Cisco Expressway X8.11.4: Release Notes
Cisco Expressway X8.11.4: Release Notes
X8.11.4
Release Notes
First Published: July 2018
Last Updated: December 2019
Contents
Preface 3
Change History 3
Supported Platforms 5
Related Documents 6
Feature History 8
CAUTION - Please Read Before you Install X8.11.4 10
Changes in X8.11.4 10
Changes in X8.11.3 10
Changes in X8.11.2 11
Changes in X8.11.1 11
Features in X8.11 (now in X8.11.4) 12
Device Registration Enhancements 12
Multiway on Expressway 12
Improved Integration with Cisco Meeting Server 13
TURN Server Enhancements 15
Security Enhancements 15
1
Cisco Expressway Series Release Notes
2
Cisco Expressway Series Release Notes
Preface
Preface
Change History
Table 1 Release Notes Change History
December 2019 Correct default setting for OAuth token with Document
refresh (Table 6) to "On". correction
3
Cisco Expressway Series Release Notes
Preface
4
Cisco Expressway Series Release Notes
Preface
Supported Platforms
Table 2 Expressway Software Versions Supported by Platform
* As of 26th February 2016, you cannot order the CE500 and CE1000 appliances from Cisco. See the End-of-sale
announcement for other important dates in the lifecycle of these platforms.
Advance Notice - Hardware Service Support for CE500 and CE1000 Appliances to be
Withdrawn
Cisco will withdraw support services for the Cisco Expressway CE500 and CE1000 appliance hardware platforms in a
future release. More details are available in the End-of-sale announcement.
5
Cisco Expressway Series Release Notes
Related Documents
Table 3 Links to Related Documentation
Installation - virtual Cisco Expressway Virtual Machine Installation Guide on the Expressway installation
machines guides page
Installation - physical For Expressway: Cisco Expressway CE1200 Appliance Installation Guide on the
appliances Expressway installation guides page
For VCS:Cisco Video Communication Server CE1100 Appliance Installation Guide on the
VCS installation guides page
Basic configuration for For Expressway:Cisco Expressway Registrar Deployment Guide on the Expressway
registrar / single configuration guides page
systems
For VCS:Cisco Single VCS Control - Basic Configuration Deployment Guide on the VCS
configuration guides page
Basic configuration for For Expressway:Cisco Expressway-E and Expressway-C Basic Configuration
firewall traversal / Deployment Guide on the Expressway configuration guides page
paired systems
For VCS:Cisco TelePresence VCS Basic Configuration (Control with Expressway)
Deployment Guide on the VCS configuration guides page
For VCS:
Cisco TelePresence VCS Administrator Guide on the Cisco TelePresence VCS maintain
and operate guides page
Cisco TelePresence VCS Serviceability Guide on the Cisco TelePresence VCS maintain
and operate guides page
Clustering Cisco Expressway Cluster Creation and Maintenance Deployment Guide on the Cisco
Expressway Series configuration guides page
Certificates Cisco Expressway Certificate Creation and Use Deployment Guide on the Expressway
configuration guides page
Rest API Cisco Expressway REST API Reference Guide on the Expressway configuration guides
page
Unified Mobile and Remote Access Through Cisco Expressway on the Expressway configuration
Communications guides page
6
Cisco Expressway Series Release Notes
Cisco Meeting Server Cisco Meeting Server with Cisco Expressway Deployment Guide on the Expressway
configuration guides page
Cisco Meeting Server API Reference Guide on the Cisco Meeting Server programming
guides page
Other Cisco Meeting Server guides are available on the Cisco Meeting Server
configuration guides page
Microsoft infrastructure Cisco Expressway with Microsoft Infrastructure Deployment Guide on the Expressway
configuration guides page
Cisco Jabber and Microsoft Skype for Business Infrastructure Configuration Cheatsheet
on the Expressway configuration guides page
Multiway Conferencing Cisco TelePresence Multiway Deployment Guide on the Expressway configuration guides
page
7
Cisco Expressway Series Release Notes
Feature History
Feature History
Table 4 Feature History by Release Number
8
Cisco Expressway Series Release Notes
Feature History
Information about
BiB over MRA is
now available in the
Mobile and Remote
Access Through
Cisco Expressway
guide
9
Cisco Expressway Series Release Notes
Changes in X8.11.4
Cisco Jabber 12.5 or later is needed if you want chat/messaging services over MRA with authentication using OAuth
refresh (self-describing tokens) and you configure IM and Presence Service presence redundancy groups. With this
release of Expressway, user login failures will occur in this scenario if Jabber versions before 12.5 are in use.
Changes for security advisory
X8.11.4 is a maintenance release to address a security advisory, published by Cisco at
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd and tracked by
CDETS CSCvn17278.
Changes to other open issues
Some other issues are fixed in this maintenance release, and the search lists for Open and Resolved Issues, page 22
have been updated accordingly.
