+ All Categories
Home > Documents > Cisco Collaboration Edge - NetCraftsmen · PDF filetime Cisco Designated VIP, ......

Cisco Collaboration Edge - NetCraftsmen · PDF filetime Cisco Designated VIP, ......

Date post: 09-Mar-2018
Category:
Upload: lykhanh
View: 223 times
Download: 3 times
Share this document with a friend
43
Copyright 2015 Customer Condential 1 1 1 1 CMUG William Bell Hao Tran February 18, 2015 Cisco Collaboration Edge Architecture
Transcript

Copyright 2015 Customer Confidential 1 1 1 1

CMUG William Bell

Hao Tran

February 18, 2015

Cisco Collaboration Edge Architecture

Copyright 2015 Customer Confidential 2 2 2 2

Agenda Introductions

Collaboration Edge Architecture Overview

Mobile and Remote Access (MRA) Overview

MRA Implementation

Q&A

Copyright 2015 Customer Confidential 3 3 3 3

Introductions •  William Bell, CCIE #38914

William’s background spans an array of technical disciplines including application development, network infrastructure, protocol analysis, virtualization, and UC. He leads the UC&C practice and works with customers on architecting solutions that align with core business drivers. Bill is a regular contributor on the Cisco Support Community, a 3-time Cisco Designated VIP, and blogs on the NetCraftsmen and UC Guerrilla sites.

•  Hao Tran, CCNP/CCNP-V A senior unified communications engineer with over 14 years of experience, with a deep focus in both VoIP and networking technologies. Hao is a CCNP in both network and voice and is currently pursuing the CCIE in collaboration. He is part of the NetCraftsmen senior engineering team and supports customers in deployment, troubleshooting, and operational readiness.

•  Jeff Chun (Cisco), CCNP/CCNP-V With 10+ years of experience in Consulting and Sales, Jeff’s drive is to create solutions that solve business challenges. His focus is on deploying Cisco Collaboration solutions throughout the Enterprise, Commercial, and Federal space. Currently at Cisco, I work with partners and customers to provide best in class solutions in our Borderless Networks, Collaboration and Data Center spaces.

Copyright 2015 Customer Confidential 4 4 4 4

Agenda Introductions

Collaboration Edge Architecture Overview

Mobile and Remote Access (MRA) Overview

MRA Implementation

Q&A

Copyright 2015 Customer Confidential 5 5 5 5

Collaboration Edge – Solution Overview

Mobile and Remote Access

Business to Consumer (B2C) Business to Business (B2B)

Cloud Services

Interoperability

Secure communications with partners, customers & suppliers over the internet Video, URI Dialing, Federation

Browser based communications with consumers, interview candidates, potential customers Jabber Guest

Flexible and scalable, “pay as you go” shared resources

WebEx, WebEx Enabled Telepresence

Investment protection with existing 3rd party and legacy communication solutions IPv4-v6, H323-SIP, Standards Based video

Ubiquitous user experience – Any Device, Anywhere

Jabber Mobile & Desktop / TelePresence

Copyright 2015 Customer Confidential 6 6 6 6

Collaboration Edge Architecture Components

Enterprise UC Infrastructure

Copyright 2015 Customer Confidential 7 7 7 7

Collaboration Edge Architecture Components

Enterprise UC Infrastructure Collab Edge

PSTN ü  TDM Voice ü  ISDN Video

CUBE/SBC ü  SIP PSTN ü  Phone Proxy

Cisco Expressway ü  Mobile and Remote Access ü  B2B Video ü  XMPP Federation ü  Jabber Guest

Copyright 2015 Customer Confidential 8 8 8 8

Agenda Introductions

Collaboration Edge Architecture Overview

Mobile and Remote Access (MRA) Overview

MRA Implementation

Q&A

Copyright 2015 Customer Confidential 9 9 9 9

Mobile and Remote Access (MRA) Solution Overview

Allows the UC infrastructure to provide client registration, call control, provisioning, messaging, and IM/P services to endpoints and software clients that are not connected to the enterprise network. Provides a secure, VPN-less communication solution for mobile devices and teleworkers.

