
— Cosmetic branding corrections to align with the Cisco Webex brand.
SIP Proxy to Multiple Meeting Server Conference Bridges (Support for Meeting
Server Load Balancing)
This feature is not supported with Cisco Meeting Server software version 2.3 or earlier. Also, a Limitation currently
exists regarding support for dual-homed conferences with a Meeting Server cluster.
From X8.11, Cisco Expressway Series supports the mechanism that is used to load balance calls between Meeting
Servers that are in call bridge groups.
When Cisco Meeting Servers are in a call bridge group, and a participant tries to join a space on a server that has no
capacity, the call is rerouted to another server. That other server then sends a SIP INVITE to the call control layer,
using the original call details. The participant is now in the correct space, on a different Meeting Server. In cases
where there is capacity in the “second” server, but another Meeting Server has more capacity, it asks that Meeting
Server in the group to send the SIP INVITE.
There is a new setting in the neighbor zone called Meeting Server load balancing which must be enabled
(Configuration > Zones > Zones > Zone Name > Advanced). This allows the Cisco Expressway's B2BUA to process
the INVITE from the "second" Meeting Server to enable the participant to connect.
We recommend that Meeting Server load balancing is set to On regardless of whether endpoints are registered with
Expressway or with Unified CM.
13
Cisco Expressway Series Release Notes
Changes in X12.5.1
Figure 1 Cisco Meeting WebRTC App and Cisco Meeting App sharing a TURN server
In the diagram, the Expressway-E is configured to listen on TCP 443 for TURN requests and for WebRTC requests.
The TURN clients (Meeting Server Core, Meeting App, and Cisco Meeting WebRTC App) will all try to use UDP 3478
for TURN requests.
If the WebRTC App cannot make the outbound connection to UDP 3478, it uses the TCP override port, which is 443
by default, to request media relays.
The Meeting Server Edge is still required to traverse the XMPP signalling for Cisco Meeting Apps. However, there is no
need to use the TURN services of the Meeting Server Edge server.
14
Cisco Expressway Series Release Notes
Changes in X12.5.1
15
Cisco Expressway Series Release Notes
Features in X12.5
Features in X12.5
Virtualized Systems - ESXi 6.0, 6.5, and 6.7 Qualification
This item applies to virtualized systems. The VMware ESXi virtual hardware versions required to host Expressway VMs
have changed in this release and the minimum required version is now ESXi 6.0 (ESXi 5.0 and ESXi 5.5 are no longer
supported by VMware). The following ESXi versions have been successfully tested for Expressway X12.5.x:
■ ESXi 6.0
■ ESXi6.5 Update 2
■ ESXi6.7 Update 1 from X12.5.2, Update 2 for Large VMs only from X12.5.4, Update 2 for all VMs from X12.5.7
16
Cisco Expressway Series Release Notes
Features in X12.5
More information
Configuration details and required versions for ICE passthrough are in the Mobile and Remote Access Through Cisco
Expressway guide on the Expressway Configuration Guides page.
Background information about ICE in Expressway is in About ICE and TURN Services in the Cisco Expressway
Administrator Guide on the Expressway Maintain and Operate Guides page.
The ICE protocol is defined in RFC 5245.
■ Request to display the security icon on MRA endpoints for end-to-end secure calls.
■ Request to change the caller ID to display name or number on MRA endpoints.
17
Cisco Expressway Series Release Notes
Features in X12.5
— It was configured for Hybrid Services using the Service Select wizard, which disables the release key
requirement.
— It does not already have a release key. That is, the Expressway is not being used as anything other than a
connector host.
These conditions are met in most Hybrid Services deployments. However, if your deployment requires the
Expressway connector host to have a release key, then you need a new release key to upgrade to this release.
Clustering X8.11
MRA X8.8
18
Cisco Expressway Series Release Notes
Features in X12.5
The API is self-documented using RESTful API Modeling Language (RAML). You can access the RAML definitions for
your system at https://<ip address>/api/provisioning/raml. A high-level summary of how to access and use the API
is available in Cisco Expressway REST API Summary Guide on the Expressway installation guides page.