MRA changes (customer documentation)
The customer documentation is now fixed to include these previously undocumented limitations for recording over
Mobile and Remote Access (MRA) connections, including Built-in-Bridge (BiB) recording:
■ Recording only works for direct person-to-person calls, and not for conferences.
■ Recording is not currently supported for Silent Monitoring and Whisper Coaching features.
Web Proxy for Cisco Meeting Server changes
This item applies if you use Expressway as a Web Proxy for Cisco Meeting Server, to support Cisco Meeting WebRTC
Apps. Previously, the Expressway WebRTC socket timeout value caused WebRTC calls to drop after 1 hour (3600
seconds). The timeout is now extended to 12 hours (43,200 seconds). Currently this setting is not configurable
(CDETS CSCvn28708 refers).
Changes in X8.11.3
Changes to open issues and limitations
X8.11.3 is a maintenance release. The search lists for Open and Resolved Issues, page 22 have been updated.
Some limitations are fixed or mitigated in this release:
■ Previously we did not support dual-homed conferences for Microsoft-based users with a Meeting Server Call
Bridge cluster, and Expressway as the edge for Meeting Server. This scenario is now supported.
■ Medium sized appliance-based systems with a 1 Gbps NIC are automatically converted to a Large system on
upgrade. The resulting demultiplexing port behavior by Expressway causes dropped calls unless the default
demultiplexing ports for Large systems are opened on the firewall. In this release you can use the new system
size selection setting to manually reset the default size to Medium (see next point).
10
Cisco Expressway Series Release Notes
Changes in X8.11.2
■ For Cisco Expressway CE1200 appliances configured as Expressway-E systems, previously you could not use
any REST API commands that specifically apply to Expressway-E. The commands are now supported.
System size selection for appliances
For CE1100 or CE1200 appliances, you can now manually change the system size to Medium or Large. To do this, go
to the System > Administration settings page and select the required size from the Deployment Configuration list.
Changes in X8.11.2
Changes to open issues
X8.11.2 is a maintenance release. The search lists for Open and Resolved Issues, page 22 have been updated.
MRA changes
The following change applies for deployments that use the Cisco Unified Communications Manager Mobile and
Remote Access (MRA) feature:
■ For supported devices, the Cisco Finesse agent and contact center thin-client desktop is now supported over
MRA connections.
Changes in X8.11.1
New CE1200 appliance
A new CE1200 appliance is introduced in conjunction with this software maintenance release.
If you deploy existing CE500, CE1000, or CE1100 appliances, this section highlights some of the differences in the
CE1200:
■ The CE1200 is designed for use with the Cisco Expressway Series product range, and does not support the
Cisco VCS product. It ships with the release key pre-installed.
■ Unlike earlier appliances, the CE1200 is a single, multi-purpose server that can operate as a Cisco
Expressway-C or a Cisco Expressway-E. By default it always ships with Expressway-C preinstalled. To deploy
the server as an Expressway-E, you configure the Type option as Expressway-E, in the Service Setup Wizard
(the wizard runs when you first launch the Expressway web user interface, or you can run it anytime from the
Status > Overview page). The Traversal Server option key is no longer used to change to an Cisco
Expressway-E.
■ The CE1200 can support up to 5000 registrations for Mobile and Remote Access, an increase on the 2500
MRA registrations supported by other physical appliances or VM-based systems.
To add a CE1200 appliance to an existing cluster that has CE1100 models in it, configure the Type option to match
the other peers (Expressway-E or Expressway-C) through the service setup wizard on the Status > Overview page,
before you add the CE1200 to the cluster.
Jabber Guest license issue in single-NIC deployments resolved
Subject to running Jabber Guest 11.1.2 version or later, this maintenance release resolves a previous issue with RMS
licenses for Jabber Guest calls being consumed on Expressway-C instead of on Expressway-E (CDETS CSCvf34525).
Note: A separate issue with Jabber Guest in single-NIC deployments still exists, concerning the Expressway-E failing
to count an RMS license per Jabber Guest call (CDETS CSCva36208).
MRA changes
These changes apply to deployments that use the Cisco Unified Communications Manager Mobile and Remote
Access (MRA) feature:
■ Hunt groups (including hunt pilots and hunt lists) are supported over MRA, if you are running Cisco Unified
Communications Manager version 11.5(1)SU5 or a later version that has the relevant change.
11
Cisco Expressway Series Release Notes
■ The Expressway CE1200 appliance is verified as supporting up to 5000 registrations for Mobile and Remote
Access, up from 2500 verified for previous appliances. (This change does not apply to earlier physical
appliance models, or VM systems, which remain at 2500 MRA registrations.)
Registrations to Expressway-E
From X8.11 we support SIP registrar and H.323 Gatekeeper functionality on the Cisco Expressway-E, so you can now
register SIP and H.323 endpoints directly to the Expressway-E.