Copyright 2015 Customer Confidential 10 10 10 10

MRA Business Drivers

ü  Borderless workforce Contractors, teleworkers

ü  Significant cost savings CapEx-Yes, OpEx-Maybe

ü  Employee productivity 24x7x365 –Anytime, Anywhere

BYOD

ü  Cost savings OpEx – Infrastructure cost reduction

ü  Employee satisfaction and retention - 2012 – 40% of US working pop telecommutes at least part time - Work-Life Integration

ü  Employee productivity

Teleworking

ü  MRA is an “enabler” ü  Feature continuity and

transparency ü  Borderless communications ü  Secure communications ü  Cloud services support

Solution Benefits

Copyright 2015 Customer Confidential 11 11 11 11

MRA Solution Components Cisco UCM

•  UDS Provisioning •  End user authentication •  Client registration •  Voice/Video Call Control

Cisco UCM

Copyright 2015 Customer Confidential 12 12 12 12

MRA Solution Components Cisco IM&P

•  XMPP Client connection •  Messaging service •  Presence / Contact

Management

Cisco IM & Presence

Copyright 2015 Customer Confidential 13 13 13 13

MRA Solution Components Cisco Unity Connection

•  Visual Voice Messaging

Cisco Unity Connection

Copyright 2015 Customer Confidential 14 14 14 14

MRA Solution Components Cisco Expressway

Cisco VCS Expressway •  Specialized video applications •  Used for video only customer

base •  Virtual Machine or HW appliance •  Superset of platform feature set •  Two versions:

ü  VCS Control (VCS-C) ü  VCS Expressway (VCS-E)

•  Designed for UCM 9.1+ •  Virtual Machine only •  No cost licensing for MRA

functionality •  Subset of platform feature set •  Two versions:

ü  “Core” (Expressway-C) ü  “Edge” (Expressway-E)

•  Introduced mid-2014 •  Initial VCS/Expressway version X8.1 •  Based on the Cisco Video Communications Server (VCS)

Copyright 2015 Customer Confidential 15 15 15 15

MRA Solution Components Cisco Expressway

•  Traversal server •  Hosts external client

connections

Expressway-E (Edge)

Expressway-C

Expressway-E

4.  The traversal connection is used to signal client request to Core

Traversal Basics

•  Traversal client •  Proxy endpoint registration

ü  SIP to UCM ü  XMPP to IM/P ü  HTTP to VM and directory

Expressway-C (Core)

1.  Core initiates client connection to Edge 2.  Once connected, Core sends keep-alive packets to Edge 3.  Edge receives incoming requests from clients

Enterprise UC Network Internet

Jabber

1 2 34

Copyright 2015 Customer Confidential 16 16 16 16

MRA Solution Components Supplementary Services

•  Domain Name Services (DNS) •  Perimeter Firewall(s) •  Certificate Services

ü  Internal Enterprise Hosts ü  Externally Accessible Hosts

•  Intranet Web Server

Supplementary Services

Copyright 2015 Customer Confidential 17 17 17 17

Agenda Introductions

Collaboration Edge Architecture Overview

Mobile and Remote Access (MRA) Overview

MRA Implementation

Q&A

Copyright 2015 Customer Confidential 18 18 18 18

MRA Implementation

•  UC Infrastructure Provisioning ü Expressway and the DMZ

ü Certificate Provisioning •  Service Discovery and Client Registration

ü DNS Provisioning

ü Edge Discovery

ü Service Discovery

ü DNS Considerations

ü Client Registration •  Deployment Considerations (Time Permitting)

Copyright 2015 Customer Confidential 19 19 19 19

Infrastructure Provisioning MRA Implementation

Copyright 2015 Customer Confidential 20 20 20 20

Infrastructure Provisioning Expressway and the DMZ •  Expressway-C

ü  Always deployed on the internal LAN

ü  Uses a Firewall Traversal mechanism to communicate with Expressway-E

•  Expressway-E ü  Typically deployed in the DMZ

ü  Can adapt to a variety of DMZ environments

ü  Supports Static NAT (SNAT) using Advanced Networking Option

ü  Supports dual network connections using DUAL NIC feature (part of Advanced Networking Option)

