UIP74 RevB Planning Guide
UIP74 RevB Planning Guide
Planning Guide
7.4
Legal Notices
© 2019 Aspect Software, Inc. Unauthorized reproduction prohibited by law.
The content of this publication is furnished for informational use only and should not be construed as a commitment by Aspect Software, Inc.
(“Aspect”). Aspect assumes no responsibility or liability for any errors or inaccuracies that may appear in this publication. Aspect reserves the
right to change information in this publication without notice as a result of product enhancements or other reasons.
Aspect®, Unified IP® and other marks as indicated are trademarks or registered trademarks of Aspect Software, Inc. in the United States and
other countries. Use of any Aspect trademark is prohibited unless expressly approved in writing in advance by an authorized representative of
Aspect Software, Inc. Microsoft Windows®, and Microsoft SQL Server® are registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries. Any other brands, product names, company names, logos, trademarks, and/or service marks used in this
publication are the property of their respective owners. You may not copy, modify or display any of Aspect’s or its affiliates’ or licensors’
trademarks, trade names or logos appearing in this publication in any way without Aspect’s express written consent.
The works of authorship, including but not limited to all design, text and images, contained and the software described in this publication are
owned by Aspect or its affiliates or licensors, except as otherwise expressly stated. The entire contents of this publication are protected by
United States and worldwide copyright laws and treaty provisions. In accordance with these laws and provisions, you may not copy, reproduce,
modify, use, republish, upload, post, transmit or distribute in any way material from this publication. Further, except as permitted by your written
agreement with Aspect, no part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,
electronic, or otherwise, without the prior written permission of Aspect.
This publication is provided with “Restricted Rights”. No part of this publication may be photocopied, reproduced or transmitted, in any form or
by any means, without the prior written consent of Aspect. Use, duplication, or disclosure by the United States Government (“Government”) is
subject to the restrictions set forth in DFARS 252.227-7013 (b)(3) and FAR 52.227-19. Use of the materials by the Government constitutes
acknowledgement of Aspect’s proprietary rights in them. Aspect is located at 5 Technology Park Drive, Suite 9, Westford, MA,01886, USA.
(a) These data are submitted with limited rights under Aspect’s contracts with various Government entities. These data may be reproduced and
used by the Government with the express limitation that they will not, without written permission of the Aspect, be used for purposes of
manufacture nor disclosed outside the Government; except that the Government may disclose these data outside the Government for the
following purposes, if any, provided that the Government makes such disclosure subject to prohibition against further use and disclosure: None.
(b) This notice must be marked on any reproduction of these data, in whole or in-part.
EXPORT
This item is subject to U.S. export control laws and regulations. This item may not be exported, re-exported, re-transferred, disclosed or
otherwise diverted contrary to U.S. export control laws or regulations.
NO WARRANTY
THE CONTENTS OF THIS PUBLICATION ARE PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF QUALITY, MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE, NON-INFRINGEMENT, OR THAT OPERATION OF THE PRODUCTS SOLD BY ASPECT WILL BE UNINTERRUPTED OR
ERROR FREE.
NO LIABILITY
ASPECT, ITS AFFILIATES, AND LICENSORS ARE NOT LIABLE FOR ANY DAMAGES SUFFERED AS A RESULT OF USING THE
CONTENTS OF THIS PUBLICATION. IN NO EVENT WILL ASPECT, ITS AFFILIATES OR LICENSORS BE LIABLE FOR ANY (i)
CONSEQUENTIAL, INDIRECT, PUNITIVE, SPECIAL, OR INCIDENTAL DAMAGES, (ii) ANY INTERRUPTION OF BUSINESS OR
OPERATIONS, COST OF COVER, GOODWILL, TOLL FRAUD, OR LOSS OF DATA, PROFITS, OR REVENUE, OR (iii) FAILURE OF A
REMEDY TO ACHIEVE ITS ESSENTIAL PURPOSE. THE LIMITATIONS IN THIS SECTION WILL APPLY TO ANY DAMAGES, HOWEVER
CAUSED, AND ON ANY THEORY OF LIABLITY, WHETHER FOR BREACH OF CONTRACT, TORT, MISREPRESENTATION, NEGLIGENCE,
THE USE OR PERFORMANCE OF A PRODUCT OR SERVICE, OR OTHERWISE AND REGARDLESS OF WHETHER THE DAMAGES
WERE FORESEEABLE OR UNFORSEEABLE. NEITHER PARTY WILL BE LIABLE FOR ANY CLAIM BROUGHT BY THE OTHER PARTY
MORE THAN 12 MONTHS AFTER THE OTHER PARTY BECAME AWARE OF THE ISSUE GIVING RISE TO THE CLAIM. ASPECT’S, ITS
AFFILIATES’ OR LICENSORS’ FAILURE TO EXERCISE A RIGHT OR REMEDY IS NOT A WAIVER. BECAUSE SOME JURISDICTIONS
PROHIBIT THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE
LIMITATION MAY NOT APPLY TO YOU.
THE PRODUCTS DESCRIBED IN THIS PUBLICATION CAN BE USED AND PROGRAMMED IN A WIDE VARIETY OF WAYS BASED ON
THE REQUIREMENTS OF YOUR PARTICULAR TECHNOLOGY, ENVIRONMENT AND BUSINESS. NOTWITHSTANDING THE USE OF
EXAMPLES IN THIS PUBLICATION OR THE PROVISION OF PROFESSIONAL SERVICES BY ASPECT, ASPECT RESELLERS, OR ANY
THIRD PARTY ENGAGED BY ASPECT, IT IS IN ALL CASES YOUR RESPONSIBILITY TO ENSURE THAT THE PRODUCTS ARE
PROGRAMMED AND USED IN ACCORDANCE WITH ALL APPLICABLE LAWS AND REGULATIONS AND IN A MANNER THAT DOES NOT
VIOLATE THE INTELLECTUAL PROPERTY OR OTHER RIGHTS OF ANY THIRD-PARTY.
Rev B
October 16, 2019
Contents
About this Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Organization of this Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Where to Find Additional Information . . . . . . . . . . . . . . . . . . . . . . . . x
B. Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1
B.1 Guidelines for Port Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1
B.1.1 General Port Guidelines . . . . . . . . . . . . . . . . . . . . . . . B-1
B.1.2 RTP Resource Guidelines . . . . . . . . . . . . . . . . . . . . . B-2
B.1.3 Firewall Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . B-2
B.1.3.1 Client Side Ports . . . . . . . . . . . . . . . . . . . . . . . B-3
B.1.4 Ports That Support Secure Access . . . . . . . . . . . . . . B-3
B.2 Ports List Spreadsheet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-3
This document describes the overall planning process for preparing for an Aspect® Unified IP®
contact center installation. Contact center installation demands thorough planning by both
Aspect and you, the customer.
Note: If you have ordered Aspect Agent Initiated Contact 7.4, the installation media will be
branded accordingly along with the splash screens for the Database, Application, and
Client installers. For more information about Aspect Agent Initiated Contact, 7.4, see
Aspect Agent Initiated Contact on page 1-15.
Note: The SQL instances on the database servers are masked to the end user and information
systems professionals. Direct access to SQL is not a Unified IP feature. There are no
external direct interface points or user interfaces into the SQL environment. All access
points into SQL are controlled using secured Unified IP graphical console interfaces. No
customization of SQL instances on the database servers is permitted.
Note: In Unified IP 7.4, the Unified Media Server is the only supported telephony device.
For information about Training, Technical Support, commenting on the documentation, and a list
of additional documentation see the appropriate product Release Notes document on the
Aspect Software web site at http://www.aspect.com.
Audience
This guide is designed for the members of a Customer Information Technology Department (IT)
or a Customer Management Information System (MIS) department who are familiar with the
particular contact center environment in which Unified IP is to be installed.
Readers are required to have a basic understanding of, and familiarity with, the Microsoft®
Windows® operating system as well as an understanding of sophisticated software applications
such as Unified IP.
Note: This guide uses the terms Application Service Provider (ASP) and Landlord
interchangeably.
• Chapter 3, Customer Site Requirements—This chapter contains information about cable and
power requirements, load balancing, bandwidth, agent headsets, and required support
devices.
• Appendix B, Ports —This appendix describes a spreadsheet of all ports required for the
different Unified IP services.
• Appendix E, System Capacities —This appendix describes the Unified IP deployments and
system capacities.
• Appendix F, Third Party Tools—This appendix lists and describes third party tools that are
commonly installed on Unified IP machines or networks for troubleshooting, testing or
monitoring purposes.
• ,Appendix H, Working with the Lab Profile explains how to add a non-Lab site to an existing
Unified IP Lab deployment, and how to add a Lab profile site to an existing Enterprise.
• Appendix I, Working with the Small 100 Non-HA Profile, explains how to add a Lab, Small,
Medium or Large site to an existing Unified IP Small 100 Non-HA deployment, and how to
add a Small 100 Non-HA site to an existing Unified IP deployment.
• Appendix J, Working with the Small 250 Non-HA Profile, explains how to add a Lab, Small,
Medium or Large site to an existing Unified IP Small 250 Non-HA deployment, and how to
add a Small 250 Non-HA site to an existing Unified IP deployment.
• For information about Hyper-V and VMware virtualization, see the Aspect Virtualization
Guide.
• For information about how to set up your corporate network to accommodate Aspect Unified
IP 7.4, see the Aspect Network Preparation Guide.
Aspect Unified IP is the latest release of the unified platform solution and is based on a
distributed and unified multi-channel product architecture. It is a comprehensive contact center
solution delivering functionality such as automatic call distribution (ACD), interactive voice
response (IVR), automated outbound dialing with power, preview, predictive, precision and
blaster pacing modes, Voice over IP (VoIP), screen pop, voice mail, recording, quality
monitoring, desktop scripting, universal queuing, real-time monitoring and multimedia
reporting, all in a single platform.
Note: This guide describes features and functionality supported by Unified IP. Any features or
functionality not described in this guide were not supported by Unified IP at the time of
publication. For an up to date list of supported features, check with your Aspect sales
representative.
• CRM Connectors
• Inbound Functionality
• Outbound Functionality
• Chat Functionality
• MultiMedia Functionality
• Email Functionality
• Recording Management
• Time Management
• Alert Management
• Interactive Voice Response (IVR) - Aspect Advanced Voice Portal 14 and legacy Aspect
Voice Portal.
• Unified Communications
• Built-In Redundancy
• Citrix integration
1.2.1.1 Database
• All database datetime entries are in Universal Coordinated Time (UTC), where appropriate.
• When upgrading from a previous release of Unified IP, the existing datetime values are
converted to UTC.
• All existing and new stored procedures utilize UTC datetime, instead of local time, where
appropriate.
• Time values associated with schedules are relative such as 9:00 Am to 5:00 PM – those
will remain the same.
• A unique Microsoft time zone “Identifier” column has been added to the UIP Config
datamart TimeZone table. This value corresponds to the Microsoft registry key for the
Microsoft time zone registry database. This allows custom applications or third party
integrations to reference specific time zones.
• Unified IP Services now have time zones associated with them. All scheduled activities
within the Service, such as Service activation time, automated recording, Personal
Greetings and Service real-time statistics reset use this time zone as a reference.
synchronizes its clock with the domain controller which has been defined for the Unified IP
deployment.
1.2.1.7 Logging
Most all Unified IP components/processes create log files. Most log statements begin with the
datetime. This datetime value has been, and will continue to be, in local time. However, if a
datetime value also appears in the log statement, (for example CallStartTime<11/04/2013
10:17:30 AM>), that datetime value will be in UTC time. Most log files have the time zone and
offset values printed as part of the header at the beginning of the file.
• Agent Desktop
• Supervisor Desktop
• Administrator Desktop
• Database Servers
• Application Servers
• Optional Servers
• Configure Devices, add them to Route Groups, and associate Route Groups with Dial
Patterns
The application also allows you to create and delete Application Endpoints, contact objects,
and SIP URIs for Instant Messaging which are referenced in an Inbound Instant Messaging
service created in Unified Command and Control - Administration.
Unified Resource Manager is comprised of both server software and client software. As a
Unified IP administrator, you use the client software to configure and maintain telephony
resources. The Unified Resource Manager server software normally runs on the same
machine as the Unified Command and Control - Administration server software. After installing
the Unified Resource Manager server software as part of the basic Unified IP installation
process, you can install the client software on any Aspect-supported workstation.
When using Unified Command and Control- Administration to set up your Unified IP users, you
create Enterprise Users so that you can manage the same set of users (agents and
supervisors) for all your Aspect products. Because you only have one set of users to manage,
configuration changes are more consistent and the time spent on user management is
reduced.
In addition to managing your user community, you use Unified Command and Control -
Administration to manage services (including Inbound and Outbound, CTI, Chat, Instant
Message, Email, Workflow, and M3), all queues (including agents and services), system
administration (including applications, priorities, attention, and retainers), some table
administration, dispositions, schedules, and Email administration.
The Recording Manager module of Director enables you to configure a service to record, play,
archive, delete, and restore contact calls. (The exceptions are system messages, such as
attention retainer sequences and whisper messages, that are not included in a recorded
exchange.)
The Aspect Unified IP Agent Scoring component is used by directors and Quality Assurance
specialists to rate the performance of an agent. A scoring form (custom template) is created to
define agent tasks and to rate the performance of an agent.
The Knowledge Base is an information repository that agents use for gathering information to
assist with customer queries. It stores information for FAQs, agent keywords, email auto-
response, and Natural Language Processing (NLP).
The tool has monitoring categories that give users access to other monitoring categories and
additional information. For example, when monitoring activity within a service, a user can view
how agents are used for that service through an on-screen Agent Utilization button. Or, while
viewing agent activity, a user can click the Monitor Selected Agent Calls button to monitor
communication between an agent and a contact.
Unified Command and Control - Real-Time Reporting enables you to do the following:
• Distribute real-time reports over the web so that users can view them on a locally-installed
Windows Internet Explorer browser.
• Filter canvas objects to display different data (such as data specific to an agent,
application, or trunk).
• Double-click a linked object to drill down to another canvas, which might show more
detailed information.
• Display or highlight values (in different colors) on your screen to indicate whether values fall
above or below set thresholds.
In addition to viewing real-time system status from Unified IP systems, you can also use Real-
Time Reporting to generate a comprehensive view of your contact center performance by
combining real-time data from multiple components into a single interface.
Using the Unified Agent Desktop, an agent can communicate with other agents, supervisors,
and experts using instant message functionality. Customers can also transmit instant
messages to a contact center agent and communicate in real-time with a request for service.
Another component of the Unified Agent Desktop is Web Chat. Web Chat is a type of
messaging agents perform over the network. The Web Chat service enables agents and
contact center directors to communicate with customers through the internet. Agents and
supervisors can use the email component to communicate with customers in a more formal
manner.
Unified Director X
Dataviews X
Enterprise Monitor X
LYRICall Designer X
M3 Designer X
DB Tools X
Producer X
Server Configurator
1. Using the Installation Program - When the Unified IP Client installer is run on the client
machine, an icon is placed on the desktop. The user then clicks on the icon to download
the client from a previously installed Unified IP server. Once downloaded, the client
prompts the user to download updates and hot fixes.
2. Pushing MSI files - Each of the ClickOnce Smart Client applications is available as an MSI
(Windows installer file). Customers can use the MSI to push the install out to the client
desktops. All Hotfixes that are installed on the servers through Server Configurator include
a new MSI for easy push to the clients. This new MSI must then be pushed to all clients as
required. The MSI files for each ClickOnce Smart Client application can be accessed as
follows.
• For Unified Agent Desktop, the MSI is on the Portal server at the following URL:
http://machine name/UADInstall/UADClient.msi
• For Unified Command and Control - Administration, the MSI is on the Unified Command
and Control server at the following URL:
http://machine name/UCC/Standalone client/UCCAdminclient.msi
• For Unified Resource Manager, the MSI is on the Unified Command and Control server
at the following URL:
http://hostname/URM/StandaloneClient/URMClient.msi
Note: Beginning with Unified IP 7.3 SP1, an alternate deployment called the Network
ClickOnce deployment is supported. It allows users without Write permission to their
Desktop or Start Menu to run the ClickOnce Unified Agent Desktop from its URL. See
page 1-3 for more information.
This section is meant as a guide and does not include a full description of all optional
functional components currently available for a Unified IP environment. For a full description,
see the individual user guides for each of the Unified IP components.
The Enhanced Enterprise Reporting feature adds customer journey reporting capability to the
following scenarios.
Figure 1-1 Self-Service IVR in Front data exchange mechanism. For Enhanced Enterprise
Reporting, Unified IP data and CXP data is correlated with UMID, and passed to
the Unified IP Data Warehouse which then generates reports.
For information about integrating Unified IP with Aspect CXP, see the Aspect Unified IP
Integration Guide.
private customer information. The customer journey reports are generated from reporting data
culled from both Aspect CXP and Unified IP using a common tracking identifier called UMID.
For information about integrating Unified IP with Aspect CXP, see the Aspect Unified IP
Integration Guide.
To implement Enterprise Routing between Aspect CXP and Aspect Unified IP you need the
following components:
Information about installing, configuring, and using the Enterprise Multisite Routing feature is
provided in the following Aspect documents:
• For installation of the Enterprise Routing Adapter, see the Aspect Unified IP Installation
Guide.
• For information about integrating Unified IP with Aspect CXP, see the Aspect Unified IP
Integration Guide.
• For information about configuring and using the Enterprise Routing feature, see the Aspect
Unified IP Enterprise Routing System Administrator Guide.
The Enterprise Reporting feature provides expanded historical reporting using Enterprise
Reporting and Data Warehouse servers and the Business Objects interface. This feature
allows users the flexibility to customize report content and formulas to align with their specific
enterprise needs. Because Enterprise Reporting uses a more flexible reporting interface, it
provides contact center interaction data more clearly and efficiently. This allows users to
manage their Unified IP solution more effectively than was possible using the existing
Dataviews feature.
The Enterprise Reporting feature requires the use of two additional machines:
• An Enterprise Reporting machine that hosts SAP BusinessObjects 4.2 SP6 reporting
software.
• A Data Warehouse machine that hosts an instance of SQL server for report storage.
You must install the SAP software on the Enterprise Reporting server.
For information about Enterprise Reporting and Data Warehouse machine requirements, see
the Aspect Unified IP Hardware and Software Guide.
For information about installing the SAP and Unified IP software, see the Aspect Unified IP
Installation Guide.
• Create custom reports that combine data from different Unified IP data tables.