■ Schedule-based notifications: inventory, telemetry and configuration messages used to generate a Device
Report and improve hardware and software quality by identifying failure trends. You can find these
notifications posted on the first day of every month.
■ Event-based notifications: ad hoc events already supported by Expressway such as alarms and ACRs. You will
find these notifications posted to the Smart Call Home server as and when they occur.
Note: Although the web user interface includes an option for SMTP with Smart Call Home, currently this is not
actually implemented in the Expressway.
19
Cisco Expressway Series Release Notes
■ The Expressway-E should count one RMS license for each Jabber Guest call, but it does not. This issue may
cause confusion about the server's load, because usage appears low even when the server is processing
multiple calls. Bug ID CSCva36208 refers.
■ This issue only applies to users who have a Jabber Guest version earlier than release 11.1(2), users with
11.1(2) and later are not affected. In affected cases, although each Jabber Guest call ought to consume an
RMS license on the Cisco Expressway-E, in reality the RMS licenses are consumed on the Cisco Expressway-
C. This issue was identified in X8.10 and Bug ID CSCvf34525 refers. Contact your Cisco representative if you
are affected by it.
Note that we recommend the Dual NIC Jabber Guest deployment.
20
Cisco Expressway Series Release Notes
Limitations
Limitations
Some Expressway Features are Preview or Have External Dependencies
Important: We aim to provide new Expressway features as speedily as possible. Sometimes it is not possible to
officially support a new feature because it may require updates to other Cisco products which are not yet available,
or known issues or limitations affect some deployments of the feature. If customers might still benefit from using the
feature, we mark it as "preview" in the release notes. Preview features may be used, but you should not rely on them
in production environments (see Preview Features Disclaimer, page 1). Occasionally we may recommend that a
feature is not used until further updates are made to Expressway or other products.
Expressway features which are provided in preview status only in this release, are listed in the Feature History table
earlier in these notes.
Unsupported Functionality
■ Currently, if one Expressway node in a clustered deployment fails or loses network connectivity for any
reason, or if the Unified CM restarts, all active calls going through the affected node will fail. The calls are not
handed over to another cluster peer. This is not new behavior in X12.5.x, but due to an oversight it was not
documented in previous releases. Bug ID CSCtr39974 refers.
■ Expressway does not terminate DTLS. We do not support DTLS for securing media and SRTP is used to secure
calls. Attempts to make DTLS calls through Expressway will fail. The DTLS protocol is inserted in the SDP but
only for traversing the encrypted iX protocol.
■ From X12.5, Expressway provides limited SIP UPDATE support over MRA connections for session refresh
purposes only, as specified by RFC 4028. However, you should not switch this on unless you have a specific
requirement to use this capability. Any other use of SIP UPDATE is not supported and features that rely on this
method will not work as expected.
■ Audio calls may be licensed as video calls in some circumstances. Calls that are strictly audio-ONLY consume
fewer licenses than video calls. However, when audio calls include non-audio channels, such as the iX
channel that enables ActiveControl, they are treated as video calls for licensing purposes.
21
Cisco Expressway Series Release Notes
Limitations
These alarms also occur if a peer is removed from a cluster. This is generally valid alarm behavior in the case of
removing a peer. However, as in the case of adding a peer, the alarms may not be lowered for 5 minutes or more.
Virtual Systems
Video calling capacity may be restricted if the ESXi Side-Channel-Aware Scheduler is enabled, and CPU load
exceeds 70%.
With physical Expressway appliances, the Advanced Networking feature allows the speed and duplex mode to be
set for each configured Ethernet port. You cannot set port speeds for virtual machine-based Expressway systems.
Also, virtual machine-based systems always show the connection speed between Expressway and Ethernet networks
as 10000 Mb/s, regardless of the actual physical NIC speed. This is due to a limitation in virtual machines, which
cannot retrieve the actual speed from the physical NIC(s).