•  Firewall ü  Various deployment options are supported

ü  ALG is not a viable option w/ MRA solution

Copyright 2015 Customer Confidential 21 21 21 21

Infrastructure Provisioning Expressway and the DMZ – DUAL + SNAT

Expressway-C

Enterprise UC Network Internet

21

Jabber @ Anyw

here

•  Deployment Scenario ü  Two separate DMZ subnets ü  No routing between DMZ subnets ü  Expressway-C on internal LAN ü  Two physical firewalls

Expressway-E uc-expe-01

•  Expressway-E Config ü  Dual NIC enabled ü  LAN1 is bridged to LAN2 ü  Static routes to internal subnets

manually added on Edge

LAN1 LAN2

Static Routes

•  Traversal Zone ü  Edge-LAN1 is not NATted ü  Core establishes connection to

Edge-LAN1 IP address ü  FQDN and Cert CN considerations

A: uc-expe-01.domain.com -> 10.3.10.5

Cert CN: uc-expe-01.domain.com

•  Internet “Zone” ü  Edge-LAN2 uses Static NAT (SNAT) ü  FW responsible for Layer 3 SNAT ü  External DNS resolves to public IP ü  FQDN and Cert CN considerations

A: uc-expe-01.domain.com -> 64.10.0.10

10.3.20.5 SNAT 64.10.0.10 10.3.10.5

Copyright 2015 Customer Confidential 22 22 22 22

Infrastructure Provisioning Expressway and the DMZ – DUAL

Expressway-C

Enterprise UC Network Internet

21

Jabber @ Anyw

here

•  Deployment Scenario ü  Two separate DMZ subnets ü  No routing between DMZ subnets ü  Expressway-C on internal LAN ü  Two physical firewalls

Expressway-E uc-expe-01

•  Expressway-E Config ü  Dual NIC enabled ü  LAN1 is bridged to LAN2 ü  Static routes to internal subnets

manually added on Edge

LAN1 LAN2

Static Routes

•  Traversal Zone ü  Edge-LAN1 is not NATted ü  Core establishes connection to

Edge-LAN1 IP address ü  FQDN and Cert CN considerations

A: uc-expe-01.domain.com -> 10.3.10.5

Cert CN: uc-expe-01.domain.com

•  Internet “Zone” ü  Edge-LAN2 uses public IP ü  External DNS resolves to public IP ü  FQDN and Cert CN considerations

A: uc-expe-01.domain.com -> 64.10.0.10

64.10.0.10 10.3.10.5

Copyright 2015 Customer Confidential 23 23 23 23

Infrastructure Provisioning Expressway and the DMZ – Single FW w/SNAT

Expressway-C

Enterprise UC Network Internet

Jabber @ Anyw

here

DMZ-to-Untrusted

DMZ-to-Trusted

•  Deployment Scenario ü  Single DMZ subnet ü  Expressway-C on internal LAN ü  One firewall (or HA Pair) ü  A static 1:1 NAT configured on FW

LAN1 A: uc-expe-01.domain.com -> 64.10.0.10 A: uc-expe-01.domain.com -> 64.10.0.10

10.3.10.5 SNAT 64.10.0.10

•  Expressway-E Config ü  Advanced Networking enabled ü  LAN1 configured with SNAT

•  Traversal Zone ü  Core establishes connection to

LAN1 NATted IP address ü  Requires that FW support NAT

Reflection

•  Internet “Zone” ü  External DNS resolves to public IP ü  Jabber connects to NATted IP

address *NOTE: This works w/o SNAT as well If not using SNAT, Advanced Networking not required

Copyright 2015 Customer Confidential 24 24 24 24

Infrastructure Provisioning Expressway and the DMZ – Two Firewalls, SNAT

Expressway-C

Enterprise UC Network Internet

Jabber @ Anyw

here

•  Deployment Scenario ü  Single DMZ subnet ü  Expressway-C on internal LAN ü  Internal and External firewalls ü  Static 1:1 NAT configured on FW2

LAN1 A: uc-expe-01.domain.com -> 64.10.0.10 A: uc-expe-01.domain.com -> 64.10.0.10