Licensing
If you have existing licenses on the Expressway-C and want to register some or all of your existing licensed endpoints
to the Expressway-E, you need to manually delete the relevant option key(s) from the Expressway-C and reload them
on the Expressway-E.
Information for H.323 devices
■ As with H.323 registrations to the Expressway-C, each H.323 device registered to Expressway-E consumes a
TelePresence Room System License.
■ Currently we do not support proxy registrations by remote H.323 devices to Expressway-C or Expressway-E.
Changes to Cisco TMS Provisioning Access (Users, FindMe, Phone Book and Device Provisioning)
The Expressway can optionally access FindMe and other provisioning services hosted by Cisco TMS (through the
Cisco TMSPE). Previously, this was enabled by default on Expressway if you had the necessary option keys.
From X8.11, the Cisco TMS-hosted provisioning services are enabled through the System > Administration settings
page in the web user interface or the device provisioning CLI command (xconfiguration Administration
DeviceProvisoning). You do not need special option keys or licenses to enable these services. The following device
provisioning services are available:
■ Users
■ FindMe
■ Phone Books
■ Devices
For new installations all services are off by default. For existing systems your current service settings are preserved
and remain unchanged after upgrading.
From X8.11, we support device provisioning on the Cisco Expressway-E, as well as on the Cisco Expressway-C as
before. Although device provisioning is now supported on both components, for deployments with a paired
Expressway-C and Expressway-E, we recommend that you use it on the Expressway-C.
Multiway on Expressway
The Cisco Expressway Series now supports Multiway conferencing, which was previously only supported on the
Cisco VCS product. Subject to Multiway-compliant endpoints and Cisco TelePresence Server or Cisco TelePresence
MCU Series conference bridges, a video caller in a point-to-point call can manually add a third person to the call, to
create an instant conference.
Note: Multiway conferencing relies on an underlying Cisco Expressway feature known as 'Conference Factory'.
Because of this, some documentation, licensing, and user interface settings related to Multiway conferencing use
the term Conference Factory.
12
Cisco Expressway Series Release Notes
Licensing
The Multiway conferencing feature requires a 'Conference System' licence on Cisco Expressway-C. This license is
free, but it takes up one registration resource when you enable Conference Factory (that is, Multiway conferencing).
(Preview) SIP Proxy to Multiple Meeting Server Conference Bridges (Support for Meeting Server
Load Balancing)
This feature is currently in preview status only. It is not supported with Cisco Meeting Server software version 2.3 or
earlier. Also, a Limitation currently exists regarding support for dual-homed conferences with a Meeting Server
cluster.
From X8.11, Cisco Expressway Series supports the mechanism that is used to load balance the calls between
Meeting Servers that are in call bridge groups.
When Cisco Meeting Servers are in a call bridge group, and a participant tries to join a space on a server that has no
capacity, that server rejects the call with the response code "488 Not Acceptable Here". This call is then rerouted to
another server by the call control layer. That other server then sends a SIP INVITE to the call control layer, using the
original call details. The participant is now in the correct space, on a different Meeting Server. In cases where there is
capacity in the “second” server, but another Meeting Server has more capacity, it asks that Meeting Server in the
group to send the SIP INVITE.
There is a new setting in the neighbor zone called Meeting Server load balancing which must be enabled
(Configuration > Zones > Zones > Zone Name > Advanced). This setting allows the Cisco Expressway's B2BUA to
process the INVITE from the "second" Meeting Server to enable the participant to connect.
We recommend that Meeting Server load balancing is set to On regardless of whether endpoints are registered with
Expressway or with Unified CM.
■ The Expressway-C regularly queries the DNS to detect any deliberate changes to your deployment; for
example, host addresses being added to or removed from the SRV record.
■ The Expressway-C probes the host addresses returned by DNS to check if they are reachable and that they
are web bridges (using an API call).
13
Cisco Expressway Series Release Notes
■ If an address is not reachable, or the host is not a web bridge, then the Expressway-C stops sending
webRTC connections to that address.
■ If the DNS SRV query is successful, the results, including weight and priority, are shown in the status area of
the UI page.
■ The UI also shows a "failed" or "active" status for each address.
Note: Expressway-C does not maintain stateful connections from the Cisco Meeting WebRTC App to the Meeting
Server web bridge. If a connection fails, for example a web bridge host goes down, the existing call to that host is lost
and the client should attempt to re-establish the call to the web bridge. In this case, the Expressway would not proxy
the new WebRTC connection to the failed host.
Figure 1 Cisco Meeting WebRTC App and Cisco Meeting App sharing a TURN server
In the diagram, the Expressway-E is configured to listen on TCP 443 for TURN requests and for WebRTC requests.
The TURN clients (Meeting Server Core, Meeting App, and Cisco Meeting WebRTC App) will all try to use UDP 3478
for TURN requests.