CE1200 Appliance
■ Specific requirements for the X710 firmware version exist, which may change depending on the current
versions available. Please check the Expressway CE1200 Installation Guide, in the section "Required
Firmware Version" for the latest details.
■ The appliance requires the minimum Expressway software version detailed in the Cisco Expressway CE1200
Installation Guide (the version depends on the appliance revision). Although the system does not prevent
downgrades to an earlier software version, Cisco does not support appliances on earlier versions.
■ The Expressway allows you to add or delete Traversal Server or Expressway Series keys through the CLI, but in
practice these keys have no effect in the case of CE1200 appliances. The service setup wizard (Type setting)
manages whether the appliance is an Expressway-C or an Expressway-E, rather than the Traversal Server key
as for earlier appliances.
Language Packs
If you translate the Expressway web user interface, new Expressway language packs are available from X8.10.4.
Older language packs do not work with X8.10.n software (or X8.9.n). Instructions for installing or updating the packs
are in the Expressway Administrator Guide.
22
Cisco Expressway Series Release Notes
Limitations
■ If you connect through the firewall to the Cisco Webex cloud, each of the additional Expressway-Es which
configure a traversal zone with the traversal client role, will consume a Rich Media Session license (per call).
As before, the original Expressway-C and Expressway-E pair do not consume a license.
■ If you connect through the firewall to a third-party organization (Business to Business call), all of the
Expressway-Es in the chain, including the original one in the traversal pair, will consume a Rich Media Session
license (per call). As before, the original Expressway-C does not consume a license.
23
Cisco Expressway Series Release Notes
Limitations
Note: If your deployment opts to strictly enforce MRA policy, then endpoints that don't support self-describing tokens
("OAuth with Refresh") cannot use MRA. This includes Cisco TelePresence TC and CE endpoints, and Cisco IP Phone
7800 or 8800 Series endpoints that don’t have the onboarding with activation codes feature.
TURN Servers
Currently, the TCP 443 TURN service and TURN Port Multiplexing are not supported through the CLI. Use the
Expressway web interface to enable these functions (Configuration > Traversal > TURN).
24
Cisco Expressway Series Release Notes
Interoperability
Interoperability
Test Results
The interoperability test results for this product are posted to http://www.cisco.com/go/tp-interop, where you can
also find interoperability test results for other Cisco TelePresence products.
25
Cisco Expressway Series Release Notes
Upgrading to X12.5.7
Upgrading to X12.5.7
Upgrade Prerequisites and Software Dependencies
A release key is not required to upgrade a system on X8.6.x or later software to this release (from X8.11.4 to X12.5.7
for example). This change was introduced in X12.5.4.
CAUTION: This section has important information about issues that may prevent the system working properly
after an upgrade. Before you upgrade, please review this section and complete any tasks that apply to your
deployment.
Expressway systems on X8.5.3 or earlier need a two-stage upgrade
If you are upgrading a system which is running software earlier than version X8.6, you must first upgrade to an
intermediate release before you install X12.5.7 software (this requirement applies to all upgrades to X8.11.x and
later versions). Depending on the existing system version, the upgrade will fail due to file size problems and there is a
risk of data corruption due to database format changes in later versions.
We recommend upgrading to X8.8.2 as the intermediate release. However, if you have specific reasons to prefer a
different version, you can upgrade to any version between X8.6 and X8.8.2 inclusive, before you install this X12.5.7
software.
— Try the secure traversal test before and after upgrade (Maintenance > Security > Secure traversal test) to
validate TLS connections.
— Are your Unified Communications nodes using valid certificates that were issued by a CA in the
Expressway-Cs' trust list?
— If you use self-signed certificates, are they unique? Does the trusted CA list on Expressway have the self-
signed certificates of all the nodes in your deployment?
— Are all entries in the Expressway's trusted CA list unique? You must remove any duplicates.