• Include options for report output format, distribution method, and scheduling.
The following is a list of reports that are new or improved with Enterprise Reporting:
• Agent State
• Circuit Summary
Enhanced Enterprise Reporting supports data collection from only one Unified IP Enterprise
and one CXP source system. If you have more than one Unified IP Enterprise, each Enterprise
has a separate Enterprise Reporting data warehouse instance running with it. If Unified IP and
CXP systems are configured to route calls between them, then you must configure each
Unified IP Enterprise as a separate account on the CXP system.
• Unified IP and the Unified IP users are located at the customer’s site and the only
domain is the customer’s domain.
Or
• The customer site hosts the Active Directory Federation Services (ADFS) server and
Unified IP is in a Cloud that is used exclusively by the customer’s enterprise. The
Unified Agent Desktop agents and Unified Command and Control - Administration users
are authenticated via ADFS on customer's domain.
• In Off-Premise deployments where the Unified Agent Desktop agents and Unified
Command and Control - Administration users are located at the customer site, but Unified
IP is installed on a separate domain (for example, in an Aspect Hosted cloud environment).
Note: For Unified IP 7.4, ADFS 3.0 is the only Identity Provider and Service Provider tested
and validated.
For detailed steps required to implement Claims Based Authentication, see the Aspect Unified
IP System Configuration Guide.
Before you can use Advanced List Management, you must configure the dialers to which the
system sends call records for dialing. By default, all standard Aspect dialers are considered
auto-dialers, which means that the dialers dial numbers automatically without the assistance of
an agent. There are cases, however, in which you do not want certain records dialed
automatically, but instead need an agent to manage the call. This situation occurs when call
records require customer consent before the call record is dialed. This scenario requires that
an agent manually verify or acquire consent before dialing the call, which requires that the
system send the call to an Aspect Agent Initiated Contact dialer, which is a non-auto dialer.
To ensure all calls that require consent are sent to a live agent for consideration, you can
deploy one or more of Agent Initiated Contact dialers. All Agent Initiated Contact dialers are
designated as non-auto dialers (manual dialers) without auto-dialing capabilities based on the
product license. When you configure any Aspect dialer, Advanced List Management accesses
the dialer license information and displays a field that specifies whether or not the dialer has
auto-dialing capabilities.
When you upgrade to Aspect Agent Initiated Contact, any Services that were previously
configured for auto dialing, audio messages, attention retainers or Personal Greetings will be
disabled. To re-enable the Services, you need to open Unified Command and Control -
Administration, open the Service(s) in edit mode, go to the System Record Detail screen, and
deselect the Disable the Service option [check box]. Then click Save.
Note: If you have ordered Aspect Agent Initiated Contact, the installation media will be
branded accordingly along with the splash screens for the Database, Application, and
Client installers. For information about how to configure and use Aspect Agent Initiated
Contact, see the relevant sections in the Advanced List Management Administrator
Guide, the Unified Command and Control - Administration System Administrator Guide,
and the Aspect Unified IP Server Configurator User Guide.
When you are creating the DeploymentConfiguration XML file that controls installation of
Unified IP, you have the option of adding up to two CS Adapter machines per tenant. When
you add a CS Adapter machine, you see the following dialog.
This dialog gives you the option of using the CS Adapter to use Aspect CMI to integrate with
either a Cisco ICM or Genesys system.
Aspect CS Adapter is a translation and event-normalization adapter that provides the interface
between Unified IP and Genesys TServer. It acts as a client to the Unified IP CTI Portal Server
(CTIPS) interface and maintains sessions with both CTIPS and CMI Server.
When you install Unified IP, you can add up to two CS Adapter machines in a single tenant
deployment.
Using the following dialog, you can select Agent Synchronizer, Data Collector, or both on
the first CS Adapter machine you add. If you select both, you cannot add an Agent
Synchronizer to a second CS Adapter machine. There can be only one Agent Synchronizer
per Unified IP site in a single tenant deployment (or per tenant in a multi-tenant deployment).
The Data Collector is a web service interface that can be called by M3 to obtain call specific
data from the Genesys environment. This data is information that has been added to the
Genesys call record prior to the call arriving at Unified IP such as Account number and
application from an IVR or other similar data. M3 calls the process passing a unique call
identifier call an ConnID which is used to reference the specific call within the Genesys
environment. The tool returns a 2xn table of Keys and Values in a specific sorted order to M3
for processing. The precise Key Value pairs to be returned and the order they are to be
returned in is defined within the configuration of the Data Collector.
Agent Synchronizer is an active process that listens to CTIPS events to determine if the
services associated with an agent have changed. When an agent event is received the set of
services on that event are compared against an XML document and any changes are noted.
If an agent has been put into a new service the XML is updated and a request is sent to the
Genesys Configuration environment to add that agent to an agent group created and uniquely
named for that service ID. The reverse is also true where if an agent is removed from a service
the XML is updated and a request is sent to the Genesys configuration environment to remove
that agent from the agent group for that unique service ID.
Using the ICM Adapter enables the ICM system to do the following:
The role-based Aspect Social user interface provides agents, supervisors, and managers the
features and access levels they need for their individual responsibilities. The web-based
Aspect Social desktop is the central point of communication between a brand and the social
web. Aspect Social supports threaded conversation support with Twitter, Facebook, and peer-
to-peer forums so that agents can collaborate and solve customer issues in real time.
The Aspect Social integration with Unified IP supports the following capabilities.
• To report manual Outbound calls initiated when a Social Interaction is escalated to voice
• To determine how long an agent spent handling Social Contacts using a Park Reason Code
for Social Park Time
For information about integrating Aspect Social with Unified IP, see the Unified Command and
Control - Administration System Administrator Guide, and the Aspect Unified IP Unified Agent
Desktop User Guide. For information about installing and using the Aspect Social application,
refer to the Aspect Social documentation.
Aspect Unified IP uses the CTI Portal Service (CTIPS) interface to connect to the third party
external routing application.
To implement Outbound External Routing, you must complete the following steps which are
explained in detail in the Aspect Unified IP Integration Guide.
• When you are configuring the DeploymentConfiguration XML file prior to installing Unified
IP, you select the Outbound External Routing check box on the Select Optional Features
screen as shown below.
• You must manually install the Unified IP root certificate on the third party servers that
communicate with the Unified IP Core and Core Expansion servers using the Aspect
Computer Telephony Integration Portal Service (CTIPS) interface.
• Once Unified IP is installed, you use the Aspect Unified Command and Control -
Administration application to configure an Outbound Service to be used with the third party
routing application.
• Once the Unified IP Outbound Services are configured, the third party routing application
must be configured with the machine names of the Aspect Core and Core Expansion
servers as well as the list of Unified IP Service IDs that have been configured in Unified
Command and Control - Administration.
Note: See the Aspect Unified IP Integration Guide for detailed procedures.
Note: Outbound External Routing is a licensed feature. Contact your Aspect representative
for pricing.
1.5.11 Email
The Email feature enables agents and supervisors to communicate with customers using
incoming and outgoing electronic mail. This feature works with Microsoft Exchange and
Microsoft Outlook.
In addition to standard email communication with individual customers, Unified IP also enables
agents and supervisors to communicate with customers using a distribution list when using the
Advanced List Management component. This feature requires the Unified Communications
Server, which works in conjunction with the Advanced List Management Server, the Microsoft
Exchange Server, and the Aspect Unified IP Server. The Advanced List Management Server
starts the outbound campaign by sending the distribution list to the Unified IP Centercord
component, which forwards the request to the UCM server. The UCM Server subscribes to the
email server, which sends the email message to the specified list. The final disposition is then
routed back through the UCM Server, to the Unified IP Server, and finally to the Advanced List
Management Server.
For additional information on configuration, see the Aspect Unified IP System Configuration
Guide.
• Building a custom SMS solution using the Custom SMS Service Provider SDK
To implement outbound SMS using the Standard Service Provider, you must set up an account
with a Red Oxygen, a company that has an existing relationship with Aspect. If you choose to
use another provider, you need to use the SMS Third Party API SDK. For additional
information, contact Aspect Professional Services.
For additional information on configuring Outbound SMS, see the Aspect Unified IP System
Configuration Guide.
Following are the six main components that are involved in the Web Chat communication
process.
This software component receives the notification from Chat Server about a new chat
session, applies the appropriate business rules as per the definition, and then connects the
caller with an M3 Script or with a best available agent who will manage the chat interaction.
The above components are shown in the following generic Web Chat architecture diagram.
In the above diagram, a generic chat architecture is depicted where the Customer Web
Content server is located in the DMZ, and the Unified IP MultiMedia servers are running on
separate machines where each has its own web server that could be separated by one or
more firewalls.
Note: Refer to Appendix B, Ports for information about required firewall ports.
The following flow chart shows the sequence of events that take place during a chat call.
1. An end user visits the customer’s web site (accesses the Web Content Server) from the
web browser via http(s) protocol. The server is owned and managed by the customer.
4. The Web Content Server forwards this http(s) request across the firewall to the Internal
Web server in the MultiMedia Server. The request comes to a default web page
(CPChatRequest.html) provided by Aspect, which can be customized by the customer to
suit their needs. (The name of this html file can also be changed). This Request page can
collect basic information on a web form from the customer and On Submit it must send the
captured information to the CPChatRequest.jsp which is hosted by Tomcat in the
MultiMedia Server. This JSP page is the one that actually processes the chat request. The
following information is sent from the CPChatRequest.html to CPChatRequest.jsp:
• Primary and Secondary Load Balancer IP Addresses and Port numbers (Required)
• Service ID of the Chat Service defined in Unified Director (Required). This chat request
is queued to this Chat Service.
• Customer Name (Required)
• Other optional information the customer would like to collect and send to Aspect Unified
IP. This information can be used for routing the chat call and can be attached to the
agent screen pop.
The customer can deploy TLS on the web server for security.
6. As a result of the Chat Request, the Chat Server notifies Centecord and requests an
available agent.
7. The Centercord (Core) Server responds back with the best available agent to the Chat
Server. It also notifies the selected agent that chat contact will be arriving.
8. The agent sees a chat window pop up, and this window directly communicates with the
Chat Server (via Chat Web Service) using TCP/IP. The Chat Server, based on ServiceID,
CallID and Agent ID, can associate the end user chat session with the agent. From this
point, the end user and the agent can exchange text messages back and forth. The Chat
Server maintains the session.
• This process also applies to the M3 Server when an M3 Service is configured for a Chat
Service.
• Besides sending text messages back and forth, the end user can escalate the chat to a
voice conversation with the same agent. In this case, the Chat Server takes the end
user phone number and passes it to the Centercord to establish a voice connection
between the agent and the end user. This feature assumes that a Unified Media Server
is in place and that the agent has already established an audio path during the login
process.
• The end user and the agent can also engage in web collaboration. The end user can
send an http URL to the agent, whereupon the chat component in the agent desktop
application launches the browser in the agent machine with that URL. Now both agent
and end user can see the same page and both can navigate. This is done by the
CPChatMain.jsp server page.
• The entire interaction between the agent and the end user can be screen recorded and
monitored.
Note: You must install all Chat components inside the firewall unless you use a reverse proxy.
For additional information, see Firewall Guidelines on page B-5.
1.5.16 Security
There are various ways in which you implement security in your network environment. When
using Unified IP, you implement security using the following:
• Secure OS— limits security risks by automatically resetting the default firewall OS settings
so that unused services are stopped and unused ports are closed.
For additional information on security, see Security Overview on page 3-24. Also see the
Aspect Unified IP Security Guide.
When using Unified IP Enterprise Routing, the Unified IP system is able to integrate the
Advanced Skills Dynamic Routing feature that uses M3 scripting for routing control. Calls
associated with a Dynamic Service are assigned a variable number of skills and a minimum
skill level requirement. Using M3 Scripting along with Enterprise Routing, a Unified IP system
can broadcast a request for a remote agent that meets specific criteria.
Note: Unified IP Enterprise Routing, Dynamic Services, and Skills are configured using the
Unified Command and Control- Administration tool.
Aspect Unified IP 7.4 supports integration with Citrix XenApp 6.x and 7.x for the Unified IP
Client applications. See the Aspect Unified IP Installation Guide for Citrix integration
procedures.
Note: In support of Citrix XenApp deployments, the Aspect Unified IP client applications must
be installed on Windows 2012 or 2008 R2 for virtualization to the desktop client. The
desktop client can be any device that will support running the Citrix Receiver, these
include: Windows PCs (running 2008, Win 7, or Win 8) and thin (aka zero) VDI Client
devices.
Note: For information about Hyper-V and VMware server virtualization, see the Aspect
Virtualization Guide.
One of the many things Unified Communications provides is the ability for an agent to contact
to technical experts outside the contact center when they need expert help resolving a
customer issue. With the Ask an Expert feature, agents can use instant messaging or voice to
get the help they need while on a call or in Park state researching a customer issue. If needed,
they can also transfer the call to the Expert for resolution. These experts can be anywhere in
the company, even in another country. As long as they are signed into the same
communications system, they are available to the agents. Agents can also contact experts
using the Sharepoint Search feature. When Sharepoint repositories are used for expert
search, the keyword entered by the agent is used to search Sharepoint for document titles. If a
match is found, and if the document author is a user configured in the customer’s enterprise,
the document title and the author’s name are returned to the agent. Results from an expert
search include a relevance score based on the keywords specified as part of the search
criteria. Factored into this score is an expert’s hot seating position. The hot seating position is
calculated based on “least utilized” to prevent the same expert from being selected repeatedly.
Beyond networking within the contact center and with Experts, Unified Communications
enables you to set up inbound IM services, enabling your customers to initiate IM sessions
with your agents just as they would a voice contact. Because the inbound IMs are routed to a
service, you can apply the same business rules to managing inbound IMs that you use for your
other contact modes.
This functionality requires a separate license for “Ask an Expert” capability and a separate
license for service-based Instant Message functionality.
• Microsoft LyncTM Server 2013 (Inbound IM, enhanced Ask an Expert, and internal IM)
Note: For all Lync functionality to work with Unified Agent Desktop, you must install the
Microsoft Lync Server 2013 or latest Skype client software on each Unified IP client
machine regardless of whether using Microsoft Lync Server 2010 or 2013.
While Unified Communications within Unified IP flows through the Unified Agent Desktop
application, this does not impact an agent's use of Microsoft Lync Server on their desktop.
Because Lync Server function outside the Unified IP system, agents can use both applications
simultaneously for instant messaging as well as audio. For example, agents can communicate
with an expert or agent outside the contact center using Lync Server at the same time that
they are receiving a service call or instant message through the Agent Desktop. Similarly, an
agent can be involved in a conference or call using Lync Server and still receive conference or
call requests through the desktop because Lync Server function in the same manner as a
second voice line. The agent's presence is based on their state within Unified IP, however the
agent can change their presence within Lync Server manually. In addition, regardless of an
agent's state within the desktop, agent's can still receive contact (such as an instant message
or call request) through Lync Server.
Deployment of Unified Communications requires either the Microsoft Lync Server 2013 or
Microsoft Exchange Server. Inbound IM requires Lync 2013. To implement Inbound IM,
Outbound Email using distribution lists, and outbound SMS Messaging, you also need the
Unified IP Unified Communications (UCM) server. See the Aspect Unified IP System
Configuration Guide for details on setting up your Unified Communications deployment.
Note: You must install the Microsoft Lync Server 2013 client software on each Unified IP client
machine that will take IM calls.
Optionally, you can use third party tools to add speaker verification to your script. Speaker
verification adds another level of security to telephony applications, improves customer
service, and provides a more personal experience for the caller.
1. Enhanced CTIPS - This option is selected by clicking a radio button on the Aspect Quality
Management Switch Definition window when the Administrator is defining a switch in
Unified IP for Aspect Quality Management.
3. Unified IP Legacy Recording using Recording Manager - This option is accessed from
the Unified Director application.
Note: If Aspect Quality Management Enhanced CTIPS is chosen as the recording method,
then the Administrator must configure the system so that all the agents in the Unified IP
deployment use Aspect Quality Management Enhanced CTIPS for recording. You
cannot have some agents using one option and others using another when Aspect
Quality Management Enhanced CTIPS is chosen. Mixed recording mode capability is
available only with previously existing methods of Aspect Quality Management
Recording (TDM trunk tapping, VoIP station tapping, M3 software based recording) and
Unified IP legacy recording using Recording Manager.
Use the following calculation as an example to determine resources required for one
supervisor/mentor live monitoring an agent on call.
1. One SIP channel for nailing up PREC. Requires M3 script for initiating the monitoring.
2. From Unified IP, one outbound trunk channel is used up to dial to mentor/supervisor cell
number. This requires another M3 script for call back.
3. One M3 session resources to tie up with PREC. No SIP channel is required for nailing up
PLBK ports on Aspect Quality Management.
5. One conference resource when mentor connects to agent via phone delivery.
To summarize, for one supervisor/mentor monitoring audio of one agent, 2 SIP channels, 1 M3
session, 1 DSP and 1 conference additional resource are required.
Unified IP agents have the ability to place, receive, and transfer customer interactions with full,
real-time connections to CRM customer data.
The Aspect CRM connector solution supports a full multichannel platform – voice, chat and
email - with integrated controls in the CRM application, providing the following interaction
navigation functionality:
Note: This is not a complete list. For more information about connector functionality, refer to
the CRM connector documents listed on the next page.
• Single sign-on, authentication and log-out of the Aspect Unified IP platform via CRM
application
• Change agent status in real time via call status or by using the CRM toolbar
• Transfer with context to another agent, a supervisor, inbound queue route point or voice
portal
• Customize screen pop to display critical customer information upon accepting the call
For more information about the Aspect Unified IP CRM connectors, see the following
documents:
• Aspect Unified IP 7.x CRM Connector CHECKLink Unified Agent Desktop Sync Installation
Guide
• Aspect Unified IP 7.x CRM Connector CHECKLink Web Toolbar Product Description Guide
• Aspect Unified IP 7.x CRM Connector CHECKLink Siebel Communications Toolbar User
Guide
• Aspect Unified IP 7.x CRM Connector CHECKLink Siebel Product Description Guide
• Aspect Unified IP 7.x CRM Connector CHECKLink PeopleSoft Product Description Guide
• Aspect Unified IP 7.x CRM Connector CHECKLink SAP Product Description Guide
• Aspect Unified IP 7.x CRM Connector CHECKLink SalesForce Product Description Guide
Call data definitions contain the information you assign to a service or that the system assigns
with table definitions or reserved words. The call data definitions allow a maximum of 20
parameters for each table. Call Data Definitions enable you to define custom views of the data
for an agent pop-up window when a contact is received. Call data definitions are always
associated with specific CDD reserved words.