10.3.10.5 SNAT 64.10.0.10

•  Expressway-E Config ü  Advanced Networking enabled ü  LAN1 configured with SNAT ü  (optional) Static routes to internal

subnets manually added on Edge

•  Traversal Zone ü  Core establishes connection to LAN1

NATted IP address ü  Requires that FW support NAT

Reflection ü  Design Consideration: Asymmetric

routing

•  Internet “Zone” ü  External DNS resolves to public IP ü  Jabber connects to NATted IP address

*NOTE: This works w/o SNAT as well If not using SNAT, Advanced Networking not required

Static Routes

FW1 FW2

Copyright 2015 Customer Confidential 25 25 25 25

Infrastructure Provisioning Expressway and the DMZ – DUAL w/o Internal FW

Expressway-C

Enterprise UC Network Internet

21

Jabber @ Anyw

here

•  Deployment Scenario ü  One DMZ subnet ü  Edge LAN1 on internal LAN ü  Core on internal LAN ü  No routing between DMZ and

internal LAN ü  One firewall (or HA pair)

Expressway-E uc-expe-01

LAN1 LAN2 64.10.0.10 OR SNAT

10.3.10.5

ü  From the Expressway-E perspective, this is identical to the previous scenario

ü  Same considerations for certs and DNS resolution

ü  This is not one of Cisco’s reference configurations

ü  But, it works...

Considerations

Copyright 2015 Customer Confidential 26 26 26 26

Infrastructure Provisioning Certificate Provisioning - Overview

Expressway-C

Expressway-E

Unity Connection

IM & Presence

Cisco UCM

Web PKI LDAP

Internet

Jabb

er @

wor

k

Jabber @ Anywhere

Copyright 2015 Customer Confidential 27 27 27 27

Infrastructure Provisioning Certificate Provisioning – Jabber Considerations •  Jabber clients enforce certificate validation

Application Certificate Considerations Cisco UCM Tomcat (HTTP) Secure Phone Profiles for Mixed mode

Cisco IM&P Tomcat (HTTP) XCP Router (XMPP) XMPP domain added as SAN

Unity Connection Tomcat (HTTP)

Expressway-E Server Cert UCM Mixed Mode: no impact SAN: service discovery domains *When using OCSP or CRL: Required RTT <= 5s

WebEx Services CAS, WAPI Meeting Center, WebEx Messenger

•  General Considerations ü  Client will prompt user when cert is not trusted

ü  To avoid identity mismatch, configure UC applications to use FQDN

q Cisco UCM: System servers and UC service profiles

q Cisco IM/P: Cluster topology, TFTP servers, CCMCIP profiles

ü  Public CAs do not support IP address, non-FQDN, or bogus FQDN in CSR

Certificates Affected

Copyright 2015 Customer Confidential 28 28 28 28

Infrastructure Provisioning Certificate Provisioning - Expressway •  Server Certificates

ü  X.509 Extended Key usage: TLS Web Client Auth + TLS Web Server Auth

ü  No support for wildcard certificates

ü  No requirement to add Expressway certs to CTL (for UCM Mixed Mode)

•  Expressway-E Certificates ü  Server Certificate should be signed by Public CA

ü  All service discovery domains need to added as SANs in the CSR •  Expressway-C Certificates

ü  Recommend using Enterprise CA but can use Public CA

ü  For UCM Mixed Mode - add phone security profiles as SANs in CSR

•  Other Considerations ü  XMPP Federations and Federated Group chat SAN requirements

ü  Expressway Cluster considerations

Copyright 2015 Customer Confidential 29 29 29 29

Infrastructure Provisioning Expressway Certificate Trust Store

Certificate Type Core Edge Comments

Public CA chain used to sign Expressway-E (Edge) server certificate

Yes Yes Required to establish traversal zone

Public (or Enterprise) CA chain used to sign Expressway-C (Core) server certificate Yes Yes Required to establish traversal zone

UCM Tomcat certificate or CA cert chain Yes No For MRA only required when TLS verify mode is used

UCM CallManager service certificate or CA cert chain

Yes No Only required when UCM is provisioned for Mixed-Mode

IM/P Tomcat and XCP certificate or cert chain Yes No For MRA only required when TLS verify mode is used