— If you have TLS verify enabled on connections to other infrastructure (on by default for Unified
Communications traversal zone, and optional for zones to Unified Communications nodes), ensure that the
hostname is present in the CN or SAN field of the host's certificate. We do not recommend disabling
TLS verify mode, even though it may be a quick way to resolve a failing deployment.
■ DNS entries: Do you have forward and reverse DNS lookups for all infrastructure systems that the Expressway
interacts with? From X8.8, you must create forward and reverse DNS entries for all Expressway-E systems, so
that systems making TLS connections to them can resolve their FQDNs and validate their certificates. If the
Expressway cannot resolve hostnames and IP addresses of systems, complex deployments like MRA may not
work as expected after the upgrade.
26
Cisco Expressway Series Release Notes
Upgrading to X12.5.7
■ Cluster peers: Do they have valid certificates? If they currently use default certificates, you should replace
them with (at least) internally generated certificates and update the peers trust lists with the issuing CA. From
X8.8, clustering communications use TLS connections between peers instead of IPSec. By default,
TLS verification is not enforced after the upgrade, and an alarm will remind you to enforce it.
Deployments that use MRA
This section only applies if you use the Expressway for MRA (mobile and remote access with Cisco Unified
Communications products).
■ Minimum versions of Unified Communications infrastructure software apply - some versions of Unified CM,
IM and Presence Service, and Cisco Unity Connection have been patched with CiscoSSL updates. Check that
you are running the minimum versions described in the Expressway MRA deployment guide, before you
upgrade Expressway (see Mobile and Remote Access Through Cisco Expressway on the Expressway
configuration guides page).
IM and Presence Service 11.5 is an exception. You must upgrade Expressway to X8.8 or later before you
upgrade IM and Presence Service to 11.5.
■ Expressway-C and Cisco Expressway-E should be upgraded together. We don't recommend operating with
Expressway-C and Expressway-E on different versions for an extended period.
■ This item applies if you are upgrading a Expressway that is used for MRA, with clustered Unified CMs and
endpoints running TC or Collaboration Endpoint (CE) software. In this case you must install the relevant TC or
CE maintenance release listed below (or later) before you upgrade the Expressway. This is required to avoid a
known problem with failover. If you do not have the recommended TC/CE maintenance release, an endpoint
will not attempt failover to another Unified CM if the original Unified CM to which the endpoint registered fails
for some reason. Bug ID CSCvh97495 refers.
— TC7.3.11
— CE8.3.3
— CE9.1.2
■ Versions from X8.10.x move MRA authentication (access control) settings from Expressway-E to Expressway-
C and apply default values where it is not possible to retain existing settings. After you upgrade you must
reconfigure the access control settings on the Expressway as described later in these upgrade instructions.
Deployments that use X8.7.x or earlier with Cisco Unified Communications Manager IM and Presence Service
11.5(1)
X8.7.x and earlier versions of Expressway are not interoperable with Cisco Unified Communications Manager IM and
Presence Service 11.5(1) and later. You must upgrade the Expressway software before the IM and Presence Service
software. More details are in Interoperability, page 25.
Deployments that use Cisco Webex Hybrid Services
The Management Connector must be up to date before you upgrade Expressway. Authorize and accept any
Management Connector upgrades advertised by the Cisco Webex cloud before you try to upgrade Expressway.
Failure to do so may cause issues with the connector after the upgrade. For details about which versions of
Expressway are supported for hybrid connector hosting, see Connector Host Support for Cisco Webex Hybrid
Services
27
Cisco Expressway Series Release Notes
Upgrading to X12.5.7
Upgrade Instructions
Process
This process does not apply if you are upgrading a clustered system, or a Expressway that uses device provisioning
(Cisco TMSPE), or FindMe (with Cisco TMS managing Expressway). In those cases, follow the directions in the
Expressway Cluster Creation and Maintenance Deployment Guide instead.
1. Backup the Expressway system before you upgrade (Maintenance > Backup and restore).
2. Enable maintenance mode:
28
Cisco Expressway Series Release Notes
Upgrading to X12.5.7
— If you don't use MRA, the upgrade is now complete and all Expressway configuration should be as
expected.