If the WebRTC App cannot make the outbound connection to UDP 3478, it uses the TCP override port, which is 443
by default, to request media relays.
The Meeting Server Edge is still required to traverse the XMPP signalling for Cisco Meeting Apps. However, there is no
need to use the TURN services of the Meeting Server Edge server.
14
Cisco Expressway Series Release Notes
Security Enhancements
■ The new key is created when you upgrade to X8.11, and is used to encrypt all data on the first restart.
■ Only this key can be used to decrypt data from this system. No other Expressway key can decrypt this system's
data.
■ The key is never exposed on the UI. It is never logged, either locally or remotely.
■ The SSH tunnels between Expressway-C and Expressway-E have configurable cipher and key exchange
algorithms.
■ You can change Ciphers and Public Key Algorithms settings in the Maintenance > Security > SSH
configuration web UI page.
■ Logging can be set to a certification-compliant mode (on Maintenance > Logging, change the Certification
logging mode).
■ An option to force new administrators to reset their passwords. The option is on Users > Administrator
accounts, when you add a new user.
Note: Also as part of Common Criteria work for Expressway, CA certificate checking now requires the
BasicConstraints extension to be present.
15
Cisco Expressway Series Release Notes
The Expressway-C then attempts the AXL connection to the hosts returned by DNS, as normal.
This is relevant if you connect to external nodes in a different sub-domain from the Expressway-C, and use non-
qualified hostnames. Expressway can now resolve the hostnames into FQDNs, and you don't need to enter the host
FQDNs when configuring connections between nodes.
Note: This change is a general system enhancement for Expressway and is not limited to MRA use.
16
Cisco Expressway Series Release Notes
■ Cisco Unified Communications Manager does not allow Jabber mobile devices to be CTI-monitored.
■ Jabber does not support injecting recording tones into the media stream.
■ The Expressway is configured to process self-describing tokens for MRA authorization (set Authorize by
OAuth token with refresh to On).
■ Other products in the call path also support self-describing tokens, including the access policy element of the
tokens.
Note: As MRA access policy can only be enforced if the clients use self-describing tokens, it's most effective when
self-describing token authorization is the only permitted authorization method for MRA.
Serviceability Improvements
17
Cisco Expressway Series Release Notes
Note: If you are upgrading an existing system that has these keys applied, for administrator convenience the keys
remain visible in the web user interface after the upgrade, even though they are no longer needed.
■ IP addresses preserved
■ Server certificate, associated private key, and CA trust store preserved
■ Admin and root accounts and passwords preserved
■ SSH keys preserved
■ Option keys preserved
■ HTTPS access enabled
■ SSH access enabled
CAUTION: You MUST follow the published clustering guidance when forming, changing, or upgrading Expressway
clusters. Your cluster may be unrecoverable and you may lose data if you do not follow the correct sequence.
See the Cisco Expressway Cluster Creation and Maintenance Deployment Guide, for your version, on the Cisco
Expressway Series configuration guides page.
■ Schedule-based: inventory, telemetry and configuration messages used to generate a Device Report and
improve hardware and software quality by identifying failure trends. You can find these notifications posted on
the first day of every month.
■ Event-based: ad hoc events already supported by Expressway such as alarms and ACRs. You will find these
notifications posted to the Smart Call Home server as and when they occur.
Note: Although the web user interface includes an option for SMTP with Smart Call Home, currently this is not
actually implemented in the Expressway.
18
Cisco Expressway Series Release Notes
The Expressway connectivity test page shows the DNS response and the connection attempts. For any connection
failures, the reason is provided along with advice to help with resolving specific issues.
To troubleshoot connectivity, you can download the TCP data from your test in .pcap format. You can selectively
download a dump of the DNS query, or a specific connection attempt, or you can get a single .pcap file showing the
whole test.
Clustering X8.11
MRA X8.8
The API is self-documented using RESTful API Modeling Language (RAML). You can access the RAML definitions for
your system at https://<ip address>/api/provisioning/raml. A high-level summary of how to access and use the API
is available in Cisco Expressway REST API Summary Guide on the Expressway installation guides page.
19
Cisco Expressway Series Release Notes
■ X8.11 introduces a new "Webex" zone type—a DNS zone that is specifically designed for connecting to Cisco
Webex. This feature simplifies the configuration of Cisco Webex Hybrid Call Service. You can create or delete
one Webex zone, but you cannot modify it. See Hybrid Call Service documentation for more detail.
20
Cisco Expressway Series Release Notes
■ XMPP Federation with Expressway. The Cisco Unified Communications XMPP Federation Deployment Guide
for Expressway is now renamed to Chat and Presence Federation Using Cisco Expressway.
■ Minor enhancements to the documents. As well as adding the release features, we've made some minor
documentation corrections and changes.