Copyright 2015 Customer Confidential 30 30 30 30

Service Discovery MRA Implementation

Copyright 2015 Customer Confidential 31 31 31 31

Service Discovery Process Overview •  Determine Service Domain

ü  Leverage JID or read from configuration

ü  Example: user@ company.com

•  Edge Discovery ü  Client queries DNS SRV records to determine service location

ü  Attempt to discovery internal services then fallback to Edge Discovery

•  Determine if enterprise has a WebEx Cloud account We’ll come back to this later

•  Get Edge Configuration ü  Client establishes secure connection to Expressway-E (“Edge”)

ü  Leverage UDS to determine user and device configuration

•  Client Registers to Cisco UCM, IM&P, and Voicemail

Copyright 2015 Customer Confidential 32 32 32 32

_cisco-uds._tcp.netcraftsmen.com _cuplogin._tcp.netcraftsmen.com

Service Discovery Edge Discovery

4.  If internal SRV queries fail then query for external SRV

Process 1.  Jabber leverages DNS for discovery 2.  Internal client DNS SRV query 3.  If SRV query resolves then start TCP HS

Considerations ü  Leverage “Split-

Horizon” DNS

(2a):_cisco-uds._tcp.netcraftsmen.com

(2a)

(2b):_cuplogin._tcp.netcraftsmen.com

(2b)

(4c):_collab-edge._tls.netcraftsmen.com

(4c)

5.  If SRV query resolves then start TLS

ü  Internal records: _cisco-uds._tcp.<domain> _cuplogin._tcp.<domain>

ü  External Record: _collab-edge._tls.<domain>

UID: [email protected]

UID: [email protected]

(1)

(5) (3)

Copyright 2015 Customer Confidential 33 33 33 33

Service Discovery Get Edge Configuration

Expressway-C

Expressway-E Cisco UCM

Internet

Jabber @ Anyw

here

1.  Jabber establishes TLS connection ü  Client/Server Hello + cert exchange w/Edge

2.  Jabber requests Edge configuration a)  HTTPS request to Edge w/Authentication

(1)

(2a)

(2b)

SRV: _cisco-uds._tcp.<domain> SRV: _cisco-phone-tftp._tcp.<domain> SRV: _cuplogin._tcp.<domain> A records (as needed)

(2c)

Process

(2d)

(2e)

b)  Edge proxies request to Core (over traversal) c)  If not cached, Core sends DNS queries d)  HTTPS/UDS request for user object to UCM e)   UCM Authenticates User (TLS recommended)

LDAP Authentication

f)  HTTPS/UDS request to Get Device configs

(2f)

Copyright 2015 Customer Confidential 34 34 34 34

Service Discovery Get Edge Configuration

Expressway-C

Expressway-E Cisco UCM

Internet

Jabber @ Anyw

here

1.  Jabber establishes TLS connection 2.  Jabber requests Edge configuration 3.  UCM responds with 200 OK

ü  Response is relayed: Core->Edge->Client ü  Response contains device and service config

ü  Firewall Rules ü  Server Certificates

(3)

(4)

Process Considerations

(3) (3)

Edge Config Response: - UCM, IM/P, TFTP SRV -  SIP edge -  List of UDS servers

-  XMPP Edge -  HTTP Edge -  Etc.

4.  Retrieve Configuration Files ü  HTTPS: Get /jabber-config.xml, CTLSEP<csf>.tlv,

SEP<csf>.cnf.xml ü  Dial Rules, Directory Lookup Rules, etc.

(4) (4)

q  Expressway-E q  Cisco UCM q  LDAP (optional)

Copyright 2015 Customer Confidential 35 35 35 35

Service Discovery MRA Jabber Client Registration

Expressway-C

Expressway-E

Unity Connection

IM & Presence

Cisco UCM

Jabber @ Anyw

here

Internet

1.  Jabber initiates SIP registration process ü  SIP REFER/REGISTER/etc. sent to Edge ü  Edge challenges client for authentication ü  Edge proxies client request (PAI) to Core ü  Core proxies request to Cisco UCM