Call Data Definitions Reserved Words are the labels (markers) that, when selected in the call
data definition, are passed to the client application. These labels are the parameters that hold
the necessary information for each table that is created.
The Call Data window is a pop-up window that opens on the agent desktop each time the
agent receives a call. A call data definition determines the contents of the Call Data window.
Beginning with Unified IP 7.2, you can use M3 Designer to change the Call Data Definition that
defines the 20 field value/name pairs that can be transferred to and from agents and Services.
The changes that support this Dynamic Call Data feature are implemented in M3 Designer and
the Tenant Properties General tab in Server Configurator.
Note: The Dynamic Call Data feature is supported only by Unified Agent Desktop. It is not
supported by Agent Toolbar.
For an overview of the Dynamic Call Data feature, see the training course (Dynamically
Routing Call Data Definitions) that is available on the Aspect Active Learning Web site.
Contact your Aspect representative for login credentials.
For details about implementing Dynamic Call Data in M3, see the Aspect Unified IP M3 User
Guide.
For details about implementing Dynamic Call Data in Server Configurator, see the Aspect
Unified IP Server Configurator User Guide.
Unified IP 7.3 and later implements SQL Server 2012 AlwaysOn availability groups to support
high availability and disaster recovery requirements. The AlwaysOn technology relies on the
Windows Server Failover Clustering (WSFC) cluster as its foundation. For information about
setting up clustering, see Failover Clustering Requirements on page 3-1.
In this screen shot of a Large deployment profile, note that Unified IP software is installed on
Primary and Secondary Datamart servers, Primary and Secondary Core servers, and Primary
and Secondary Core Expansion servers.
DR is not the same as a High Availability (HA). Whereas DR consists of the information
technology architecture and processes to recover the technology and/or applications to
service in a location other than your primary processing location, HA focuses on maintaining
system uptime at the primary location through application clustering, hardware clustering,
virtualization, and local replication technologies. The basic idea of HA is to build an
architecture that can continue to operate without disruption even when one of its components
fails. Resiliency is focused on “uptime” rather than recovery time. HA assumes that most of the
location servers and infrastructure are operational; DR assumes a location is unusable.
Note: In DR scenarios, it is expected that active contacts and some data may be lost
depending on the severity of the failure.
For detailed Disaster Recovery procedures, see the Aspect Unified IP Disaster Recovery
Guide.
This chapter describes the various Unified IP applications, servers, and processes for a
Unified IP contact center and includes information on load balancing and database
architecture.
Note: For detailed information on hardware and software requirements, see the Aspect
Unified IP 7.4 Hardware and Software Guide.
Application Description
Unified Agent Desktop A new and improved desktop application that handles all the
telephony features for Unified IP. In addition to features such as
dial, hang up, and hold, a contact center agent uses the Unified
Agent Desktop to communicate with customers through the
internet by using chat, email, and instant message.
Note: Unified Agent Desktop can do everything that Toolbar
can do, and is the recommended agent client.
Application Description
Unified Command and Control An application used for the viewing of real-time canvases for
- Real-Time Reporting statistics. Unified Reporting provides a comprehensive view of
your system resources by eliminating the need to integrate
reporting data from multiple sources.
Unified Command and Control An application used to view real-time statistics and to build
- Producer custom real-time canvases for statistics.
Application Description
Advanced List Management An application used for the management of advanced outbound
Desktop (Optional) campaigns (services). Advanced List Management provides
centralized record management functionality at an enterprise
level. The system processes raw customer data modeling
strategies and sends complete contact records to the dialers in
specified order based on the published demand of each
individual dialer.
Note: Advanced List Management cannot be used in a RAID 5
environment.
Aspect Quality Management An application used for recording voice and window interactions
(Optional) based on customizable business rules. You can retrieve the
recordings using advanced search criteria, play the recordings
back, and score the recordings for quality and training purposes.
Aspect Quality Management integrates with Unified IP, which
enables you to take advantage of the environmental definitions
(such as agents, agent groups, or teams) to create advanced
recording rules and search criteria.
Application Description
Unified Command and Control Application used to manage agent and routing resources
- Administration across Aspect products so that you can administer one or
more Aspect products from a central user interface. When
using Unified IP, Unified Command and Control -
Administration is your primary administration interface for
setting up and managing your environment including your
user community and your applications and services.
Server Configurator Application used by Administrators to configure Unified IP
servers, such as Databases, Application Servers, and Portal
servers.
Unified Resource Manager Application used to set up and administer the telephony
resources for the Aspect Unified IP contact center
infrastructure including TDM and IP telephony servers as
well as SIP signaling and SIP proxy servers. You also use
this application to configure devices, add them to Route
Groups, associate Route Groups with Dial Patterns,
manage system messages, and configure CTI Reactive
Blending. The application also allows you to create and
delete Application Endpoints, contact objects, and SIP
URIs for Instant Messaging which are referenced in an
Inbound Instant Messaging service created in Unified
Command and Control - Administration.
Unified Director A configuration application that enables a supervisor to set up,
manage, and maintain numbering plan, knowledge base, and
other resources.
Application Description
Advanced Speech Web Application used for creation of IVR scripts for the Advanced
Application Portal Voice Portal.
/VoiceXML Studio
Unified Command and Control An application used for the viewing of real-time canvases for
- Real-Time Reporting statistics. Unified Reporting provides a comprehensive view of
your system resources by eliminating the need to integrate
reporting data from multiple sources.
Unified Command and Control An application used to view real-time statistics and to build
- Producer custom real-time canvases for statistics.
Advanced List Management An application used for the management of advanced outbound
Desktop (Optional) campaigns (services). Advanced List Management provides
centralized record management functionality at an enterprise
level. The system processes raw customer data modeling
strategies and sends complete contact records to the dialers in
specified order based on the published demand of each
individual dialer.
Note: Advanced List Management cannot be used in a RAID 5
environment.
Aspect Quality Management An application used for recording voice and window interactions
(Optional) based on customizable business rules. You can retrieve the
recordings using advanced search criteria, play the recordings
back, and score the recordings for quality and training purposes.
Aspect Quality Management integrates with Unified IP, which
enables you to take advantage of the environmental definitions
(such as agents, agent groups, or teams) to create advanced
recording rules and search criteria.
Application Description
Agent Web Service SDK The Agent Web Service SDK (Software Developers Kit) enables
(SOAP) application developers to control and manage the contact-media
features of Aspect Unified IP Agent Web Services. It is also used
to notify CRM applications when contact-media events occur,
such as AOD Automatic Outbound Dialing) and ACD (Automatic
Call Distributor) calls, chat, or e-mail offerings.
UAD API The Unified Agent Desktop API is specific to the Unified Agent
Desktop application. It is described in the Aspect Unified IP
Agent Web Service SDK Guide.
CTI EDK The CTI EDK (Embedded Development Kit) enables application
developers to control and manage the events, requests, and
responses that are generated in an Aspect Unified IP CTI
Portal Server (CTIPS) environment. CTIPS enables application
developers to control and manage the inbound, voice call
handling, and agent outbound features of the Aspect Unified
IP system.
Application Description
DTI The Agent Web Service SDK (Software Developers Kit) enables
application developers to control and manage the contact-media
features of Aspect Unified IP Agent Web Services. It is also used
to notify CRM applications when contact-media events occur,
such as AOD Automatic Outbound Dialing) and ACD (Automatic
Call Distributor) calls, chat, or e-mail offerings.
AOD Feed API The Automated Outbound Dialing Feed API for Unified IP is used
for feeding records into the system in real-time for outbound
dialing. AOD (Automatic Outbound Dialing) is a service provided
by the Unified IP system. It enables a contact center to
automatically generate outbound contacts, to monitor the
progress of a contact, and to route the contact according to its
resolution (for example, whether the contact has been answered
by a person or the caller has received a progress tone such as
busy, reorder, or a ring back.) An AOD service is normally used to
increase agent productivity.
External Call Logger The component interface that allows for integrations to third party
call logging systems.
LYRICall Designer A user friendly WYSIWYG HTML editing tool that enables you to
create customized scripts.
M3 Designer (MultiMedia The application used to design and implement custom scripts for
Designer) voice, chat, email, and workflow. Multi Media Manager is the
Unified IP component that provides a visual script-development
environment for automating responses to customer contacts.
Workflow Management API This application, also referred to as the Automated Workflow
Distribution (AWD), enables users to integrate with external
systems to drive tasks for Workflow services. Workflow services
enable a director to set inbound work tasks to automatically
queue, prioritize, and route help desk tickets, a fax, or other
electronic media to agents within the contact center.
Custom SMS Service This SDK allows you to implement a custom Outbound SMS
Provider SDK application. See the Aspect Unified IP System Configuration
Guide for details.
Exchange Remote Certificate Aspect Unified IP provides inbound email, outbound email,
Validation Callback API Outbound SMS(Standard integration) functionality. Customers
who want to leverage above functionality must implement an
Exchange Certificate Validation Callback API which meets the
customer security requirement. Aspect’s customer must engage
the Aspect Professional Service team to implement the certificate
validation callback code.
Server Description
Advanced List Management The Advanced List Management system provides centralized
(Optional) record management functionality at an enterprise level. The
system processes raw customer data modeling strategies and
sends complete contact records to the Dialers in specified order
based on the published demand of each individual dialer.
Unified Media Server (UMS) The Unified Media Server is a single integrated server solution
that supports the Aspect Unified IP telephony subsystem.
Core Server (Primary and Main Unified IP Server that runs the core software components.
Secondary)
Host Conn Web Service Required for access to databases with LYRICall and the Multi
Media Manager (M3).
Instant Messaging (IM) Required to store all recordings of instant messaging (IM)
Recording Store (Optional) transactions.
Knowledge Base Server Software component that houses questions and answers within a
database for agents to access as part of Agent Assist and for
Email Auto Response.
Logging Server Software component used to manage and refine log level
settings for each component in the system and perform log
collection requests (either scheduled or on-demand).
Media Server (Optional) Houses the Chat Server and Chat Load Balancer.
Lync Server 2010/2013 Server used to manage all real-time communications (such as
(Optional) Instant Messaging and audio) within the enterprise. This server is
required for agents responding to and interacting with customers
by instant message, and for contacting other agents, supervisors,
or experts in the enterprise who are using Aspect Unified IP.
Aspect Quality Management Provides the ability to record voice and window interactions
(Optional) based on customizable business rules. Using Quality
Management with Unified IP, you can implement live monitoring
of agent interactions with customers and retrieve recordings.
Recording Storage Server A Unified IP component that is installed on the servers where
recording files are stored.
Server Description
Screen Recording - Optional Software server used for screen capture recordings.Screen
capture is only available for a medium or large tenant profile. If a
tenant falls into a small tenant profile, they must be configured as
a medium tenant for screen capture recording.
Unified IP Enterprise Routing Routing component that provides call routing to remote switches.
Broker (Optional) A server is needed to support the Broker application that handles
all communications between the switches.
Unified Command and Control A Shared Memory (SM) server is needed to support Unified
- Real-Time Reporting Command and Control - Real-Time Reporting. A separate server
is required for each tenant in an ASP environment.
Unified Communications Required to load balance inbound email and standard SMS
Media Load Balancer integration.
(Optional)
Server Description
Customer Database Server Used as an additional place to store call tables. Instead
of importing Outbound table data through Director, you
can define and use one of your existing database
servers as the source for these AOD tables. You can
have the system transfer the data to the database
servers directly, which is more convenient than re-
importing data to Director. If the Unified IP system you
are configuring uses a Customer Database, then you
must configure it with the Server Configurator.
Server Description
Arbiter Server Works with the Primary and Secondary Datamart servers
to provide failover redundancy.
Application/Process Description
Unified Media Server 19 (UMS The Unified Media Server is the only telephony device
19) supported by Unified IP 7.4.
Third party software components that must or may be provided by the customer are listed in
the Aspect Unified IP 7.4 Hardware and Software Guide.
Note: Some third party applications, such as Virus Scan and backup software, may impact
overall system performance when installed on any of the servers. If these applications
are deemed to negatively impact the performance of the system, Aspect Customer
Care requires that the customer remove the third party software product.
Note: When using Polycom phones, the Trivial File Transport Protocol (TFTP) software that is
used with the phones must be installed on the core server with the Aspect SIP Proxy.
• Unified Command and Control- Administration—A smart client application that is used to
manage agent and routing resources across Aspect products so that you can administer
one or more Aspect products from a central user interface. When using Unified IP, Unified
Command and Control - Administration is your primary administration interface for setting
up and managing your environment including your user community and your applications
and services.
• Server Configurator — A client application that is used to install, configure, manage, and
maintain the components (including the Unified IP application servers and portal web
services) of a Unified IP contact center system.
The following table defines the users configured during a Unified IP system installation and the
basic staff required in the operation of a single and multi-tenant contact center.
Supervisors and Unified Command and Control - Administration Permissions could vary from
Directors application creating, managing, and
maintaining system users and
There are other See the Unified Command and Control - services to monitoring real-time
discretionary roles that Administration System Administrator Guide. statistics. Using the Unified
can be set up in your Command and Control -
contact center using the Administration application,
Unified Command and contact center managers can
Control - Administration configure and provision
application, such as Inbound and Outbound
Analysts, Database services, Email, Chat, Internet,
Managers, Network and fax services.
Administrators, and
others. Specific permissions are
assigned when entering
demographics and specialties
of each user in the Unified IP
system.
Agents Unified Command and Control - Administration The associates logged into the
Application system ready to make or take
contacts.
See the Unified Command and Control -
Administration System Administrator Guide. Specific permissions are
assigned when entering
demographics and specialties
of each user in the Unified IP
system.
The following sections provide additional information to help you understand and plan for an
Enterprise Deployment.
• Contain either an Enterprise Site or a Default Site. There can be only one Enterprise Site
across all Geographic Locations.
• Include two Unified Command and Control - Administration servers. Each machine
includes SQL Server, Unified Command and Control Administration Server, Unified
Resource Manager Server, and the Unified Command and Control - Reporting Real-Time
Reporting Server.
• May contain one or more additional, separate Real-Time Reporting Servers (for scaling
purposes).
Note: Additional Reporting machines are required only if you expect to have more than
500 users for the default Real-Time Reporting Server that runs on the Unified
Command and Control - Administration machine.
• May contain one or more Routing Broker Servers (required for Enterprise Intelligent
Routing).
• If you are selecting the Enterprise Reporting option, a Warehouse server must be installed
in the Geographic Location that hosts the Enterprise site. The location of the Warehouse
server is selected when you use the Deployment Wizard to create the
DeploymentConfiguration XML file. See the Aspect Unified IP Installation Guide for details.
Note: You must designate a separate Geographic Location for any one or more Unified IP
systems that may be isolated from other systems in the Enterprise. This will make
certain that the necessary Enterprise machines needed to manage the systems will be
available. If you put two Unified IP systems in the same Geographic Location, a failure
at one of the systems, or a failure of the network between the systems, will make
management of one of the systems impossible - even if the systems are located in
separate data centers. For Disaster Recovery, it is mandatory that the Secondary (DR)
system is in a different Geographic Location from the Primary (production) system.
The Enterprise Site includes the following Enterprise machines in addition to the Unified
Command and Control Admin Enterprise and Unified Resource Manager Databases which are
deployed on the Unified IP Primary Database server.
This chapter contains pre-implementation site planning and system requirements for an
Aspect Unified IP environment.
The Unified IP 7.4 installer has the ability to automatically create a WSFC cluster with the
required configuration. For cluster configuration, the installation program uses information
provided by the user during creation of the DeploymentConfiguration XML file. There are three
configuration parameters collected by the Deployment Wizard during the XML creation
process:
• Cluster IP
The Unified IP installer creates a two-node WSFC cluster enlisting the Primary Datamart
Machine and the Secondary Datamart Machine. A File Share Witness is also configured in
order to provide a minimum of three votes required to maintain quorum. The file share is
located on the Agent M3 Arbiter machine. There are no other services or resources configured
for this WSFC cluster. In other words, only a “blank” cluster is created. The automatic cluster
creation option is always recommended when possible.
In situations where customer specific security constraints prevent use of the automatic cluster
creation functionality, you can manually create clusters before installing Unified IP. This
manual procedure includes the ability for the Unified IP installer to create new AD objects for
the WSFC cluster. Before attempting to create a new cluster, the Unified IP installer first
determines if a WSFC cluster already exists that matches the data in the
DeploymentConfiguration XML file.
See the Aspect Unified IP Installation Guide for manual cluster creation procedures.
Beginning with Unified IP 7.3 SP1, High Availability is achieved using Windows Clustering with
SQL AlwaysOn technology. This technology requires a domain account to properly install
Unified IP. In earlier releases of Unified IP, a non-domain administrator account such as
‘LOCALHOST\administrator’ was used for push and manual installs, but this type of account
cannot be used for Unified IP 7.3 SP1 and later installations. This is because a non-domain
account cannot be granted the privileges required to create and configure the domain
resources used by Unified IP.
A domain admin account, that is, a member of the Domain Admins group, will always have all
of the required privileges, but this is too high a level of privilege because it allows root access
to the entire domain. Instead, a separate account with a lower set of rights is preferred.
See the Aspect Unified IP Installation Guide for the procedure required to create the Install
Account.
The Unified Media Server uses two ENET ports and two RTP ports on the back of the unit. The
two ENET ports (ENET A and ENET B) are used for Ethernet communication to and from the
unit. The two RTP ports (RTP A and RTP B) are used for VOIP and Telephony subsystem
interconnecting between units. Each set of ports (RTP A and B is one set) can be configured
for failover support. These ports can be connected to separate network switches to provide
additional resiliency. This is configurable through the Unified Resource Manager interface. See
the Aspect Unified IP Unified Resource Manager Administrator guide for configuration
procedures.
By default, the Unified Media Server RTP A and ENET A ports are the only active ports on the
back of the unit. The ENET port is the connection to the corporate network to allow
communication to and from the other Unified IP servers similar to the ENET A port on a
Telephony Media Server. The RTP port provides connection to the VOIP functions of the
Unified Media Server such as RTP of the VOIP agent connections, VOIP calls to external
devices, Inbound and Outbound RTP connections, and Telephony Subsystem Interconnects.