21
Cisco Expressway Series Release Notes
■ Non-traversal calls (both endpoints registered to Expressway-C) do not increment the active call counter.
■ If you click the "Registered calls" link, it unexpectedly displays the Unified Communications status page.
Licensing issues with Jabber Guest calls in Single NIC deployments
Currently the software has some unexpected rich media session (RMS) licensing behavior for Jabber Guest calls in
Single NIC deployments.
■ The Expressway-E should count one RMS license for each Jabber Guest call, but it does not. This issue may
cause confusion about the server's load, because usage appears low even when the server is processing
multiple calls. CDETS CSCva36208 refers.
■ This issue only applies to users who have a Jabber Guest version earlier than release 11.1(2), users with
11.1(2) and later are not affected. In affected cases, although each Jabber Guest call ought to consume an
RMS license on the Cisco Expressway-E, in reality the RMS licenses are consumed on the Cisco Expressway-
C. This issue was identified in X8.10 and CDETS CSCvf34525 refers. Contact your Cisco representative if you
are affected by it.
Note that we recommend the Dual NIC Jabber Guest deployment.
22
Cisco Expressway Series Release Notes
Limitations
Limitations
Some Expressway Features are Preview or Have External Dependencies
Important: We aim to provide new Expressway features as speedily as possible. Sometimes it is not possible to
officially support a new feature because it may require updates to other Cisco products which are not yet available, or
known issues or limitations affect some deployments of the feature. If customers may still benefit from using the
feature, we mark it as "preview" in the release notes. Preview features may be used, but you should not rely on them
in production environments (see Preview Features Disclaimer, page 1). Occasionally, we may recommend that a
feature is not used until further updates are made to Expressway or other products.
Expressway features which are provided in preview status only in this release, are listed in the Feature History table
earlier in these notes.
Unsupported Functionality
■ The Expressway does not terminate DTLS. We do not support DTLS for securing media. SRTP is used to
secure calls instead, and attempts to make DTLS calls through Expressway will fail. The DTLS protocol is
inserted in the SDP, but only for traversing the encrypted iX protocol.
■ The Expressway does not support the SIP UPDATE method (RFC 3311). Features that rely on this method will
not work as expected.
■ Audio calls may be licensed as video calls in some circumstances. Calls that are strictly audio-ONLY consume
fewer licenses than video calls. However, when audio calls include non-audio channels, such as the iX
channel that enables ActiveControl, they are treated as video calls for licensing purposes.
■ Recording only works for direct person-to-person calls, and not for conferences.
■ Recording is not currently supported for Silent Monitoring and Whisper Coaching features.
23
Cisco Expressway Series Release Notes
Limitations
CE1200 Appliance
■ In certain scenarios, issues exist with restores of an Expressway-E onto a CE1200 appliance from a CE1100 or
earlier appliance backup. More details are provided in the upgrade instructions, including how to resolve each
issue:
— The CE1200 appliance may restore as an Expressway-C.
— An incorrect banner may display in the web user interface.
■ The CE1200 appliance requires Expressway software version X8.11.1 or later. Although the system does not
prevent downgrades to an earlier software version, Cisco does not support appliances that are running earlier
versions.
■ The Expressway allows you to add or delete Traversal Server or Expressway Series keys through the CLI, but in
practice these keys have no effect in the case of CE1200 appliances. The service setup wizard (Type setting)
manages whether the appliance is an Expressway-C or an Expressway-E, rather than the Traversal Server key
as for earlier appliances.
Virtual Systems
With physical Expressway appliances, the Advanced Networking option allows the speed and duplex mode to be set
for each configured Ethernet port. You cannot set port speeds for virtual machine-based Expressway systems.
Also, virtual machine-based systems always show the connection speed between Expressway and Ethernet
networks as 10000 Mb/s, regardless of the actual physical NIC speed. This is due to a limitation in virtual machines,
which cannot retrieve the actual speed from the physical NIC(s).
Language Packs
If you translate the Expressway web user interface, new Expressway language packs are available from X8.10.3.
Older language packs do not work with X8.10.n software (or X8.9.n). Instructions for installing or updating the packs
are in the Expressway Administrator Guide.
24
Cisco Expressway Series Release Notes
Limitations
■ If you connect through the firewall to the Cisco Webex cloud, each of the additional Expressway-Es which
configure a traversal zone with the traversal client role, will consume a Rich Media Session license (per call).
As before, the original Expressway-C and Expressway-E pair do not consume a license.
■ If you connect through the firewall to a third-party organization (Business to Business call), all of the
Expressway-Es in the chain, including the original one in the traversal pair, will consume a Rich Media Session
license (per call). As before, the original Expressway-C does not consume a license.
25
Cisco Expressway Series Release Notes
Limitations
TURN Servers
Currently, the TCP 443 TURN service and TURN Port Multiplexing are not supported through the CLI. Use the
Expressway web interface to enable these functions (Configuration > Traversal > TURN).