— If you do use MRA, and you are upgrading from X8.9.x or earlier, you need to reconfigure your MRA access
control settings as described in Appendix 1: Post-Upgrade Tasks for MRA Deployments, page 31
29
Cisco Expressway Series Release Notes
1. If you plan to use the log analysis tool, first collect the logs from your Expressway.
2. Sign in to https://cway.cisco.com/tools/CollaborationSolutionsAnalyzer/
3. Click the tool you want to use. For example, to work with logs:
a. Click Log analysis.
b. Upload the log file(s).
c. Select the files you want to analyze.
d. Click Run Analysis.
The tool analyzes the log files and displays the information in a format which is much easier to understand
than the raw logs. For example, you can generate ladder diagrams to show SIP calls.
1. Type the product name in the Search field and click Search.
2. From the list of bugs that appears, use the Filter drop-down list to filter on either Keyword, Modified Date,
Severity, Status, or Technology.
Use Advanced Search on the Bug Search Tool home page to search on a specific software version.
The Bug Search Tool help pages have further information on using the Bug Search Tool.
30
Cisco Expressway Series Release Notes
1. On the Expressway-C, go to Configuration > Unified Communications > Configuration > MRA Access
Control.
2. Do one of the following:
— To take advantage of the new MRA access control methods from X8.10, set the appropriate values on this
page for your chosen methods. See the first table below for help about which values to apply.
— Or to retain your pre-upgrade authentication approach, set the appropriate values on this page to match
your previous settings on the Expressway-E. See the second table below for help about how to map the old
Expressway-E settings to their new equivalents on the Expressway-C.
3. If you configure self-describing tokens (Authorize by OAuth token with refresh), refresh the Unified CM
nodes: Go to Configuration > Unified Communications > <UC server type> and click Refresh servers.
Important!
■ The Check for internal authentication availability setting will be off after the upgrade. Depending on the
authentication settings on the Unified CM, this may prevent remote login by some Cisco Jabber users.
■ The Exclusive option in X8.9 is now configured by setting Authentication path to SAML SSO authentication.
This has the effect of prohibiting authentication by username and password.
The fields you actually see in the Web UI depend on whether MRA is enabled (Unified Communications mode set to
Mobile and remote access) and on the selected authentication path. Not all the fields in the table are necessarily
displayed.
UCM/LDAP basic authentication: Clients are authenticated locally by the Unified CM UCM/LDAP
against their LDAP credentials. after MRA
turned on
SAML SSO and UCM/LDAP: Allows either method.
None: No authentication is applied. This is the default setting until MRA is first
enabled. The "None" option is needed (rather than just leaving MRA turned off)
because some deployments must turn on MRA to allow functions which are not
actually MRA. (Such as the Web Proxy for Meeting Server, or XMPP Federation.)
Only these customers should use "None". Do not use it in other cases.
Authorize by This option requires self-describing tokens for authorization. It's our recommended On
OAuth token authorization option for all deployments that have the infrastructure to support them.
with refresh
Only Jabber clients are currently capable of using this authorization method. Other
MRA endpoints do not currently support it. The clients must also be in OAuth token
with refresh authorization mode.
31
Cisco Expressway Series Release Notes
Authorize by Available if Authentication path is SAML SSO or SAML SSO and UCM/LDAP. Off
OAuth token
(previously This option requires authentication through the IdP. Currently, only Jabber clients are
SSO Mode) capable of using this authorization method, which is not supported by other MRA
endpoints.
Authorize by Available if Authentication path is UCM/LDAP or SAML SSO and UCM/LDAP. Off
user
credentials Clients attempting to perform authentication by user credentials are allowed through
MRA. This includes Jabber, and supported IP phone and TelePresence devices.
Check for Available if Authorize by OAuth token with refresh or Authorize by OAuth token is No
internal enabled.
authentication
availability The default is No, for optimal security and to reduce network traffic.