The Unified Media Server RTP A port must be connected to the corporate network using either
a dedicated Ethernet switch or a private VLAN.
Unified Media Server maintenance and repair of hardware failures is handled by returning the
unit to Aspect for repair or replacement. Aspect recommends that customers have backup
devices available to meet their needs in the event of a failure. The only exception is the hot
swappable power supply. You can replace individual power supply units without taking the
system offline and Aspect recommends that customers purchase a spare in case of failure.
Unlike its predecessors, the Unified Media Server is completely accessible using Windows
applications such as Unified Resource Manager. These utilities include troubleshooting tools
and log retrieval applications that allow the user access to the logs and Unified Resource
Manager information.
The Unified Media Server has 16 TA/E1 transceiver ports that can be available for TDM circuit
connections, configurable through the Unified Resource Manager interface.
Note: The Unified Media Server is a non-interactive, sealed telephony appliance maintained
entirely by Aspect Software. All point releases, updates, and corrections shall be
provided through Aspect’s standard distribution processes. No third party software or
utilities are to be installed on the device.
• Ensure that the Unified Media Server is not connected to the public internet.
• Note the maximum number of channels of concurrent recordings per Telephony Subsystem
is 600.
Note: Aspect recommends that the customer have an additional Unified Media Server
available at all times. See the Aspect Unified IP Hardware and Software Guide for
additional information.
The typical power requirements for the Unified Media Server are provided in Table 3-1, which
uses the following power state designations:
• STANDBY = Unified Media Server In the Power Off state and connected to the AC outlets.
• IDLE = Unified Media Server In the Power On state without call processing or recording.
• FULL = Unified Media Server In the Power On state with call processing and recording.
You can use the as a table top device or a cabinet enclosure mounted device. If the customer
chooses the cabinet enclosure option, the Unified Media Server requires a standard 19 Inch
(482.6mm) cabinet enclosure that supplies support for the Unified Media Server side-mounted
slide brackets. The mounting brackets are adjustable (slotted openings) to accommodate
cabinets with different depth rear supports.
• SVI channels
On the TDM side, the circuits can be balanced between the TDM CPUs, supplying redundancy
for the telephony circuits. The clocking sources under the TDM cards should also be assigned
correspondingly. The TDM ports on the Telephony Media Server share PCM/Conference
resources with the RTP channels so this will need to be taken into consideration when
configuring a system with a mixed environments of Telephony Media Servers and Unified
Media Servers. In this case - depending on the use of these mixed channels - PCM and
Conference resources will be pulled from the pool when required functions are called.
The Unified Media Server has the 992 PCM resources for use for TDM and RTP channels.
There are 2800 Conference Resources that are pooled together across the 4 CPUs that can
be applied for various recording and Conferencing functions.
• AMD Analysis
• Recording
• Conferencing channels
The following table shows how these resources are divided for the Unified Media Server.
Specifications RTP RTP RTP RTP TDM TDM TDM TDM Total
CPU CPU CPU CPU CPU CPU CPU CPU
1 2 3 4 1 2 3 4
Conference 2800 /
Resources 1600
• The Unified Media Server has only one active RTP port to service the VOIP functions. The
second RTP port can be configured for active failover if needed.
• The Agent channels with 100 % recordings can be divided up between RTP and TDM
resources or separated for RTP or TDM only configurations.
• You can have 150 Agents per the 4 CPUS to supply the total of 600 agents with full
recording supported.
• You can also have 120 E1 30 channel Agent TDM resources configured for each TDM CPU
(slot), giving you 480 full recording enabled channels. In order to reach the additional 120
agents with full recording the remaining channels could be configured as 30 RTP channels
per RTP CPU giving you the 120 resources needed to reach 600.
For details about the maximum number of agents and resources allowed with and without
recordings enabled refer to Unified Media Server Protocol Rules on page C-1 for the capacity
chart for the Unified Media Server.
• If the Central Office (CO) delivers an inbound call on a trunk, the Unified IP system will give
a busy signal to the far end on that trunk if it has not yet been released from the previous
call. We will call this Inbound/Outbound glare.
• The CO is delivering an inbound call and the trunk is still in guard on the Unified IP system.
We will call this Inbound/Inbound Glare.
• Unified IP is dialing an outbound call at the same time the CO is delivering an inbound call.
This situation is similar to the one described in the first bullet, above. The short answer
here is the call is unlikely to go through in either direction.
Option 1 (preferred):
Split the Inbound and Outbound trunks into separate resource groups and make sure the
circuits in those respective resource groups are set for Inbound or Outbound but not both. In
the case where an odd number of trunks are needed to handle busy hour transactions, it is
possible to split a circuit and have some inbound trunks and some outbound trunks from a
single circuit split across multiple resource groups. Also, the CO should set the inbound trunks
to use longest idle time to minimize inbound/inbound glare.
Option 2:
An alternate solution is to allow all trunks to be Inbound and outbound and reside in a single
resource group. In this case, you must mark all the circuits to be terminal. Be aware that
Unified IP dials in ascending order in terminal mode. Next, you must get the CO to make a
change on the trunk group such that the trunks are used at the CO in terminal mode, but in
descending order. This allows the Unified IP system to dial on the trunks starting at the first
trunk of the first circuit. At the same time, the CO will deliver inbound calls starting with the last
trunk of the last circuit. The goal is to size the system properly for busy hour transactions such
that the incidence of inbound and outbound trunk collision is minimized.
3.3.3.1 Overview
Server VOIP Interconnect uses some of the resources found under the general pool of RTP
channels and assigns the RTP ports for intercommunication between multiple Unified Media
Servers. In this option of automatic SVI start up and configuration, the process does not use
SIP protocol messages to connect the channels. Instead the connections are strictly controlled
by the CC2DCP and DCPSRV applications to determine which RTP ports are to connect to
others on different Telephony subsystems. In later versions of Aspect Unified IP, the option of
configuration under a resource group requires the SIP proxy to be configured so that Invites
can be sent to establish each SVI interconnect channel. Aspect recommends limiting the
number of connects configured to the number needed to handle calls that are best handled by
transferring them to other telephony units. This is accomplished by strategically configuring
Services and channel resources on the same Telephony unit when possible. The SVI channels
must be G711 in nature on the master controller card but can be any codec available on the
Packet card or Unified Media Server circuit. For a Unified Media Server, you must create an
SVI Resource Group on the Unified IP system unless you wish to disable call legs to this
Telephony Subsystem.
As more customers began using the SVI interconnects for larger numbers of SIP to SIP calls,
it became advantageous to implement SIP REFER for SIP based calls coming in or out of the
system. The REFER option is configured in the Unified Resource Manager application. When
the call enters the system, if call endpoint is a SIP device that supports REFER, the application
determines that a SIP REFER should be used to connect the call to the Agent or Service on a
particular destination Telephony Subsystem. This eliminates a need for a SVI channel to be
used in the connection. If the call coming into the system is not a SIP call, the application
defaults back to using an SVI to connect to two call legs between the Telephony Subsystems.
Note: SIP REFER must be enabled on both circuits participating in SVI with REFER enabled.
• How many channels are first started up?: The number of channels is defined under the
SVI Resource Group in the Unified Resource Manager application. Only one channel is
started between each Telephony subsystem.
• Where are they started?: These are started on the UMS Defined Circuit, and are defined
by the user under the Resource group.
• How many channels are added when needed?: Only one channel is started at a time. A
minimum of one channel between each Telephony Subsystem is running by default, and if
this channel is used, another channel is started so that there is always one channel
available.
• What happens if SIP REFER is enabled?: If the inbound or outbound endpoint device is
SIP and supports SIP REFER, a REFER request is sent to connect the call to the
destination Telephony Subsystem. The application level service then provides commands
in the form of SIP Invites to the proxy to connect to two call legs now locally to the same
subsystem. If the device does not support REFER or is non-SIP in origin than an SVI
channel will be used to connect the two call legs.
• What happens if SIP Refer is Disabled: All calls that need to be connected to a
destination not on the local Telephony Subsystem will use an interconnect channel.
• SIP Circuits will not show up for assignment under the SVI Resource Group unless all the
circuit settings and codecs match.
• WAN G729 interconnects are no longer be needed for configuration under the registry of
the CC2DCP. This is now done under the Resource Group and by defining Circuits for the
729 codec.
When upgrading it may be relevant to note the registry entries used for custom interconnects
so they can be satisfied either by use of resource group or by adding registry entries in the
upgraded system. IMPORTANT! The registry entries will take priority over the Resource group
or automatic SVI startup.
Under the SVI Resource Group in the Unified Resource Manager application, there is an
option to enable “REFER for AOD calls”. Enabling this option will generate a REFER request
to the outbound call leg to send the call to the recipient Agent’s Telephony Subsystem (if not
already on the local unit). The Endpoint device for the outbound call must be SIP and support
REFER otherwise the system will default to using a standard SVI channel to connect the two
call legs between Telephony Subsystems. This should be enabled only when the Endpoint
device for the Outbound call is tested and confirmed that the REFER can be serviced within
the parameters of the customer site. If the customer is using OFCOM or similar regulations, or
if the device receiving the outbound call is slow processing the refer, the call may fail.
The size of the UPS system depends on the electrical power demand of the specific
installation.
3.3.6 Cables
The following specifications are for systems that are installed and configured within the same
Local Area Network (LAN.) The cables must be installed and available before installation.
Note: Customers can use their own cables providing the cables meet Aspect Software
specifications.
Other cables for specific functions may also be required. See the Telephony Regulatory
Guides for detailed information on cable requirements.
The following are examples of typical cables required for the over-all site installation:
• One for each Telecom Port between the telephony device and the CSU, PBX or NT
• 1000 Base T or 100 Base T Cable between Servers and customers network switch
depending on network settings
• 1000 Base T or 100 Base T between VoIP Port and Network switch depending on network
settings
• One per 10/100 Base T Ethernet VoIP Port and Network switch
• The Unified Media Server supports up to 1000 Base T on all Ethernet ports
Note: See the Telephony Regulatory Guides for the availability of Fixed Length Cables,
detailed specifications for raw cable and termination information about site built cables.
https://docs.microsoft.com/en-us/windows/security/identity-protection/windows-firewall/create-
an-inbound-icmp-rule
• CSU for North American Installations (if not provided by the telephone company)
Note: The customer can also use an MUX with an integrated CSU, provided the following
criteria are met:
• The UMS-00 T1 Interface does not connect directly to the Public Switch Telephone
Network (PSTN) in North America (U.S. and Canada) and Japan. The T1 Interface
must be placed behind a UL Listed / CSA Certified Channel Service Unit (CSU) or a
UL Listed CSA Certified T1 Multiplexer with integrated CSU in North America. The
T1 Interface must be placed behind a J60950 Listed CSU or T1 Multiplexer with
integrated CSU for use in Japan.
• The UMS-00 E1 Interface (not used in North America and Japan) connects directly
to the Public Switched Telephone Network (PSTN) and does not require placement
behind a CSU or E1 Multiplexer. Placement of the E1 Interface behind a CSU, E1
Multiplexer or PBX can be implemented if the installation requires it.
• Ethernet
The standard Aspect network environment is Ethernet running TCP/IP. Aspect does not
certify or support Aspect system operability on a Token Ring (TR) network. Aspect software
can, however, coexist with a TR network. TR users must provide the appropriate interfaces
to the Aspect Software system and RPM clients to facilitate transparent TCP/IP exchanges.
Users running TCP/IP under TR must use a gateway between the Ethernet and TR
networks (that is, a network router capable of supporting multiple network interfaces and
protocols or a stand-alone dual-LAN router).
• LAN/WAN
• LAN/WAN settings
• Bandwidth requirements
• Latency issues
• Use VoIP bandwidth calculators to determine the required bandwidth. See the Aspect
Network Preparation Guide.
For detailed installation and configuration procedures, see the Aspect Virtualization Guide.
• For SIP Dialing, the amount of latency on the network (audio and signaling) affects the
amount of time required for Answer Machine Detection.
• Customers who must comply with OFCOM regulations should turn answering machine
detection off.
• Customers should ensure that they have enough network bandwidth to handle the SIP
interactions. See the Aspect Network Preparation Guide for guidelines.
• Customers should confirm carrier calls per second limits to prevent overdialling.
• SIP events must be mapped correctly coming from the SIP carrier. The SIP call progress
events (for example, SIT Tone, Busy, Ringing) must be tested during installation and
determined that they are mapped correctly within Unified IP. Some carriers may map these
events differently so it is necessary to make adjustments in the dcpsrvX.config file to
ensure that these events are provisioned correctly within Unified IP.
• Early media (audio can be exchanged between the caller and SIP end point before the
session is even accepted) should be supported on the SIP carrier in order to get audio
before the answer bit and obtain the best AMD performance.
• It is important to obtain reliable connection information from the SIP carrier and to have
proper QoS (Quality of Service) on the network.
1. A message is sent to the agent that notifies them about the loss of desktop connectivity to
the system.
2. If there is a call in process, the agent concludes the call, verbally says goodbye and hangs
up the phone. This is required because when the agent logs back in, a callback is initiated
on the agent's line.
3. The system automatically connects the desktop to an available core expansion server and
authenticates the agent. The agent does not need to enter new server addressing
information or credentials.
This agent side load balancing also introduces complexity when customers use the Agent SDK
to create custom desktops. In Aspect Hosted deployments, all Unified IP Portals reside on the
Hosted DataCenter side without being directly accessible to the Customer network. Because
of this, customers cannot use hardware load balancers or other similar strategies on the
customer network, as the customer network can only communicate with the ReverseProxy
directly. Hence, custom applications built with the Agent SDK must be constructed with built in
application intelligence similar to the Unified Agent Desktop load balancing mechanism. By
shifting load balancing intelligence from the Agent desktop applications to the Portal servers,
bandwidth usage is reduced and performance is improved.
To implement server side load balancing in Unified IP, you must add the
useportalloadbalance parameter to the UADProp.htm file on each Agent Portal (Core
Expansion) machine and then set the parameter to “true” (useportalloadbalance=true).
The useportalloadbalance parameter enables the Unified Agent Desktop to use server
side load balance instead of its own. The server side load balance uses a “Random Weight”
algorithm to distribute the load across the Agent Portals. When the parameter is set to“false“or
no-parameter, server side load balancing is disabled and load balancing is handled by the
Unified Agent Desktop applications (least loaded algorithm).
For Unified IP deployments installed on premise, all you need to do to enable server side load
balancing is to do the following on each Core Expansion machine:
1. Navigate to the UADProp.htm file at: Agent Portal Machine > [Install Drive]\Program
Files\Aspect Software\Unified IP\UADInstall\uadprop.htm.
2. Open the file with notepad add the useportalloadbalance parameter and set it to
“true” (useportalloadbalance=true).
1. Open Microsoft SQL Server Management Studio and navigate to the following screen:
2. For Portal machines only, edit the PublicFqdnName column with their respective public
FQDNs. By default, the column contains the same hostnames as in the DNSName column
of the SiteMachines table.
Note: Failing to update the PublicFqdnNames will expose the actual or private FQDN/
hostnames of the Portal machine(s) when the Unified Agent Desktops request
server side loadbalancing. This will cause the connection between the Unified Agent
Desktop and the Portal to fail.
• Manual Implementation
• 3DNS
All load balancing solutions are intended to limit the usage of each Agent/M3 Expansion server
and Unified Command and Control - Administration servers to within the available capacity
and to provide for redundancy if one of the server instances fails. Currently, none of the load
balancing methods check for user session counts. Instead, load balancing functions by
implementing an even distribution of users or by measuring traffic.
Regardless of the solution that you choose, a user that loses a connection to the system must
log in again to create a new session. For agents, the specific steps are as follows:
1. If there is a call in process, the agent concludes the call, verbally says goodbye and hangs
up the phone. This is required because when the agent logs back in, a callback is initiated
on the agent's line.
2. The agent attempts to log back in using their main address. This enables an agent running
in manual mode to determine whether the server is down before trying another. Agents in
automatic mode are automatically routed to another server if required.
3. If the agent is running in manual mode and the server is down, the agent tries the
designated backup (redundant) portal.
To implement a manual approach, you arbitrarily divide your agents into portal-groups
consisting of 500 agents each (a single Agent Portal supports a maximum of 500 agents only
in basic implementations without custom LYRICall scripts or use of HostConn). You assign
each portal-group to one of the main portals and ensure that each agent desktop is configured
so that there are two different portals available within the agent pick list. The first portal in the
list is the main portal designated for the agent's portal-group. The secondary portal is the
designated backup redundant portal, which is the same for all portal-groups. In this model, if
one portal fails, it only affects the agents assigned to one portal-group. When the affected
agents log in to the backup portal, it is available to handle the capacity because it is not being
used by other agents.
This method works well if you can easily assign agents to portal-groups. However, you may
have difficulty if you have a large pool of agents with a variable subset of agents who are
working at different times using personal desktops. This is not an issue in free seating
environments in which agents use a generic login desktop configured by seat.
The solution shown in Figure 3-1 depicts an architecture that uses the manual load balancing
method described in this section.
Define the (round robin) group name in DNS as same host with multiple A records. This should
be the IP address for the Agent/M3 Expansion machines. (Below dportals, core1, core2, and
uip1.corp.com are just examples, any specific system short names and FQDN can be used)
under Forward Lookup uip1.corp.com:
dportals IN A 192.168.226.109
dportals IN A 192.168.226.110
Make sure that no PTR records are created for these group name records (uncheck the
generate PTR option). If PTR records were created, delete them (dportals) from the Reverse
Lookup Zone. This will prevent the group name from being returned on a reverse lookup. On
reverse lookup, we want to get the specific machine hostname for use with certificates.
under Forward Lookup uip1.corp.com:
core1 IN A 192.168.226.109
core2 IN A 192.168.226.110
Make sure that these specific machine address records also have PTR entries in the Reverse
Lookup Zone, and that these are the host names used in the certificates.
• has reverse lookup on other A records for the same specific machine
If there are problems with reverse lookup on customer DNS, hosts file entries should be set on
the ALM servers to override DNS.
in hosts:
192.168.226.109 core1.uip1.corp.com
192.168.226.110 core2.uip1.corp.com
Enter the FQDN (as above) or shortname (core1) as needed for the certificate. Do not enter
any entries for the group name (dportals) in the hosts file.
For each portal, certificates must be installed with a single specific hostname. This should be
set with either the shortname or FQDN. Subject Alternative Names (SAN) cannot be used, as
the ALM SOAP library does not support SAN.
