A company is setting up B2B instant messaging capability using a secure client integrated into the on-premises Cisco communication platform. During the setup, the engineer discovers that external Usages from other businesses do not seem to reach the Cisco Expressway for instant messaging, but B2B calling seems to be working Internal chat between clients and chat toward clients is king m home offices using Mobile and Remote Access The engineer verified that the correct ports have been configured on the Cisco ASA, and the firewall rules on the expressway show no cation of any traffic What is the cause of the issue?
In Business-to-Business (B2B) instant messaging using Cisco Expressway, SRV records are crucial for external users to discover and connect to the correct XMPP service. The fact that B2B calling works but not instant messaging points towards a service discovery issue specific to XMPP.
SRV records for XMPP:Typically, the domain would have an SRV record like 'xmpp-client.[invalid URL removed]' pointing to the Expressway.
What are two benefits of deploying OAuth in a Cisco UCM environment that uses Cisco Jabber or Cisco Webex for on-premises calling?(Choosetwo.)
These two options are the benefits of deploying OAuth in a Cisco UCM environment that uses Cisco Jabber or Cisco Webex for on-premises calling. OAuth is an authorization protocol that allows users to grant access to third-party applications without sharing their credentials. In a Cisco UCM environment, OAuth allows Jabber and Webex clients to obtain access tokens from UCM after authenticating with their credentials once. The access tokens can then be used to access various resources, such as call control, voicemail, directory, and presence. The access tokens have a limited lifetime, but they can be refreshed using refresh tokens, which have a longer lifetime. This way, the users do not need to re-authenticate frequently and can enjoy a seamless user experience. Reference:
https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/admin/12_5_1/systemConfig/cucm_b_system-configuration-guide-1251/cucm_b_system-configuration-guide-1251_chapter_0100110.html
https://www.cisco.com/c/dam/en/us/td/docs/voice_ip_comm/jabber/11_9/Unified-CM-OAuth-Whitepaper-v17-FINAL.pdf
Collaboration engineer is troubleshooting an issue with Cisco Jabber for Windows. Users report that they are prompted to accept or decline an invalid certificate when they attempt to log in to the client, r server certificates have been signed by a public C
To resolve invalid certificate prompts in Cisco Jabber when using CA-signed certificates, you need to import the root certificate of the Certificate Authority (CA) into the 'Trusted Root Certification Authorities' store on the Windows client machine. This store holds certificates from trusted CAs, enabling the system to validate the certificate chain.
Collaboration engineer configures Cisco UCM and Cisco IM and Presence to support Cisco Jabber Clients. The base configuration is complete The engineer successfully used all the Jabber features a test client but received certificate alerts when signing in. The engineer now wants to ensure that end users do not receive certificate alerts at login. Which two self-.... certificate must be.. with a CA-signed certificate to achieve this goal? (Choose two)
Based on the information you provided and the image (though I cannot access the specific content of the image), for Cisco Jabber clients to avoid certificate trust warnings during login, two certificates need to be replaced with CA-signed certificates:
B) cup-xmpp:This certificate secures the connection between Cisco Jabber and the Cisco UCM XMPP server for instant messaging and presence functionalities.
C) cup-xmpp-s2s:This certificate secures the connection between XMPP servers for inter-cluster communication within Cisco UCM, which can also impact Jabber functionality.
A Collaboration engineer is implementing the Apple Push Notification service for Jabber clients running on iOS and has saved the configuration in Cisco UCM under Advanced Features > Cisco Cloud Onboarding What is the next step to install Cisco-managed certificates?
After configuring Apple Push Notification (APN) Service for Jabber on iOS in Cisco UCM, the next step is to restart the Cisco Tomcat service on all UCM cluster nodes for the changes to take effect and to generate and install the required Cisco-managed certificates.
Tresa
Danica
2 days agoRamonita
7 days agoWenona
14 days agoMuriel
17 days agoArlette
30 days agoSol
1 months agoLaticia
1 months agoDalene
1 months agoSelma
2 months agoMichell
2 months agoChana
2 months agoTresa
2 months agoTherese
2 months agoCarolynn
3 months agoLonna
3 months agoTamar
3 months agoVerdell
3 months agoChuck
4 months agoDeonna
5 months agoOtis
5 months agoCaprice
6 months agoLuis
6 months agoMaira
6 months ago