26
Cisco Expressway Series Release Notes
Interoperability
Interoperability
Test Results
The interoperability test results for this product are posted to http://www.cisco.com/go/tp-interop, where you can
also find interoperability test results for other Cisco TelePresence products.
27
Cisco Expressway Series Release Notes
Upgrading to X8.11.4
Upgrading to X8.11.4
Upgrade Prerequisites and Software Dependencies
CAUTION: This section has important information about issues that may prevent the system working properly
after an upgrade. Before you upgrade, please review this section and complete any tasks that apply to your
deployment.
Expressway systems on X8.5.3 or earlier need a two-stage upgrade
If you are upgrading a system which is running software earlier than version X8.6, you must first upgrade to an
intermediate version before you install X8.11.4 software (this requirement applies to all upgrades to X8.11.x and
later software). Depending on the existing system version, the upgrade will fail due to file size problems and there is a
risk of data corruption due to database format changes in later versions.
We recommend upgrading to X8.8.2 as the intermediate release. However, if you have specific reasons to prefer a
different version, you can upgrade to any version between X8.6 and X8.8.2 inclusive, before you install this X8.11.4
software.
— Try the secure traversal test before and after upgrade (Maintenance > Security > Secure traversal test) to
validate TLS connections.
— Are your Unified Communications nodes using valid certificates that were issued by a CA in the
Expressway-Cs' trust list?
— If you use self-signed certificates, are they unique? Does the trusted CA list on Expressway have the self-
signed certificates of all the nodes in your deployment?
— Are all entries in the Expressway's trusted CA list unique? You must remove any duplicates.
— If you have TLS verify enabled on connections to other infrastructure (always on by default for Unified
Communications traversal zone, and optional for zones to Unified Communications nodes) you must ensure
that the hostname is present in the CN or SAN field of the host's certificate. We do not recommend
disabling TLS verify mode, even though it may be a quick way to resolve a failing deployment.
■ DNS entries: Do you have forward and reverse DNS lookups for all infrastructure systems that the Expressway
interacts with?
From X8.8 onward, you must create forward and reverse DNS entries for all Expressway-E systems, so that
systems making TLS connections to them can resolve their FQDNs and validate their certificates.
If the Expressway cannot resolve hostnames and IP addresses of systems, your complex deployments (eg.
MRA) could stop working as expected after you upgrade.
28
Cisco Expressway Series Release Notes
Upgrading to X8.11.4
■ Cluster peers: Do they have valid certificates? If they are using default certificates you should replace them
with (at least) internally generated certificates and update the peers' trust lists with the issuing CA.
From X8.8, clustering communications use TLS connections between peers instead of IPSec. TLS verification
is not enforced (by default) after you upgrade, and you'll see an alarm reminding you to enforce TLS
verification.
Deployments that use CE1200 appliances
When you restore an Expressway-E onto a CE1200 appliance from a CE1100 or earlier appliance backup, the CE1200
appliance may restore as an Expressway-C. This issue occurs if the service setup wizard was used in the CE1100 or
earlier appliance to change the type to Expressway-C, and the wizard was not completed for the entire configuration.
To avoid this issue, do the following before you back up the appliance:
1. Run the service setup wizard and change the type to Expressway-E.
2. Complete the wizard to the end.
Also, if you restore the Expressway-E configuration onto a CE1200 appliance from a CE1100 backup, the CE1200
appliance restores as an Expressway-E (as expected). However, depending on how the CE1100 type was previously
configured, the web interface banner may display as Expressway-C. If you encounter this issue, go to the service
setup wizard (Status > Overview page) and change Type to Expressway-E, then restart the system. This issue only
occurs if the Traversal Server option key was used on the CE1100 to change the type to Expressway-E. If you used
the service setup wizard, you will not encounter the issue.
Deployments that use MRA
This section only applies if you use the Expressway for MRA (mobile and remote access with Cisco Unified
Communications products).
■ Minimum versions of Unified Communications infrastructure software apply - some versions of Unified CM,
IM and Presence Service, and Cisco Unity Connection have been patched with CiscoSSL updates. Check that
you are running the minimum versions described in the Expressway MRA deployment guide, before you
upgrade Expressway (see Mobile and Remote Access Through Cisco Expressway on the Expressway
configuration guides page).
IM and Presence Service 11.5 is an exception. You must upgrade Expressway to X8.8 or later before you
upgrade IM and Presence Service to 11.5.
■ Expressway-C and Cisco Expressway-E should be upgraded together. We don't recommend operating with
Expressway-C and Expressway-E on different versions for an extended period.
■ This item applies if you are upgrading a Expressway that is used for MRA, with clustered Unified CMs and
endpoints running TC or Collaboration Endpoint (CE) software. In this case you must install the relevant TC or
CE maintenance release listed below (or later) before you upgrade the Expressway. This is required to avoid a
known problem with failover. If you do not have the recommended TC/CE maintenance release, an endpoint
will not attempt failover to another Unified CM if the original Unified CM to which the endpoint registered fails
for some reason. CDETS CSCvh97495 refers.