Process

2.  Jabber establishes XMPP connection ü  Client request proxied - similar to SIP ü  HTTPS used for provisioning

3.  Jabber establishes HTTPS connection to Unity Connection ü  Visual voicemail

Copyright 2015 Customer Confidential 36 36 36 36

Deployment Considerations MRA Implementation

Copyright 2015 Customer Confidential 37 37 37 37

Deployment Considerations Multi-Domain Deployment

•  Public domain: public.com ü  Expressway-E

Expressway-C uc-expc.internal.local

Expressway-E uc-expe.public.com

IM&P

Cisco UCM

Jabber @ Anyw

here

Internet

JID: [email protected]

XMPP Domain internal.local

<host>.internal.local

<host>.internal.local

Considerations ü  Service discovery will fail ü  External DNS servers can’t

resolve internal.local ü  Public CA won’t allow FQDNs in

internal.local Solution ü  Leverage Split-DNS ü  Modify jabber-config.xml

VoiceServicesDomain = public.com ü  Jabber must login locally first

•  Internal domain: internal.local ü  Cisco UCM, IM&P, and UC hosts

ü  Expressway-C

ü  User service domain

Copyright 2015 Customer Confidential 38 38 38 38

Deployment Considerations Cisco WebEx Cloud •  IM&P Functionality Provided by WebEx Messenger

–  CUCM IM/P Service not required

•  WebEx Cloud and Service Discovery -  Client queries for SRV records: _cisco-uds, _cuplogin, _collab-edge

-  Determine whether domain is registered to WebEx http://loginp.webexconnect.com/cas/FederatedSSO?org=<domain>

-  If WebEx discovered:

-  Challenge user with WebEx credentials

-  Proceed with Enterprise sign-in on CUCM and Unity Connection

-  If no WebEx account then discovery proceeds as normal

•  What if you have a mixed environment? –  WebEx can be excluded from the Service Discovery process

Copyright 2015 Customer Confidential 39 39 39 39

Deployment Considerations Customizing Service Discovery •  Methodology

–  J4W: Can push configuration parameters during MSI install

–  All Clients: Leverage “Configuration URL”

•  Service Discovery Options -  Exclude WebEx:

-  Client Does not check WebEx cloud

-  SRV queries: (a) _cisco-uds, (b) _cuplogin, (c) _collab-edge

-  Exclude CUCM:

-  Client does check WebEx but does not query for _cisco-uds

-  SRV queries: (a) _cuplogin and (b) _collab-edge

-  Exclude CUP:

-  I think you get the idea... [no _cuplogin, yes everything else]

Copyright 2015 Customer Confidential 40 40 40 40

Deployment Considerations Interoperability of Collaboration Edge Features

Feature Expressway VCS

Mobile and Remote Access Yes Yes

Business to Business Video Yes Yes

Business to Consumer / Jabber Guest** Yes Yes

Video Interworking (IPv4-IPv6, H323-SIP, MS H264 SVC-AVC, Standards based 3rd party) Yes Yes

Video / TelePresence Device Registration + Provisioning No Yes

Video Session Management + Call Control No Yes

WebEx Enabled TelePresence Yes* Yes

Enhanced Security (e.g. JITC) No Yes

* TelePresence MCU must be trunked to the Cisco UCM ** Jabber Guest and MRA cannot run co-resident (due to TURN requirements)

Copyright 2015 Customer Confidential 41 41 41 41

Deployment Considerations Minimum Software Requirements

Feature UC Solution Component Minimum Version

Call Processing Cisco Unified CM

Cisco Unified CM Business Edition

9.1(2)SU1

IM/Presence Unified Presence

WebEx Connect service

9.1.1

Server 7.6 and later

Voicemail Cisco Unity Connection 8.6(1)

Collaboration Edge

Cisco Expressway or

Cisco VCS

X8.1.1

Clients* Jabber for Windows 9.7

Jabber for iPhone/iPad 9.6(1)

Jabber for Mac 9.6

Jabber for Android 9.6

EX/MX/SX/C Series Endpoints TC 7.1

* Expressway X8.5 Preview Feature: Support for Cisco DX, 7800, and 8800 endpoints

Copyright 2015 Customer Confidential 42 42 42 42

Agenda Introductions

Collaboration Edge Architecture Overview

Mobile and Remote Access (MRA) Overview

MRA Implementation

Q&A

Copyright 2015 Customer Confidential 43 43 43 43

Telephone: 888-804-1717

E-mail: [email protected]


Recommended