The request asks whether the client may try to authenticate the user by OAuth token,
and includes a user identity with which the Expressway-C can find the user's home
cluster:
Yes: The get_edge_sso request will ask the user’s home Unified CM if OAuth tokens
are supported. The home Unified CM is determined from the identity sent by the
Jabber client's get_edge_sso request.
No: If the Expressway is configured not to look internally, the same response will be
sent to all clients, depending on the Edge authentication settings.
The option to choose depends on your implementation and security policy. If all
Unified CM nodes support OAuth tokens, you can reduce response time and overall
network traffic by selecting No. Or select Yes if you want clients to use either mode
of getting the edge configuration - during rollout or because you can't guarantee
OAuth on all nodes.
Caution: Setting this to Yes has the potential to allow rogue inbound requests from
unauthenticated remote clients. If you specify No for this setting, the Expressway
prevents rogue requests.
32
Cisco Expressway Series Release Notes
Identity Available if Authentication path is SAML SSO or SAML SSO and UCM/LDAP. —
providers:
Create or Selecting an Identity Provider
modify IdPs
Cisco Collaboration solutions use SAML 2.0 (Security Assertion Markup Language)
to enable SSO (single sign-on) for clients consuming Unified Communications
services.
If you choose SAML-based SSO for your environment, note the following:
■ SAML 2.0 is not compatible with SAML 1.1 and you must select an IdP that
uses the SAML 2.0 standard.
■ SAML-based identity management is implemented in different ways by
vendors in the computing and networking industry, and there are no widely
accepted regulations for compliance to the SAML standards.
■ The configuration of and policies governing your selected IdP are outside the
scope of Cisco TAC (Technical Assistance Center) support. Please use your
relationship and support contract with your IdP Vendor to assist in configuring
the IdP properly. Cisco cannot accept responsibility for any errors, limitations,
or specific configuration of the IdP.
■ OpenAM 10.0.1
■ Active Directory Federation Services 2.0 (AD FS 2.0)
■ PingFederate® 6.10.0.4
Identity Available if Authentication path is SAML SSO or SAML SSO and UCM/LDAP. —
providers:
Export SAML For details about working with SAML data, see SAML SSO Authentication Over the
data Edge, page 1.
33
Cisco Expressway Series Release Notes
Allow Jabber By default the IdP or Unified CM authentication page is displayed in an embedded No
iOS clients to web browser (not the Safari browser) on iOS devices. That default browser is unable
use embedded to access the iOS trust store, and so cannot use any certificates deployed to the
Safari devices.
This setting optionally allows Jabber on iOS devices to use the native Safari browser.
Because the Safari browser is able to access the device trust store, you can now
enable password-less authentication or two-factor authentication in your OAuth
deployment.
A potential security issue exists for this option. The mechanism to return browser
control from Safari to Jabber after the authentication completes, uses a custom URL
scheme that invokes a custom protocol handler. It's possible that another application
other than Jabber could intercept the scheme and gain control from iOS. In that
case, the application would have access to the OAuth token in the URL.
If you are confident that your iOS devices will not have other applications that
register the Jabber custom URL scheme, for example because all mobile devices are
managed, then it's safe to enable the option. If you are concerned about the
possibility of another app intercepting the custom Jabber URL, then do not enable
the embedded Safari browser.
34
Cisco Expressway Series Release Notes
Notes:
■ Authentication path=UCM/LDAP
■ Authorize by user
credentials=On
■ Authentication path=SAML
SSO/and UCM/LDAP
■ Authorize by OAuth token=On
■ Authorize by user
credentials=On
Identity providers: Create or modify Pre-upgrade setting is applied Expressway- Expressway-C (no
IdPs C change)
Identity providers: Export SAML data Pre-upgrade setting is applied Expressway- Expressway-C (no
C change)
SIP token extra time to live Pre-upgrade setting is applied Expressway- Expressway-C (no
C change)
35
Cisco Expressway Series Release Notes
Cisco Trademark
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other
countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks
mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
36