— TC7.3.11
— CE8.3.3
— CE9.1.2
Note: Versions from X8.10.n move the MRA authentication (access control) settings from Expressway-E to
Expressway-C, and apply default values where it is not possible to retain your existing settings. For correct system
operation, after you upgrade you must reconfigure the access control settings on the Expressway, as described
later in these upgrade instructions.
Deployments that use X8.7.x or earlier with Cisco Unified Communications Manager IM and Presence Service
11.5(1)
X8.7.x (and earlier versions) of Expressway are not interoperable with Cisco Unified Communications Manager IM and
Presence Service 11.5(1) and later. And you must upgrade the Expressway software before the IM and Presence
Service software. More details are in Interoperability, page 27.
29
Cisco Expressway Series Release Notes
Upgrading to X8.11.4
30
Cisco Expressway Series Release Notes
Upgrading to X8.11.4
Upgrade Instructions
Process
This process does not apply if you are upgrading a clustered system, or a Expressway that uses device provisioning
(Cisco TMSPE), or FindMe (with Cisco TMS managing Expressway). In those cases, follow the directions in the
Expressway Cluster Creation and Maintenance Deployment Guide instead.
1. Backup the Expressway system before you upgrade (Maintenance > Backup and restore).
2. Enable maintenance mode:
31
Cisco Expressway Series Release Notes
Upgrading to X8.11.4
5. This step depends on whether or not you use the Expressway for MRA:
— If you don't use MRA, the upgrade is now complete and all Expressway configuration should be as
expected.
— If you do use MRA, go on to the next section and reconfigure your MRA access control settings.
1. On the Expressway-C, go to Configuration > Unified Communications > Configuration > MRA Access
Control.
2. Do one of the following:
— To take advantage of the new MRA access control methods from X8.10, set the appropriate values on this
page for your chosen methods. See the first table below for help about which values to apply.
— Or to retain your pre-upgrade authentication approach, set the appropriate values on this page to match
your previous settings on the Expressway-E. See the second table below for help about how to map the old
Expressway-E settings to their new equivalents on the Expressway-C.
3. If you configure self-describing tokens (Authorize by OAuth token with refresh), refresh the Unified CM
nodes: Go to Configuration > Unified Communications > <UC server type> and click Refresh servers.
Important!
■ The Check for internal authentication availability setting will be off after the upgrade. Depending on the
authentication settings on the Unified CM, this may prevent remote login by some Cisco Jabber users.
■ The Exclusive option in X8.9 is now configured by setting Authentication path to SAML SSO authentication.
This has the effect of prohibiting authentication by username and password.
The fields you actually see in the Web UI depend on whether MRA is enabled (Unified Communications mode set to
Mobile and remote access) and on the selected authentication path. Not all the fields in the table are necessarily
displayed.
32
Cisco Expressway Series Release Notes
Upgrading to X8.11.4
UCM/LDAP basic authentication: Clients are authenticated locally by the Unified CM UCM/LDAP
against their LDAP credentials. after MRA
turned on
SAML SSO and UCM/LDAP: Allows either method.
None: No authentication is applied. This is the default setting until MRA is first
enabled. The "None" option is needed (rather than just leaving MRA turned off)
because some deployments must turn on MRA to allow functions which are not
actually MRA. (Such as the Web Proxy for Meeting Server, or XMPP Federation.) Only
these customers should use "None". Do not use it in other cases.
Authorize by This option requires self-describing tokens for authorization. It's our recommended On
OAuth token authorization option for all deployments that have the infrastructure to support them.
with refresh
Only Jabber clients are currently capable of using this authorization method. Other
MRA endpoints do not currently support it. The clients must also be in OAuth token
with refresh authorization mode.
(missing or bad snippet)
Authorize by Available if Authentication path is SAML SSO or SAML SSO and UCM/LDAP. Off
OAuth token
(previously This option requires authentication through the IdP. Currently, only Jabber clients are
SSO Mode) capable of using this authorization method, which is not supported by other MRA
endpoints.
Authorize by Available if Authentication path is UCM/LDAP or SAML SSO and UCM/LDAP. Off
user
credentials Clients attempting to perform authentication by user credentials are allowed through
MRA. This includes Jabber, and supported IP phone and TelePresence devices.
33
Cisco Expressway Series Release Notes
Upgrading to X8.11.4
Check for Available if Authorize by OAuth token with refresh or Authorize by OAuth token is No
internal enabled.
authentication
availability The default is No, for optimal security and to reduce network traffic.