Testing
Test with command line: nslookup ipaddress to determine if the configuration is set up
properly to return the correct host name needed for the certificate.
The custom client application relies in part of the DNS feature called DNS Round Robin that
allows a single hostname to resolve to multiple IP addresses. This is configured within DNS by
associating multiple address records (A), each specifying a different IP address with a single
hostname. When DNS is asked to resolve a hostname with multiple IP addresses it will return
those addresses in a different order each time the name is resolved. [Note: The convention is
that DNS return the addresses in a different order each time the name is resolved, there can
be exceptions] Most applications (like Web browsers and ping) rely on the OS to resolve the
hostname and open a socket to that IP. The OS, on behalf of applications, uses DNS to
resolve the hostname to multiple addresses, selects the first IP, and opens a socket to that IP,
which is returned to the application. Many operating systems will also cache the hostname
and addresses in a DNS Cache which may last up to 24 hours. If you were to ping a hostname
with multiple IP addresses, the OS will likely select the first IP address from its DNS cache for
every request. In contrast, the custom client application only asks the OS to resolve the
hostname and return the addresses associated with that name. The application bypasses any
DNS cache when opening sockets. When the application receives the N addresses for the
hostname, it caches them within itself and follows the random selection algorithm described
above. Once it randomly selects an IP, only then does the application ask the OS to open a
socket connection to that IP address.
Both DNS Round Robin and the custom client application resolve a hostname to multiple
addresses similar to nslookup below. The following command resolves the hostname
www.cnn.com into eight addresses; each time it is called, nslookup displays the eight
addresses returned in a different order.
Non-authoritative answer:
Name: www.cnn.com
Addresses: 64.236.29.120, 64.236.91.21, 64.236.91.22, 64.236.91.23
64.236.91.24, 64.236.16.20, 64.236.16.52, 64.236.24.12
Non-authoritative answer:
Name: www.cnn.com
Addresses: 64.236.91.23, 64.236.91.24, 64.236.16.20, 64.236.16.52
64.236.24.12, 64.236.29.120, 64.236.91.21, 64.236.91.22
If you ping www.cnn.com (which will probably fail, which is ok) the same address is likely to be
used each time, this is because the OS places www.cnn.com in a DNS cache with the
corresponding IP. Each time that ping is run the OS pulls the first cached IP out of the DNS
cache.
>ping www.cnn.com
The following Windows command displays the DNS cache with 64.236.16.52 listed first:
>ipconfig /displaydns
Windows IP Configuration
www.cnn.com
----------------------------------------
Record Name . . . . . : www.cnn.com
Record Type . . . . . : 1
Time To Live . . . . : 263
Data Length . . . . . : 4
Section . . . . . . . : Answer
A (Host) Record . . . : 64.236.16.52
Data Length . . . . . : 4
Section . . . . . . . : Answer
A (Host) Record . . . : 64.236.24.12
Record Type . . . . . : 1
Time To Live . . . . : 263
Data Length . . . . . : 4
Section . . . . . . . : Answer
A (Host) Record . . . : 64.236.16.20
3.6.2.2.3 3DNS
A more effective DNS strategy makes use of a 3DNS server. When using a 3DNS server, you
configure the server with a group name associated with all the available portal addresses
including the redundant portal, similar to the DNS group name. However, the 3DNS server is
also configured with the IP port of the portal (8180) at each address, which it can use to test
whether a server is online. After setting up the server, you configure the desktop with the
3DNS group name. When the desktop requests the DNS lookup for the address, the 3DNS
server returns a single address (after skipping un responsive servers) based on implementing
an even distribution from all received requests.
To protect against this type of issue, you must use the following guidelines when using
dynamic DNS:
• Ensure that the primary directory server listed in the Security Portal is the pooled address
used by the dynamic DNS.
• Add two backup/failover directory servers (domain controllers) to the security portal using
their static DNS addresses. This enables the system to run as tested if the dynamic DNS
server does not function correctly by providing an alternate address if a bad address
obtained from the pooled address is cached.
Note: In normal circumstances, the dynamic DNS pooled address is used for all directory
server accesses.
In the event that any support issues arise when using dynamic DNS, be aware that Aspect
Support can only assist with backup/failover servers that are configured to use static DNS.
Troubleshooting issues that occur when using primary dynamic DNS pooled addresses are the
responsibility of the customer.
affinity so that all requests from the agent go to the same portal throughout the login session).
This solution is more precise than either DNS solution because all sessions pass through the
balancer enabling the balancer to determine when the connection is no longer valid. Although
it is precise, with this solution you are adding a hardware component to your system, which
introduces the risk of hardware failure. In this case, a hardware failure would result in a loss of
all login sessions. Therefore, to ensure that you are minimizing risk as well as implementing
fault-tolerance, you must add one or more additional redundant load balancers.
To implement a manual approach, you arbitrarily divide your users into two groups (in large,
enterprise deployments there may be more than two instances of these servers available. In
that case divide your users into the same number of groups as the number of available Unified
Command and Control - Administration servers.) You assign one group to use the first server.
You assign the second group to use the second server. You control this assignment using a
desktop shortcut. You also create a second desktop shortcut that enables the user to access
the other Unified Command and Control - Administration server (to which they are not
assigned). The agent uses this shortcut only when the assigned server is not available.
The Redundant Deployment model requires multiple instances of the Unified IP UCM server.
Load balancing plays the critical role of delivering load distribution and high availability across
multiple Unified IP UCM servers. In addition to helping to improve performance, this also helps
ensure that if one Unified IP UCM server fails, another Unified IP UCM server instance will
continue to provide service.
See the Aspect Unified IP System Configuration Guide for the procedures required to
implement load balancing for UCM functionality.
• Secure OS
• Install Account
• Service Accounts
For additional information on security, see the Aspect Unified IP Security Guide.
1. Cryptographic security: TLS 1.2 should be used to establish a secure connection between
two parties.
3. Extensibility: TLS 1.2 provides a framework into which new public key and bulk encryption
methods can be incorporated as necessary. This will also accomplish two sub-goals:
preventing the need to create a new protocol (and risking the introduction of possible new
weaknesses) and avoiding the need to implement an entire new security library.
Beginning with Unified IP 7.3 SP5, TLS 1.2 is implemented by default at install time, and all the
Unified IP server and client machines are enabled to communicate using only TLS 1.2. Unified
IP machines using TLS 1.2 cannot communicate with less secure machines such as those
using earlier versions of TLS. Implementation of TLS 1.2 requires that all Unified IP servers
use the Windows 2012R2 or later supported Windows operating system and that all client
machines - including the Unified Agent Desktop machines - use the Windows 8.1 or Windows
10 operating system. Since Unified IP 7.3 SP6 restricts the servers and clients to
communicating using only TLS 1.2, it is important that all prerequisites as well as operating
system and custom application requirements be understood and accounted for before Unified
IP is installed.
TLS 1.2 Compatible mode is implemented on a site by site basis using the General tab on the
Site Properties window in the Unified IP Server Configurator application.
TLS 1.2 Secure: This option is enabled by default during installation and upgrades and
ensures Unified IP components transfer data using TLS 1.2 only.
TLS 1.2 Compatibile: This option enables Unified IP components to transfer data using TLS
1.2 and previous TLS versions. Select this option if you have a Unified IP site that does not
support TLS 1.2 in a multi-site environment. For example, if you upgrade Unified IP at one site
only, this option is enabled regardless of whether your other sites are using TLS 1.2. In this
case, you must select the TLS 1.2 Compatible option so that all Enterprise machines can
communicate.
Note: Modifying this option requires Landlord tenant permissions.
Note: TLS 1.2 Compatible mode is to be used only for facilitating Enterprise upgrades when
not all Unified IP machines are at the same release level. TLS 1.2 Compatibility mode is
not to be used when other non-Aspect components in the customer environment have
not been upgraded to support TLS 1.2. It is the customer’s responsibility to ensure that
all components such as Active Directory, Microsoft Exchange and Network Protocols
have been upgraded to support TLS 1.2.
https://support.microsoft.com/en-us/help/3140245/update-to-enable-tls-1.1-and-tls-1.2-as-a-
default-secure-protocols-in-winhttp-in-windows
Basic Unified IP machine prerequisites are provided in the Aspect Unified IP 7.3 SP6
Installation Guide and the Aspect Unified IP 7.4 Hardware and Software Guide.
Note: Install all the latest Microsoft KB patches on all the Unified IP server and client
machines.
Note: If the Unified IP deployment includes an Active Directory server that is on Windows
2008, the same KB needs to be applied on that machine as well. The KB article
ensures that TLS 1.2 is enabled on those machines and it also sets TLS 1.2 as the
default communication protocol. If the Active Directory server operating system is
Windows 2012, Aspect recommends that you upgrade it to Windows 2012 R2 or
Windows 2016 before installing Unified IP.
Platform: x64
Location: http://hotfixv4.microsoft.com/SQL%20Server%202008%20R2/sp3/
SQL_2008__R2_SP3_QFE_OD_x64/10.50.6542.0/free/490329_intl_x64_zip.exe
• You can use the self-signed certificates that Aspect provides by default. These certificates
secure the connections between Unified IP servers and clients, and allow you to quickly get
the system up and running. Although customers are free to continue to use the Aspect self-
signed certificates, most will choose to replace the Aspect certificates with third party or
internal customer certificates for enhanced security, easier certificate maintenance, and
better compliance with established security policies and standards such as PCI.
• In all Unified IP 7.4 deployments (new installations and upgrades from earlier releases) the
Unified IP 7.4 installation program will install Aspect provided SHA-256 certificates that will
expire in 90 days and must be replaced before this time period has passed. You are
responsible for replacing these Aspect installed SHA-256 certificates with either third-party
SHA-2 certificates from a company such as Verisign or SHA-2 certificates generated by an
internally installed and active CA. Note that although the Aspect installed certificates are
SHA-256, any type of SHA-2 certificates can be used as replacements.
• In the case of upgrades to Unified IP 7.4 from earlier Unified IP releases, the installation
program will replace existing Aspect generated certificates with the temporary SHA-256
certificates. If you have previously replaced the Aspect generated certificates with any
other type of certificates, the Unified IP installation program will leave these certificates in
place and will not replace them with the new SHA-256 certificates. In such cases, you must
ensure that the existing certificates are SHA-2 compliant. If they are not, you must
manually replace them with SHA-2 certificates. The procedure for replacing certificates is
provided in the Aspect Unified IP Unified Resource Manager System Administrator Guide
and the Aspect Unified IP System Configuration Guide.
Customers are responsible for monitoring the certificates in their Unified IP environment to
determine when they are due to expire. This applies to all certificate types. The process of
managing and updating certificates is the responsibility of the customer.
• You can use an internal customer certificate generated from your corporate Windows
domain. This is done by installing the Certificate Authority role on a domain controller. This
CA can then be used to issue all the required TLS certificates. These certificates can then
replace the Aspect TLS certificates. This replacement process is a manual procedure in
Unified IP 7.2 and earlier (see the Aspect Unified IP System Configuration Guide for
procedures). In Unified IP 7.3 and later, the certificate replacement has been automated
using the Unified Resource Manager application (see the Aspect Unified IP Unified
Resource Manager System Administrator Guide for procedures).
Customers who wish to use their own internal TLS certificates may require an Aspect
Professional Services engagement to assist with configuration adjustments resulting from
customers replacing their expired certificates. There is the potential for downtime when
certificates are changed and therefore, certificates should be changed during a
maintenance window. You must budget adequate time from a planning perspective prior to
the certificates expiring or being changed to allow the Unified IP changes to be scoped and
planned. Please ensure that a case is opened with Aspect Customer Care to track the
activities associated with updates to expiring certificates so that the appropriate resources
and scheduling are allocated and reviewed in advance. Ultimately, maintenance of
certificates is the responsibility of the customer and not covered under Aspect
maintenance.
See the Aspect Unified IP System Configuration Guide for certificate requirements. See the
Aspect Unified IP Unified Resource Manager System Administrator Guide for certificate
deployment procedures.
• You can purchase a CA from a third party commercial vendor such as Symantec and then
replace the Aspect TLS certificates with certificates signed by the Symantec CA. This
replacement process is a manual procedure in Unified IP 7.2 and earlier (see the Aspect
Unified IP System Configuration Guide for procedures). In Unified IP 7.3 and later, the
certificate replacement process has been automated using the Unified Resource Manager
application (see the Aspect Unified IP Unified Resource Manager System Administrator
Guide for procedures). Third party certificates are especially appropriate for enterprises
that often connect with Web servers located outside the customer’s corporate domain. This
is because certificates provided by well known providers like Symantec are widely trusted,
unlike internal or Aspect self-signed certificates.
Customers who wish to use third party certificates may require an Aspect Professional
Services engagement to assist with configuration adjustments resulting from customers
replacing their expired certificates. There is the potential for downtime when certificates are
changed and therefore, certificates should be changed during a maintenance window. You
must budget adequate time from a planning perspective prior to the certificates expiring or
being changed to allow the Unified IP changes to be scoped and planned. Please ensure
that a case is opened with Aspect Customer Care to track the activities associated with
updates to expiring certificates so that the appropriate resources and scheduling are
allocated and reviewed in advance. Ultimately, maintenance of certificates is the
responsibility of the customer and not covered under Aspect maintenance.
See the Aspect Unified IP System Configuration Guide for certificate requirements. See the
Aspect Unified IP Unified Resource Manager System Administrator Guide for certificate
deployment procedures. .
In addition to the TLS certificates described above for securing connections between servers
and clients, you must use a domain root certificate to secure the connection between Unified
IP and your domain controller. When you select the Secure Data Transmission feature during
installation, you are prompted for the path to the Active Directory (or LDAP) certificates that
your IT department has exported from the authorization server. Make sure these certificates
are in an accessible location and that you have recorded the names of the certificates and
their locations. The Unified IP installation program uses these certificates to enable Secure
Data Transmission. Deployment and management of certificates is handled through the
Unified Resource Manager application. The customer is responsible for obtaining this
certificate and making it available to Aspect.
Note: Secure Data Transmission is supported only in Domains. Aspect does not support
Workgroups.
Note: The Secure Data Transmission Feature requires that the TLS 1.0 protocol be used to
connect to Unified IP servers. From Unified IP 7.3SP2 onwards, TLSv1.2 protocol is
also supported with appropriate Security Updates from Microsoft. Customer client
applications that use a less secure protocol such as SSL 3.0 will not be allowed to
connect to Unified IP servers.
data at the receivers end by re-generating the signature. HMAC can be used with or without
the Secure Data Transmission feature.
To use the HMAC feature, you select the Hashed Message Authentication Codes check box
on the Select Optional Features screen while you are configuring the
DeploymentConfiguration XML file prior to installing Unified IP.
When you select the check box, you designate the displayed string as the secret key that will
be shared by the Unified IP Core server and the Portal servers that are used by the Unified
Agent Desktop clients. Using the secret key, the client generates a message signature using
HMAC algorithm. The signature is attached to the message as a header, and the message is
sent. The server then receives the message and calculates its own version of the signature
using the secret key. Finally, if the signature computed by the server matches the one in the
message, the message is considered authorized.
Note: The string displayed on the Select Optional Features screen can be used as is, or you
can edit it.
The HMAC feature can be used in either premise or hosted Unified IP environments. and can
also be used to authenticate messages between Unified IP and custom client applications built
using the Aspect Unified IP Agent SDK. For more information about implementing HMAC
using the SDK, see the Aspect Unified IP Agent SDK Guide.
3.7.3 Authentication
When using Unified IP, customers must have their own directories for authentication. Unified
IP supports any of the following current industry standard authentication mechanisms:
• iPlanet 5.1 Directory Server/Sun Java System Directory Server (LDAP protocol)
Domains are required for all Unified IP servers and clients. Use of Workgroups is not
supported.
• Customers must have their own Unified IP-supported directory for authentication holding
user credentials (IDs and passwords).
• All user interfaces (such as Agent, Supervisor, Server Configurator and Unified Resource
Manager) require that users log in. These user interfaces connect to the Security portal that
connects to one of the supported customer directories for authentication. Authorization
(permissions) is then determined by the settings in the Unified IP Director Security Plans or
in the Server Configurator user list.
• If using Active Directory, you must follow the Microsoft AD guidelines for server naming as
listed on the Microsoft web site.
• Aspect strongly recommends that all servers and users share the same domain or are in
domains that share a trust relationship (federated). The same or federated domain is
required for:
• Screen Capture workstations and servers.
• M3 Designer and LYRICall Designer workstations and servers.
• Server Configurator, Unified Resource Manager, and servers configured.
There are two options available to customers that want to use an authentication directory
server that is not supported:
Before implementing this authentication method, the customer must contact Microsoft and
confirm that their current directory server is supported.
In this scenario, Aspect is responsible for providing assistance with any issues that occur
between Unified IP and IAS, and Microsoft is responsible for any issues that occur between
IAS and the directory server.
Note: When using IAS in this capacity, Aspect only supports authentication and does not
support the "lookup" feature. Therefore, user names and login ids must be entered
using the Director application.
3.7.4 Secure OS
When an operating system is first installed, it is configured with default firewall settings. These
settings may include more services than are required by Unified IP. These default
configuration settings introduce inherent potential vulnerability. The Secure Operating System
feature automatically resets these defaults so that unused services are stopped and unused
ports are closed.
For additional information on the Secure OS feature, see the Aspect Unified IP Security Guide.
service auditing capability is greatly enhanced. However, you also have the option of using a
single account for all the services.
Note: If you are using Screen Capture, you must create a separate Domain account for
one of the two Screen Capture services (AspectScreenCapture or
AspectProxyGateway).
The account(s) you set up on the Domain Controller cannot be Privileged accounts (Privileged
Domain accounts, Local Administrator or Guest account) with names that include words like
“Administrator” or “Guest.”
The Prerequisite Check tool verifies that the account exists, and searches for these key words
to verify that the accounts are not privileged. It is the customer’s responsibility to make sure
that these users are created on the domain and added to the Local Administrators groups (if
required - see below).
Note: Usernames for Domain accounts must not exceed 20 characters in length.
The service accounts that are marked below in bold must be in the Local Administrator
groups. This is enforced by the Prerequisite check. You must manually add these users to the
servers' Local Admin groups.
• Centercord Service (AspectCentercord) Without Local Administrator privileges,
CenterCord cannot open the ALM WCF ServiceHost connection. If the ALM WCF
ServiceHost connection is not opened, ALM cannot connect to CenterCord and
Outbound Calls using ALM will not be supported.
• Scheduled Reporting Service (AspectScheduledRpt) AspectScheduledRpt must
have local Administrator privileges for Scheduling Reports since this function uses
Windows Task Scheduler for creating and running the tasks that are executed by the
Administrator group user.
• ALM Install User (Any User Name) Only required if Advanced List Management
Reporting or Disaster Recovery is installed This service must have local Admin rights to
allow ALM to create clusters and cluster roles in HA/Tiered HA deployments.
By default, SMB signing is enabled on all Unified IP Windows servers by the Unified IP
Application installer. Both the network client and network server settings are enabled and
required:
• Microsoft network client: Digitally sign communications (always). For more information,
see:
https://technet.microsoft.com/en-us/library/cc728025
• Microsoft network client: Digitally sign communications (if server agrees). For more
information, see:
https://technet.microsoft.com/en-us/library/cc785861
• Microsoft network server: Digitally sign communications (always). For more information,
see:
https://technet.microsoft.com/en-us/library/cc786681
• Microsoft network server: Digitally sign communications (if client agrees). For more
information, see:
https://technet.microsoft.com/en-us/library/cc785861
Unified IP Clients:
By default, SMB signing is enabled on all supported Unified IP Windows clients. The Unified IP
client installer will not change this setting. If needed, you can change the network client
settings to enabled. The network client setting required is not needed.
• Microsoft network client: Digitally sign communications (if server agrees). For more
information, see:
https://technet.microsoft.com/en-us/library/cc785861
Non-Unified IP Clients:
For client machines that are connected to the Unified IP deployment but were not installed
by the Unified IP Client installer (non-Unified IP clients), you must check the SMB setting
and enable it if it is disabled. Examples of non-Unified IP clients include:
• Unified Command and Control - Administration, Unified Resource Manager, and Unified
Agent Desktop clients that are installed by the user typing a URL and downloading the
client.
• Unified Command and Control - Administration, Unified Resource Manager, and Unified
Agent Desktop clients that are installed with an MSI.
• Machines with 3rd party applications (like other client databases or custom
applications), that connect to Unified IP servers.
• Producer clients that can be installed separately and configured to connect to Unified IP.
The SMB setting can be accessed in the client machine’s Registry at the location below:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\LanmanWorkstation\Para
meters "EnableSecuritySignature"=dword:00000001
See the following guides for information about configuring Aspect Unified IP to work with SIP.
• Aspect Unified IP Installation Guide includes instructions for installing your system and
completing initial configuration.
• Aspect Unified IP Unified Resource Manager System Administrator Guide includes
instructions for setting up an IP circuit and configuring the Aspect SIP Proxy.
When using SIP 2.0 hard phones and soft phones, be aware of the following guidelines:
• Aspect Software offers a selection of SIP hard phones and soft phones that have been
validated with Aspect Unified IP. Contact your Aspect sales representative for more details.
• For hard phones, 2 Ethernet ports are recommended to eliminate the need for multiple
cable runs or mini-hubs at the agent workspace.
• When SIP is used for agents, inbound, or voice portal, the Aspect SIP Proxy is required.
Note: Unified IP non-multi-tenant systems do not support more than two SIP Proxy
Servers. Even in a multi-tenant system, Aspect recommends that you do not exceed
two shared SIP proxies. In some special cases, however, it is possible to dedicate
one or two SIP proxies to each a tenant in a multi-tenant system.
• To make these devices reusable, you must remove the IP agents and set up a narrowband
dial-plan for SIP Phones.
• The quick disconnect GNnetcom and Plantronics headsets with an adapter cable, used
with the 5.2 USB audio devices, is reusable with most SIP hardphones.
Aspect recommends that you schedule system backups on a regular basis, and that you store
copies of all system backups at an alternate location in the unlikely event of a physically
destructive disaster.
See the Aspect Unified IP Troubleshooting Guide for additional information about backups.
the Unified IP Server Configurator User Guide for procedures. This is optional and typically,
the default settings meet most customer requirements.
The time required to complete a Unified IP upgrade varies depending upon a number of
factors including deployment size and the amount of data being migrated. During upgrade
planning, the Aspect Upgrade Team works with the customer to map out a strategy that
ensures a successful upgrade in the shortest amount of time possible.
Before starting an upgrade, the Aspect upgrade team needs the following information from the
customer:
• Verification that credentials with sufficient rights will be available to perform the upgrade or
installation
• Verification that all servers are running the required minimum OS versions (Windows 2016
or Windows Server 2012 R2 Standard or Datacenter Edition)
• A list of all third-party products that interface with the Unified IP system
• A list of all other Aspect products including the version (this can also be confirmed using
the Site Survey Tool)
• A list of any special considerations that Aspect needs to be familiar with before the upgrade
The customer is responsible for making backups of all servers and data prior to the upgrade.
Note: For more information regarding the upgrade process, please contact your Aspect
Customer Service Manager (CSM).
This appendix lists the available Unified IP agent profiles and the required machine
configuration that corresponds with each profile. This appendix also details the distribution of
software components on these machines. Unified IP installs components based on Server
Images. All components for a specific Server Image are installed. The Server Role determines
which of those components are enabled.
Table A-1 Components on Unified Command and Control Enterprise Machines used for
Small and Medium deployments.
Table A-2 Components on Unified Command and Control Enterprise Machines used for
Large deployments.
An Enterprise is defined as a Unified IP deployment that has more than one site. These sites
can be configured as either Small or Large profiles.
Note: The only time dedicated Unified Command and Control machines are not required is
when the Unified IP deployment consists of a single Small profile site. In such cases,
the components that are shown in Table A-1 are installed on the Core and Redundant
Core machines.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
• IPNIQAdapter
• UCCAdapter
• UCCAdapter:MULTICAST
• UCCAdminTomcat
• UCCAdminTomcat:NOTIFY
• JORAM
• MonitorApp
• DCPSvr
• ExpertQuery
• OSMSProxyServer
• ImportExport
• AspectSIPProxy
• CTIServer
• ScreenCaptureWebService
• CTIPS
• ChatServer
• ChatServer:CSL
• ChatLoadBalancer
• ChatWebService
• IMServer-EMAIL
• OutboundSMS
• IMServer-IM
• IMServer
• IMServer:LPORT
• IMRecording (enabled when feature selected)
• UCLoadBalancer
• LoggingServer
• RecordingStorage
• ChatRecordingPrimary (enabled when feature selected)
• ArbiterCenterCord : Common
• CBAServer
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
• IPNIQAdapter
• UCCAdapter
• UCCAdapter:MULTICAST
• UCCAdminTomcat
• UCCAdminTomcat:NOTIFY
• JORAM
• MonitorApp
• DCPSvr
• ExpertQuery
• OSMSProxyServer
• ImportExport
• AspectSIPProxy
• CTIServer
• ScreenCaptureWebService (disabled)
• CTIPS
• ChatServer
• ChatServer:CSL
• ChatLoadBalancer
• ChatWebService
• IMServer-EMAIL
• OutboundSMS
• IMServer-IM
• IMServer
• IMServer:LPORT
• IMRecording (enabled when feature selected)
• UCLoadBalancer
• LoggingServer
• ChatRecordingPrimary (enabled when feature selected)
• ArbiterCenterCord: Common
• CBAServer
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
• IPNIQAdapter
• UCCAdapter
• UCCAdapter:MULTICAST
• UCCAdminTomcat
• UCCAdminTomcat:NOTIFY
• JORAM
• MonitorApp
• DCPSvr
• ExpertQuery
• OSMSProxyServer
• M3Server
• M3Server:Monitor
• M3Server:Plugin
• M3Server:DATACACHE
• M3Server:VXML
• M3Server:IVRDE
• ImportExport
• AspectSIPProxy
• CTIServer
• UnifiedAgentDesktop
• ScreenCaptureWebService
• CTIPS
• ChatServer
• ChatServer:CSL
• ChatLoadBalancer
• ChatWebService
• IMServer-EMAIL
• OutboundSMS
• IMServer-IM
• IMServer
• IMServer:LPORT
• IMRecording (enabled when the option is selected)
• UCLoadBalancer
• RTServer (disabled)
• LoggingServer
• RecordingStorage
• ChatRecordingPrimary (enabled when the option is
selected)
• CBAServer
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
Core • URMAdapter
• ViewpointCanvases
• UCCAdminServer
• UCCAdminServer:CNS
• UCCAdminServer:CNS_CLIENT
• UCCAdminServer:ASA
• UCCAdminAlert
• UCCAdminBulkImport
• UCCAdminBulkImport:DIAG
• UCCAdminChangeNotify
• UCCAdminWebServer
• UCCAdminWebServer:NOTIFY
• URMServer
• UCCAdmin_WebApp (disabled)
• URM_WebApp (disabled)
• Centercord
• Centercord:AOD
• Centercord:AWD
• Centercord:CSL
• Centercord:LOG
• Centercord:IM
• Centercord:IPNIQ
• Centercord:CTIPS
• Centercord:URM
• DBI
• AlertServer
• CC2DCP
• DBAccess
• AgentWebService
• ProvisioningWebService
• SecurityWebService
• AlertWebService
• RecordingManagerWebService
• HostconWebService
• UDDirectorPresentationLayer
• AgentScoringWebService
• NumberingPlanWebService
• ImportExportWebService
• SMServer
• AdminWebService
• NotificationService
• IPNIQAdapter
Table A-3 Component Distributions for Mandatory Machines in Single Tenant Profiles.
• UCCAdapter
• UCCAdapter:MULTICAST
• UCCAdminTomcat
• UCCAdminTomcat:NOTIFY
• JORAM
• MonitorApp
• DCPSvr
• ExpertQuery
• OSMSProxyServer
• M3Server
• M3Server:Monitor
• M3Server:Plugin
• M3Server:DATACACHE
• M3Server:VXML
• M3Server:IVRDE
• ImportExport
• AspectSIPProxy
• CTIServer
• UnifiedAgentDesktop
• ScreenCaptureWebService
• CTIPS
• ChatServer
• ChatServer:CSL
• ChatLoadBalancer
• ChatWebService
• IMServer-EMAIL
• OutboundSMS
• IMServer-IM
• IMServer
• IMServer:LPORT
• IMRecording (enabled when option selected)
• UCLoadBalancer
• RTServer (disabled)
• LoggingServer
• RecordingStorage
• ChatRecordingPrimary (enabled when option selected)
• CBAServer (enabled when option selected)
Table A-4 Component Distributions for Mandatory Machines in Multi-Tenant Profiles. All profiles
redundant.
• ImportExport
• AspectSIPProxy
• CTIServer
• UnifiedAgentDesktop
• ScreenCaptureWebService (disabled)
• CTIPS
• ChatServer
• ChatServer:CSL
• ChatLoadBalancer
• ChatWebService
• IMServer-EMAIL
• OutboundSMS
• IMServer-IM
• IMServer
• IMServer:LPORT
• IMRecording
• UCLoadBalancer
• LoggingServer
• RecordingStorage
• ChatRecordingPrimary
• ArbiterCenterCord:Common
• M3Server
• M3Server:Monitor
• M3Server:Plugin
• M3Server:DATACACHE
• M3Server:VXML
• M3Server:IVRDE
• CBAServer
• ERAServer
• ERAServerIPNIQ
• ERAIPNIQServer
Table A-4 Component Distributions for Mandatory Machines in Multi-Tenant Profiles. All profiles
redundant.
Table A-4 Component Distributions for Mandatory Machines in Multi-Tenant Profiles. All profiles
redundant.
• ImportExport
• AspectSIPProxy
• CTIServer
• UnifiedAgentDesktop
• ScreenCaptureWebService (disabled)
• CTIPS
• ChatServer
• ChatServer:CSL
• ChatLoadBalancer
• ChatWebService
• IMServer-EMAIL
• OutboundSMS
• IMServer-IM
• IMServer
• IMServer:LPORT
• IMRecording
• UCLoadBalancer
• LoggingServer
• RecordingStorage
• ChatRecordingPrimary
• ArbiterCenterCord:Common
• M3Server
• M3Server:Monitor
• M3Server:Plugin
• M3Server:DATACACHE
• M3Server:VXML
• M3Server:IVRDE
• CBAServer
• ERAServer
• ERAServerIPNIQ
• ERAIPNIQServer
Table A-4 Component Distributions for Mandatory Machines in Multi-Tenant Profiles. All profiles
redundant.
Table A-4 Component Distributions for Mandatory Machines in Multi-Tenant Profiles. All profiles
redundant.
• ImportExport
• AspectSIPProxy
• CTIServer
• UnifiedAgentDesktop
• ScreenCaptureWebService (disabled)
• CTIPS
• ChatServer
• ChatServer:CSL
• ChatLoadBalancer
• ChatWebService
• IMServer-EMAIL
• OutboundSMS
• IMServer-IM
• IMServer
• IMServer:LPORT
• IMRecording
• UCLoadBalancer
• LoggingServer
• RecordingStorage
• ChatRecordingPrimary
• ArbiterCenterCord:Common
• M3Server
• M3Server:Monitor
• M3Server:Plugin
• M3Server:DATACACHE
• M3Server:VXML
• M3Server:IVRDE
• CBAServer
• ERAServer
• ERAServerIPNIQ
• ERAIPNIQServer
Table A-4 Component Distributions for Mandatory Machines in Multi-Tenant Profiles. All profiles
redundant.
Table A-4 Component Distributions for Mandatory Machines in Multi-Tenant Profiles. All profiles
redundant.
• CTIServer
• UnifiedAgentDesktop
• ScreenCaptureWebService
• CTIPS
• ChatServer
• ChatServer:CSL
• ChatLoadBalancer
• ChatWebService
• IMServer-EMAIL
• OutboundSMS
• IMServer-IM
• IMServer
• IMServer:LPORT
• IMRecording
• UCLoadBalancer
• LoggingServer
• RecordingStorage
• ChatRecordingPrimary
• ArbiterCenterCord:Common
• M3Server
• M3Server:Monitor
• M3Server:Plugin
• M3Server:DATACACHE
• M3Server:VXML
• M3Server:IVRDE
• CBAServer
• ERAServer
• ERAServerIPNIQ
• ERAIPNIQServer
1. Use Server Configurator to extract your system’s DeploymentConfiguration XML file and
place it in an accessible folder. (See the Aspect Unified IP Installation Guide “Maintenance”
chapter for procedure.
4. Click the File menu, select Open XML, and browse to the DeploymentConfiguration XML
file.
Note: You can also drag and drop an XML file into the tool.
The Aspect Unified IP system is comprised of several logical servers, services, and software
processes. In order for an Aspect Unified IP system to perform optimally, the software
processes communicate using ports as well as varying protocols.
This section contains a listing of all Unified IP ports. Some of the ports within this listing may be
disabled. A system and network evaluation to determine which ports are used in a specific
customer environment can be requested as part of a custom security engagement.
Note: For Advanced List Management port data, see the Advanced List Management
Planning Guide.
• Firewall Guidelines
• Installing more than one instance of a server on a single machine (IP address) is not
supported.
• Changing port defaults is not needed except to support third party software that has hard
coded ports.
• Changing ports is not needed for mult-tenants. Many servers are shared by tenants. Those
servers run per tenant are run on a separate Window OS instance with a separate IP
address.
• The Post Office IMAP4 Service and SMTP Service must point the same Exchange Server.
• G711 provides the most resources, giving the Unified Media Server a total of 2200 ports
without encryption. These resources are configurable across the 4 RTP CPUs equally, but
are supplied by a single RTP interface labeled RTP A on the back of the unit. There is
failover configurable for the second RTP port labeled RTP B, on the Unified Media Server if
needed.
• Each CPU carriers 550 G711 resources per CPU with encryption turned off.
• The internal Recordings on the Unified Media Server no longer consume RTP resources
and are streamed directly to the file system from the telephony components. Each RTP
CPU is capable of recording 150 channels, for the total of 600 recording channels.
Provisioning should take this into consideration. For example, if 100% agent recording is
used, no more than 150 agent trunks should be provisioned per RTP CPU.
• The resources listed below are configurable and can be provisioned as required. These
resources use the port numbers 20000 to 32799 local to the RTP CPU (even ports are
RTP, odd ports are RTCP).
• Agent RTP channels
• Inbound RTP channels
• SVI channels (For the UMS it is required to configure the SVI channels in URM under a
resource group with other Telephony units)
• AQM channels (if AQM recordings are implemented)
• Outbound RTP channels
• Changes in the SVI configuration on the Unified Media Server, reserve the identified
channels under the Resource Group for this type of communication.
• See the Unified IP Unified IP Ports List for infornmation about the ports on the Unified
Media Server must be open in order to allow proper functionality of the unit.
Note: Echo Cancelers are automatically engaged for the TDM circuits preventing any need to
provision them.
In general, Aspects recommends that you install the Unified IP servers on a separate subnet
so that all inter-server traffic is isolated and hidden from the corporate network. By
implementing this type of deployment, all inter-server traffic can be left open and the only
firewalling you need is for traffic leaving the subnet to external clients. The ports list indicates
the ports that you must open for external clients (a small subset compared to the entire port
list).
When installing chat components, it is important that you install them within the firewall along
with the other core servers. Ensure that you do not install any of Unified IP components in the
DMZ (Demilitarized Zone or Perimeter Network). This ensures that the only firewall open port
requirement is for the Chat IIS web server port (default value of 80), which improves security in
the Unified IP Chat solution. If your environment requires an intermediate server in the DMZ,
you can use a reverse proxy, but this component is the customer’s responsibility to maintain.
service. If the correct ports are closed for any reason, the Unified IP system cannot
run the associated service, which is some cases causes other services to fail as
well.
This appendix enables you to determine and define the parameters needed to set up your
UMS prior to the installation of the Aspect Unified IP system components.
These planning checklists contain the items needed for a successful installation of the Aspect
Unified IP system. Print a copy of the checklist to use during installation. Place a checkmark in
the box to designate completion or selection of an item.
• There is one telephony card for non RTP channels included on the Unified Media Server,
this card is split into 4 subsections each controlled by a single CPU.
• Each TDM CPU has 248 PCM resources that are pooled for system wide use.
• The maximum number of spans per E1/T1 subsection is 4 (a total of 16 for all four
subsections).
• For non-SIP systems, this enables you to run M3 or predictive dialing on all spans.
• There are 16 TDM ports which can be used for non-SIP telephony configurations. On a
Unified Media Server all the TDM ports can be used to maximum capacity. These channels
can also fulfill this capacity concurrently in predictive and M3 dialing. However if a system is
using RTP channels these resources may be consumed for similar functions.