The request asks whether the client may try to authenticate the user by OAuth token,
and includes a user identity with which the Expressway-C can find the user's home
cluster:
Yes: The get_edge_sso request will ask the user’s home Unified CM if OAuth tokens
are supported. The home Unified CM is determined from the identity sent by the
Jabber client's get_edge_sso request.
No: If the Expressway is configured not to look internally, the same response will be
sent to all clients, depending on the Edge authentication settings.
The option to choose depends on your implementation and security policy. If all
Unified CM nodes support OAuth tokens, you can reduce response time and overall
network traffic by selecting No. Or select Yes if you want clients to use either mode
of getting the edge configuration - during rollout or because you can't guarantee
OAuth on all nodes.
Caution: Setting this to Yes has the potential to allow rogue inbound requests from
unauthenticated remote clients. If you specify No for this setting, the Expressway
prevents rogue requests.
34
Cisco Expressway Series Release Notes
Upgrading to X8.11.4
Identity Available if Authentication path is SAML SSO or SAML SSO and UCM/LDAP. —
providers:
Create or Selecting an Identity Provider
modify IdPs
Cisco Collaboration solutions use SAML 2.0 (Security Assertion Markup Language) to
enable SSO (single sign-on) for clients consuming Unified Communications services.
If you choose SAML-based SSO for your environment, note the following:
■ SAML 2.0 is not compatible with SAML 1.1 and you must select an IdP that
uses the SAML 2.0 standard.
■ SAML-based identity management is implemented in different ways by
vendors in the computing and networking industry, and there are no widely
accepted regulations for compliance to the SAML standards.
■ The configuration of and policies governing your selected IdP are outside the
scope of Cisco TAC (Technical Assistance Center) support. Please use your
relationship and support contract with your IdP Vendor to assist in configuring
the IdP properly. Cisco cannot accept responsibility for any errors, limitations,
or specific configuration of the IdP.
■ OpenAM 10.0.1
■ Active Directory Federation Services 2.0 (AD FS 2.0)
■ PingFederate® 6.10.0.4
Identity Available if Authentication path is SAML SSO or SAML SSO and UCM/LDAP. —
providers:
Export SAML For details about working with SAML data, see SAML SSO Authentication Over the
data Edge, page 1.
35
Cisco Expressway Series Release Notes
Upgrading to X8.11.4
Allow Jabber By default the IdP or Unified CM authentication page is displayed in an embedded No
iOS clients to web browser (not the Safari browser) on iOS devices. That default browser is unable
use embedded to access the iOS trust store, and so cannot use any certificates deployed to the
Safari devices.
This setting optionally allows Jabber on iOS devices to use the native Safari browser.
Because the Safari browser is able to access the device trust store, you can now
enable password-less authentication or two-factor authentication in your OAuth
deployment.
A potential security issue exists for this option. The mechanism to return browser
control from Safari to Jabber after the authentication completes, uses a custom URL
scheme that invokes a custom protocol handler. It's possible that another application
other than Jabber could intercept the scheme and gain control from iOS. In that
case, the application would have access to the OAuth token in the URL.
If you are confident that your iOS devices will not have other applications that
register the Jabber custom URL scheme, for example because all mobile devices are
managed, then it's safe to enable the option. If you are concerned about the
possibility of another app intercepting the custom Jabber URL, then do not enable
the embedded Safari browser.
36
Cisco Expressway Series Release Notes
Upgrading to X8.11.4
Notes:
■ Authentication path=UCM/LDAP
■ Authorize by user
credentials=On
■ Authentication path=SAML
SSO/and UCM/LDAP
■ Authorize by OAuth token=On
■ Authorize by user
credentials=On
Identity providers: Create or modify Pre-upgrade setting is applied Expressway- Expressway-C (no
IdPs C change)
Identity providers: Export SAML data Pre-upgrade setting is applied Expressway- Expressway-C (no
C change)
SIP token extra time to live Pre-upgrade setting is applied Expressway- Expressway-C (no
C change)
37
Cisco Expressway Series Release Notes
1. If you plan to use the log analysis tool, first collect the logs from your Expressway.
2. Sign in to https://cway.cisco.com/tools/CollaborationSolutionsAnalyzer/
3. Click the tool you want to use. For example, to work with logs:
a. Click Log analysis.
b. Upload the log file(s).
c. Select the files you want to analyze.
d. Click Run Analysis.
The tool analyzes the log files and displays the information in a format which is much easier to understand
than the raw logs. For example, you can generate ladder diagrams to show SIP calls.
1. Type the product name in the Search field and click Search.
2. From the list of bugs that appears, use the Filter drop-down list to filter on either Keyword, Modified Date,
Severity, Status, or Technology.
Use Advanced Search on the Bug Search Tool home page to search on a specific software version.
The Bug Search Tool help pages have further information on using the Bug Search Tool.
38
Cisco Expressway Series Release Notes
39
Cisco Expressway Series Release Notes
Cisco Trademark
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other
countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks
mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
40