• The maximum number of channels of concurrent recordings per Unified Media Server
Telephony Subsystem is 600.
• The VOIP RTP channels on the UMS are split equally between 4 CPUs internal to the unit.
It is required that Agent, Inbound, Outbound, SVI and AQM channels are divided equally
under the 4 CPU assignments.
• The following table provides capacity numbers for the Unified Media Server.
Capacity Comments
Description Checked
EM4 X
EM4_DT X
LOOP X
GROUND X
R2_COMP X
MELCAS X
R2_COMP2 X
NI2 X
NET5 X
4ESS X
4ESS_TR X
5ESS X
5ESS_TR X
DMS100 X
KDD X
NTT X
QSIG X X
QSIG_S X
The purpose of this checklist is to ensure that all necessary issues have been addressed
concerning site preparation for the installation of your Unified IP system.
This document is a prerequisite for scheduling air travel for Aspect personnel involved in your
installation. Delays due to incomplete items in this checklist can seriously jeopardize a timely
installation. If you have any questions or concerns on how to accomplish these tasks, please
contact your Aspect Project Manager for assistance.
Note: See the Baseline Installation Document (BID) for details.
Review and return this signed form to the attention of your Project Manager by email or fax.
Physical Set Up
Network
Network IP Address:
Unified IP Servers
Administrator Workstations
Support Stations
Network Laser Printer
Server OS requirements
All servers must be Windows 2012 or 2016.
Exceptions:
• If Server RAM is > 8GB - only set to a max 4GB.
• If Customer Policy is for Windows Manage settings, then
do not set manual values.
Domain
IP Address of Domain Server
Port for AD Server Communications
Security
Security Badge
Background Check
Applicable firewall ports opened bidirectional
Vehicle security access
Data Center Contact List if different from main contact list
ASRA for secured remote access
Telephony
Telecommunications personnel
Personnel in charge of the FTP process send and receive
the download
• Microsoft Outlook:
• Office 2013 Outlook Client 32-bit (Office
Professional Plus)
• Office 2016 Outlook Client 32-bit Professional
Plus
• Outlook Client for Office 365 – 32-bit
Chat Configuration
CTI Avaya PBX Configuration (Unified IP uses different naming conventions for the following
values. The naming associations required for configuration are located in the Aspect Unified IP
Integration Guide.)
Avaya CVLAN
• CVLAN
• Avaya CVLAN
• IP of MAPD Card
• Port number on MAPD Card
• Node ID (typically, signal01)
• VDN
• Business description of the route
• Hunt Group Extension/Queue
• Business description of the queue
• Method for making inbound test calls (for example,
9+123+VDN)
• Avaya phone extension
Screen Capture Configuration (does not support high screen resolutions, dual monitors, encryption,
active web pages, Flash, or Shockwave) To use this feature, you must select Screen Capture in the
optional features screen.
Hyper-V
LYRICall Designer
The licensing used on the PBX is Associated Set (AST) license for physical devices and also the
licenses for logical devices for agents, ACD queues, and Customer Defined Network (CDN).
In Unified IP, limits vary depending on which deployment profile is selected. These limits are
listed in Table E-1. All the values in this table are maximums.
Limit by Profile
Profile (Number of Agents) Lab (up Small Small Small Medium Large
to 20) 100 Non- 250 Non- (up to (501 - (1001 -
HA (up HA (up 500) 1000) 2000)
to 100) to 250)
Element
Limit by Profile
Profile (Number of Agents) Lab (up Small Small Small Medium Large
to 20) 100 Non- 250 Non- (up to (501 - (1001 -
HA (up HA (up 500) 1000) 2000)
to 100) to 250)
Element
CTI Connections 3 3 3 3 3 3
Active Services per Agent 2 128 128 128 128 128 128
Total Services for all Active Agents 2,640 32,000 32,000 32,000 32,000 64,000
Active Calls (voice and non-voice) 1100 1000 2750 5,500 11,000 22,000
1
Exceeding this limit could cause performance issues.
2
Note (total_active agents x (service/agent+2)) cannot be more than (total Services for all active agents).
Limit by Profile
Profile (Number Lab (up Small Small Small Mediu Large Small Large
to 20) 100 250 (1001 - Multiten Multiten
of Agents (Up to m (501 ant ant
Non- Non- 500) - 1000) 2000)
HA HA
Element
(Maximum)
Agents Per Service 300 300 750 1,500 3,000 6,000 750 1,500
Chat Messages 300 300 750 1,500 3,000 6,000 750 1,500
Email Accounts 300 300 750 1,500 3,000 6,000 750 1,500
Email Messages 1,024 1,024 1024 1,024 1,024 1,024 1,024 1,024
Email Signatures 1,024 1,024 1024 1,024 1,024 1,024 1,024 1,024
Email Attachments 1,024 1,024 1024 1,024 1,024 1,024 1,024 1,024
Email Greetings 1,024 1,024 1024 1,024 1,024 1,024 1,024 1,024
Email Closings 1,024 1,024 1024 1,024 1,024 1,024 1,024 1,024
Call Data Definitions 300 300 750 1,500 3,000 6,000 750 1,500
Element Description
Configured The maximum number of agents that can be configured in the system.
Agents
Active Agents The maximum number of agents that can be logged in simultaneously.
Simultaneous The maximum number of voice calls that the system can handle simultaneously.
Active Voice
Sessions
Connected UMS The maximum number of Unified Media Server units that can be simultaneously connected to the system.
Units
CTI Connections The maximum number of connected Telephony Switches – including UMS and CTI Servers. NOTE: the
administrator may configure more Switches than this value. However, a maximum number of
Switches(MAX_SWITCHES) may connect at any given time.
Active Services The maximum number of Services assigned to any given Agent. Only this number of Services is allowed to
per Agent be assigned to an agent. If the maximum is reached – an alert will be generated. It should also be noted
that Disabled or Inactive Services are not assigned to an agent.
Total Services The maximum total number of all Services associated with all agents. The administrator may over-provision
for all Agents the system in this case. However, the limit will be enforced at run-time. Also note that Disabled or Inactive
Services are not assigned to an Agent. Due to a limitation in the SMServer for Real-Time Reporting – the
Centercord will limit the total number of Services loaded and associated with Agents. The default value is
64000 for all profiles. When the current total is 80 to 99 percent – the Centercord will generate an alert to
warn the system administrator that they are approaching the limit. When the total reaches the limit, the
Centercord will reject Agent login requests.
Resource The maximum number of Resource Groups (trunks, for example) that can be assigned to a Service.
Groups per
Service
Services The total maximum number of Services that can be created. This includes Inbound, Outbound, Email, Chat,
IM, Workflow, SMS, M3 etc. If the maximum number of Services has been exceeded, an error code is
generated indicating that the maximum has been exceeded. In this case, the administrator is required to
delete an existing Service in order to create a new one. If the site is not using the largest profile, the
customer may contact the sales department to upgrade the profile.
Voicemail The maximum number of Voicemail Groups that can be defined by the administrator. A Voicemail group is a
Groups subset/collection of existing voice mail boxes. A Voicemail group is assigned a specific mail box. If a voice
mail is left for a group voice mail box – all member voice mail boxes are notified and may listen to the voice
mail.
Workgroups The maximum number of Agent Workgroups that can be defined by the administrator.
Configured The maximum number of agents current logged-in and assigned to a Service. The administrator can assign
Agents per more agents than this value to any given Service. However, at run-time, the system will only permit this
Service number of logged-in agents to be assigned to any given Service.
Resource Group The maximum number of Resource Groups allowed to configure the system. When the maximum number
Members of Telephony Servers configured for a Resource Group has been met, Centercord will not add the next
Telephony Server as a member and will generate an alert.
AOD Feed The maximum number of Outbound Feed Services per AOD Feed Client that can be assigned by the
Services/Client administrator.
ALM Client The maximum number of Advanced List Management systems that can be connected to Unified IP system.
Connections
Active Calls The maximum number of inbound and outbound calls of all types that a system can handle simultaneously.
(voice and non-
voice) 1
Element Description
AQM The maximum number of AQM recording sessions that can occurr simultaneously.
Recordings
Route Access The maximum number of Route Accesses that can be defined by the administrator.
Timezones The maximum number of discrete time zones that can be defined in the system.
Configured The maximum number of Users of all types that can be configured in the system.
Users
Configured The maximum number of Directors that can be configured in the system.
Directors
Configured The maximum number of Experts that can be configured in the system.
Experts
Skills The maximum number of Skills that can be configured in the system.
Skills per Agent The maximum number of Skills that can be configured in the system for each agent.
Skills per The maximum number of Skills that can be configured in the system for each service.
Service
Agents per The maximum number of Agents that can be configured in the system for each service.
Service
Agents per The maximum number of Agents that can be configured in the system for a single tenant.
tenant
Tenants The maximum number of Tenants that can be configured in the system
Chat Messages The maximum number of Chat Messages that can be processed simultaneously.
Email Accounts The maximum number of Email Accounts that can be set up in the system.
Email Messages The maximum number of Email Messages that can be configured in the system.
Email The maximum number of IEmail signaturesthat can be configured in the system.
Signatures
Email The maximum number of IEmail Attachments that can be configured in the system.
Attachments
Email Greetings The maximum number of IEmail Greetings that can be configured in the system.
Email Closings The maximum number of IEmail Closings that can be configured in the system.
Schedules The maximum number of ISchedules that can be configured in the system.
Call Data The maximum number of ICall Data Definitions that can be configured in the system.
Definitions
Exclusions The maximum number of Do Not Call exclusions that can be loaded onto a system.
1
The following lists all the components of Total Call Objects:
CCProMediaInboundIvr
CCProMediaInboundUndefined
CCProMediaInboundExternal
CCProMediaInboundFax
CCProMediaInboundVoiceMail
CCProMediaOutboundAod
CCProMediaOutboundConference
CCProMediaOutboundConsult
CCProMediaOutboundConsultXfer
CCProMediaOutboundFax
CCProMediaOutboundExternal
CCProMediaOutboundManual
CCProMediaOutboundTPConXfer
CCProMediaInternalConference
CCProMediaInternalConsult
CCProMediaInternalConsultxfer
CCProMediaInternalManual
CCProMediaOutboundMessage
CCProMediaInternalMonitoring
CCProMediaInternalRecording
CCProMediaInboundChat
CCProMediaInboundNLPEMail
CCProMediaInboundAgentSelEMail
CCProMediaInboundSelfServEMail
CCProMediaInboundCDReviewEMail
CCProMediaInboundSendEMail
CCProMediaOutboundEMail
CCProMediaInboundAgd
CCProMediaInboundCti
CCProMediaInboundIM
CCProMediaInboundAcd
Enterprise components have sizing requirements that are based on the overall usage of the
deployment. The sizing requirements are driven by the number of sites as well as the total
agent pool over all the sites, and are enforced by the Unified IP Deployment Wizard.
• Maximum of 20 systems
• at most 5 can be Workforce Management
• at most 5 can be Performance Management
• at most 5 can be Quality Management
• at most 6 can be Unified IP•at most 1 can be File Based
• 4 Geographic Locations
• Maximum of 20 systems
• 6 Geographic Locations
across all lists, you must configure Advanced List Management to send records to a minimum
of two separate Unified IP systems.
This Appendix discusses third party products that are commonly installed on Unified IP
machines or networks for troubleshooting, testing or monitoring purposes. The intention is to
describe any Aspect-specific configuration that must be done in order to use these products with
Unified IP, and to call out any potential problems that could result by running these products on
Aspect systems.
Note: For information about third party products that are integrated into the Aspect software,
see Third Party Product Support on page 2-10.
Downloading and installing Wireshark has not been known to require a system restart, and has
not been found to have any negative impact on Unified IP function or performance. After
installation, you can configure the Wireshark tool to trace network events.
Aspect recommends that when you use Wireshark, you use capture filters to reduce the amount
of traffic written to the Wireshark logs. This reduces I/O and processing on the machine and
saves space in case load base fluctuations occur. The filtering can restrict the writing of
particular ports, IPs or packet type information. In order to configure the filter option, you can go
to the Capture file menu and select Interfaces. This brings up the Capture Interfaces menu
where you can define filter options for the packet trace.
When using Wireshark, you must take hard disk space under consideration when planning your
trace needs. It is best practice to have a single trace under 400 MB in size. However, if you are
running multiple log files (Ring Buffer settings), Aspect recommends that each log file not
exceed n 100 MB in size. These settings can be adjusted under the Wireshark Capture
Options menu in the Capture files section. Aspect recommends that you write to a separate
hard disk from where the OS is written too, and that you keep an extra 15 Gigabytes free if
writing to same partition that the Aspect Unified IP logs are writing to. For example, on the
Unified IP log partition of 100 GB with 60 GB used, do not exceed more than 45 GB of 100 MB
log files for the Wireshark tool (450, 100 MB logs).
• Do not run more than one Wireshark session at a time on an Aspect Unified IP server.
• Do not run Wireshark with any other packet monitoring software application unless instructed
to do so by Aspect.
• Do not run the Wireshark application unmonitored for any large length of time (several days
or weeks) without checking the status of the application. This is because there is a
possibility that Wireshark could spawn additional sessions and use excessive system
memory and processing.
• Always attempt to end the tracing session before exiting the Wireshark application.
• Always monitor the disk space on larger traces or rolling traces to ensure that the space is
not being compromised for the partition.
• When running Wireshark, stop the trace and close the application if any impact on Unified
IP is detected.
• Improve planning with predictive modeling, which narrows the scenarios that you will want
to emulate on a live network
• Determine if your network can handle VoIP by evaluating and reporting on the network's
ability to support VoIP's unique network requirements
• Predict call quality by collecting network metrics over time, which provides an accurate
depiction of overall call quality once VoIP is deployed
• Create background traffic to simulate the impact of other application traffic on VoIP call
quality
F.3 Nagios
Nagios is an open source computer system monitor, network monitoring and infrastructure
monitoring software application. Nagios offers monitoring and alerting for servers, switches,
applications, and services. It alerts users when things go wrong and alerts them again when
the problem has been resolved. This tool is used for industry standard IT infrastructure
monitoring. Aspect customers have used Nagios to monitor their networks. Aspect has
encountered intermittent challenges when attempting to take the information that is being
collected by Nagios and converting the OID into meaningful alerts for our systems. The Nagios
daemon requests a translated MIB to identify the SNMP source and the OID translation. We
were able to get around this in the Call Center environment with the following approach
articulated: As it pertains to standard SNMP, Aspect does not provide MIBS. The customer
must develop the SNMP server per an alternative entity like our RPN list.
F.5 Acronis
Acronis is an imaging software used by some Aspect customers and internal Aspect lab
managers to store images in the case of a required action tied to disaster or system recovery.
This third party tool provides a unified platform for backup, disaster recovery and data
protection for heterogeneous Windows and Linux environments. There are also options to
support cloud backup, multiple hypervisors, flexible migration, and more. It is always Aspect’s
recommendation to use software of this nature during non-peak hours or outside of standard
business hours. While Acronis can be used during working hours, it should be noted that doing
so may impact system performance and/or bring system operation to a standstill.
F.6 Audacity
Audacity is a free, multilingual audio editor and recorder for Windows, GNU/Linux and other
operating systems. You can use Audacity to import and export recorded files, record live audio,
and capture streamed audio. Many customer use this tool to make recordings which are then
imported into the Unified IP system for the purpose of sourcing IVR message retrieval
functionality related to Music on hold and various other automated messages and attention
retainers for use in selected prompts. Audacity can:
• Record live audio through a microphone or mixer, or digitize recordings from cassette
tapes, records, or minidiscs
• Convert tapes and records into digital recordings or CDs; Import sound files, edit them, and
combine them with other files or new recordings
• Export your recordings in many different file formats. Edit Ogg Vorbis, MP3, WAV or AIFF
sound files. Import MPEG audio (including MP2 and MP3 files) using libmad & Import raw
(header-less) audio files using the Import Raw command
F.7 EMCGRABS
When supporting EMC storage area networks, it is often a troubleshooting requirement to run
a set of scripts to gather information dumps for SAN resource evaluation. EMC Grab is a utility
that is run locally on each host (typically virtualized servers) and gathers storage-specific
information (driver version, storage-technical details, etc.). The EMC Grab script generates a
report created in a zip file form. This zip file can be used by EMC support.
There is no guarantee that the Qualys scanner will not affect services on a production server.
Therefore it is important that the affected computer or service have a maintenance window
schedule agreed to by management or other pertinent personnel. If availability is too critical to
have a window, redundancies should be created.
• Media transcoding
http://www.voip-calculator.com/calculator/
www.bandcalc.com
www.voiptroubleshooter.com/diagnosis/emodel.htm
These tools allow you to input known variables, such as codec and number of concurrent calls,
to produce a given result, such as necessary bandwidth.
A client hypervisor allows multiple guest virtual machines to run side-by-side on a single piece
of host hardware. The isolated virtual machines allow users to run different operating systems,
or to keep secure corporate virtual machines separated from their personal computing
environment. The client hypervisor acts as an intermediary for all calls to the process, memory,
disk drives, the network, audio components, and USB devices. XenApp Client can host 32-bit
and 64-bit Windows and Linux guest operating systems, and will only run on hardware with
Intel processors and certain other limitations, as concurrently running multiple virtual machines
is very resource intensive.
Virtual machines hosted by XenApp Client can be managed by Citrix Synchronizer, which is a
virtual appliance that runs on Citrix XenApp Server. Citrix Synchronizer can back up,
synchronize, and deploy virtual machines, utilizing image layering technology and delta-only
backups. These capabilities give the same centralized management benefits as a virtual
desktop interface (VDI) and because the virtual machines are running locally on users’
hardware, performance is better than when accessed over a network.
F.14 PuTTY
PuTTY is a free implementation of Telnet and SSH for Windows and Unix/Linux based
platforms, along with an xterm terminal emulator.
F.15 WinRAR
WinRAR is a file compression tool similar to Winzip. Occasionally, Aspect will use this tool to
compress, file (zip), and distribute log detail. WinRAR supports all popular compression
formats (RAR, ZIP, CAB, ARJ, LZH, ACE, TAR, GZip, UUE, ISO, BZIP2, Z and 7-Zip). Ideal for
multimedia files, WinRAR automatically recognizes and selects the best compression method.
The special compression algorithm compresses multimedia files, executables and object
libraries particularly well. WinRAR is also useful if you are sending data through the web. Its
128 bit password encryption and its authenticated signature technology will give IT
infrastructure teams internal compliance on security standards.
WinRAR is a generally delivered as a trial product, meaning you have the chance to
thoroughly test it. The program can be used free of charge for 40 days. WinRAR licenses are
valid for all available language and platform versions.
enabling or disabling specific replicated folders. The DFSR service uses WMI to configure
server-wide parameters, while global parameters and certain replicated folder-specific
parameters are configured using Active Directory. DFSR also uses WMI to expose monitoring
information regarding specific objects such as replicated folders and connections.
F.17 TextPad
TextPad is a text editor for Windows that is often used by Aspect customers. In addition to the
usual cut and paste capabilities, you can correct the most common typing errors with
commands to change case, and transpose words, characters and lines. Other commands let
you indent blocks of text, split or join lines, and insert whole files. Any change can be undone
or redone, right back to the first one made. Visible bookmarks can be put on lines, and edit
commands can be applied to lines with bookmarks. Frequently used combinations of
commands can be saved as keystroke macros, and the spelling checker has dictionaries for
10 languages. TextPad also has a customizable tools menu, and integral file compare and
search commands, with hypertext jumps from the matched text to the corresponding line in the
source file (ideal for integrating compilers).
F.18 Notepad++
Notepad++ is a free source code editor and Notepad replacement that supports several
languages. Running in the MS Windows environment, its use is governed by GPL License.
Based on the powerful editing component Scintilla, Notepad++ is written in C++ and uses pure
Win32 API and STL which ensures a higher execution speed and smaller program size. By
optimizing as many routines as possible without losing user friendliness, Notepad++ is trying
to reduce the world carbon dioxide emissions. When using less CPU power, the PC can
throttle down and reduce power consumption, resulting in a greener environment. You're
encouraged to translate Notepad++ into your native language if there's not already a
translation present in the Binary Translations page.
http://notepad-plus-plus.org/contribute/binary-translations.html
F.19 SolarWinds
SolarWinds is a third party monitoring and management software tool. The tool helps some IT
teams manage the performance and availability of servers, applications, and websites. In
addition, the tool offers powerful patch management, remote control, Windows®
administration, and other SysAdmin tools that save valuable time and make the job of It
engineers easier.
• Thresholds files for most of the major Microsoft products such as IIS, MOSS, SQL Server,
BizTalk, Exchange, and Active Directory
• An easy to use GUI interface for creating batch files for the PAL.ps1 script
• A way to analyzes performance counter logs for thresholds using thresholds that change
their criteria based on the computer's role or hardware specs
Required Products (free and public):
Known Issues:
• PAL must be run under an English-US locale until globalization can be added. The creators
are looking for assistance from users like you to help contribute to this cause.
• The PAL tool is tested only on Microsoft Windows 7 64-bit. You may encounter problems
with the tool on other operating systems.
You can specify what types of information you want SQLdiag to collect by editing the
configuration file SQLDiag.xml
F.22 PSSDIAG
PSSDIAG is a diagnostics utility used to collect profiler trace, perfmon data for SQL Server.
PSSDAIG was created to troubleshoot SQL Server 7.0 and 2000 issues. It was evolved and
shipped with SQL Server 2005 and beyond. The shipped product only has a data collector
engine called sqldiag.exe. Microsoft Product support continues to maintain a configuration tool
that allows engineers to dynamically configure what to collect.
Tool Highlights:
• Fast, easy data loading: You can quickly and easily load SQL Trace files, T-SQL script
output, including SQL DMV queries, and Performance Monitor logs into a SQL Server
database for analysis. All three facilities use bulk load APIs to insert data quickly. You can
also create your own importer for a custom file type.
• Visualize loaded data via reports. Once the data is loaded, you can view several different
charts and reports to analyze it.
• Trace aggregation to show the TOP N most expensive queries (using ReadTrace).
• Wait stats analysis for visualizing blocking and other resource contention issues (based on
the SQL 2008/2012 Perf Stats).
• Full-featured reporting engine. SQL Nexus uses the SQL Server Reporting Services client-
side report viewer (it does not require an RS instance). You can create reports for Nexus
from either the RS report designer or the Visual Studio report designer. You can also modify
the reports that ship with Nexus using either facility. Zoom in/Zoom out to view server
performance during a particular time window. Expand/collapse report regions (sub-reports)
for easier navigation of complex data. Export or email reports directly from SQL Nexus.
Nexus supports exporting in Excel, PDF, and several other formats.
• Extensibility. You can use the existing importers to load the output from any DMV query into
a table, and any RS reports you drop in the Reports folder will automatically appear in the
reports task pane. You can add a new data importer for a new data type. SQL Nexus will
automatically adjust the database references in your reports to reference the current server
and database, and it will provide generic parameter prompting for any parameters your
reports support.
F.25 FIDDLER
Fiddler is a Web Debugging Proxy which logs all HTTP(S) traffic between your computer and
the Internet. Fiddler allows you to inspect traffic, set breakpoints, and "fiddle" with incoming or
outgoing data. Fiddler includes a powerful event-based scripting subsystem, and can be
extended using any .NET language. Fiddler is freeware and can debug traffic from virtually any
application that supports a proxy, including Internet Explorer, Google Chrome, Apple Safari,
Mozilla Firefox, Opera, and thousands more. You can also debug traffic from popular devices
like Windows Phone, iPod/iPad, and others. The tool can be found here:
http://www.fiddler2.com/fiddler2/version.asp.
To debug applications you've written in Java, .NET, or using WinHTTP, see this page:
http://www.fiddler2.com/fiddler/help/hookup.asp
F.27 FileZilla
FileZilla is free and cross-platform FTP software tool sometimes used by Aspect support
resources, consisting of FileZilla Client and FileZilla Server. Binaries are available for
Windows, Linux, and Mac OS X. It supports FTP, SFTP, and FTPS (FTP over TLS). Support
for SFTP (SSH File Transfer Protocol) is not implemented in Filezilla Server. FileZilla's source
code is hosted on SourceForge.net. One of the primary criticisms of the tool, which may prove
ultimately problematic for many of Aspect's security conscious customers, is the following:
From version 3 onwards, Filezilla stores all saved usernames and passwords as plain text
files. This allows any malware that has gained access to the user's system to simply read the
data stored in these files and to remotely transfer this data to the attacker. This upsets the
standard security concept for Defense in Depth, with multiple layers to prevent such attacks
from being successful. Storing encrypted private key files is still supported, as well as using
ssh-agent, in the same way as previous versions of Filezilla. Private key authentication is
usually recommended over password-based authentication.
The Dell Smart Plug-in provides you with the following features:
• Device communication using Simple Network Management Protocol (SNMP) and Web
Services Management (WSMAN)
By using the Dell Smart Plug-in for HP Operations Manager for Windows, you can:
• Enable system administrators to manage and monitor Dell servers through the HP
Operations Manager console
• Process SNMP traps generated by Dell OpenManage Server Administrator (OMSA) and
OpenManage Storage Systems (OMSS) running on Dell servers
• HTML/XHTML
• JavaScript
F.32 Kerberos
Kerberos is a network authentication protocol. It is designed to provide strong authentication
for client/server applications by using secret-key cryptography. The Kerberos protocol name is
based on the three- headed dog figure from Greek mythology known as Kerberos. The three
heads of Kerberos comprise the Key Distribution Center (KDC), the client user and the server
with the desired service to access. The KDC is installed as part of the domain controller and
performs two service functions: the Authentication Service (AS) and the Ticket-Granting
Service (TGS). Because this third party tool can cause the Unified IP installer to fail, the
services for Kerberos must be disabled prior to any upgrade of Unified IP. You can re-enable
the services after the upgrade is complete.
F.33 LanDesk
LaNDesk Software provides systems management, security management, service
management, asset management, and process management solutions to organizations.
LanDesk products have asset inventory/discovery, security vulnerability detection and
remediation, software distribution, IT compliance reporting, patch management, software
license management, security policy enforcement, and endpoint device power consumption
management. Because this third party tool can cause the Unified IP installer to fail, the
following LanDesk services must be disabled prior to any upgrade of Unified IP. You can re-
enable the services after the upgrade is complete.
Aspect understands the customer’s need to secure and restrict access to network resources
for security, integrity, and virus protection reasons. Viruses have become an all-too-common
occurrence in corporate networks today. Their malicious nature makes viruses extremely
dangerous and expensive to eradicate. We encourage customers to apply the appropriate
preventative and security measures to minimize the exposure of the Aspect Unified IP system
to viruses.
Note: For information about virus protection for Advanced List Management systems, see the
Advanced List Management Installation Guide.
At the same time, considering the real-time nature of the Aspect Unified IP solution, the
antivirus software that the customer uses must be provisioned to avoid operational impacts.
This section is intended to offer guidelines for the use of antivirus software with Unified IP.
Note: It is the responsibility of each of Aspect’s customers to provide adequate security and
virus protection for their networks. It is not Aspect's policy to dictate the type of antivirus
application used by the customer. The standards used by the customer's IT
organization should be applied.
G.1 Guidelines
Because of the many entry points into networks and computers, antivirus software has evolved
into a complex, low-level application with many hooks into the operating system and other
applications. As a result, antivirus software has the potential for dramatically altering the
behavior and response characteristics of the computer on which it is installed.
For instance, scanning a hard drive for viruses utilizes an enormous amount of CPU and I/O
time, which dramatically reduces the availability of the resources for other applications. In the
case of Aspect Unified IP, where real-time components are leveraging the same server
resources, inappropriate use of the antivirus software can adversely impact system
performance.
The customer is responsible for selecting and implementing their preferred antivirus software
package. Refer to the following sections for Aspect specific information and recommendations.
• <drive letter>:\SQLDATA
• Additional Aspect Unified IP files that you must exclude are in the following directories:
<drive letter>\PDPFiles
<drive letter>:\SQLDATA
<drive letter>\DUMPS
<drive letter>\edm
• C:\Windows\System32\msmq\STORAGE
This folder is located on the Primary and Secondary Core machines in Unified IP 7.3 and later.
The Lab profile runs on a two server footprint. Customers are able to deploy a Lab Profile that
has minimal machine and resource requirements and allows customers to run tests with new
features prior to doing the staging install and prior to production install.
The following is a list of items that distinguish the Lab profile from the other supported profiles:
• You cannot upgrade to the Lab profile from any of the Unified IP 7.3 profiles.
• You cannot upgrade from a Lab profile to any of the other supported profiles.
• The Lab profile does not support redundancy, so no cluster creation is required.
• You can add Additional and Optional machines to a Lab profile while configuring the
DeploymentConfiguration XML file before doing a clean install.
• The machine requirements for the Lab profile are specified in the Aspect Unified IP 7.4
Hardware and Software Guide.
Although you cannot upgrade to or from a Lab profile, you do have the flexibility to:
• Add a non-Lab site (Small, Medium, or Large) to an existing Lab profile deployment.
• Add a Lab profile site to a Unified IP deployment during the upgrade to Unified IP 7.4.
• The Advanced List Management database is installed on the Lab profile Datamart server.
• The Advanced List Management Application server is installed on the Lab Core server.
• Even if the pre-upgrade Unified IP system included separate Advanced List Management
servers, Advanced List Management will still be installed on the Lab machines.
• Although a standalone Lab deployment does not require Unified Command and Control
servers, a redundant pair of these servers is required when a second site is added.
• In a standalone Lab deployment, the Lab site functions as the Enterprise site and contains
the Unified Command and Control database. When a non-Lab site is added, the non-Lab
must become the Enterprise site and the Unified Command and Control data in the Lab
Primary Datamart server must be migrated to the Primary Datamart server at the non-Lab
site. This is done by pushing to the Lab site Primary Datamart and Core machines. The
installer will automatically move the UCCConfig database.
H.1.1 Procedure
You add a non-Lab site to an existing Lab deployment by using a special modify procedure
where you:
1. Run the existing DeploymentConfiguration XML file through the Unified IP 7.4 Deployment
Wizard. During this process, you must do the following:
a. Add redundant Unified Command and Control machines using the following window.
c. Note that only the previously added Lab site is listed, and that it is designated as the
Enterprise site. Change the Site Type to either Unified IP or Default, select <New
Site> and click Next.
d. On the next few windows, add the non-Lab site and continue through the Deployment
Wizard. You will eventually reach the following window which lists the original Lab site
and the new non-Lab site. The non-Lab site is now designated as the Enterprise site.
e. Continue to the end of the Deployment Wizard and perform a Push to the Unified IP
deployment. The installer will automatically migrate the Unified Command and Control
data from the Lab site to the Primary Datamart server on the new Enterprise site.
The Small 100 Non-HA profile is designed for use in smaller call centers and, unlike the Lab
profile, is intended as a production system. This profile runs on a two server footprint with
minimal machine and resource requirements and, because it is non-redundant, it does not
require setup of Windows clusters. The Small 100 Non-HA profile can be installed as a new
installation, or it can be upgraded to from pre-Unified IP 7.3 100V profiles.
The following is a list of features and requirements for the Small 100 Non-HA profile:
• The installer supports clean installs and upgrades from Unified IP 7.2 100V (non-
redundant) profiles.
• You cannot upgrade to the Small 100 Non-HA profile from any of the Unified IP 7.3 profiles.
• You can add a Small 100 Non-HA site to an existing deployment during an upgrade to
Unified IP 7.4.
• Once installed, you can upgrade a Small 100 Non-HA deployment to a larger Unified IP 7.4
profile.
• Once installed, you can add other sites (Lab, Small, Medium, Large) to a Small 100 Non-
HA site. If you do so, you must add redundant Unified Command and Control machines.
• The Small 100 Non-HA profile supports only Native Outbound dialing by default. Unlike the
Lab profile, Advanced List Management components are not be installed with Unified IP.
However, you can install Advanced List Management on additional servers and connect
them to the Small 100 Non-HA system.
• You can add Additional and Optional machines to a Small 100 Non-HA profile while
configuring the DeploymentConfiguration XML file before doing a clean install.
The machine requirements for the Small 100 Non-HA profile are specified in the Aspect
Unified IP 7.4 Hardware and Software Guide.
• Although a standalone Small 100 Non-HA deployment does not require Unified Command
and Control servers, a redundant pair of these servers is required when a second site is
added.
• In a standalone Small 100 Non-HA deployment, the Small 100 Non-HA site functions as
the Enterprise site and contains the Unified Command and Control database. When an
additional site is added, the this new site must become the Enterprise site and the Unified
Command and Control data in the Small 100 Non-HA site Primary Datamart server must be
migrated to the Primary Datamart server at the new site. This is done by pushing to the
Small 100 Non-HA site Primary Datamart and Core machines. The installer will
automatically move the UCCConfig database.
I.1.1 Procedure
You add a new site to an existing Small 100 Non-HA deployment by using a special modify
procedure where you:
1. Run the existing DeploymentConfiguration XML file through the Unified IP 7.4 Deployment
Wizard. During this process, you must do the following:
a. Add redundant Unified Command and Control machines using the following window.
c. Note that only the previously added Small 100 Non-HA site is listed, and that it is
designated as the Enterprise site. Change the Site Type to either Unified IP or Default,
select <New Site> and click Next.
d. On the next few windows, add the new site and continue through the Deployment
Wizard. You will eventually reach the following window which lists the original Small 100
Non-HA site and the new site. The new site is now designated as the Enterprise site.
e. Continue to the end of the Deployment Wizard and perform a Push to the Unified IP
deployment. The installer will automatically migrate the Unified Command and Control
data from the Small 100 Non-HA site to the Primary Datamart server on the new
Enterprise site.
The Small 250 Non-HA profile is designed for use in smaller call centers that do not require
High Availability. This profile runs on a two server footprint with minimal machine and resource
requirements and, because it is non-redundant, it does not require setup of Windows clusters.
The Small 250 Non-HA profile can be installed as a new installation using the Unified IP 7.4
installer, or it can be upgraded to from existing Unified IP 250 agent profile.
The following is a list of features and requirements for the Small 100 Non-HA profile:
• The installer supports clean installs and upgrades from Unified IP 7.2 250 (non-redundant)
profiles.
• You cannot upgrade to the Small 250 Non-HA profile from any of the Unified IP 7.3 profiles.
• You can add a Small 250 Non-HA site to an existing deployment during an upgrade to
Unified IP 7.4.
• Once installed, you can upgrade a Small 250 Non-HA deployment to a larger Unified IP 7.4
profile.
• Once installed, you can add other sites (Lab, Small, Medium, Large) to a Small 250 Non-
HA site. If you do so, you must add redundant Unified Command and Control machines.
• The Small 250 Non-HA profile supports only Native Outbound dialing by default. Unlike the
Lab profile, Advanced List Management components are not be installed with Unified IP.
However, you can install Advanced List Management on additional servers and connect
them to the Small 250 Non-HA system.
• You can add Additional and Optional machines to a Small 250 Non-HA profile while
configuring the DeploymentConfiguration XML file before doing a clean install.
The machine requirements for the Small 250 Non-HA profile are specified in the Aspect
Unified IP 7.4 Hardware and Software Guide.
• Although a standalone Small 250 Non-HA deployment does not require Unified Command
and Control servers, a redundant pair of these servers is required when a second site is
added.
• In a standalone Small 250 Non-HA deployment, the Small 250 Non-HA site functions as
the Enterprise site and contains the Unified Command and Control database. When an
additional site is added, the this new site must become the Enterprise site and the Unified
Command and Control data in the Small 250 Non-HA site Primary Datamart server must be
migrated to the Primary Datamart server at the new site. This is done by pushing to the
Small 250 Non-HA site Primary Datamart and Core machines. The installer will
automatically move the UCCConfig database.
J.1.1 Procedure
You add a new site to an existing Small 250 Non-HA deployment by using a special modify
procedure where you:
1. Run the existing DeploymentConfiguration XML file through the Unified IP 7.4 Deployment
Wizard. During this process, you must do the following:
a. Add redundant Unified Command and Control machines using the following window.
c. Note that only the previously added Small 250 Non-HA site is listed, and that it is
designated as the Enterprise site. Change the Site Type to either Unified IP or Default,
select <New Site> and click Next.
d. On the next few windows, add the new site and continue through the Deployment
Wizard. You will eventually reach the following window which lists the original Small 250
Non-HA site and the new site. The new site is now designated as the Enterprise site.
e. Continue to the end of the Deployment Wizard and perform a Push to the Unified IP
deployment. The installer will automatically migrate the Unified Command and Control
data from the Small 250 Non-HA site to the Primary Datamart server on the new
Enterprise site.